hello friends
happy new year to all
Analysts continue to criticize Microsoft and consider its prospects as cloud computing and competitive products dim the prospects for the company’s operating systems.
A History of Failed Brands
Indeed, Microsoft has a long track record of failed brands. Here are a dozen examples:
Vista: This failure hurt the most. Microsoft is synonymous with operating systems, so a failed product in this category was a body blow. Released in January 2007, by April 2009, the software had only achieved a 24% share of PC operating systems. Most people still prefer to limp along using decade-old systems.
Kin Phone: It took years and billions of dollars to develop, but only sold 503 units after 48 days on the market. In terms of financial cost, this brand inflicted plenty of damage.
Tablet PC: The failure of this brand chipped away at Microsoft’s reputation as an innovator. Ground-breaking when Microsoft first announced it ten years ago, the Tablet PC was surpassed by better design and better marketing of the iPad and Samsung’s Android.
Zune: An innovative reputation can’t be won with copycat products. Microsoft’s Zune portable media player has not been able to effectively compete with Apple and its iPod.
MSN: As Microsoft struggled with MSN Search, which became MSN (with the butterfly), then Live Search and now Bing, Google started, grew, and now dominates.
WebTV: The internet over television sounded like the holy grail of convergence. But the product never produced a revenue stream as its tech-averse customer base created an expensive customer service nightmare.
Passport: Microsoft demonstrated branding cluelessness by originally calling this “thing” Microsoft Wallet, then Passport, then .NET Passport, then Microsoft Passport Network, then Live ID, then Windows Live as part of MSN. Phew! Moreover, entrusting sensitive information to a company known for operating systems with massive security bugs, Passport was a no-go. The service closed August 2009.
Encarta: Why pay for a limited and outdated encyclopedia when there is Wikipedia? This brand finally expired on March, 2009.
Bob: Bob was meant to be a user-friendly Windows interface, but turned into a laughing-stock that perennially makes the “worst of” lists. “Bob” appears to be an internal project name that somehow escaped as a public-facing brand name on an embarrassing product.
Money: Brand trust issues aside, Microsoft Money could not compete against online banks, free personal finance tools and more established and robust financial software products.
WinCE: Yup, this product made people “wince”. This personal digital assistant software brand represents years of trying, failing and eventually giving up.
“I’m a PC”: In answer to Apple’s successful “I’m a Mac” branding campaign came the inexplicable “I’m a PC” answer from Microsoft. In addition to adopting an “I know you are, but what am I” brand positioning, the campaign didn’t identify the brand Windows beyond a logo and said nothing about the “V-Word” (the failing Vista operating system). Why invest in advertising a generic like a PC?
Key Factors in Microsoft’s Branding Failures
1) Poor design: Apple’s brand is built on excellent, innovative design. Microsoft design is generic and old-fashioned.
2) Inconsistency: The Apple product brands all support key brand attributes of the parent company: coolness and easy usability. Microsoft branding is all over the map, with some product brands having almost no association with the parent company and with no brands sharing a unifying attribute that would bring them all together as Microsoft.
3) No jumping off point: Apple has always been about devices integrated with software, making it easy to create new products of all kinds. Microsoft was just an operating system, and a bug-ridden one at that.
4) Problems with trust: Microsoft has been seen as arrogant and pushy. Its reputation has never recovered from the anti-trust lawsuit in the 1990s.
5) Poor follow-through: Beyond a launch announcement and a few ads, many Microsoft products flounder unsupported.
Lots of money and really smart people are Microsoft strengths, but the company cannot reach its full potential without smarter branding. Little by little, newcomers like Google and old competitors like Apple will eat their lunch.
|
---|
|
---|
Friday, December 31, 2010
Thursday, December 30, 2010
Earn Money Online For Free With Paisalive
Well its been a long time since I have written a article on how to Earn money Online because I could not found a genuine method that actually works .Today I glady introduce you to a new online money making trick.Well you cannot earn full time income but still you can earn enough to pay your telephone bills,canteen bills etc
This doesn’t require any investment on your part as it is completely free to join.All it requires is at-most 15-20 minutes of your daily time
click here to join it
This doesn’t require any investment on your part as it is completely free to join.All it requires is at-most 15-20 minutes of your daily time
click here to join it
- You will get Rs 99 Instantly Once you have
- Earn Rs 5 for verifying your mobile number.
- You can make Rs. 2 (Rs. 50 for the first 2 referrals) per referral.
- You can earn upto Rs 5 for each PaisaLive email you check.
- You can make Rs 1 everyday just by just logging into your account.
- You can earn upto Rs. 2500, for Special campaigns in a single action.
- You’ll get the pay once in 15 days and Cheque is the only mode of payment.
- The minimum Payout criteria is Rs 500.
- Once registered your account will automatically credited with Rs 99
- Now you will have to complete their free and easy offers to earn from them.It will take only a minute or two to complete a offer.You can expect 10 to 20 offers everyday.
- You will be paid for each offer you complete.
- Check your paisalive account daily to get high paying offers
- The minimum payout is only Rs 500.
Labels:
earn money,
internet
Wednesday, December 29, 2010
WIBREE- killing bluetooth tehnology
Wibree, also called "Baby Bluetooth," is a low-power wireless local area network (WLAN) technology that facilitates interoperability among mobile and portable consumer devices such as pagers, personal digital assistants (PDAs), wireless computer peripherals, entertainment devices and medical equipment.
Wibree is a wireless technology for mobiles,laptops,watches for short distance communication.Its development was started by nokia in 2001 to bring an alternative to bluetooth technology.The research was by published in 2004 with the name “Bluetooth Low End Extension” .It was publicaly released in 2006 by nokia.The main purpose for introducing wibree was to create a wireless technology that consumes less energy ,more efficient and cheaper then bluetooth.As most of devices nowdays,uses the bluetooth chip the compatibility with chip was also a big requirement.Now here we will compare both bluetooth and wibree and see in what are the advantages of wibree over bluetooth.
Wibree is cheaper then the bluetooth wireless communication.It consumes less power that’s why it was named as “ Bluetooth Low End Extension “.It was built using and enhancing bluetooth features.Wibree can be integrated on the bluetooth chip.Wibree uses a small transceiver of 2.4 MHz with a physical layer of Mbs.
Wibree is a wireless technology for mobiles,laptops,watches for short distance communication.Its development was started by nokia in 2001 to bring an alternative to bluetooth technology.The research was by published in 2004 with the name “Bluetooth Low End Extension” .It was publicaly released in 2006 by nokia.The main purpose for introducing wibree was to create a wireless technology that consumes less energy ,more efficient and cheaper then bluetooth.As most of devices nowdays,uses the bluetooth chip the compatibility with chip was also a big requirement.Now here we will compare both bluetooth and wibree and see in what are the advantages of wibree over bluetooth.
Wibree is cheaper then the bluetooth wireless communication.It consumes less power that’s why it was named as “ Bluetooth Low End Extension “.It was built using and enhancing bluetooth features.Wibree can be integrated on the bluetooth chip.Wibree uses a small transceiver of 2.4 MHz with a physical layer of Mbs.
Monday, December 27, 2010
How To Hack Closed PC On Cyber Cafe
here is a quick new hack on how to intrude in the PC which is shut downed at Cyber cafe. (Don’t Forget to read our disclaimer at the bottom of the post.)
1. As you all must have know these days all Cyber cafe owners have a program for administration to control all PC’s in local area network. So all files can be inter transmitted.
2. First of all press Ctrl+Alt+Del the task manager or any controlling application, will open. Then from APPLICATIONS select the program that is controlling all PC’s & terminate it, This is for security reason. Now log of PC, & you ll get user names of the PC.
3. But some times, cyber cafes have security clients installed that have restricted access to Task Manager, restart the computer & press F8 continuously before windows boots.
The Menu will open, select Safe Mode from it. And now you can copy files from networked PC’s without any security layer.
Next step is where you’ll need to crack the hashes. SO go to your home PC , Download & install Saminside cracking tool. And from some another Cyber cafe try to crack the hashes of that PC. By same log off method explained below.
This where you actually perform hacking. Have a gret time & tell us weather it worked for you.
Meanwhile if you can get IP address, of the PC you wish to hack try to get it from ip-explorer.com, but this is not the part of this hack its sort of next step of hacking from outside the network.
Disclaimer : The trick here explained it for educational purpose only & not to perform illegal or criminal activities. Don’t forget hacking into some one’s privacy is considered as crime. SO do it on your home network that you own or something. We are not responsible for anything you do & consequences of it by using our articles.
1. As you all must have know these days all Cyber cafe owners have a program for administration to control all PC’s in local area network. So all files can be inter transmitted.
2. First of all press Ctrl+Alt+Del the task manager or any controlling application, will open. Then from APPLICATIONS select the program that is controlling all PC’s & terminate it, This is for security reason. Now log of PC, & you ll get user names of the PC.
3. But some times, cyber cafes have security clients installed that have restricted access to Task Manager, restart the computer & press F8 continuously before windows boots.
The Menu will open, select Safe Mode from it. And now you can copy files from networked PC’s without any security layer.
Next step is where you’ll need to crack the hashes. SO go to your home PC , Download & install Saminside cracking tool. And from some another Cyber cafe try to crack the hashes of that PC. By same log off method explained below.
This where you actually perform hacking. Have a gret time & tell us weather it worked for you.
Meanwhile if you can get IP address, of the PC you wish to hack try to get it from ip-explorer.com, but this is not the part of this hack its sort of next step of hacking from outside the network.
Disclaimer : The trick here explained it for educational purpose only & not to perform illegal or criminal activities. Don’t forget hacking into some one’s privacy is considered as crime. SO do it on your home network that you own or something. We are not responsible for anything you do & consequences of it by using our articles.
Labels:
Hacking
Friday, December 24, 2010
windows 7 shortcut keys
Windows 7 Cheat Sheet
Keyboard shortcuts are combinations of two or more keys that, when pressed, can be used to perform a task that would typically require a mouse or other pointing device. Keyboard shortcuts can make it easier to interact with your computer, saving you time and effort as you work with Windows and other programs.
From Desktop
- Windows Key + Tab : Aero [press Tab to cycle between Windows]
- Windows Key + E : Windows Explorer is launched.
- Windows Key + R : Run Command is launched.
- Windows Key + F : Search (which is there in previous Windows versions too)
- Windows Key + X : Mobility Center
- Windows Key + L : Lock Computer (It is there from the earlier versions as well)
- Windows Key + U : Launches Ease of Access
- Windows Key + P : Projector
- Windows Key + T : Cycle Super Taskbar Items
- Windows Key + S : OneNote Screen Clipping Tool [requires OneNote]
- Windows Key + M : Minimize All Windows
- Windows Key + D : Show/Hide Desktop
- Windows Key + Up : Maximize Current Window
- Windows Key + Down : Restore Down / Minimize Current Windows
- Windows Key + Left : Tile Current Window to the Left
- Windows Key + Right : Tile Current Windows to the Right
[Continue pressing the Left and Right keys to rotate the window as well] - Windows Key + # (# is any number) : Quickly Launch a new instance of the application in the Nth slot on the taskbar. Example Win+1 launches first pinned app, Win+2 launches second, etc.
- Windows Key + = : Launches the Magnifier
- Windows Key + Plus : Zoom in
- Windows Key + Minus : Zooms out
- Windows Key + Space : Peek at the desktop
How To Make System Faster | No Need To Add RAM
MSwin32.dll.vbs AND autorun.inf are the irritations of the computer..!
Today we are facing so many troubles with our computer such as virus problem, Booting problem, Display Problem and Error Messages etc. So here, we have some solutions for solving the slow booting and slow performance of the computer. This problem can be detected by some of Antivirus Programs but cannot be rectified. This problem seems like primordial attempt from viruses. It does nothing more than one problem alike Slow Performance.
Identifying these types of viruses is very easy.
1. We cannot open any windows and drives by double clicking especially USB Drives.

2. An unknown WSCRIPT.EXE, MONIT.EXE and SCVHOST.EXE appear in our task manager.
3. In every drive MSwin32.dll.vbs and autorun.inf hidden files will appear.
What do the Hidden Files do?
1. Make us stumble to open the drives directly. That is we cannot open the drives by double clicking. If it will, open only in a new window.
2. Login and Logout will become very slow.
Removal of the Hidden Files.
We can easily remove this type of files……
However, please note that this virus most often appears only inside the folder along with the virus and same name, which creates .exe files. After removing the virus hurry up to Task Manager and put an end for WSCRIPT.EXE, MONIT.EXE and SCVHOST.EXE.
Below is the detailed explanation.
1. Go to Folder Options (Start > Control Panel > Folder Options)
2. Enable Show Hidden Files and Folders.
3. Make Uncheck Hide Extension For Known File Types
4. Make Uncheck Hide Protected Operating System Files.
5. Click OK.

6. Go to every drive and delete the hidden files WSCRIPT.EXE, MONIT.EXE and SCVHOST.EXE completely.
7. At this attempt, please do not insert your USB drives.
8. Finish the entire removal procedure.
Let us look at the Removal in USB Drives, Digicam, Mobiles, iPods.
1. Click START > RUN > Type regedit
2. Click OK.

3. And delete the following keys.
4. Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Run\wscript

5. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Run\monit
6. Then navigate the following key HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
and double click on the Key Window Title.
7. Change that key value to “Microsoft Internet Explorer” (without the quotes
).
Today we are facing so many troubles with our computer such as virus problem, Booting problem, Display Problem and Error Messages etc. So here, we have some solutions for solving the slow booting and slow performance of the computer. This problem can be detected by some of Antivirus Programs but cannot be rectified. This problem seems like primordial attempt from viruses. It does nothing more than one problem alike Slow Performance.
Identifying these types of viruses is very easy.
1. We cannot open any windows and drives by double clicking especially USB Drives.
2. An unknown WSCRIPT.EXE, MONIT.EXE and SCVHOST.EXE appear in our task manager.
3. In every drive MSwin32.dll.vbs and autorun.inf hidden files will appear.
What do the Hidden Files do?
1. Make us stumble to open the drives directly. That is we cannot open the drives by double clicking. If it will, open only in a new window.
2. Login and Logout will become very slow.
Removal of the Hidden Files.
We can easily remove this type of files……
However, please note that this virus most often appears only inside the folder along with the virus and same name, which creates .exe files. After removing the virus hurry up to Task Manager and put an end for WSCRIPT.EXE, MONIT.EXE and SCVHOST.EXE.
Below is the detailed explanation.
1. Go to Folder Options (Start > Control Panel > Folder Options)
2. Enable Show Hidden Files and Folders.
3. Make Uncheck Hide Extension For Known File Types
4. Make Uncheck Hide Protected Operating System Files.
5. Click OK.
6. Go to every drive and delete the hidden files WSCRIPT.EXE, MONIT.EXE and SCVHOST.EXE completely.
7. At this attempt, please do not insert your USB drives.
8. Finish the entire removal procedure.
Let us look at the Removal in USB Drives, Digicam, Mobiles, iPods.
1. Click START > RUN > Type regedit
2. Click OK.
3. And delete the following keys.
4. Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Run\wscript
5. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Run\monit
6. Then navigate the following key HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
and double click on the Key Window Title.
7. Change that key value to “Microsoft Internet Explorer” (without the quotes
Labels:
speed up
Tuesday, December 21, 2010
Shocking Google search results
Google search is a web search engine owned by Google Inc. and is the most-used search engine on the Web. Google receives several hundred million queries each day through its various services. Google’s search engine normally accepts queries as a simple text, and breaks up the user’s text into a sequence of search terms, which will usually be words that are to occur in the results. The diagram below points out four features that are important to understanding the search results page but sometimes we can see some very shocking results… Have fun!




















Labels:
Google
Cheapest Laptop, NOW COMMING
In attempt to construct a bridge between the poor and rich people, Indian scientists has developed the low cost laptop of the world. India has well reputation for creating cheap and low-priced technology, last year India invented the cheapest car of the world at Rs100,00((£1,450).
The new computer, ‘Sakshat’ that is translated as “before your eyes” is the part of new program “national mission for education”. With the invention of this laptop, students can get access to their coursework, lecture and the help of specialists. Vice chancellor of Andhra Pradesh University said that India was in search of cheap hardware and software.
Cost of the laptop has been kept low so that mostly students can get access to broadband and computers. It designed by the Indian Institute of Technology in Madras, the Vellore Institute of Technology, the Indian Institute of Science in Bangalore, the state-controlled Semiconductor Complex. It is equipped with wireless connecting device and 2 GB Ram. Official of Indian Government are satisfied with its lowest price of Rs500. This computer is also cheaper than the lime-green computer which is known as OX or Children’s Machine made by Massachusetts Institute of Technology in the USA. Managing director of Netcore Solutions is committed with the low priced computer and said “A screen of computer cannot be made in $20”
The new computer, ‘Sakshat’ that is translated as “before your eyes” is the part of new program “national mission for education”. With the invention of this laptop, students can get access to their coursework, lecture and the help of specialists. Vice chancellor of Andhra Pradesh University said that India was in search of cheap hardware and software.
Cost of the laptop has been kept low so that mostly students can get access to broadband and computers. It designed by the Indian Institute of Technology in Madras, the Vellore Institute of Technology, the Indian Institute of Science in Bangalore, the state-controlled Semiconductor Complex. It is equipped with wireless connecting device and 2 GB Ram. Official of Indian Government are satisfied with its lowest price of Rs500. This computer is also cheaper than the lime-green computer which is known as OX or Children’s Machine made by Massachusetts Institute of Technology in the USA. Managing director of Netcore Solutions is committed with the low priced computer and said “A screen of computer cannot be made in $20”
Labels:
Tech News
funny google tricks
We all use google for searching but its time to explore the funny side of google. Here I have collected the funny google tricks that will amaze you. Some of the tricks are provided by google itself while other have been developers
1. Google gravity:- We all have read the Newton’s law of gravity.Does it also apply to google?To test it follow the instructions
2. Change Background Image:-You can also change the background image of google image.To change the background image follow the instructions
3. Epic Google:- In epic google you will see the font size of google increasing automatically as if it will come out of your computer screen.To use google Follow the instructions
If you also know some more cool google tricks then do share with us and our readers by commenting your google tricks
1. Google gravity:- We all have read the Newton’s law of gravity.Does it also apply to google?To test it follow the instructions
- Go to google.com
- Type Google Gravity
- Click on I’m feeling Lucky
2. Change Background Image:-You can also change the background image of google image.To change the background image follow the instructions
- Go to google.com
- Click on the Change Background Image
3. Epic Google:- In epic google you will see the font size of google increasing automatically as if it will come out of your computer screen.To use google Follow the instructions
- Go to google.com
- Type Epic Google
- Click on I’m feeling Lucky
- Go to google.com
- Type Google Hacker
- Click on I’m feeling Lucky
- Go to google.com
- Type Annoying Google
- Click on I’m feeling Lucky
If you also know some more cool google tricks then do share with us and our readers by commenting your google tricks
Labels:
Google
Saturday, December 18, 2010
Microsoft’s Upcoming Operating System – MIDORI
Microsoft is working on a new operating system codenamed as Midori, that will eventually replace Windows as we know it.
WINDOWS is a name that has ruled the whole computer world since its first launch in November 1985. Since then it is like a trademark of Microsoft Corporation. With many advanced versions of Windows available today such as Windows XP, Windows Vista, it is the most used operating system in the world.
But now here is time to experience a yet another technology of operating systems. Yes, MICROSOFT is working on a new generation of operating systems called Cloud-Based Operating System and rumors are there that MIDORI will be their first such operating system, which will replace Windows fully from computer map.
WHAT´S THE DIFFERENCE?
MIDORI is an offshoot of Microsoft Research´s Singularity operating system. In this the tools and libraries are completely managed code. MIDORI is designed to run directly on native hardware (x86, x64 and ARM), will be hosted on the Windows Hyper-V hypervisor, or even be hosted by a Windows process. MIDORI can be also seen as MICROSOFT´S answer those competitors who are applying "Virtualization" as a mean to solving issues within contemporary computing.
The main idea behind MIDORI is to develop a lightweight portable OS which can be mated easily to lots of various applications.
Midori is the code name for Windows 8 and for a managed code operating system being developed by Microsoft Research.
WINDOWS is a name that has ruled the whole computer world since its first launch in November 1985. Since then it is like a trademark of Microsoft Corporation. With many advanced versions of Windows available today such as Windows XP, Windows Vista, it is the most used operating system in the world.
But now here is time to experience a yet another technology of operating systems. Yes, MICROSOFT is working on a new generation of operating systems called Cloud-Based Operating System and rumors are there that MIDORI will be their first such operating system, which will replace Windows fully from computer map.
WHAT´S THE DIFFERENCE?
MIDORI is an offshoot of Microsoft Research´s Singularity operating system. In this the tools and libraries are completely managed code. MIDORI is designed to run directly on native hardware (x86, x64 and ARM), will be hosted on the Windows Hyper-V hypervisor, or even be hosted by a Windows process. MIDORI can be also seen as MICROSOFT´S answer those competitors who are applying "Virtualization" as a mean to solving issues within contemporary computing.
The main idea behind MIDORI is to develop a lightweight portable OS which can be mated easily to lots of various applications.
Midori is the code name for Windows 8 and for a managed code operating system being developed by Microsoft Research.
Friday, December 17, 2010
Multiple Logins in yahoo without Software
hello fiends!!
my exams are going on so i am enable to post regularly.
but today i am posting a small trick of yahoo...
1) Go to Start
2) Navigate to HKEY_CURRENT_USER-->Software-->Yahoo-->Pager-->Test
3)ON the Right side if the page , Right click and choose new Dword Value.
4) Rename it as " Plural ".
5)Double click and assign a decimal value of 1.
6) Now close registry and restar yahoo messenger and try Multiple Login
enjoy friends....
wish me good luck!!!
my exams are going on so i am enable to post regularly.
but today i am posting a small trick of yahoo...
1) Go to Start
2) Navigate to HKEY_CURRENT_USER-->Software-->Yahoo-->Pager-->Test
3)ON the Right side if the page , Right click and choose new Dword Value.
4) Rename it as " Plural ".
5)Double click and assign a decimal value of 1.
6) Now close registry and restar yahoo messenger and try Multiple Login
enjoy friends....
wish me good luck!!!
Monday, December 13, 2010
How To Add Background Wallpaper On Your Pendrive
We all might have set background images for the Local drives in Windows Xp.But you might not have set background picture for your pendrive.It’s a very simple hack so give it a try after reading this post,
All you need to do is, just Copy & Paste the below code to notepad,then save it as “desktop.ini”
[.ShellClassInfo]
IconFile=%SystemRoot%\system32\SHELL32.dll
IconIndex=127
ConfirmFileOp=0
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
Attributes=1
IconArea_Image=”YourPictureName.jpg”
IconArea_Text=”0xFFFFFF”
VeBRA sources – don’t delete the tag above, it’s there for XXXXX purposes -
[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}
{5984FFE0-28D4-11CF-AE66-08002B2E1262}={5984FFE0-28D4-11CF-AE66-08002B2E1262}
[{5984FFE0-28D4-11CF-AE66-08002B2E1262}]
PersistMoniker=Folder.htt
PersistMonikerPreview=%WebDir%\folder.bmp
Some Information On Above Code:
1. Where “YourPictureName.jpg” is, delete that and replace with your picture name for example “Transformers Frenzy.gif”
Note:
Please check that Picture format (.jpg , .bmp, .gif) properly else this hack won’t work.
2. If your Picture is white colour then folder names will not be clear so change the IconArea_Text=”0xFFFFFF” to IconArea_Text=”0x000000”
3. Save the notepad as “desktop.ini”.
4. Place both your notepad file (i.e) desktop.ini and your picture in Pendrive.
5. Set the above files attributes as Hidden.
6. Refresh(F5) and Enjoy with your new background.
7.You can also this on your windows Xp Local drives(C,D,E,F…).
I hope you would like this trick.
All you need to do is, just Copy & Paste the below code to notepad,then save it as “desktop.ini”
[.ShellClassInfo]
IconFile=%SystemRoot%\system32\SHELL32.dll
IconIndex=127
ConfirmFileOp=0
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
Attributes=1
IconArea_Image=”YourPictureName.jpg”
IconArea_Text=”0xFFFFFF”
VeBRA sources – don’t delete the tag above, it’s there for XXXXX purposes -
[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}
{5984FFE0-28D4-11CF-AE66-08002B2E1262}={5984FFE0-28D4-11CF-AE66-08002B2E1262}
[{5984FFE0-28D4-11CF-AE66-08002B2E1262}]
PersistMoniker=Folder.htt
PersistMonikerPreview=%WebDir%\folder.bmp
Some Information On Above Code:
1. Where “YourPictureName.jpg” is, delete that and replace with your picture name for example “Transformers Frenzy.gif”
Note:
Please check that Picture format (.jpg , .bmp, .gif) properly else this hack won’t work.
2. If your Picture is white colour then folder names will not be clear so change the IconArea_Text=”0xFFFFFF” to IconArea_Text=”0x000000”
3. Save the notepad as “desktop.ini”.
4. Place both your notepad file (i.e) desktop.ini and your picture in Pendrive.
5. Set the above files attributes as Hidden.
6. Refresh(F5) and Enjoy with your new background.
7.You can also this on your windows Xp Local drives(C,D,E,F…).
I hope you would like this trick.
Labels:
pendrive,
Windows tricks
Saturday, December 11, 2010
HOW TO HACK TORRENT | ONLY FOR HIGH SPEED
This summary is not available. Please
click here to view the post.
Friday, December 10, 2010
how to change windows xp name with your name
Branding Windows with your name.
this trick is quite simple, use notepad and follow the following steps....
open notepad dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\system32 directory:
[General]
Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here
Save the file, then make a right click on my computer select properties, in the general tab a button will be highlighted (support information) make a click on it, you will be able to see the changes.
Now if you want to display some more information then simply increase the line in the file.
ex:
Line4=Your Working Hours Here
now thats finish.....
enjoy... :)
this trick is quite simple, use notepad and follow the following steps....
open notepad dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\system32 directory:
[General]
Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here
Save the file, then make a right click on my computer select properties, in the general tab a button will be highlighted (support information) make a click on it, you will be able to see the changes.
Now if you want to display some more information then simply increase the line in the file.
ex:
Line4=Your Working Hours Here
now thats finish.....
enjoy... :)
Labels:
notepad,
windows,
Windows tricks
Thursday, December 9, 2010
HOW TO MAKE CLONE OF HARD DISK
Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.
First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.
Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.
Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the "Full" button.
Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says "Autofix Errors".
Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:
Click on the "Start" button, then click on the "Run..." button, then place the following into the Runbox:
"XCOPY C:\*.*D:\ /c/h/e/k/r" (minus the quotes, of course) then press the "Enter" button.
If you receive an error message, then remove the space from between XCOPY and C:\
Anything that should happen to come up in the DOS box, just click "Y" for "Yes". When its all finished, pull the original Master from the system, designate the Slave as the Master (change your jumpers), then check your new Master out.
now all is done.... :)
First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.
Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.
Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the "Full" button.
Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says "Autofix Errors".
Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:
Click on the "Start" button, then click on the "Run..." button, then place the following into the Runbox:
"XCOPY C:\*.*D:\ /c/h/e/k/r" (minus the quotes, of course) then press the "Enter" button.
If you receive an error message, then remove the space from between XCOPY and C:\
Anything that should happen to come up in the DOS box, just click "Y" for "Yes". When its all finished, pull the original Master from the system, designate the Slave as the Master (change your jumpers), then check your new Master out.
now all is done.... :)
Wednesday, December 8, 2010
why use Blekko | a new search engine
In a world of Google and Bing, smaller players find it very difficult to create a space for themselves in the search engine market. The only way these smaller ones survive is by attracting a niche audience and offering something unique. Blekko might look like just another search engine, but what’s under its hood will leave you impressed.
here is two main reason

Search: Inbound Marketing/Rank
50 websites show up in the search engine results page. It seems as though Blekko ranks the 50 webpages based on Domain, Anchor, Title and URL. Blekko breaks up “inbound marketing” into 3 keyword phrases and provides a detailed analysis:
here is two main reason
1. Vertical Search with Blekko
Blekko’s game-changing search engine allows searchers to “slash the web” or easily customize a search query to find what you are looking for and reduce clutter. When researching any topic, you can add a slashtag to drill down and get particular view points in the search results. For Example, if you query Blekko for “HealthCare,” you can then add a slashtag for “liberal” and get only liberal points of view. See healthcare/liberal and below:Blekko Search | Healthcare /Liberal
2. Algorithm Transparency with Blekko
While Google’s search engine algorithm is commonly referred to as a “blackbox,” Blekko lets search engine fanatics see directly into their search engine algortihm. One slashtag that Blekko has created to view the inner workings of how they rank websites on search engine results pages is “/rank.” Let’s take a look at the data Blekko provides for a search query containing /Rank:Search: Inbound Marketing/Rank
50 websites show up in the search engine results page. It seems as though Blekko ranks the 50 webpages based on Domain, Anchor, Title and URL. Blekko breaks up “inbound marketing” into 3 keyword phrases and provides a detailed analysis:
Labels:
blekko,
search engine
Monday, December 6, 2010
5G technology is comming | ARE YOU READY!!!!
5G Technology stands for 5th Generation Mobile technology. 5G mobile technology has changed the means to use cell phones within very high bandwidth. User never experienced ever before such a high value technology. Nowadays mobile users have much awareness of the cell phone (mobile) technology. The 5G technologies include all type of advanced features which makes 5G mobile technology most powerful and in huge demand in near future.
With the day by day advancement in technologies, mobile phones are also getting more enhanced. In every 8 to 10 years we see new technologies in the mobile market first came the 1G, after few years 2G came to surface, then 3G, nowadays the very popular and many say super fast technology 4G and now there will come 5G Fifth Generation technology. This latest and more enhanced technology will provide a unique experience to its users.
The gigantic array of innovative technology being built into new cell phones is stunning. 5G technology which is on hand held phone offering more power and features than at least 1000 lunar modules. A user can also hook their 5G technology cell phone with their Laptop to get broadband internet access. 5G technology including camera, MP3 recording, video player, large phone memory, dialing speed, audio player and much more you never imagine. For children rocking fun Bluetooth technology and Piconets has become in market. What 5G Technology offers5G technology going to be a new mobile revolution in mobile market. Through 5G technology now you can use worldwide cellular phones and this technology also strike the china mobile market and a user being proficient to get access to Germany phone as a local phone. With the coming out of cell phone alike to PDA now your whole office in your finger tips or in your phone. 5G technology has extraordinary data capabilities and has ability to tie together unrestricted call volumes and infinite data broadcast within latest mobile operating system. 5G technology has a bright future because it can handle best technologies and offer priceless handset to their customers. May be in coming days 5G technology takes over the world market. 5G Technologies have an extraordinary capability to support Software and Consultancy. | |
how to change IP address
This article will help you to change your IP address within a minute. Just follow the following steps...
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
NOTE:
This only changes your dynamic IP address, not your ISP/IP address.
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
NOTE:
This only changes your dynamic IP address, not your ISP/IP address.
Labels:
internet,
ip address
Sunday, December 5, 2010
HOW TO MAKE CALCULATOR IN HTML
HOW TO MAKE CALCULATOR USING HTML
hello friends!!
you cane easily make a calculator in html, it is so simlpe just copy and paste the code in notepad and same it as calculator.html
click below to download code....
https://docs.google.com/document/d/1mUhZ7r5p7NKsZzFmTL3Ux35z_iFAuYq3w5101rliGRA/edit?hl=en#
hello friends!!
you cane easily make a calculator in html, it is so simlpe just copy and paste the code in notepad and same it as calculator.html
click below to download code....
https://docs.google.com/document/d/1mUhZ7r5p7NKsZzFmTL3Ux35z_iFAuYq3w5101rliGRA/edit?hl=en#
Labels:
notepad
Saturday, December 4, 2010
Windows 8 to be 128-bit compatible
As we’ve known for some time, Microsoft had already begun work on Windows 8 before Windows 7 was completed. The reason being that different teams work on different aspects of the operating system, which is why Microsoft was able to do this. Microsoft previously shed some light on what we can see in Windows 8 through a job description.
It appears though, that one specific Microsoft employee was not too careful with their LinkedIn profile, and had accidentally leaked some interesting details regarding Windows 8.
Windows 8 News managed to catch this on the Microsoft employee’s LinkedIn profile before it disappeared:
It appears though, that one specific Microsoft employee was not too careful with their LinkedIn profile, and had accidentally leaked some interesting details regarding Windows 8.
Windows 8 News managed to catch this on the Microsoft employee’s LinkedIn profile before it disappeared:
“Robert Morgan is working to get IA-128 working backwards with full binary compatibility on the existing IA-64 instructions in the hardware simulation to work for Windows 8 and definitely Windows 9.”Murdon seems certain that we will see 128-bit compatibility with Windows 9, while it appears that whether we will see it in Windows 8 or not is still uncertain. Coincidentally, many do believe that Windows 7 will be Microsoft’s last 32-bit OS. So could this mean we will see Windows 8 come in 64-bit and 128-bit flavors? Let us know what you think in the comments.
“Robert Morgan is using Hestia (custom software package) for experimenting with the processor for scientific analysis and 3D graphics. Error: Memory Latency? Always gotta be a challenge barrier, it’s gotta be a bug in Hestia. right?!”
“Robert Morgan is frustrated with process standards and regulations! Delays Delays!”
Labels:
windows8
How to Get the Product Key in 64-Bit version of Windows 7
We all know that the operating system has undergone a lot of changes and each changes needs adaption.
Unfortunately, many users wipe out the OS itself after buying a new Vista machine, replaces it with Windows XP and they forget to check if there’s a backup CD or copy of the product key.
Prevention is Better than Cure
Using the new version of WinGuggle, you can create a backup if you don’t have the original installation disc of your 64-bit version of Windows.
Just run the program and copy the product key for safe keeping.
Windows 7 64-Bit Enterprise Edition
Your antivirus program will not give any alarm and also works with 64-Bit version of Vista, Microsoft Office XP, 2003 and 2007!
Hope this helps!
click here for download WinGuggle
Labels:
Windows tricks
Friday, December 3, 2010
how to make windows xp genuine
Making your copy of windows genuine..works perfect making your copy of windows genuine many of you might have tried windows update and found out that your copy of windows is not genuine…here’s how to make your copy of windows genuine…download jellybean keyfinder from here:
http://www.magicaljellybean.com/beta/ *******************************************************
V2C47-MK7JD-3R89F-D2KXW-VPK3J
*******************************************************
Labels:
windows
Wednesday, December 1, 2010
what is 4G technology
Labels:
Tech News
what is silverlight
many of my college friends does not know any thing about microsoft silverlight
whenever i talk about it they ask me what is this??? Is this a movie???
so today i am posting about silverlight
Microsoft Silverlight is an application framework for writing and running rich Internet applications with emphasis on multimedia, animations, and graphics, with features and purposes similar to those of Adobe Flash. The run-time environment for Silverlight is available as a plug-in for most web browsers. While early versions of Silverlight focused on streaming media, current versions support multimedia, graphics and animation, and give developers support for CLI languages and development tools.
Silverlight is a new cross-browser, cross-platform implementation of the .NET Framework for building and delivering the next generation of media experiences and Rich Interactive Applications(RIA) for the web. It runs in all popular browsers, including Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera. The plugin required to run Silverlight is very small in size hence gets installed very quickly.
The current version 4 was released in April 2010. It is compatible with multiple web browsers used on Microsoft Windows and Mac OS X operating systems. Mobile devices, starting with Windows Phone 7 and Symbian (Series 60) phones, are likely to become supported in 2010. A free software implementation named Moonlight, developed by Novell in cooperation with Microsoft, is available to bring most Silverlight functionality to Linux, FreeBSD and other open source platforms.
Silverlight aims to compete with Adobe Flash and the presentation components of Ajax. It also competes with Sun Microsystems' JavaFX, which was launched a few days after Silverlight.
whenever i talk about it they ask me what is this??? Is this a movie???
so today i am posting about silverlight
Microsoft Silverlight is an application framework for writing and running rich Internet applications with emphasis on multimedia, animations, and graphics, with features and purposes similar to those of Adobe Flash. The run-time environment for Silverlight is available as a plug-in for most web browsers. While early versions of Silverlight focused on streaming media, current versions support multimedia, graphics and animation, and give developers support for CLI languages and development tools.
Silverlight is a new cross-browser, cross-platform implementation of the .NET Framework for building and delivering the next generation of media experiences and Rich Interactive Applications(RIA) for the web. It runs in all popular browsers, including Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera. The plugin required to run Silverlight is very small in size hence gets installed very quickly.
The current version 4 was released in April 2010. It is compatible with multiple web browsers used on Microsoft Windows and Mac OS X operating systems. Mobile devices, starting with Windows Phone 7 and Symbian (Series 60) phones, are likely to become supported in 2010. A free software implementation named Moonlight, developed by Novell in cooperation with Microsoft, is available to bring most Silverlight functionality to Linux, FreeBSD and other open source platforms.
Silverlight aims to compete with Adobe Flash and the presentation components of Ajax. It also competes with Sun Microsystems' JavaFX, which was launched a few days after Silverlight.
Tuesday, November 30, 2010
how to open blocked facebook
hello friends!!
proxies are updated again so enjoy all blocked sites without any interrupt....
click given link for proxies
http://hackers001.blogspot.com/p/open-blocked-sites.html
proxies are updated again so enjoy all blocked sites without any interrupt....
click given link for proxies
http://hackers001.blogspot.com/p/open-blocked-sites.html
Monday, November 29, 2010
Facebook Farmville Cheats and Codes
-
Farmville cheats are sometimes available for coins, items and experience as you play the game. However, there are no actual Farmville cheat codes--only occasional glitches that allow players to benefit, and are considered cheats. Find cheats for Farmville throughout the page below, as well as strategies for leveling up quickly and earning lots of money. Listed here are the speed cheats, along with the fastest growing crops.
FarmVille is a social game developed by Zynga, and available on social networks and iPhones. Launched in June 2009, it became one of the most popular applications on Facebook, garnering 10 million users in less than a month. This is one of the most popular games on the largest social networking system in the world.
In this MMORPG game, you can buy the farm in a good way. You learn how to plow, plant, reap your harvest, and help your friendly neighbors on this game. This game is for people of all ages, and is easy to learn. Yes, players will find some cheat codes, along with strategy tips and hints for everyone to use.There are links to other Farmville cheats are included in this page. -
Cheat Software
Some automated software, or "bots," are available that can speed up the playing process by automatically tending to your crops or performing other game functions. These can be accessed over the Internet and downloaded to your computer. While some of them may be effective, there is always a risk of downloading a virus or spyware. In addition, word on the street is that Zynga looks out for these, and may ban your account if you are caught using one.http://farmvillecheats.co.cc/ -
Facebook Farmville Cheat Codes for Speed
Clear a section in your field of plots, you need to create a nice section of land. Clear nine spots in a formation. Now ‘walk’ your person in the middle of this section.
Go to the market, purchase the cheapest fences, and set the fences around the person. After you have set four fences down you will need to turn two of them. You can click on the fence when it is placed and turn it sideways. This effectively blocks in the person and now you can plow and plant much quicker.
This fence trick is super handy if you have a large amount of area to plow or plant. If you use other items to block in your person, he or she will walk around the perimeter and proceed to plant or plow.
FarmVille Cheats- The Gift that keeps on Giving
Try this though it may not work on every browser. Create an additional account (not your main one) which we call the giver. Using the giver account, right click on the "Gift" tab and then click on Open In New Browser. Open as many of this as you want. The, go to each open tab which essentially has the same screen and select the gifts you want. Please make sure you do that for each tab without confirming the selection. Then, go to each tab again and select your main account as the account to receive the gift. Again, the key is not to confirm anything. Once you are done, you can then click confirm and your main account should receive these gifts. Since gifts=money at some point, you would have created a way to earn unlimited amount of money though it is probably not as fast as doing it the honest way of planting and harvesting crops.
FarmVille cheats in getting coins
This is not really a cheat but The trick is really knowing which tree and animals give you the best bang for the buck. It is usually good to just sell the tree once they have gone through one harvest. This is because the initial gifts does not cost any coin, but then it later takes up too much space and so selling them immediately allows you to make some coins on 0 cost and then save the time since it takes some time for the next harvest. Also, you get the most coins when you plant versus rearing animals. Just like stock investing, you really want to diversity as the plants takes different amount of time to grow and harvest. By planting several crops, it allows you to have almost a constant supply of fresh crops ready for harvest so you are not just waiting around for crops to grow.
You should also know that crops just grow whether you are in front of the computer or not. So, do know the timing of each crop as you need to be able to harvest them within hours or they will start rotting and you do not want to waste time clearing rotting crops.
Strawberries are the cheapest and grows in about 4 hours. So, you may want to start your morning sowing some strawberry seeds and then log in 4 hours later to harvest it. This is the crop you get started with when you start playing FarmVille, but it is not necessarily the best crop to plant since they can spoil very quickly which means you would have wasted all your money trying to plant the crop.
FarmVille cheats in a farm on auto pilot mode
If you do not have much time to work on a farm, yet want a stable cash flow, you may want to make decisions on the kind of tree you want to plant. Fruit trees last longer and allows you to sell the fruits for money. The problem is that they take up space, are expensive to buy and the fruits does not sell for a lot of money. In other words, your return on investment is not the best here. However, if you do not have time anyway, this may be the best for you. Otherwise, you can also invest in animals where you can get milk from the cows, eggs from the duck, etc and make some small cash flow with it. Unlike crops which is time critical, food from the animals never really spoil and so you are not tied to returning to your computer to try to manage it.
So, most of the Farmville cheats you find online are really not cheats, but just smarters ways to make more money and level up in experience points. Using the Cheat Engine is probably your best bet to quickly change a number in memory. Otherwise,there are also Farmville guide books on that you can buy if you want to learn the strategies and techniques.
Labels:
facebook
Saturday, November 27, 2010
6 Myths about Internet Safety
“Internet Safety” the term has been getting vague with the increasing virus outbreaks nowdays. PC Magazine once conducted a survey in which they asked the participants to rate their broadband ISP services and the results were astonishing. Most of users didn’t completely understand the seriousness of potential threats or how to protect their PCs. Here are the top 6 Myths about safe surfing over internet.
Antivirus software is a commonly known requirement for Internet security. However, the myth that antivirus installed is all that is needed for protection is dangerous for Internet surfers. Installing antivirus software is the start of Internet security. Constant installation of the latest virus definition files is required. Most reputable antivirus software has monthly updates for definition files. Download them to ensure the computer can recognize newest threats.
The best protection against Internet malware is avoiding websites that are suspicious. Choose a web browser like Google Chrome or Mozilla Firefox to ensure the latest websites listed as attack sites are blocked when finding them in the search results. Don’t have a false sense of security and ensure the latest definition files are applied.
Myth 1 – Nothing Valuable is on the Computer, so I don’t have to worry about security. Your PC can be infected over internet
Long time ago,this was partially true… but the hybrid worms and viruses of today like Blaster, hidrag and others blindly spread across internet to thousands or millions of PCs in a matter of hours, without regard for who owns them, what is stored there, or the value of the information they hold for the sole purpose of wreaking havoc. Even if your computer is not attacked directly, it can be used as a zombie to launch a denial-of-service or other attack on a network or to send spam or pornography to other PCs without being traced. Therefore, your civic responsibility is to protect your PC so that others are protected.Myth 2 – I can protect my PC if I disconnect from the Internet or turn it off when I’m not using it.
Wrong. You are a target, If you connect to the Internet at all. You could download a virus when you connect to internet and it may not be activated immediately, not until you read your email offline days after. Viruses nowadays spread wildly through USB/Pen drives, pirated cd’s or torrents or file from networks. But now you can protect your business from internet threats with the top web security softwareMyth 3 – I can protect myself from viruses by not opening suspicious e-mail attachments. Some viruses simply get activated by reading or previewing an e-mail
Wrong again. The next virus you get may come from your best friend’s or boss’ computer if his e-mail address book was compromised for simulating an attack. Hybrid worms can enter through the Web browser through loopholes and it is possible to activate some viruses simply by reading or previewing an e-mail. You simply must have a PC-based antivirus package or a firewall.Myth 4 – I have a Macintosh (or a Linux-based system), not a Windows system, so I don’t have to worry about being attacked.
It is true that most attacks target Microsoft Windows–based PCs, but there have been attacks against Mac OS and Linux systems as well. Some experts have predicted that the Mac virus problem will get worse, because Mac OS X uses a version of Unix. And although these systems have some useful security features, they can still be attacked.Myth 5 – My system came with an Anti-virus package, so I’m protected.
Installing Antivirus Software is Sufficient
Not quite. Firstly, if you haven’t activated your antivirus to scan incoming web traffic automatically, you don’t have a good Anti-virus and malware protection software. Secondly, new threats appear daily, so an antivirus package is only as good as its last update so its a must to activate the auto-update features to keep your guard up against the latest threats. Thirdly, an antivirus package can’t protect you from every threat. Malwares, spywares are running in the wild out there and every now and then malicious code penetrate weak systems. You need a combination of solutions, including, at minimum, antivirus, a personal firewall ,an anti spyware/malware package and a plan for keeping your operating system and software up to date with security patchesAntivirus software is a commonly known requirement for Internet security. However, the myth that antivirus installed is all that is needed for protection is dangerous for Internet surfers. Installing antivirus software is the start of Internet security. Constant installation of the latest virus definition files is required. Most reputable antivirus software has monthly updates for definition files. Download them to ensure the computer can recognize newest threats.
Myth 6-Hackers Only Target Specific People
The Department of Homeland Security disputes this train of thought. This is a common thought for home users. Several scripts are available that allow others to find security holes on a computer. These people are called “script kiddies.” Script kiddies run common programs that find the security issues on machines that don’t have the latest security patches. For the best protection, purchase an antivirus program that protects against all types of hack attacks.The best protection against Internet malware is avoiding websites that are suspicious. Choose a web browser like Google Chrome or Mozilla Firefox to ensure the latest websites listed as attack sites are blocked when finding them in the search results. Don’t have a false sense of security and ensure the latest definition files are applied.
Labels:
internet
Make Portable Version Of any Software
Make Portable Version Of any Software Using Cameyo
Now a days almost everybody carries a pendrive whether he is a IT professional or a home User.There are a lot of softwares that you want to carry with you so that you can open them anywhere without any installations.Here isthe solution to create a portable version of any software.Moreover you can also create a package of software.
Friends i love using firefox browser and addicted to its user interface. Now i can create the portable version of firefox.You can create a portable package of your choice of softwares.
Here is the complete step by step video tutorial to Make Portable Version Of any Software Using Cameyo
1. Download the Cameyo software.Its completely free.
2.Install the software.
3.Now Click on Start->Cameyo->Caputre Software Installation
4.Intstall the software into your system whose portable version you want to create.
5.After Complete installation of the software click on the Install Done of the cameyo screen.
6.Now it will create a portable version of your installed software which you can carry and run anywhere without any installation.
Labels:
internet
Friday, November 26, 2010
what is SQL Injection
When a machine has only port 80 opened, your most trusted vulnerability scanner cannot return anything useful, and you know that the admin always patch his server, we have to turn to web hacking. SQL injection is one of type of web hacking that require nothing but port 80 and it might just work even if the admin is patch-happy. It attacks on the web application (like ASP, JSP, PHP, CGI, etc) itself rather than on the web server or services running in the OS.
This article does not introduce anything new, SQL injection has been widely written and used in the wild. We wrote the article because we would like to document some of our pen-test using SQL injection and hope that it may be of some use to others. You may find a trick or two but please check out the "9.0 Where can I get more info?" for people who truly deserve credit for developing many techniques in SQL injection.
What is SQL Injection?
It is a trick to inject SQL query/command as an input possibly via web pages. Many web pages take parameters from web user, and make SQL query to the database. Take for instance when a user login, web page that user name and password and make SQL query to the database to check if a user has valid name and password. With SQL Injection, it is possible for us to send crafted user name and/or password field that will change the SQL query and thus grant us something else.
This article does not introduce anything new, SQL injection has been widely written and used in the wild. We wrote the article because we would like to document some of our pen-test using SQL injection and hope that it may be of some use to others. You may find a trick or two but please check out the "9.0 Where can I get more info?" for people who truly deserve credit for developing many techniques in SQL injection.
What is SQL Injection?
It is a trick to inject SQL query/command as an input possibly via web pages. Many web pages take parameters from web user, and make SQL query to the database. Take for instance when a user login, web page that user name and password and make SQL query to the database to check if a user has valid name and password. With SQL Injection, it is possible for us to send crafted user name and/or password field that will change the SQL query and thus grant us something else.
Labels:
Tips
Thursday, November 25, 2010
Problem Step Recorder-Windows 7 Screen Capture Tool
Well!You might not heard of this great tool provided by microsoft in windows 7.Problem Step Recorder (PSR) is a small tool which can be of extreme help if have to send some screenshots to some technician or friend of your for asking help about a program crash or anything like that.What this Tool does Is as follows
- Automatically takes a screenshot on mouse click.
- Automatically takes screenshot on any key press.
- You can also add comments according to your requirements.
- Saves all Screenshots in a zip file that can be easily sent via email.
How do I use Problem Steps Recorder?
You can use Problem Steps Recorder to automatically capture the steps you take on a computer, including a text description of where you clicked and a picture of the screen during each click (called a screen shot). Once you capture these steps, you can save them to a file that can be used by a support professional or someone else helping you with a computer problem.
Notes
When you record steps on your computer, anything you type will not be recorded. If what you type is an important part of recreating the problem you're trying to solve, use the comment feature described below to highlight where the problem is occurring.
Some programs, like a full-screen game, might not be captured accurately or might not provide useful details to a support professional.
Here is a step by step guide of how to use Problem Step Recoder In windows 7 with screenshots
1.To start Problem Step Recorder click on the window button and enter psr or psr.exe and press enter key
2.After you press enter you will see application as shown below with the options to Start the recording enabled and the rest of the options disabled.
3.Now click on the Start Record button and it will start recording your mouse clicks and key press i.e every time mouse is clicked it will take the screenshot of the current window.
4.Now this is the time you start the application which is crashing and it will record the whole step by step execution.So your technician or friend will be able to see how the application crashed or what you might have done wrong while launching the application.
5.After completing the above mentioned steps click on the stop record button.You can also add comments wherever you feel by clicking on the add comments button.
6.When click on stop record you will be asked to save the file.give it a name and save it .this file be in zipped format.
princy gupta
mmec 3rd yr
Wednesday, November 24, 2010
Defragment your hard drives and speed up your Windows
If your Windows XP or Vista is getting slow, a wise thing to do is to defragment your hard drives!defragment
There are many programs but one of the best is Auslogics Disk Defragmenter. Just download the defragmenter, install it and run defragment. It should take approximately 1 hour and it says how much faster your computer went (for example 30%).
When the program has completed defragmenting you should immediately feel the difference (if the percent was over 30). Your computer should now be much faster than it used to be. Programs start up in a glance!
Yes, I know Windows XP also has a built-in defragmenting tool, but it sucks.
Windows XP or Vista is getting slow
There are many programs but one of the best is Auslogics Disk Defragmenter. Just download the defragmenter, install it and run defragment. It should take approximately 1 hour and it says how much faster your computer went (for example 30%).
When the program has completed defragmenting you should immediately feel the difference (if the percent was over 30). Your computer should now be much faster than it used to be. Programs start up in a glance!
Yes, I know Windows XP also has a built-in defragmenting tool, but it sucks.
Windows XP or Vista is getting slow
Labels:
windows,
Windows tricks
Monday, November 22, 2010
The New Search War: Google vs Facebook
It’s no coincidence that Facebook launched a new real-time search engine on the same day that it bought FriendFeed and Google announced a new infrastructure project aimed at speeding up its indexing time. Make no mistake about it: people that know search believe that there’s gold in real-time and social data, and Facebook’s blockbuster acquisition of FriendFeed was a lob squarely across Google’s bow.
Facebook has always been in a position to take a lead in real-time and social search because of the sheer amount of data the site has collected about what people are doing, the things they’re interested in, and what their social graph looks like.
Here’s the bullet point list of what Facebook got by purchasing FriendFeed:

Facebook has one major asset: users, lots of them. 250 million registered users, to be exact, 30 million of whom update their status at least once per day. What they don’t have is users who are used to sharing their status updates with the world, but they’re trying to change that.
Google still gets more than twice as many visitors as Facebook, but how might that change if Facebook and the new engineering additions from team FriendFeed figure out how to slice and dice that user data in real-time? No one has yet really cracked the real-time or social search egg, but if Facebook can do it, its approximately hundreds of millions of monthly visitors could become hundreds of millions of monthly searchers – and that’s very monetizable and very dangerous to Google’s core business.
And what of Microsoft? Let’s not forget that Microsoft’s Bing powers web search results on Facebook, already. What if the two companies mash it all together and Facebook’s real-time, social web search results find their way out onto Yahoo! (which will soon serve Bing search results)? That’s a very plausible eventuality, and another that’s very dangerous to Google.

What should really worry Google, though, is Facebook’s track record. Facebook has a knack for taking the technologies geeks love and adapting them for mainstream audiences. They did it with the news feed (FriendFeed), photo tagging (Flickr), link sharing (Delicious), and even status updates, which Facebook had before Twitter, but only pushed to the forefront once Twitter got hot with early adopters.
Sometimes a vocal minority fights against these features when they are first introduced, but Facebook has proven that it has a knack for knowing when to tweak and change features and when to stand their ground to find that sweet spot for features that users eventually come to love and rely upon.
Given their past track record, it seems likely that Facebook will be able to get most of its tens of millions of active users to embrace whichever of FriendFeed’s features it co-opts and if they can then succeed in convincing those users to use its combination real-time/Bing-powered web search – look out Google, you have a new and very worthy competitor.
Facebook has always been in a position to take a lead in real-time and social search because of the sheer amount of data the site has collected about what people are doing, the things they’re interested in, and what their social graph looks like.
What Facebook Got
Here’s the bullet point list of what Facebook got by purchasing FriendFeed:
- A collection of very smart, ex-Google engineers that really know real-time searchSome might think FriendFeed was a second choice acquisition for Facebook, since the company couldn’t land Twitter last year. But FriendFeed was probably the smarter choice. At just under $50 million it cost less than 1/10th as much as Twitter would have, and comes with arguably a better platform and a team that’s just as strong. Yes, Twitter has more than 20 times as many users, but the acquisition of FriendFeed was clearly about technology and engineering talent – one thing Facebook is not lacking, after all, is users.
- A social status platform that is arguably better than Twitter’s
- A powerful, ready-made real-time search product
- A small, but influential user base full of early adopters willing to try and evangelize new products
Why Google Should Worry
Facebook has one major asset: users, lots of them. 250 million registered users, to be exact, 30 million of whom update their status at least once per day. What they don’t have is users who are used to sharing their status updates with the world, but they’re trying to change that.
Google still gets more than twice as many visitors as Facebook, but how might that change if Facebook and the new engineering additions from team FriendFeed figure out how to slice and dice that user data in real-time? No one has yet really cracked the real-time or social search egg, but if Facebook can do it, its approximately hundreds of millions of monthly visitors could become hundreds of millions of monthly searchers – and that’s very monetizable and very dangerous to Google’s core business.
And what of Microsoft? Let’s not forget that Microsoft’s Bing powers web search results on Facebook, already. What if the two companies mash it all together and Facebook’s real-time, social web search results find their way out onto Yahoo! (which will soon serve Bing search results)? That’s a very plausible eventuality, and another that’s very dangerous to Google.
Facebook’s Track Record
What should really worry Google, though, is Facebook’s track record. Facebook has a knack for taking the technologies geeks love and adapting them for mainstream audiences. They did it with the news feed (FriendFeed), photo tagging (Flickr), link sharing (Delicious), and even status updates, which Facebook had before Twitter, but only pushed to the forefront once Twitter got hot with early adopters.
Sometimes a vocal minority fights against these features when they are first introduced, but Facebook has proven that it has a knack for knowing when to tweak and change features and when to stand their ground to find that sweet spot for features that users eventually come to love and rely upon.
Given their past track record, it seems likely that Facebook will be able to get most of its tens of millions of active users to embrace whichever of FriendFeed’s features it co-opts and if they can then succeed in convincing those users to use its combination real-time/Bing-powered web search – look out Google, you have a new and very worthy competitor.
how to make a pen drive read only
good evening...
from past 2 days i am trying to make pendrive write protected.
because in my college, there are many viruses in every pc. whenever i use my pendrive in college then it give me huge amount of virus. so finally i got trick....
Its an easy registry change:
1. Go to Start -> Run -> Type regedit and hit Enter or click on the OK button.
Browse to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control 2. Create a new key called StorageDevicePolicies
Right click on the Control, select New -> Key and type in StorageDevicePolicies
3. Create a DWORD called WriteProtect under StorageDevicePolicies that you created in step 2 and set the value to 1.
This will prevent users from writing to USB drives.

To allow writing to USB drives just change the value to 0. Oh, you don’t need to restart your computer in order to disable write access to removable storage using the method above.
princy gupta
mmec
from past 2 days i am trying to make pendrive write protected.
because in my college, there are many viruses in every pc. whenever i use my pendrive in college then it give me huge amount of virus. so finally i got trick....
Its an easy registry change:
1. Go to Start -> Run -> Type regedit and hit Enter or click on the OK button.
Browse to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control 2. Create a new key called StorageDevicePolicies
Right click on the Control, select New -> Key and type in StorageDevicePolicies
3. Create a DWORD called WriteProtect under StorageDevicePolicies that you created in step 2 and set the value to 1.
This will prevent users from writing to USB drives.
To allow writing to USB drives just change the value to 0. Oh, you don’t need to restart your computer in order to disable write access to removable storage using the method above.
princy gupta
mmec
Labels:
Windows tricks
Subscribe to:
Posts (Atom)