Wednesday, December 31, 2008

'Pay as you go' PC Scheme

Hey now Microsoft charge you as much you use their computer.
under their new scheme named as 'pay as you go' Microsoft going to provide you prepaid PC with fully loaded functionalities and software and charge as you use.
These PC will be built on technology called "FlexGo". FlexGo is a combination of hardware and software that enables PCs to be sold and used on a pay-as-you-go basis, much like wireless phones.
This new technology checks your hardware utilization and cost you accordingly.
Must say an excellent business strategy. [:P]

Windows 7 beta leaked!!!




The beta version of Microsoft's new OS Windows 7, which is expected to be officially released sometime in January'09 has been leaked on to the net through various torrent sites as a 2.43GB iso file. 

The torrent is one of the most popular currently with over 4000 seeders and around 8000 leechers. In fact, according to the thepiratebay.org tracker, the torrent has been downloaded about 45000 times!!! 


Tuesday, December 23, 2008

Glossary of PC Terms

1. PCI - PCI is an abbreviation for Peripheral Component Interconnect, which is a term used to describe a common connection interface for attaching computer peripherals to a PC's motherboard, or main circuit board. Most often, a PCI slot is used to connect sound and network cards.

2. AGP - AGP is an abbreviation for the term Accelerated Graphics Port, which, unlike the PCI connection, was used exclusively for connecting video cards to a PC. AGP has been phased out of contemporary PCs in favor of the much faster PCI Express.

3. Megapixel - A Megapixel is a unit of measurement which represents one million pixels — those tiny dots of color which make up an image.
Practically speaking, Megapixels represent the resolution, or size and quality, of an image, or an image capturing device such as a web cam or digital camera. The higher the number of Megapixels a camera can capture, the higher quality the images it produces will be.

Monday, December 22, 2008

IPTV

In order to compete against cable's triple play, telcommunication companies started offering TV programming through their high speed Internet connection. This makes it possible for telcos to offer the quadruple play, which is a combination of wireless phone, Internet, land-line phone and TV programming.
IPTV can be viewed in several ways. A computer may be used to reassemble protocol packets and convert them into a television signal that can be recognized by standard television set. Another option is the set top box, commonly used by cable companies. The set top box would be used in place of a computer and would do the same job a computer does.
But because IPTV is based on the Internet Protocol, it is sensitive to packet loss and delays if the IPTV connection is not fast enough and it also does not support HDTV at the moment.

Wednesday, December 17, 2008

Birthday Bash ( 2008 )

 
I am presenting all people out there... few snapshots of the best birthday party we had ever hosted.. and attended ...

http://picasaweb.google.com/chinmaysharma1987/BdayBash2008#

Sunday, December 14, 2008

Sony Ericsson is ready to come up with Android handsets


Almost three months back, when sony was ready to launch its most awaiting phone range Xperia with X1, shows interest towards google mobile OS Anderoid to be installed in it.
But at that time something wont worked up between both the companies and X1 was launched with Windows Mobile OS only.
Now on december 9, Sony led milestone in Mobile OS generation by accepting that they will make use of android in their forthcoming handsets.According to Sony research and development head, Android handsets are certain to have good sound quality and imaging functionality, courtsey Sony Ericsson's wealth of experience in these areas of mobile phone technology.

Saturday, December 13, 2008

Chrome out of "beta"


surprise surprise... google have done something that is never expected of them... they have taken one of their products out of its "beta" status within 3 months of its launch... yes... google chrome beta is no longer a beta... its just google chrome... this is a very surprising development especially since google is known for betas that last years rather than months... now i am just waiting for the day when the old gmail will lose the beta tag that it has been carrying along for over 4 years now!

Thursday, December 11, 2008

HTTP v/s HTTPS

The main difference between http:// and https:// is, It's all about keeping you secure

HTTP stands for HyperText Transport Protocol, which is just a fancy way of saying it's a protocol (a language, in a manner of speaking) for information to be passed back and forth between web servers and clients.

The important thing is the letter S which makes the difference between HTTP and HTTPS.

The S (big surprise) stands for "Secure". 
If you visit a website or webpage, and look at the address in the web browser, it will likely begin with the following: http://.

This means that the website is talking to your browser using the regular 'unsecure' language.

In other words, it is possible for someone to "eavesdrop" on your computer's conversation with the website.

If you fill out a form on the website, someone might see the information you send to that site.

This is why you never ever ever enter your credit card number in an http website!

But if the web address begins with https://, that basically means your computer is talking to the website in a secure code that no one can eavesdrop on.

You understand why this is so important, right?

If a website ever asks you to enter your credit card information, you should automatically look to see if the web address begins with https://.

If it doesn't, there's no way you're going to enter sensitive information like a credit card number!

Monday, December 1, 2008

Converting text to speech in linux

  1. Download festival, espeak or freetts.
  2. Install festival (Press Ctrl and D to exit it when it is running) or espeak.
  3. A default voice is included but you can get voices from FestVox, MBROLA project, CMU Arctic or Nitech HTS.
  4. Unpack them by typing for t in `ls` ; do tar xvf $t ; done.
  5. Install them
    sudo mkdir -p /usr/share/festival/voices/english/
    sudo mv * /usr/share/festival/voices/english/
    .
  6. Get a audio encoder.
  7. Go to the command line.
  8. In festival type (SayText "Hello and welcome to Wikihow")
  9. To see a list of installed voices type (voice.list). To switch to a voice, type (voice_us2_mbrola) for example.
  10. Or from the command line type echo "It's such a beautiful day! Why are you in front of the computer?" | festival --tts
  11. Convert.
  12. Type (quit) to quit.

Friday, November 28, 2008

Forcing Blue Screen on Windows

>> Boot up your PC.

>> Load windows in ADMINISTRATOR mode, a standard account (limited) will not work because you're modifying the system registry.

>> Open the Registry Editor. To do this hold down Windows button and press R and enter regedit and click OK.

>> In the left column in the Registry Editor, click on HKEY_LOCAL_MACHINE, then SYSTEM, then CurrentControlSet, then Services, then i8042prt, then Parameters.

>> Click Edit -> New -> DWORD Value or DWORD (32-bit) Value.

>> Call the new value (without the quotes) "CrashOnCtrlScroll".

>> Change the value to 1 (0x00000001)

>> Close the Registry Editor and restart your computer.

>> Hold down the right Control key then press the Scroll Lock key twice, then a blue screen should pop up

Last day of 5 sem

A warm Hi to all geeks from your one of the member ( Fre@k aka china-may :) )

This tym i knw all of you might be busy in preparing for ur last exam that is scheduled to be conducted tommorow at 2 pm. but this side i dont feel lyk studing n while having a break frm studies i thought why don't write a brief blog. I don't know abt rest of u but i personally thinks that in this only sem in JIIT , we spent our lyf as a collegiate of a technical institute. we have done each n every thing which we feels to do in the last 2.5 yr and never succeded as an eg. we had nt studied for our t-3 man ... its a gr8 achievment( barring ECE ppl frm geeks ;) xcept ambar n soni ), one of brave frnd runs to save his lyf frm 20 bikers chasing him with klaxon.

keeping our enjoyment n happiness aside, i think all of us had choose tht wht they gone b in their future. few of us joined MBA coaching, few joined for MS (barring me who knws wht to do but taking it casually again, god knws when i gonna tk my lyf seriously).

newayzz wht all round development that occur in geeks will continue to occur as i can proudly say "That each of us have dreams to change the WORLD n we all have started chasing our dreams" 

BEST OF LUCK for each n every little competition we face in our future.. :)

--> Fre@k (chinmaysharma1987@gmail.com) 
 

Saturday, November 22, 2008

GEEK PRIVELEGES....

Hey Geeks,
Being a geek u get the priveledge of not having to poy for music, movies ir rather any kind of entertainement. Here's a small walkthrough for u to start cashing into ur free coupons :

There's always peer to peer softwares like LIMEWIRE, BEARSHARE, IMESH etc etc. I personally prefer LIMEWIRE. Its Guenatella server is the best. Just go through its simple installation and voila huge resources are open for u.

Then there are portals like phazeddl.com, warez-bb.org, projectw.org, netmasterz.org etc.. Mail me if u wanna know more. Just register into these portals and u can get links to almost anything. Enjoys... Its a piece of cake...

Now for my favorite source: TORRENTS...
There are a number of softwares u can use to download torrents - utorrent, bit-torrent, azureus etc etc. My personal favorite azureus.. - There are a lotta personalisation options and a lotta power in your hands. U'll learn on the job. Just install azureus. 
Here's if u have any problems :

These above methods can also be used for getting latest softwares, ebooks etc...   So benefit from the stuff...

NJOY!!!!!!!!!!

Certified Ethical Hacker Program

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
To achieve the Certified Ethical Hacker Certification, you must pass the CEH exam 312-50
The examination consists of 150 questions. The duration of the test varies according to location and channel. The exam 312-50 offered through Prometric Prime is of four hour duration. 
For more information go to CEH
POST BY - mohityadav.07@gmail.com

Ethical Hacker

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.

The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival.

If hacking involves creativity and thinking 'out-of-the-box', then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of 'defense in depth'. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.

POST BY - [mohityadav.07@gmail.com]

Friday, November 14, 2008

Cool cellphone stuff

Cool things you can do with a cell phone in time of an emergency -

(1)The Emergency Number
If you find yourself out of coverage area, dial 112 and the mobile will search any existing network for you, and interestingly this number 112 can be dialed even if the keypad is locked.

(2)Have you locked your keys in the car?
Does you car have remote keys?
If you lock your keys in the car and the spare keys are at home, call someone at home on their cell phone from your cell phone.Hold your cell phone about a foot from your car door and have the person at your home press the unlock button, holding it near the
mobile phone on their end. Your car will unlock. Distance is no object.You can unlock the doors (or the trunk).

(3)Hidden Battery power
Imagine your cell battery is very low, you are expecting an important call and you don’t have a charger.Nokia instrument comes with a reserve battery.To activate, press the keys *3370# Your cell will restart with this reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge your cell next time.

(4) How to disable a STOLEN mobile phone?
To check your Mobile phone’s serial number,key in the following digits on your phone:
* # 0 6 #
A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. when your phone gets stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless.
You probably won’t get your phone back, but at least you know that whoever stole it can’t use/sell it either.If everybody does this, there would be no point in people stealing mobile phones.

POST - mohityadav.07@gmail.com

Get XP Product Key from the CD itself

Just explore the CD then open the folder I386 then open the file UNATTEND.TXT and scroll down to the last line, there you have a Product Key.

POST - mohityadav.07@gmail.com

Monday, November 10, 2008

Some Linux Distributions

  • Ubuntu Linux is now perhaps the best-known and most popular distribution of Linux. It is well designed, easy-to-use and has advanced the use of Linux as a desktop operating system more any other distribution.
  • Red Hat Linux has been around for a while and has acquired a reputation for consistency and reliability. It may not be the easiest to use or the most cutting-edge distribution, but it provides the type of high-quality support that is valued by companies, which made it the de-facto standard in corporate America.
  • Fedora Core is a Linux distribution sponsored by Red Hat. The objectives of Fedora Linux differ from those of Red Hat in that Fedora engages the Open Source community and is more experimental in nature.
  • Mandriva Linux has been very popular among new and home users. Installation is particularly user-friendly, and it runs by default the KDE Windows-like graphical desktop environment.
  • SuSE Linux is a serious alternative for Windows users, with solid, user-friendly installation and configuration tools. Its popularity is held back a little only by somewhat “un-Linux like” business practices, such as not providing ISO installation images for free download. They do, however, offer free FTP installation.
  • Lycoris is designed to be a user-friendly Linux distribution with particular emphasis on transitioning from Windows operating systems. Good choice for beginners.
  • Xandros Linux is a great choice for beginners who don’t mind to fork over a few dollars to get a worry free product. It is refined and reliable but with proprietary components that prevent re-distribution. No free download.
  • Linspire’s one-click web based software installation is quick and easy. An annual fee is charged for accessing Lindows software pool.
  • Knoppix provides an excellent run-from-CD solution, with its powerful hardware detection features and pain-free set-up. If desired, the system can be optionally installed on the hard disk to improve performance. It also comes with plenty of software.
  • Slackware Linux is a good opportunity to learn about the Linux operating system. It gives you back a long-lost sense of control and empowerment. No longer will you be at the mercy of graphical set-up wizards and mysterious background demons.
POST - Mohit Yadav [mohityadav.07@gmail.com]

Sunday, November 9, 2008

Highest Paying Certifications contd..... Part 3

11. MCITP - Microsoft Certified IT Professional (Enterpeise)
The MCIPT certification (Enterprise), or Microsoft Certified IT Professional - Enterprise Support comes in at number 11 on the list of highest paying technical certifications. (The MCITP Database is number 14, see below). The average MCITP Enterprise salary reported was $82,941.

12. Cisco CCSP - Cisco Certified Security Professional
Coming in at number 12 on the list of the highest paying technical certifications is the Cisco CCSP or Cisco Certified Security Professional. The average annual salary reported by CCSP holders is $80,000.

13. MCAD - Microsoft Certified Applications Developer
With an average annual salary of $79,444, the MCAD certification, or Microsoft Certified Application Developer certification, is number 13 on the list of highest paying certifications in technology.

14. MCITP - Microsoft Certified IT Professional (Database)
The MCIPT certification (Database), or Microsoft Certified IT Professional - Database comes in at number 14 on the list of highest paying technical certifications. (The MCITP Enterprise Support is number 11, above). The average MCITP Database salary reported was $77,000.

15. MCDBA - Microsoft Certified Database Administrator
The Microsoft Certified Database Administrator, or MCDBA, comes in at number 15 on the list of highest paying technical certifications. The average annual salary reported by MCDBA respondents is $76,960.

That would be alllll

MOHIT YADAV [mohityadav.07@gmail.com]

Highest Paying Certifications contd .....Part 2

6. Cisco CCVP - Certified Voice Professional
Number six on the list of the highest paying certifications is the Cisco CCVP or Cisco Certified Voice Professional. The average annual salary of CCVP respondents was $88,824.

7. ITIL v3 - ITIL Master
The ITIL v3 certification - the ITIL Master - came in 7th on the list of the highest paying technical certifications. The average annual salary for ITIL Master certification holders was $86,600.

8. MCSD - Microsoft Certified Solution Developer
The MCSD or Microsoft Certified Solution Developer certification pays an average of $84,522. This puts the MCSD certification at number 8 on the list of highest paying certifications in technology.

9. Cisco CCNP - Cisco Certified Network Professional
Cisco Certified Network professional or CCNP certification is number 9 on the list of highest paying technical certifications. The average annual salary reported by CCNP holders is $84,161.

10. Red Hat Certified Engineer
The Red Hat Certified Engineer (RHCE) came in at number 10 on the list of highest paying certifications. The average annual salary reported by Red Hat Certified Engineers is $83,692.

MOHIT YADAV [mohityadav.07@gmail.com]

Top 15 Highest Payiny certifications in Technology Industry

1. PMI Project Management Professional (PMP)

With an average annual salary of $101,695, the PMP certification from the Project Management Institute (PMI) organization tops the list of highest paying certifications.

2. PMI Certified Associate in Project Management (CAPM)

Next highest on the list of highest paying certifications is PMI's Certified Associate in Project Management (CAPM). The average annual salary for CAPM holders that were surveyed is $101,103.

3. ITIL v2 - Foundations

With an annual average salary of $95,415 the ITIL v2 Foundations certification came up third on the list of highest paying certifications. ITIL stands for the IT Infrastructure Library. The ITIL certification is designed to show expertise in ITIL service support and service delivery.

4. Certified Information Systems Security Professional (CISSP)

Coming in at a close 4th on the list of highest paying certifications is the Certified Information Systems Security Professional or CISSP certification from (ISC). The average annual reported salary was $94,018.

5. Cisco CCIE Routing and Switching

At $93,500 per year average annual salary, the Cisco CCIE Routing and Switching certification came in 5th on the list of highest paying certifications in the technology industry.

More to come on the next post.......

MOHIT YADAV [mohityadav.07@gmail.com]


Saturday, November 1, 2008

DreamSpark

DreamSpark is simple, it's all about giving students Microsoft professional-level developer and design tools at no charge so you can chase your dreams and create the next big breakthrough in technology - or just get a head start on your career. 
Dreamspark is going to be launch on november 5,for the same microsoft's chairman Mr. Bill Gates is coming to New Delhi at IITD 
To follow the further proceedings and get priviledged follow the Link

--> Fre@k

Incredible response

A young unwed girl discovers that she is pregnant. Scared, she confides this
'news' to her mother. Shouting, cursing, crying, the mother says, "Who was 
the pig that did this to you?

I want to know!" The girl picks up the phone and makes a call. Half an hour
later a Ferrari stops in front of their house; a mature and distinguished
man with gray hair and impeccably dressed in a very expensive suit steps out 
of it and enters the house.

He sits in the living room with the father, the mother and the girl, and
tells them: "Good Morning, your daughter has informed me of the problem.
However, I can't marry her because of my personal family situation, but I'll 
take responsibility.

If a girl is born I will bequeath her 2 retail stores, a townhouse, a beach
villa and a $1,000,000 bank account. If a boy is born, my legacy will be a
couple of factories and a $2,000,000 bank account. If it is twins, a factory 
and $1,000,000 each. However, if there is a miscarriage, what do you suggest
I do?"

At this point, the father, who had remained silent, places a hand firmly on
the man's shoulder and tells him, "You can try again!"

--> Fre@k 

Friday, October 31, 2008

Microsoft and Google now share more than colors


miWe all know only too well the Windows logo, that ubiquitous four-color flapping flag, which conveniently marks the Start Menu. In case you have not seen the trees because of the forest so far, the colors in question are red, green, blue and yellow. Coincidently, the same colors have been planted in Google's logo - the search engine - as well. However, there would be nothing too strange about this, if the similarity were restricted to the chromatic aspect alone.

 

But when it comes to Google's web browser, the resemblance between its logo and that from Windows tends to become more obvious, in that the former’s approach seems like a stylized clone of the latter’s logo. Since just taking a closer look at the two, side by side, will do the trick. It could be just us, but the only difference in there is the fact that Windows' fluttering flag has been rolled into a Google ball.

POST BY  - MOHIT [mohityadav.07@gmail.com]

Tuesday, October 28, 2008

Azure Pics

Windows Azure

Microsoft  announced a version of Windows that runs over the Internet from inside Microsoft's own data centers. Named Windows Azure, it's less a replacement for the operating system that runs on one's own PC than it is an alternative for developers, intended to let them write programs that live inside Microsoft's data centers as opposed to on the servers of a given business.

With the launch of Azure, Microsoft will find itself in competition with other providers of Internet storage and computing services including Amazon, Salesforce.com, and Rackspace.

The company itself plans to offer businesses the option of running over the Internet the kinds of software that have traditionally run on a company's own servers. Microsoft already sells its Exchange corporate e-mail software in this way.

POST BY - Mohit [mohityadav.07@gmail.com]


Monday, October 27, 2008

Plasma vs. LCD

The ADVANTAGES of Plasma over LCD are: 

1. Larger screen size availability. 

2. Better contrast ratio and ability to render deeper blacks. 

3. Better color accuracy and saturation. 

4. Better motion tracking (little or no motion lag in fast moving images). 

The DISADVANTAGES of Plasma vs LCD include: 

1. Plasma TVs are more susceptible to burn-in of static images. 

2. Plasma TVs generate more heat than LCDs, due to the need to light of phosphors to create the images. 

3. Does not perform as well at higher altitudes. 

4. Shorter display life span (about 30,000 hours or 8 hrs of viewing a day for 9 years) than LCD. However, screen life span is improving to as high as 60,000 hours due to technology improvements. 

POST BY - mohit [mohityadav.07@gmail.com]

Sunday, October 26, 2008

Command Line Stuff for Gtalk

Here’s a complete list of what you can do with Gtalk in run command prompt.

"C:\Program Files\Google\Google Talk\googletalk.exe" /parameter 

/nomutex: Open more than 1 Gtalk.
/autostart: Check the registry settings to see if Gtalk needs to be started. If the “Start automatically with Windows” option is unchecked, it won’t start.
/forcestart: Similar to /autostart, but forces Gtalk to start.
/S upgrade: Used when upgrading Google Talk
/register: registers Google Talk in the registry, includig the GMail Compose method.
/checkupdate: check for newer versions
/plaintextauth: uses plain authentication mechanism instead then Google’s GAIA mechanism. Used for testing the plain method on Google’s servers.
/nogaiaauth: disables GAIA authentication method. The same as above.
/factoryreset: set settings back to default.
/gaiaserver servername.com: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.
/mailto email@host.com: send an email with Gmail
/diag: start Google Talk in diagnostic mode

/log: probably has something to do with the diagnostic logging

POSTED BY - MOHIT YADAV [mohityadav.07@gmail.com]

Saturday, October 25, 2008

The Fedora Project

The Fedora Project is a Red Hat sponsored and community supported open source project. Its goal is the rapid progress of free and open source software and content. The Fedora Project makes use of public forums, open processes, rapid innovation, meritocracy, and transparency in pursuit of the best operating system and platform that free and open source software can provide.

You can help the Fedora Project community continue to improve Fedora if you file bug reports and enhancement requests. Refer to http://fedoraproject.org/wiki/BugsAndFeatureRequests for more information about bugs.

POST BY - MOHIT YADAV [mohityadav.07@gmail.com]

What's new in Ubuntu 8.10 [Intrepid Ibex] ??

  • GNOME 2.24.x. (GNOME 2.23.91 development version at the moment.)
    •  Nautilus finally has tab support and can now restore from Trash.
    •  File Roller ("Archive Manager") now uses p7zip to extract archives, so it supports ALZ, RZIP, CAB, TAR.7Z now also.
    • Empathy IM client and Hamster time tracker are two new applications that have been accepted into GNOME 2.24 "module suite."
    • When you try to log out, shutdown, etc. with (a) program(s) open, a warning pops up stating you must close all applications first.
    • Redesigned "Quit..." menu very similar to Mac OS X's (unlike before which was similar to XP.)
  • Complete theme overhaul. (With alpha 4, the default theme was switched back to Human(-Murrine.))
  • OpenOffice.org 3.0.x with MS Office 2007 new file support.
  • Linux kernel 2.6.27 images have been prepared and will be uploaded soon to Intrepid.
  • Compiz 0.7.7 development release from Git with tons of new effects.
  • Network Manager 0.7.x with better network configuring and 3G support.
  • Ability to sign in as Guest via (Fast) User Switcher panel applet.
  • Default Adobe Flash 10.x.x.x (RC now) in repos to enhance Flash experience.
  • Improved Jockey ("Hardware Manager") to additionally download printer drivers when needed.
  • Official USB installation support for converting ISO CD image files into USB-live compatible files. EDIT: Work has started! Package usb-creator just got in
  • Ubiquity (Ubuntu installer) layout redesign.
    • An "Automatically sign in" option added at the fifth step of Ubiquity (Ubuntu installer) "Who are you?."
  • Secret ~/Private folder to encrypt anything you place into it.
  • X.Org 7.4, still in development, with X Server 1.5 and Mesa 7.1, is included in Intrepid.

POSTED BY - MOHIT YADAV [mohityadav.07@gmail.com]

Saturday, October 18, 2008

How was 'Windows 7' named??

Mike Nash, vice president of Windows product management, has revealed the following details about the naming of the next Windows OS (Windows 7) to hit the market in order to pacify the raging debate over the counting methodology used by Microsoft to reach the number "7": 

"The very first release of Windows was Windows 1.0, the second was Windows 2.0, the third Windows 3.0," he said. "[But] here's where things get a little more complicated."

To reach the magic number, Microsoft tallied all Windows 9x versions -- Windows 95, 98, 98 SE and Millennium -- as Windows 4.0. By that reckoning, Windows 2000 is 5.0 and Vista is 6.0.

Windows XP -- still the most-used version of Windows by a wide margin -- was relegated to the minor 5.1 by Microsoft. "[When] we shipped Windows XP as 5.1, even though it was a major release, we didn't want to change code version numbers to maximize application compatibility," Nash explained.

To confuse matters further, Nash noted that even though the next Windows will carry the "7" moniker and is considered the seventh version of the operating system, its code will actually be marked as Windows 6.1. "We decided to ship the Windows 7 code as Windows 6.1, which is what you will see in the actual version of the product [when you run] cmd.exe," Nash said. 

QUITE confusing, eh?

Wednesday, October 15, 2008

Jokes for Geeks


  1. There are 10 types of people in the world - those who know binary and those who don't
  2. There are 10 types of people in the world - those who know binary and those who have friends
  3. Q: Did you hear about the Coder that got stuck in his shower for a week?
    A: The instructions on his shampoo said: Lather, rinse, repeat.
  4. 1f u c4n r34d th1s u r34lly n33d t0 g37 l41d
  5. If at first you don't succeed; call it version 1.0
  6. Q: How many programmers does it take to change a light bulb?
    A: None. It's a hardware problem.
  7. Q: How many IBM Processors does it take to execute a job?
    A: Four. Three to hold it down, and one to rip it's head off.
  8. Q: How can you tell if a geek is extroverted?
    A: He stares at your shoes.
  9. Windows: Just another pane in the glass
  10. Failure is not an option. It comes bundled with your Microsoft product.

Sunday, October 12, 2008

Samsung's M8800 Pixon Cellphone




Samsung officially announced its second 8-megapixel cell phone, the Pixon a.k.a M8800
(the first one was Samsung i8510 INNOV8)
In fact it looks very much like a compact camera from the rear, and its 3.2-inch screen bears the same TouchWiz interface as the Omnia. That screen is a 400 x 240 pixel touchscreen with touch keyboard and handwriting recognition, and the phone has AGPS, accelerometer and FM radio.
Quad-band GSM, tri-band HSDPA
• 107.9x54.6x14.9mm, 110 g
• 3.2-inch touch screen display (240 x 400 pixels)
• 8 megapixel camera, auto focus, face recognition with smile detection and blink detection, WDR (wide dynamic range), ASR (advanced shake reduction), GPS geotagging, ISO 1600, WVGA (720x480 pixels) and VGA (640 x 480 pixels) @30fps video recording
• Built-in GPS receiver
• Accelerometer
• DivX playback
• FM radio with RDS
• microSD card slot
• Bluetooth
• Landscape virtual QWERTY keyboard
• Handwriting recognition
• ShoZu integration - direct image and video upload
• Office document viewer

Interestingly, there's no mention of Wi-Fi in that list of specs. It'll be out early November (in Russia, at least) for around $800
Source:http://gizmodo.com/5055153/samsungs-m8800-pixon-cellphone-hits-with-8+megapixel-autofocus-camera

http://www.funponsel.com/blog/archives/2008/10/06/samsung-m8800-pixon-cell-phone/

posted by:
abhinav bhatia
("abhi")

Wednesday, October 8, 2008

Play Music in GTalk!


It's possible to broadcast music, MP3 etc... through Google Talk.

1. Unplug your microphone.
2. Double click on the speaker icon on the lower right corner of your screen. This will open up "Volume Control".
3. Select "Options" and then "Properties".
4. Then check the button next to "Recording" and click OK.
5. Now the recording control screen should be up. Select "Wave Out Mix".
6. Call your friend and he'll listen to the song you are playing on your computer.

Gr8 Android applications!

To those who are already itching to get the first Android-powered phone here’s a preview of some of the exciting applications that you will be getting with your Googlephone. Here are a few killer apps that are specifically made for Android:

  • cab4me

cab4me enables you to easily call a cab to any location worldwide. You do not need to know the number of the local cab company. You do not need to enter or even know the address you want to be picked up at. You do not need to place a call. With cab4me you can order a cab to your current location with a single click.

Killer features:

* Google Maps integration



* Uses the location awareness of Android (GPS and cell-based)


* Phone’s contact list integration to select pickup locations




  • CompareEverywhere

Shop smarter using your phone. Compare prices, read reviews, and connect with local stores with CompareEverywhere.

Killer features:

* Barcode scanner using the built-in camera



* Ability to connect across dozens of stores to compare prices


* Can use GPS to find nearby stores, and then call them directly, or find driving directions using Google Maps


Friday, October 3, 2008

Diffrence between Microsoft XP sp2 & sp3

1) Network Access Protection compatibility - This feature allows Windows XP machines to interact with the NAP feature in Windows Server 2008. This functionality is built into the RTM version of Windows Vista as well.

2) Product Key-less install option - As with Windows Vista, new XP with SP3 installs can proceed without entering a product key during Setup.

3) Kernel Mode Cryptographics Module - A new kernel module that "encapsulates several different cryptographic algorithms,".

4) "Black hole" router detection algorithm - XP gains the ability to ignore network routers that incorrectly drop certain kinds of network packets. This, too, is a feature of Windows Vista.

POST - MOHIT [mohityadav.07@gmail.com]

Friday, September 26, 2008

Adeona - Boon for Laptop Users

Adeona is the first Open Source system for tracking the location of a lost or stolen laptop that does not rely on a proprietary, central service. This means that you can install Adeona on your laptop and go — there's no need to rely on a single third party. 

Adeona is designed to use the Open Source OpenDHT distributed storage service to store location updates sent by a small software client installed on an owner's laptop. The client continually monitors the current location of the laptop, gathering information (such as IP addresses and local network topology) that can be used to identify its current location. The client then uses strong cryptographic mechanisms to not only encrypt the location data, but also ensure that the ciphertexts stored within OpenDHT are anonymous and unlinkable. At the same time, it is easy for an owner to retrieve location information.

To download click here

MOHIT [mohityadav.07@gmail.com]

Wednesday, September 24, 2008

GRE (Graduate Record Examination)


 

Yesterday I went to attend a conference organized by University of Southern California (USC), Viterbi School of Engineering at the Le Meridian Hotel, New Delhi to get some idea about what all is necessary for getting admitted to a good foreign university for Master of Sciences (M.S.).


I got many of my queries regarding admission in MS answered there. So, I thought why not share some of them with you people. Here they are…

Ques 1 : What are the cutoffs in GRE required by universities ?

Ans : There is no proper demarcation or cutoff below which they won’t give you admission, they only refer to this test to get a basic idea of your skills in quantitative analysis and vocabulary.

Ques 2 : What all do we need to submit with the application form?

Ans : You submit them all those articles which you think reflects your actual persona of being a good engineer and shows that you have some goals in your life. Basically your achievements which are related to your field or the field for which you are applying for at their university e.g. real life projects, research work, your certificates etc. BUT BEWARE: They will pass all your documents through rigorous scrutiny, so don’t put any vague information which you cannot prove. 

Ques 3 : Financial Aid or Sponsorship?

Ans : Many university don’t provide sponsorship, pupil themselves have to search for sponsors who will pay for them. Many Indian students get loans from banks for their studies and many Indian nationalized banks provide them this help at lower rates of interest too.

For reviewing fees and cost of living, surf any university’s site. They provide information for international students which will help you in calculating the required funds.

For more FAQ contact 

 

-- > Fre@k (chinmaysharma1987@gmail.com)


The Google Android phone is here!





On Tuesday, T-Mobile and Google announced the first-ever handset with Google's new Android operating system. 

Called the T-Mobile G1, it has both full touch-screen functionality, a QWERTY keyboard, a trackball for one-handed navigation, plus access to mobile Web applications like Google Maps Street View, Gmail, YouTube, and more. 

The G1 is available for pre-order now in the US in limited quantities fot T-Mobile registered users. 

It will be available in retail stores from October 22, for $179 with a two-year voice and data agreement. 

It will be available in the UK beginning November and across Europe in early 2009.

Tushar Bhatia (tushar1988@gmail.com)

Tuesday, September 23, 2008

Integrated vs. Dedicated graphics card

With integrated graphics (ie. no separate graphics card), the system has to dedicate some of its memory to graphics generation. Dedicated graphics cards have their own memory to drive the graphics, leaving the system memory to handle the computation.

Dedicated graphics cards are superior in almost every aspect. They are a must for any REAL gaming. They take much of the graphics work off the CPU, leaving the CPU to do other things.Integrated graphics are fine for pretty much everything but gaming and software such as Motion. They cost less and usually generate less heat. All graphics work is done on the CPU, possibly taking away valuable cycles from the processor.

MOHIT [mohityadav.07@gmail.com]

Saturday, September 20, 2008

Problem regarding error message of boot.vbs

some times when u restart or on your PC you gotta error message regarding couldnot locate boot.vbs file and no matter how hard u try to close it again popup.message in somecases projected like :


Actually this havoc is created by a virus known as boot.vbs and dxdlg.exe,it is a variant of trojan ...
steps to correct it are :
1. Go to Task Manager –> Processes and End the following processes in order:
1. dxdlg.exe
2. wscript.exe
2. Go to Start –> Run –> regedit –> Open the following key:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
3. In the right hand pane, select Userinit and delete everything except “C:\windows\system32\userinit.exe”
4. Make sure the processes wscript.exe and dxdlg.exe are not running.
1. Delete the following files
2. C:\Windows\System32\dxdlg.exe
3. C:\Windows\System32\boot.vbs
5. In your Windows drive, search for boot.vbs and delete all of them.
6. In your Windows drive, search for kinza.exe and delete all of them.
7. Disable System Restore and then Enable it again. Restart your computer.

----->>> Fre@k (Chinmaysharma1987@gmail.com)

Wednesday, September 17, 2008

DOS / Windows IP Command Lines

Display Connection Configuration: ipconfig /all

Display DNS Cache Info Configuration: ipconfig /displaydns

Clear DNS Cache: ipconfig /flushdns

Release All IP Address Connections: ipconfig /release

Renew All IP Address Connections: ipconfig /renew

Re-Register the DNS connections: ipconfig /registerdns

Change/Modify DHCP Class ID: ipconfig /setclassid
 
 Network Connections: control netconnections

Network Setup Wizard: netsetup.cpl

Test Connectivity: ping www.whatismyip.com

Trace IP address Route: tracert

Displays the TCP/IP protocol sessions: netstat

Display Local Route: route

Display Resolved MAC Addresses: arp

Display Name of Computer Currently on: hostname

Display DHCP Class Information: ipconfig /showclassid
 

Post by - MOHIT YADAV [mohityadav.07@gmail.com]

Monday, September 15, 2008

To fast your Adobe Reader

All of us who are using adobe reader to open pdf files faces a common problem that it require so much resources and time to open a normal pdf file.
But there is a way by which u can fasten ur reader ... just follow these steps 
step 1 : go to c:\program files\adobe\reader x.x\reader\plug_ins
step 2 : Cut all the content of the folder.
step 3 : paste it into c:\program files\adobe\reader x.x\reader\optional

Enjoy the fast speed of your adobe reader ..... [:)]

Fre@k --  (chinmay.jiit@gmail.com)

Friday, September 12, 2008

Ubuntu Certified Professional

Ubuntu Certified Professional (UCP) which was first introduced in May 2006 is a computer based examination about the Ubuntu operating system.

It is administered by the LPI [linux professional institute] foundation.

This cert is part of the LPIC [linux professional institute certification] as an added module/exam to LPI 117-101 and LPI 117-102 certs.

The LPI UCP exam code is LPI 117-199.

The testee needs to pass all three exams (117-101,117-102 and 117-199) in order to receive a UCP certification. The 101 and 102 exams may be taken before or after the UCP exam.

For further details go to ucp

POST BY - MOHIT [mohityadav.07@gmail.com]

Tuesday, September 9, 2008

Install Mac OS X Leopard on a PC....

Here are the things that you will need before Install Leopard on your PC…

  • The Patched DVD Image
  • The zip file containing the patch
  • One pen drive or USB Flash Drive formatted as FAT32

Well once you have all these you can go ahead and Install Leopard..

Step 1. Getting things ready   

  • Burn the DVD Image onto a Single Layer DVD-R using a software like Nero.
  • Format the USB Flash Drive and the drive label should be “Patcher” without the quotes. Please note it has to be “Patcher” only and nothing else for the patch to work when we apply it later.
  • Extract the Zip file and put its contents into the USB Flash Drive.
  • Now your USB Drive should contain a folder called “files”, if it doesn’t then check to see where you have gone wrong.

 

Step 2. Installing Leopard 

  • Now that you have the Patched DVD with you, you can now install Leopard. Pop in the DVD into the drive and boot into it by pressing F12 at the BIOS Prompt.
  • Boot into the DVD and the installer should now load. It take a while though, so be patient.
  • Select your Language and make sure you select Customize and you need to deselect all the packages that are displayed.
  • Leopard will now install. This can take a while, so go grab yourself a coffee.
  • It will ask you to Reboot, so go ahead and Reboot. Before rebooting make sure that USB Flash Drive is connected to the PC.

 

Step 3. Patching Leopard 

  • Now that you have got Leopard installed, you need to patch it. Before we do that Boot into the Leopard DVD like the way you did before.
  • Wait for the Darwin Bootloader to load. Once it loads up press F8. You should now see a prompt. Type -s and hit enter. The DVD will now load in Verbose mode. Watch for any errors. It should load without a problem because you have already installed Leopard.
  • Once the setup is loaded select your Language. Once done you should now be seeing the Welcome Screen. Once there navigate to Utilities-Terminal.
  • Once the terminal loads up, you now need to browse to your USB Drive, so follow the steps below, typing it exactly as it appears below in the Terminal.

    In the command line type the following as they appear here

    cd .. 
    cd .. 
    cd Volumes 
    cd Patcher 
    cd files

    Notice the space between cd and the 2 dots.

  • Now its the time to run the patcher to make sure Leopard will work on your PC. Type the following into the Terminal.

    ./9a581PostPatch.sh

  • The Patch should now run. You can answer Yes while removing the ACPUPowerManagement.kext
  • After the Script is done, you should now be able to Boot into Leopard after you restart.

 

Step 4. Congratulations! You’ve done the Impossible!

 

Well that was it. Please note this has not been extensively tested, so most of your Hardware like Sound, Network may not work. If something goes wrong for you or you want to help us, then please join the discussion over at OSX86Scene. If you noticed I haven’t posted the links to the Torrent that contains the DVD image and the zip. Well I haven’t posted them because I am sure the lawyers over at Apple are going to sue the hell out of me. If you wondering where you can find them, then head over to Demonoidand search for it.

Well here are few screenshots by Mac.nub over at the forums who could get Leopard working on his system.

LeopardLeopard

Some Updates and Clarifications :

  • This Hack works on Intel PC’s with atleast SSE3
  • You need to format your Leopard Partition to HFS+
  • Make Sure you install Leopard on MBR and not GUID or it won’t boot.
  • More Patched DVD’s from Uphuck, Netkas is in the works so it would be better if you wait for the polished releases to come out.
By:
     Harry ( Varun Prusty )