Wednesday, September 24, 2008

The Google Android phone is here!

T-Mobile and Google announced the first-ever handset with Google's new Android operating system.

Called the T-Mobile G1, it has both full touch-screen functionality, a QWERTY keyboard, a trackball for one-handed navigation, plus access to mobile Web applications like Google Maps Street View, Gmail, YouTube, and more.

The G1 is available for pre-order now in the US in limited quantities fot T-Mobile registered users.

It will be available in retail stores from October 22, for $179 with a two-year voice and data agreement.

It will be available in the UK beginning November and across Europe in early 2009.


will keep u updated on this..... 

for more : Google

Tuesday, September 16, 2008

The flip side of Chrome!

The federal office for information security warned internet users of the new browser Chrome. The application by the company Google should not be used for surfing the internet, as a spokesperson for the office told the Berliner Zeitung. It was said to be problematic that chrome was distributed as an unfinished advance version. Furthermore it was said to be risky that user data is hoarded with a single vendor. With its search engine, email program and the new browser, Google now covers all important areas on the internet.

Previously, the Electronic Frontier Foundation also expressed their concern with Chrome over an address bar feature that sends information back to Google as you type, in order to provide suggestions. Google recently activated an auto-suggest feature for their Google.com homepage as well, sending back character strokes to Google even before you hit return (and when you turn off that feature, it will come back next time your cookies are cleared). Features like these may be important to Google – perhaps of special importance to them in Chrome to offer a feature that sets their browser apart – but it adds a new privacy discussion to the list.
also



11.1 You retain copyright and any other rights that you already hold in Content that you submit, post or display on or through the Services. By submitting, posting or displaying the content, you give Google a perpetual, irrevocable, worldwide, royalty-free and non-exclusive license to reproduce, adapt, modify, translate, publish, publicly perform, publicly display and distribute any Content that you submit, post or display on or through the Services. This license is for the sole purpose of enabling Google to display, distribute and promote the Services and may be revoked for certain Services as defined in the Additional Terms of those Services.
11.2 You agree that this license includes a right for Google to make such Content available to other companies, organizations or individuals with whom Google has relationships for the provision of syndicated services and to use such Content in connection with the provision of those services.
11.3 You understand that Google, in performing the required technical steps to provide the Services to our users, may (a) transmit or distribute your Content over various public networks and in various media; and (b) make such changes to your Content as are necessary to conform and adapt that Content to the technical requirements of connecting networks, devices, services or media. You agree that this license shall permit Google to take these actions.

So just be careful with the usage..!

Sunday, September 14, 2008

Wednesday, September 3, 2008

Google Chrome--3..Browser wars!

Its official now; and the war cry has come from none other than Google chief Eric Schmidt ..
check out this article---http://economictimes.indiatimes.com/Google_admits_to_defensive_component_of_Chrome/rssarticleshow/3442692.cms
and another person who has to be seriously concerned with the launch Mozilla chief John Lilly blogged his thoughts on the new browser..
http://john.jubjubs.net/2008/09/01/thoughts-on-chrome-more/

Google Chrome is sexy!--2

A new feature which is the tabbed pages.., 
it'll show u the most visted and recent pages as small icons.. it'll help u track the most visited pages easily. a new way of looking at the history!
The pop_up pages are blocked and it is indicated at the bottom rather than at the top(in firefox3) which makes browsing a lot neat.

Another very useful feature is that the browser is preloaded with flash player and other common utilities which has to be downloaded and installed in other browsers... kudos boy chrome is proving to be a very good one.

Tuesday, September 2, 2008

Google Chrome is sexy!

Surfing the internet to day is like unprotected sex with strangers; chrome is the condom of the cloud!!

The first thing u'll notice about Chrome browser is the neat but very efficient design for which Google has always been always known for! I just downloaded it and with approximately 7 minutes of experience, it would be safe for me to claim that I got attracted to G_Chrome, only days to can tell whether i fall in love with this or it'll be the other way round! firefox3 has been my fist love.., as IE was a relationship for convience(from 2001-04)!!

Some of the features that were interesting
1)Application shortcut-can save a lot a time!

2)Incognito window- it actually stops recording all your browsing details when u access the websites from this window.

3)Web-security features-
and last but not the least, the ultra clean outlook, will take some time to sink in my mind as i'm accustomed to the feature rich crowded upper part of the browser with all the the tool bars and the bookmarks scattered hapasardly!!

will update this later..,for now G_Chrome is very promising..!

open orkut even if its banned

well firstly u can use powerscrap.com.. but the problem is, even this is banned in many places!!

so the second option is Kproxy.com

Kproxy is one of the best webproxy on net,a very very efficient Proxy….
i've used it many times and found that it shows different locations each time you try to track usin the IP-trackers..!
and the best thing is it can be used to login without actually showing up ur location(IP addr), i'm not sure about the packet level security as this is a free service. so its safe if you're using it for normal purposes, like accessing orkut account if its banned in ur place

Type www.kproxy.com

In the dialog box that opens in kproxy,type

www.orkut.com….Orkut window opens….Log IN
But Intelligent Administrators can block Kproxy too…. Then use this trick

Find the Ip address of Kproxy…

Given here

http://62.193.235.46/

This will open Kproxy window…. Now proceed as usual

Run 2 Gtalk accounts simultaneously!


Ever thought of working with 2 or more than 2 Simultaneous logins in gtalk? Want to run Google Talk with multiple Gmail identities? If you have several Google Gmail accounts you also may want to run multiple instances of Google Talk. This is especially important for Hostellers with one PC and more than one boarder in a single room. Nothing worse than a family member/friend signing you out so they can sign in under their own account!


Step 1: Right-click on the desktop
Step 2: Select New
Step 3: Select Shortcut
Step 4: Paste this into the text box:
"c:\program files\google\google talk\googletalk.exe" /nomutex
Step 5: Click Next and choose a shortcut name such as Google Talk1, Google Talk2, or something related to your Gmail account for easy remembering which account is which.
Step 6: Click OK a few times.

Congrats pal, You are DONE.

Sunday, August 17, 2008

Keyboard shortcuts for starters

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:
Windows key + R = Run menu
This is usually followed by:cmd = Command Prompt
iexplore + "web address" = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Serviceseventvwr = Event Viewerdsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explorer
ALT + Tab = Switch between windows
ALT, Space, X = Maximize window
CTRL + Shift + Esc = Task Manager
Windows key + Break = System properties
Windows key + F = SearchWindows key + D = Hide/Display all windows
CTRL + C = copy
CTRL + X = cut
CTRL + V = paste
Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.Keyboard Shortcuts
[Alt] and [Esc] Switch between running applications
[Alt] and letter Select menu item by underlined letter
[Ctrl] and [Esc] Open Program Menu
[Ctrl] and [F4] Close active document or group windows (does not work with some applications)[Alt] and [F4] Quit active application or close current window
[Alt] and [-] Open Control menu for active document
Ctrl] Lft., Rt. arrow Move cursor forward or back one word
Ctrl] Up, Down arrow Move cursor forward or back one paragraph
[F1] Open Help for active applicationWindows+M Minimize all open windows
Shift+Windows+M Undo minimize all open windows
Windows+F1 Open Windows Help
Windows+Tab Cycle through the Taskbar buttons
Windows+Break Open the System Properties dialog box END.......
Display the bottom of the active window.
HOME....... Display the top of the active window.
NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.
NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.
NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.
LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.
RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.

boot winxp fast

1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\

2. From the Start menu, select "Run..." & type "gpedit.msc".

3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.

4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".

5. Click "OK", "Apply" & "OK" once again to exit.

6. From the Start menu, select "Run..." & type "devmgmt.msc".

7. Double click on "IDE ATA/ATAPI controllers"

8. Right click on "Primary IDE Channel" and select "Properties".

9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".

10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.

11. Reboot your computer.

UIF:UNIVERSAL IMAGE FORMAT

Universal Image Format (UIF) is a compression image file format for backing up CD/DVDs. MagicISO has a freeware program called MagicDisk that can open UIF files on Windows.Click here to donload Magic disk

emoticons in gtalk



newfolder.exe

It is one of the virus transmitted through usage of pen drives and all of us use these pen drivces more often nowadays and we are bound to get this virus. My friends tried with lots of of antivirus but failed to repair it. And the manual process of removing it is cumbersome.Download the latest version of kaspersky antivirus. I think this is the only antivirus program that can delete it efficiently.

msinfo.exe

File purpose and description:This is a program that tries to imitate msinfo32.exe, msinfo.exe is known as spyware. This is also hidden in your win.ini file so it starts when you reboot your pc. Make sure you do not remove msinfo32.exe, always check the location and the startup of your computer. (See the details below for the actual location of this file.)
Actual file or task name:msinfo.exe
File type:This is an executable program
File or folder location:Msinfo.exe can be found at C:\Program Files\Common Files\Microsoft Shared\msinfo.exe Or C:\Windows\system32msinfo.exe(Note that this location can change as this is spyware).General Information
If a process named msinfo.exe is running on your computer, you may have mostly been infected with the Aladinz.m trojan.
msinfo.exe is considered to be a security risk, not only because antivirus programs flag Aladinz.M as a virus, but also because a number of users have complained about its performance.
Aladinz.M is likely a virus and as such, presents a serious vulnerability which should be fixed immediately! Delaying the removal of msinfo.exe may cause serious harm to your system and will likely cause a number of problems, such as slow performance, loss of data or leaking private information to websites.
msinfo.exe is considered to be a security risk, not only because antivirus programs flag Aladinz.M as a trojan, but also because other sites consider it a Trojan as well.
Aladinz.M is likely a Trojan and as such, presents a serious vulnerability which should be fixed immediately! Delaying the removal of msinfo.exe may cause serious harm to your system and will likely cause a number of problems, loss of data, loss of control or leaking private information.

MSOCache the hidden folder and tips to remove it

The MSOCache folder contains the Office Setup files, so that to repair/reinstall an Office component, you don't have to insert the Office CD-ROM everytime. If the MSOCache folder is deleted, you'll need to use the Office CD-ROM to repair or reinstall Office components.

Do not use explorer to delete this folder. Just running the Disk Cleanup Wizard will take care of it.

1. Click Start
2. Select All Programs
3. Select Accessories
4. Select System Tools
5. Click Disk Cleanup
6. Disk Cleanup will do its calculations
7. From the Drives list in the Select Drive dialog box, select the hard drive that contains the Msocache folder
8. More calculations
9. Select the Office Setup Files checkbox in the Files to Delete list
10. Click OK
11. When you are asked Are you sure you want to delete these files? select Yes

OR

You can prevent it from being place on your drive in the first place by selecting Delete installation files check box during the installation of office from the CD

Thursday, July 31, 2008

Origin of bluetooth and its logo

Bluetooth was named after a tenth-century king, Harald Bluetooth, King of Denmark and Norway. Bluetooth is an anglicized version of Harald Blaatand, who was known for his unification of previously warring tribes from Denmark (including now Swedish Scania, where the Bluetooth technology was invented), and Norway. Bluetooth likewise was intended to unify different technologies, such as personal computers and mobile phones.

The name may have been inspired less by the historical Harald than the loose interpretation of him in The Long Ships by Frans Gunnar Bengtsson, a Swedish Viking-inspired novel.

The Bluetooth logo merges the Germanic runes analogous to the modern Latin letter H and B: (for Harald Bluetooth) (Hagall) and (Berkanan) merged together, forming a bind rune.and the finally the logo became

Gyaan 1.0--YouTube download

YouTube download
YouTube is an excellent website that allows you to view saved videos on their servers. But where the heck is download option there? YouTube doesn't allow you to download these videos.you like a video in YouTube and also you want to download it... but how???Here is one such website which converts the YouTube video into download format.
http://www.videodownloadx.com/
To download,paste video URL into the box.
e.g. http://youtube.com/watch?v=TxKIMD1UEuY
Click "DOWNLOAD" to save the YouTube file to your PC.After downloading video you need to have FLV player to watch the video.

I luv viरस!!--1.1

Who Writes Malicious Programs and Why?
Virus writers: four general types
Virus writers belong to one of four broad groups: cyber-vandals, who can be divided into two categories, and more serious programmers, who can again be split into two groups.
Cyber vandalism - stage 1
In the past, most malware was written by young programmers: kids who just had learned to program who wanted to test their skills. Fortunately most of these programs did not spread widely - the majority of such malware died when disks were reformatted or upgraded. Viruses like these were not written with a concrete aim or a definite target, but simply for the writers to assert themselves.
Cyber vandalism - stage 2
The second largest group of contributors to malware coding were young people, usually students. They were still learning programming, but had already made a conscious decision to devote their skills to virus writing. These were people who had chosen to disrupt the computing community by committing acts of cyber hooliganism and cyber vandalism. Viruses authored by members of this group were usually extremely primitive and the code contained a large number of errors.
However, the development of the Internet provided space and new opportunities for these would-be virus writers.Numerous sites, chat rooms and other resources sprang up where anyone could learn about virus writing: by talking to experienced authors and downloading everything from tools for constructing and concealing malware to malicious program source code.
Professional virus writers
And then these 'script kiddies' grew up. Unfortunately, some of them did not grow out of virus writing. Instead, they looked for commercial applications for their dubious talents. This group remains the most secretive and dangerous section of the computer underground: they have created a network of professional and talented programmers who are very serious about writing and spreading viruses.
Professional virus writers often write innovative code designed to penetrate computers and networks; they research software and hardware vulnerabilities and use social engineering in original ways to ensure that their malicious creations will not only survive, but also spread widely.
Virus researchers: the 'proof-of-concept' malware authors
The fourth and smallest group of virus writers is rather unusual. These virus writers call themselves researchers, and they are often talented programmers who devote their skills to developing new methods for penetrating and infecting systems, fooling antivirus programs and so forth. They are usually among the first to penetrate new operating systems and hardware. Nevertheless, these virus writers are not writing viruses for money, but for research purposes. They usually do not spread the source code of their 'proof of concept viruses', but do actively discuss their innovations on Internet resources devoted to virus writing.
All of this may sound innocent or even beneficial. However, a virus remains a virus and research into new threats should be conducted by people devoted to curing the disease, not by amateurs who take no responsibility for the results of their research. Many proof of concept viruses can turn into serious threats once the professional virus writers gain access to them, since virus writing is a source of income for this group.

I luv viरस!!--1.0

not the best of the article to start with, but somehow couldn't stop myself from doing this!!
heres an article about Malware and its history which i got from karthik's comp.
History of Malware
Malicious software may seem like a relatively new concept. The epidemics of the past few years have introduced the majority of computer users to viruses, worms and Trojans - usually because their computers were attacked.
However, malicious software is not really new.Viruses started appearing on dedicated networks such as the ARPANET in the 1970s. The boom in personal computers, initiated by Apple in the early 1980s, led to a corresponding boom in viruses. As more and more people gained hands-on access to computers, they were able to learn how the machines worked. And some individuals inevitably used their knowledge with malicious intent.
As technology has evolved, so have viruses. In the space of a couple of decades, we have seen computers change almost beyond recognition. The extremely limited machines which booted from a floppy disk are now powerful systems that can send huge volumes of data almost instantaneously, route email to hundreds or thousands of addresses, and entertain individuals with movies, music and interactive Web sites. And virus writers have kept pace with these changes.
While the viruses of the 1980s targeted a variety of operating systems and networks, most viruses today are written to exploit vulnerabilities in the most commonly used software: Microsoft Windows. The increasing number of vulnerable users is now being actively exploited by virus writers. The first malicious programs may have shocked users, by causing computers to behave in unexpected ways. However, the viruses which started appearing in the 1990s present much more of a threat: they are often used to steal confidential information such as bank account details and passwords.
So malicious software has turned into big business. An understanding of contemporary threats is vital for safe computing. This section gives an overview of the evolution of malware: it offers a glimpse of some historical curiosities, and provides a framework to help understand the origins of today's cyber-threats.
- ಕಳ್ಳ

Check out the 'net speed!