2/27/09

Internet Dask Top Sharing Tools



Probably my favorite because of it’s ease of use and the fact that you can use it to remotely access your PC or MAC also! Yuuguu is completely free and allows you to instantly share your screen with anyone. Works well through firewalls
also and on MACs.

CroosLoop is also very easy to use, but requires that each party install the CrossLoop software onto their computers. Uses 128-bit encryption and allows for file-sharing also.


Another popular service for remote desktop sharing. Easily access remote PC’s by installing a client software onto each machine. Good for remote PC trouble-shooting, etc.


A good free tool for online collaboration, desktop sharing, and remote PC access. No registration required, no logins, very easy to use. Uses SSH to make connections to other PC’s.

SkyFex allows remote watching and remote control in real time. Does not require additional software installation and works transparently through NAT and Firewalls. Only for IE though.


TeamViewer has a couple of features, such as remote control of PCs, screen sharing, file transfer, chat ability, and is secure. Have to install the TeamViewer software for it to work.


A free software that lets others watch your screen in real time. No need to install any software, which is a plus. Works with Windows, Mac and Linux

If you know of one that I missed or think is better, post a comment! Enjoy!

2/5/09

Sun & Moon In Jars

Highly efficient solar cells are stored inside the Sun and Moon jars, which are powered by a rechargeable battery and LED lamps. The magic begins when the jar is placed in direct sunlight to create an electrical current which charges the battery over the course of a few hours. The energy stored inside the jar is used at night to power the LED lamps.

The frosting on the jar diffuses the light to give it the appearance of sunlight coming from the jar. There’s no switch on the Sun Jar, nor are there any visible controls. The light sensor located inside the jar activates the LEDs in the jar when it gets dark, so you have light where ever you go!

Because the Sun Jar is built inside a mason jar, it’s air and water tight, which means the jar can be left outside in any weather conditions. The jars make great garden lights, as well as night lights for small children. Because the jar needs direct sunshine to work, it’s best to place them in a window which gets lots of shade. The jars use a AA battery, which is completely replaceable.

12/9/08

Gmail Voice and Video Chat_____>


  • Chat more ways than ever from within Gmail
  • Look and sound your best with high quality audio and video
  • Get started easily -- all you need is a webcam
  • Download and install

12/4/08

Digital Photo Frames



A digital photo frame is a picture frame that displays digital photos without the need to print them or use a computer
!wow!

And it includes mp3 player card reader and USB suopport........

12/3/08

USB Xmas Stuff


I wish you a Merry Christmas......
Christmas is coming! You can celebrate this festive season while you are working. USB Decoration Christmas Kit contains colourful LED lights, a cutie Christmas hat and a mouse pad for you to decorate your working desk! And it is a perfect and special Christmas present for your friends too!

Happy New Year and Xmas

USB Card Reader + Mouse




USB Optical Mouse built-in a SDHC card reader, it makes user more convenient to transfer the mobile data from SD(HC)/Micro SD (HC) to a computer

  • Built-in a SD(HC) card reader
  • Support: SDHC, SD, MMC, *MiniSD, *T-flash, *MicroSD , *MicroSDHC
  • Support Windows Vista/XP
  • Dimension: 95 x 54 x 33mm (approx.)

  • 11/26/08

    Google Search Tips

    Here's a small list of tips that may help you use Google search better.

    1. If you're on Google's homepage, click on "I'm feeling lucky" if you're searching for the site of a company or the official site of a product. "I'm feeling lucky" sends you to the first search result and saves you one click.

    Example: use this for [bmw], [France Telecom], but not for general terms like [used cars], [mobile phones history] because for these queries you'll want to visit more than one page.

    2. If you're not sure how to spell a word, or if you remember only the first letters of a word, use Google Suggest. You'll find it in Firefox 2 search box, in Google Toolbar or at its homepage.

    3. Google shows direct answers for simple questions above the search results. When you try to find a simple fact, enter you query this way: "Italy population", and not as a complicated question like "How many people are in Italy?" because you might confuse Google.



    If Google doesn't show an answer, try to imagine a page that answers your question. How would the answer sound like for a question like: "What is the fastest animal on land?". Of course, the page might contain this sentence: "[some animal] is the fastest animal on land".

    Build your query this way:
    * surround it by quotes, to obtain only results that contain that phrase
    * instead of the answer, use a star for each word of the expected answer

    For example, "* is the fastest animal on land".

    4. The order of your keywords is important, so you'll get different results for "search history" and "history search". Type only the important keywords, in a logical order.

    5. If you search for a file, you could:
    * add filetype:[extension] for Office documents, text files, PDFs (for example: divine comedy filetype:pdf)
    * use inurl: operator if you actually know the name of the file (for example: inurl:divina-comedia.pdf)
    * exploit the standard format of Apache directory listings by adding intitle:"index of" parent directory to your query (for example: bigfix.exe intitle:"index of" parent directory).

    6. You won't find information about a breaking news in Google search, so it's a good idea to try Google News and Blog Search. If the event is really important, Google will show results from Google News at the top of the page, in a OneBox.

    7. Very few people use this option, even though it's really useful. If you found a good page, and you want to see related pages, click on the "Similar pages" next to the search result. Google will show 30 high-quality sites on the same topic. It's a good way to discover interesting sites.

    8. If you found a site using Google search, but you don't remember too much about it, try Google Search History. You can browse all your search queries and the pages visited from Google, bookmark interesting sites and more.

    9. When you want to explore a domain you aren't familiar with, a Wikipedia page is a good place to start. Add "wiki" or "wikipedia" to your Google search query to find the top results from Wikipedia. You can restrict your search to a site, by adding site:domainname to a query (for Wikipedia, you should add site:en.wikipedia.org).

    10. Google doesn't give you a feed for search results, but Web Alerts sends you email updates with the latest relevant Google results for a query.

    11/20/08

    Windows Server 2008


    1(One) : Server Core. Here is where the world could really change for Microsoft going forward: Imagine a cluster of low-overhead, virtualized, GUI-free server OSes running core roles like DHCP and DNS in protected environments, all to themselves, managed by way of a single terminal.

    If you're a Unix or Linux admin, you might say we wouldn't have to waste time with imagining. But one of Windows' simple but real problems as a server OS over the past decade has been that it's Windows. Why, admins ask, would a server need to deploy 32-bit color drivers and DirectX and ADO and OLE, when they won't be used to run user applications? Why must Windows always bring its windows baggage with it wherever it goes?

    Beginning with Windows Server 2008, the baggage is optional. As product manager Ward Ralston told BetaNews in an interview published earlier this week, the development team has already set up Beta 3 to handle eight roles, and the final release may support more.

    What's more, with the proper setup, admins can manage remote Server Core installations using a local GUI that presents the data from the GUI-less remote servers. "We have scripts that you can install that enable [TCP] port 3389," Ralston told us, "so you can administer it with Terminal Services. [So] if you're sitting at a full install version and let's say I bring up the DNS, I can connect to a Server Core running DNS, and I can administer it from another machine using the GUI on this one. So you're not just roped into the command line for all administration. We see the majority of IT pros using existing GUIs or using PowerShell that leverages WMI [Windows Management Instrumentation] running on Server Core, to perform administration."

    PowerShell can run on Server Core...partially, Iain McDonald told us. It won't be able to access the .NET Framework, because the Framework doesn't run on Server Core at present. In that limited form, it can access WMI functions.

    But a later, more "component-ized" version of .NET without the graphics functionality may run within Server Core. This could complete a troika, if you will, resulting in the lightest-weight and most manageable servers Microsoft has ever produced. It may take another five years for enterprises to finally complete the migration, but once they do...this changes everything.


    2(Two): PowerShell. At last. For two years, we've been told it'll be part of Longhorn, then not really part of Longhorn, then a separate free download that'll support Longhorn, then the underpinning for Exchange Server 2007. Now we know it's a part of the shipping operating system: the radically new command line tool that can either supplement or completely replace GUI-based administration.

    Last week at WinHEC, Windows Server programming chief Iain McDonald flat out proclaimed, "If I could set the direction of it, I would like to make PowerShell the default shell for Windows. That's my personal bias."

    At TechEd 2007 in Orlando in early June, we'll be seeing some new examples of PowerShell in the WS2K8 work environment - hopefully unhindered now that the product is shipping along with the public Beta 3...at least unless someone changes his mind. We hope that phase of PowerShell's history is past it now

    3(Three): Windows Server Virtualization. Even pared down a bit, the Viridian project will still provide enterprises with the single most effective tool to date for reducing total cost of ownership...to emerge from Microsoft. Many will argue virtualization is still an open market, thanks to VMware; and for perhaps the next few years, VMware may continue to be the feature leader in this market.

    But Viridian's drive to leverage hardware-based virtualization support from both Intel and AMD has helped drive those manufacturers to roll out their hardware support platforms in a way that a third party - even one as influential as VMware - might not have accomplished.

    As Microsoft's general manager for virtualization, Mike Neil, explained at WinHEC last week, the primary reason customers flock to virtualization tools today remains server consolidation. "There's this sprawl of servers that customers have, they're dealing with space constraints, power constraints, [plus] the cost of managing a large number of physical machines," Neil remarked. "And they're consolidating by using virtual machines to [provide] typically newer and more capable and more robust systems."

    Consolidation helps businesses to reclaim their unused processor capacity - which could be as much as 85% of CPU time for under-utilized servers. Neil cited IDC figures estimating US businesses have already spent hundreds of billions on processor resources they haven't actually used. It's not their fault - it's the design of operating systems up to now. "So obviously, we're trying to drive that utilization further and further," Neil said.

    4(Four): Windows Hardware Error Architecture (WHEA). That's right, Microsoft has actually standardized the error - more accurately, the protocol by which applications report to the system what errors they have uncovered. You'd think this would already have been done.

    "One of the problems facing error reporting is that there's so many different ways that devices report errors," remarked Russinovich. "There's no standardization across the hardware ecosystem. So that made it very difficult to write an application, up to now, that can aggregate all these different error sources and present them in a unified way. It means a lot of specific code for each of these types of sources, and it makes it very hard for any one application to deliver you a good error diagnostic and management interface."

    Now, with hardware-oriented errors all being reported using the same socketed interface, third-party software can conceivably mitigate and manage problems, reopening a viable software market category for management tools.


    5(Five): Address Space Load Randomization (ASLR) Perhaps one of the most controversial added features already, especially since its debut in Vista, ASLR makes certain that no two subsequent instances of an operating system load the same system drivers in the same place in memory each time.

    Malware, Mark Russinovich described it (as only he can), is essentially a blob of code that refuses to be supported by standard system services. "Because it's isn't actually loaded the way a normal process is, it would never link with the operating system services that it might want to use," he described. "So if it wants to do anything with the OS like drop a file onto your disk, it's got to know where those operating system services live.

    "The way that malware authors have worked around this chicken-and-egg kind of situation," he continued, "is, because Windows didn't previously randomize load addresses, that meant that if they wanted to call something in KERNEL32.DLL, KERNEL32.DLL on Service Pack 2 will always load in the same location in memory, on a 32-bit system. Every time the system boots, regardless of whose machine you're looking at. That made it possible for them to just generate tables of where functions were located."

    Now, with each system service likely to occupy one of 256 randomly selected locations in memory, offset by plus or minus 16 MB of randomized address space, the odds of malware being able to locate a system service on its own have increased from elementary to astronomical.

    6(Six): SMB2 network file system. Long, long ago, SMB was adopted as the network file system for Windows. While it was an adequate choice at the time, Russinovich believes, "SMB has kind of outlived its life as a scalable, high-performance network file system."

    So SMB2 finally replaces it. With media files having attained astronomical sizes, servers need to be able to deal with them expeditiously. Russinovich noted that in internal tests, SMB2 on media servers delivered thirty to forty times faster file system performance than Windows Server 2003. He repeated the figure to make certain we realized he meant a 4000% boost.

    7(Seven): Kernel Transaction Manager. This is a feature which developers can take advantage of, which could greatly reduce, if not eliminate, one of the most frequent causes of System Registry and file system corruption: multiple threads seeking access to the same resource.

    In a formal database, a set of instructed changes is stored in memory, in sequence, and then "committed" all at once as a formal transaction. This way, other users aren't given a snapshot of the database in the process of being changed - the changes appear to happen all at once. This feature is finally being utilized in the System Registry of both Vista and

    "The Kernel Transaction Manager [intends] to make it very easy to do a lot of error recovery, virtually transparently," Microsoft software engineer Mark Russinovich explained. "The way they've done this is with the [KTM] acting as a transaction manager that transaction clients can plug into. Those transaction clients can be third-party clients that want to initiate transactions on resources that are managed by Transaction Resource Manager - those resource managers can be third-party or built into the system.

    8(Eight): Clean service shutdown. One of Windows' historical problems concerns its system shutdown procedure. In XP, once shutdown begins, the system starts a 20-second timer. After that time is up, it signals the user whether she wants to terminate the application herself, perhaps prematurely. For Windows Server, that same 20-second timer may be the lifeclock for an application, even one that's busy spooling ever-larger blocks of data to the disk.

    In WS2K8, that 20-second countdown has been replaced with a service that will keep applications given the signal all the time they need to shut down, as long as they continually signal back that they're indeed shutting down. Russinovich said developers were skeptical at first about whether this new procedure ceded too much power to applications; but in practice, they decided the cleaner overall shutdowns were worth the trade-offs.

    9(Nine): Parallel session creation. "Prior to Server 2008, session creation was a serial operation," Russinovich reminded us. "If you've got a Terminal Server system, or you've got a home system where you're logging into more than one user at the same time, those are sessions. And the serialization of the session initialization caused a bottleneck on large Terminal Services systems. So Monday morning, everybody gets to work, they all log onto their Terminal Services system like a few hundred people supported by the system, and they've all got to wait in line to have their session initialized, because of the way session initialization was architected."

    The new session model in both Vista and WS2K8 can initiate at least four sessions in parallel, or even more if a server has more than four processors. "If you've got a Vista machine where this architecture change actually was introduced, and you've got multiple Media Center extenders, those media center extenders are going to be able to connect up to the Media Center in parallel," he added. "So if you have a media center at home, and you send all their kids to their rooms and they all turn on their media extenders at the same time, they're going to be streaming media faster from their Vista machines then if you had Media Center on a XP machine."

    10(Ten): The self-healing NTFS file system. Ever since the days of DOS, an error in the file system meant that a volume had to be taken offline for it to be remedied. In WS2K8, a new system service works in the background that can detect a file system error, and perform a healing process without anyone taking the server down.

    "So if there's a corruption detected someplace in the data structure, an NTFS worker thread is spawned," Russinovich explained, "and that worker thread goes off and performs a localized fix-up of those data structures. The only effect that an application would see is that files would be unavailable for the period of time that it was trying to access, had been corrupted. If it retried later after the corruption was healed, then it would succeed. But the system never has to come down, so there's no reason to have to reboot the system and perform a low-level CHKDSK offline."

    11/18/08

    Biometric controlled USB Drives



    This is Biometric Access Controlled USB Flash Drive which gives fingerprint access control to the content of the USB key for secure storage of your data and applications. Lightweight and compact, the BioDisk is incredibly small and can fit right into your pocket. The casing is black and it has a pen-style clip on the back. The fingerprint sensor is on top.
    It doesn't require any cable, power supply, or battery.

    Act as a removable hard drive when plugged into a USB port. It is truly plug-and-play on Operating Systems that support USB 1.1 or USB 2.0, like Windows ME, 2000, and XP.
    Windows 98 requires a driver to be installed before the BioDisk can be used normally.


    Usage
    By default the drive is locked and only the Run.exe file is shown when browsing the flash disk. Right clicking on the Drive Tray Icon lets me choose to unlock the Flash Drive. A dialog pops up and asks for the fingerprint. When recognizing the print all files show up in the file explorer dialog. Right clicking on the tray icon then lets me to choose lock the disk. All in all very easy to use.

    ThinkPad USB Portable Secure Hard Drive

    Lenovo launches ThinkPad USB Portable Secure Hard Drive

    November 17th, 2008

    ThinkPad USB Portable Secure Hard Drive

    Expanding the renowned ThinkPad, Lenovo rolls out its latest portable hard drive, called the ThinkPad USB Portable Secure Hard Drive in two high-storage capacities such as 160 GB and 320 GB.

    Promising to offer simple-to-use design, the device possesses two important attributes that make it unique from the rest of the hard drives - its portability and enhanced security.

    The ThinkPad USB Portable Secure Hard Drive is about 3×5-inch in size and 1-inch thickness, ensuring mobility while globe trotting. The drive also employs a numeric keypad for users to keep it password protected. In order to provide a secured way to protect sensitive data, the lightweight storage device enables users to punch-in their passcode, ensuring Read th

    9/27/08

    USB Fridge - A new gadget just for you!


    Are you fond of having drinks in front of your PC? May it be a coffee or a soda. And what if you want it cold for always? Or your coffee still hot when you want to sip some of it? The answer is this USB Fridge from DreamCheeky.


    If you want to keep your can of Coke chilled for a longer period while you drink it slowly at your desk, get this nifty USB-powered portable fridge from DreamCheeky.
    It holds only one can and once you hook it up to a USB port, the device will take about five minutes to cool down to 8°C.
    Plus, the fridge will not only cool down your drink but it can also heat up your coffee with a flick of a switch.
    Take a look on the picture! It’s not your regular ref or your water heater, so only small cups fill suffice for your needs.
    In addition to this, inside the USB fridge you’ll find a single blue LED to light up the interior. The retro looking fridge is ­available in red and black.

    6/11/08

    China Mobile Gives Millions in Air Time to Quake Zone

    China Mobile has given away 262 million yuan worth of air time to residents of the areas affected by the devastating May 12 earthquake and to rescue and relief workers.

    The free communication service was extended to 3.33 million China Mobile users from May 12 to 31.

    The donated services included domestic roaming charges, domestic long-distance charges, monthly rentals, text and multimedia message charges for users who entered or left the cities of Chengdu, Mianyang, Deyang and Guangyuan and the Aba Tibetan and Qiang Autonomous Prefecture.

    Free roaming services valued at 104 million yuan were extended to 1.05 million people from outside Sichuan, where the quake was centered, while 2.28 million users from around Sichuan were exempted from paying 158 million yuan in charges.

    6/4/08

    What's New: New Trojan In MP3 Files

    Security vendor McAfee announced a dramatic increase in peer-to-peer network traffic in fake MP3 files that look like music files but in reality install adware programs, Mirar and NetNucleus, on the victim's computer. McAfee says that while Mirar says it features no popup ads, the latter program displays them. Users are prompted to download a media player when opening the fake MP3 files. McAfee has detected these files on 360,000 PCs in the past few days.

    5/6/08

    How to Unlock iPhone in India


    This is method is for 1.1.1 firmware only.
    Click Here for other firmwares.

    I have been getting quite a few mails on how to unlock iPhone in India. I would say its the same procedure mentioned in unlock.iphone.no. Let me put the steps here again and add points that I went through while I was unlocking my iPhone in Bangalore using an Airtel sim card.

    Warning! Firmware version 1.1.2 is now released. If you bought a phone that had 1.1.2 preinstalled (it shows a picture of a cable and the iTunes icon), it is not possible to unlock it. If you did not have this firmware when you bought the phone, i do not recomment to update to this version yet. It’s very important that you don’t let iTunes restore to 1.1.2 as well, so always select firmware manually by holding Shift/Option key while clicking Restore. Details about restoring/upgrading here.

    This tutorial assumes that your iPhone has firmware version 1.1.1. If you are unsure, here is how to check: On the emergency dial screen dial *3001#12345#* and tap Versions. Firware version should be 04.01.13_G. If it’s 03.14.08_G you have v1.0.2 and need to update it to 1.1.1 first. Read here first if you previously unlocked your phone.
    Bypass activation and prepare phone for software installation

    1. Make sure you have a SIM-card with PIN turned off, and power on your phone (the supplied AT&T card works fine).
    2. On the activation screen, slide for emergency and dial: *#301# to make the phone call itself. (If the incoming call dialog quickly disappears but it keeps ringing, just dial 0 (remove *#301# first), and it will call itself)
    3. Answer the call, and tap on Hold
    4. Phone will call it self again, tap Decline. You will now be returned to the normal dialer.
    5. Tap on contacts, and tap the + icon to add a new. The only info you are going to add to this contact are two URL’s. To add a URL, tap Add new URL. The first URL is prefs followed by a colon: prefs: and the second is jailbreakme.com. Tap Save.
    6. Your contact now has two “web pages” - tap on the first one (prefs:). This will take you to the settings dialog. The reason you want this, is because you need to connect to a Wi-Fi network, so tap on Wi-Fi, and get connected to a network, and make sure the icon on top of the screen is indicating that you are connected. While you are in the settings dialog, you should also set: General ? Auto-Lock ? Never.
    7. Now, press the home button, and again, slide for emergency dial 0, Answer the call, Hold and Decline the new call so that you get to the contacts. Tap on your contact (No Name), and this time tap on the other home page, jailbreakme.com
    8. Safari will launch and show you a web page. Read through the text, before you Install AppSnapp
    9. Phone will return to activation screen, but don’t panic, just wait.
    10. Phone should automatically restart after almost a minute. . If it does not restart withing 2-10 minutes, please try again and again. Keeping trying until you succeed. Since many people download the AppSnapp from the same server, invariably it kicks you out. So keep trying over and over. If you still can’t do it, message me and I will get back.
    11. When the phone starts again, it should no longer say slide for emergency, but rather Slide to unlock It means it was successfull! Activation is now bypassed, and phone prepared for software installation! (If you are going to use an AT&T SIM, you won’t need to do the next step.)

    Unlock Airtel, Vodaphone, Spice, IDEA or any other Indian SIM-lock

    1. Open installer, and install the update if prompted.
    2. Go to sources and tap Edit and Add
    3. Add this URL: http://i.unlock.no
    4. Tap Done and then Refresh
    5. Go to Install (at bottom) and scroll down to the Unlocking Tools category and install AnySIM
    6. When installed you can press the home button, and you will find a new AnySIM icon on your home screen. Launch it and follow the instructions.
    7. The unlocking process will take about 5-10 minutes, in the end it should say it was successful!
    8. To clean up your phone, launch Installer and uninstall AnySIM. Then go to Settings ? General ? Auto-Lock and set it to a prefered value.

    Congratulations, you are done!

    4/30/08


    LG's Secret unveiled

    30 Apr 2008, 1126 hrs IST,INDIATIMES NEWS NETWORK



    SMS NEWS to 58888 for latest updates

    NEW DELHI: LG announced its third Black Label Series handset, the LG Secret KF750. At just 11.8mm thick, the Secret claims to be the slimmest 5 mega pixel camera phone in the market.

    The Secret is made from carbon fiber, one of the strongest composite materials. It has a tempered glass display (2.4 inches) with 240 x 320 pixel resolution and Neon Touch navigation buttons.

    Other features include a touch-sensitive glass LCD screen, Bluetooth, music playback, games, office document support and an FM radio.

    With a tie up to Google products, Secret users can access Google Mail, Google Maps and YouTube videos.

    A Touch Media feature allows the user to directly access five multimedia functions with a single button: music, photos, games, documents, and FM radio. Users can flip through photos on the screen while listening to music.

    The phone can also handle Word, Excel and PowerPoint files. The Secret has an accelerometer sensor, and LG has included a few games that use this feature.

    The phone also supports Bluetooth and comes with an auto-sync feature that automatically synchronises it with a PC.

    The auto-rotating display shifts the image on the screen for viewing in any position. The auto-luminance control adjusts the screen lighting according to ambient brightness. External memory here is supported by means of a micro SD card.

    The LG Secret has been launched in Europe, and will be eventually launched in Asia, South America, and on to the rest of the world.

    4/16/08

    How To Use Portable Firefox, ThunderBird, FileZilla, and Pidgin Over SSH On Unprotected Networks Using Any USB Drive





    A few years ago I started using PortableFirefox on my USB drive to browse with. It was easier to always have my stored form data, bookmarks, and other browser settings with me regardless of which computer I happened to be using. The problem was I'd often find myself on a public WiFi network and didn't like the fact that my passwords and other personal data could be discovered by any average joe running a sniffer.

    In this guide we're going to provide you with step-by-step instructions on how you can browse, email, FTP & IM over SSH on your USB drive.

    Continue Reading "How To Use Portable Firefox, ThunderBird, FileZilla, and Pidgin Over SSH On Unprotected Networks Using Any USB Drive"...

    4/3/08

    Welcom to New Technology

    Amazing Technology is coming soon.
    It's like the movie, "Minority Report"

    4/2/08

    Super Bluetooth Hack v1.07, hack any one's cellphone via blue tooth

    Super Bluetooth Hack v1.07, hack any one's cellphone via blue tooth

    Super Bluetooth Hack v1.07, hack any one's cellphone via blue tooth Once connected to a another phone via bluetooth you can: - read his messages - read his contacts - change profile - play his ringtone even if phone is on silent - play his songs(in his phone) - restart the phone - switch off the phone - restore factory settings - change ringing volume - And here comes the best Call from his phone" it includes all call functions like hold etc. Notes: 1.) When connecting devices use a code 0000 2.) At start of programm on smartphones do not forget to turn on bluetooth before start of the mobile


    With this java software you can connect to another mobile and ....
    Once connected to a another phone via bluetooth you can:
    - read his messages
    - read his contacts
    - change profile
    - play his ringtone even if phone is on silent
    - play his songs(in his phone)
    - restart the phone
    - switch off the phone
    - restore factory settings
    - change ringing volume
    - And here comes the best
    Call from his phone" it includes all call functions like hold etc.

    Notes:
    1.) When connecting devices use a code 0000
    2.) At start of programm on smartphones do not forget to turn on bluetooth before start of the mobile
    .

    Download Application :|@mahesh|Click here to Download the Application

    Hafnium-based Intel® 45nm Process Technology


    Hafnium-based Intel® 45nm Process Technology
    Two words: relentless innovation. Using dramatically new materials including hafnium-based circuitry, new Intel® 45nm Hi-k metal gate silicon technology helps to dramatically increase processor energy efficiency and performance for an unprecedented computing experience.

    With this breakthrough transistor technology, Intel is manufacturing serious advantage into every hafnium-based Intel 45nm Hi-k chip.These revolutionary new processors empower a more enjoyable computing experience for your gaming, multimedia and multitasking, at work, at home, and at play

    4/10/07

    Hacked by godzilla - virus fixed

    Hacked By Godzilla - Virus Fixed

    Hacked By Godzilla is a new computer virus that widely infect from using Handy Drive or Floppy Disk

    Defected
    1. We can not Double Click to open any Drive on our computer. But we can Right Click to Open or Explore.
    2. There is a text “Hacked By Godzilla” on Title Bar of Internet Explorer.

    How to fix Godzilla

    1. Double Click on My Computer icon on Desktop and select Tools --> Folder Options
    2. When Folder Options cliak at View tab
    1. check at Show Hidden files and folders
    2. unchuck the Hide extention… and Hide protected operating system file
    3. click OK
    3. Press Ctrl+Alt+Delete. The Windows Task Manager will dispalay. Click at Processes tab
    1. Click menu Image Name (to sort Files)
    2. Select wscript.exe (one by one)
    3. Click End Process button
    4. Open drive (By right click and select Explore. Must not Double Click !) Delete autorun.inf and MS32DLL.dll.vbs (Press Shift+Delete) in all drives include Handy Drive and Floppy disk.
    5. Open folder C:\WINDOWS to delete MS32DLL.dll.vbs inside (press Shift+Delete )
    6. Go to Start --> Run and enter regedit click OK. Registry Edit dialoq will display.
    7. Select HKEY_LOCAL_MACHINE --> Software --> Microsoft --> Windows --> Current Version --> Run to delete MS32DLL (press Delete key on keyboard)
    8. Select HKEY_CURRENT_USER --> Software --> Microsoft --> Internet Explorer --> Main to delete Window Title "Hacked by Godzilla" (press Delete key on keyboard)
    9. Click Start --> Run and enter gpedit.msc click OK. Group Policy dialoq will display.
    10. Select User Configuration --> Administrative Templates --> System --> Double Click on file Turn Off Autoplay then Turn Off Autoplay Properties will display
    1. Select Enabled
    2. Select All drives
    3. Click OK
    To prevent auto open when we insert CD or plug the Handy Drive that is the way virus infect.
    11. ClickStart --> Run and enter msconfig Click OK. the System Configuration Utility dialoq will display
    1. Click Startup tab
    2. Uncheck MS32DLL
    3. Click Apply
    4. Clock OK (or Close)
    When the System Configuration dialoq display select Exit Without Restart
    12. Double Click on icon My Computer on Desktop. Then select Tools --> Folder Options
    13. On Folder Options dialoq select View tab
    1. Check at Hide extention… and Hide protected operating system file
    2. Click OK
    14. Right Click at Recycle bin. Then select Empty Recycle Bin to make sure the virus is deleted.
    That's all. You'll never see Hacked By Godzilla again. I Guarantee it'll work !

    1/5/07

    swasrayam.....parasrayam


    credits : cartoon@deepika.net.in

    1/4/07

    issue on NOIDA


    Thursday, January 4, 2007 (Noida):
    Uttar Pradesh PWD Minister Shiv Pal Yadav has indicated police negligence in the multiple murders of women and children by serial killers in Noida. A central inquiry team reached Noida on Thursday to carry out a probe. Reports say the two killers arrested last Friday were picked up and let off by police sometime in early 2006. The interrogation came after residents of Nithari village told police of their suspicious behaviour. The top police officer in the area during the time was Piyush Mordia. He is one of six policemen suspended on Wednesday for dereliction of duty. In August, the killers were listed in an FIR registered on the orders of a local court after their last known victim Payal disappeared. But since then police did nothing in the case, reports say. "Negligent officers have already been punished, other will also be punished soon," Yadav said in Noida on Thursday."The matter is already exposed, a CBI probe will only delay the results. We are not against a CBI probe."Such incidents happen in every state, but in this case we were able to expose it," said Yadav who is the brother of Chief Minister Mulayam Singh Yadav.In a surprise move police at Noida's Sector 20 station displayed posters containing pictures of children missing in the area in the past 18 months. The Supreme Court on Wednesday ruled out a CBI probe saying the National Human Rights Commission and the National Commission for Women are already examining the case.Narco-analysis testsThe killers Moninder Singh and his domestic servant Surinder Kohli will be put through a series of psychological tests at a forensic lab in Ahmedabad on Friday. The confessions under hypnosis are not admissible in court but police expect it will provide fresh clues about the crimes they committed. "For the psychological tests, the reliability and validity are very important and that is why it can take some time," Dr VH Patel, Assistant Director of the lab in Gandhinagar said. The lab was involved in tests on a serial killer, which helped resolved the murder of eight people in Ujjain in the past."It takes about a weeks time after the accused is examined. We record the EEG and other aspects and later carry out computer analysis of the same," Namrata Khopkar, the project officer at the lab explains. The lab also handled the Telgi case, Anara Gupta CD case and the brain mapping of ghutka barons JM Joshi and Dhariwal.

    12/30/06

    വിധി|Verdict

    Do you want the hanging of Sadam Hussein to be televised?
    തൂക്കിക്കൊന്നത് ശരിയാണോ? , അത് പ്രദര്‍ശിപ്പിക്കുന്നത് ശരിയാണോ?
    execution chamber and execution

    sadaaaam

    എന്തായി.................
    ബുഷ് വെറും ബുഷല്ല എന്നു മനസ്സിലായോ
    --------------------------------------------
    The measure of how civilised a society is by the manner adversaries are dealt with.
    We only need to look at the scandal of Guantanamo Bay to conclude the progress of the United States.
    In the case of former Iraqi president Sadam Hussein, rights groups have protested from the very start, the blatantly unfair conditions of the trial, thus questioning the fairness of the judicial process. In addition, concerns were raised over the use of anonymous witnesses and assasinations of lawyers from the defence team.
    Today’s guilty verdict with the penalty of death by hanging gives meaning to the phrase, “Two wrongs don’t make a right”.
    Even worse were the reactions from key governments such as the US, France and the UK who embraced the verdict.
    The lone voice, distinguished from this new world cabal, spoke softly:-
    Obviously we deplore the verdict of the death penalty against Saddam and one of his co-accused.We don’t consider it was a fair process. The court was not impartial. There were not adequate steps taken to protect the security of defence lawyers and witnesses…Every individual has a right to a fair trial, even people accused of the crimes of the magnitude that Saddam Hussein faced, and this has not been a fair trial.(MALCOLM SMART, DIRECTOR OF AMNESTY INTERNATIONAL’S MIDDLE EAST AND NORTH AFRICA PROGRAMME)
    This could have been the defining moment for Iraq. It could have been an example of how society can rectify the many wrongs in a just manner, where dictators and authoritarian leaders would one day face their well-deserved retribution.
    But first, justice must be seen to be served.
    This wasn’t the case for Sadam Hussein.