Your Ad Here

20 April 2008

List of Websites for Proxy

There are lots of url for unblock proxy. Just copy and paste in browser and enjoy Orkuting.

http://www.iphant.de
http://www.vcamo.com
http://www.3proxy.com
http://www.3proxy.org
http://www.45percent.com
http://www.75i.net
http://www.anproxy.info
http://www.anymouse.org
http://www.anymousindex.com
http://www.anymoussurf.be
http://www.anymousurfing.info
http://www.anypost.com
http://www.anti-boredom.co.uk
http://www.aproxysite.com
http://www.arnit.net
http://www.attackcensorship.com
http://www.betaproxy.com
http://www.boredatschool.net
http://www.browseatschool.net
http://www.bypassbrowser.com
http://www.bypassit.be
http://www.cecid.com
http://www.cleverproxy.com
http://www.clickcop.com
http://www.collegeproxy.com
http://www.computersteroids.com
http://www.concealme.com
http://www.cpr0x.com
http://www.cyberbite.com
http://www.darkproxy.com
http://www.demonproxy.com
http://www.desireproxy.com
http://www.directproxy.com

UNBLOCK ORKUT PROXY- ACCESS ORKUT - ANONYMOUS PROXY - ORKUT UNBLOCKER

Get unblocked access to Orkut now with this great unblock Orkut proxy site. Bypass the Internet filter at school, college and university. Browse through the corporate firewall at work. Access Orkut social networking site from any location, talk to your friends and check your messages. Play flash games online and unblock Facebook, Myspace, Bebo, Youtube, eBay, BBC, HI5, and more! Orkut unblocker proxy proxies.


Web Proxies and proxy sites allow you to surf the web with a greater level of anonymity, privacy and security. Information that might be used to identify you such as IP address, country of origin, browser type and operating system is removed by the web proxy server. The web site you are accessing observes the communication originating from the proxy server, not your computer. Another name is anonymous proxy, anonymizer or anonymizing proxy because it facilitates Internet browsing without revealing your identity, and Circumventer because it allows you to circumvent a college internet filter or company firewall.

Companies and schools like to prevent access to many websites but a proxy site will help you avoid being blocked by web filters. Education and corporate networks such as offices, college, school networks or public libraries and even Internet cafes - anywhere that might have filtered Internet connection. A proxy site gives you unblocked access to any website, allows you to bypass an Internet filter, firewall and bypass web site blocking policies.

No software installation is needed to browse blocked websitbes through this web proxy, just enter the web address of the site you want to visit. Unblock Youtube, Myspace, Facebook, eBay, BlackPlanet, Bebo, Hi5, Fotolog, Amazon, Orkut, Yahoo, BBC, MTV, Blogger, Skyblog, Pandora, Flickr, Xanga, Netlog, Wikipedia, live365, Ifilm, Tagged, CNN, Craigslist, Technorati, GameSpot, IMDB, StupidVideos, FileCabi, Photobucket, ImageShack, 1.fm, Metacafe. You can access any website that might be filtered by your company or university firewall such as social networking, news, video sharing, music, games, shopping, chat and arcade websites can all be unblocked and accessed. Proxies allow you to surf any website you like!

You can surf the web whenever you want with this fast and reliable proxy, which runs on a dedicated web server with maximum availability. Our web server is situated in the United States and has a privacy policy. This proxy site is very safe and secure to use. We have no annoying popup adverts.

Unblock Orkut now and access Orkut. Anonymous proxy site lets you surf anonymously and bypass Internet filters and firewalls. Unblock Orkut proxy.


Now a days Orkut has become life for youth .It is the best way to find and mingle with friends.I have seen at many places Orkut is banned like in school,colleges,offices etc.Even i too have faced the same problem since it has been blocked in my office also.If the orkut will be blocked by Firewall through Keyword ,then it is very difficult to access it by proxy sites like Kproxy.There is different process by small change in IP and free surf.


I just can't live without Orkut,so i find out the solution for orkuting from my office Desktop even after blocking through Firewall.I want to share the process with all my friends so that they could also go for orkuting without any trouble.Here is the process...



Process of Using Proxy :


[ Use Firefox for Better Result and Using Proxy ]


1. Go through these Proxy Website : click here

2. Find out the IP address and Port Address with your country or latency references

3. Go to the Tool-Option-Advance-Network Section for Firefox; and mention this address with port.

[Go through the Tool-Option-Connection-LAN Setting if Avant or Explorer Browser,Repeat the same prcocess]

4. Click Ok

5. Enjoy the Orkuting.

Find out the IP address and Port Address with your country or latency references which is given above.

14 April 2008

Canon printer i850, i950, S600

Dear all reseter's


Start with the printer OFF
1. Hold down RESUME and then hold down POWER
2. release RESUME
3. press RESUME twice, then release POWER
4. Let green light blink until printer is done futzing Select function with RESUME press POWER to execute: presses - light color - function

Number of presses - light color - function
0 presses - green - Test print (or exit service mode on i960)
1 press - orange - EEPROM info print (plus grid nozzle diagnostic on i960)
2 presses - green - EEPROM initialize
3 presses - orange - Reset waste ink counter

reset canon BJC 1000 Series

Dear all reseter's

Canon Waste Ink Tank Reset Procedures
1: Remove Cartridge2: Unplug the AC Power Cord
3: Hold down the RESUME button
4: Release RESUME after plugging in the AC Power cord.
5: Press the RESUME once within
5 seconds and release the RESUME .
6: Press and HOLD RESUME for two seconds or more and release it.
7: Press and HOLD RESUME for two seconds or more and release it.
8: Unplug AC Power Cord to set data.

11 April 2008

Web Proxy List

This is my new web proxy list. Most of them are PHProxy. All of them are fast proxy. Try one to get into bebo/myspace or facebook:

  1. http://www.avoidfilter.net/
  2. http://www.proxybucket.com/
  3. http://www.contestsfree.cn/
  4. http://www.buyerfree.cn/
  5. http://www.uproxy.info/
  6. http://freebetter.cn/
  7. http://freeiron.cn/
  8. http://barelyfree.cn/
  9. http://www.freeimagery.cn/
  10. http://www.extrahide.com/

Copy and paste the URL above on your browser. We can unblock youtube and rapidshare too.

SSH Socks Proxy Tunnel Tutorial: How to Browse anonymously over the net

There are several ways to hide your real ip address while you browse the net, maybe in some reasons , you might want to be anonymous , undetected , or faking your ip address ? well then,just read on!

In this tutorial, you will need :

- SSH Account on any ip public. (you could search it on any Unix Shell Providers on the net).

- SSH Client , in this case , i’ll be using Putty.exe :)

Steps:

1. open your Putty , on the SSH options , click Tunnels , fill ‘1080‘ to source port. (you can use any port you want) And choose ‘Dynamic‘ option, and then click ‘Add‘. That’s all you have to configure. screenshot :
putty1.JPG

2. Now back to ‘Session‘ option , fill your host and port , and click Connect. Once you ‘re connected , means you’ve bind your localhot’s port 1080 for connection from the SSH Server. Screenshot :

putty2.JPG

3. The final step is to open your favorite browser , (my fave is mozilla firefox!) , click tools -> options -> Connection Settings -> Manual Proxy Configuration -> , choose ‘Socks Host‘ option , fill it with your local box ip (means 127.0.0.1) and the port will be 1080. Click OK. Screenshot :

mozilla1.JPG

4. Now browse to www.cmyip.com , and see whether you’re already invisible or not. That’s all.

Fun Things to do with PuTTy and Linux Routers

If you set up some kind of SSH Connection on a windows computer over the past few years, be it to connect to the university’s network or to secure a line for an insecure FTP Transfer,you have probably encountered the program PuTTy on the way to salvation. It’s easy to use, free and OSSish powerful. What many people don’t know about PuTTy though, is what other powers aside from or better in addition to SSH slumber inside the little executable.

I was no exception to this when I decided to fool around a bit with my AVM Fritz!Box (Broadband Router quite common in Germany and Austria that runs with Linux) and installed - among other amusing things - the dropbear SSH Server on it. I was then able to connect to my home network from all around the world using just my dyndns-account and PuTTy, or better his cousin PuTTyPortable, which runs from thumb drives without leaving traces behind on the host

After going through the massive troubles of installing and configuring dropbear via FTP and VM, I first started to think about the use I could get out of this.

note: I didn’t intend to give instructions of how to use PuTTy or to set up those functions I mention, more to give some inspiration. Google helps all, but if someone is interested in a particular HowTo, just ask, I’m here ;).

First of all, I found out that I could use my encrypted Connection to eliminate some holes in my Firewall, VNC always being a big thorn in my side. If I use the standard ports, it’s insecure, and if I use custom ports, I’m bound to fail to remember them when needed. With the SSH Connection, I only have to remember one custom port (in fact, PuTTy does remember it), and I can spare the additional effort and cpu time for encrypting VNC sessions, as well as I could stuff all commonly used holes in my firewall.

Incredibly simple, but at the same time incredibly effective. If you want something like this, the tunneling function (also port forwarding) is for you. It also allowed me - with some tweaking on the router as well - to view the html-based configuration side from outside over the secure line, taking a look at the list of calls received in absence.

The next useful function I could think of was to use my secure Connection to obscure my internet traffic. Not to circumvent IP-Checks, but to prevent the casual network analyzer of having anything to work with besides my current IP at home. No destination, no protocol, no data. Setting it up was even easier than setting up the port tunnels, which, from time to time, tend to be a real pain in the ass, so to speak. For every open SSH Connection and without further configuration, PuTTy procures a full-fledged SOCKS proxy server for you. Ain’t that nice? And with plugins like QuickProxy for Firefox you are free to switch it on or off as you like. Which, of course, is also available as a portable version. But you all knew that already.

The third function I use pretty often was a nasty one to get by, but it was definitely worth the trouble, since it fits my setting nigh perfectly. I’m quite fond of VPNs, but I have yet to encounter a VPN-software that really satisfies me and my personal needs and/or beliefs. So, among the other amusing programs I set up on my router (as mentioned above), was a VPN-server, to allow me to connect to my network-enabled hard drives at home. To cut it short, it worked, I felt secure and all, but it was impossible to take the solution with me, since all VPN-Implementations (OpenVPN, that is) required installation and the creation (and configuration) of a virtual network adapter. So I tried to bring up a feasible solution involving PuTTy.

The easy one was to use a protocol that allows you to transfer files, (s)FTP, SCP, or even HTTP, but all require a special server component to be run on the target, which is not possible for me without leaving one of my computer on, which is entirely out of the question. The NAS is even able to manage FTP, but it would require me to rely on FTP and FTP alone. No Samba and FTP at the same time for the same files. So I had to discard that as well.

The next thought was to just forward port 139 (used by windows filesharing services) to my target network. It would’ve worked, but it would’ve rendered me incapable of using the filesharing service for local shares. I’m using this solution at work, so it’s either home or work. It would work, I could only start up the connection of needed, and so on, but I wasn’t just happy with it, so I digged further.

If I had found a software for windows, that used not the windows filesharing service but an own implementation of it, I could just tell it to use another port and forward that one, but unfortunately, I found no such program.
The best I could come up with was to create a network adapter as VPN does, but without configuring anything on it except for a meaningless IP, and then forward all traffic on 10.0.0.1:139 to my network at home. Works like a charm, but if anyone ever happens to find a program like mentioned above, I would be more than happy to give it a try. Portable Applications preferred ;)

Another function available, though I did not use it very often, was the forwarding of the X11-protocol used by common Linux-desktops, which gives you the power of controlling the remote computer similar to VNC but without the need for additional software.

The last one I want to mention is not one of PuTTy, but one that uses its opened shell to go through with it. A little program called etherwake can be run on common Linux-powered systems which enables you to start your computer without actually sitting in front of it via the magic of WOL (pun intended). A pre-set shell-script that’s run with a short command, a VNC server installed as a service, and you’re good to go. Connect the Router, wake up the computer, connect using VNC and take a look at the all-important document you left at home.

So, if you happen to own a Fritz!Box or one of them shiny, new, world-wide-available OpenSource-Routers, or just an old crappy computer that could deliver a reasonable SSH server for an equally reasonable amount of watts spent, maybe those ideas incorporated one for you.

Also, please notice that PuTTyTray works from Thumb Drives as well without leaving any Data behind (if you use the “session from file”-option), but has the advantage that it can be minimized to the system tray.

If you’re planning on keeping the connection up for quite some time, also remember to activate the “Keep Alive”-function ;)

Edit: After getting rebuked for not doing it from the beginning, I’d like to incorporate some useful links that might get you started.
Complete Installation Guide for Telnet, FTP, SSH, WOL & VPN on a Fritz!Box, German.
You can also get this functions creating a nice and easy pseudo-firmware-image here, but I guess one could lack the insight needed to fill in all the right information if he never did it manually before. So, feel free to screw around using the above link and once you figured it all out, use this one. Also German, but with very little text ;)
Another tutorial, this time for the Linksys WRT54G, including SSH and Tunneling.

Nvidia News

NVIDIA Newsletter
nvidia.comDriversShopProductsCommunitiesSupport

Introducing the NVIDIA GeForce 9800 GX2

GeForce 9800 GX2

Beautifully designed and engineered for the most extreme graphics performance, the NVIDIA® GeForce® 9800 GX2 is an uber-powered, dual GPU graphics card for those pushing high-definition PC entertainment and gaming to the max.

With two on-board GPUs, the GeForce 9800 GX2 is, bar none, the fastest graphics card available-up to 50% faster than GeForce 8800 Ultra. Be blown away by scorching frame rates, true-to-life extreme HD gaming, and picture-perfect Blu-ray and HD DVD playback. (No, you HD DVD owners won't be orphaned by us.)

Be sure to check out the review of GeForce 9800 GX2 on Gamespot.com and the video interview with Ujesh Desai, NVIDIA's GeForce general manager.

Learn more


In this issue:

NVIDIA GeForce 9800 GX2

Be Part of the Excitement at NVISION 08!

Boost Your AutoCAD Productivity!

Assassin's Creed - Coming April 10th

Introducing the World's Fastest Gaming Platform

CUDA Software for Mac OS Now Available

Be Part of the Excitement at NVISION 08!

Join thousands of enthusiasts and professionals at NVISION 08-the first mega-event for people who are passionate about visual computing and technology.

World-class gamers, innovative artists and designers, and game modders will compete for prizes, attempt to set a world record, experience the latest cutting-edge visual technologies and content, and have a great time.

Top visual computing professionals and leading researchers will all gather to learn how to take advantage of the latest trends in their fields and to share their ideas, experiences, and passions.

NVISION 08 will be taking over most of downtown San Jose, CA-right in the heart of Silicon Valley-August 25-27.

Join the world of visual computing, gathered in one place, at one time.

Sign up today to reserve your place

Learn More

Boost Your AutoCAD Productivity!

AutoCAD

AutoCAD designers need the professional performance and productivity enhancements that you can only get with NVIDIA Quadro® graphics. For as little as $149 MSRP, AutoCAD designers can upgrade to professional-class Quadro graphics and experience outstanding productivity gains of up to 10x over comparably priced consumer graphics cards. Available in a wide range of configurations, NVIDIA Quadro graphics meet the needs of all types of AutoCAD 3D design projects.

  • Seamlessly manage multiple displays
  • Maximize system uptime
  • Rely on AutoCAD certified and tested performance
Learn More

Assassin's Creed - Coming April 10th

Assassin's Creed

Assassin's Creed is the next-gen game developed by Ubisoft Montreal that will redefine the action genre. The setting is 1191 AD. The Third Crusade is tearing the Holy Land apart. You, Altair, intend to stop the hostilities by suppressing both sides of the conflict. You are an Assassin, a warrior shrouded in secrecy and feared for your ruthlessness. Your actions can throw your immediate environment into chaos, and your existence will shape events during this pivotal moment in history.

Assassin's Creed merges technology, game design, theme and emotions into a world where you instigate chaos and become a vulnerable, yet powerful, agent of change.

Learn More

Introducing the World's Fastest Gaming Platform

790 SLI

NVIDIA nForce® 790i Ultra SLI motherboards are the foundation for the world's fastest gaming PCs, delivering top performance for 1,600 MHz Intel CPUs with extreme CPU overclocking and unmatched DirectX 10 gaming for 2-Way, 3-Way and Quad SLI technology. It's the only platform that supports DDR3-2GHz and it also provides world-record-setting memory speeds and component control with Enthusiast System Architecture (ESA).

Learn More

CUDA Software for Mac OS Now Available

The Mac OS CUDA developer's kit allows application developers to use the GPU solve complex computation-intensive challenges for academic, commercial, or personal purposes on the Mac. The complete toolkit and SDK codes are now available for download on CUDA Zone.

Learn More


Copyright © 2008 NVIDIA Corporation. All rights reserved.
2701 San Tomas Expw., Santa Clara, CA 95050


10 April 2008

Have YOU Updated Your Windows SDK Recently?

win-SDK_rgbIt can be pretty hard to keep everything up-to-date on a developer workstation these days. With so many CTP releases, betas, and service packs, I know I often realize that my own machine is behind in one area or another.

One particularly worthwhile update that might have missed your attention over the last couple of weeks is a new release of the Windows SDK, focused on enhancements in the .NET Framework 3.5, Windows Vista SP1 and Windows Server 2008. Amongst other changes, this updated SDK has new documentation that covers all the new classes in WPF 3.5 (e.g. UIElement3D, System.AddIn, LINQ-based data binding), a variety of new samples for common Windows services such as User Account Control, Windows Search, Windows Error Reporting, Speech, and a range of shell APIs. If you've not installed the Windows SDK before, another incentive is a ZIP file containing over 100MB of sample WPF code (check out %ProgramFiles%\Microsoft SDKs\Windows\v6.1\Samples\WPFSamples.zip).

After installing the Windows SDK, you'll want to do two things:

  • Run the new Windows SDK Configuration Tool (Start / Programs / Windows SDK v6.1 / Visual Studio Registration) to ensure that this is set as the default help collection in Visual Studio
  • Follow this workaround to fix a XAML Intellisense bug that will be very irritating if you're a WPF developer.

For more information on the Windows SDK, check out the team's blog or visit the recently overhauled Windows Vista development center on MSDN.

07 April 2008

Controlling the Distribution of Silverlight Updates in the Enterprise

I've posted a few times about issues relating to enterprise distribution of Silverlight, and I thought I'd mention one additional topic that came up during a customer tour that I've been on for the last ten days.

Computer Management If you're a systems administrator, one of the aspects of Silverlight that concerns you is probably controlling the distribution of updates. In general, enterprises like to control their desktop and laptop environments to ensure no sudden surprises are caused (for example, by a runtime update that breaks a commonly used application). So some people may wish to dial down the update settings that are optimized for end-users when Silverlight is running in a corporate environment.

Silverlight supports enterprise rollout via WSUS and we provide guidance on how to roll it out across an enterprise via other means such as Group Policy (using the EXE-based installer). Silverlight is installed via a normal MSI plus an MSP-based patch which can be chained through a variety of means. Updating Silverlight to the latest revision can be done automatically or manually (by pushing out the latest MSP).

There are two different knobs an enterprise administrator can turn to control how updates are applied to the runtime:

  • Firstly, if the enterprise sets the UpdateMode DWORD registry value under the HKLM\Software\Microsoft\Silverlight key to 2 then the Silverlight auto-updater will be disabled (i.e. it won't automatically check for updates or try to install them). This is the equivalent to an end-user choosing the Silverlight Configuration dialog and manually disabling auto-updates from the Updates tab.
  • Second, the feature that allows a non-admin to patch Silverlight on Windows Vista without requiring admin elevation is not a Silverlight feature: it's a feature of Windows Installer which can be disabled if the admin wants to do so (and is indeed off-by-default in Windows Server 2008). You can switch this off using Group Policy by setting the DisableLUAPatching property. More information on UAC Patching can be found on MSDN.

If an enterprise disables the LUA patching feature in MSI and does not give their users administrative access to machines then users will not be able to install, remove or patch Silverlight. Only the enterprise administrator could touch the files. Obviously, it's important that someone is actively monitoring and distributing patches; as with any runtime for any operating system, without any means to fix potential security vulnerabilities, users' machines are at risk.

Many thanks to Bob Pomeroy for providing the technical detail behind this post. Hopefully this is helpful to those of you who need to persuade your IT department that Silverlight is "safe" for corporate adoption.

Silverlight 1.0 - New Maintenance Release Available

We released a minor maintenance update to Silverlight 1.0 over the weekend (internally known as GDR3, where GDR stands for "General Distribution Release"). I'm sure most readers of this blog already have Silverlight 2 Beta 1 installed on their own machines, but if you're building a site for the tens of millions of users that already have Silverlight installed on their machine, you'll be pleased to know that we're continuing to service the 1.0 release to take account of customer-reported issues.

image The latest release is live now on the web for both Mac and PC; it reports itself as 1.0.30401.0 (where the build number indicates that it was compiled on April 1st). The changes are minor in nature and shouldn't affect existing applications; they include an audio bug fix for nForce 4 motherboards, an update to support custom parameters in ASX playlists, fixes to font support on Mac OS X Leopard and improved multi-language support during installation and update.

As ever, the way to check which version you're running is to right-click on some Silverlight content and choose the Silverlight Configuration context menu option; on a Macintosh, it's visible by browsing to the Silverlight run-time in its installation location in the browser Plug-Ins folder. Incidentally, it seems that most people don't realize that we publish release notes that highlight the deltas from one release to another (admittedly, the link is pretty buried, so it's worth adding to your favorites).

04 April 2008

Reset printer Canon BJC-2000 BJC-2100

Dear all reseter's

Reset Waste Ink Canon
1. Remove the Cartridge
2. Unplug the AC Power Cord
3. Close Front access panel
4. Hold down the RESUME/RESET button and plug in the AC power cord
5. Release RESUME/RESET after plugging in the AC Power cord.
6. Press the RESUME/RESET once within
7. Seconds and release the RESUME/RESET .
8. Press and HOLD RESUME/RESET for two seconds or more and release it.
9. Press and HOLD RESUME/RESET for two seconds or more and release it.
10.Unplug AC Power Cord to set data.

Reset Printer Canon and Manual service

Dear all reseter's

This is How to Reset Canon Pixma iP 2000 :
http://rapidshare.com/files/82936240/Pixma_iP2000.zip
Printer Xnu i550 i850 i950
http://rapidshare.com/files/82937173/xnu_i550_i850_i950_SM.zip
Printer xnu i450
http://rapidshare.com/files/82937427/xnu_i450_SM.zip


reset canon

Reset canon i255 i355
Reset canon iP1000
Reset iP1500 canon
manual service canon iP2000 resetter
resetI250-I350
Reset_i320
Download : http://rapidshare.com/files/84970258/resetprint.zip

01 April 2008

Hard Disk Drive

ATA/ATAPI-1 — the first ATA standard released in 1994

This is the first ATA/ATAPI standard. Released in 1994.

The standard defines the AT Attachment Interface. The standard defines an integrated bus interface between disk drives and host processors. It provides a common point of attachment for systems manufacturers, system integrators, and suppliers of intelligent peripherals.

Note: there is no practical use of this document. This is a history now.

Download: d0791r4c — ATA/ATAPI-1 (PDF)


ATA/ATAPI-2 — the second revision of the ATA standard released in 1996

This is the second ATA/ATAPI standard. Released in 1996.

This standard extends the AT Attachment Interface with the addition of new commands, and defines improved interface transfer rates. In addition, general improvements have been made in content for completeness and to improve clarity.

This standard defines the AT Attachment Interface and integrated interfaces between devices and host processors. It provides a common point of attachment for systems manufacturers, system integrators, and suppliers of intelligent devices.

The application environment for the AT Attachment Interface is any device which uses internal storage.

The PC AT Bus(TM) is a widely used and implemented interface for which a variety of devices have been manufactured. As a means of reducing size and cost, a class of products has emerged which embed the controller functionality in the device. Because of their compatibility with existing AT hardware and software this interface quickly became a de facto industry standard. While the AT Attachment Interface has its roots in the PC AT Bus(TM), its use has extended to many other systems.

Note: there is no practical use of this document. This is a history now.

Download: d0948r4c — ATA/ATAPI-2 (PDF)

ATA/ATAPI-5 — the fifth revision of the ATA standard released in 2000

This is the fifth ATA/ATAPI standard. Released in 2000.

This standard specifies the AT Attachment Interface between host systems and storage devices. It provides a common attachment interface for systems manufacturers, system integrators, software suppliers, and suppliers of intelligent storage devices.

The application environment for the AT Attachment Interface is any host system that has storage devices contained within the processor enclosure.

This standard defines the connectors and cables for physical interconnection between host and storage device, as well as, the electrical and logical characteristics of the interconnecting signals. It also defines the operational registers within the storage device, and the commands and protocols for the operation of the storage device.

This standard maintains a high degree of compatibility with the AT Attachment with Packet Interface Extensions standard (ATA/ATAPI-4), NCITS 317-1998, and while providing additional functions, is not intended to require changes to presently installed devices or existing software.

Download: ATA/ATAPI-5 (PDF)

ATA/ATAPI-6 — the sixth revision of the ATA standard released in 2001

This is the sixth ATA/ATAPI standard. Released in 2001.

This standard specifies the AT Attachment Interface between host systems and storage devices. It provides a common attachment interface for systems manufacturers, system integrators, software suppliers, and suppliers of intelligent storage devices.

The application environment for the AT Attachment Interface is any host system that has storage devices contained within the processor enclosure.

This standard defines the connectors and cables for physical interconnection between host and storage device, as well as the electrical and logical characteristics of the interconnecting signals. It also defines the operational registers within the storage device, and the commands and protocols for the operation of the storage device.

This standard maintains a high degree of compatibility with the AT Attachment with Packet Interface - 5 standard (ATA/ATAPI-5), NCITS 340-2000, and while providing additional functions, is not intended to require changes to presently installed devices or existing software.

Download: ATA/ATAPI-6 (PDF)

ATA/ATAPI-7 — the seventh revision of the ATA standard released in 2003

This is the seventh ATA/ATAPI standard. Released in 2003.

This standard specifies the AT Attachment Interface between host systems and storage devices. It provides a common attachment interface for systems manufacturers, system integrators, software suppliers, and suppliers of intelligent storage devices.

The application environment for the AT Attachment Interface is any host system that has storage devices contained within the processor enclosure.

Volume 1 defines the register delivered commands used by devices implementing the standard.

Volume 2 defines the connectors and cables for physical interconnection between host and storage device, the electrical and logical characteristics of the interconnecting signals, and the protocols for the transporting commands, data, and status over the interface for the parallel interface.

Volume 3 defines the connectors and cables for physical interconnection between host and storage device, the electrical and logical characteristics of the interconnecting signals, and the protocols for the transporting commands, data, and status over the interface for the serial interface.

Download: d1532v1r4b — ATA/ATAPI-7, Volume 1 (PDF)
Download: d1532v2r4b — ATA/ATAPI-7, Volume 2 (PDF)
Download: d1532v3r4b — ATA/ATAPI-7, Volume 3 (PDF)

ATA/ATAPI-8 revision 2b — AT Attachment — 8 ATA/ATAPI Command Set (January 10, 2006)

ATA/ATAPI-8 revision 2b — AT Attachment — 8 ATA/ATAPI Command Set (January 10, 2006, draft)

The set of AT Attachment standards consists of this standard and the ATA implementation standards described in ATA8-AAM. The AT Attachment ATA Command Set (ATA8-ACS) specifies the command set host systems use to access storage devices. It provides a common command set for systems manufacturers, system integrators, software suppliers, and suppliers of intelligent storage devices.

Download: d1699r2b — ATA/ATAPI-8, Command Set (PDF)
Download: d1700r2 — ATA/ATAPI-8, Architecture Model (PDF)