<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-596458025647659935</atom:id><lastBuildDate>Sun, 04 Jan 2026 05:02:00 +0000</lastBuildDate><category>Tweak-Guides</category><category>Gadgets</category><category>News</category><category>Virus Removal</category><category>Windows Apps</category><category>Vista Tweaks</category><category>Networking</category><category>Computer Hardware</category><category>Hacking</category><category>Electronics</category><category>Linux</category><category>TV Shows</category><category>GSM</category><category>Adsense</category><category>HTML</category><title>alltheweb</title><description>&quot;Raise yourself to help mankind&quot;</description><link>http://friedfly.blogspot.com/</link><managingEditor>noreply@blogger.com (Channi)</managingEditor><generator>Blogger</generator><openSearch:totalResults>203</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-6609568506864436767</guid><pubDate>Tue, 31 May 2011 06:12:00 +0000</pubDate><atom:updated>2011-05-30T23:13:28.047-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><title>‘Bubble Ball’ App Reaches 2M Downloads on iTunes : Game that Beats Angry Birds</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;b&gt;Ansca Mobile has announced that 14-year  old Robert Nay’s Bubble Ball has displaced Rovio’s popular Angry Birds  Seasons as the #1 free title in the iTunes App Store with 2 million  downloads, and counting.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://blogote.com/wp-content/uploads/2011/01/bubble_ball_gameplay_iphone.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;158&quot; src=&quot;http://blogote.com/wp-content/uploads/2011/01/bubble_ball_gameplay_iphone.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://blogote.com/wp-content/uploads/2011/01/bubbleball_game_ios.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;http://blogote.com/wp-content/uploads/2011/01/bubbleball_game_ios.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://blogote.com/wp-content/uploads/2011/01/bubble_ball_game_download.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;133&quot; src=&quot;http://blogote.com/wp-content/uploads/2011/01/bubble_ball_game_download.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt; &lt;br /&gt;
Bubble Ball is Robert&#39;s first foray into app development, according to  Ansca Mobile, the company whose Corona SDK he chose for developing the  app.&lt;br /&gt;
&lt;br /&gt;
According to Robert, the built-in physics engine was exactly what he needed to make his app a reality.&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;center&quot; class=&quot;article_ad&quot; style=&quot;margin: 10px 0pt 10px 15px;&quot;&gt;&lt;/div&gt;Bubble Ball, for those who haven’t yet tried it, is a physics-based puzzle game which has players guiding a ball to a goal.&lt;br /&gt;
&lt;br /&gt;
Various objects are provided for the player to work out a path for the ball so that it reaches its goal.&lt;br /&gt;
&lt;br /&gt;
Some objects can be manipulated more than others, while using gravity to  your advantage is obviously the key to beating every level.&lt;br /&gt;
&lt;br /&gt;
BubbleBall has been steadily climbing the charts since it was approved  in December, and was named the App of the Week in the Corona SDK app  showcase on January 9.&lt;br /&gt;
&lt;br /&gt;
Since then, its popularity has skyrocketed, culminating in its #1 spot on January 13, 2011, Ansca Mobile is proud to confirm.&lt;br /&gt;
&lt;br /&gt;
The Spanish Fork, UT 14-year old reportedly started work on BubbleBall with a competing development framework.&lt;br /&gt;
&lt;br /&gt;
As he progressed, he realized that Corona SDK&#39;s was more appropriate for  what he needed to create a game characterized by fun and addictive game  play, so he went with it instead.&lt;br /&gt;
&lt;br /&gt;
“We wholeheartedly congratulate Robert on his initial success and we are eagerly looking forward to his future creations,” said &lt;a href=&quot;http://www.anscamobile.com/#1&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Ansca Mobile&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
“Wait until he gets a little more experience under his belt and really  unleashes the power of Corona SDK! Congratulations Robert, well done!”  the makers of the SDK concluded.&lt;br /&gt;
&lt;br /&gt;
Robert was also featured on Good Morning America!. See him &lt;a href=&quot;http://abcn.ws/g8tEK6&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.observer.com/files/full/robert-nay.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;180&quot; src=&quot;http://www.observer.com/files/full/robert-nay.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://handheld.softpedia.com/get/Games/Puzzle/Bubble-Ball-112655.shtml&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;Download Bubble Ball (Free)&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: blue; font-family: Arial,Helvetica,sans-serif; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;i&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;News Source: softpedia.com&amp;nbsp;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;i&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;i style=&quot;color: #0b5394;&quot;&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;The following images shown are copyright by their respective owner...&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://friedfly.blogspot.com/2011/05/bubble-ball-app-reaches-2m-downloads-on.html</link><author>noreply@blogger.com (Channi)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-1023923137353352319</guid><pubDate>Mon, 17 May 2010 01:20:00 +0000</pubDate><atom:updated>2010-05-16T18:33:07.783-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><title>May 16, 2010: Crescent Moon and Planet Venus</title><description>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSASa2aJ5esGu31sjcEnaIr5gpfjNE0lpy4NbTdQ0MZfCDLOap_I_GIFRTANrq7700ZP62fUTaJl4Lmw0ss8109Rf7bZwQd-BA5Le4RUHfEulckhVHV1yJpwmwhlKJya3mw_6nmj2PHCeP/s1600/30271_404124147584_617857584_4154603_8199195_n.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 272px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSASa2aJ5esGu31sjcEnaIr5gpfjNE0lpy4NbTdQ0MZfCDLOap_I_GIFRTANrq7700ZP62fUTaJl4Lmw0ss8109Rf7bZwQd-BA5Le4RUHfEulckhVHV1yJpwmwhlKJya3mw_6nmj2PHCeP/s400/30271_404124147584_617857584_4154603_8199195_n.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5472043983908955202&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;span style=&quot;font-style: italic;font-size:85%;&quot; &gt;   Above is an actual view of the moon about 7:00+ P.M May 16, 2010 in Bicol, Pili, Camarines Sur...&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0HMS1lYhxlkT3HqY369k_0xWlzOhShjdEq21h0ariqbodUXLfIgKg12-YNBi2sSku6WFaAfTLe7jQEIxm2Eseolml7jhujLBaBDCcsih7VydGy9cYnknVoEWdg9qjZ75mQV3u5Tox3RsR/s1600/30271_404120752584_617857584_4154391_2920169_n.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0HMS1lYhxlkT3HqY369k_0xWlzOhShjdEq21h0ariqbodUXLfIgKg12-YNBi2sSku6WFaAfTLe7jQEIxm2Eseolml7jhujLBaBDCcsih7VydGy9cYnknVoEWdg9qjZ75mQV3u5Tox3RsR/s400/30271_404120752584_617857584_4154391_2920169_n.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5472043978519238850&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQ5Drr2W35uUFYBavijv_Vv-HxSPXod1oHclrGwHF8boqwb2kvoAfi2-Ia-OsOfzDTqntTgkS11sxO3RX0MYBbrEA36eQKWniqdM6JgdXBJHA57fGms5IBN0KRN9K61dlz1sh5LhTLuJRA/s1600/30271_404120752584_617857584_4154391_2920169_n.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQ5Drr2W35uUFYBavijv_Vv-HxSPXod1oHclrGwHF8boqwb2kvoAfi2-Ia-OsOfzDTqntTgkS11sxO3RX0MYBbrEA36eQKWniqdM6JgdXBJHA57fGms5IBN0KRN9K61dlz1sh5LhTLuJRA/s400/30271_404120752584_617857584_4154391_2920169_n.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5472043822415184226&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW7LqPfrD-pdEIaw95PVJ3ChQz0UEVDCc1IGm2rMhqXSVKSFxmsyulGIcVxYdlndEnZZkmme_2-hZYI0tr4eA925a0Zg8TCfGUxw0Dv-NWYO7IfIHzQgAHIM7VdSCg3ThYAEBOwMl-lBSZ/s1600/30271_404120747584_617857584_4154390_3166356_n.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW7LqPfrD-pdEIaw95PVJ3ChQz0UEVDCc1IGm2rMhqXSVKSFxmsyulGIcVxYdlndEnZZkmme_2-hZYI0tr4eA925a0Zg8TCfGUxw0Dv-NWYO7IfIHzQgAHIM7VdSCg3ThYAEBOwMl-lBSZ/s400/30271_404120747584_617857584_4154390_3166356_n.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5472043820272016402&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYA_beCub9dgPFRpiJiSXDemIudDNi4BhhcjlmSo3SJKciNtFjomNZW5Sdxb0_jlaZwe73vztLJhXt7b6gIWh_zxmdvkthSiIS-c974NSix3wIfBJ35ezjW0VT6mlQg5kwHil_3zZ4YsEo/s1600/30271_404120732584_617857584_4154388_7154695_n.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYA_beCub9dgPFRpiJiSXDemIudDNi4BhhcjlmSo3SJKciNtFjomNZW5Sdxb0_jlaZwe73vztLJhXt7b6gIWh_zxmdvkthSiIS-c974NSix3wIfBJ35ezjW0VT6mlQg5kwHil_3zZ4YsEo/s400/30271_404120732584_617857584_4154388_7154695_n.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5472043814453687986&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJw88QLCFQE2E3OkW1La-UnAGGSOlqHYyd1CWJbbaO1HCxhM7BfOFNhyphenhyphenSPX4FD4xbwebBBa6PwPEpN1ZfVBcn9Jm0D-WG10kUm3DMCOUGJuVLmPszq_5t57TWx2dr9iqqPgKKR24LBV4Pc/s1600/30271_404120722584_617857584_4154387_1715843_n.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJw88QLCFQE2E3OkW1La-UnAGGSOlqHYyd1CWJbbaO1HCxhM7BfOFNhyphenhyphenSPX4FD4xbwebBBa6PwPEpN1ZfVBcn9Jm0D-WG10kUm3DMCOUGJuVLmPszq_5t57TWx2dr9iqqPgKKR24LBV4Pc/s400/30271_404120722584_617857584_4154387_1715843_n.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5472043811140101058&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjaxaDwyYaYeEQAbnZxmnB9geDR8x4KmHA4xmzf1oflpP8hkhHHQ4QixWiRvMHuvPg435Fmadn_rIi8SQYLYdZqb0sZR06Z1SN34gu5yAVLYKkYMVGzr6ZplNWQcjvpeYWxeYggW0f2Uyo/s1600/30271_404120717584_617857584_4154386_6624150_n.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjaxaDwyYaYeEQAbnZxmnB9geDR8x4KmHA4xmzf1oflpP8hkhHHQ4QixWiRvMHuvPg435Fmadn_rIi8SQYLYdZqb0sZR06Z1SN34gu5yAVLYKkYMVGzr6ZplNWQcjvpeYWxeYggW0f2Uyo/s400/30271_404120717584_617857584_4154386_6624150_n.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5472043800306794354&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiQa7YJH137BfmYFf6P9BEjh2DMNwvtyGGsY4OdymPAmqe7F2-RogXfxRSQzSqP4XcdFeVbFPshpcGfpziV5Mzk9LvCUzssjFLtLEK5mBP0-C6XLHI8uLL2064S53PUOvZmTipmLTqmvVq/s1600/30271_404120712584_617857584_4154385_4721867_n.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiQa7YJH137BfmYFf6P9BEjh2DMNwvtyGGsY4OdymPAmqe7F2-RogXfxRSQzSqP4XcdFeVbFPshpcGfpziV5Mzk9LvCUzssjFLtLEK5mBP0-C6XLHI8uLL2064S53PUOvZmTipmLTqmvVq/s400/30271_404120712584_617857584_4154385_4721867_n.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5472043540859834322&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSc5J1dQGrYibFpGMGJwp_0_UFAJ4yrGYVJN1X3lJkaAAR-o6Js0CdSVHCmIRMg4yhbUMShosUKJENeCDTHiMZ5HPGdHTGjYJP2V0OZd4LUlkJ_4M_kUh9ZeaWu_EJLSSY0eOXLOywiUAN/s1600/30271_404120707584_617857584_4154384_8087837_n.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSc5J1dQGrYibFpGMGJwp_0_UFAJ4yrGYVJN1X3lJkaAAR-o6Js0CdSVHCmIRMg4yhbUMShosUKJENeCDTHiMZ5HPGdHTGjYJP2V0OZd4LUlkJ_4M_kUh9ZeaWu_EJLSSY0eOXLOywiUAN/s400/30271_404120707584_617857584_4154384_8087837_n.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5472043534958910626&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx3IaB886kBLwp_SNNHw6aylUvOHCubE66V27ekjiciP6AWVZ_Z-j5pWjp338B9b0Wkt7d1EtCwgxJcbt3J6fEzuOZGPhWUVuVelBchnmivgzL3h6hpKrCqVkt0003317XZTOK7Tql4KlA/s1600/30271_404120702584_617857584_4154383_3912984_n.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx3IaB886kBLwp_SNNHw6aylUvOHCubE66V27ekjiciP6AWVZ_Z-j5pWjp338B9b0Wkt7d1EtCwgxJcbt3J6fEzuOZGPhWUVuVelBchnmivgzL3h6hpKrCqVkt0003317XZTOK7Tql4KlA/s400/30271_404120702584_617857584_4154383_3912984_n.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5472043525857848066&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgqY_EJOYWYVM7gSAK5288_djcAS9o15Zu7wBl7WUuAz2V3FGTNYVord3UJtzwcDLSX7nIflXk2r8sQADW9O5eAj7SOuUYQCS8bTByCkRa7themBKulv1YCjP5VJX39jLWlyOknzWwps83/s1600/30271_404120697584_617857584_4154382_8110822_n.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 300px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgqY_EJOYWYVM7gSAK5288_djcAS9o15Zu7wBl7WUuAz2V3FGTNYVord3UJtzwcDLSX7nIflXk2r8sQADW9O5eAj7SOuUYQCS8bTByCkRa7themBKulv1YCjP5VJX39jLWlyOknzWwps83/s400/30271_404120697584_617857584_4154382_8110822_n.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5472043521609767042&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA630c0P8yXDu6WU-V-G9FzFErPZFiKvohjMMJ478WamcZZwIIUq4BoPfyUh7jVV86NsGTotmKv3tQikO_9JJnY5FEa1NoydRJ9kqOBP5YQ8In89_AHnfEfOQsdxueew2LDPMpOltU81AJ/s1600/30271_404120692584_617857584_4154381_5464473_n.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA630c0P8yXDu6WU-V-G9FzFErPZFiKvohjMMJ478WamcZZwIIUq4BoPfyUh7jVV86NsGTotmKv3tQikO_9JJnY5FEa1NoydRJ9kqOBP5YQ8In89_AHnfEfOQsdxueew2LDPMpOltU81AJ/s400/30271_404120692584_617857584_4154381_5464473_n.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5472043517425996066&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(51, 51, 255);&quot;&gt;Photos courtesy of: &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(51, 51, 255);font-size:85%;&quot; &gt;Blesilda Bascara-Livelo&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt; (facebook)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;About 10 hours Universal Time today. Unfortunately, this is not visible to North American or European observers, but we have not lost out entirely. Tonight, just as it gets dark, look to the western sky and, weather permitting, you should see a beautiful sight — bright Venus with the waxing crescent moon nearby. You should have no trouble finding either object as long as your skies are clear and you are facing west. Venus is a brilliant beacon to the lower right of the moon. Look early, as the two set less than three hours after the sun. By the way, the moon is currently said to be “waxing” in the sense that it is becoming a bit more full each evening.&lt;/span&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;If you are a regular reader of EarthSky Tonight, you may have noticed over the years that we have reported passages of the crescent moon near Venus several times. In fact, it is not that unusual. The moon passes somewhere near Venus about once a month, although we don’t always mention it simply because the conditions for observing are not always favorable. However, what you have not ever seen is a mention of the quarter moon, or gibbous moon, or full moon passing near Venus. Yet, we sometimes report when these phases of the moon pass near Mars, Jupiter and Saturn. So why is it that only the crescent moon ever passes Venus?&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;That is because Venus is “inferior.” No, I don’t mean that it is less valuable in any way. Used in this context, “inferior” means “lower than.” Venus is “lower than” the Earth relative to the sun. In other words, Venus is closer to the sun. Because of this, Venus never appears very far away from the sun in Earth’s sky. It oscillates back and forth from one side of the sun to the other, much like a race car moving from the left side to the right side of a circular track as we watch it from the stands. Thus, Venus sometimes appears in the evening twilight, and sometimes in the dawn twilight. The point is that it is never far from the sun. The farthest it can get from the sun (called an “elongation”) is slightly more than 47 degrees. Therefore, when the moon appears to pass Venus, it does so at about the same elongation from the sun. Since 47 and fewer degrees correspond to a crescent phase, only the crescent moon can appear to pass near Venus in the sky. The quarter moon is 90 degrees from the sun, and the full moon is 180 degrees, so you will never see those phases near Venus.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Mercury is an inferior planet as well, but its maximum elongation is only 28 degrees, so only a very thin crescent moon can ever appear near Mercury. On the other hand, Mars, Jupiter and Saturn are farther from the sun than Earth, making them “superior.” From time to time, they can appear at any angle from the sun, and the quarter or full moon phases can pass near them (sometimes even occulting them).&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;em&gt;Written by &lt;/em&gt;&lt;strong&gt;&lt;em&gt;Larry Sessions&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Source:&lt;span style=&quot;color: rgb(51, 102, 255);&quot;&gt;www.EarthSky.com&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: rgb(51, 102, 255);&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: rgb(51, 102, 255);&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://friedfly.blogspot.com/2010/05/may-16-2010-crescent-moon-and-planet.html</link><author>noreply@blogger.com (Channi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSASa2aJ5esGu31sjcEnaIr5gpfjNE0lpy4NbTdQ0MZfCDLOap_I_GIFRTANrq7700ZP62fUTaJl4Lmw0ss8109Rf7bZwQd-BA5Le4RUHfEulckhVHV1yJpwmwhlKJya3mw_6nmj2PHCeP/s72-c/30271_404124147584_617857584_4154603_8199195_n.jpg" height="72" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-6859855817151930613</guid><pubDate>Thu, 07 Jan 2010 12:09:00 +0000</pubDate><atom:updated>2010-01-07T04:17:06.004-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><title>Android Phones</title><description>&lt;table style=&quot;width: 321px; height: 2787px; text-align: left; margin-left: 0px; margin-right: auto; font-family: arial;&quot; border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;/tr&gt; &lt;tr&gt;&lt;td style=&quot;text-align: center;&quot; background=&quot;l.gif&quot; height=&quot;100%&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt; &lt;td bg=&quot;&quot; style=&quot;color: rgb(255, 255, 255);&quot; valign=&quot;top&quot;&gt;  &lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;color: rgb(102, 102, 102);font-size:85%;&quot; &gt;   &lt;b&gt;&lt;a class=&quot;exp&quot; href=&quot;http://www.androphones.com/nexus-one-android-phone-130.html&quot; title=&quot;Nexus One is here&quot;&gt;Nexus One is here&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Posted on: January 5, 2010 / Category: Android News&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: rgb(102, 102, 102);font-size:85%;&quot; &gt;&lt;center&gt;&lt;img src=&quot;http://www.androphones.com/pictures/nexus-one-android-phone-130.jpg&quot; /&gt;&lt;/center&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;color: rgb(102, 102, 102);font-size:85%;&quot; &gt;&lt;br /&gt;&lt;br /&gt;We knew and expected this day for almost a month now: the Nexus One is finally available. We won&#39;t bother you with much details now, which seems to be the fashion amongst tech blogs, that have multiple posts covering the release of the Nexus. Instead we&#39;ll point you to the official site where you can see the specks, pictures and even buy the phone if you want:&lt;br /&gt;&lt;a class=&quot;meniu&quot; href=&quot;http://www.androphones.com/nexus-one-android-phone-130.html&quot; title=&quot;Nexus One is here&quot;&gt;&lt;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://www.androphones.com/line.bmp&quot; width=&quot;336&quot; height=&quot;5&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;a class=&quot;exp&quot; href=&quot;http://www.androphones.com/xperia-x10-vs-motorola-droid-android-phone-129.html&quot; title=&quot;Xperia X10 VS Motorola DROID&quot;&gt;Xperia X10 VS Motorola DROID&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Posted on: December 16, 2009 / Category: &lt;leo_highlight style=&quot;border-bottom: 2px solid rgb(255, 255, 150); background: transparent none repeat scroll 0% 0%; cursor: pointer; display: inline; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;&quot; id=&quot;leoHighlights_Underline_0&quot; onclick=&quot;leoHighlightsHandleClick(&#39;leoHighlights_Underline_0&#39;)&quot; onmouseover=&quot;leoHighlightsHandleMouseOver(&#39;leoHighlights_Underline_0&#39;)&quot; onmouseout=&quot;leoHighlightsHandleMouseOut(&#39;leoHighlights_Underline_0&#39;)&quot; leohighlights_keywords=&quot;sony ericsson&quot; leohighlights_url=&quot;http%3A//thebrowserhighlighter.com/leonardo/highlights/keywords?keywords%3Dsony%20ericsson&quot;&gt;Sony Ericsson&lt;/leo_highlight&gt; Android Phones&lt;br /&gt;&lt;br /&gt;&lt;center&gt;&lt;img src=&quot;http://www.androphones.com/pictures/xperia-x10-vs-motorola-droid-android-phone-129.jpg&quot; /&gt;&lt;/center&gt;&lt;br /&gt;&lt;br /&gt;This is a battle of giants, basically the best two Android phones face eachother &lt;i&gt;(at least until the Nexus One crashes the party)&lt;/i&gt;. I bet when Xperia X10 will come out it will be hard to chose between it and the Motorola DROID that&#39;s why a good comparisson is needed.&lt;br /&gt;&lt;a class=&quot;meniu&quot; href=&quot;http://www.androphones.com/xperia-x10-vs-motorola-droid-android-phone-129.html&quot; title=&quot;Xperia X10 VS Motorola DROID&quot;&gt;&lt;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://www.androphones.com/line.bmp&quot; width=&quot;336&quot; height=&quot;5&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;a class=&quot;exp&quot; href=&quot;http://www.androphones.com/htc-legend-android-phone-128.html&quot; title=&quot;HTC Legend&quot;&gt;HTC Legend&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Posted on: December 14, 2009 / Category: HTC Android Phones&lt;br /&gt;&lt;br /&gt;&lt;center&gt;&lt;img src=&quot;http://www.androphones.com/pictures/htc-legend-android-phone-128.jpg&quot; /&gt;&lt;/center&gt;&lt;br /&gt;&lt;br /&gt;It&#39;s not hard from the picture above that the Legend is actually the HTC Hero 2. Some big improvements expect the Hero fans, like metalic frame, AMOLED display, optical mouse, LED flash and a 600MHz processor.&lt;br /&gt;&lt;a class=&quot;meniu&quot; href=&quot;http://www.androphones.com/htc-legend-android-phone-128.html&quot; title=&quot;HTC Legend&quot;&gt;&lt;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://www.androphones.com/line.bmp&quot; width=&quot;336&quot; height=&quot;5&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;a class=&quot;exp&quot; href=&quot;http://www.androphones.com/motorola-titanium-android-phone-127.html&quot; title=&quot;Motorola Titanium&quot;&gt;Motorola Titanium&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Posted on: December 14, 2009 / Category: Motorola Android Phones&lt;br /&gt;&lt;br /&gt;&lt;center&gt;&lt;img src=&quot;http://www.androphones.com/pictures/motorola-titanium-android-phone-127.jpg&quot; /&gt;&lt;/center&gt;&lt;br /&gt;&lt;br /&gt;Another Motorola Android phone emerges: the Zeppelin we saw in the leaked roadmap a while ago is heading for China Mobile, under the name XT800, at least initially. That&#39;s interesting but we are more interested if it comes to US or Worldwide. And it looks it will.&lt;br /&gt;&lt;a class=&quot;meniu&quot; href=&quot;http://www.androphones.com/motorola-titanium-android-phone-127.html&quot; title=&quot;Motorola Titanium&quot;&gt;&lt;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://www.androphones.com/line.bmp&quot; width=&quot;336&quot; height=&quot;5&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;a class=&quot;exp&quot; href=&quot;http://www.androphones.com/pictures-of-nexus-one-android-phone-126.html&quot; title=&quot;Nexus One Pictures&quot;&gt;Nexus One Pictures&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Posted on: December 14, 2009 / Category: HTC Android Phones&lt;br /&gt;&lt;br /&gt;&lt;center&gt;&lt;img src=&quot;http://www.androphones.com/pictures/pictures-of-nexus-one-android-phone-126.jpg&quot; /&gt;&lt;/center&gt;&lt;br /&gt;&lt;br /&gt;The folks at Engadget managed to get hold of some new, more detailed pictures of the so called &quot;Google Phone&quot; better known as Nexus One. Beside the pictures we have some more informations on the phone.&lt;br /&gt;&lt;a class=&quot;meniu&quot; href=&quot;http://www.androphones.com/pictures-of-nexus-one-android-phone-126.html&quot; title=&quot;Nexus One Pictures&quot;&gt;&lt;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://www.androphones.com/line.bmp&quot; width=&quot;336&quot; height=&quot;5&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;a class=&quot;exp&quot; href=&quot;http://www.androphones.com/htc-nexus-one-android-phone-125.html&quot; title=&quot;HTC Nexus One&quot;&gt;HTC Nexus One&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Posted on: December 13, 2009 / Category: HTC Android Phones&lt;br /&gt;&lt;br /&gt;&lt;center&gt;&lt;img src=&quot;http://www.androphones.com/pictures/htc-nexus-one-android-phone-125.jpg&quot; /&gt;&lt;/center&gt;&lt;br /&gt;&lt;br /&gt;If you followed the Android news lately you might have noticed rumors of an actual Google Phone, developed by HTC for Google, network unlocked, large screen and high specs. The phone was distributed yesterday to Google employees for intensive testing and many shared the news on Twitter.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 153, 0);&quot;&gt;www.androphones.com&lt;/span&gt;&lt;br /&gt;&lt;a class=&quot;meniu&quot; href=&quot;http://www.androphones.com/htc-nexus-one-android-phone-125.html&quot; title=&quot;HTC Nexus One&quot;&gt;&lt;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;input id=&quot;gwProxy&quot; type=&quot;hidden&quot;&gt;&lt;!--Session data--&gt;&lt;input onclick=&quot;jsCall();&quot; id=&quot;jsProxy&quot; type=&quot;hidden&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot; id=&quot;refHTML&quot;&gt;&lt;/div&gt;&lt;input id=&quot;gwProxy&quot; type=&quot;hidden&quot;&gt;&lt;!--Session data--&gt;&lt;input onclick=&quot;jsCall();&quot; id=&quot;jsProxy&quot; type=&quot;hidden&quot;&gt;&lt;div style=&quot;font-family: arial;&quot; id=&quot;refHTML&quot;&gt;&lt;/div&gt;&lt;input id=&quot;gwProxy&quot; type=&quot;hidden&quot;&gt;&lt;!--Session data--&gt;&lt;input onclick=&quot;jsCall();&quot; id=&quot;jsProxy&quot; type=&quot;hidden&quot;&gt;&lt;div id=&quot;refHTML&quot;&gt;&lt;/div&gt;&lt;input id=&quot;gwProxy&quot; type=&quot;hidden&quot;&gt;&lt;!--Session data--&gt;&lt;input onclick=&quot;jsCall();&quot; id=&quot;jsProxy&quot; type=&quot;hidden&quot;&gt;&lt;div id=&quot;refHTML&quot;&gt;&lt;/div&gt;&lt;input id=&quot;gwProxy&quot; type=&quot;hidden&quot;&gt;&lt;!--Session data--&gt;&lt;input onclick=&quot;jsCall();&quot; id=&quot;jsProxy&quot; type=&quot;hidden&quot;&gt;&lt;div id=&quot;refHTML&quot;&gt;&lt;/div&gt;</description><link>http://friedfly.blogspot.com/2010/01/androidphonescom.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-6522368710892264715</guid><pubDate>Tue, 06 Oct 2009 11:36:00 +0000</pubDate><atom:updated>2009-10-06T04:39:53.385-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networking</category><category domain="http://www.blogger.com/atom/ns#">Windows Apps</category><title>Free Anonymous Surfing</title><description>&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; Operator&lt;/span&gt; is my clear first choice, a portable version of Opera with an included and well integrated Tor engine that uses the free Tor network. OperaTor is small and relatively fast, using just 6Mb of memory for it’s Tor engine, 2Mb for the Polipo caching proxy, 3Mb for the OperaTor loader and 18Mb for Opera. In my experience, OperaTor is by far the fastest browser, even with multiple proxies on the Tor network so that the browsing trail is frequently changing for greater security. Some people don&#39;t like the fact that OperaTor is not released with source code available (at least not that we have yet located) which may influence the choice in whether to use it or not. I believe that unless a user is proficient in programming, or at least reading the development language of any particular application, this becomes rather irrelevant, unless some amount of comfort or security might be perceived in knowing that source is available and others might be checking it even if the user of the application can not read it personally. Even closed source projects that become popular generally receive enough user and peer scrutiny that most problems would be quickly exposed.&lt;/span&gt;&lt;/span&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img src=&quot;http://www.techsupportalert.com/files/images/JonDo_thumb.png&quot; alt=&quot;JonDo anonymous network&quot; align=&quot;right&quot; height=&quot;141&quot; width=&quot;150&quot; /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span&gt;&lt;strong&gt;JonDo&lt;/strong&gt;&lt;/span&gt;&lt;span&gt; (previously  known &lt;/span&gt;&lt;span&gt;as &lt;/span&gt;&lt;b&gt;&lt;span&gt;JAP&lt;/span&gt;&lt;/b&gt;&lt;span&gt;) is my second choice and is in some ways a more flexible option, in that it is simply a Java application that performs the role of a local (PC based) proxy server that redirects browser requests via the&lt;/span&gt;&lt;span&gt; JonDo (formerly JAP) network. This allows the user to configure their choice of any browser rather than requiring a change to Opera. Unfortunately, being Java based means that the application becomes somewhat bloated, requiring 54Mb of memory just for the Java JonDo application, as well as another few Mb for the JAP engine, and then whatever additional is required for the web browser of choice. JonDo does have quite a nice GUI display which shows the strength of the anonymity based on the number of anonymizing proxy servers, and takes care of managing the random proxy changes for greater anonymity. A commercial service known as &lt;/span&gt;&lt;b&gt;&lt;span&gt;JonDonym&lt;/span&gt;&lt;/b&gt;&lt;span&gt; has been introduced which uses dedicated servers to provide higher speeds, higher levels of availability and more security along with support for chat, ftp and ssh in addition to web browsing. Another offering from the commercial JonDonym group is &lt;/span&gt;&lt;b&gt;&lt;span&gt;JonDoFox&lt;/span&gt;&lt;/b&gt;&lt;span&gt;, a customized version of Firefox with JonDo code embedded along with other anonymizing optimizations. Unfortunately, JonDo not being a network like Tor is prone to some limitations in terms of the numbers of free servers, and some subsequent downtimes may be more likely with the smaller server base.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img src=&quot;http://www.techsupportalert.com/files/images/Vidalia-2_thumb.png&quot; alt=&quot;Vidalia using Tor anonymizing network&quot; align=&quot;right&quot; height=&quot;193&quot; width=&quot;150&quot; /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span&gt;&lt;strong&gt;Vidalia&lt;/strong&gt;&lt;/span&gt;&lt;span&gt; is my third choice, a close match to JonDo in that it is quite a bit lighter in memory use and generally feels faster, but may not have the same level of anonymizing as JonDo. Vidalia is another integrated package using a combination of Privoxy and a Tor engine to connect to the Tor network, but it offers many new features. As with JonDo, Vidalia behaves as a local proxy for use by any browser, but it also provides configurations allowing it to run either as a simple standalone process or as a Windows service (for security and performance reasons, among others). Vidalia allows the user to participate in the anonymizing process by becoming a Tor Relay to help censored users in a similar way to becoming a BitTorrent relay, and a live realtime facility is available showing a map of the earth with lines representing connections to the Tor server participants. Vidalia uses 24 - 32Mb of memory, with an additional 4Mb used for Privoxy and another 16.5Mb for the Tor engine. One initially confusing aspect of Vidalia is that it provides a configuration access through port 9051, but it is not immediately obvious that Privoxy is listening on port 8118. Browsers using the Vidalia bundle must be configured to use the Privoxy port 8118 as the proxy server, not port 9051. Like JonDo, the Vidalia/Privoxy&lt;/span&gt;&lt;span&gt; combination constantly  changes proxy servers to mask the trail to provide greater  anonymity.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Whatever your preference, both JAP and Tor networks offer a level of secrecy that is better than many commercial systems, though they are not watertight. Expect your surfing to slow down, in some case substantially, because you&#39;ll be relayed through a chain of servers, all heavily impacted by BitTorrent users seeking to hide from the RIAA. Note: the latest V5 release of JAP now allows Tor users to use JAP as a software access point to the Tor network.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img src=&quot;http://www.techsupportalert.com/files/images/XeroBank_thumb.png&quot; alt=&quot;XeroBank Firefox based browser&quot; align=&quot;right&quot; height=&quot;114&quot; width=&quot;150&quot; /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span&gt;The &lt;/span&gt;&lt;span&gt;&lt;strong&gt;XeroBank Browser&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span&gt; (previously known as TorPark) provides a new customized version of the Firefox browser configured to work with the free Tor anonymizing service, or with a subscription service for higher speeds using dedicated servers, and other features. Firefox users may feel more comfortable with XeroBank, as it is based on Firefox, but also need not make any changes at all if they make use of either the JonDo or Vidalia bundles to access the Tor engine other than to set the proxy server, and of course, manual cleanup of the cache, cookies and browsing history after use. XeroBank claims to have many advanced features, but for the average user most of these may not be apparent, unless the subscription service is used. While the XeroBank browser is free to use on the Tor network, the XeroBank web site promotes the use of their subscription-based account. During installation, the XeroBank Browser offers the choice of using either the commercial XeroBank Client or the free Tor service. &lt;b&gt;Caution!&lt;/b&gt; Some antivirus scanners report trojan infected code in the XeroBank download. Use &lt;/span&gt;&lt;b&gt;&lt;span&gt;http://jotti.org&lt;/span&gt;&lt;/b&gt;&lt;span&gt; to verify all downloads, and use XeroBank and all other applications with caution, but be aware that some of the virus scanners used by jotti.org may also be overly zealous in their reporting of infections. Some claimed virus or trojan infections in various applications are no more than firewall detection, or software product key reporting capabilities mis-diagnosed by the scanner as a potential threat.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; The downside of XeroBank as contrasted with using JonDo or Vidalia, is that you would need to use XeroBank for anonymous browsing and your regular browser for other surfing. Using JonDo or Vidalia, you can use the browser of your choice, and just reconfigure to use the proxy when you want to anonymous surfing. This won&#39;t automatically clean out all other personal data (cache, history, cookies etc.) when the application is shut down, which OperaTor and XeroBank do.&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;For all anonymizing services, check that you are running in anonymous mode by first browsing to one of many servers which reports your IP address, for example &lt;b&gt;http://www.whatismyip.com/&lt;/b&gt; and take note of your IP address. Reconfigure your browser to make use of the anonymizing service, and reload / refresh the browser and verify that the reported IP address has changed. Some IP reporting servers will also tell you which country, and even which city you now appear to be connecting from.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Most of the services reviewed are able to run directly from a USB flash drive if the executables are simply copied as is from their installation directories. This works really well, just plug your flash drive into any PC with a USB port, launch both the anonymizing proxy software and a browser, set the browser to redirect via the anonymizer and you will be in business. In the case of both OperaTor and XeroBank, all you need to is launch the browser from your flash drive and you will be ready to start browsing.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img src=&quot;http://www.techsupportalert.com/files/images/QEMU-XB-Machine_thumb.png&quot; alt=&quot;XeroBank XBMachine Live CD running under QEMU virtual machine&quot; align=&quot;right&quot; height=&quot;116&quot; width=&quot;150&quot; /&gt;While some &#39;LiveCD&#39; applications such as &lt;strong&gt;XeroBank Machine&lt;/strong&gt;&lt;b&gt; &lt;/b&gt;and &lt;strong&gt;Incognito Live CD&lt;/strong&gt; have been created and may provide similar functions, they mostly seem to be currently released in various stages of alpha or beta test versions and have bugs or limitations. For example, the XeroBank Machine provides two options. You can either run the xBMachine.exe from a Windows prompt which starts a QEMU virtual machine and then runs a GenToo Linux kernel, or by booting from a &quot;Live CD&quot;. This Live CD boots the same customized GenToo Linux environment from CD without any Windows involvement. In simple terms, both xBMachine options simply provide a different &quot;hardened&quot; OS platform to run the Firefox based XeroBank Browser. Is LiveCD really useful? To some people, yes, not to me. It does mean that like SandBoxie, your guest operating system is protected from malicious web sites via your browsing, and when you stop the QEMU virtual machine or reboot the PC from hard disk rather than CD all traces are removed. I am a Unix / Linux geek so I am totally at home with them, but for the average person, I suspect the LiveCD and QEMU based options will provide a confusing level of complexity that will just interfere with their browsing and desire to be safe. Not much can beat truly safe browsing habits, whatever browser or add-on tools you use. xBMachine is a &lt;b&gt;&lt;u&gt;&lt;b&gt;380Mb zip file download&lt;/b&gt;&lt;/u&gt;,&lt;/b&gt; which unpacked yields a 391Mb ISO image to create a CD as well as another 10Mb or so of the QEMU environment. The QEMU hosted browser uses &lt;strong&gt;&lt;u&gt;292+Mb of &lt;/u&gt;&lt;/strong&gt;&lt;img src=&quot;http://www.techsupportalert.com/files/images/QEMU-XB-Machine-startup_thumb.png&quot; alt=&quot;XeroBank XBMachine Live CD running under QEMU virtual machine&quot; align=&quot;right&quot; height=&quot;116&quot; width=&quot;150&quot; /&gt;&lt;strong&gt;&lt;u&gt;memory&lt;/u&gt;&lt;/strong&gt;, requires the ISO image present, and&lt;b&gt; &lt;u&gt;&lt;b&gt;took more than 5 minutes to load&lt;/b&gt;&lt;/u&gt; &lt;/b&gt;and be ready for use on a 1.8Ghz dual core Intel PC with 1Gb or memory. It provides a Linux X-Windows GUI with a profile configuration, a network configuration, xBBrowser, e-mail, Pidgin instant messenger, terminal and an option to configure for the paid subscription network. I don&#39;t know about you, but I am not willing to wait 5 or more minutes and have close to 300Mb of disk space tied up in a browser that took another minute or two to load, and then in my case never managed to connect out anyway. For those who feel that having source available makes a better product, go ahead and try to download the XeroBank source. All of the links gave me a 7Mb source zip file which was corrupted and would not open. Would this give you &quot;open source available&quot; feelings of security? I don&#39;t think so.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;I&#39;m a freeware and open source fan, I can read and write programs, but not when the source file is corrupted, and I am not likely to start poring through tens of thousands of lines of code even if I could unpack the source. Even if it does unpack, how do we know that exact source was used to build the tool, and not another set of customized source with a built in Trojan or spyware? The reality is that we really don&#39;t know unless we both inspect the source code and then compile it and compare the distributed executable.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;One final comment on anonymizing, your browsing activities will never be 100% secure and guaranteed to be anonymous. It will be very difficult for anyone to trace you while browsing through the Tor network, except as reported in&lt;b&gt; &lt;b&gt;the Tor wiki&lt;/b&gt;, &lt;/b&gt;&quot;when you access pages that use Java, Javascript, Macromedia Flash and Shockwave, QuickTime, RealAudio, ActiveX controls, and VBScript are all known to be &lt;strong&gt;able to access local information about your operating system&lt;/strong&gt; and local network. These technologies will work over proxies and &lt;strong&gt;can tunnel the information back to their source.&quot;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial; text-align: center;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(0, 153, 0);&quot;&gt;http://www.techsupportalert.com&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://friedfly.blogspot.com/2009/10/free-anonymous-surfing.html</link><author>noreply@blogger.com (Channi)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-335419955791698162</guid><pubDate>Fri, 14 Aug 2009 10:03:00 +0000</pubDate><atom:updated>2009-08-14T03:06:22.518-07:00</atom:updated><title>In Loving Memory of: LES PAUL</title><description>&lt;h1 style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The World Has Lost a Remarkable Innovator and Musician: Les Paul Passes Away at 94&lt;/span&gt;&lt;/h1&gt;  &lt;div style=&quot;font-family: arial;&quot; id=&quot;article-info&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;08.13.2009&lt;/span&gt;&lt;/div&gt; &lt;div style=&quot;font-family: arial;&quot; id=&quot;article-text&quot;&gt;&lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.gibson.com/Files/aaInternationalImages/lespauldiesat94.jpg&quot; width=&quot;670&quot; align=&quot;middle&quot; height=&quot;284&quot; /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;New York, NY&lt;/strong&gt;...August 13, 2009...Les Paul, acclaimed guitar player, entertainer and inventor, passed away today from complications of severe pneumonia at White Plains Hospital in White Plains, New York, surrounded by family and loved ones. He had been receiving the best available treatment through this final battle and in keeping with his persona, he showed incredible strength, tenacity and courage. The family would like to express their heartfelt thanks for the thoughts and prayers from his dear friends and fans. Les Paul was 94.  &lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;One of the foremost influences on 20th century sound and responsible for the world&#39;s most famous guitar, the Les Paul model, Les Paul&#39;s prestigious career in music and invention spans from the 1930s to the present. Though he&#39;s indisputably one of America&#39;s most popular, influential, and accomplished electric guitarists, Les Paul is best known as an early innovator in the development of the solid body guitar. His groundbreaking design would become the template for Gibson&#39;s best-selling electric, the Les Paul model, introduced in 1952. Today, countless musical legends still consider Paul&#39;s iconic guitar unmatched in sound and prowess. Among Paul&#39;s most enduring contributions are those in the technological realm, including ingenious developments in multi-track recording, guitar effects, and the mechanics of sound in general. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span id=&quot;ArticleViewer&quot;&gt;&lt;p&gt;Born Lester William Polsfuss in Waukesha, Wisconsin on June 9, 1915, Les Paul was already performing publicly as a honky-tonk guitarist by the age of 13. So clear was his calling that Paul dropped out of high school at 17 to play in Sunny Joe Wolverton&#39;s Radio Band in St. Louis. As Paul&#39;s mentor, Wolverton was the one to christen him with the stage name “Rhubarb Red,&quot; a moniker that would follow him to Chicago in 1934. There, Paul became a bona fide radio star, known as both hillbilly picker Rhubarb Red and Django Reinhardt-informed jazz guitarist Les Paul. His first recordings were done in 1936 on an acoustic—alone as Rhubarb Red, as well as backing blues singer Georgia White. The next year he formed his first trio, but by 1938 he&#39;d moved to New York to begin his tenure on national radio with one of the more popular dance orchestras in the country, Fred Waring&#39;s Pennsylvanians. &lt;/p&gt; &lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.gibson.com/Files/aaInternationalImages/TheLog1.jpg&quot; width=&quot;200&quot; align=&quot;left&quot; height=&quot;301&quot; /&gt;Tinkering with electronics and guitar amplification since his youth, Les Paul began constructing his own electric guitar in the late &#39;30s. Unhappy with the first generation of commercially available hollowbodies because of their thin tone, lack of sustain, and feedback problems, Paul opted to build an entirely new structure. “I was interested in proving that a vibration-free top was the way to go,&quot; he has said. “I even built a guitar out of a railroad rail to prove it. What I wanted was to amplify pure string vibration, without the resonance of the wood getting involved in the sound.&quot; With the good graces of Epiphone president Epi Stathopoulo, Paul used the Epiphone plant and machinery in 1941 to bring his vision to fruition. He affectionately dubbed the guitar “The Log.&quot;  &lt;/p&gt; &lt;p&gt;Les Paul&#39;s tireless experiments sometimes proved to be dangerous, and he nearly electrocuted himself in 1940 during a session in the cellar of his Queens apartment. During the next two years of rehabilitation, Les earned his living producing radio music. Forced to put the Pennsylvanians and the rest of his career on hold, Les Paul moved to Hollywood. During World War II, he was drafted into the Army but permitted to stay in California, where he became a regular player for Armed Forces Radio Service. By 1943 he had assembled a trio that regularly performed live, on the radio, and on V-Discs. In 1944 he entered the jazz spotlight—thanks to his dazzling work filling in for Oscar Moore alongside Nat King Cole, Illinois Jacquet, and other superstars —at the first of the prestigious Jazz at the Philharmonic concerts.  &lt;/p&gt; &lt;p&gt;By his mid-thirties, Paul had successfully combined Reinhardt-inspired jazz playing and the western swing and twang of his Rhubarb Red persona into one distinctive, electrifying style. In the Les Paul Trio he translated the dizzying runs and unusual harmonies found on Jazz at the Philharmonic into a slower, subtler, more commercial approach. His novelty instrumentals were tighter, brasher, and punctuated with effects. Overall, the trademark Les Paul sound was razor-sharp, clean-shaven, and divinely smooth.  &lt;/p&gt; &lt;p&gt;As small combos eclipsed big bands toward the end of World War II, Les Paul Trio&#39;s popularity grew. They cut records for Decca both alone and behind the likes of Helen Forrest, the Andrews Sisters, the Delta Rhythm Boys, Dick Hayes, and, most notably, Bing Crosby. Since 1945, when the crooner brought them into the studio to back him on a few numbers, the Trio had become regular guests on Crosby&#39;s hit radio show. The highlight of the session was Paul&#39;s first No. 1 hit and million-seller, the gorgeous “It&#39;s Been a Long, Long Time.&quot;  &lt;/p&gt; &lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.gibson.com/Files/aaInternationalImages/lespaulandwifesinging.jpg&quot; width=&quot;300&quot; align=&quot;left&quot; height=&quot;204&quot; /&gt;Meanwhile, Paul began to experiment with dubbing live tracks over recorded tracks, also altering the playback speed. This resulted in “Lover (When You&#39;re Near Me),&quot; his revolutionary 1947 predecessor to multi-track recording. The hit instrumental featured Les Paul on eight different electric guitar parts, all playing together. &lt;/p&gt; &lt;p&gt;In 1948, Paul nearly lost his life to a devastating car crash that shattered his right arm and elbow. Still, he convinced doctors to set his broken arm in the guitar-picking and cradling position. Laid up but undaunted, Paul acquired a first generation Ampex tape recorder from Crosby in 1949, and began his most important multi-tracking adventure, adding a fourth head to the recorder to create sound-on-sound recordings. While tinkering with the machine and its many possibilities, he also came up with tape delay. These tricks, along with another recent Les Paul innovation—close mic-ing vocals—were integrated for the first time on a single recording: the 1950 No. 1 tour de force “How High the Moon.&quot; &lt;/p&gt; &lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.gibson.com/Files/aaInternationalImages/lespaulandwifepic.jpg&quot; width=&quot;300&quot; align=&quot;right&quot; height=&quot;406&quot; /&gt;This historic track was performed during a duo with future wife Mary Ford. The couple&#39;s prolific string of hits for Capitol Records not only included some of the most popular recordings of the early 1950s, but also wrote the book on contemporary studio production. The dense but crystal clear harmonic layering of guitars and vocals, along with Ford&#39;s close mic-ed voice and Paul&#39;s guitar effects, produced distinctively contemporary recordings with unprecedented sonic qualities. Through hits, tours, and popular radio shows, Paul and Ford kept one foot in the technological vanguard and the other in the cultural mainstream.  &lt;/p&gt; &lt;p&gt;All the while, Les Paul continued to pine for the perfect guitar. Though The Log came close, it wasn&#39;t quite what he was after. In the early 1950s, Gibson Guitar would cultivate a partnership with Paul that would lead to the creation of the guitar he&#39;d seen only in his dreams. In 1948, Gibson elected to design its first solidbody, and Paul, a self-described “dyed-in-the-wool Gibson man,&quot; seemed the right man for the job. Gibson avidly courted the guitar legend, even driving deep into the Pennsylvania mountains to deliver the first model to newlyweds Les Paul and Mary Ford.  &lt;/p&gt; &lt;p&gt;“Les played it, and his eyes lighted up,&quot; then-Gibson President Ted McCarty has recalled. The year was 1950, and Paul had just signed on as the namesake of Gibson&#39;s first electric solidbody, with exclusive design privileges. Working closely with Paul, Gibson forged a relationship that would change popular culture forever. The Gibson Les Paul model—the most powerful and respected electric guitar in history—began with the 1952 release of the Les Paul Goldtop. After introducing the original Les Paul Goldtop in 1952, Gibson issued the Black Beauty, the mahogany-topped Les Paul Custom, in 1954. The Les Paul Junior (1954) and Special (1955) were also introduced before the canonical Les Paul Standard hit the market in 1958. With revolutionary humbucker pickups, this sunburst classic has remained unchanged for the half-century since it hit the market. &lt;/p&gt; &lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.gibson.com/Files/aaInternationalImages/lesandhjhug.jpg&quot; width=&quot;200&quot; align=&quot;left&quot; height=&quot;302&quot; /&gt;“The world has lost a truly innovative and exceptional human being today. I cannot imagine life without Les Paul. He would walk into a room and put a smile on anyone&#39;s face. His musical charm was extraordinary and his techniques unmatched anywhere in the world,&quot; said Henry Juszkiewicz, Chairman and CEO of Gibson Guitar. “We will dedicate ourselves to preserving Les&#39; legacy to insure that it lives on forever. He touched so many lives throughout his remarkable life and his influence extends around the globe and across every boundary. I have lost a dear, personal friend and mentor, a man who has changed so many of our lives for the better.&quot; &lt;/p&gt; &lt;p&gt;“I don&#39;t think any words can describe the man we know as Les Paul adequately. The English language does not contain words that can pay enough homage to someone like Les. As the “Father of the Electric Guitar&quot;, he was not only one of the world&#39;s greatest innovators  but a legend who created, inspired and contributed to the success of musicians around the world,&quot; said Dave Berryman, &lt;img alt=&quot;&quot; src=&quot;http://www.gibson.com/Files/aaInternationalImages/lesanddave.jpg&quot; width=&quot;250&quot; align=&quot;right&quot; height=&quot;304&quot; /&gt;President of Gibson Guitar. “I have had the privilege to know and work with Les for many, many years and his passing has left a deep personal void. He was simply put – remarkable in every way. As a person, a musician, a friend, an inventor. He will be sorely missed by us all.&quot;&lt;/p&gt; &lt;p&gt;With the rise of the rock &#39;n&#39; roll revolution of 1955, Les Paul and Mary Ford&#39;s popularity began to wane with younger listeners, though Paul would prove to be a massive influence on younger generation of guitarists. Still, Paul and Ford maintained their iconic presence with their wildly popular television show, which ran from 1953-1960. In 1964, the couple, parents to a son and daughter, divorced. Paul began playing in Japan, and recorded an LP for London Records before poor health forced him to take time off—as much as someone so inspired can take time off.  &lt;/p&gt; &lt;p&gt;In the 1977, Paul resurfaced with a Grammy-winning Chet Atkins collaboration, &lt;em&gt;Chester and Lester&lt;/em&gt;.  Then the ailing guitarist, who&#39;d already suffered arthritis and permanent hearing loss, had a heart attack, followed by bypass surgery.  &lt;/p&gt; &lt;p&gt;Ever stubborn, Les recovered, and returned to live performance in the late 1980s. Until recently Les continued to perform two weekly New York shows with the Les Paul Trio, even releasing the 2005 double-Grammy winner &lt;em&gt;Les Paul &amp;amp; Friends: American Made World Played&lt;/em&gt;, featuring collaborations with a veritable who&#39;s who of the electric guitar, including dozens of illustrious fans like Keith Richards, Buddy Guy, Billy Gibbons, Jeff Beck, Eric Clapton, and Joe Perry. In 2008, The Rock and Roll Hall of Fame paid tribute to Les Paul in a week-long celebration of his life which culminated with a live performance by Les himself.  &lt;/p&gt; &lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.gibson.com/Files/aaInternationalImages/lesandschon.jpg&quot; width=&quot;250&quot; align=&quot;left&quot; height=&quot;166&quot; /&gt;Les Paul has since become the only individual to share membership into the Grammy Hall of Fame, the Rock and Roll Hall of Fame, the National Inventors Hall of Fame, and the National Broadcasters Hall of Fame. Les is survived by his three sons Lester (Rus) G.  Paul, Gene W. Paul and Robert (Bobby) R. Paul, his daughter Colleen Wess, son-in-law Gary Wess, long time friend Arlene Palmer,  five grandchildren and five great grandchildren. A private Funeral service will be held in New York. A service in Waukesha, WI will be announced at a later date. Details will follow and will be announced for all services. Memorial tributes for the public will be announced at a future date.   The family asks that in lieu of flowers, donations be made to the Les Paul Foundation, 236 West 30&lt;sup&gt;th&lt;/sup&gt; Street, 7&lt;sup&gt;th&lt;/sup&gt; Floor, New York, New York 10001.&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;span id=&quot;ArticleViewer&quot;&gt;&lt;p&gt;&lt;strong&gt;Slash&lt;/strong&gt; said, &lt;em&gt;&quot;Les Paul was a shining example of how full one&#39;s life can be, he was so vibrant and full of positive energy. I&#39;m honored and humbled to have known and played with him over the years, he was an exceptionally brilliant man.&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Joe Satriani&lt;/strong&gt; said, &lt;em&gt;&quot;Les Paul set a standard for musicianship and innovation that remains unsurpassed. He was the original guitar hero, and the kindest of souls. Last October I joined him onstage at The Iridium club in NYC, and he was still shredding. He was and still is an inspiration to us all.&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Keb&#39; Mo&#39;&lt;/strong&gt; said, &lt;em&gt;“He&#39;s a guy who played right up to the end, that&#39;s what we all want to do! With his brilliant playing and invention of multi track recording, Les Paul changed the face of music history.&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Bootsy Collins&lt;/strong&gt; said, &lt;em&gt;&quot;Yes, it is very painful when you lose a man, his music, and his everyday presence here on this planet called earth. For us musicians that knew the bar that this man Mr. Les Paul set, not only for guitar players but for music in general, especially rock music, the world will never be the same. His famous Gibson Les Paul brand Guitar&#39;s are still to this day the number one hottest rock guitar on the market. I got the opportunity in 1991 to do a session with Mr. Paul when I was with Dee-Lite, we did a song called: &quot;A little More of Les&quot;. yes, one of my corky titles of course, but It was such an inspiration to be in the presence of such greatness, he will be sadly missed by many. We love you Les!&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Joan Jett&lt;/strong&gt; said, &lt;em&gt;&quot;I, and everyone at Blackheart Records, mourn the passing of our dear friend, Les Paul. He was a genius inventor, musical innovator, and a wonderful person. Without the advances he pioneered, the recording sciences and the electric guitar would have been left years behind. I will miss him so much.&quot;&lt;/em&gt; &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Ace Frehley&lt;/strong&gt; said, &lt;em&gt;&quot;The music industry has lost a giant! I&#39;m very saddened by the news of Les Paul&#39;s passing. I was lucky enough to have known Les as a friend, and admired him as a musician and innovator. He forever changed the way we listen to music.&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Butch Walker&lt;/strong&gt; said, &lt;em&gt;&quot;Les Paul... I will always owe you.. bigtime...&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Billy Gibbons&lt;/strong&gt; said, &lt;em&gt;&quot;Les Paul brought six strings to electricity and electricity to six strings. Les Paul was an innovator, a groundbreaker, a risk taker, a mentor and a friend. Try to imagine what we&#39;d be doing if he hadn&#39;t come along and changed the world. There will always be more Les to come. That&#39;s certified.&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Keith Urban&lt;/strong&gt; said, &lt;em&gt;“I have a mix of emotions today. On one hand, I am deeply saddened at Les Paul’s passing, and on the other a feeling of incredible gratitude and awe for his unquantifiable contribution to the world of music. His name adorns so many of the creations that I communicate through every night out here on the road...He is also very present every time I set foot in the studio and am able to lay multiple tracks as I record, when I use echo, etc., the list of his inventions, in addition to his famous signature model Gibson, are extraordinary. I also feel that even in his nineties, the fact he was still playing every Monday night in New York is perhaps the most beautiful and inspiring achievement of all. As Vince Gill would say, “Go rest high on that mountain Les...cause son, your work on earth is done.”&lt;/em&gt; &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Joe Perry&lt;/strong&gt; said, &lt;em&gt;&quot;As a guitarist and a fan of music in general, I know the amazing contributions Les Paul made in his lifetime to the art of making music. I think if the general public knew how much of that influence is heard every day in the music that they listen to, they would be amazed. He was a true genius. The few times that I had met him, he made me feel like I had known him forever. He was always sharp, ready to rock and he was always talking about his next gig. Knowing that he is not walking the earth anymore is sad and I have lost a friend. But every time I pick up a guitar I’ll know that his spirit is alive and well right next to me. &quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Derek Trucks&lt;/strong&gt; said, &lt;em&gt;&quot;Les Paul played until the day he died. I admire that... That&#39;s the way you live a life.&quot;&lt;/em&gt; &lt;/p&gt; &lt;p&gt;On his many achievements &lt;strong&gt;Derek Trucks&lt;/strong&gt; said, &lt;em&gt;&quot;You could take any one of the many things he did and it would have been enough for most people. Inventing multi-tracking and then the 1st great solid body electric guitar. The amount of things he pulled off is pretty astounding.&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Mick Jones&lt;/strong&gt; said, &lt;em&gt;“As a child I was introduced to the sound of Les Paul through my parent&#39;s record collection. It was a spellbinding moment when I first heard ‘How High The Moon’ featuring Mary Ford. His innovation and recording techniques contributed greatly to the creation of Rock music.”&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Rickey Medlocke&lt;/strong&gt; said, &lt;em&gt;&quot;I&#39;m so thankful that this guy was such an incredible genius for developing such a great guitar. I am a 3rd generation Gibson user and I always will be. God bless Les Paul.&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Tad Kubler&lt;/strong&gt; said, &lt;em&gt;&quot;There are very few human beings in history that touched so many people the way Les Paul did. He shared his gifts with everyone and brought people together with his brilliance and devotion to music and the art of sound. It was a privilege to have met him. He will be incredibly missed. But our blessing is to know his spirit and soul will live for eternity in music everywhere.&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Wes Scantlon&lt;/strong&gt; said, &lt;em&gt;&quot;Les and I have the same birthday – it is an honor to have been born on the same day as such a genius guitarist, innovator and human being&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Neil Portnow&lt;/strong&gt; (President/CEO of The Recording Academy®) said, &lt;em&gt;&quot;Three-time GRAMMY® winner Les Paul was a musical mastermind whose innovations in electric guitar and recorded music are unparalleled. A 1983 Trustees Award recipient and a 2001 Technical GRAMMY Award recipient, his career and contributions to popular music will forever be celebrated, and will continue to influence future generations of musicians. His magnetic charm and sunny disposition matched his incredible skill set, and he will always be remembered with great fondness, humility, and respect. The music industry has lost a true innovator and legend.&quot;&lt;/em&gt; &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Terry Stewart&lt;/strong&gt; (President of the Rock and Roll Hall of Fame and Museum) said, &lt;em&gt;&quot;Without Les Paul, we would not have rock and roll as we know it,&quot; said Terry Stewart, president and CEO of the Rock and Roll Hall of Fame and Museum. “His inventions created the infrastructure for the music and his playing style will ripple through generations. He was truly an architect of rock and roll.&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Elliott Easton&lt;/strong&gt; said,&lt;em&gt; &quot;I am deeply saddened by the passing of Les Paul. It is simply impossible to overstate the impact he has had on the modern world and our culture. There are those that refer to Les as &quot;the Thomas Edison of Music Technology&quot;. To me that is inadequate. Thomas Edison never invented a device that could make the world fall in love with you. There isn&#39;t a person working in the music industry today that doesn&#39;t benefit in some way from Les&#39; pioneering work.&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Brian Wilson&lt;/strong&gt; said, &lt;em&gt;&quot;Les Paul and Mary Ford were among my most favorite musicians in the 50&#39;s. He was the first guy to do multi guitar multi track recording and that turned me on to guitars and stacking vocals for our records.&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Johnny A.&lt;/strong&gt; said,&lt;em&gt; &quot;I am personally very saddened by the passing of Mr. Les Paul. As well as being such an iconic figure in the world of music, as a player and inventor, Les was truly a gentleman with an unbeatable sense of humor. It has been my honor to have known and played with him. His spirit will surely be missed.&quot;&lt;/em&gt; &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Dave Navarro&lt;/strong&gt;, &lt;em&gt;&quot;Les is single handedly responsible for the direction and evolution of the modern rock movement. Period. If you are a fan of modern music, you owe Les Paul an enormous THANK YOU!&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Don Miggs&lt;/strong&gt; said, &lt;em&gt;&quot;I used to promise myself that every trip back home to NY should be capped off with seeing Les perform. I knew he wasn&#39;t going to be around forever and seeing him was a &quot;must-do.&quot; Sadly, I never made good on my promise but one night I was walking into a deli and who do I see? Yup. My palms went sweaty, my tongue felt thick and I got a pit in my stomach, but I stopped him with a grunt of some sort. He looked me square in eye like &quot;don&#39;t miss this moment,&quot; and I gulped and said, &quot;It&#39;s because of you I can put food on my family&#39;s table, thank you,&quot; and he said, &quot;You&#39;ve done that for yourself, son, but thank you.&quot; And he was gone. Ah, Les, thank you thank you.&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Randy Bachman&lt;/strong&gt; said, &lt;em&gt;&quot;I am deeply touched by the passing of Les Paul who I first met in 1959. As a guitarist, composer, electronic innovator and inventor he was beyong genius and there was none other like him. He was a true musical gift from God to the world and spent his life honoring that gift. I proudly play my Les Paul guitars every night on stage and never forget the moments we shared.&quot;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Gary Rossington&lt;/strong&gt; said, &lt;em&gt;&quot;I am very saddened to hear about the passing of Les Paul, he was an amazing guitarist. I play a Les Paul guitar every night and it&#39;s the best sounding guitar ever made. I have a framed t-shirt on my wall, signed by Les Paul that I admire when I&#39;m at home, Les was the best!&quot;&lt;/em&gt;&lt;/p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;span id=&quot;ArticleViewer&quot;&gt;&lt;p&gt;&lt;em&gt;&lt;span style=&quot;color: rgb(51, 51, 255);&quot;&gt;http://www.gibson.com/&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;span id=&quot;ArticleViewer&quot;&gt;&lt;p&gt;&lt;em&gt;&lt;/em&gt;&lt;/p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span id=&quot;ArticleViewer&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;</description><link>http://friedfly.blogspot.com/2009/08/in-loving-memory-of-les-paul.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-5436804076720137406</guid><pubDate>Tue, 28 Jul 2009 12:46:00 +0000</pubDate><atom:updated>2009-07-28T05:49:28.302-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Vista Tweaks</category><title>Manual Uninstallation of OEM BIOS Loader EMU</title><description>&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;f you have applied and installed &lt;span class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot;&gt;&lt;span style=&quot;color: blue ! important; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;Bitstream Vera Sans&amp;quot;,Verdana,Arial,&amp;quot;Lucida Sans&amp;quot;,&amp;quot;Lucida Sans Unicode&amp;quot;,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;&quot; &gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom: 1px solid blue; color: blue ! important; font-weight: 400; font-size: 13px; position: static; background-color: transparent;&quot;&gt;software&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;position: relative;&quot; id=&quot;preLoadWrap0&quot;&gt;&lt;div style=&quot;position: absolute; z-index: 4000; top: -32px; left: -18px; display: none;&quot; id=&quot;preLoadLayer0&quot;&gt;&lt;img style=&quot;border: 0px none ;&quot; src=&quot;http://kona.kontera.com/javascript/lib/imgs/grey_loader.gif&quot; /&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt; based OEM BIOS &lt;span class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot;&gt;&lt;span style=&quot;color: blue ! important; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;Bitstream Vera Sans&amp;quot;,Verdana,Arial,&amp;quot;Lucida Sans&amp;quot;,&amp;quot;Lucida Sans Unicode&amp;quot;,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;&quot; &gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom: 1px solid blue; color: blue ! important; font-weight: 400; font-size: 13px; position: static; background-color: transparent;&quot;&gt;emulator&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;position: relative;&quot; id=&quot;preLoadWrap1&quot;&gt;&lt;div style=&quot;position: absolute; z-index: 4000; top: -32px; left: -18px; display: none;&quot; id=&quot;preLoadLayer1&quot;&gt;&lt;img style=&quot;border: 0px none ;&quot; src=&quot;http://kona.kontera.com/javascript/lib/imgs/grey_loader.gif&quot; /&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt; which is of Emu Loader type such as Vista Loader 1.0 (vstladr of softmod.iso) and Vista Loader 2.0 (grldr), you may face the problem that your &lt;span class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot;&gt;&lt;span style=&quot;color: blue ! important; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;Bitstream Vera Sans&amp;quot;,Verdana,Arial,&amp;quot;Lucida Sans&amp;quot;,&amp;quot;Lucida Sans Unicode&amp;quot;,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;&quot; &gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom: 1px solid blue; color: blue ! important; font-weight: 400; font-size: 13px; position: static; background-color: transparent;&quot;&gt;computer&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; unable to boot up anymore. Unlike Paradox OEM BIOS Emulation Toolkit 1.0 (repacked by Pantheon) which is software based &lt;span class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot;&gt;&lt;span style=&quot;color: blue ! important; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;Bitstream Vera Sans&amp;quot;,Verdana,Arial,&amp;quot;Lucida Sans&amp;quot;,&amp;quot;Lucida Sans Unicode&amp;quot;,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;&quot; &gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue ! important; font-weight: 400; font-size: 13px; position: static;&quot;&gt;driver&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; emulator, Vista Loader actually makes use of boot manager (GRUB or GRUB4DOS) which is the first thing computer loads during boot up process, hence considerably increase the risk to use the crack for &lt;span class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot;&gt;&lt;span style=&quot;color: blue ! important; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;Bitstream Vera Sans&amp;quot;,Verdana,Arial,&amp;quot;Lucida Sans&amp;quot;,&amp;quot;Lucida Sans Unicode&amp;quot;,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;&quot; &gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom: 1px solid blue; color: blue ! important; font-weight: 400; font-size: 13px; position: static; background-color: transparent;&quot;&gt;Windows &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom: 1px solid blue; color: blue ! important; font-weight: 400; font-size: 13px; position: static; background-color: transparent;&quot;&gt;Vista&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; activation. Luckily, the Vista Loaders come with a uninstaller script that can automatically uninstall the crack patch from the boot loader.&lt;br /&gt;&lt;span id=&quot;more-2754&quot;&gt;&lt;/span&gt;&lt;br /&gt;However, if you already unable to boot up and start the &lt;span class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot;&gt;&lt;span style=&quot;color: blue ! important; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;Bitstream Vera Sans&amp;quot;,Verdana,Arial,&amp;quot;Lucida Sans&amp;quot;,&amp;quot;Lucida Sans Unicode&amp;quot;,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;&quot; &gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom: 1px solid blue; color: blue ! important; font-weight: 400; font-size: 13px; position: static; background-color: transparent;&quot;&gt;operating &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom: 1px solid blue; color: blue ! important; font-weight: 400; font-size: 13px; position: static; background-color: transparent;&quot;&gt;system&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; on your computer, the uninstallation script will be useless as you can’t run it. That’s why users are encourage to try the bootable CD method to apply the Vista OEM BIOS Emu Loader before patching the crack into hard disk. If you’re in this situation without access to &lt;span class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot;&gt;&lt;span style=&quot;color: blue ! important; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;Bitstream Vera Sans&amp;quot;,Verdana,Arial,&amp;quot;Lucida Sans&amp;quot;,&amp;quot;Lucida Sans Unicode&amp;quot;,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;&quot; &gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue ! important; font-weight: 400; font-size: 13px; position: static;&quot;&gt;Windows &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue ! important; font-weight: 400; font-size: 13px; position: static;&quot;&gt;desktop&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;, here are a trick and hack that you can use to repair boot sector and possible MBR (master boot record) of your computer, so that Windows can be loaded again without reinstallation.&lt;/span&gt;  &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;Trick to execute Uninstall.cmd of Vista Loader&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; &lt;ol style=&quot;font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Boot up the computer with &lt;span class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot;&gt;&lt;span style=&quot;color: blue ! important; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;Bitstream Vera Sans&amp;quot;,Verdana,Arial,&amp;quot;Lucida Sans&amp;quot;,&amp;quot;Lucida Sans Unicode&amp;quot;,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;&quot; &gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue ! important; font-weight: 400; font-size: 13px; position: static;&quot;&gt;Windows&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; Vista installation DVD.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Choose Install.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;At the screen where you’re asked to input product key, press Shift + F10 &lt;span class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot;&gt;&lt;span style=&quot;color: blue ! important; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;Bitstream Vera Sans&amp;quot;,Verdana,Arial,&amp;quot;Lucida Sans&amp;quot;,&amp;quot;Lucida Sans Unicode&amp;quot;,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;&quot; &gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue ! important; font-weight: 400; font-size: 13px; position: static;&quot;&gt;keyboard &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue ! important; font-weight: 400; font-size: 13px; position: static;&quot;&gt;shortcut&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; to trigger &lt;span class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot;&gt;&lt;span style=&quot;color: blue ! important; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;Bitstream Vera Sans&amp;quot;,Verdana,Arial,&amp;quot;Lucida Sans&amp;quot;,&amp;quot;Lucida Sans Unicode&amp;quot;,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;&quot; &gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue ! important; font-weight: 400; font-size: 13px; position: static;&quot;&gt;command &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue ! important; font-weight: 400; font-size: 13px; position: static;&quot;&gt;prompt&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Change directory to the folder where Vista Loader 2.0 or softmod.rar or softmod.iso is extracted.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Execute uninstall command.&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;If you can still access Windows Vista, but for whatever reason such as decision to go genuine, you want to uninstall Vista Loader crack, but uninstall.cmd script fails to properly clean the crack, then you can use the following steps to manually uninstall the Vista Loader.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;Manually uninstall Vista Loader 2.0 (grldr)&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; &lt;ol style=&quot;font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Click on Start button, select “All Programs” -&gt; “Accessories”, right click on “Command Prompt” and select “Run as Administrator”. Then confirm any UAC &lt;span class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot;&gt;&lt;span style=&quot;color: blue ! important; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;Bitstream Vera Sans&amp;quot;,Verdana,Arial,&amp;quot;Lucida Sans&amp;quot;,&amp;quot;Lucida Sans Unicode&amp;quot;,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;&quot; &gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue ! important; font-weight: 400; font-size: 13px; position: static;&quot;&gt;security&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; warning pop-ups.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Change directory to the date folder of Vista Loader 2.0.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Type the following commands in &lt;em&gt;italic&lt;/em&gt;, pressing Enter after each line: &lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;em&gt;bootrest /nt60 d:&lt;/em&gt;  (d: is to change to your boot volume of Windows Vista)&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;em&gt;attrib d:\grldr -r -h -s&lt;/em&gt; (change the d: to your boot volume, to remove special attributes)&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;em&gt;del d:\grldr&lt;/em&gt;  (delete the softmod mod loader program)&lt;/span&gt;&lt;/p&gt; &lt;/li&gt;&lt;/ol&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;Manually uninstall Vista Loader 1.0 (softmod)&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; &lt;ol style=&quot;font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Click on Start button, select “All Programs” -&gt; “Accessories”, right click on “Command Prompt” and select “Run as Administrator”. Then confirm any UAC security warning pop-ups.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Change directory to the date folder of softmod archive.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Type the following commands in &lt;em&gt;italic&lt;/em&gt;, pressing Enter after each line: &lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;em&gt;mbr_rest /nt60 d:&lt;/em&gt;  (change d: to the boot volume of Windows Vista, can also use bootrest command)&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;em&gt;attrib d:\vstaldr -r -h -s&lt;/em&gt; (change the d: to your boot volume, to remove special attributes)&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;em&gt;attrib d:\menu.lst -r -h -s&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;em&gt;del d:\vstaldr&lt;/em&gt;  (delete the softmod mod loader program)&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;em&gt;del d:\menu.lst&lt;/em&gt; (delete the software mod loader config file)&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;span style=&quot;color: rgb(153, 153, 153);&quot;&gt;Source: http://www.mydigitallife.info&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 255, 255);&quot;&gt;/2007/03/10/manual-uninstallation-of-oem-bios-loader-emu-vista-loader-or-softmod-windows-vista-crack/&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://friedfly.blogspot.com/2009/07/manual-uninstallation-of-oem-bios.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-4066289708866827740</guid><pubDate>Tue, 28 Jul 2009 10:21:00 +0000</pubDate><atom:updated>2009-07-28T03:31:44.548-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><title>Nokia Aeon - Depicted on Echelon Conspiracy Movie</title><description>&lt;p style=&quot;font-family: arial; text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Take one part &lt;em&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Jason_Bourne#Film_universe&quot;&gt;Bourne&lt;/a&gt;&lt;/em&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Jason_Bourne#Film_universe&quot;&gt; series&lt;/a&gt;, one part &lt;em&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Global_Frequency&quot;&gt;Global Frequency&lt;/a&gt;,&lt;/em&gt; and one part &lt;em&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Colossus:_The_Forbin_Project&quot;&gt;Colossus: The Forbin Project&lt;/a&gt;&lt;/em&gt; (with a dash of &lt;em&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/The_Changeling_%28Star_Trek%29&quot;&gt;Star Trek: The Changeling&lt;/a&gt;&lt;/em&gt; and the Bruce Sterling short story &lt;em&gt;&lt;a href=&quot;http://tqft.net/wiki/Maneki_Neko&quot;&gt;Maneki Neko&lt;/a&gt;&lt;/em&gt; also thrown in) and that describes &lt;em&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Echelon_Conspiracy&quot;&gt;Echelon Conspiracy&lt;/a&gt;,&lt;/em&gt; a movie too ambitious and too derivative for its own good.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;font-family: arial; text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Still, &lt;em&gt;I want that phone!&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;font-family: arial; text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00058.jpg&quot;&gt;&lt;img src=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00058.jpg?w=500&amp;amp;h=212&quot; alt=&quot;vlcsnap-00058&quot; title=&quot;vlcsnap-00058&quot; class=&quot;alignnone size-full wp-image-312&quot; width=&quot;500&quot; height=&quot;212&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;font-family: arial; text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00060.jpg&quot;&gt;&lt;img src=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00060.jpg?w=500&amp;amp;h=212&quot; alt=&quot;vlcsnap-00060&quot; title=&quot;vlcsnap-00060&quot; class=&quot;alignnone size-full wp-image-313&quot; width=&quot;500&quot; height=&quot;212&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;font-family: arial; text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-000611.jpg&quot;&gt;&lt;img src=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-000611.jpg?w=500&amp;amp;h=212&quot; alt=&quot;vlcsnap-000611&quot; title=&quot;vlcsnap-000611&quot; class=&quot;alignnone size-full wp-image-322&quot; width=&quot;500&quot; height=&quot;212&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;font-family: arial; text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00074.jpg&quot;&gt;&lt;img src=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00074.jpg?w=500&amp;amp;h=212&quot; alt=&quot;vlcsnap-00074&quot; title=&quot;vlcsnap-00074&quot; class=&quot;alignnone size-full wp-image-315&quot; width=&quot;500&quot; height=&quot;212&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;font-family: arial; text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00092.jpg&quot;&gt;&lt;img src=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00092.jpg?w=500&amp;amp;h=212&quot; alt=&quot;vlcsnap-00092&quot; title=&quot;vlcsnap-00092&quot; class=&quot;alignnone size-full wp-image-316&quot; width=&quot;500&quot; height=&quot;212&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;font-family: arial; text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00093.jpg&quot;&gt;&lt;img src=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00093.jpg?w=500&amp;amp;h=212&quot; alt=&quot;vlcsnap-00093&quot; title=&quot;vlcsnap-00093&quot; class=&quot;alignnone size-full wp-image-317&quot; width=&quot;500&quot; height=&quot;212&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;font-family: arial; text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00098.jpg&quot;&gt;&lt;img src=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00098.jpg?w=500&amp;amp;h=212&quot; alt=&quot;vlcsnap-00098&quot; title=&quot;vlcsnap-00098&quot; class=&quot;alignnone size-full wp-image-318&quot; width=&quot;500&quot; height=&quot;212&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;font-family: arial; text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00099.jpg&quot;&gt;&lt;img src=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00099.jpg?w=500&amp;amp;h=212&quot; alt=&quot;vlcsnap-00099&quot; title=&quot;vlcsnap-00099&quot; class=&quot;alignnone size-full wp-image-319&quot; width=&quot;500&quot; height=&quot;212&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;font-family: arial; text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00101.jpg&quot;&gt;&lt;img src=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00101.jpg?w=500&amp;amp;h=212&quot; alt=&quot;vlcsnap-00101&quot; title=&quot;vlcsnap-00101&quot; class=&quot;alignnone size-full wp-image-320&quot; width=&quot;500&quot; height=&quot;212&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;font-family: arial; text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00127.jpg&quot;&gt;&lt;img src=&quot;http://mikecanepics.files.wordpress.com/2009/03/vlcsnap-00127.jpg?w=500&amp;amp;h=212&quot; alt=&quot;vlcsnap-00127&quot; title=&quot;vlcsnap-00127&quot; class=&quot;alignnone size-full wp-image-321&quot; width=&quot;500&quot; height=&quot;212&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;center&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://www.nokia.com/A4136028#&quot;&gt;&lt;img alt=&quot;&quot; id=&quot;vimage_1&quot; src=&quot;http://www.blogcdn.com/www.engadgetmobile.com/media/2006/10/aeon-concept-3.jpg&quot; vspace=&quot;4&quot; border=&quot;1&quot; hspace=&quot;4&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/center&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Nokia&#39;s research and development team have &lt;a href=&quot;http://www.engadgetmobile.com/2006/06/16/nokias-future-triangular-smellophones/&quot;&gt;kicked it up a gear&lt;/a&gt; with an attractive &quot;aeon&quot; concept phone showing up in the R&amp;amp;D section of the company&#39;s website. The most prominent design feature of aeon is a touchscreen that stretches over the full surface area of the phone, similar to &lt;a href=&quot;http://www.engadgetmobile.com/2006/10/01/the-benq-siemens-black-box-concept-phone-that-never-was/&quot;&gt;BenQ-Siemens&#39;s Black box&lt;/a&gt; concept phone we saw recently. Currently mobile technology isn&#39;t quite up to realizing this fantasy, but we&#39;ll sleep better tonight knowing that at least one of the cellphone industry&#39;s biggest names shares the same dream as we do -- BenQ&#39;s dream didn&#39;t count, &lt;a href=&quot;http://www.engadgetmobile.com/2006/09/28/benq-pulls-the-plug-on-its-german-mobile-division/&quot;&gt;unfortunately&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot; id=&quot;continued&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;center&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img alt=&quot;&quot; id=&quot;vimage_2&quot; src=&quot;http://www.blogcdn.com/www.engadgetmobile.com/media/2006/10/aeon-concept-2.jpg&quot; vspace=&quot;4&quot; border=&quot;1&quot; hspace=&quot;4&quot; /&gt;&lt;br /&gt;&lt;img alt=&quot;&quot; id=&quot;vimage_3&quot; src=&quot;http://www.blogcdn.com/www.engadgetmobile.com/media/2006/10/aeon-concept-1.jpg&quot; vspace=&quot;4&quot; border=&quot;1&quot; hspace=&quot;4&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: rgb(102, 102, 102);font-size:85%;&quot; &gt;Source: Engadget &amp;amp; Makcanepics&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;/center&gt;&lt;/div&gt;</description><link>http://friedfly.blogspot.com/2009/07/nokia-aeon-depicted-on-echelon.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-2286801569176450816</guid><pubDate>Tue, 16 Jun 2009 10:40:00 +0000</pubDate><atom:updated>2009-06-16T03:42:02.220-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Vista Tweaks</category><title>Hide Drives in Windows Vista</title><description>&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;If you’ve got drives in My Computer that you never access, such as a USB Flash drive that you are using solely for ReadyBoost, a floppy drive, or a network drive only used for a particular piece of software, then you might want to simply hide the drive from your computer.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;This tip will only hide the drive from being displayed, applications and the command prompt will still have access to it, and you can still manually browse to the folder if you type in the path.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Now what’s that floppy drive doing there?&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2007/08/image137.png&quot; /&gt;&lt;/span&gt; &lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;Configure the Hidden Drives&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Open up &lt;em&gt;regedit.exe&lt;/em&gt; by using the start menu search box, and then browse down to the following key.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;blockquote&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer&lt;/span&gt;&lt;/p&gt; &lt;/blockquote&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;If the Explorer key does not exist, you can right-click on Policies, select New Key and name it Explorer. &lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2007/08/image138.png&quot; height=&quot;256&quot; width=&quot;569&quot; /&gt;&lt;/span&gt; &lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The NoDrives key most likely does not exist by default, so you’ll need to create it with right-click \ new 32-bit DWORD and name it NoDrives.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;This value is a 32 bit number, and the bits are arranged in reverse order with a value of 1 hiding that drive. For example, if we wanted to hide drives A: and F: we would arrange it like this:&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;table style=&quot;text-align: left; margin-left: 0px; margin-right: auto; font-family: arial;&quot; class=&quot;gtbl&quot; unselectable=&quot;on&quot; border=&quot;1&quot; cellpadding=&quot;2&quot; cellspacing=&quot;2&quot; width=&quot;600&quot;&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Z&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;20&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Y&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;X&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;23&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;W&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;V&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;U&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;T&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;20&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;S&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;R&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;22&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Q&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;P&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;O&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;N&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;22&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;M&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;20&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;L&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;K&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;20&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;J&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;20&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;I&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;H&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;G&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;20&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;F&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;E&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;D&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;C&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;B&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;A&lt;/span&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;20&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;23&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;20&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;22&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;22&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;22&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;23&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;20&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;22&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;22&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;1&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;22&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;21&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;0&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;22&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;1&lt;/span&gt;&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Converting 100001 to decimal we end up with a decimal value of 33 or a hex value of 0×21, so if you double-click on the key in the registry editor, choose Decimal and then enter 33 into the value field.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2007/08/image139.png&quot; /&gt;&lt;/span&gt; &lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;In order to see these changes, you’ll need to restart explorer.exe, which you can do easily from Task Manager or the longer way by just logging off and back on. &lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;Uninstall Tweak&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;To disable this tweak, simply remove the NoDrives registry key entirely.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;Reference Info&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Here’s a list of the values you’ll want to enter for a few different drive letters.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;table style=&quot;text-align: left; margin-left: 0px; margin-right: auto; font-family: arial;&quot; class=&quot;gtbl&quot; unselectable=&quot;on&quot; border=&quot;1&quot; cellpadding=&quot;2&quot; cellspacing=&quot;2&quot; width=&quot;400&quot;&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;130&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Drive Letter&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;131&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Decimal&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;129&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Hex&lt;/span&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;130&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;A&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;131&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;1&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;129&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;1&lt;/span&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;130&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;B&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;131&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;129&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2&lt;/span&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;130&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;C&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;131&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;4&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;129&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;4&lt;/span&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;130&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;D&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;131&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;8&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;129&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;8&lt;/span&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;130&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;E&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;131&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;16&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;129&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;10&lt;/span&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;130&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;F&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;131&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;32&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;129&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;20&lt;/span&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;130&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;G&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;131&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;64&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;129&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;40&lt;/span&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;130&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;H&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;132&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;128&lt;/span&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;130&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;80&lt;/span&gt;&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;If you want to hide multiple drives, you’ll need to use the table of all the drive letters to figure out the correct binary code, and then convert that to decimal or hex. (hint: you can use the calculator in scientific mode)&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Look, now that worthless floppy drive is gone! &lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2007/08/image140.png&quot; height=&quot;178&quot; width=&quot;477&quot; /&gt;&lt;/span&gt; &lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Naturally it would be better to disable the floppy drive in your BIOS, but this tip is still valid for other types of drives.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Note that this also works on Windows XP.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: center; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;color: rgb(51, 102, 255);font-size:78%;&quot; &gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Source: www.howtogeek.com&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://friedfly.blogspot.com/2009/06/hide-drives-in-windows-vista.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-719879593565932282</guid><pubDate>Fri, 29 May 2009 03:11:00 +0000</pubDate><atom:updated>2009-05-28T20:13:28.064-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><category domain="http://www.blogger.com/atom/ns#">GSM</category><title>SAMSUNG Unveils Wide Touch Screen Multimedia Phone; The SAMSUNG F490</title><description>&lt;p style=&quot;font-family: arial;&quot; class=&quot;ss4_news_stit&quot;&gt;&lt;span style=&quot;font-style: italic; color: rgb(0, 0, 153);font-size:85%;&quot; &gt;http://www.samsung.com/uk&lt;/span&gt;&lt;br /&gt;  &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial;&quot; class=&quot;ss4_news_stit&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial;&quot; class=&quot;ss4_news_stit&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;SAMSUNG’s latest mobile phone with a touch sensitive 16:9 wide screen and a 5 megapixel camera is to launch in the UK and Europe before the rest of the world&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;        &lt;/p&gt;                &lt;div style=&quot;font-family: arial;&quot; class=&quot;ss4_abss_big&quot;&gt;     &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img id=&quot;bigImage&quot; src=&quot;http://www.samsung.com/uk/system/news/content/2008/02/27/6942/F490_l.jpg&quot; alt=&quot;middleImage&quot; border=&quot;0&quot; width=&quot;515&quot; /&gt;&lt;/span&gt;    &lt;/div&gt;             &lt;div style=&quot;font-family: arial;&quot; class=&quot;ss4_abss_small&quot;&gt;              &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img src=&quot;http://www.samsung.com/uk/system/news/content/2008/02/27/6942/F490_m.jpg&quot; onclick=&quot;bigImageMainOn(&#39;/uk/system/news/content/2008/02/27/6942/F490_l.jpg&#39;)&quot; alt=&quot;SAMSUNG F490 - Wide Touch Screen Multimedia Phone&quot; style=&quot;cursor: pointer;&quot; class=&quot;small&quot; border=&quot;0&quot; height=&quot;48&quot; width=&quot;85&quot; /&gt;&lt;/span&gt;       &lt;/div&gt;     &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; London, 10 January 2008 - SAMSUNG Mobile has today announced the launch of the new SAMSUNG F490, a powerful high speed multimedia phone with a touch sensitive 16:9 wide screen and intuitive user interface. The SAMSUNG F490 will be available in the UK from mid-February. After being launched in the UK and Europe, it will be introduced to the U.S. and Asian markets.&lt;br /&gt;&lt;br /&gt;The SAMSUNG F490’s debut comes amid rising popularity of touch screen technology. With a class-leading 3.2 inch 16:9 wide screen, the SAMSUNG F490 provides a panoramic view of pictures or videos as well as a larger screen space for Internet surfing. To make Internet browsing easy and enjoyable, the SAMSUNG F490 also features the Google search engine optimised for mobile use and full Internet browser for viewing web pages both vertically and horizontally.&lt;br /&gt;&lt;br /&gt;At just 11.8mm deep, the new handset’s slimline design features rounded corners and a glossy surface that looks chic, making the SAMSUNG F490 a pleasure to hold and use. The stylish and intuitive &#39;Croix UI&#39; user interface, which won the iF Communication Design Award 2007, involves two bars that cross-hatch, enabling users to control the phone’s many features by simply tapping and dragging.&lt;br /&gt;&lt;br /&gt;For example, the intuitive nature of the user interface is demonstrated during song playback where users can easily move left/right to rewind/fast forward and move up/down to adjust volume. This addition of the ‘Croix UI’ interface brings new levels of usability to the SAMSUNG F490 and makes basic navigation, Internet browsing, task management and other activity easier than ever before. Furthermore, haptic feedback from the phone’s keypad offers tangible assurance that a command has been inputted.&lt;br /&gt;&lt;br /&gt;From listening to music to snapping photos and video with its 5 megapixel digital camera, the SAMSUNG F490 boasts the very latest in audio and video technology. For connectivity and storage purposes it combines the standard 3.5mm audio jack, support for compatible microSD cards and 130MB internal memory.&lt;br /&gt;&lt;br /&gt;The SAMSUNG F490 is geared to offer the ultimate multimedia experience with fast HSDPA connectivity. Downloading large files, streaming videos, and holding video conversations is all easier than ever with speeds as fast as 3.6Mbps. The handset also features Bluetooth 2.0 and USB 2.0 so that users will also be able to connect to a range of peripherals including wireless headsets and mobile printers.&lt;br /&gt;&lt;br /&gt;The SAMSUNG F490 will be available in the UK from the mid-February. For more information, please visit www.samsungmobile.com&lt;br /&gt;&lt;br /&gt;SAMSUNG F490 Specification &lt;br /&gt;Standard: HSDPA 3.6 mbps / UMTS/ EDGE (900/1800/1900/2100)&lt;br /&gt;Camera: 5 Megapixel Camera &lt;br /&gt;Display: 3.2&quot; 16:9 Wide Full Touch LCD (262K Colors) &lt;br /&gt;Features: Croix UI; Video Recording (MPEG4, QVGA@15fps), Video Playback (WMV, MPEG4, H.263, H.264, VGA@30fps); Bluetooth 2.0 (A2DP+ AVRCP); USB 2.0 (High speed); Google Search, NetFront 3.4 browser, Mail; MP3, AAC+, AAC+(e), WMA; OMA DRM v2.0, WMDRM, Multitasking&lt;br /&gt;Memory: 130MB internal memory + microSD&lt;br /&gt;Size: 115 x 53.5 x 11.8mm &lt;br /&gt;Weight: 102g   &lt;/span&gt;       &lt;/p&gt;</description><link>http://friedfly.blogspot.com/2009/05/samsung-unveils-wide-touch-screen.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-2959839749089240539</guid><pubDate>Mon, 25 May 2009 03:42:00 +0000</pubDate><atom:updated>2009-05-24T20:44:04.088-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Linux</category><title>10 mistakes new Linux administrators make</title><description>&lt;div style=&quot;font-family: arial;&quot; class=&quot;entry&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong style=&quot;font-weight: normal;&quot;&gt;Author&lt;/strong&gt;: Jack Wallen&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;em&gt;If you’re new to Linux, a few common mistakes are likely to get you into trouble. Learn about them up front so you can avoid major problems as you become increasingly Linux-savvy.&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; &lt;h3 align=&quot;center&quot;&gt; &lt;hr style=&quot;height: 2px;&quot; align=&quot;center&quot; size=&quot;2&quot; width=&quot;100%&quot;&gt;&lt;/h3&gt;  &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;For many, migrating to Linux is a rite of passage that equates to a thing of joy. For others, it’s a nightmare waiting to happen. It’s wonderful when it’s the former; it’s a real show stopper when it’s the latter. But that nightmare doesn’t have to happen, especially when you know, first hand, the most common mistakes new Linux administrators make. This article will help you avoid those mistakes by laying out the most typical Linux missteps.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;em&gt;Note: This information is also available as a &lt;a href=&quot;http://downloads.techrepublic.com.com/abstract.aspx?docid=397135&quot; target=&quot;_blank&quot;&gt;PDF download&lt;/a&gt;.&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;#1: Installing applications from various types&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;This might not seem like such a bad idea at first. You are running Ubuntu so you know the package management system uses .deb packages. But there are a number of applications that you find only in source form. No big deal right? They install, they work. Why shouldn’t you? Simple, your package management system can’t keep track of what you have installed if it’s installed from source. So what happens when package A (that you installed from source) depends upon package B (that was installed from a .deb binary) and package B is upgraded from the update manager? Package A might still work or it might not. But if both package A and B are installed from .debs, the chances of them both working are far higher. Also, updating packages is much easier when all packages are from the same binary type.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;#2: Neglecting updates&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Okay, this one doesn’t point out Linux as much as it does poor administration skills. But many admins get Linux up and running and think they have to do nothing more. It’s solid, it’s secure, it works. Well, new updates can patch new exploits. Keeping up with your updates can make the difference between a compromised system and a secure one. And just because you can rest on the security of Linux doesn’t mean you should. For security, for new features, for stability — the same reasons we have all grown accustomed to updating with Windows — you should always keep up with your Linux updates.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;#3: Poor root password choice&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Okay, repeat after me: “The root password is the key to the kingdom.” So why would you make the key to the kingdom simple to crack? Sure, make your standard user password something you can easily remember and/or type. But that root password — you know, the one that’s protecting your enterprise database server — give that a much higher difficulty level. Make that password one you might have to store, encrypted, on a USB key, requiring you to slide that USB key into the machine, mount it, decrypt the password, and use it.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;#4: Avoiding the command line&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;No one wants to have to memorize a bunch of commands. And for the most part, the GUI takes care of a vast majority of them. But there are times when the command line is easier, faster, more secure, and more reliable. Avoiding the command line should be considered a cardinal sin of Linux administration. You should at least have a solid understanding of how the command line works and a &lt;a href=&quot;http://blogs.techrepublic.com.com/10things/?p=452&quot;&gt;small arsenal of commands&lt;/a&gt; you can use without having to RTFM. With a small selection of command-line tools on top of the GUI tools, you should be ready for just about anything.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;#5: Not keeping a working kernel installed&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Let’s face it, you don’t need 12 kernels installed on one machine. But you do need to update your kernel, and the update process doesn’t delete previous kernels. What do you do? You keep at least the most recently working kernel at all times. Let’s say you have 2.6.22 as your current working kernel and 2.6.20 as your backup. If you update to 2.6.26 and all is working well, you can remove 2.6.20. If you use an rpm-based system, you can use this method to remove the old kernels:&lt;em&gt; rpm -qa | grep -i kernel&lt;/em&gt; followed by&lt;em&gt; rpm-e kernel-{VERSION}&lt;/em&gt;.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;#6: Not backing up critical configuration files&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;How many times have you upgraded X11 only to find the new version fubar’d your xorg.conf file to the point where you can no longer use X? It used to happen to me a lot when I was new to Linux. But now, anytime X is going to be updated I always back up &lt;em&gt;/etc/X11/xorg.conf&lt;/em&gt; in case the upgrade goes bad. Sure, an X update tries to back up &lt;em&gt;xorg.conf&lt;/em&gt;, but it does so within the &lt;em&gt;/etc/X11&lt;/em&gt; directory. And even though this often works seamlessly, you are better off keeping that backup under your own control. I always back up &lt;em&gt;xorg.conf &lt;/em&gt;to the &lt;em&gt;/root&lt;/em&gt; directory so I know only the root user can even access it. Better safe than sorry. This applies to other critical backups, such as Samba, Apache, and MySQL, too.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;#7: Booting a server to X&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;When a machine is a dedicated server, you might want to have X installed so some administration tasks are easier. But this doesn’t mean you should have that server boot to X. This will waste precious memory and CPU cycles. Instead, stop the boot process at runlevel 3 so you are left at the command line. Not only will this leave all of your resources to the servers, it will also keep prying eyes out of your machine (unless they know the command line and passwords to log in). To log into X, you will simply have to log in and run the command &lt;em&gt;startx&lt;/em&gt; to bring up your desktop.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;#8: Not understanding permissions&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Permissions can make your life really easy, but if done poorly, can make life really easy for hackers. The simplest way to handle permissions is using the &lt;em&gt;rwx &lt;/em&gt;method. Here’s what they mean: r=read, w=write, x=execute. Say you want a user to be able to read a file but not write to a file. To do this, you would issue &lt;em&gt;chmod u+r,u-wx filename&lt;/em&gt;. What often happens is that a new user sees an error saying they do not have permission to use a file, so they hit the file with something akin to &lt;em&gt;chmod 777 filename&lt;/em&gt; to avoid the problem. But this can actually cause more problems because it gives the file executable privileges. Remember this: 777 gives a file rwx permissions to all users (root, group, and other), 666 gives the file rw privileges to all users, 555 gives the file rx permissions to all users, 444 gives r privileges to all users, 333 gives wx privileges to all users, 222 gives w privileges to all users, 111 gives x privileges to all users, and 000 gives no privileges to all users.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;#9: Logging in as root user&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;I can’t stress this enough. Do NOT log in as root. If you need root privileges to execute or configure an application, &lt;em&gt;su&lt;/em&gt; to root in a standard user account. Why is logging in as root bad? Well, when you log on as a standard user, all running X applications still have access only to the system limited to that user. If you log in as root, X has all root permissions. This can cause two problems: 1) if you make a big mistake via a GUI, that mistake can be catastrophic to the system and 2) with X running as root that makes your system more vulnerable.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;#10: Ignoring log files&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;There is a reason &lt;em&gt;/var/log&lt;/em&gt; exists. It is a single location for all log files. This makes it simple to remember where you first need to look when there is a problem. Possible security issue? Check /var/log/secure. One of the very first places I look is &lt;em&gt;/var/log/messages. &lt;/em&gt;This log file is the common log file where all generic errors and such are logged to. In this file you will get messages about networking, media changes, etc. When administering a machine you can always use a third-party application such as logwatch that can create various reports for you based on your &lt;em&gt;/var/log &lt;/em&gt;files.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Sidestep the problems&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;These 10 mistakes are pretty common among new Linux administrators. Avoiding the pitfalls will take you through the Linux migration rite of passage faster, and you will come out on the other side a much better administrator.&lt;/span&gt;&lt;/p&gt;           &lt;/div&gt;</description><link>http://friedfly.blogspot.com/2009/05/10-mistakes-new-linux-administrators.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-7457583374759479639</guid><pubDate>Mon, 25 May 2009 03:40:00 +0000</pubDate><atom:updated>2009-05-24T20:40:47.110-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer Hardware</category><title>First Quad-core Mobile Laptop</title><description>&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;Alienware&lt;/strong&gt;, Dell’s extreme-high performance computing arm, has announced the arrival of its &lt;strong&gt;M17&lt;/strong&gt; laptop, one of the first such machines powered by the &lt;strong&gt;Intel Core 2 Extreme QX9300 (2.53 GHz, 12MB cache, 1066MHz FSB)&lt;/strong&gt;,  the world’s first mobile quad-core processor.&lt;/span&gt;&lt;/p&gt; &lt;div style=&quot;font-family: arial;&quot;&gt; &lt;/div&gt; &lt;p style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Ladies and gentlemen, start your engines.&lt;/span&gt;&lt;/p&gt; &lt;div style=&quot;text-align: justify; font-family: arial;&quot;&gt; &lt;/div&gt; &lt;p style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img src=&quot;http://i.zdnet.com/blogs/alienware_m17_black_skullcap.jpg&quot; title=&quot;Alienware M17 (back)&quot; alt=&quot;Alienware M17 (back)&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/p&gt; &lt;div style=&quot;text-align: justify; font-family: arial;&quot;&gt; &lt;/div&gt; &lt;p style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img src=&quot;http://i.zdnet.com/blogs/alienware_m17_black_skullcap2.jpg&quot; title=&quot;Alienware M17 (front)&quot; alt=&quot;Alienware M17 (front)&quot; align=&quot;right&quot; border=&quot;0&quot; height=&quot;167&quot; width=&quot;250&quot; /&gt;Typical of the company’s products, the machine is a barnburner: For one, the 17-inch notebook is the company’s first with ATI CrossFireX&lt;span id=&quot;bwanpa15&quot;&gt;&lt;/span&gt; multi-GPU        technology, featuring dual &lt;strong&gt;ATI Mobility Radeon&lt;span id=&quot;bwanpa16&quot;&gt;&lt;/span&gt;        HD 3870&lt;/strong&gt; cards. (That means solid HD video playback, full DirectX 10.1 support and frame rates up to 80 percent higher than single GPU setups.) You’ll have up to &lt;strong&gt;4GB of DDR3 memory&lt;/strong&gt; at your disposal, achieving speedy transfer rates, data retrieval, load times and multitasking.&lt;/span&gt;&lt;/p&gt; &lt;div style=&quot;text-align: justify; font-family: arial;&quot;&gt; &lt;/div&gt; &lt;p style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Of course, and that devilishly-fast QX9300 processor, too, which also appeared in Lenovo’s ThinkPad W700 earlier this year. &lt;em&gt;(About; benchmarks)&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; &lt;div style=&quot;text-align: justify; font-family: arial;&quot;&gt; &lt;/div&gt; &lt;p style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;On the storage front, &lt;strong&gt;dual 500GB hard drives&lt;/strong&gt; linked in a RAID 0 configuration offer a massive &lt;strong&gt;1TB&lt;/strong&gt; storage capacity. Your Blu-ray and HD video will enjoy the 17-inch “Extreme High-Definition” &lt;strong&gt;1920 x 1200&lt;/strong&gt; resolution display.&lt;/span&gt;&lt;/p&gt; &lt;div style=&quot;text-align: justify; font-family: arial;&quot;&gt; &lt;/div&gt; &lt;p style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img src=&quot;http://i.zdnet.com/blogs/alienware_m17_black_skullcap3.jpg&quot; title=&quot;Alienware M17 (rear)&quot; alt=&quot;Alienware M17 (rear)&quot; align=&quot;right&quot; border=&quot;0&quot; height=&quot;167&quot; width=&quot;250&quot; /&gt;Plus, all the typical Alienware amenities, including the Alienware Command Center control panel, which includes the AlienFusion power management system, AlienSense facial recognition software and AlienTouch touchpad controls.&lt;/span&gt;&lt;/p&gt; &lt;div style=&quot;text-align: justify; font-family: arial;&quot;&gt; &lt;/div&gt; &lt;p style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;What color does that Skullcap case come in? &lt;strong&gt;Matte black.&lt;/strong&gt;&lt;/span&gt; As if you even had to ask.&lt;/p&gt; &lt;div style=&quot;text-align: justify; font-family: arial;&quot;&gt; &lt;/div&gt; &lt;p style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The company notes that power users and gamers on a budget can even get in on the action: The M17 starts at &lt;strong&gt;$1,399&lt;/strong&gt;, and a configuration with an Intel Core 2 Duo processor, ATI CrossFireX technology, 3GB of DDR3 memory and a 1920 x 1200 Extreme High-Definition LCD can be had for &lt;strong&gt;under $2,000&lt;/strong&gt;.&lt;/span&gt;&lt;/p&gt; &lt;div style=&quot;text-align: justify; font-family: arial;&quot;&gt; &lt;/div&gt; &lt;p style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img src=&quot;http://i.zdnet.com/blogs/alienware_m17_black_skullcap4.jpg&quot; title=&quot;Alienware M17 (detail)&quot; alt=&quot;Alienware M17 (detail)&quot; align=&quot;right&quot; border=&quot;0&quot; height=&quot;84&quot; width=&quot;125&quot; /&gt;On the other hand, a fully loaded machine with all the trimmings will run you a cool &lt;strong&gt;$4,199&lt;/strong&gt;. Anyone want to donate to the Toybox gift fund?&lt;/span&gt;&lt;/p&gt; &lt;div style=&quot;text-align: justify; font-family: arial;&quot;&gt; &lt;/div&gt; &lt;p style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The M17 is available today in the U.S. and Europe.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;(Posted By: Andrew J. Nusca is an assistant editor for ZDNet.com)&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://friedfly.blogspot.com/2009/05/first-quad-core-mobile-laptop.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-186264578250948548</guid><pubDate>Wed, 20 May 2009 04:45:00 +0000</pubDate><atom:updated>2009-05-19T22:00:07.876-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><title>Four more Hayden s*x videos</title><description>&lt;span style=&quot;;font-family:arial;font-size:85%;&quot;  &gt;&lt;span class=&quot;f7&quot;&gt;stir.ph-by: Edgar O. Cruz | STIR Editor (Chief Agitator)&lt;br /&gt;              18 May 2009 | 10:56 AM&lt;/span&gt;&lt;/span&gt;               &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img alt=&quot;hayden kho sex video&quot; src=&quot;http://www.stir.ph//global/UserFiles/haydenmaricar.jpg&quot; align=&quot;left&quot; border=&quot;1&quot; height=&quot;230&quot; hspace=&quot;4&quot; width=&quot;330&quot; /&gt;“Yeah,” answers Vicki Belo when daughter Crystalle Henares asked her if she had seen the Hayden Kho and Katrina Halili “Careless Whispers” video.&lt;br /&gt;&lt;br /&gt;Vicki had admitted Hayden and her are more than f___king friends. They have returned as boyfriend/girlfriend. The buzz is Hayden already got back his luxury SUV and high-end condo unit, both gifts from Vicki which she took back in their split last January. To start off Hayden on his own, Vicki is also going to build his own clinic. She did this despite Hayden’s confirmed streak of infidelity which is turning out to be psychological sickness.&lt;br /&gt;&lt;br /&gt;It now appears the “Careless Whispers” video is just a preview to the release of the real thing: the Katrina-Hayden’s sex video!&lt;br /&gt;&lt;br /&gt;First to come out is a 40-minute sex bout with Katrina Halili in what appears like a hotel room showing them in all kinds of sex including animal-style copulation. Two more videos are taken, before Hayden was notoriously popular, with a Filipina model that are&lt;/span&gt;   &lt;/p&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img alt=&quot;hayden kho sex video&quot; src=&quot;http://www.stir.ph//global/UserFiles/haydenbrazilian.jpg&quot; align=&quot;right&quot; border=&quot;1&quot; height=&quot;230&quot; hspace=&quot;4&quot; width=&quot;330&quot; /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; 18 and 27 minutes long. Another video is with a Brazilian model. Except for the last one, video qualities are exceptionally clear, indicating they were purposely videotaped.&lt;br /&gt;&lt;br /&gt;To be released next is Rufa Mae Quinto’s sex video with Hayden. To preempt public opinion, Rufa Mae has admitted she has a sex video. She strongly denied this before. Another sex video with Katrina is coming out. These sex videos has been compiled in DVD by Quiapo pirates known as the “Hayden Video Scandal.” And everybody’s worst fears...Hayden’s sex video with Vicki.                                                                                                                                &lt;br /&gt;Somebody’s clearly not happy with the Vicki-Hayden reconciliation. The buzz is the person releasing these &lt;/span&gt; &lt;/p&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;videos is the same ex-best friend who gave Hayden’s stolen laptop to Vicki that caused their split. As previously reported by STIR, this person and his group of friends tried to get even with Hayden to punish him for wronging thisperson’s girlfriend.&lt;br /&gt;&lt;br /&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.stir.ph//global/UserFiles/haydenkat3%282%29.jpg&quot; align=&quot;left&quot; border=&quot;1&quot; height=&quot;230&quot; hspace=&quot;4&quot; width=&quot;330&quot; /&gt;It’s clear they are back at it again. If not, why are these sex videos appearing only now?&lt;br /&gt;&lt;br /&gt;“What can I do?” Crystalle Henares says in frustration when questioned how she feels about the reconciliation of Vicki and Hayden. Elder brother Quark Henares and Crystalle are openly against the relationship. They have warned Vicki that they will leave the family house if Hayden enters it again. But brother and sister cannot slam their mother out of love for him Crystalle reconsiders, “Ang important ngayon masaya ang mommy ko.”&lt;br /&gt;&lt;br /&gt;When told about her mom’s sex video, Crystalle could only exhale, “Naku! Huwag naman!”&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;color: rgb(0, 153, 0);font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;(&lt;span style=&quot;font-size:larger;&quot;&gt;&lt;em&gt;***Due to the sensitive  nature of the videos, STIR decided not to post them. This article contains nude photos and is not advisable to be viewed minors***)&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;    &lt;/p&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;/p&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;/p&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;/p&gt;</description><link>http://friedfly.blogspot.com/2009/05/four-more-hayden-sex-videos.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-2057198962623648695</guid><pubDate>Tue, 05 May 2009 04:58:00 +0000</pubDate><atom:updated>2009-05-04T22:04:08.216-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><category domain="http://www.blogger.com/atom/ns#">Windows Apps</category><title>Windows XP integrated in Windows 7</title><description>&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;In a few days, exactly April 30th, the Release Candidate of Windows 7, the operating system of Microsoft, will be available for download by MSDN and TechNet subscribers (public availability will begin on May 5th) and &lt;span class=&quot;text-bold&quot;&gt;Microsoft announced that they have integrated in Windows 7 a feature Windows XP Mode (XPM)&lt;/span&gt;.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Windows XP Mode is specifically designed to help small businesses move to Windows 7. Windows XP Mode provides you with the flexibility to run many older productivity applications on a Windows 7 based PC.&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;font-family: arial;&quot; class=&quot;img-align-centre&quot;&gt;  &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;All you need to do is to install suitable applications directly in Windows XP Mode which is a virtual Windows XP environment running under Windows Virtual PC. The applications will be published to the Windows 7 desktop and then you can run them directly from Windows 7.&lt;/span&gt;&lt;/p&gt;  &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Windows XP Mode and Windows Virtual PC are best experienced on your new Windows 7 PC. We will be soon releasing the beta of&lt;b&gt; &lt;/b&gt;Windows XP Mode and Windows Virtual PC for Windows 7 Professional and Windows 7 Ultimate.&lt;/span&gt;&lt;/p&gt;  &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://windowsteamblog.com/cfs-file.ashx/__key/CommunityServer.Blogs.Components.WeblogFiles/business/WindowsVPC7_5F00_2_5F00_23127862.png&quot;&gt;&lt;img style=&quot;border: 0px none ; display: inline;&quot; title=&quot;WindowsVPC7_2&quot; alt=&quot;WindowsVPC7_2&quot; src=&quot;http://windowsteamblog.com/cfs-file.ashx/__key/CommunityServer.Blogs.Components.WeblogFiles/business/WindowsVPC7_5F00_2_5F00_thumb_5F00_724F4AE9.png&quot; border=&quot;0&quot; width=&quot;450&quot; height=&quot;281&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt; &lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;br /&gt;&lt;br /&gt;Specifically designed to help businesses move smoothly to Windows 7, Windows XP Mode runs using &lt;span class=&quot;text-bold&quot;&gt;the Virtual PC technology&lt;/span&gt;. Thus, many applications designed for Windows XP can be installed and runned &lt;span class=&quot;text-bold&quot;&gt;without risk of incompatibility on a PC with Windows 7&lt;/span&gt; and a processor based virtualization.&lt;br /&gt;&lt;br /&gt;Available for &lt;span class=&quot;text-ita&quot;&gt;Windows 7 Professional and Windows 7 Ultimate&lt;/span&gt;, &lt;span class=&quot;text-bold&quot;&gt;all information will be accessible directly from the desktop of Windows 7&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;     &lt;div style=&quot;font-family: arial; text-align: left;&quot; class=&quot;img-align-centre&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://www.crystalxp.net/news/img/2136.jpg&quot; rel=&quot;lightbox&quot; title=&quot;Windows XP mode&quot;&gt;&lt;img src=&quot;http://www.crystalxp.net/news/img/th_2136.jpg&quot; alt=&quot;Windows XP mode&quot; title=&quot;Windows XP mode&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(153, 153, 153);&quot;&gt;Source: &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul style=&quot;color: rgb(0, 102, 0);&quot;&gt;&lt;li class=&quot;link&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;The Windows Blog&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;rss&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;CrystalXP on your site (RSS Feed)&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://friedfly.blogspot.com/2009/05/windows-xp-integrated-in-windows-7.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-3467942239335847773</guid><pubDate>Thu, 12 Feb 2009 03:51:00 +0000</pubDate><atom:updated>2009-02-11T20:04:12.440-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Virus Removal</category><title>Downup / Conficker / Downadup / Kido Worm</title><description>&lt;table  class=&quot;enc_ttl&quot; border=&quot;0&quot; cellpadding=&quot;3&quot; cellspacing=&quot;0&quot; width=&quot;100%&quot; style=&quot;font-family:arial;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td klmark=&quot;virus_doctype:1&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;b&gt;&lt;a name=&quot;doc1&quot;&gt;Technical details&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;This malicious program exploits the &lt;a href=&quot;http://www.viruslist.com/click?_URL=http://www.microsoft.com%2Ftechnet%2Fsecurity%2FBulletin%2FMS08-067.mspx&quot; target=&quot;blank&quot;&gt;MS08-067&lt;/a&gt; vulnerability to spread via network resources and removable storage media. &lt;/span&gt;&lt;/p&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;This modification of the worm is a Windows PE DLL file.  The file is 158110 bytes in size. It is packed using UPX. &lt;/span&gt;&lt;/p&gt; &lt;h3  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Installation&lt;/span&gt;&lt;/h3&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The worm copies its executable file with random names to the following directories:&lt;/span&gt;&lt;/p&gt; &lt;pre  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;%System%\&lt;rnd&gt;dir.dll&lt;br /&gt;%Program Files%\Internet Explorer\&lt;rnd&gt;.dll&lt;br /&gt;%Program Files%\Movie Maker\&lt;rnd&gt;.dll&lt;br /&gt;%All Users Application Data%\&lt;rnd&gt;.dll&lt;br /&gt;%Temp%\&lt;rnd&gt;.dll&lt;br /&gt;%System%\&lt;rnd&gt;tmp&lt;br /&gt;%Temp%\&lt;rnd&gt;.tmp&lt;/rnd&gt;&lt;/rnd&gt;&lt;/rnd&gt;&lt;/rnd&gt;&lt;/rnd&gt;&lt;/rnd&gt;&lt;/rnd&gt;&lt;/span&gt;&lt;/pre&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;rnd&gt; is a random string of symbols.&lt;/rnd&gt;&lt;/span&gt;&lt;/p&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;In order to ensure that the worm is launched next time the system is started, it creates a system service which launches the worm’s executable file each time Windows is booted. The following registry key will be created:&lt;/span&gt;&lt;/p&gt; &lt;div  class=&quot;pre&quot; style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;[HKLM\SYSTEM\CurrentControlSet\Services\netsvcs]&lt;/span&gt;&lt;/div&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The name of the service will be created from combining words from the list below:&lt;/span&gt;&lt;/p&gt; &lt;pre  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Boot&lt;br /&gt;Center&lt;br /&gt;Config&lt;br /&gt;Driver&lt;br /&gt;Helper&lt;br /&gt;Image&lt;br /&gt;Installer&lt;br /&gt;Manager&lt;br /&gt;Microsoft&lt;br /&gt;Monitor&lt;br /&gt;Network&lt;br /&gt;Security&lt;br /&gt;Server&lt;br /&gt;Shell&lt;br /&gt;Support&lt;br /&gt;System&lt;br /&gt;Task&lt;br /&gt;Time&lt;br /&gt;Universal&lt;br /&gt;Update&lt;br /&gt;Windows&lt;/span&gt;&lt;/pre&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The worm also modifies the following system registry key value:&lt;/span&gt;&lt;/p&gt; &lt;div  class=&quot;pre&quot; style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost] &quot;netsvcs&quot; = &quot;&lt;original&gt; %System%\&lt;rnd&gt;.dll&quot;&lt;/rnd&gt;&lt;/original&gt;&lt;/span&gt;&lt;/div&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The worm hides its files in Explorer by modifying the registry key value shown below:&lt;/span&gt;&lt;/p&gt; &lt;div  class=&quot;pre&quot; style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;[HKCR\ Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]&lt;br /&gt;&quot;Hidden&quot; = &quot;dword: 0x00000002&quot;&lt;br /&gt;&quot;SuperHidden&quot; = &quot;dword: 0x00000000&quot;&lt;br /&gt;[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL]&lt;br /&gt;&quot;CheckedValue&quot; = &quot;dword: 0x00000000&quot;&lt;/span&gt;&lt;/div&gt;  &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The worm flags its presence in the system by creating the unique identifier shown below:&lt;/span&gt;&lt;/p&gt; &lt;div  class=&quot;pre&quot; style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Global\%rnd%-%rnd%&lt;/span&gt;&lt;/div&gt; &lt;h3  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Propagation&lt;/span&gt;&lt;/h3&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;color: rgb(102, 0, 204);&quot;&gt;In order to spread quickly via networks, the worm uses tcpip.sys functions to increase the number of potential network connections.&lt;/span&gt;  &lt;/span&gt;&lt;/p&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The worm connects to the servers shown below in order to determine the external IP address of the victim machine:&lt;/span&gt;&lt;/p&gt; &lt;pre  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://www.getmyip.org&lt;br /&gt;http://www.whatsmyipaddress.com&lt;br /&gt;http://www.whatismyip.org&lt;br /&gt;http://checkip.dyndns.org&lt;/span&gt;&lt;/pre&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The worm then launches an HTTP server on a random TCP port; this is then used to download the worm&#39;s executable file to other computers. &lt;/span&gt;&lt;/p&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Copies of the worm have the extensions listed below:&lt;/span&gt;&lt;/p&gt; &lt;pre  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;.bmp&lt;br /&gt;.gif&lt;br /&gt;.jpeg&lt;br /&gt;.png &lt;/span&gt;&lt;/pre&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The worm gets the IP addresses of computers in the same network as the victim machine and attacks them via a buffer overrun vulnerability (MS08-067) in the Server service.  More details about the vulnerability can be found here: &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx&quot; target=&quot;_blank&quot;&gt;www.microsoft.com/technet/security/Bulletin/MS08-067.mspx&lt;/a&gt;. The worm sends a specially crafted RPC request to TCP ports 139 (NetBIOS) and 445 (Direct hosted SMB)  remote machines on remote machines. This causes a buffer overrun when the wcscpy_s function is called in netapi32.dll, which launches code that downloads the worm&#39;s executable file to the victim machine and launches it.  The worm is then installed on the new victim machine. &lt;/span&gt;&lt;/p&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The worm then hooks the NetpwPathCanonicalize API call (netapi.dll) to prevent buffer overruns caused by the absence of a check on the size of outgoing strings. By doing this, the worm makes repeat exploitation of the vulnerability impossible. &lt;/span&gt;&lt;/p&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;In order to speed up propagation, the worm modifies the following registry value:&lt;/span&gt;&lt;/p&gt; &lt;div  class=&quot;pre&quot; style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;[HKLM\ SYSTEM\CurrentControlSet\Services\Tcpip\Parameters]&lt;br /&gt;&quot;TcpNumConnections&quot; = &quot;dword:0x00FFFFFE&quot;&lt;/span&gt;&lt;/div&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;In order to exploit the vulnerability described above, the worm attempts to connect to the Administrator account on the remote machine.  It searches the network for an appropriate machine and gets a list of users.  It then attempts to brute force each user account using the passwords shown below:z&lt;/span&gt;&lt;/p&gt;   &lt;table  align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; width=&quot;50%&quot; style=&quot;font-family:arial;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;  &lt;pre&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;99999999&lt;br /&gt;9999999&lt;br /&gt;999999&lt;br /&gt;99999&lt;br /&gt;9999&lt;br /&gt;999&lt;br /&gt;99&lt;br /&gt;9&lt;br /&gt;88888888&lt;br /&gt;8888888&lt;br /&gt;888888&lt;br /&gt;88888&lt;br /&gt;8888&lt;br /&gt;888&lt;br /&gt;88&lt;br /&gt;8&lt;br /&gt;77777777&lt;br /&gt;7777777&lt;br /&gt;777777&lt;br /&gt;77777&lt;br /&gt;7777&lt;br /&gt;777&lt;br /&gt;77&lt;br /&gt;7&lt;br /&gt;66666666&lt;br /&gt;6666666&lt;br /&gt;666666&lt;br /&gt;66666&lt;br /&gt;6666&lt;br /&gt;666&lt;br /&gt;66&lt;br /&gt;6&lt;br /&gt;55555555&lt;br /&gt;5555555&lt;br /&gt;555555&lt;br /&gt;55555&lt;br /&gt;5555&lt;br /&gt;555&lt;br /&gt;55&lt;br /&gt;5&lt;br /&gt;44444444&lt;br /&gt;4444444&lt;br /&gt;444444&lt;br /&gt;44444&lt;br /&gt;4444&lt;br /&gt;444&lt;br /&gt;44&lt;br /&gt;4&lt;br /&gt;33333333&lt;br /&gt;3333333&lt;br /&gt;333333&lt;br /&gt;33333&lt;br /&gt;3333&lt;br /&gt;333&lt;br /&gt;33&lt;br /&gt;3&lt;br /&gt;22222222&lt;br /&gt;2222222&lt;br /&gt;222222&lt;br /&gt;22222&lt;br /&gt;2222&lt;br /&gt;222&lt;br /&gt;22&lt;br /&gt;2&lt;br /&gt;&lt;/span&gt;&lt;/pre&gt;&lt;/td&gt; &lt;td&gt;&lt;pre&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;11111111&lt;br /&gt;1111111&lt;br /&gt;111111&lt;br /&gt;11111&lt;br /&gt;1111&lt;br /&gt;111&lt;br /&gt;11&lt;br /&gt;1&lt;br /&gt;00000000&lt;br /&gt;0000000&lt;br /&gt;00000&lt;br /&gt;0000&lt;br /&gt;000&lt;br /&gt;00&lt;br /&gt;0987654321&lt;br /&gt;987654321&lt;br /&gt;87654321&lt;br /&gt;7654321&lt;br /&gt;654321&lt;br /&gt;54321&lt;br /&gt;4321&lt;br /&gt;321&lt;br /&gt;21&lt;br /&gt;12&lt;br /&gt;fuck&lt;br /&gt;zzzzz&lt;br /&gt;zzzz&lt;br /&gt;zzz&lt;br /&gt;xxxxx&lt;br /&gt;xxxx&lt;br /&gt;xxx&lt;br /&gt;qqqqq&lt;br /&gt;qqqq&lt;br /&gt;qqq&lt;br /&gt;aaaaa&lt;br /&gt;aaaa&lt;br /&gt;aaa&lt;br /&gt;sql&lt;br /&gt;file&lt;br /&gt;web&lt;br /&gt;foo&lt;br /&gt;job&lt;br /&gt;home&lt;br /&gt;work&lt;br /&gt;intranet&lt;br /&gt;controller&lt;br /&gt;killer&lt;br /&gt;games&lt;br /&gt;private&lt;br /&gt;market&lt;br /&gt;coffee&lt;br /&gt;cookie&lt;br /&gt;forever&lt;br /&gt;freedom&lt;br /&gt;student&lt;br /&gt;account&lt;br /&gt;academia&lt;br /&gt;files&lt;br /&gt;windows&lt;br /&gt;monitor&lt;br /&gt;&lt;/span&gt;&lt;/pre&gt; &lt;/td&gt; &lt;td&gt; &lt;pre&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;unknown&lt;br /&gt;anything&lt;br /&gt;letitbe&lt;br /&gt;letmein&lt;br /&gt;domain&lt;br /&gt;access&lt;br /&gt;money&lt;br /&gt;campus&lt;br /&gt;explorer&lt;br /&gt;exchange&lt;br /&gt;customer&lt;br /&gt;cluster&lt;br /&gt;nobody&lt;br /&gt;codeword&lt;br /&gt;codename&lt;br /&gt;changeme&lt;br /&gt;desktop&lt;br /&gt;security&lt;br /&gt;secure&lt;br /&gt;public&lt;br /&gt;system&lt;br /&gt;shadow&lt;br /&gt;office&lt;br /&gt;supervisor&lt;br /&gt;superuser&lt;br /&gt;share&lt;br /&gt;super&lt;br /&gt;secret&lt;br /&gt;server&lt;br /&gt;computer&lt;br /&gt;owner&lt;br /&gt;backup&lt;br /&gt;database&lt;br /&gt;lotus&lt;br /&gt;oracle&lt;br /&gt;business&lt;br /&gt;manager&lt;br /&gt;temporary&lt;br /&gt;ihavenopass&lt;br /&gt;nothing&lt;br /&gt;nopassword&lt;br /&gt;nopass&lt;br /&gt;Internet&lt;br /&gt;internet&lt;br /&gt;example&lt;br /&gt;sample&lt;br /&gt;love123&lt;br /&gt;boss123&lt;br /&gt;work123&lt;br /&gt;home123&lt;br /&gt;mypc123&lt;br /&gt;temp123&lt;br /&gt;test123&lt;br /&gt;qwe123&lt;br /&gt;abc123&lt;br /&gt;pw123&lt;br /&gt;root123&lt;br /&gt;pass123&lt;br /&gt;pass12&lt;br /&gt;pass1&lt;br /&gt;admin123&lt;br /&gt;admin12&lt;br /&gt;admin1&lt;br /&gt;&lt;/span&gt;&lt;/pre&gt;&lt;/td&gt; &lt;td&gt;&lt;pre&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;password123&lt;br /&gt;password12&lt;br /&gt;password1&lt;br /&gt;default&lt;br /&gt;foobar&lt;br /&gt;foofoo&lt;br /&gt;temptemp&lt;br /&gt;temp&lt;br /&gt;testtest&lt;br /&gt;test&lt;br /&gt;rootroot&lt;br /&gt;root&lt;br /&gt;adminadmin&lt;br /&gt;mypassword&lt;br /&gt;mypass&lt;br /&gt;pass&lt;br /&gt;&lt;br /&gt;Login&lt;br /&gt;login&lt;br /&gt;Password&lt;br /&gt;password&lt;br /&gt;passwd&lt;br /&gt;zxcvbn&lt;br /&gt;zxcvb&lt;br /&gt;zxccxz&lt;br /&gt;zxcxz&lt;br /&gt;qazwsxedc&lt;br /&gt;qazwsx&lt;br /&gt;q1w2e3&lt;br /&gt;qweasdzxc&lt;br /&gt;asdfgh&lt;br /&gt;asdzxc&lt;br /&gt;asddsa&lt;br /&gt;asdsa&lt;br /&gt;qweasd&lt;br /&gt;qwerty&lt;br /&gt;qweewq&lt;br /&gt;qwewq&lt;br /&gt;nimda&lt;br /&gt;administrator&lt;br /&gt;Admin&lt;br /&gt;admin&lt;br /&gt;a1b2c3&lt;br /&gt;1q2w3e&lt;br /&gt;1234qwer&lt;br /&gt;1234abcd&lt;br /&gt;123asd&lt;br /&gt;123qwe&lt;br /&gt;123abc&lt;br /&gt;123321&lt;br /&gt;12321&lt;br /&gt;123123&lt;br /&gt;1234567890&lt;br /&gt;123456789&lt;br /&gt;12345678&lt;br /&gt;1234567&lt;br /&gt;123456&lt;br /&gt;12345&lt;br /&gt;1234&lt;br /&gt;123&lt;/span&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;     &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;In order to gain administrator access, the worm copies itself to the following shared folders:&lt;/span&gt;&lt;/p&gt; &lt;div  class=&quot;pre&quot; style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;\\*&lt;name&gt;\ADMIN$\System32\&lt;rnd&gt;.&lt;rnd&gt;&lt;br /&gt;\\&lt;name&gt;\IPC$\&lt;rnd&gt;.&lt;rnd&gt; &lt;/rnd&gt;&lt;/rnd&gt;&lt;/name&gt;&lt;/rnd&gt;&lt;/rnd&gt;&lt;/name&gt;&lt;/span&gt;&lt;/div&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The worm can then be launched remotely or scheduled for remote launch using the following commands:&lt;/span&gt;&lt;/p&gt; &lt;div  class=&quot;pre&quot; style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;rundll32.exe &lt;path&gt;, &lt;rnd&gt;&lt;/rnd&gt;&lt;/path&gt;&lt;/span&gt;&lt;/div&gt; &lt;h3  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Spreading via removable storage media&lt;/span&gt;&lt;/h3&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The worm copies its executable file to all removable media under the following name:&lt;/span&gt;&lt;/p&gt; &lt;div  class=&quot;pre&quot; style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;x&gt;:\RECYCLER\S-&lt;%d%&gt;-&lt;%d%&gt;-%d%&gt;-%d%&gt;-%d%&gt;-&lt;br /&gt;%d%&gt;-%d%&gt;\&lt;rnd&gt;.vmx, rnd is a string of random lower case letters; d is a random number; X&lt;br /&gt;is the disk&lt;/rnd&gt;&lt;/x&gt;&lt;/span&gt;&lt;/div&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;In addition to its executable file, the worm also places the file shown below in the root of every disk:&lt;/span&gt;&lt;/p&gt; &lt;div  class=&quot;pre&quot; style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;x&gt;:\autorun.inf&lt;/x&gt;&lt;/span&gt;&lt;/div&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;This file will launch the worm&#39;s executable file each time Explorer is used to open the infected disk. &lt;/span&gt;&lt;/p&gt; &lt;table  class=&quot;enc_ttl&quot; border=&quot;0&quot; cellpadding=&quot;3&quot; cellspacing=&quot;0&quot; width=&quot;100%&quot; style=&quot;font-family:arial;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td klmark=&quot;virus_doctype:3&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;b&gt;&lt;a name=&quot;doc3&quot;&gt;Payload&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;When launching, the worm injects its code into the address space of one of the “svchost.exe” system processes. (The worm may also write its code to the “explorer.exe” and “services.exe” processes.) This code delivers the worm&#39;s main malicious payload and:&lt;/span&gt;&lt;/p&gt; &lt;ol  style=&quot;font-family:arial;&quot;&gt;&lt;li class=&quot;large&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;disables the following services: &lt;/span&gt;&lt;pre&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Windows Automatic Update Service (wuauserv)&lt;br /&gt;Background Intelligent Transfer Service (BITS)&lt;br /&gt;Windows Security Center Service (wscsvc)&lt;br /&gt;Windows Defender Service (WinDefend, WinDefender)&lt;br /&gt;Windows Error Reporting Service (ERSvc)&lt;br /&gt;Windows Error Reporting Service (WerSvc) &lt;/span&gt;&lt;/pre&gt; &lt;/li&gt;&lt;li class=&quot;large&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;blocks access to addresses which contain any of the strings listed below: &lt;/span&gt;&lt;pre&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;nai&lt;br /&gt;ca&lt;br /&gt;avp&lt;br /&gt;avg&lt;br /&gt;vet&lt;br /&gt;bit9&lt;br /&gt;sans&lt;br /&gt;cert&lt;br /&gt;windowsupdate&lt;br /&gt;wilderssecurity&lt;br /&gt;threatexpert&lt;br /&gt;castlecops&lt;br /&gt;spamhaus&lt;br /&gt;cpsecure&lt;br /&gt;arcabit&lt;br /&gt;emsisoft&lt;br /&gt;sunbelt&lt;br /&gt;securecomputing&lt;br /&gt;rising&lt;br /&gt;prevx&lt;br /&gt;pctools&lt;br /&gt;norman&lt;br /&gt;k7computing&lt;br /&gt;ikarus&lt;br /&gt;hauri&lt;br /&gt;hacksoft&lt;br /&gt;gdata&lt;br /&gt;fortinet&lt;br /&gt;ewido&lt;br /&gt;clamav&lt;br /&gt;comodo&lt;br /&gt;quickheal&lt;br /&gt;avira&lt;br /&gt;avast&lt;br /&gt;esafe&lt;br /&gt;ahnlab&lt;br /&gt;centralcommand&lt;br /&gt;drweb&lt;br /&gt;grisoft&lt;br /&gt;eset&lt;br /&gt;nod32&lt;br /&gt;f-prot&lt;br /&gt;jotti&lt;br /&gt;kaspersky&lt;br /&gt;f-secure&lt;br /&gt;computerassociates&lt;br /&gt;networkassociates&lt;br /&gt;etrust&lt;br /&gt;panda&lt;br /&gt;sophos&lt;br /&gt;trendmicro&lt;br /&gt;mcafee&lt;br /&gt;norton&lt;br /&gt;symantec&lt;br /&gt;microsoft&lt;br /&gt;defender&lt;br /&gt;rootkit&lt;br /&gt;malware&lt;br /&gt;spyware&lt;br /&gt;virus&lt;/span&gt;&lt;/pre&gt; &lt;/li&gt;&lt;/ol&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;In Windows Vista, the worm will disable autoconfiguration of the TCP/IP stack in order to speed up propagation via network channels by using a fixed window size for TCP packets:&lt;/span&gt;&lt;/p&gt; &lt;div  class=&quot;pre&quot; style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;netsh interface tcp set global autotuning=disabled&lt;/span&gt;&lt;/div&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The worm also hooks the following API calls (dnsrslvr.dll) in order to block access to the list of user domains:&lt;/span&gt;&lt;/p&gt; &lt;pre  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;DNS_Query_A&lt;br /&gt;DNS_Query_UTF8&lt;br /&gt;DNS_Query_W&lt;br /&gt;Query_Main&lt;br /&gt;sendto &lt;/span&gt;&lt;/pre&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The worm may also download files from links of the type shown below:&lt;/span&gt;&lt;/p&gt; &lt;div  class=&quot;pre&quot; style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://&lt;url&gt;/search?q=&lt;%rnd2%&gt;&lt;/url&gt;&lt;/span&gt;&lt;/div&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;rnd2 is a random number; URL is a link generated by a special algorithm which uses the current date. The worm gets the current date from one of the sites shown below:&lt;/span&gt;&lt;/p&gt; &lt;pre  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://www.w3.org&lt;br /&gt;http://www.ask.com&lt;br /&gt;http://www.msn.com&lt;br /&gt;http://www.yahoo.com&lt;br /&gt;http://www.google.com&lt;br /&gt;http://www.baidu.com&lt;br /&gt;http://www.myspace.com&lt;br /&gt;http://www.msn.com&lt;br /&gt;http://www.ebay.com&lt;br /&gt;http://www.cnn.com&lt;br /&gt;http://www.aol.com &lt;/span&gt;&lt;/pre&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Downloaded files are saved to the Windows system directory under their original names. &lt;/span&gt;&lt;/p&gt; &lt;table  class=&quot;enc_ttl&quot; border=&quot;0&quot; cellpadding=&quot;3&quot; cellspacing=&quot;0&quot; width=&quot;100%&quot; style=&quot;font-family:arial;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td klmark=&quot;virus_doctype:2&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;b&gt;&lt;a name=&quot;doc2&quot;&gt;Removal instructions&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;If your computer does not have an up-to-date antivirus solution, or does not have an antivirus solution at all, you can either use a special removal tool (which can be found &lt;a href=&quot;http://support.kaspersky.com/faq/?qid=208279973&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; or follow the instructions below:&lt;/span&gt;&lt;/p&gt; &lt;div  class=&quot;pre&quot; style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;More details about the vulnerability can be found here:&lt;br /&gt;http://www.kaspersky.ru/support/wks6mp3/error?qid=208636215&lt;/span&gt;&lt;/div&gt; &lt;p  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Or follow the instructions below:&lt;/span&gt;&lt;/p&gt; &lt;ol  style=&quot;font-family:arial;&quot;&gt;&lt;li class=&quot;large&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Delete the following &lt;a href=&quot;http://support.kaspersky.com/faq/?qid=208279334&quot; target=&quot;_blank&quot;&gt;system registry&lt;/a&gt;key: &lt;/span&gt;&lt;div class=&quot;pre&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;[HKLM\SYSTEM\CurrentControlSet\Services\netsvcs]&lt;/span&gt;&lt;/div&gt; &lt;/li&gt;&lt;li class=&quot;large&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Delete “%System%\&lt;rnd&gt;.dll” from the system registry key value shown below: &lt;/rnd&gt;&lt;/span&gt;&lt;div class=&quot;pre&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost]&lt;br /&gt;&quot;netsvcs&quot;&lt;/span&gt;&lt;/div&gt; &lt;/li&gt;&lt;li class=&quot;large&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Revert the following registry key values: &lt;/span&gt;&lt;div class=&quot;pre&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;[HKCR\ Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]&lt;br /&gt;&quot;Hidden&quot; = &quot;dword: 0x00000002&quot;&lt;br /&gt;&quot;SuperHidden&quot; = &quot;dword: 0x00000000&quot;&lt;/span&gt;&lt;/div&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;     to&lt;/span&gt;&lt;/p&gt; &lt;div class=&quot;pre&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;[HKCR\ Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]&lt;br /&gt;&quot;Hidden&quot; = &quot;dword: 0x00000001&quot;&lt;br /&gt;&quot;SuperHidden&quot; = &quot;dword: 0x00000001&quot;&lt;/span&gt;&lt;/div&gt;  &lt;div class=&quot;pre&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL]&lt;br /&gt;&quot;CheckedValue&quot; = &quot;dword: 0x00000000&quot;&lt;/span&gt;&lt;/div&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;to&lt;/span&gt;&lt;/p&gt; &lt;div class=&quot;pre&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL]&lt;br /&gt;&quot;CheckedValue&quot; = &quot;dword: 0x00000001&quot;&lt;/span&gt;&lt;/div&gt; &lt;/li&gt;&lt;li class=&quot;large&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Reboot the computer.  &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;large&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Delete the original worm file (the location will depend on how the program originally penetrated the victim machine). &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;large&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Delete copies of the worm: &lt;/span&gt;&lt;pre&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;%System%\&lt;rnd&gt;dir.dll&lt;br /&gt;%Program Files%\Internet Explorer\&lt;rnd&amp;amp;gt.dll program=&quot;&quot; movie=&quot;&quot;&gt;&lt;rnd&gt;.dll&lt;br /&gt;%All Users Application Data%\&lt;rnd&gt;.dll&lt;br /&gt;%Temp%\&lt;rnd&gt;.dll&lt;br /&gt;%System%\&lt;rnd&gt;tmp&lt;br /&gt;%Temp%\&lt;rnd&gt;.tmp&lt;/rnd&gt;&lt;/rnd&gt;&lt;/rnd&gt;&lt;/rnd&gt;&lt;/rnd&gt;&lt;/rnd&amp;amp;gt.dll&gt;&lt;/rnd&gt;&lt;/span&gt;&lt;/pre&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;rnd&gt; is a random string of symbols. &lt;/rnd&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;large&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Delete the files shown below from all removable storage media: &lt;/span&gt;&lt;div class=&quot;pre&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;x&gt;:\autorun.inf&lt;br /&gt;&lt;x&gt;:\RECYCLER\S-&lt;%d%&gt;-&lt;%d%&gt;-%d%&gt;-%d%&gt;-%d%&gt;-%d%&gt;-&lt;br /&gt;%d%&gt;\&lt;rnd&gt;.vmx, &lt;/rnd&gt;&lt;/x&gt;&lt;/x&gt;&lt;/span&gt;&lt;/div&gt; &lt;/li&gt;&lt;li class=&quot;large&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Download and install updates for the operating system: &lt;/span&gt;&lt;div class=&quot;pre&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx&lt;/span&gt;&lt;/div&gt; &lt;/li&gt;&lt;li class=&quot;large&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Update your antivirus databases and perform a full scan of the computer (&lt;a href=&quot;http://www.kaspersky.com/trials&quot; target=&quot;_blank&quot;&gt;download&lt;/a&gt; a trial version of Kaspersky Anti-Virus).&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;large&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Or download f-secure here: &lt;/span&gt;&lt;br /&gt;&lt;p&gt;&lt;a href=&quot;ftp://ftp.f-secure.com/anti-virus/tools/beta/f-downadup.zip&quot; target=&quot;_blank&quot;&gt;&lt;img class=&quot;alignnone size-full wp-image-136&quot; style=&quot;border: 0pt none ;&quot; title=&quot;Download&quot; src=&quot;http://www.geekzlife.net/v1/wp-content/uploads/2008/09/download.gif&quot; alt=&quot;Download&quot; height=&quot;39&quot; width=&quot;153&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;span style=&quot;;font-family:arial;font-size:85%;&quot;  &gt;Detection added:     01-06-2009&lt;br /&gt;Update released: &lt;span klmark=&quot;virus:21782749&quot;&gt;    Jan 06 2009 22:05 GMT&lt;br /&gt;Description Added: &lt;/span&gt;&lt;span klmark=&quot;virus:21782749&quot;&gt;Jan 21 2009&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(153, 153, 153);font-family:arial;font-size:85%;&quot;  &gt;Source: http://www.viruslist.com&lt;/span&gt;</description><link>http://friedfly.blogspot.com/2009/02/downup-conficker-downadup-kido-worm.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-3938499280909566989</guid><pubDate>Thu, 15 Jan 2009 04:13:00 +0000</pubDate><atom:updated>2009-01-14T20:18:55.862-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Virus Removal</category><title>How to remove SALITY</title><description>&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span&gt;&lt;span&gt;Sality is a &lt;span style=&quot;border-bottom: 1px solid rgb(0, 153, 0); text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal;&quot; class=&quot;IL_LINK_STYLE&quot;&gt;virus&lt;/span&gt; that has backdoor capabilities and executes keylogger and may infect executable files by putting its code to host files. Once it is installed, Sality &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;virus&lt;/span&gt; will infect local executable files and delete all files that are associated with anti-virus and &lt;/span&gt;&lt;span style=&quot;border-bottom: 1px solid rgb(0, 153, 0); text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal;&quot; class=&quot;IL_LINK_STYLE&quot;&gt;anti-spyware&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;span style=&quot;border-bottom: 1px solid rgb(0, 153, 0); text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal;&quot; class=&quot;IL_LINK_STYLE&quot;&gt;applications&lt;/span&gt;, as well as firewalls. After this, Sality runs a keylogging module that gathers all system and network &lt;/span&gt;&lt;span style=&quot;border-bottom: 1px solid rgb(0, 153, 0); text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal;&quot; class=&quot;IL_LINK_STYLE&quot;&gt;information&lt;/span&gt;, records passwords and login names, steals all sensitive &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;information&lt;/span&gt; and sends all this collected data to a predefined email address.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;In addition, Sality opens a backdoor that allows the remote attacker to get the full control over the infected &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;computer&lt;/span&gt;&lt;span&gt; and this places any financial or banking &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;information&lt;/span&gt; stored on your &lt;/span&gt;&lt;span style=&quot;border-bottom: 1px solid rgb(0, 153, 0); text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal;&quot; class=&quot;IL_LINK_STYLE&quot;&gt;computer&lt;/span&gt; in severe jeopardy and represents a serious security risk.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Also known as: W32/Sality (McAfee), &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;Virus&lt;/span&gt;.Win32.Sality.aa (Kaspersky), W32.Sality.AE (Symantec), &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;Virus&lt;/span&gt;:Win32/Sality.AM (MS OneCare), PE_SALITY.EM (Trend)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;W32/Sality is a parasitic &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;virus&lt;/span&gt; that infects Win32 PE executable files. It is a polymorphic &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;virus&lt;/span&gt; that attempts to spread by file infection. It looks for Win32 PE executable files with .EXE or .SCR file extensions, and infects any such files found on the system by appending the &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;virus&lt;/span&gt;&lt;span&gt; body to the &lt;span style=&quot;border-bottom: 1px solid rgb(0, 153, 0); text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal;&quot; class=&quot;IL_LINK_STYLE&quot;&gt;host file&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;The &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;virus&lt;/span&gt; also attempts to propagate by copying itself with a random filename to network drives, including all removable disk drives. Sality.AA also creates an &lt;/span&gt;&lt;span style=&quot;color: rgb(204, 0, 0);&quot;&gt;&quot;autorun.inf&quot;&lt;/span&gt;&lt;span&gt; file in these drives so that the &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;virus&lt;/span&gt; executes when it is accessed.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Upon execution, it drops the following files into the &lt;span style=&quot;border-bottom: 1px solid rgb(0, 153, 0); text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal;&quot; class=&quot;IL_LINK_STYLE&quot;&gt;Windows system&lt;/span&gt; directory:&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;%Windir%\System32\Hdaudprop.dll&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;%Windir%\System32\Hdaudpropres.dll&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;%Windir%\System32\Hdaudpropshortcut.exe&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;%Windir%\System32\drivers\Hdaudbus.sys&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;%Windir%\System32\drivers\Hdaudio.sys&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;%Windir%\System32\drivers\portcls.sys&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Creates the following registry keys:&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\WMI_MFC_TPSHOCKER_80&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\IPFILTERDRIVER&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span&gt;and it downloads further &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;malware&lt;/span&gt; from the following domains:&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;bpowqbvcfds677.info&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;aapowqbvcfds677.info&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;abpowqbvcfds677.info&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;d98dc9.bpowqbvcfds677.info&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;bmakemegood24.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;d99395.bmakemegood24.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;bbeakemegood24.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;bperfectchoice1.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;d998b6.bperfectchoice1.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;cbparfectchoice1.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;cbpbrfectchoice1.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;bcash-ddt.net&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;d9aab7.bcash-ddt.net&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;pzrk.ru&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;dbcabh-ddt.net&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;bddr-cash.net&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;ebddrbcash.net&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span&gt;It also modifies the following &lt;span style=&quot;border-bottom: 1px solid rgb(0, 153, 0); text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal;&quot; class=&quot;IL_LINK_STYLE&quot;&gt;registry entries&lt;/span&gt;:&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Setting\&quot;GlobalUserOffline&quot; = &quot;0&quot;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\&quot;EnableLUA&quot; = &quot;0&quot;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span&gt;and this &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;virus&lt;/span&gt; also deletes entries in the following registry subkeys:&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;Sality.AA bypasses the system firewall by executing the command:&lt;br /&gt;&lt;span style=&quot;font-style: italic; color: rgb(153, 0, 0);&quot;&gt;netsh firewall set opmode disable&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;It may also disable settings related to system security. It does this by adding the following &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;registry entries&lt;/span&gt;:&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusOverride = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\FirewallOverride = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\UacDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\Svc\FirewallDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\Svc\FirewallOverride = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\Svc\UpdatesDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\Svc\UacDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span&gt;The &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;virus&lt;/span&gt;&lt;span&gt; sets the following registry entry so that hidden folders and files are not displayed in &lt;span style=&quot;border-bottom: 1px solid rgb(0, 153, 0); text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal;&quot; class=&quot;IL_LINK_STYLE&quot;&gt;Windows Explorer&lt;/span&gt; view:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 0, 0); font-size: 85%;&quot;&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden = 2&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;It also disables Registry Editor and Task Manager by adding these &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;registry entries&lt;/span&gt;:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;color: rgb(153, 0, 0);&quot;&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableTaskMgr = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;color: rgb(153, 0, 0);&quot;&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;/span&gt;&lt;span&gt;Sality.AA terminates all anti &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;virus&lt;/span&gt; routine services running on the system, and prevent access to Websites that contain its names, like &lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;sality_remove, viruscan, sophos, mcafee, eset.com, kaspersky, onlinescan&lt;/span&gt;, and more...&lt;br /&gt;&lt;br /&gt;The device driver is not dropped and installed onto the system unless there is an active internet connection.&lt;br /&gt;&lt;br /&gt;&lt;span&gt;The &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;virus&lt;/span&gt;&lt;span&gt; may prevent execution of &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;applications&lt;/span&gt; that perform an integrity self-check as a result of them being infected.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;So my dear friend the easiest way to tackle this &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;virus&lt;/span&gt; is to Remove above mention &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;Virus&lt;/span&gt; Entry Doors from registry and Delete those .DLL files from system.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Sality Manual Removal Instructions&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Below is a list of Sality manual removal instructions and Sality components listed to help you remove Sality from your PC. Backup Reminder: Always be sure to back up your PC before making any changes.&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Note: This manual removal process may be difficult and you run the risk of destroying your &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;computer&lt;/span&gt;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Step 1 : Use Windows File Search Tool to Find Sality Path&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Go to Start &gt; Search &gt; All Files or Folders.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;In the &quot;All or part of the the file name&quot; section, type in &quot;Sality&quot; file name(s).&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span&gt;To get better results, select &quot;Look in: Local Hard Drives&quot; or &quot;Look in: My &lt;span class=&quot;IL_SPAN&quot;&gt;&lt;input name=&quot;IL_MARKER&quot; type=&quot;hidden&quot;&gt;Computer&lt;/span&gt;&quot; and then click &quot;Search&quot; button.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;When Windows finishes your search, hover over the &quot;In Folder&quot; of &quot;Sality&quot;, highlight the file and copy/paste the path into the address bar. Save the file&#39;s path on your clipboard because you&#39;ll need the file path to delete Sality in the following manual removal steps.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;Step 2 : Use Windows Command Prompt to Unregister Sality DLL Files&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;To open the Windows Command Prompt, go to Start &gt; Run &gt; type cmd and then click the &quot;OK&quot; button.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Type &quot;cd&quot; in order to change the current directory, press the &quot;space&quot; button, enter the full path to where you believe the Sality DLL file is located and press the &quot;Enter&quot; button on your keyboard. If you don&#39;t know where Sality DLL file is located, use the &quot;dir&quot; command to display the directory&#39;s contents.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;To unregister &quot;Sality&quot; DLL file, type in the exact directory path + &quot;regsvr32 /u&quot; + [DLL_NAME] (for example, :&lt;span style=&quot;font-style: italic; color: rgb(204, 0, 0);&quot;&gt;C\Spyware-folder\&gt; regsvr32 /u Sality.dll&lt;/span&gt;) and press the &quot;Enter&quot; button. A message will pop up that says you successfully unregistered the file.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Search and unregister &quot;Sality&quot; DLL files: &lt;span style=&quot;font-style: italic; color: rgb(204, 0, 0);&quot;&gt;syslib32.dll, sysdll.dll, oledsp32.dll&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;Step 3 : Detect and Delete Other Sality Files&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;To open the Windows Command Prompt, go to Start &gt; Run &gt; type cmd and then press the &quot;OK&quot; button.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Type in &quot;dir /A name_of_the_folder&quot; (for example, C:\Spyware-folder), which will display the folder&#39;s content even the hidden files.&lt;/span&gt;&lt;!--INFOLINKS_STOP--&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;To change directory, type in &quot;cd name_of_the_folder&quot;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Once you have the file you&#39;re looking for type in &quot;del name_of_the_file&quot;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;To delete a file in folder, type in &quot;del name_of_the_file&quot;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;To delete the entire folder, type in &quot;rmdir /S name_of_the_folder&quot;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Select the &quot;Sality&quot; process and click on the &quot;End Process&quot; button to kill it.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Remove the &quot;Sality&quot; processes files: &lt;span style=&quot;color: rgb(204, 0, 0);&quot;&gt;syslib32.dll, sysdll.dll, oledsp32.dll, oledsp32.dll, sysdll.dll, syslib32.dll&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;color: rgb(153, 153, 153); font-family: arial;font-size:85%;&quot; &gt;source: (viruscontra)&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;The best tool to remove sality variants is the kaspersky removal tool.&lt;br /&gt;Plug your infected to another PC (slave) and rrin the tool.&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://friedfly.blogspot.com/2009/01/how-to-remove-sality.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-4081070000525093546</guid><pubDate>Thu, 04 Dec 2008 12:25:00 +0000</pubDate><atom:updated>2008-12-04T04:28:22.052-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows Apps</category><title>Windows 7 Ultimate Milestone 2 (M2) Build 6589.1</title><description>&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;img src=&quot;http://i34.tinypic.com/xd5g87.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;INFO:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Windows 7&lt;/b&gt; Milestone 2 Ultimate Edition is alive, kicking and as real as they get! Although it&#39;s but one year away from the moment Windows Vista hit the shelves, and despite being in the final stages of development of Windows Vista Service Pack 1 and Windows XP Service Pack 3, Microsoft is also building &lt;b&gt;Windows 7&lt;/b&gt;.At this point in time,&lt;b&gt;Windows 7 &lt;/b&gt;is being dogfooded inhouse by Microsoft. However, the successor of Windows Vista was also shipped in an early stage to a select pool of the Redmond company&#39;s key partners.&lt;br /&gt;&lt;br /&gt;On January 24, you were able to feast your eyes on the first ever leaked screenshots from &lt;b&gt;Windows 7&lt;/b&gt; Ultimate Edition version 6.1&lt;br /&gt;(Build 6519.1.x86fre.winmain.071220-1525), courtesy of ThinkNext.&lt;br /&gt;&lt;br /&gt;Because of numerous accusations that the images had been tampered with, and were fake, the Chinese blog posted the video embedded at the bottom of this article. Yes, this is &lt;b&gt;Windows 7&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&quot;I was about to share something interesting about &lt;/b&gt;&lt;b&gt;Windows 7&lt;/b&gt;&lt;b&gt; in my last post,&lt;/b&gt;&lt;b&gt;Windows 7&lt;/b&gt;:&lt;b&gt; The Real Thing. The ISO image, bootable, installation, evaluation and the screenshots are all real. I mean there is no Photoshop or anything like that involved,&quot;reads a fragment from ThinkNext.&quot;I&#39;m not a person who makes himself complacent by faking something hot, neither will I be unhappy if someone denies the real information I posted. I don&#39;t mean to draw much attention, especially from those suckers.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Users that are running Windows Media Center under Vista Home Premium and Ultimate SKUs will undoubtedly notice differences when it comes to the WMC running in the Ultimate edition of &lt;b&gt;Windows 7&lt;/b&gt;. While the interface is approximately the same, the text size has changed, and so has the number of categories.&lt;br /&gt;&lt;br /&gt;In fact,&lt;b&gt;Windows 7&lt;/b&gt; M2 is nothing more than an artificially customized image of Windows Vista Service Pack 1, masquerading as the next version of Windows. Even more, there has been no official confirmation of &lt;b&gt;Windows 7&lt;/b&gt; Milestone 2 from Microsoft or from other sources. In this context, M2 is as good as inexistent.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Windows 7&lt;/b&gt; M2 comes, as all software under development from Microsoft.&quot;I don&#39;t think there is anything wrong, disappointing or weird that &lt;b&gt;Windows 7&lt;/b&gt; Milestone 2 isn&#39;t greatly different from Vista. It&#39;s only Milestone 2 so lots of code may be reused. Besides, even we can&#39;t see much visual changes, that doesn&#39;t mean Win7 internals don&#39;t change greatly. Here from the release notes, I read: &#39;the software will stop running on June 2008. You may not receive any other notice. You may not be able to access data used with the software when it stops running&#39;,&quot; added ThinkNext.&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://i19.tinypic.com/4ys0q3o.png&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;Screens &amp;amp; Features&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;The Real Windows 7 Ultimate Milestone 2 (M2) Build 6589.1&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://i38.tinypic.com/2i8exdz.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;img src=&quot;http://i38.tinypic.com/1124dh5.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;img src=&quot;http://i37.tinypic.com/i41owx.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;img src=&quot;http://i35.tinypic.com/xnryp0.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Bootable On ISO Format&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://i38.tinypic.com/24mucz6.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;img src=&quot;http://i37.tinypic.com/2yopbva.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Support About 90 Languages&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://i38.tinypic.com/3587z3n.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Activated And Genuine Windows&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://i33.tinypic.com/23lnw3d.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Working Firewall And Updates&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://i33.tinypic.com/11uu8gy.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;img src=&quot;http://i38.tinypic.com/rarqqh.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Milestone 2 Ultimate Edition 6589.1.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Try: Post your comment for the download link.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://friedfly.blogspot.com/2008/12/windows-7-ultimate-milestone-2-m2-build.html</link><author>noreply@blogger.com (Channi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i34.tinypic.com/xd5g87_th.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-8230596946912375802</guid><pubDate>Thu, 27 Nov 2008 07:16:00 +0000</pubDate><atom:updated>2008-11-26T23:25:48.873-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Virus Removal</category><title>Flash Disinfector</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV4eH7_m6N-2vVVikS0QiwiTZVv1etXeW9jRPjmFls1lWpLd_qXVQahhLT6HmKC46nuN5D6yHvrCESPuNPaZgoBsltloUuq7WLTyz3IB04sUdyJvOYMr4LVp88b5fNqlsOMV8BNKFWOfGC/s1600-h/flasdesinf%5B1%5D.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV4eH7_m6N-2vVVikS0QiwiTZVv1etXeW9jRPjmFls1lWpLd_qXVQahhLT6HmKC46nuN5D6yHvrCESPuNPaZgoBsltloUuq7WLTyz3IB04sUdyJvOYMr4LVp88b5fNqlsOMV8BNKFWOfGC/s400/flasdesinf%5B1%5D.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5273235103326024578&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Flash Disinfector was designed to remove unwanted files including autorun.inf on removable USB drives, flash drives and memory sticks. Use flash disinfector if you cannot access your USB drives, flash drives and memory stick due to modifications done by autorun Worms.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Author:&lt;/span&gt; sUBs&lt;br /&gt;&lt;/span&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;Operating System: &lt;/strong&gt;Windows 2000/XP/Vista&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;Download Here:&lt;br /&gt;&lt;/strong&gt;&lt;u&gt;&lt;span style=&quot;color:#810081;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.techsupportforum.com/sectools/sUBs/Flash_Disinfector.exe&quot;&gt;Flash Disinfector&lt;/a&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;Threat Removal Procedure:&lt;/strong&gt;&lt;br /&gt;1. Download &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.techsupportforum.com/sectools/sUBs/Flash_Disinfector.exe&quot;&gt;Flash_Disinfector&lt;/a&gt; and save it ot your Desktop.2&lt;br /&gt;2. After downloading, double-click on Flash_Disinfector to run it.&lt;br /&gt;3. Just follow the prompts and continue until it begin scanning.&lt;br /&gt;4. If asked to insert your flash drive or any removable device including USB Pen Drive and Memory Stick, please do so.&lt;br /&gt;5. It will scan removable drives, wait for the scan to finish. Done.&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://friedfly.blogspot.com/2008/11/flash-disinfector.html</link><author>noreply@blogger.com (Channi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV4eH7_m6N-2vVVikS0QiwiTZVv1etXeW9jRPjmFls1lWpLd_qXVQahhLT6HmKC46nuN5D6yHvrCESPuNPaZgoBsltloUuq7WLTyz3IB04sUdyJvOYMr4LVp88b5fNqlsOMV8BNKFWOfGC/s72-c/flasdesinf%5B1%5D.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-1505669360235026431</guid><pubDate>Thu, 23 Oct 2008 03:29:00 +0000</pubDate><atom:updated>2008-10-22T20:33:17.343-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows Apps</category><title>Microsoft Windows SHORTCUT Keys</title><description>&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;color: rgb(51, 51, 255); font-family: arial; font-weight: bold;&quot;&gt;Internet Explorer Shortcuts:&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;code style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;CTRL+A - Select all items on the current page&lt;br /&gt;CTRL+D - Add the current page to your Favorites&lt;br /&gt;CTRL+E - Open the Search bar&lt;br /&gt;CTRL+F - Find on this page&lt;br /&gt;CTRL+H - Open the History bar&lt;br /&gt;CTRL+I - Open the Favorites bar&lt;br /&gt;CTRL+N - Open a new window&lt;br /&gt;CTRL+O - Go to a new location&lt;br /&gt;CTRL+P - Print the current page or active frame&lt;br /&gt;CTRL+S - Save the current page&lt;br /&gt;CTRL+W - Close current browser window&lt;br /&gt;CTRL+ENTER - Adds the http://www. (url) .com&lt;br /&gt;SHIFT+CLICK - Open link in new window&lt;br /&gt;BACKSPACE - Go to the previous page&lt;br /&gt;ALT+HOME - Go to your Home page&lt;br /&gt;HOME - Move to the beginning of a document&lt;br /&gt;TAB - Move forward through items on a page&lt;br /&gt;END - Move to the end of a document&lt;br /&gt;ESC - Stop downloading a page&lt;br /&gt;F11 - Toggle full-screen view&lt;br /&gt;F5 - Refresh the current page&lt;br /&gt;F4 - Display list of typed addresses&lt;br /&gt;F6 - Change Address bar and page focus&lt;br /&gt;ALT+RIGHT ARROW - Go to the next page&lt;br /&gt;SHIFT+CTRL+TAB - Move back between frames&lt;br /&gt;SHIFT+F10 - Display a shortcut menu for a link&lt;br /&gt;SHIFT+TAB - Move back through the items on a page&lt;br /&gt;CTRL+TAB - Move forward between frames&lt;br /&gt;CTRL+C - Copy selected items to the clipboard&lt;br /&gt;CTRL+V - Insert contents of the clipboard&lt;br /&gt;ENTER - Activate a selected link&lt;br /&gt;HOME - Move to the beginning of a document&lt;br /&gt;END - Move to the end of a document&lt;br /&gt;F1 - Display Internet Explorer Help&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/code&gt;&lt;span style=&quot;color: rgb(51, 51, 255); font-family: arial;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Windows Explorer Shortcuts:&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;code style=&quot;font-family: arial;&quot;&gt;ALT+SPACEBAR - Display the current windowâ€™s system menu&lt;br /&gt;SHIFT+F10 - Display the item&#39;s context menu&lt;br /&gt;CTRL+ESC - Display the Start menu&lt;br /&gt;ALT+TAB - Switch to the window you last used&lt;br /&gt;ALT+F4 - Close the current window or quit&lt;br /&gt;CTRL+A - Select all items&lt;br /&gt;CTRL+X - Cut selected item(s)&lt;br /&gt;CTRL+C - Copy selected item(s)&lt;br /&gt;CTRL+V - Paste item(s)&lt;br /&gt;CTRL+Z - Undo last action&lt;br /&gt;CTRL+(+) - Automatically resize the columns in the right hand pane&lt;br /&gt;TAB - Move forward through options&lt;br /&gt;ALT+RIGHT ARROW - Move forward to a previous view&lt;br /&gt;ALT+LEFT ARROW - Move backward to a previous view&lt;br /&gt;SHIFT+DELETE - Delete an item immediately&lt;br /&gt;BACKSPACE - View the folder one level up&lt;br /&gt;ALT+ENTER - View an itemâ€™s properties&lt;br /&gt;F10 - Activate the menu bar in programs&lt;br /&gt;F6 - Switch between left and right panes&lt;br /&gt;F5 - Refresh window contents&lt;br /&gt;F3 - Display Find application&lt;br /&gt;F2 - Rename selected item&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(51, 51, 255); font-weight: bold;&quot;&gt;Windows XP Shortcut:&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/code&gt;&lt;code style=&quot;font-family: arial;&quot;&gt;ALT+- (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window&#39;s System menu&lt;br /&gt;ALT+ENTER View properties for the selected item&lt;br /&gt;ALT+ESC Cycle through items in the order they were opened&lt;br /&gt;ALT+F4 Close the active item, or quit the active program&lt;br /&gt;ALT+SPACEBAR Display the System menu for the active window&lt;br /&gt;ALT+TAB Switch between open items&lt;br /&gt;ALT+Underlined letter Display the corresponding menu&lt;br /&gt;BACKSPACE View the folder one level up in My Computer or Windows Explorer&lt;br /&gt;CTRL+A Select all&lt;br /&gt;CTRL+B Bold&lt;br /&gt;CTRL+C Copy&lt;br /&gt;CTRL+I Italics&lt;br /&gt;CTRL+O Open an item&lt;br /&gt;CTRL+U Underline&lt;br /&gt;CTRL+V Paste&lt;br /&gt;CTRL+X Cut&lt;br /&gt;CTRL+Z Undo&lt;br /&gt;CTRL+F4 Close the active document&lt;br /&gt;CTRL while dragging Copy selected item&lt;br /&gt;CTRL+SHIFT while dragging Create shortcut to selected iteM&lt;br /&gt;CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word&lt;br /&gt;CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word&lt;br /&gt;CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph&lt;br /&gt;CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph&lt;br /&gt;SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin&lt;br /&gt;ESC Cancel the current task&lt;br /&gt;F1 Displays Help&lt;br /&gt;F2 Rename selected item&lt;br /&gt;F3 Search for a file or folder&lt;br /&gt;F4 Display the Address bar list in My Computer or Windows Explorer&lt;br /&gt;F5 Refresh the active window&lt;br /&gt;F6 Cycle through screen elements in a window or on the desktop&lt;br /&gt;F10 Activate the menu bar in the active program&lt;br /&gt;SHIFT+F10 Display the shortcut menu for the selected item&lt;br /&gt;CTRL+ESC Display the Start menu&lt;br /&gt;SHIFT+CTRL+ESC Launches Task Manager&lt;br /&gt;SHIFT when you insert a CD Prevent the CD from automatically playing&lt;br /&gt;WIN Display or hide the Start menu&lt;br /&gt;WIN+BREAK Display the System Properties dialog box&lt;br /&gt;WIN+D Minimizes all Windows and shows the Desktop&lt;br /&gt;WIN+E Open Windows Explorer&lt;br /&gt;WIN+F Search for a file or folder&lt;br /&gt;WIN+F+CTRL Search for computers&lt;br /&gt;WIN+L Locks the desktop&lt;br /&gt;WIN+M Minimize or restore all windows&lt;br /&gt;WIN+R Open the Run dialog box&lt;br /&gt;WIN+TAB Switch between open items&lt;br /&gt;&lt;br /&gt;&lt;/code&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;code style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;color: rgb(192, 192, 192);font-size:78%;&quot; &gt;src:markiee.com&lt;/span&gt;&lt;/code&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;code style=&quot;font-family: arial;&quot;&gt;&lt;/code&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://friedfly.blogspot.com/2008/10/microsoft-windows-shortcut-keys.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-495574179808284389</guid><pubDate>Thu, 23 Oct 2008 03:21:00 +0000</pubDate><atom:updated>2008-10-22T20:28:54.634-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Virus Removal</category><title>Remove COOL USEP SCANDAL malware</title><description>&lt;div style=&quot;font-family: arial;&quot; class=&quot;post&quot;&gt;     &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The work of this malware are&lt;/span&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;it changes the default homepage on IE to this &lt;a href=&quot;http://www.redtube.com/&quot;&gt;site&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;disables homepage of IE&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;infects your windows registry&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;disables regedit.exe, even in safemode&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;copies a file called cool usep scandal&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;this thingy malware is related to the funny UST Scandal.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;It seems that none of the currently available antivirus, or antispyware seems to work.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Detailed instructions on how to remove this malware is from this &lt;a href=&quot;http://www.bleepingcomputer.com/forums/topic152700.html&quot;&gt;website.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;You also need to download first this files for the removal of the said malware&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; Best Tool:&lt;a style=&quot;color: rgb(51, 51, 255);&quot; href=&quot;http://www.4shared.com/get/60517505/114e3d2c/Cool_USEP_Scandal_Remover.html;jsessionid=D43F80E3B4BE5636434D3048D31F8F7C.dc49&quot;&gt; &lt;/a&gt;&lt;a style=&quot;color: rgb(51, 51, 255);&quot; href=&quot;http://www.4shared.com/get/60517505/114e3d2c/Cool_USEP_Scandal_Remover.html;jsessionid=D43F80E3B4BE5636434D3048D31F8F7C.dc49&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;Cool &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: rgb(51, 51, 255);font-size:78%;&quot; &gt;&lt;a href=&quot;http://pagead2.googlesyndication.com/pagead/ads?client=ca-pub-6266657665766576&amp;amp;host=pub-1556223355139109&amp;amp;dt=1224790670781&amp;amp;lmt=1224730771&amp;amp;prev_fmts=468x15_0ads_al&amp;amp;format=fp_al_lp&amp;amp;output=html&amp;amp;correlator=1224790670625&amp;amp;url=http%3A%2F%2Ffriedfly.blogspot.com%2F&amp;amp;ea=0&amp;amp;ref=http%3A%2F%2Fwww.blogger.com%2Fpost-create.g%3FblogID%3D596458025647659935&amp;amp;frm=0&amp;amp;ga_vid=1883470316.1224790671&amp;amp;ga_sid=1224790671&amp;amp;ga_hid=589361331&amp;amp;flash=9.0.124&amp;amp;u_h=768&amp;amp;u_w=1024&amp;amp;u_ah=734&amp;amp;u_aw=1024&amp;amp;u_cd=32&amp;amp;u_tz=-420&amp;amp;u_his=1&amp;amp;u_java=true&amp;amp;u_nplug=17&amp;amp;u_nmime=55&amp;amp;kw_type=radlink&amp;amp;rt=ChBI_-5sAACzGQpvpBMJMmWiEg5TZXJ2aWNlIFBhY2sgMhoIQhTAT4L8xacgpdT2vwEoATACSKXU9r8BSOTe0MQCUhMInsygnrO8lgIVF7dvCh3RHChH&amp;amp;hl=en&amp;amp;kw0=Service+Pack+2&amp;amp;kw1=Windows+XP+SP1&amp;amp;kw2=Bootable+Disk&amp;amp;kw3=Boot+Floppy&amp;amp;okw=Service+Pack+2&quot;&gt;Usep&lt;/a&gt;&lt;a href=&quot;http://www.4shared.com/get/60517505/114e3d2c/Cool_USEP_Scandal_Remover.html;jsessionid=D43F80E3B4BE5636434D3048D31F8F7C.dc49&quot;&gt; Remover&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;                     &lt;a href=&quot;http://www.4shared.com/get/60517505/114e3d2c/Cool_USEP_Scandal_Remover.html;jsessionid=D43F80E3B4BE5636434D3048D31F8F7C.dc49&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Alternate Download:&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt; &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;ftp://ftp.drweb.com/pub/drweb/cureit/drweb-cureit.exe&quot;&gt;DrWeb-CureIt&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt; &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://www.besttechie.net/tools/mbam-setup.exe&quot;&gt;Malwarebytes Anti-Malware&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;     &lt;/div&gt;</description><link>http://friedfly.blogspot.com/2008/10/remove-cool-usep-scandal-malware.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-8518709224976326034</guid><pubDate>Thu, 23 Oct 2008 02:45:00 +0000</pubDate><atom:updated>2008-10-22T19:59:31.924-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Virus Removal</category><title>How to Prevent Virus or Malware</title><description>&lt;p style=&quot;font-family: arial;font-family:arial;&quot;  class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span lang=&quot;EN-GB&quot;&gt;1. Make sure you have an Antivirus, Firewall and Antispyware scanner installed.&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: arial;font-family:arial;font-size:85%;&quot;  &gt;Search www.google.com for Anti-virus Information.&lt;/span&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;p style=&quot;font-family: arial;font-family:arial;&quot;  class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt;Make sure you DON&#39;T download and install any scanner present on &lt;a href=&quot;http://www.spywarewarrior.com/rogue_anti-spyware.htm#products&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;this&lt;/span&gt;&lt;/a&gt; list. These      scanners are blacklisted because of their questionable reputation. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p style=&quot;font-family: arial;font-family:arial;&quot;  class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt;Never install more than one Antivirus and Firewall! Rather than giving you extra protection, it will decrease the reliability of it seriously! The reason for this is that if both products have their automatic (Real-Time) protection switched on, your system may lock up due to both software products attempting to access the same file at the same time. Also because more than one Antivirus and Firewall installed are not compatible with eachother, it can cause system performance problems and a serious system slowdown.&lt;br /&gt;&lt;br /&gt;I also suggest to perform an online virusscan once in a while. Because what one virusscanner can&#39;t find another one maybe can. You&#39;ll find some good Online scanners &lt;a href=&quot;http://users.telenet.be/bluepatchy/miekiemoes/Links.html#Online%20Scanners&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Here&lt;/span&gt;&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span lang=&quot;EN-GB&quot;&gt;2. Make sure your Windows is ALWAYS up to date!&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;An unpatched Windows is vulnerable and even with the &quot;best&quot; Antivirus and Firewall installed, malware will find its way through.&lt;br /&gt;So visit &lt;a href=&quot;http://windowsupdate.microsoft.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;http://windowsupdate.microsoft.com/&lt;/span&gt;&lt;/a&gt; to download and install the latest updates.&lt;br /&gt;&lt;br /&gt;Effective July 11/October 11, 2006, Windows 98, Windows 98 Second Edition, Windows Me, Windows XP SP1 and SP1a will transition to a non-supported status. Read here for more info:&lt;br /&gt;&lt;a href=&quot;http://www.microsoft.com/windows/support/endofsupport.mspx&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;http://www.microsoft.com/windows/support/endofsupport.mspx&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://support.microsoft.com/gp/lifean19&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;http://support.microsoft.com/gp/lifean19&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;So make sure you update!&lt;br /&gt;&lt;br /&gt;Also read the &lt;a href=&quot;http://www.microsoft.com/windowsxp/sp2/topten.mspx&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Top 10 reasons to install Windows XP Service Pack 2 (SP2)&lt;/span&gt;&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Also, not only your Windows should be up to date, but also the programs you are using. This since many programs may contain Security leaks. To find out if your programs are up to date, run the &lt;a href=&quot;http://secunia.com/software_inspector/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Secunia Software Inspector&lt;/span&gt;&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span lang=&quot;EN-GB&quot;&gt;3. Stay away from illegal/questionable sites.&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;This is one of the main causes why a computer gets infected. Visiting cracksites/warezsites - and other questionable/illegal sites is ALWAYS a risk. Even a single click on the site can be responsible for installing a huge amount of malware. Don&#39;t think: &quot;I have a good Antivirus and Firewall installed, they will protect me&quot; - because that&#39;s not true... and even before you know it, your Antivirus and Firewall may already be disabled because malware already found its way on your system.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span lang=&quot;EN-GB&quot;&gt;4. Be careful with mail attachements!&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Malware spreads via email as well, especially email attachements.&lt;br /&gt;The most common ones are emails telling you that your computer is infected where you&#39;ll find the removal tool in the attachement, emails telling you that your password has changed which you&#39;ll find in the attachement, mails with productcodes in the attachement from software you purchased (while you didn&#39;t), attachements with so called Security updates etc etc...&lt;br /&gt;Don&#39;t trust these mails, don&#39;t even open them but remove them immediately instead!&lt;br /&gt;&lt;br /&gt;It may also happen you receive a mail from someone you know, but with a questionable attachement present and strange contents in the mail. In this case, this person - or someone else who has your address in his/her addressbook - is infected with malware (worm/spambot) and sends these mails without being aware of it.&lt;br /&gt;&lt;br /&gt;Don&#39;t click links in emails from someone you don&#39;t know, because these links can redirect you to sites where malware gets downloaded and installed.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.mailwasher.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Mailwasher&lt;/span&gt;&lt;/a&gt; is a free and great Anti-spam tool which gives you the option to view your mails on the server, sort them and delete the spam mails and other suspicious mails directly from the server without them downloading to your mailbox.&lt;br /&gt;For people who get dozens of spams daily, read this great article where it explains spam and how to deal with it: &lt;a href=&quot;http://www.netrn.net/fight_spam.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;I hate Spam&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span lang=&quot;EN-GB&quot;&gt;5. When surfing...&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;ul style=&quot;font-family: arial;font-family:arial;&quot;  type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt;Don&#39;t click on links inside      popups. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt;Don&#39;t click on links in spam      messages claiming to offer anti-spyware software; because most of these so      called removers ARE spyware. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt;Download free software only      from sites you know and trust. Because a lot of free software can bundle      other software, including spyware. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt;Be careful when watching online      videos, especially when they ask you to install a certain codec to watch      the video. By default, your mediaplayer should already have the necessary      codecs installed to watch online videos. In case you&#39;re prompted to      install an additional codec while trying to watch a movie online, it may      be a false alert and this so called codec may install malware. More info &lt;a href=&quot;http://www.avertlabs.com/research/blog/?p=152&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;here&lt;/span&gt;&lt;/a&gt; and &lt;a href=&quot;http://news.bbc.co.uk/2/hi/technology/6100016.stm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt;Don&#39;t install plugins (ActiveX)      if you&#39;re not certain what it is or why you need it. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;p style=&quot;font-family: arial;font-family:arial;&quot;  class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt;A great program is &lt;a href=&quot;http://www.javacoolsoftware.com/spywareblaster.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;SpywareBlaster&lt;/span&gt;&lt;/a&gt;. SpywareBlaster doesn`t scan and clean for malware, but prevents it from being installed in the first place. It blocks the popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.&lt;br /&gt;&lt;a href=&quot;http://www.bleepingcomputer.com/tutorials/tutorial49.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;How to use SpywareBlaster&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The &lt;a href=&quot;http://mvps.org/winhelp2002/hosts.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;MVP Hosts File&lt;/span&gt;&lt;/a&gt; is a great addition to block bad sites. This is accomplished by blocking these sites through the hosts file.&lt;br /&gt;&lt;br /&gt;Install &lt;a href=&quot;http://www.microsoft.com/netherlands/windows/ie/ie7/about/default.mspx&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Internet Explorer 7&lt;/span&gt;&lt;/a&gt; or another alternative browser like &lt;a href=&quot;http://www.mozilla-europe.org/nl/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Firefox&lt;/span&gt;&lt;/a&gt; or &lt;a href=&quot;http://www.opera.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Opera&lt;/span&gt;&lt;/a&gt; for more secure surfing. (However, keep in mind, as long as you don&#39;t stay away from illegal/questionable sites, no browser will be secure enough)&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.glubble.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Glubble&lt;/span&gt;&lt;/a&gt; is a great Firefox add-on if you&#39;re having kids and want to manage the sites your kids are allowed to see + extra additions.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span lang=&quot;EN-GB&quot;&gt;6. Watch what you download!&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;If you want to install certain software, always go to the developer&#39;s site to download the software from. Then you can be sure you&#39;re downloading and installing the right software.&lt;br /&gt;Beware of the fact that certain software (especially freeware) may contain/bundled with extra software including spyware/adware. So only install it when you&#39;re sure they are OK.&lt;br /&gt;Read &lt;a href=&quot;http://cybercoyote.org/internet/download.shtml&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;here&lt;/span&gt;&lt;/a&gt; for more tips about safe downloading.&lt;br /&gt;&lt;br /&gt;To find out if what you download is ok and get more information about the intentions of software and other bundled components such as spyware/adware which may be present, use &lt;a href=&quot;http://www.javacoolsoftware.com/eulalyzer.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;EULAlyzer&lt;/span&gt;&lt;/a&gt;. EULAlyzer scans the End user license agreements (EULAs) most software should show during install and provides a detailed listing of potentially interesting words and phrases, discovers if the software you&#39;re about to install displays pop-up ads, transmits personally identifiable information, uses unique identifiers to track you, or much much more.&lt;br /&gt;&lt;br /&gt;The use of P2P Programs like Kazaa (which is bundled with adware/spyware btw), Limewire, Torrentsites, Emule, Bearshare... is always a risk, because you can never be sure what you exactly download. It isn&#39;t always what it looks like. Important to know is that many P2P Programs are also bundled with unwanted software (spyware/adware). To find out which ones are safe to use and which ones are infected, take a look &lt;a href=&quot;http://p2p.malwareremoval.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;.&lt;br /&gt;Also read &lt;a href=&quot;http://www.microsoft.com/protect/yourself/downloads/filesharing.mspx&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;this&lt;/span&gt;&lt;/a&gt; article about the risks of using P2P Programs.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial;font-family:arial;&quot;  class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;  style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;color: rgb(192, 192, 192);&quot;&gt;Source: users.telenet.be&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://friedfly.blogspot.com/2008/10/how-to-prevent-virus-or-malware.html</link><author>noreply@blogger.com (Channi)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-454187536849991237</guid><pubDate>Mon, 13 Oct 2008 10:17:00 +0000</pubDate><atom:updated>2008-10-13T03:21:28.277-07:00</atom:updated><title>Combine different distributions of  Microsoft Windows XP/2000/NT on a Bootable CD?</title><description>&lt;ul style=&quot;font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;This is what you need:&lt;br /&gt;&lt;/span&gt;           &lt;ol&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;\i386 folders from the original Microsoft Windows XP/2000/NT CDs.&lt;br /&gt;&lt;/span&gt;             &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Setup files (from each Windows version):&lt;br /&gt;It is possible to get the files from the distribution,&lt;br /&gt;but the easiest way is to copy them from the bootdisks of Microsoft Windows XP/2000/NT (all files of the bootdisks are required setup files).&lt;br /&gt;Attention: Each distribution has it&#39;s own set of bootdisks according to the integrated updates, i.e. if your distribution is WinXP SP1 you&#39;ll also need the WinXP SP1 bootdisks (not the ones of WinXP).&lt;br /&gt;Where to get the disks:               &lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Bootdisks for Microsoft Windows XP are available on the Microsoft site&lt;br /&gt;&lt;/span&gt;                 &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Bootdisks for Microsoft Windows 2000 can be found on the original Windows 2000 CD-ROM in the subfolder \BOOTDISK &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Bootdisks for Microsoft Windows NT can be created by executing the command \I386\WINNT.EXE /OX from the NT CD-ROM.&lt;br /&gt;&lt;/span&gt;                 &lt;/li&gt;&lt;/ul&gt;             &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a name=&quot;ntidfiles&quot;&gt;Additionally needed setup identificaton files (for each seperate distribution):&lt;/a&gt;&lt;/span&gt;               &lt;table border=&quot;1&quot;&gt;                 &lt;tbody&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Windows version&lt;br /&gt;&lt;/span&gt;                     &lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Necessary files&lt;br /&gt;&lt;/span&gt;                     &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2003 Enterprise&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;WIN51&lt;/a&gt; and &lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;WIN51IA&lt;/a&gt;&lt;/span&gt; &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2003 Standard&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;WIN51&lt;/a&gt; and &lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;WIN51IS&lt;/a&gt;&lt;/span&gt; &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2003 Web&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;WIN51&lt;/a&gt; and &lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;WIN51IB&lt;/a&gt;&lt;/span&gt; &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;XP Home&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;WIN51&lt;/a&gt; and &lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;WIN51IC&lt;/a&gt;&lt;/span&gt; &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;XP Professional&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;WIN51&lt;/a&gt; and &lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;WIN51IP&lt;/a&gt;&lt;/span&gt; &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2000 Professional&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROM_NT.5&lt;/a&gt; and &lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROM_IP.5&lt;/a&gt;&lt;/span&gt; &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2000 Server&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROM_NT.5&lt;/a&gt; and &lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROM_IS.5&lt;/a&gt;&lt;/span&gt; &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2000 Advanced Server&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROM_NT.5&lt;/a&gt; and &lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROM_IA.5&lt;/a&gt;&lt;/span&gt; &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2000 Datacenter Server&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROM_NT.5&lt;/a&gt; and &lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROM_ID.5&lt;/a&gt;&lt;/span&gt; &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;NT Workstation&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROM_W.40&lt;/a&gt;&lt;/span&gt;                     &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;NT Server&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROM_S.40&lt;/a&gt;&lt;/span&gt;                     &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;NT Terminal Server&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROM_TS.40&lt;/a&gt;&lt;/span&gt;                     &lt;/td&gt;                   &lt;/tr&gt;                 &lt;/tbody&gt;               &lt;/table&gt;             &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;If your distribution already contains ServicePacks, or you are using slipstreamed CDs with Service Packs, you&#39;ll also need the following setup indentification files (according to the respective ServicePack):               &lt;/span&gt;&lt;table border=&quot;1&quot;&gt;                 &lt;tbody&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Service Pack&lt;br /&gt;&lt;/span&gt;                     &lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Necessary files&lt;br /&gt;&lt;/span&gt;                     &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;XP Home Service Pack 1&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;WIN51IC.SP1&lt;/a&gt;&lt;/span&gt;                     &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;XP Professional Service Pack 1&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;WIN51IP.SP1&lt;/a&gt;&lt;/span&gt;                     &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2000 Service Pack 1&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROM_SP.TST&lt;/a&gt;&lt;/span&gt;                     &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2000 Service Pack 2&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROMSP2.TST&lt;/a&gt;&lt;/span&gt;                     &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2000 Service Pack 3&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROMSP3.TST&lt;/a&gt;&lt;/span&gt;                     &lt;/td&gt;                   &lt;/tr&gt;                   &lt;tr&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2000 Service Pack 4&lt;/span&gt;&lt;/td&gt;                     &lt;td&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://bootcd.narod.ru/ntidfiles.zip&quot;&gt;CDROMSP4.TST&lt;/a&gt;&lt;/span&gt;                     &lt;/td&gt;                   &lt;/tr&gt;                 &lt;/tbody&gt;               &lt;/table&gt;             &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The BootManager &lt;a href=&quot;http://bootcd.narod.ru/bcdw_e.htm&quot;&gt;Bootable CD Wizard&lt;/a&gt;&lt;/span&gt; &lt;/li&gt;&lt;/ol&gt;           &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;         &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;How to create the CD?&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;                      &lt;ol&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Create a folder which will contain all the files for your Bootable CD, e.g.:&lt;br /&gt;&lt;br /&gt;C:\MyBootCD&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;                                           &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;In this folder, create subfolders for each distribution (e.g. NT_1, NT_2, NT_3) you plan to integrate, e.g.:&lt;br /&gt;&lt;br /&gt;C:\MyBootCD\NT_1&lt;br /&gt;C:\MyBootCD\NT_2&lt;br /&gt;C:\MyBootCD\NT_3&lt;br /&gt;etc.&lt;/span&gt;               &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Copy the \i386 folders of your distributions the the corresponding folders created above. Attention: Copy the folders, not only their contents. Your folder on should now look similar to this:&lt;br /&gt;&lt;br /&gt;C:\MyBootCD\NT_1\I386&lt;br /&gt;C:\MyBootCD\NT_2\I386&lt;br /&gt;C:\MyBootCD\NT_3\I386&lt;br /&gt;etc.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;                                           &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Copy the necessary setup files (see above) to the corresponding folders, i.e. the folders also containing \i386:&lt;br /&gt;&lt;br /&gt;C:\MyBootCD\NT_1&lt;br /&gt;C:\MyBootCD\NT_2&lt;br /&gt;C:\MyBootCD\NT_3&lt;br /&gt;etc.&lt;br /&gt;&lt;br /&gt;Attention: If you are using WinImage to extract the setup files from disk images, make sure you use the option &quot;Extract with pathname&quot;, as there is at least one subfolder on the bootdisks (system32).&lt;br /&gt;&lt;img src=&quot;http://bootcd.narod.ru/ntmultibootcd1.gif&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;                                                                         &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;In the folders NT_?, use a HexEditor (e.g., &lt;a target=&quot;_blank&quot; href=&quot;http://www.winhex.com/&quot;&gt;WinHex&lt;/a&gt;) to edit the files SETUPLDR.BIN Replace all occurrences of&lt;br /&gt;&lt;br /&gt;&#39;I386&#39; ...&lt;br /&gt;&lt;br /&gt;...with &#39;NT_1&#39; in the file C:\MyBootCD\NT_1\SETUPLDR.BIN&lt;br /&gt;...with &#39;NT_2&#39; in the file C:\MyBootCD\NT_2\SETUPLDR.BIN&lt;br /&gt;...with &#39;NT_3&#39; in the file C:\MyBootCD\NT_3\SETUPLDR.BIN&lt;br /&gt;etc.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;                                                          &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;In the folders NT_?, use a text editor (e.g., Windows Notepad) to edit the files TXTSETUP.SIF. Replace:&lt;br /&gt;&lt;br /&gt;SetupSourcePath = &quot;\&quot; ...&lt;br /&gt;&lt;br /&gt;...with SetupSourcePath = &quot;\NT_1\&quot; in the file C:\MyBootCD\NT_1\TXTSETUP.SIF&lt;br /&gt;...with SetupSourcePath = &quot;\NT_2\&quot; in the file C:\MyBootCD\NT_2\TXTSETUP.SIF&lt;br /&gt;...with SetupSourcePath = &quot;\NT_3\&quot; in the file C:\MyBootCD\NT_3\TXTSETUP.SIF&lt;br /&gt;etc.&lt;br /&gt;&lt;br /&gt;Attention: On the WinXP bootdisk, the file TXTSETUP.SIF is packed. You will have to delete TXTSETUP.SI_ (imperial) and copy the TEXTSETUP.SIF from your \i386 folder.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;                                                                         &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;In case you have a file BOOTFONT.BIN in the NT_? folders, rename it to FNT.BIN. Use a HexEditor (e.g., &lt;a target=&quot;_blank&quot; href=&quot;http://www.winhex.com/&quot;&gt;WinHex&lt;/a&gt;) to edit the files SETUPLDR.BIN. Replace:&lt;br /&gt;&lt;br /&gt;&#39;BOOTFONT.BIN&#39; ...&lt;br /&gt;&lt;br /&gt;...with &#39;NT_1\FNT.BIN&#39; in the file C:\MyBootCD\NT_1\SETUPLDR.BIN&lt;br /&gt;...with &#39;NT_2\FNT.BIN&#39; in the file C:\MyBootCD\NT_2\SETUPLDR.BIN&lt;br /&gt;...with &#39;NT_3\FNT.BIN&#39; in the file C:\MyBootCD\NT_3\SETUPLDR.BIN&lt;br /&gt;etc.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;                                                          &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Now add the complete set of setup identification files (see above)to C:\MyBootCD and to the corresponding  NT_? folders.&lt;br /&gt;&lt;br /&gt;Attention: The setup identification files must be in &lt;span style=&quot;font-weight: bold;&quot;&gt;both&lt;/span&gt; folders, C:\MyBootCD (which will be root of the bootable CD)  &lt;span style=&quot;font-weight: bold;&quot;&gt;and&lt;/span&gt; the NT_? folders (set of setup identification files corresponding to the distribution).&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;                                           &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Unpack the archive &lt;a href=&quot;http://bootcd.narod.ru/bcdw_e.htm&quot;&gt;Bootable CD Wizard&lt;/a&gt; to &lt;span style=&quot;font-weight: bold;&quot;&gt;C:\MyBootCD&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;             &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Edit the file &lt;b&gt;C:\MyBootCD\BootCat.Ini&lt;/b&gt; (configuration file of &lt;a href=&quot;http://bootcd.narod.ru/bcdw_e.htm&quot;&gt;Bootable CD Wizard&lt;/a&gt;) and add the locations and descriptions of your distributions:&lt;br /&gt;&lt;br /&gt;\NT_1\SETUPLDR.BIN ; Install Microsoft Windows #1&lt;br /&gt;\NT_2\SETUPLDR.BIN ; Install Microsoft Windows #2&lt;br /&gt;\NT_3\SETUPLDR.BIN ; Install Microsoft Windows #3&lt;br /&gt;etc.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;                                           &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;In your CD writing program, open a new bootable CD project with the following settings:&lt;br /&gt;Boot image: &lt;b&gt;C:\MyBootCD\bcdwboot.bin&lt;/b&gt;&lt;br /&gt;BootMode: No emulation (without emulation)&lt;br /&gt;Boot segment (adress): 07c0&lt;br /&gt;Number of sectors to load: 4&lt;br /&gt;(detailed howtos: &lt;a href=&quot;http://bootcd.narod.ru/nenero_e.htm&quot;&gt;Nero&lt;/a&gt;,               &lt;a href=&quot;http://bootcd.narod.ru/necdrwin_e.htm&quot;&gt;CDRWin&lt;/a&gt;,               &lt;a href=&quot;http://bootcd.narod.ru/neecdc_e.htm&quot;&gt;Easy CD Creator&lt;/a&gt;, &lt;a href=&quot;http://bootcd.narod.ru/neinstcd_e.htm&quot;&gt;Instant CD+DVD&lt;/a&gt;, &lt;a href=&quot;http://bootcd.narod.ru/newinoncd_e.htm&quot;&gt;WinOnCD&lt;/a&gt;,               &lt;a href=&quot;http://bootcd.narod.ru/necdimage_e.htm&quot;&gt;CDImage&lt;/a&gt; and &lt;a href=&quot;http://bootcd.narod.ru/nemkisofs_e.htm&quot;&gt;mkisofs&lt;/a&gt;)&lt;br /&gt;&lt;/span&gt;             &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Add the contents of &lt;b&gt;C:\MyBootCD\ &lt;/b&gt;to the project &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Add your files&lt;br /&gt;&lt;/span&gt;             &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Burn the disk. &lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;           &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;         &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Directory listing of a CD with BootableCDWizard containing russian versions of Microsoft Windows NT Workstation and Microsoft Windows XP Professional SP1:&lt;br /&gt;&lt;img src=&quot;http://bootcd.narod.ru/ntmultibootcd2.gif&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-style: italic; color: rgb(153, 153, 153);font-size:78%;&quot; &gt;Copyright (c)2004 by reanimatolog. http://bootcd.narod.ru      &lt;br /&gt;English translation by Wolfgang Brinkmann&lt;/span&gt;</description><link>http://friedfly.blogspot.com/2008/10/combine-different-distributions-of.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-7852841256048961604</guid><pubDate>Wed, 10 Sep 2008 09:42:00 +0000</pubDate><atom:updated>2008-09-10T02:45:03.480-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><title>Browser Battle: Firefox 3.1 vs. Chrome vs. IE 8</title><description>&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;p style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span class=&quot;image ltmd&quot;&gt;&lt;img src=&quot;http://images.pcworld.com/news/graphics/150828-chrome-fox-IE.jpg&quot; alt=&quot;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;h2 style=&quot;font-weight: bold; text-align: center;&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;The browser wars are heating up by the week. Here is a breakdown of the browser battle lines for Chrome, Internet Explorer, and Firefox. &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: center;&quot;&gt;   &lt;/div&gt;&lt;p style=&quot;font-weight: bold; text-align: center; font-style: italic;&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;JR Raphael, PC World blogger&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Mozilla&#39;s &lt;a href=&quot;http://developer.mozilla.org/devnews/index.php/2008/09/05/firefox-31-alpha-2-now-available-for-download/&quot; target=&quot;_blank&quot;&gt;second alpha of Firefox 3.1&lt;/a&gt; is upping the ante in the next-generation browser battle. So how do the main contenders stack up so far now? One thing&#39;s for sure, the Firefox team has taken note of Google&#39;s recent &lt;a href=&quot;http://www.pcworld.com/article/150585-2/googles_chrome_7_reasons_for_it_and_7_reasons_against_it.html&quot; target=&quot;_blank&quot;&gt;Chrome&lt;/a&gt; release and worked hard to make sure its offering can hold its own. &lt;/span&gt;&lt;/p&gt;   &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; Mozilla had already &lt;a href=&quot;http://blogs.pcworld.com/staffblog/archives/007656.html&quot; target=&quot;_blank&quot;&gt;claimed its 3.1 version could outperform Chrome&lt;/a&gt; when it comes to speed (and most &lt;a href=&quot;http://lifehacker.com/5044668/beta-browser-speed-tests-which-is-fastest&quot; target=&quot;_blank&quot;&gt;independent tests&lt;/a&gt; show it at least tying). Now, the engineers have incorporated Chrome-initiated options such as the ability to drag and drop tabs in and out of browser windows. The second alpha release also adds support for the &lt;a href=&quot;http://arstechnica.com/news.ars/post/20080905-first-look-firefox-3-1-alpha-2-officially-released.html&quot; target=&quot;_blank&quot;&gt;HTML 5 video tag&lt;/a&gt;, which gives Web developers expanded options for embedding video within a page. Don&#39;t forget, too, that Microsoft&#39;s new &lt;a href=&quot;http://blogs.pcworld.com/staffblog/archives/007620.html&quot; target=&quot;_blank&quot;&gt;Internet Explorer 8 beta 2&lt;/a&gt; -- released at the end of August and quickly eclipsed by Chrome&#39;s introduction -- is also vying for a piece of the pie. &lt;/span&gt;&lt;/p&gt;   &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; Here&#39;s a breakdown of the high and lowlights of each offering and where it stands as far as a full release. &lt;/span&gt;&lt;/p&gt;   &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; Contender #1: Google Chrome &lt;/span&gt;&lt;/p&gt;   &lt;p&gt;    &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;The status:&lt;/strong&gt; Windows beta released September 2. Mac OS X and Linux versions still under development and said to be coming soon. No indication of targeted full release date. &lt;/span&gt;&lt;/p&gt;   &lt;p&gt;    &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;The good:&lt;/strong&gt;&lt;/span&gt;   &lt;/p&gt;   &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Reliability. Chrome&#39;s multiprocess architecture makes a bad Web page less likely to take down the whole browser.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Speed. Chrome loads fast and keeps your surfing super-fast.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Simplicity. Its clean design wastes no screen space.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Searching. The Omnibox lets you type search terms or URLs into a single spot and figures out what you want.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Privacy. Chrome offers an &quot;Incognito&quot; mode that lets you easily leave no footprints from where you&#39;ve been.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;   &lt;p&gt;    &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;The bad:&lt;/strong&gt;&lt;/span&gt;   &lt;/p&gt;   &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Privacy. Chrome&#39;s taken a lot of heat for its &lt;a href=&quot;http://www.technewsworld.com/story/Heads-Up-Chromes-Omnibox-May-Record-What-You-Type-64387.html&quot; target=&quot;_blank&quot;&gt;monitoring and collection of user data&lt;/a&gt;, some of which happens before you even hit enter.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Security. It didn&#39;t take long for users to discover &lt;a href=&quot;http://www.pcworld.com/article/150639/google_chrome_browser.html?tk=rss_news&quot; target=&quot;_blank&quot;&gt;vulnerabilities&lt;/a&gt; in the beta browser. Several of these &lt;a href=&quot;http://www.pcworld.com/businesscenter/article/150776/critical_vulnerability_patched_in_googles_chrome.html&quot; target=&quot;_blank&quot;&gt;have already been patched&lt;/a&gt;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Reliability. Some sites and online services &lt;a href=&quot;http://www.pcworld.com/article/150585-2/googles_chrome_7_reasons_for_it_and_7_reasons_against_it.html&quot; target=&quot;_blank&quot;&gt;still don&#39;t work with Chrome&lt;/a&gt;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Consistency. Because Chrome is build on the WebKit system, it differs from the dominant platforms that most designers focus on.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Support. Chrome doesn&#39;t yet have any add-ons or customization options available. It&#39;s yet to be seen how these, once developed, will compare to the rich options available for Firefox.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;   &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; Contender #2: Firefox 3.1 &lt;/span&gt;&lt;/p&gt;   &lt;p&gt;    &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;The status:&lt;/strong&gt; Second alpha build released September 5. Beta expected in the next month. Full release targeted for end of 2008. &lt;/span&gt;&lt;/p&gt;   &lt;p&gt;    &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;The good:&lt;/strong&gt;&lt;/span&gt;   &lt;/p&gt;   &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Strong foundation. Mozilla&#39;s already built a loyal following with Firefox, and it doesn&#39;t intend on letting that go. With Firefox 3.1, you know you&#39;ll have a powerful library of add-ons and support already at your fingertips, not to mention the slew of other assets unveiled in Firefox 3.0.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Speed. Mozilla says its still-under-development TraceMonkey JavaScript platform &lt;a href=&quot;http://blogs.pcworld.com/staffblog/archives/007656.html&quot; target=&quot;_blank&quot;&gt;will leave Google&#39;s V8 in the dust&lt;/a&gt;. The second alpha build revs things up, too, with added support for &quot;Web workers&quot; -- a system that lets multiple scripts run as background processes.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Competitive edge. Mozilla&#39;s developers have good reason to watch what Chrome is doing -- and work to match it, if not one-up it.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;   &lt;p&gt;    &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;The bad:&lt;/strong&gt;&lt;/span&gt;   &lt;/p&gt;   &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Security questions. Some studies -- albeit, Microsoft-funded ones -- have suggested Firefox, with its frequent new versions, is &lt;a href=&quot;http://blogs.pcworld.com/staffblog/archives/006008.html&quot; target=&quot;_blank&quot;&gt;more susceptible to threats&lt;/a&gt; than the other options. &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Crash potential. Unlike Chrome, Firefox does not have separate environments for each tab -- so one rogue page can still take the whole program down.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Support. Firefox has worked hard to snag a small portion of the browser market share, and most early predictions show Chrome &lt;a href=&quot;http://www.crn.com/software/210500053&quot; target=&quot;_blank&quot;&gt;taking away more of its userbase than IE&#39;s&lt;/a&gt;. &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Google&#39;s focus on Chrome will also take away some of its previous focus on Mozilla&#39;s development efforts. Will Firefox be able to remain a key player in the browser war?&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;   &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; Contender #3: Internet Explorer 8 &lt;/span&gt;&lt;/p&gt;   &lt;p&gt;    &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;The status:&lt;/strong&gt;: Second beta released August 27. Full release expected before the end of 2008. &lt;/span&gt;&lt;/p&gt;   &lt;p&gt;    &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;The good:&lt;/strong&gt;&lt;/span&gt;   &lt;/p&gt;   &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Support. Love it or hate it, Internet Explorer is hanging on to about three-quarters of the browsing market with its default status in all Windows machines. You know developers and designers are going to cater to it.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Security. With Microsoft at its helm, IE hangs on to a reputation of safe and reliable browsing.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Privacy. IE 8 was the first to offer a no-record browsing mode, branded here as InPrivate Browsing.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Searching. IE 8&#39;s Smart Address Bar offers similar functionality to Chrome&#39;s Omnibox, letting you type in URLs or search terms and taking you to the right place.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Added add-ons. IE 8 finally catches up to Firefox with &lt;a href=&quot;http://www.ieaddons.com/en/&quot; target=&quot;_blank&quot;&gt;a new &quot;Gallery&quot; full of third-party add-on options&lt;/a&gt;.. &lt;/span&gt;&lt;p&gt;      &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;The bad:&lt;/strong&gt;&lt;/span&gt;     &lt;/p&gt;    &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; Speed. Independent tests have found IE 8 to be &lt;a href=&quot;http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=Development&amp;amp;articleId=9114280&amp;amp;taxonomyId=11&amp;amp;pageNumber=2&quot; target=&quot;_blank&quot;&gt;significantly slower than the alternative choices&lt;/a&gt;. Resources. IE 8 &lt;a href=&quot;http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=Development&amp;amp;articleId=9114280&amp;amp;taxonomyId=11&amp;amp;pageNumber=3&quot; target=&quot;_blank&quot;&gt;uses a lot of memory&lt;/a&gt; compared to its competitors -- a factor that could considerably slow down the rest of your system.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Crash potential. While IE 8 does use separate processes for tabs, similar to Chrome&#39;s approach, it &lt;a href=&quot;http://www.infoworld.com/article/08/09/03/36TC-browsers_1.html&quot; target=&quot;_blank&quot;&gt;does not do so to the same degree&lt;/a&gt;&lt;/span&gt;    &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;-- still leaving room for a total meltdown. &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Competition questions. Can IE&#39;s add-ons reach the level of Firefox&#39;s? Already, some users are &lt;a href=&quot;http://blogs.zdnet.com/igeneration/?p=444&quot; target=&quot;_blank&quot;&gt;complaining of problems even getting them to work.&lt;/a&gt;&lt;/span&gt;    &lt;/li&gt;&lt;/ul&gt;   &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; That&#39;s the lowdown on the battle&#39;s current status. Remember, all three of these programs are still early in their development, so many of the pluses and minuses could change as things move forward. One thing&#39;s for sure, though: This battle is on, it&#39;s growing fierce, and each of its contenders will do anything it can to win. &lt;/span&gt;&lt;/p&gt;  &lt;/div&gt;</description><link>http://friedfly.blogspot.com/2008/09/browser-battle-firefox-31-vs-chrome-vs.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-4346716624239311073</guid><pubDate>Sat, 02 Aug 2008 06:10:00 +0000</pubDate><atom:updated>2008-08-01T23:19:01.337-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Vista Tweaks</category><title>TweakVI Ultimate 1.0-1085</title><description>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq6yo0-mE20l83BVqHBxsi4xO_q5DUgkRjiPPdPbwlXZC54ySIxuegKb73XKNSpftk2VwSktkfByLa76wmZTWbRPY4MiSgUWJZT_wqIpYX9sJIEqpWZRnXkzaAwdvcCifAi8Y6R7yjunwB/s1600-h/twik.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq6yo0-mE20l83BVqHBxsi4xO_q5DUgkRjiPPdPbwlXZC54ySIxuegKb73XKNSpftk2VwSktkfByLa76wmZTWbRPY4MiSgUWJZT_wqIpYX9sJIEqpWZRnXkzaAwdvcCifAi8Y6R7yjunwB/s400/twik.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5229800393125611650&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;The first software designed to both tweak and optimize Windows Vista.&lt;br /&gt;Tweak hundreds of hidden features of Windows Vista, optimize your machine and customize it to your needs.&lt;br /&gt;&lt;br /&gt;TweakVI is available in three different editions: the &#39;Basic Edition&#39;, which contains all the basic tweaking features for standard system tweaking, the &#39;Premium Edition&#39;, which gives you access to much more tweaking and system optimization features, and the &#39;Ultimate Edition&#39;, for complete control on Windows Vista, with all plugins available for TweakVI.&lt;br /&gt;&lt;br /&gt;The best tweaking software ever!&lt;br /&gt;The original TweakVI offers what you need to customize and optimize Windows Vista:&lt;br /&gt;&lt;br /&gt;Unlike other tweaking utilities, TweakVI bundles lots of different utilities in one. It was developed to combine both tuning and optimizing features to increase the speed of your Windows Vista system. It&#39;s the worlds first software for Windows Vista to combine both customization, tweaking and optimization features.&lt;br /&gt;&lt;br /&gt;Some features of TweakVI: &lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;- Activate hundreds of hidden Windows Vista settings&lt;br /&gt;- clean your registry&lt;br /&gt;- activate system and software restrictions&lt;br /&gt;- display detailed system information&lt;br /&gt;- create a 256 MB RAM drive&lt;br /&gt;- protect your privacy&lt;br /&gt;- clean your hard drive&lt;br /&gt;- manage TrueType fonts&lt;br /&gt;- improve your internet connection&lt;br /&gt;- optimize your CPU&lt;br /&gt;- optimize your RAM&lt;br /&gt;- manage system updates, and much more ...&lt;br /&gt;- you can even transfer your tweaks and settings to other machines!&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left; font-family: arial;&quot;&gt;&lt;a href=&quot;http://rapidshare.com/files/132589780/tweak.rar&quot;&gt;Try&lt;/a&gt;&lt;/p&gt;</description><link>http://friedfly.blogspot.com/2008/08/tweakvi-ultimate-10-1085.html</link><author>noreply@blogger.com (Channi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq6yo0-mE20l83BVqHBxsi4xO_q5DUgkRjiPPdPbwlXZC54ySIxuegKb73XKNSpftk2VwSktkfByLa76wmZTWbRPY4MiSgUWJZT_wqIpYX9sJIEqpWZRnXkzaAwdvcCifAi8Y6R7yjunwB/s72-c/twik.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-7455544864035851836</guid><pubDate>Sat, 02 Aug 2008 06:05:00 +0000</pubDate><atom:updated>2008-08-01T23:09:38.474-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows Apps</category><title>SpeedConnect Internet Accelerator</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaTkwIxFtbiDwslHMOoPUwk_nDx3_NprVz15B52eQqPc_FiF4k7thgGCSSlMhhQYUm1dtOqBlCdRKiv0m4H2ffdkly0xN_t0jKVioW3jMGW0CxtdmhXdYWWlzNQ9mbYb5VVftmSbjFTYjB/s1600-h/speed.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaTkwIxFtbiDwslHMOoPUwk_nDx3_NprVz15B52eQqPc_FiF4k7thgGCSSlMhhQYUm1dtOqBlCdRKiv0m4H2ffdkly0xN_t0jKVioW3jMGW0CxtdmhXdYWWlzNQ9mbYb5VVftmSbjFTYjB/s400/speed.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5229797685791118210&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;Top internet accelerator (according to PC Magazine), a network settings optimizer to speed up your existing Dial-Up Modem, DSL, Cable, Wireless, LAN, High-speed internet connections.&lt;br /&gt;&lt;br /&gt;SpeedConnect Internet Accelerator is a powerful Windows application designed to optimize your network connection and speed up all your internet activities. This translates into a faster internet connection, faster browsing and email, faster downloads, faster online gaming, improved Skype connection.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;font-family: arial;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Features: &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: arial;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;* FASTER internet connection&lt;br /&gt;* Browse FASTER&lt;br /&gt;* Send and receive e-mail FASTER&lt;br /&gt;* Download and upload files FASTER&lt;br /&gt;* Play online games FASTER&lt;br /&gt;* Improve Skype connection&lt;br /&gt;* NO adware, NO hardware installation&lt;br /&gt;* NO service subscription, NO monthly fees&lt;br /&gt;* NO new hardware installation &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: arial;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;FEATURES &lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;* Optimizes all internet connection types&lt;br /&gt;* User friendly&lt;br /&gt;* Quick Optimizer option&lt;br /&gt;* Advanced Customization&lt;br /&gt;* Tool and Wizards&lt;br /&gt;* Load/Save Settings&lt;br /&gt;* Optimization Report&lt;br /&gt;* Connection Analyze&lt;/span&gt;r&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: rgb(0, 153, 0); font-family: arial;font-size:78%;&quot; &gt;Trial: Try &lt;a href=&quot;http://rapidshare.com/files/133066462/SpeedConnect_Internet_Accelerator_7.5.rar&quot;&gt;Me&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://friedfly.blogspot.com/2008/08/speedconnect-internet-accelerator.html</link><author>noreply@blogger.com (Channi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaTkwIxFtbiDwslHMOoPUwk_nDx3_NprVz15B52eQqPc_FiF4k7thgGCSSlMhhQYUm1dtOqBlCdRKiv0m4H2ffdkly0xN_t0jKVioW3jMGW0CxtdmhXdYWWlzNQ9mbYb5VVftmSbjFTYjB/s72-c/speed.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-596458025647659935.post-8394168789881800845</guid><pubDate>Fri, 25 Jul 2008 10:40:00 +0000</pubDate><atom:updated>2008-07-25T03:42:23.185-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer Hardware</category><title>Intel New System On A Chip Designs</title><description>&lt;div style=&quot;text-align: left; font-family: arial;&quot; class=&quot;Byline&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Wednesday, July 23, 2008 - by &lt;a href=&quot;mailto:marco@hothardware.com&quot;&gt;Marco Chiappetta&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left; font-family: arial;&quot;&gt;                  &lt;!-- sphereit start --&gt;         &lt;/div&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;a href=&quot;javascript:winopen(&#39;http://www.hothardware.com/image_popup.aspx?image=big_ep80579.png&amp;amp;articleid=7317&amp;amp;t=n&#39;,&#39;hothardwareimage&#39;,%20600,600);&quot;&gt;&lt;img style=&quot;width: 200px; height: 178px;&quot; alt=&quot;&quot; src=&quot;http://www.hothardware.com/newsimages/Item7314/small_ep80579.png&quot; align=&quot;left&quot; border=&quot;0&quot; hspace=&quot;3&quot; vspace=&quot;3&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;  &lt;/p&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;Gadi Singer, Vice President of Intel’s Mobility Group, and Doug Davis, Vice President of Intel’s Digital Enterprise Group, held a conference call today to discuss a brand new product line from Intel targeted at security, storage, communications, and industrial applications, the Intel EP80579 Integrated Processor family.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;Although the Intel EP80579 branding will be new to most of you, the underlying technology is comprised of products that have a well established &lt;a href=&quot;http://www.hothardware.com/articles/Intel_Pentium_4_Centrino_Launch_Event/&quot; target=&quot;_blank&quot;&gt;history at Intel&lt;/a&gt;.  In fact, this line of products is based on the Pentium M processor core, as it has been in development for quite some time now.  The Intel EP80579 Integrated Processor family, however, is more than just a new processor.  The products actually consist of new System on a Chip designs that integrate a Pentium M core, with a Memory Controller Hub (MCH), I/O hub (ICH), and in some cases specialized security, TDM (Time Division Multiplexing for voice-over-IP apps), and data path acceleration engines, which have been dubbed Intel QuickAssist Technology.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;Development was started on the Intel EP80579 Integrated Processor family to prepare the company for the impending onslaught of smart, Internet-connected devices and appliances predicted to arrive over the next few years.  The Intel EP80579 product line puts Intel in a position to target several growth areas across Consumer Electronics (CE), Mobile Internet Devices (MIDs) and other embedded markets.  &lt;em&gt;&quot;We’re now able to deliver more highly integrated products ranging from industrial robotics and in-car infotainment systems to set-top boxes, MIDs and other devices.  By designing more complex systems onto smaller chips, Intel will scale the performance, functionality and software compatibility of IA while controlling the overall power, cost and size requirements to better meet respective market needs,”&lt;/em&gt; said Gadi Singer.&lt;br /&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;javascript:winopen(&#39;http://www.hothardware.com/image_popup.aspx?image=big_slide_1.jpg&amp;amp;articleid=7317&amp;amp;t=n&#39;,&#39;hothardwareimage&#39;,%20600,600);&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;img style=&quot;width: 190px; height: 142px;&quot; alt=&quot;&quot; src=&quot;http://www.hothardware.com/newsimages/Item7314/small_slide_1.jpg&quot; border=&quot;1&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;  &lt;/span&gt;&lt;a href=&quot;javascript:winopen(&#39;http://www.hothardware.com/image_popup.aspx?image=big_slide_2.jpg&amp;amp;articleid=7317&amp;amp;t=n&#39;,&#39;hothardwareimage&#39;,%20600,600);&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;img style=&quot;width: 190px; height: 142px;&quot; alt=&quot;&quot; src=&quot;http://www.hothardware.com/newsimages/Item7314/small_slide_2.jpg&quot; border=&quot;1&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;  &lt;/span&gt;&lt;a href=&quot;javascript:winopen(&#39;http://www.hothardware.com/image_popup.aspx?image=big_slide_3.jpg&amp;amp;articleid=7317&amp;amp;t=n&#39;,&#39;hothardwareimage&#39;,%20600,600);&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;img style=&quot;width: 190px; height: 142px;&quot; alt=&quot;&quot; src=&quot;http://www.hothardware.com/newsimages/Item7314/small_slide_3.jpg&quot; border=&quot;1&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;javascript:winopen(&#39;http://www.hothardware.com/image_popup.aspx?image=big_slide_4.jpg&amp;amp;articleid=7317&amp;amp;t=n&#39;,&#39;hothardwareimage&#39;,%20600,600);&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;img style=&quot;width: 190px; height: 142px;&quot; alt=&quot;&quot; src=&quot;http://www.hothardware.com/newsimages/Item7314/small_slide_4.jpg&quot; border=&quot;1&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;  &lt;/span&gt;&lt;a href=&quot;javascript:winopen(&#39;http://www.hothardware.com/image_popup.aspx?image=big_slide_5.jpg&amp;amp;articleid=7317&amp;amp;t=n&#39;,&#39;hothardwareimage&#39;,%20600,600);&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;img style=&quot;width: 190px; height: 142px;&quot; alt=&quot;&quot; src=&quot;http://www.hothardware.com/newsimages/Item7314/small_slide_5.jpg&quot; border=&quot;1&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;  &lt;/span&gt;&lt;a href=&quot;javascript:winopen(&#39;http://www.hothardware.com/image_popup.aspx?image=big_slide_6.jpg&amp;amp;articleid=7317&amp;amp;t=n&#39;,&#39;hothardwareimage&#39;,%20600,600);&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;img style=&quot;width: 190px; height: 142px;&quot; alt=&quot;&quot; src=&quot;http://www.hothardware.com/newsimages/Item7314/small_slide_6.jpg&quot; border=&quot;1&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;In addition to lower-power characteristics and the smaller form factors enabled by the Intel EP80579&#39;s integrated design (in some cases, Intel claims they will lead to platforms that have a 45% smaller board footprint and 34% lower power dissipation), the main benefit of this product line is its native support of Intel Architecture (IA), aka x86.  As we stated in &lt;a href=&quot;http://www.hothardware.com/Articles/Intels_UltraPortable_Atom_Unveiled&quot; target=&quot;_blank&quot;&gt;our initial coverage of Intel&#39;s Atom processor&lt;/a&gt;, manufactures of today&#39;s smart phones, set top boxes, and MIDs, and software developers, must contend with incompatibilities between the many different platforms being used today.  Should these devices all use IA, however, developing software for them would be much easier and application compatibility could be maintained across multiple devices.  The slides above illustrate much of what we have outlined here and further explain Intel&#39;s strategy and direction.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.hothardware.com/newsimages/Item7314/block_diag.png&quot; /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;The individual components within the Intel EP80579 SoCs communicate over an internal Front Side Bus that connects the Processor Core, MCH, and ICH.  And Intel has also developed a high performance bus to connect the security, TDM, and data path acceleration engines to the  I/O Complex.  Please note, that only four of the initial eight products being announced today feature the Acceleration Services Unit and TDM interface represented in the block diagram above.  Those features are what make up the Intel QuickAssist Technology, which isn&#39;t featured on every Intel EP80579 SoC.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;table style=&quot;width: 590px; text-align: left; margin-left: 0px; margin-right: auto; font-family: arial;&quot; border=&quot;0&quot; cellpadding=&quot;1&quot; cellspacing=&quot;1&quot;&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td colspan=&quot;6&quot; bg style=&quot;color:#000066;&quot;&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 10pt; color: rgb(255, 255, 255);&quot;&gt;Intel EP80579 Integrated Processor with Intel QuickAssist Technology*&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td bg width=&quot;99&quot; style=&quot;color:#cccccc;&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Model&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td bg width=&quot;98&quot; style=&quot;color:#cccccc;&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Core Speed&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td bg width=&quot;98&quot; style=&quot;color:#cccccc;&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;DDR2 (MHz)&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td bg width=&quot;98&quot; style=&quot;color:#cccccc;&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Temperatures&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td bg width=&quot;98&quot; style=&quot;color:#cccccc;&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;L2 Cache&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td bg width=&quot;98&quot; style=&quot;color:#cccccc;&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;TDP&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;99&quot;&gt; &lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;NU80579EB600C&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;600MHz&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;400/533/667&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Commercial 0-70°C&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;256KB&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;13W&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;99&quot;&gt; &lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;NU80579ED004C&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;1.066GHz&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;400/533/667/800&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt; Industrial -40-85°C&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;256KB&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;20W&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;99&quot;&gt; &lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;NU80579ED004CT&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;1.066GHz&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;400/533/667/800&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Commercial 0-70°C&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;256KB&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;20W&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt; &lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;NU80579ED009C&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;1.2GHz&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;400/533/667/800&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Commercial 0-70°C&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;256KB&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;21W&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td colspan=&quot;6&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;* Includes security, TDM,  and data path acceleration&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt; &lt;table style=&quot;width: 590px; text-align: left; margin-left: 0px; margin-right: auto; font-family: arial;&quot; border=&quot;0&quot; cellpadding=&quot;1&quot; cellspacing=&quot;1&quot;&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td colspan=&quot;6&quot; bg style=&quot;color:#000066;&quot;&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 10pt; color: rgb(255, 255, 255);&quot;&gt;Intel EP80579 Integrated Processor for Embedded Computing&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td bg width=&quot;99&quot; style=&quot;color:#cccccc;&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Model&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td bg width=&quot;98&quot; style=&quot;color:#cccccc;&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Core Speed&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td bg width=&quot;98&quot; style=&quot;color:#cccccc;&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;DDR2 (MHz)&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td bg width=&quot;98&quot; style=&quot;color:#cccccc;&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Temperatures&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td bg width=&quot;98&quot; style=&quot;color:#cccccc;&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;L2 Cache&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td bg width=&quot;98&quot; style=&quot;color:#cccccc;&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;TDP&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;99&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;NU80579EZ600C&lt;/span&gt;&lt;/span&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;600MHz&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;400/533/667&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Commercial 0-70°C&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;256KB&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;11.5W&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;99&quot;&gt; &lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;NU80579EZ600CT&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;600MHz&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;400/533/667&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Industrial -40-85°C &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;256KB&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;11.5W&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;99&quot;&gt; &lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;NU80579EZ004C&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;1.066GHz&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;400/533/667/800&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Commercial 0-70°C&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;256KB&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;18W&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;99&quot;&gt; &lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;NU80579EZ009C&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;1.2GHz&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;400/533/667/800&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Commercial 0-70°C&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;256KB&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt; &lt;td width=&quot;98&quot;&gt; &lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;19W&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;The eight individual products that will initially make up the Intel EP80579 Integrated Processor family are listed in the charts above.  As you can see the products will be offered in a range of speeds, power dissipation, and commercial / industrial temperature options.&lt;br /&gt;&lt;br /&gt;In addition to the products Intel spoke about today, the company also disclosed that they have more than 15 SoC projects currently planned internally--many of which are built around the Atom core-- including the company’s first Consumer Electronics (CE) chip codenamed “Canmore”, which is scheduled for introduction later this year, and the second-generation “Sodaville” which should hit sometime in 2009.  As we&#39;ve mentioned in previous articles, Intel’s second-generation embedded product line is slated to arrive in 2009 as well, with the company&#39;s next-gen platform for Mobile Internet Devices code-named &lt;a href=&quot;http://www.hothardware.com/Articles/Intels_UltraPortable_Atom_Unveiled/?page=4&quot; target=&quot;_blank&quot;&gt;“Moorestown”&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Regardless of all of the codenames and announcements though, what all of this means to consumers is that Intel is obviously focused on securing design wins in virtually any type of device that connects to the Internet or runs software and we may not be too far off from pocket-sized MIDs that can run off the shelf OSes and applications, just like our desktop PCs.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(153, 153, 153);font-size:78%;&quot; &gt;Source: www.hothardware.com&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://friedfly.blogspot.com/2008/07/intel-new-system-on-chip-designs.html</link><author>noreply@blogger.com (Channi)</author><thr:total>0</thr:total></item></channel></rss>