14 Jan 2010

தை மகளே வருக...தரணியெல்லாம் செழிக்க...

  சருகான இலையெலாம்

காற்றோடு போகட்டும்

தளிரெல்லாம் தழைக்கட்டும்

சதிராடி வெல்லும்

அநியாயம் அழியட்டும்

தருமம் வெல்லட்டும்

திருந்தா மனங்கள்

இனியேனும் திருந்தட்டும்

தெளிவோடு இருக்கட்டும்

சிங்காரத் தமிழன்னை

கம்பீரம் கொள்ளட்டும்

செங்கோல் ஏந்தட்டும்

கருவான மேகங்கள்

தவறாமல் பெய்யட்டும்

கண்ணீர் நிற்கட்டும்

கையேந்தும் பழக்கங்கள்

தொலையட்டும் மறையட்டும்

கவலைகள் ஒழியட்டும்

புருவங்கள் உயரட்டும்

புன்னகை மலரட்டும்

பொழுதெலாம் சிறக்கட்டும்

பூரிப்பு வளரட்டும்

பொலிவோடு விளங்கட்டும்

பொற்காலம் பிறக்கட்டும்

                                                                          -- இனிய தமிழ் புத்தாண்டு வாழ்த்துகள்


OPEN DOS WHILE WINDOW INSTALL

"Want to see something cool?"

hit a key combination and brought up a command prompt over the gui that was installing Vista/XP....

"Whaaaaat?"


You can open a game of Pinball or Solitaire during an install. Sound appealing to anyone? That's what I call multi-tasking :) So Shift + F10 will get you to the command prompt during an install like the shot below. It works on XP as well.


It only works from the GUI portion and not the white text on blue background parts. I googled it and saw some speculation on using it to inject drivers or folders during your install.


MORE INFORMATION
In some cases, it may be helpful to have access to a command prompt during GUI-mode Setup for the purposes of troubleshooting, copying drivers, starting and stopping services, starting tools such as Task Manager, or other for other needs.

To gain access to a command prompt during GUI-mode Setup, press SHIFT+F10.

Uninstalling Windows from Command Prompt

One option included in Windows XP is the ability to uninstall XP if you performed an upgrade from Windows 98, 98SE, or Windows Me.

The standard method of removing XP is achieved by booting into XP normally and uses the Add/Remove Programs tool in Control Panel.

If you are unable to start XP normally, the second option is to load XP in Safe Mode then use the same tool.

If you are unable to boot normally or boot into Safe Mode, XP can be removed by uninstalling from a Command Prompt.

The procedure is as follows:

Important Note: This procedure is available only if a successful image of the previous operating system was created during the XP upgrade.

Start the computer to Safe Mode with Command Prompt.

At the command prompt, type cd\, and then press ENTER.

Type cd\windows\system32, and then press ENTER.

Type osuninst.exe, and then press ENTER.

On screen instructions will guide you through the uninstall process to revert to the previous operating system.

This procedure can only be performed by users logged on as Administrator or a user with administrative rights.

EVERY THINK ABOUT SPYWARE

There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Known spywares
There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?
The is this Little site that keeps a database of programs that are known to install spyware.


If you would like to block pop-ups (IE Pop-ups).
There tons of different types out there, but these are the 2 best, i think.

Try: Google Toolbar (http://www.google.com/toolbar/ie/index.html) This program is Free
Try: AdMuncher (http://www.admuncher.com/) This program is Shareware

If you want to remove the "spyware" try these.
Try: Lavasoft Ad-Aware (http://www.lavasoft.com/?domain=lavasoftusa.com) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D (http://www.safer-networking.org/index2.html) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.

Try: Spy Sweeper v2.2 (http://www.webroot.com/En_US/land-three-up-offer2.html) This program is Shareware
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.

Try: HijackThis 1.97.7 (http://www.spywareinfo.com/) This program is Freeware
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.


If you would like to prevent "spyware" being install.
Try: SpywareBlaster 2.6.1 (http://www.javacoolsoftware.com/spywareblaster.html) This program is Free
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.

Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.

If you would like more Information about "spyware".
Check these sites.

Usefull tools...
Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j...r2ksoftware.htm) This program is Free
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these message
All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "spyblaster" "s&d spybot" "spy sweeper" & "admuncher" to protect your PC. A weekly scan is also recommended

Free Virus Scan
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
http://defender.veloz.com// - 15k


Finding . is a Click Away at 2020Search.com
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!


Download the BrowserVillage Toolbar.
Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!

8 Jan 2010


                                                       
It's beautiful, sleek and absolutely stunning. The new VAIO X Series notebook (VPCX117LG) by Sony weighing 760 gms is probably the lightest and thinnest notebook available on the shelf. It houses an 11.1-inch stylish yet scratch-resistant widescreen display, which is LED backlit and offers multitouch trackpad for better functionality. Instead of a typical spinning hard disk drive, the device features a 128 GB solid state drive  upgradeable to 250GB through the SonyStyle Store that provides faster boot-up and speedier access to your applications.
The notebook currently has an Intel Atom Z550 2GHz processor, which does a fairly good job but comes just with 3G HSPA mobile broadband capabilities.
However, the notebook has something called Everwair WWAN, which enables you to log onto the Internet even when there's no Wi-Fi available. While there are two USB 2.0 ports plus a headphone jack and an AC adapter point on one side of the notebook, the other side features an Ethernet port and a VGA port so you can also connect an external monitor. The product has a memory card, stick slot, Motioneye camera and microphone and a battery life that is excellent.

                             
MRP : Rs. 45700.00
Discount :(-) Rs. 18701.00
Best Price : Rs. 26999.00
VAT/CST Tax :(+) Rs. 1080.00

Net Price : Rs. 28079.00




Model No : Acer Travelmate 4730

Operating System - Linux Operating System

Processor - C2D T5870(2 GHz,2 MB, 800 MHz )

HDD - 160GB

Chipset - Mobile Intel GM45 Express Chipset

Memory - 1024MB RAM DDR2

Screen Size - 35.81 cms (14.1" WXGA TFT LCD)

Optical Drive - 8X DVD-Super Multi double layer drive

Camera - Acer Crystal Eye Webcam supporting Primalite Technology,Blue Tooth and FP

Ports & Others - Three USB 2.0 Ports,HDMI Port, EasyPort IV Connector,Acer 3D Sonic Speakers

Warranty - One year

3 Jan 2010

HOW HACKERS HIDE DATA IN COMPUTERS

As the scope of cyber crime increases ,new investigative methods using the latest scientific developments and new software are becoming popular

The rate of cyber crime is increasing in our country.A latest survey reveals that
over Rs.3500 million is lost annually due to white –collor crime, which includes cyber crime.When law enforcement agencies investigate cyber crimes,they use digital forensics ,which involves investigation of computer system to unearth the evidence against cyber criminals.Many new investigative methods that use the latest scientific developments and new software are becoming popular  in this field.When cyber crimes occur,they naturally involves the computer hackers ,who usually leave some evidence or tracks on the system.
Generally cyber criminals conceal data on hard drive .There are two popular techniques to hide data on  the hard drive –one ,by low-level formatting and the other by partitioning. With low-level formatting ,hackers prefer redundant sectors and bad sectors.While partitioning ,data can be hidden in the inter-partition gaps ,unallocated spaces ,patitions ,boot records ,partition tables and deleted partitions.To fully understand this ,we should know the details of the windows file system or other popular file systems.

Understanding File Systems


Low –level formatting is performed at the factory ,which creates sectors .Each sector holds 512 bytes and some overhead ,which provides error correction .The hard drive controller remaps bad sectors by redundant sectors .Criminals can misuse these redundant sectors.
 
FAT-File Allocation Table of file systems is popular in the Microsoft Windows environment .There are various tools such as Winhex ,Undelete and File scavenger to analyse FAT information.

NTFS is a popular file system in the windows xp ,windows NT and windows server operating systems .It provides compressed file feautures and encrypted file system feautures ,including file system metadata about the structure of the file system .
The Master file table is the heart of NTFS .Every file or directory has atleast one entry in MFT ,which is called file record and it’s default size is 1024 bytes .Data is stored in the cluster ,which is a small disk space .Every cluster in NTFS has a logical cluster number (LCN).The cluster number starts with zero.
There are also metadata files like $boot ,$logfile ,$badclus , and $volume that describe the file system .These metadata files can be explored with the help of Winhex software.
One important feauture of NTFS is alternate data streams(ADS),which can be added with any file by the command c:\notepad anyfile.txt:hide Here ,any hidden data can be typed in with the text file anyfile .txt :hide
Hidden data may be of 100KB but size of anyfile.txt does not get changed .Many hackers use this ADS feauture to hide information while uploading files onto the victim’s computer. Many times ,when a computer is saving a file on hard disk ,it cannot allocate the exact number of clusters to save the file .The last cluster will remain half filled and that’s where a hacker can hide information .System internal commands can be used to unearth this data.
  



2 Jan 2010

HOW TO KNOCK OUT WIKIPEDIA IN SEARCH RESULTS

How can you overtake Wikipedia in Search Results?

The problem is that often you find a wikipedia page ranked right above your web page in search results. You want to beat this wikipedia page and continue moving up, but this seems unbeatable. But, not exactly. There is a solution.

Beat Wikipedia in Search Results

Wikipedia page seems unbeatable because of the domain authority of Wikipedia.org. Even though there is nothing we can do about the domain authority, we need to understand the factors helping wikipage to rank higher.
Innerlinking amongst other Wikipedia entries boosting the page’s value.
Inbound links from important blogs, forums and other resources.

Well, now that you understand why its there right up your page, let us now find out the steps to be implemented to beat the wikipage.
Using any backlink analysis tool, for eg: Yahoo site explorer, find out all the pages linked to the wikipedia entry.
Go to each Wikipedia listing and remove all irrelevant references to the subject matter. For example, if the wikipage is about “dog food” but the reference article is about an irrelevant subject containing few words of “dog food”- Delete only the references that are absolutely nothing to do with the wiki article or those that are not in exact context with the wiki article. Try to limit the number of deletions to about three a day. You, however, need to provide valid reasons for the deleted reference.
From backlinks found for the wikipedia entry, separate blogs and forums links, go to these sites and drop a link to your site from as many as you can.
If there are pages positioned above
wikipedia, repeat the above steps to find out pages linked to these sites and get a backlink from these sites.

press google's i'm feeling lucky..in google's home page

Just click on the i'm feeling lucky button on google's homepage..You will be wondered...

HOW TO WRAP A PRESENT...

As this is a festive season u may wanna present your kin and kith with awesome gifts...Here's a way to wrap it .