<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-5697967050881972992</atom:id><lastBuildDate>Fri, 01 Nov 2024 10:46:42 +0000</lastBuildDate><category>Gadgets</category><category>Windows XP</category><category>Microsoft</category><category>Apple</category><category>Google</category><category>Mobiles</category><category>Programming</category><category>Virus removal</category><category>Web 2.0</category><category>HD DVD vs Blue Ray</category><category>Security</category><category>Technology</category><category>Adsense</category><category>Application Security</category><category>Asp.Net</category><category>Bloggers Tips and Tricks</category><category>Environment</category><category>Green Technology</category><category>HTC</category><category>Innovative Designs</category><category>Learn and Earn</category><category>Network Security</category><category>Nokia</category><category>Open Source</category><category>Penetration Testing</category><category>Renewable energy</category><category>Wallpapers</category><category>Windows7</category><title>TechnoChat</title><description>Technology , Software Tips , Gadgets , Reviews , News , Web 2.0 , Virus Removal Techniques , Windows Xp , Google &amp; Microsoft Products</description><link>http://technochat.blogspot.com/</link><managingEditor>noreply@blogger.com (Angad Singh)</managingEditor><generator>Blogger</generator><openSearch:totalResults>44</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-5971692005256242876</guid><pubDate>Sat, 19 Dec 2009 07:06:00 +0000</pubDate><atom:updated>2010-05-02T08:59:21.820-07:00</atom:updated><title>Ethical Hacking !!! OWASP TOP 10 | SANS TOP 20</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;One of the questions which comes to my mind when ever i visit any website is &quot;Are We Secure?&quot;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;We meet people day in day out who still run there business in traditional way failing to realize the importance of security, security is just a cost burden which is not a revenue generator for them. &lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Be it a developer, manager, a corporate head what it matters to them is money and the end result i.e. software, a website.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;When we see attacks happening around us on TV all we have to say is that administration is not effectively protecting us, failing to realize that we ourselves have neglected the same while we were carrying out our jobs.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;As a responsible citizen i take this forum to introduce all to the mindset of an hacker further we also go on to talk about the Web attacks happening around us.For all developers developing solutions it becomes really important to know what is the vision of an hacker and keep it in mind while designing there solutions.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Stage 1 :-Information Gathering&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;What does a robber looks for when he choices for a home to rob?&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;He looks to gather information about the home, people, what valuables will he get ?&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Similar to robber an hacker always thinks the same way he try&#39;s to gather information about the website or software from the various available online forums to know more about the solution and the weak areas.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Stage 2:- Scanning&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;What does robber looks for once he has choice his target?&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Robers always try to rob a house which are easy to break in he always asks this &lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;How easy is it for him to break in?&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;. Similarly hackers targets the system which are weak he try to scan the networks and website to know the known open ports and access.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Stage 3:- Discovery&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;What does robber need once he knows the entry points?&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;He will try to identify the tools which will help him in executing his job, similarly hacker always try to look for available exploits or customize exploits from available online forums such as milw0rm, osvdb etc.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Stage 4:- Exploit&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Now the robber/hacker is ready to rob your home!!! He will try to exploit the vulnerabilities/weakness in your home or software to gain access into it.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Stage 5:- Covering Tracks&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Once he has done the theft he will always try to do it in such a manner that there is no evidence to prove his doings. Similar an hacker will try to perform similar act by trying to removing all his occurrence of attacks.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;What can we do to ?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Well be aware of what is happening across the online forums, there are forums which provide information about exploits for various software weakness. Also we much try to incorporate best practices such as OWASP Top 10, SANS etc.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Some of the security layers which we must have are &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt; 1. Application Layer Defense.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt; 2. Session Layer Defense.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt; 3. Network Layer Defense. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt; The attackers are now moving from traditional network layers attacks to application layer. Following are some of the top defects which are easy to find and exploited by attackers.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1. Input Validation.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt; Possible Attacks :-SQL Injection,Cross Site Scripting, Cross Site Request Forgery, HTTP Response Splitting. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;br /&gt;Cause &amp;amp; Impact:- &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;SQL injection&lt;/span&gt;:- The website does not validate the input parameters i.e. all the request parameters sent by an enduser.An attacker can exploit this vulnerability to query the database and can lead to creating a replica of the database. If the application contains customer sensitive information then an attacker can use this information for spamming or could sell the information to competitor firm.  &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Cross Site Scripting&lt;/span&gt;:- &lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;The website does not validate the input/output parameters i.e. all the request parameters sent by/ an enduser. &lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;An attacker can use this to redirect the response of the user to his choice of servers whereby leading to transfer of sensitive information such as  user credentials, account information. This attack could can be used to defame a website whereby impacting the brand image of the company.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Cross Site Request Forgery&lt;/span&gt;:-&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;The website does not assign a dynamic IDs to the post request parameters i.e. all the request parameters sent by enduser are static page Ids.&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;This attack can be used general data manipulation in the name of others.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;HTTP Response Splitting&lt;/span&gt;:-The website does not validate the user input and response from the server contains invalidated user input. This attack could lead to redirecting user response to the server of attackers choice .&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;2. Authorization Bypass&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Possible Attacks:- Horizontal Authorization Bypass, Vertical Authorization Bypass using URL/Parameter Manipulation and Packet replay.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Cause &amp;amp; Impact:- &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;URL/Parameter Manipluation:- &lt;/span&gt; The website does not validate the authorization privilege of a user before serving any content. An attacker could use this to gain acccess to administrator roles and privalges.&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Packet Replay:- &lt;/span&gt;The website does not map the session ID of an user with the user uniquely defined parameters. &lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;An attacker could use this to gain acccess to administrator roles and privalges by replying the packet in case the website is over insecure channel i.e. HTTP.&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;There are couple of other important issues which will be covered in the upcoming post such as Session layer attacks, Configuration Management issues, Log Management issues, In- Secure Channels and Network layer attacks. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Hope this post would be informative to you and would like to hear your comments on the above highlighted problems.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://technochat.blogspot.com/2009/12/ethical-hacking-owasp-top-10-sans-top.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-5181337262030744574</guid><pubDate>Sat, 19 Dec 2009 06:12:00 +0000</pubDate><atom:updated>2009-12-18T22:49:16.987-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Application Security</category><category domain="http://www.blogger.com/atom/ns#">Asp.Net</category><category domain="http://www.blogger.com/atom/ns#">Penetration Testing</category><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Security Practices Asp.Net</title><description>&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;First thing which comes to mind when one connects to internet is am i secure.....?... Is somebody watching me? .Nobody has an answser to it but all one can do is use best practices to be on a safe edge of the wall. Listed below are some of the security misconfigurations, and demonstrates their potential impact on your applications.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;1. Web.Config&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Web.config files operate in a hierarchical inheritance manner. All Web.config files on the system inherit from the global configuration file called Machine.config located in the .NET framework directory. The effect of this is that the runtime behavior of your application can be altered simply by modifying a configuration file in a higher directory .&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;To keep your application-specific settings from being unexpectedly modified, the solution is to never rely on default setting values. For example, debugging is disabled by default in configuration files. If you&#39;re examining the configuration file for your application and you notice that the debug attribute is blank, you might assume that debugging is disabled. But it may or may not be disabled—the applied value depends on the value in parent configuration settings on the system. The safest choice is to always explicitly set security-related values in your application&#39;s configuration.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;1.1 Custom Errors Disabled&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;When you disable custom errors as shown below, ASP.NET provides a detailed error message to clients by default.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-uzjtrTO4lm0g3Ddi0aI4k2w28HxQjtTWhdp-ztfsVvTWVwXI0O-JKjs1u3cImCuyurnho0gaOLAT-tSqwvv3Ociv3U24tinEPWnnX3UoYZ3VyUi-YJdU9nkoQ-rT3sviTZFQ-ffrm14/s1600-h/untitled.bmp&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 218px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-uzjtrTO4lm0g3Ddi0aI4k2w28HxQjtTWhdp-ztfsVvTWVwXI0O-JKjs1u3cImCuyurnho0gaOLAT-tSqwvv3Ociv3U24tinEPWnnX3UoYZ3VyUi-YJdU9nkoQ-rT3sviTZFQ-ffrm14/s320/untitled.bmp&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5416828142018226674&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Looking at the error page, an attacker can see that the application is using the .NET framework version and ASP.NET version Knowing that, he can search the Web for known security advisories concerning these specific product versions. The hacker can also determine that the application is using Microsoft SQL Server as its database, because the exception type thrown was a SqlException, which is specific to Microsoft SQL Server.  The more information a hacker can gather about a Web site, the more likely it is that he will be able to successfully attack it.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;You can prevent such information leakage by modifying the mode attribute of the element to On or RemoteOnly. This setting instructs the Web application to display a nondescript, generic error message when an unhandled exception is generated.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Another way to circumvent the problem is to create your own custom error page and redirect users to that page when errors occur.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;1.2 Leaving Tracing Enabled&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The trace feature of ASP.NET is one of the most useful tools that you can use to debug and profile your applications. When the element is enabled for remote users (localOnly=&quot;false&quot;), any user can view an incredibly detailed list of recent requests to the application simply by browsing to the page trace.axd .&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;An hacker would find the form variables, &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;request and response and various other &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;useful information;  these might include email addresses that could be harvested and sold to spammers, IDs and passwords that could be used to impersonate the user, or credit card and bank account numbers. Even the most innocent-looking piece of data in the trace collection can be dangerous in the wrong hands. For example, the APPL_PHYSICAL_PATH server variable, which contains the physical path of the application on the server, could help an attacker perform directory traversal attacks against the system .&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The best way to prevent a hacker from obtaining trace data is to disable the trace viewer completely by setting the enabled attribute of the element to false. If you must have the trace viewer enabled, either to debug or to profile your application, then be sure to set the localOnly attribute of the element to true. This setting allows users to access the trace viewer only from the Web server and disables viewing it from any remote machine.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;1.3 Leaving Debugging Enabled&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Deploying a Web application in debug mode is a very common mistake. If you have enabled debugging and disabled custom errors in your application, then any error message displayed to an end user will include not only the server information, a detailed exception message, and a stack trace, but also the actual source code of the page where the error occurred .&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;To disable debugging, set the value of the debug attribute of the element to false. This is the default value of the setting, but as we will see, it&#39;s safer to explicitly set the desired value rather than relying on the defaults.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;1.4 Cookies Accessible Through Client-Side Script&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;In Internet Explorer 6.0, Microsoft introduced a new cookie property called HttpOnly. While you can set the property programmatically, you can set it generically in the site configuration.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Message board or forum pages are also often vulnerable to cross site scripting. An attacker, rather than posting about the current topic, will instead post a message such as script code in its page code—and the browser then interprets and executes it for future site visitors. Usually attackers use such script code to try to obtain the user&#39;s authentication token (usually stored in a cookie), which they could then use to impersonate the user.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;When cookies are marked with the HttpOnly property, their values are hidden from the client, so this attack will fail .&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;1.5 Cookieless SessionState Enabled&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;In the initial 1.0 release of ASP.NET, you had no choice about how to transmit the session token between requests when your Web application needed to maintain session state: it was always stored in a cookie. Unfortunately, this meant that users who would not accept cookies could not use your application. So, in ASP.NET 1.1, Microsoft added support for cookieless session tokens via use of the &quot;cookieless&quot; setting.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Web applications configured to use cookieless session state now stored the session token in the page URLs rather than a cookie. For example, the page URL might change from http://mysite/default.aspx to http://mysite/(123456789ABCDEFG)/default.aspx. In this case, 123456789ABCDEFG represents the current user&#39;s session token it had the side effect of making those applications much more vulnerable to identity theft &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;whereby using a network monitoring tool (also known as a &quot;sniffer&quot;) or by obtaining a recent request log, hijacking the user&#39;s session becomes a simple matter of browsing to the URL containing the stolen unique session token &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;and hence impersonates a legitimate user by stealing his session token.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The most effective way to prevent these session hijacking attacks is to force your Web application to use cookies to store the session token. This is accomplished by setting the cookieless attribute of the element to UseCookies or false. But what about the users who do not accept cookies? By setting the cookieless attribute to AutoDetect, the application will store the session token in a cookie for users who accept them and in the URL for those who won&#39;t. This means that only the users who use cookieless tokens will still be vulnerable to session hijacking.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;1.6 Cookieless Authentication Enabled&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Just as in the &quot;Cookieless Session State Enabled&quot; vulnerability discussed above, enabling cookieless authentication in your application can lead to session hijacking.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Session hijacking has far more serious consequences after a user has been authenticated. For example, online shopping sites generally allow users to browse without having to provide an ID and password. But when users are ready to make purchases, or when they want to view their orders, they have to login and be authenticated by the system. After logging in, sites provide access to more sensitive data, such as a user&#39;s order history, billing address, and credit card number. Attackers hijacking a user&#39;s session before authentication can&#39;t usually obtain much useful information. But if the attacker hijacks the session after authentication, all that sensitive information could be compromised.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The best way to prevent session hijacking is to disable cookieless authentication and force the use of cookies for storing authentication tokens. This is done by changing the cookieless attribute of the element to the value UseCookies.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;1.7 Failure to Require SSL for Authentication Cookies&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Web applications use the Secure Sockets Layer (SSL) protocol to encrypt data passed between the Web server and the client. Using SSL means that attackers using network sniffers will not be able to interpret the exchanged data. Rather than seeing plaintext requests and responses, they will see only an indecipherable jumble of meaningless characters.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Disabling cookieless authentication is just the first step towards securing the authentication token. Unless requests made to the Web server are encrypted, a network sniffer will still be able to read the authentication token from the request cookie. An attacker would still be able to hijack the user&#39;s session.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;By setting the requireSSL attribute of the element to true, the ASP.NET application will use a secure connection when transmitting the authentication cookie to the Web server.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;1.8 Sliding Expiration Used&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;All authenticated ASP.NET sessions have a timeout interval. The default timeout value is 30 minutes. After 30 minutes of inactivity, the user will automatically be timed out and forced to re-authenticate his credentials&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The slidingExpiration setting is a security measure used to reduce risk in case the authentication token is stolen. When set to false, the specified timeout interval becomes a fixed period of time from the initial login, rather than a period of inactivity. Attackers using a stolen authentication token have, at maximum, only the specified length of time to impersonate the user before the session times out. Because typical attackers have only the token, and don&#39;t really know the user&#39;s credentials, they can&#39;t log back in as the legitimate user, so the stolen authentication token is now useless and the threat is mitigated. .&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;To avoid this altogether, you can disable sliding expiration by setting the slidingExpiration attribute of the element to false.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;1.9 Non-Unique Authentication Cookie Used&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;As strange as it seems, an improperly chosen cookie name can create a security vulnerability just as dangerous as an improperly chosen storage location.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The default value for the name of the authentication cookie is .ASPXAUTH. If you have only one Web application on your server, then .ASPXAUTH is a perfectly secure choice for the cookie name. In fact, any choice would be secure. But, when your server runs more than one ASP.NET application, it becomes critical to assign a unique authentication cookie name to each application. If the names are not unique, then users logging into any of the applications might inadvertently gain access to all of them.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The best way to ensure that each Web application on your server has its own set of authorized users is to change the authentication cookie name to a unique value.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;1.10 Hardcoded Credentials Used&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;A fundamental difficulty of creating software is that the environment in which the application will be deployed is usually not the same environment in which it is created. In a production environment, the operating system may be different, the hardware on which the application runs may be more or less powerful, and test databases are replaced with live databases. This is an issue for creating applications that require authentication because developers and administrators often use test credentials to test the system. The question is: Where do the test credentials come from&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;For convenience, to avoid forcing developers from spending time on creating a credential store used solely for test purposes (and which would subsequently be discarded when the application went to production), Microsoft added a section to the Web.config file that you can use to quickly add test users to the application. Storing login credentials in plaintext in a configuration file is simply not secure. Anyone with read access to the Web.config file could access the authenticated Web application. It is possible to store the SHA-1 or MD5 hash of the password value, rather than storing the password in plaintext.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The most secure way to store login credentials is to not store them in the configuration file. Remove the element from your Web.config files in production applications.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://technochat.blogspot.com/2009/12/security-practices-aspnet.html</link><author>noreply@blogger.com (Angad Singh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-uzjtrTO4lm0g3Ddi0aI4k2w28HxQjtTWhdp-ztfsVvTWVwXI0O-JKjs1u3cImCuyurnho0gaOLAT-tSqwvv3Ociv3U24tinEPWnnX3UoYZ3VyUi-YJdU9nkoQ-rT3sviTZFQ-ffrm14/s72-c/untitled.bmp" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-6573782146864956356</guid><pubDate>Sat, 21 Feb 2009 04:16:00 +0000</pubDate><atom:updated>2009-12-18T22:49:56.066-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Network Security</category><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Blocking Skpye in a Network</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;One of the challenges which are faced by many administrator&#39;s is to block software&#39;s which create a Http tunnel. Skype is one of the software which works on similar principles. Lets first understand how it works.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;How Skype Works?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;When ever we install skype on any computer, it has a default list of server&#39;s to which it tries to connect, firstly it will try to connect using port 80 with P2P protocol. All the corporate houses have content and protocol filtering software&#39;s such as Websense, with which  p2p protocols can be easyly be blocked, but skype is something which tries to sneek through these Content and policy based software&#39;s. If skype fails to connect through port 80 then it tries to connect using port 443 and creates a secured tunnel, once it creates a tunnel it tried to connect to supernode, which then inturn connect it to Skype login Server.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg06KZX00ylnxmspwJx27ezBe0VIdVi8OeAKHNlVpJoWjGSlZiGq_4zYFL9SrIJz3nsxuw2xEzL0uApakXVuqHz-PurBdL8YycWsrGNzG548Vh7eBP2MZBdxZo4m_oebkkEASXKgwAhxDY/s1600-h/untitled.bmp&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 163px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg06KZX00ylnxmspwJx27ezBe0VIdVi8OeAKHNlVpJoWjGSlZiGq_4zYFL9SrIJz3nsxuw2xEzL0uApakXVuqHz-PurBdL8YycWsrGNzG548Vh7eBP2MZBdxZo4m_oebkkEASXKgwAhxDY/s320/untitled.bmp&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5305136570878457122&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;How to Block Skype?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you try to trace the Ip&#39;s of the supernode and try to block them you will notice that it will still  not block the skype, since the list of supernodes grows long.&lt;br /&gt;&lt;br /&gt;One of the best ways to block Skype is to block the Ip based connectivity through your proxy. Here are some of the changes which can you would need to make in proxy server configuration file.&lt;br /&gt;&lt;br /&gt;# Prevent Skype connecting HTTPs using CONNECT requests to IP addresses (those not using domain names)&lt;br /&gt;acl numeric_IPs url_regex ^[0-9]+.[0-9]+.[0-9]+.[0-9]+&lt;br /&gt;http_access deny CONNECT numeric_IPs all&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;# Prevent Skype connecting http&lt;br /&gt;acl Skype_UA browser Skype&lt;br /&gt;http_access deny Skype_UA&lt;br /&gt;&lt;br /&gt;# Prevent anyone to download anything from skype website&lt;br /&gt;acl Skype_domain dstdomain skype.com&lt;br /&gt;http_access deny Skype_domain&lt;/div&gt;</description><link>http://technochat.blogspot.com/2009/02/blocking-skpye-in-your-network.html</link><author>noreply@blogger.com (Angad Singh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg06KZX00ylnxmspwJx27ezBe0VIdVi8OeAKHNlVpJoWjGSlZiGq_4zYFL9SrIJz3nsxuw2xEzL0uApakXVuqHz-PurBdL8YycWsrGNzG548Vh7eBP2MZBdxZo4m_oebkkEASXKgwAhxDY/s72-c/untitled.bmp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-744022887099674853</guid><pubDate>Mon, 08 Dec 2008 11:12:00 +0000</pubDate><atom:updated>2008-12-08T05:52:40.932-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><category domain="http://www.blogger.com/atom/ns#">Virus removal</category><title>Gameeeee.vbs Windows Script Host Error..........!</title><description>This is new variant of the old Chinese virus,  If you see file name they using this team looks like  gamers team in china. What they looking for? &lt;strong&gt;Spoofing your log!&lt;/strong&gt;  get your financial information, get your sensitive information, etc.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Symptoms that your computer is infected with it&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;-&gt;Gettings pops while browsing like windows script host error &quot;&lt;span style=&quot;font-weight: bold;&quot;&gt;gameeeee.vbs&lt;/span&gt;&quot;   &quot;&lt;span style=&quot;font-weight: bold;&quot;&gt;ags.vbs&lt;/span&gt;&quot; and any other ends with vbs extension.&lt;br /&gt;-&gt;Presence of &quot;&lt;span style=&quot;font-weight: bold;&quot;&gt;gameeeee.vbs&lt;/span&gt;&quot; and &quot;&lt;span style=&quot;font-weight: bold;&quot;&gt;gameeeee.pif&lt;/span&gt;&quot; in the &quot;Temp&quot; folder of your computer.&lt;br /&gt;-&gt;Presence of &quot;&lt;span style=&quot;font-weight: bold;&quot;&gt;Thunder.cmd&lt;/span&gt;&quot; in &quot;Startup&quot; folder of your computer.&lt;br /&gt;-&gt;Presense of &quot;&lt;span style=&quot;font-weight: bold;&quot;&gt;ihhh.html&lt;/span&gt;&quot; file in the &quot;Temproray internet files&quot;&lt;br /&gt;-&gt;Internet browsing gets slow brower seems to hang, in status bar you see going to a particular website like &quot;&lt;span style=&quot;font-weight: bold;&quot;&gt;u.cruze3.cn&lt;/span&gt;&quot;&lt;br /&gt;&lt;br /&gt;If you observe any of the above mentioned symptoms then your computer seems to be infected with this virus. Actually its not a virus its a spyware which tries to steel information from your computer. This spyware has the capability to spreed itself over the network, if you see any computer infected with this then first step should be to remove this computer from the network else pretty soon all the system in the network will be infected with it.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Now let us start with troubleshooting&lt;/span&gt;.......&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Step 1 &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Some of the files which are actually malicious files but would be showing as folders.&lt;br /&gt;&lt;br /&gt;     =&gt; The folders that were found are as follows:&lt;br /&gt;&lt;br /&gt;      C:\WINDOWS\System32/{iifgfgf.dll ,vcmgcd32.dll and systems.txt}&lt;br /&gt;      C:\WINDOWS\{logo1_.exe, rundl132.dll, rundll16.exe and zts2.exe}&lt;br /&gt;&lt;br /&gt; The above files are malicious but they were converted into folders.     Deleted the above folders.&lt;br /&gt;&lt;br /&gt;   C:\WINDOWS\System32 \{spider.exe,winmine.exe and DSndUp.exe}&lt;br /&gt;   C:\WINDOWS\System32 or \drivers\{asyncmac.sys,beep.sys,aec.sys and&lt;br /&gt;   WDF01000.SYS}&lt;br /&gt;   C:\WINDOWS\{Lic.xxx,R.COM and WMSysPr9.prx}&lt;br /&gt;&lt;br /&gt;   C:\Documents and Settings\All Users\Start Menu\Programs\Startup&lt;br /&gt;   \thunder.exe&lt;br /&gt;&lt;br /&gt; Apart from the above mentioned files look for these files also which&lt;br /&gt; were used by previous varient of the same spyware.&lt;br /&gt;&lt;br /&gt;  -system.exe&lt;br /&gt;  -HBBO.dll, HBCHIBI.dll, HBQQFFO.dll, HBmhly.dll, HBZHUXIAN.dll,&lt;br /&gt;   HBZG.dll,HBSO2.dll, HBQQSG.dll, HBSOUL.dll&lt;br /&gt;  -AcSpecf.sdb, AcXtrnel.sdb, AcSpecf.dll&lt;br /&gt;  -HBKernel32.sys, eth8023.sys&lt;br /&gt;&lt;br /&gt;Delete the all mentioned files &amp;amp; also delete all the files from temp  and temporary internet files folder.&lt;br /&gt;&lt;br /&gt;You might not be able to delete some of the above file for that use &lt;a href=&quot;http://www.softpedia.com/get/System/System-Miscellaneous/Unlocker.shtml&quot;&gt;Unlocker&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Step 2&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;After deleting the above mentioned files next step would be to block the url which you notice in the status bar of your screen. for example in the address bar i write google.com but notice u.cruze3.cn or i try to go to yahoo.com and notise the same url then block this url in the Proxy or in the firewall.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Step 3&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Now run &lt;a href=&quot;http://www.softpedia.com/get/Antivirus/Norman-Malware-Cleaner.shtml&quot;&gt;norman malware cleaner.&lt;/a&gt; This will remove all the infected files from your computer.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Step 4&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Now we have to repair winsock for that go to registry.&lt;br /&gt;&lt;div class=&quot;indent&quot;&gt;&lt;br /&gt;   HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Winsock&lt;/div&gt;&lt;div class=&quot;indent&quot;&gt;               HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Winsock2     &lt;/div&gt;&lt;br /&gt; Delete the above mentioned folders then restart your machine.&lt;br /&gt;&lt;br /&gt;Now you are free from this spyware enjoy your browsing..............................&lt;br /&gt;&lt;br /&gt;I will be looking forward towards your feedback about this post..............&lt;br /&gt;&lt;a href=&quot;http://www.softpedia.com/get/Antivirus/Norman-Malware-Cleaner.shtml&quot;&gt; &lt;/a&gt;</description><link>http://technochat.blogspot.com/2008/12/this-is-new-variant-of-old-chinese.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-3241723918738388442</guid><pubDate>Sat, 31 May 2008 10:28:00 +0000</pubDate><atom:updated>2008-12-11T00:20:20.358-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><category domain="http://www.blogger.com/atom/ns#">Innovative Designs</category><title>Innovative Designs and Devices</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;We all moving towards a fairy tale world where everything  looks to be beautiful and perfect from the smallest little non living thing to the more visible creatures. With technology around  we are able to live a comfortable life, but is comfortable good enough for us?? don&#39;t we  wish to live life where everything around us is just like we want it to be?? well i think time is changing technology is advancing we are now moving towards a new world where consumers are having a say in the design, looks and features of every thing being built around us.&lt;br /&gt;&lt;br /&gt;Its now end of those fat looking , heavy systems which would only satisfy our technological needs but still lack looks. Now it time for some makeover of  devices its been long that we have been seeing things as they are but now we need change we want to get rid of these fat looking heavy device. Here are some new looking devices of 21st century which will change the way how we perceive things.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;How about the remote control in shape of Apple??&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Well well it gone be one fine experience to play with. Sony is expected to give our old fashioned remote a new look it will look like an apple&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiXbrNT-1rpHr8uN0JqZcfiiTN8I89YFUe3eAihAMA4oM7fqsyQnIsKczG35rw36U4-Lc6PJkpzNk8ORW02D7m5dOrkxO6C7VZ3NCQOudWEionrlQ9GVeQ_rGOxNoP5YuZOSEeGJ7uxBg/s1600-h/6730-450x-sony_bravia3.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 190px; height: 222px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiXbrNT-1rpHr8uN0JqZcfiiTN8I89YFUe3eAihAMA4oM7fqsyQnIsKczG35rw36U4-Lc6PJkpzNk8ORW02D7m5dOrkxO6C7VZ3NCQOudWEionrlQ9GVeQ_rGOxNoP5YuZOSEeGJ7uxBg/s320/6730-450x-sony_bravia3.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5206488493475844162&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYveBwz4pcy-jlr2G6nncNKReZhskoZNV6PF8edR45fHePiSkhGj6Y3gLw5ULGk08FvZrBXoaVbpvQG9AqBEgcceDrJr7z36F5626yp-U6NkKZY3LFOqfIesiU0eiGe7czXFPLgG35Ogo/s1600-h/sony_bravia.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 204px; height: 222px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYveBwz4pcy-jlr2G6nncNKReZhskoZNV6PF8edR45fHePiSkhGj6Y3gLw5ULGk08FvZrBXoaVbpvQG9AqBEgcceDrJr7z36F5626yp-U6NkKZY3LFOqfIesiU0eiGe7czXFPLgG35Ogo/s320/sony_bravia.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5206488868658941122&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI3ITLy45n58w53B8bXHF-ZpAib0ecZiDdpoUXip3_q3k1tPSsmypP_cAvJUq531nSZ2aMa0_EICgXrxSDduLLxZXmNN_NtkzvBFN7lA7-mP_eKALePBd-E3Gb8IQ0icptXZwKwHDSc7Y/s1600-h/Digitalpot1.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 237px; height: 289px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI3ITLy45n58w53B8bXHF-ZpAib0ecZiDdpoUXip3_q3k1tPSsmypP_cAvJUq531nSZ2aMa0_EICgXrxSDduLLxZXmNN_NtkzvBFN7lA7-mP_eKALePBd-E3Gb8IQ0icptXZwKwHDSc7Y/s320/Digitalpot1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5206487520237683586&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;How about a Digital Pot Lets Plants tell you their demands&lt;/span&gt;???&lt;br /&gt;&lt;br /&gt;A new Digital pot is being developed which will automatically tell us about what are the needs of the plant..............&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;These happens to be only just a few examples of our new devices. If you wish to see more then&lt;br /&gt;&lt;br /&gt;Here is the link : &lt;a href=&quot;http://www.smashingmagazine.com/2008/01/07/monday-inspiration-innovative-designs-and-devices/&quot;&gt;smashingmagazine&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;h1 style=&quot;font-weight: normal; color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;a href=&quot;http://gizmodo.com/393882/digital-pot-lets-plants-tell-you-their-demands&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/h1&gt;</description><link>http://technochat.blogspot.com/2008/05/innovative-designs-and-devices.html</link><author>noreply@blogger.com (Angad Singh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiXbrNT-1rpHr8uN0JqZcfiiTN8I89YFUe3eAihAMA4oM7fqsyQnIsKczG35rw36U4-Lc6PJkpzNk8ORW02D7m5dOrkxO6C7VZ3NCQOudWEionrlQ9GVeQ_rGOxNoP5YuZOSEeGJ7uxBg/s72-c/6730-450x-sony_bravia3.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-410838950426179683</guid><pubDate>Fri, 30 May 2008 16:47:00 +0000</pubDate><atom:updated>2008-12-11T00:20:20.491-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mobiles</category><category domain="http://www.blogger.com/atom/ns#">Nokia</category><title>Nokia 6110 Navigator</title><description>&lt;div style=&quot;text-align: justify; font-family: georgia;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggS4MNXePw7ntCNyWD5J3RLJyYEHGWlcaxd4b2HNadounN2KwuJ2FdtrGUHnlORglnjW8wo1TZD0aNwIldK-Q0GRHFdp4_ON_LlEcPADbDwG-3zjydJrlcqy_qTDpQINQOXWqr-QXW9Yg/s1600-h/27052008300.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 214px; height: 278px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggS4MNXePw7ntCNyWD5J3RLJyYEHGWlcaxd4b2HNadounN2KwuJ2FdtrGUHnlORglnjW8wo1TZD0aNwIldK-Q0GRHFdp4_ON_LlEcPADbDwG-3zjydJrlcqy_qTDpQINQOXWqr-QXW9Yg/s320/27052008300.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5206256928868757506&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span&gt;Finnish Mobile handset giant Nokia has unveiled a  new smart phone mobile device Nokia 6110 Navigator which has the capability of navigating to a particular location using satellite images with inbuilt magnetic COMPASS  &amp;amp; &lt;/span&gt;&lt;span&gt;Global Positioning System.&lt;br /&gt;Some of the noticeable features of Nokia 6110 Navigator are:&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Voice-guided 3-D GPS Navigation&lt;/li&gt;&lt;li&gt;2 megapixel camera with 4x digital zoom, integrated camera flash.&lt;/li&gt;&lt;li&gt;Suppport for 3G Network.&lt;/li&gt;&lt;li&gt;Video Calling.&lt;/li&gt;&lt;li&gt;FM radio with Visual Radio.&lt;/li&gt;&lt;li&gt;Push email with attachments.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Nokia has the collection of Nokia Maps 2.0 for 170+ countries maps to its database and maps could be used on its GPS enabled cell phones and could be used to browse LIVE streaming GPS navigation on mobile.You can  easily track Geo magnetic directions, longitudes &amp;amp; latitudes with help of this mobile. It is also helpful in Drive Directions using one of the available 2 modes &quot;Fastest Path Mode&quot; &amp;amp; &quot; Shortest Path Mode&quot;, besides them there is 3rd mode for pedestrians directions. It also provides information about the speed at which you are driving your car.&lt;br /&gt;&lt;br /&gt;In INDIA navigator comes with pre-installed maps of eight cities including Delhi and NCR, Jaipur, Ahmedabad, Pune, Mumbai, Chennai,Bangalore and  Hyderabad. These maps include the locations and details of roads, restaurants, hotels, banks,  ATMs, schools, colleges, petrol pumps, hospitals and medicine shops, and other places of interests.&lt;br /&gt;&lt;br /&gt;In India it is costing around Rs.13,500.&lt;br /&gt;&lt;br /&gt;After my first experience with this mobile I will say the navigation system is really helpful but it can be dice at times for locations which are under development like Gurgoan. But thats not something to worry for since you can easily do away with this problem by simply downloading the latest maps. I think its a cool and helpful device to have.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://technochat.blogspot.com/2008/05/nokia-6110-navigator.html</link><author>noreply@blogger.com (Angad Singh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggS4MNXePw7ntCNyWD5J3RLJyYEHGWlcaxd4b2HNadounN2KwuJ2FdtrGUHnlORglnjW8wo1TZD0aNwIldK-Q0GRHFdp4_ON_LlEcPADbDwG-3zjydJrlcqy_qTDpQINQOXWqr-QXW9Yg/s72-c/27052008300.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-6438797213337372483</guid><pubDate>Sat, 17 May 2008 13:33:00 +0000</pubDate><atom:updated>2008-05-18T00:38:10.516-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><category domain="http://www.blogger.com/atom/ns#">Windows7</category><title>Microsoft&#39;s Windows7</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;As i had predicted few months back when i posted about increasing need for parallel processing  will bring in the need for Tabbed Viewing in File System Explorer. Well Finally Microsoft&#39;s New Windows7  has implemented it. In my &lt;a href=&quot;http://technochat.blogspot.com/2007/09/future-looks-of-mycomputer.html&quot;&gt;previous post&lt;/a&gt; i had mentioned about the advantage of implementing it and also showed snaps from &lt;a href=&quot;http://technochat.blogspot.com/2007/09/future-looks-of-mycomputer.html&quot;&gt;my project&lt;/a&gt; in which i had implemented Tab Viewing.&lt;br /&gt;&lt;br /&gt;Some of the features  of Windows 7 are:&lt;br /&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; Tabbed Viewing for increasing the support for parallel processing.&lt;/li&gt;&lt;li&gt; A New Disk Usage Analyzer which provide in-dept detailed analysis.&lt;/li&gt;&lt;li&gt; Support for Virtual Drive.&lt;br /&gt;&lt;/li&gt;&lt;li&gt; A new Website Blog and Portal Designer.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Here is a video showing how Windows7 would look like......&lt;br /&gt;&lt;br /&gt;&lt;object height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/B5D43p4_qcY&amp;amp;hl=en&quot;&gt;&lt;param name=&quot;wmode&quot; value=&quot;transparent&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/B5D43p4_qcY&amp;amp;hl=en&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;It gives me a feeling that Microsoft&#39;s Windows 7  gives user more power with customizing abilities and its   gone be a cool new interface with some lovely new user friendly features....................&lt;br /&gt;&lt;br /&gt;Link to some More Video&#39;s of Windows 7 : &lt;a href=&quot;http://www.youtube.com/watch?v=DSPV_HLwITk&quot;&gt;Windows7&lt;/a&gt;&lt;br /&gt;Link Previous Post:&lt;a href=&quot;http://technochat.blogspot.com/2007/09/future-looks-of-mycomputer.html&quot;&gt;Future Looks Of  MyComputer&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://technochat.blogspot.com/2008/05/microsofts-windows7.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-7080941853824037705</guid><pubDate>Mon, 12 May 2008 15:29:00 +0000</pubDate><atom:updated>2008-12-11T00:20:20.668-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Environment</category><category domain="http://www.blogger.com/atom/ns#">Green Technology</category><category domain="http://www.blogger.com/atom/ns#">Renewable energy</category><title>The World’s First Zero-Emissions City ....In Oil Rich Abu Dhabi</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaiisAH7MCniqe6tgVGZFThs1n2COYUgqnbaiHs_cuIGDP6tVc8Sz76FbFs3WMn6MALciDi3vhh4OihCiMJyK3hpSx_JEY6ACB64AtEPDyfSkmxMFHccMfMbh5fSj0wVnBPEaV-UlIxBM/s1600-h/masdar_x220.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaiisAH7MCniqe6tgVGZFThs1n2COYUgqnbaiHs_cuIGDP6tVc8Sz76FbFs3WMn6MALciDi3vhh4OihCiMJyK3hpSx_JEY6ACB64AtEPDyfSkmxMFHccMfMbh5fSj0wVnBPEaV-UlIxBM/s400/masdar_x220.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5199597605345523474&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;World’s first zero-emission city is on its way to be built in oil-rich Abu Dhabi. With this Abu Dhabi is hoping the project will propel the country to become world leaders in renewable energy.&lt;br /&gt;&lt;br /&gt;Construction started on a city that will house 50,000 people and 1,500 businesses but use extremely little energy. The city&#39;s designers predict that efficiency improvements will result in a 75 percent reduction in energy consumption compared with a conventional city of the same size. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot; class=&quot;entry-body&quot;&gt;   &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                    &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Some of the Design Paradigms which are implemented to make it zero emission are&lt;br /&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;Thin-film solar panels will serve as the facades and roofing for buildings. High tech sensors will closely monitor energy use to ensure nothing is wasted.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Driverless vehicles will be powered by batteries that make cars obsolete. All you do is type in your destination, and an electric carriage comes to your door to automatically take you to your destination on tracks using magnetic levitation. &lt;/li&gt;&lt;li&gt;To keep people aware of their energy habits, sensors throughout the city will keep residents aware of how much their energy usage will cost them, which serves as a nice little reminder to keep habits reasonable.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The goal of the new city is to set new standards and develop new technology for clean sustainable that can be transferred to other cities around the world.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Source:&lt;a href=&quot;http://www.dailygalaxy.com/my_weblog/2008/05/the-worlds-firs.html&quot;&gt;Dailygalaxy&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;</description><link>http://technochat.blogspot.com/2008/05/worlds-first-zero-emissions-city-in-oil.html</link><author>noreply@blogger.com (Angad Singh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaiisAH7MCniqe6tgVGZFThs1n2COYUgqnbaiHs_cuIGDP6tVc8Sz76FbFs3WMn6MALciDi3vhh4OihCiMJyK3hpSx_JEY6ACB64AtEPDyfSkmxMFHccMfMbh5fSj0wVnBPEaV-UlIxBM/s72-c/masdar_x220.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-1452983775692111439</guid><pubDate>Sun, 11 May 2008 18:47:00 +0000</pubDate><atom:updated>2008-12-11T00:20:20.816-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Apple</category><category domain="http://www.blogger.com/atom/ns#">HTC</category><category domain="http://www.blogger.com/atom/ns#">Mobiles</category><title>HTC&#39;s Touch Diamond</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img alt=&quot;hand-HTC.jpg&quot; src=&quot;http://blogs.pcworld.com/staffblog/archives/hand-HTC.jpg&quot; align=&quot;right&quot; height=&quot;195&quot; width=&quot;150&quot; /&gt;It&#39;s  now HTC coming with a new touch screen phone which seems to be inspired by Apple&#39;s iphone in many ways.  It is Touch Diamond which will undoubtedly get compared to the iPhone, as the two devices share more than a few similarities.&lt;br /&gt;&lt;br /&gt;The on-screen keyboard is one example which looks exactly like the iPhone&#39;s. There&#39;s even a zoom in / zoom out effect when opening and closing the full programs menu... just like the iPhone. And of course a custom YouTube app... just like you-know-who.&lt;br /&gt;&lt;br /&gt;Some of the features which distinguish it are.....&lt;br /&gt;&lt;br /&gt; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot; class=&quot;toolbarCont&quot;&gt;    &lt;!-- comments in this section to eliminate whitespace  --&gt; &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;window.print()&quot; class=&quot;toolbarPrint&quot; title=&quot;Print&quot;&gt;&lt;!-- for IE --&gt;&lt;/a&gt;&lt;!--  --&gt; &lt;a href=&quot;http://www.pcworld.com/emailfriend?entry_id=6915&amp;amp;orig_url=http://blogs.pcworld.com/staffblog/archives/006915.html&quot; class=&quot;toolbarEmail&quot; title=&quot;Email&quot;&gt;&lt;!-- for IE --&gt;&lt;/a&gt;&lt;!--  --&gt; &lt;a href=&quot;http://blogs.pcworld.com/staffblog/archives/006915.html#c6915&quot; onclick=&quot;javascript:toggleCommentsDisplay(&#39;post6915&#39;);&quot; class=&quot;toolbarComment&quot; title=&quot;Comment&quot;&gt;&lt;!-- for IE --&gt;&lt;/a&gt;&lt;!--  --&gt; &lt;a href=&quot;http://blogs.pcworld.com/staffblog/index.rss&quot; class=&quot;toolbarRss&quot; title=&quot;RSS&quot;&gt;&lt;!-- for IE --&gt;&lt;/a&gt;   &lt;div class=&quot;clear&quot;&gt;&lt;!-- for IE --&gt;&lt;/div&gt;  &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;script type=&quot;text/javascript&quot;&gt; &lt;!-- function bookmarkPop(url){  window.open(url, &quot;_blank&quot;); } //--&gt; &lt;/script&gt;  &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot; id=&quot;bookmarkToolbar&quot;&gt; &lt;!-- comments in this section to eliminate whitespace--&gt; &lt;a href=&quot;javascript:bookmarkPop(&#39;http://slashdot.org/bookmark.pl?url=&#39;+encodeURIComponent(location.href)+&#39;&amp;title=&#39;+encodeURIComponent(document.title))&quot; class=&quot;toolbarSlashdot&quot; title=&quot;Slashdot&quot;&gt;&lt;!-- for IE --&gt;&lt;/a&gt; &lt;a href=&quot;javascript:bookmarkPop(&#39;http://digg.com/submit?phase=2&amp;url=&#39;+encodeURIComponent(location.href)+&#39;&amp;title=&#39;+encodeURIComponent(document.title)+&#39;&amp;bodytext=&#39;)&quot; class=&quot;toolbarDigg&quot; title=&quot;Digg This&quot;&gt;&lt;!-- for IE --&gt;&lt;/a&gt;&lt;!--  --&gt;&lt;a href=&quot;javascript:bookmarkPop(&#39;http://del.icio.us/post?url=&#39;+encodeURIComponent(location.href)+&#39;&amp;title=&#39;+encodeURIComponent(document.title));&quot; class=&quot;toolbarDelicious&quot; title=&quot;del.icio.us&quot;&gt;&lt;!-- for IE --&gt;&lt;/a&gt;&lt;!--  --&gt;&lt;a href=&quot;javascript:bookmarkPop(&#39;http://www.newsvine.com/_tools/seed&amp;save?u=&#39;+encodeURIComponent(location.href)+&#39;&amp;h=&#39;+encodeURIComponent(document.title))&quot; class=&quot;toolbarNewsvine&quot; title=&quot;Newsvine&quot;&gt;&lt;!-- for IE --&gt;&lt;/a&gt;     &lt;div class=&quot;clear&quot;&gt;&lt;!-- for IE --&gt;&lt;/div&gt; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;1. It&#39;s sleek and smaller &lt;/strong&gt;    &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The Touch Diamond is about the size of a deck of cards, but half the thickness and lot smaller than it looks in comparison to iphone. It also manages to squeeze a 640x480 screen into such a small body.&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;2. Silent your phone by setting the face down&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;If you get an incoming call that you don&#39;t want to answer, you can set the phone face down on your desk to silence the ringer.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;3. Auto opening of notepad&lt;/strong&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu3pj_ZR-lje_cv6OJS_jfOOShwtJwDlvpTUjsR80asMhdnds_5Zj_p85l2jJ7HGkTcCZnsNww-UqxxsdMEq596GtGmGm-V0sqs16vDM_pmvk3nCWo_gn7dKHMzNboKH0p2IDZFPt5KB0/s1600-h/Touch_Diamond_People-large.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu3pj_ZR-lje_cv6OJS_jfOOShwtJwDlvpTUjsR80asMhdnds_5Zj_p85l2jJ7HGkTcCZnsNww-UqxxsdMEq596GtGmGm-V0sqs16vDM_pmvk3nCWo_gn7dKHMzNboKH0p2IDZFPt5KB0/s200/Touch_Diamond_People-large.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5199450202067924722&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;If you want to jot something down mid-conversation, pulling the stylus out of the bottom of the phone will automatically open up the note-taking application.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;4.Cool Flashing LED&lt;/strong&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;     &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;/strong&gt;The circular touchpad also has various LED configurations that will flash in different combinations to alert you to missed calls, new e-mails, new text messages, and so forth.&lt;br /&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;5.New TouchFlo 3D interface&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The new TouchFlo 3D interface does completely replace the main programs menu, which is a welcome touch. Now you can easily choose and arrange icons for your most-used applications on a custom menu set up exactly how you like it, and even the list of additional programs has a slick look with finger-touch interaction.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;    &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;All in all, I think the Touch Diamond will find its way into a lot of people&#39;s hands.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Will it be next big hit after iphone? Probably i believe YES.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Source:&lt;a href=&quot;http://www.phonescoop.com/articles/article.php?a=193&amp;amp;p=294&quot;&gt;Phone Scoop&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://technochat.blogspot.com/2008/05/htcs-touch-diamond.html</link><author>noreply@blogger.com (Angad Singh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu3pj_ZR-lje_cv6OJS_jfOOShwtJwDlvpTUjsR80asMhdnds_5Zj_p85l2jJ7HGkTcCZnsNww-UqxxsdMEq596GtGmGm-V0sqs16vDM_pmvk3nCWo_gn7dKHMzNboKH0p2IDZFPt5KB0/s72-c/Touch_Diamond_People-large.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-687034686949917655</guid><pubDate>Sun, 11 May 2008 06:19:00 +0000</pubDate><atom:updated>2008-05-11T08:29:22.564-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">Technology</category><title>Security flaw turns Gmail into open-relay server</title><description>&lt;h1 style=&quot;text-align: justify;&quot;&gt; &lt;/h1&gt;&lt;div style=&quot;text-align: justify; font-family: georgia;&quot; class=&quot;Body&quot;&gt;                                 &lt;img style=&quot;width: 153px; height: 77px;&quot; class=&quot;ImageRight Bordered&quot; src=&quot;http://media.arstechnica.com/news.media/Gmail.jpg&quot; /&gt;A recent study by Information Security Research Team(&lt;a href=&quot;http://ece.uprm.edu/%7Eandre/insert/gmail.html&quot;&gt;INSERT&lt;/a&gt;) has revealed flaws in Google&#39;s e-mail service turning Gmail into a highly effective spam machine. According to the INSERT, Gmail is susceptible to a man-in-the-middle attack that allows a spammer to send thousands of bulk e-mails through Google&#39;s SMTP service. Despite the fact that Google has &lt;span&gt;identity fraud protection &lt;/span&gt;&lt;span&gt;mechanisms&lt;/span&gt; and a &lt;span&gt;limit of 500-messages&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; &lt;/span&gt; on bulk e-mail but still allows spammers to send a potentially unlimited number of messages .&lt;span style=&quot;font-size:100%;&quot;&gt;The attack specifically exploits Gmail’s email forwarding functionality. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Situation seems even worse when we consider the fact that E-mail that originates from Google, are well-regarded by both Yahoo and Hotmail. If you try to send spam mails directly to Yahoo and Hotmail from a blacklisted IP, mails don&#39;t even necessarily reach the account&#39;s spam box, while forged e-mail sent via Gmail always arrived in the intended account&#39;s inbox. Hence exploiting the trust hierarchy among Email Servers.&lt;br /&gt;&lt;br /&gt;As Spam messages represents 95% of all email communications, it is simply not feasible to apply the full power of spam filtering to every single message that is received by email servers. Thus to tackle this problem Servers do blacklisting of IP addresses of spam ofenders . This way, messages from blacklisted IP&#39;s are reject before even entering the system, and whitelisted addresses are granted &#39; to bypass most of the filters.&lt;br /&gt;&lt;br /&gt;Source: &lt;a href=&quot;http://ece.uprm.edu/%7Eandre/insert/gmail.html&quot;&gt;Information Security Research Team&lt;/a&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;</description><link>http://technochat.blogspot.com/2008/05/security-flaw-turns-gmail-into-open.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-1347142222741905528</guid><pubDate>Thu, 01 May 2008 15:19:00 +0000</pubDate><atom:updated>2008-12-11T00:20:21.329-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Wallpapers</category><title>Beautiful Pics of  Yosemite for  Wallpaper</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;For a change i decided to post something other than technical for my readers.......&lt;br /&gt;&lt;br /&gt;I am a nature lover, like to visit places with open blue sky&#39;s, widely spread  green fields, deep blue sea&#39;s and snow around.....&lt;br /&gt;&lt;br /&gt;Here i  would like to share pictures of a beautiful place called Yosemite where one of my cousins went and i would definitely visit this place some day..........&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjooFHwIK0Hjpj-NeBYvP8ChMyTVgpuSrxxqJEeUNIUQmD8J9scEMsdblPWaSwWbQJrxxTub1CNAZ5IqIIITlNKhbfBcNCz1BeXBS26_c0v_jdlzMsedac7U3RK_Hb_RIG2C60nmXJjjQo/s1600-h/DSCN3082.JPG&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 230px; height: 154px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjooFHwIK0Hjpj-NeBYvP8ChMyTVgpuSrxxqJEeUNIUQmD8J9scEMsdblPWaSwWbQJrxxTub1CNAZ5IqIIITlNKhbfBcNCz1BeXBS26_c0v_jdlzMsedac7U3RK_Hb_RIG2C60nmXJjjQo/s200/DSCN3082.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5195437854158248930&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzkXacYpCRCmI7iGS8oXBopAxLKlQco5vy04JaM7jWdvtxyj9pCWux_f2LKKnldccJ0RtgGUNwg70QXEkBbHJGenBz6yhPP6uNyZgvlXUwjRn0RxW2ydIzhi1_dfJv-3rfeKNW4OZoSZY/s1600-h/DSC_0776.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 264px; height: 144px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzkXacYpCRCmI7iGS8oXBopAxLKlQco5vy04JaM7jWdvtxyj9pCWux_f2LKKnldccJ0RtgGUNwg70QXEkBbHJGenBz6yhPP6uNyZgvlXUwjRn0RxW2ydIzhi1_dfJv-3rfeKNW4OZoSZY/s200/DSC_0776.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5195438180575763442&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgBuWJIXjz-pItR-ciiZW-NQCXZmrmSArU_oqJgpA-da-ZrfET9a4p5JgPQYI3xPDj6jMm06bWurC3Xzb8Xgo0cu4uG5awFTOqvg3U_IO_CgaE8grF4rABARiIp3M3yn3KGsurjVy-AZM/s1600-h/DSCN2907.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgBuWJIXjz-pItR-ciiZW-NQCXZmrmSArU_oqJgpA-da-ZrfET9a4p5JgPQYI3xPDj6jMm06bWurC3Xzb8Xgo0cu4uG5awFTOqvg3U_IO_CgaE8grF4rABARiIp3M3yn3KGsurjVy-AZM/s320/DSCN2907.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5195439748238826498&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIcKA0LsTF3MQdWfSIQSzc3tQ8jqlmZKLRqLuOmKHnjJHa0wnsqx4_Y332MJKS_Q_KM-tfjXwNEzlM37IqLJQWrDS1bIB005lKaPWXi12ZfSYGmphwCG6wsi8fGST5Bt8PUWOXIATUXC4/s1600-h/DSCN2981.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 240px; height: 279px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIcKA0LsTF3MQdWfSIQSzc3tQ8jqlmZKLRqLuOmKHnjJHa0wnsqx4_Y332MJKS_Q_KM-tfjXwNEzlM37IqLJQWrDS1bIB005lKaPWXi12ZfSYGmphwCG6wsi8fGST5Bt8PUWOXIATUXC4/s320/DSCN2981.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5195442595802143762&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;These pics will serve as my Wallpaper for next few days. Hope you would like it................</description><link>http://technochat.blogspot.com/2008/05/beautiful-pics-of-yosemite-for.html</link><author>noreply@blogger.com (Angad Singh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjooFHwIK0Hjpj-NeBYvP8ChMyTVgpuSrxxqJEeUNIUQmD8J9scEMsdblPWaSwWbQJrxxTub1CNAZ5IqIIITlNKhbfBcNCz1BeXBS26_c0v_jdlzMsedac7U3RK_Hb_RIG2C60nmXJjjQo/s72-c/DSCN3082.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-2263751067975699312</guid><pubDate>Sat, 22 Mar 2008 09:33:00 +0000</pubDate><atom:updated>2008-03-26T11:59:04.861-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows XP</category><title>Hidding Files and Folders</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Sometimes we need a method to safegaurd are important documents or folders from accidental deletion or we don&#39;t want others to read a document. Generally what we tend to do is just change the properties of that files and folder to Hidden. But do u think it&#39;s the right way to protect ?? bcoz most of people today know this. So here&#39;s a trick which can help you safegaurd your documents............&lt;br /&gt;&lt;br /&gt;Steps to safegaurd files and folders.....&lt;br /&gt;&lt;span class=&quot;readmore&quot;&gt;&lt;span style=&quot;color: rgb(51, 102, 255);&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;readmore&quot;&gt;&lt;span style=&quot;color: rgb(51, 102, 255);&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;  &lt;ol&gt;    &lt;li&gt;Create a new folder.&lt;br /&gt;&lt;/li&gt;    &lt;li&gt;Delete the name of folder rename it by just pressing the &quot;&lt;span style=&quot;color:blue;&quot;&gt;ALT&lt;/span&gt;&quot; button and then on the &lt;span style=&quot;color:red;&quot;&gt;NUM PAD&lt;/span&gt; press &quot;&lt;span style=&quot;color:blue;&quot;&gt;255&lt;/span&gt;&quot; and then press enter.You will notice that the file you have just renamed has no name.   &lt;/li&gt;    &lt;li&gt;Now right click on the folder and click on &quot;&lt;span style=&quot;color:blue;&quot;&gt;Properties&lt;/span&gt;&quot;&lt;/li&gt;  &lt;ul&gt;   &lt;li&gt;In the upper tab of the box click on &quot;&lt;span style=&quot;color:blue;&quot;&gt;Customize&lt;/span&gt;&quot;&lt;/li&gt;   &lt;li&gt;Then in the folder icon section click on &quot;&lt;span style=&quot;color:blue;&quot;&gt;Change Icon&lt;/span&gt;&quot; &lt;/li&gt; &lt;/ul&gt;          A new box will appear.&lt;br /&gt;&lt;div&gt; &lt;li&gt;          Here you will see different icons, you will see that some icon spaces are blank.&lt;/li&gt;   &lt;/div&gt;   &lt;ul&gt;     &lt;li&gt;Select  one of the blank spaces and then click &quot;&lt;span style=&quot;color:blue;&quot;&gt;OK&lt;/span&gt;&quot;&lt;/li&gt;     &lt;li&gt;Then On the &quot;Properties&quot; box click ok. &lt;/li&gt;   &lt;/ul&gt; &lt;/ol&gt;You will be amazed to see that your file is no longer visible.You can still click on that folder and drag it any where you want.&lt;br /&gt;&lt;br /&gt;However if you try to hide this folder by changing its properties, it will result into it being show as the first folder in the directory where you have tried to make this folder... &quot;This will happen Only if you try to select the option of showing hidden documents&quot;.&lt;br /&gt;&lt;br /&gt;This ALT -255  is known as Hidden Dragon. If you want to read more about it then &lt;a href=&quot;http://www2.sas.com/proceedings/sugi31/055-31.pdf&quot;&gt;click here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Please give your opnion about this trick...................&lt;span class=&quot;readmore&quot;&gt;&lt;span style=&quot;color: rgb(51, 102, 255);&quot;&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://technochat.blogspot.com/2008/03/hidding-files-and-folders.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-8201687799635657226</guid><pubDate>Sun, 16 Mar 2008 16:23:00 +0000</pubDate><atom:updated>2008-03-17T06:24:10.042-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows XP</category><title>Recovering Deleted Data From Hard Disk</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;It happens sometimes that we may accidentally delete some precious file or it might be the case where our hard disk might have crashed leading to loss of precious data. When ever such a thing happens,  its just that we have deleted a record from the primary table of the hard disk what it means is that we haven&#39;t actually lost the data,  it is still there on the hard disk its only that its entry gets deleted. We can always possibly recover the data if the location where that file resided hasn&#39;t been override by some other file.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;To recover data in such case we must follow the following steps.&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; Do not format the hard disk or try to add any new file.&lt;br /&gt;&lt;/li&gt;&lt;li&gt; Download the software to recover data from &lt;a style=&quot;color: rgb(51, 102, 255);&quot; href=&quot;http://www.download3k.com/System-Utilities/Backup-Restore/Download-PC-Inspector-File-Recovery.html&quot;&gt;here.&lt;/a&gt;&lt;/li&gt;&lt;li&gt; Now just select the drive where the lost data resided and just scan it.&lt;/li&gt;&lt;li&gt; This software will show you the actual data which is there on the hard disk and now you     can recover the file.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Well you may use this technique for hiding important files, what i mean is you may delete files from your PC nobody will be able to see the files.Now when ever you what to view the file its just click away just use the software recover it and see it.............&lt;br /&gt;&lt;/div&gt;</description><link>http://technochat.blogspot.com/2008/03/recovering-deleted-data-from-hard-disk.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-7273534903247921620</guid><pubDate>Sat, 15 Mar 2008 11:56:00 +0000</pubDate><atom:updated>2008-12-08T05:43:47.071-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Virus removal</category><category domain="http://www.blogger.com/atom/ns#">Windows XP</category><title>Show Hidden Files and Folder Not Working</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;For Past few days i have been battling with  viruses of various kinds, first it was Funny UST Scandel.avi now its another heck of a virus which starts printing &quot;++&quot; repeatedly when ever i tried to write in a text field and it also didn&#39;t allow me to see hidden files and folders. Well i have battled half way through, now i am atleast able to view hidden files and folders. It was Ravmon which was responsible for hidden files and folders.&lt;br /&gt;&lt;br /&gt;Symptoms of Ravmon&lt;br /&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;If you select the radio button “Show hidden files and folders”, and then press Ok. The changes would just disappear upon opening the dialog again.&lt;/li&gt;&lt;li&gt;Disabled Task manager.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;It was probably virus attack after which the Windows registry was not being updated properly. So here is what you need to do to restore it back. Try one of these method.&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Method 1&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Go to registry editor by running regedit in the run box.&lt;br /&gt;Go to this key:&lt;br /&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\&lt;br /&gt;Explorer\Advanced&lt;br /&gt;&lt;br /&gt;In the right hand area, double click hidden and change the value to 1.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Method 2:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If the first method does not works Please download our Smart Antivirus from here:&lt;br /&gt;&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;a href=&quot;http://technize.com/content/downloads/Smart_AV.exe&quot; onclick=&quot;javascript:pageTracker._trackPageview(&#39;/downloads/content/downloads/Smart_AV.exe&#39;);&quot;&gt;&lt;strong&gt;http://technize.com/2008/01/22/smart-anti-virus/&lt;/strong&gt;&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This antivirus, did restore my Windows settings to default and hence i was able to view my hidden files and folders.&lt;/p&gt;&lt;div&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Please spare a few moments from your precious time and tell about your experiences.&lt;/p&gt;</description><link>http://technochat.blogspot.com/2008/03/show-hidden-files-and-folder-not.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-6824108088504298786</guid><pubDate>Tue, 11 Mar 2008 03:11:00 +0000</pubDate><atom:updated>2008-12-11T00:20:21.561-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Virus removal</category><category domain="http://www.blogger.com/atom/ns#">Windows XP</category><title>Worm removal - Funny UST Scandal.avi.exe</title><description>One of the viruses which i have tackled off late is Funny UST SCandal.avi.exe&lt;br /&gt;&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuzYiIVarp-ZIJeggs0b_Gb8yGFItk00H0Sdim9CzSIAR5TQkQOfMQn_J0uVHxSXZ8HqcPac_zdYZfIya7OPhrEb9APY9XILKA1uFs5PcdgaDruLkeCJKAmRS8Nmrf8TZ04yULjwmXvxg/s1600-h/funny+scandal+icon.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuzYiIVarp-ZIJeggs0b_Gb8yGFItk00H0Sdim9CzSIAR5TQkQOfMQn_J0uVHxSXZ8HqcPac_zdYZfIya7OPhrEb9APY9XILKA1uFs5PcdgaDruLkeCJKAmRS8Nmrf8TZ04yULjwmXvxg/s200/funny+scandal+icon.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5180657993746193234&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Some of the Symptoms Of Funny UST SCandal.avi.exe are&lt;br /&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;A orange icon with image of a Foot.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Files missing, Not able to view hidden files.&lt;/li&gt;&lt;li&gt;Every time you click on My Computer opens a new instance of it.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Task Manager automatically disappearing after few seconds, not able to view process.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;System deadly slow&lt;/li&gt;&lt;li&gt;Installations not occurring.      &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;If your case can be matched with the conditions given above, in all probability, you’ve got the &lt;em&gt;Autoit.BD&lt;/em&gt; worm, better known by &lt;em&gt;Funny UST Scandal.avi.exe&lt;/em&gt;.  AVG, Norton, Avast! - all don’t detect the virus.&lt;/p&gt;This Virus replicates itself on the various disk partitions. So even if you have deleted it from C:\ or formated your PC it will still persist in some other partition leaving you in the same dilemma again. So one of the best ways to tackle this is.....&lt;br /&gt;&lt;p&gt;&lt;/p&gt;Steps to Follow in order to remove it&lt;br /&gt;&lt;ol&gt;&lt;ol&gt;&lt;li&gt;Download and install &lt;a href=&quot;http://www.rsdsoft.com/task_killer/index.php4&quot; target=&quot;_blank&quot;&gt;TaskKiller&lt;/a&gt;. TaskKiller forcefully kills the task and hence stops virus from replicating. Run Task Killer, and a red skull icon will appear on the system tray.Left click it, and click &lt;em&gt;Processes&lt;/em&gt; &lt;/li&gt;&lt;li&gt;Select to kill these processes - &lt;ul&gt;&lt;li&gt;killer.exe &lt;/li&gt;&lt;li&gt;lsass.exe &lt;/li&gt;&lt;li&gt;smss.exe &lt;/li&gt;&lt;/ul&gt; &lt;/li&gt;&lt;li&gt;Now open up Command Prompt (Start&gt;Run&gt;&lt;em&gt;command&lt;/em&gt;). Type each command and press &lt;em&gt;Enter&lt;/em&gt; to run it - &lt;ul&gt;&lt;li&gt;&lt;em&gt;cd\&lt;/em&gt; &lt;/li&gt;&lt;li&gt;&lt;em&gt;attrib -h -s smss.exe&lt;/em&gt; &lt;/li&gt;&lt;li&gt;&lt;em&gt;attrib -h -s autorun.inf        &lt;br /&gt;&lt;/em&gt; &lt;/li&gt;&lt;/ul&gt; &lt;/li&gt;&lt;li&gt;Open &lt;em&gt;My Computer&lt;/em&gt; and go to &quot;C:\&quot;,&lt;em&gt; then &quot;C:\Windows\&lt;/em&gt;System32&quot; and &quot;C:\Windows\System&quot;.&lt;/li&gt;&lt;li&gt;Delete the following files - &lt;ul&gt;&lt;li&gt;smss.exe &lt;/li&gt;&lt;li&gt;autorun.inf &lt;/li&gt;&lt;li&gt;Funny UST Scandal.avi.exe &lt;/li&gt;&lt;/ul&gt; &lt;/li&gt;&lt;li&gt;Now, go to &lt;em&gt;C:\Documents and Settings\All users\Startmenu\Programs\Startup&lt;/em&gt; and delete the file &lt;em&gt;lsass.exe.&lt;/em&gt; &lt;/li&gt;&lt;li&gt;Open Registry Editor (Start&gt;Run&gt;&lt;em&gt;regedit&lt;/em&gt;) &lt;/li&gt;&lt;li&gt;Delete the key &lt;em&gt;HKEY_LOCAL_MACHINE\Software\    &lt;br /&gt;Microsoft\WindowNT\CurrentVersion\&lt;/em&gt;Winlogon=shell(killer.exe &lt;/li&gt;&lt;li&gt;Delete the key  &lt;em&gt;HKEY_CURRENT_USER\Software\    &lt;br /&gt;Microsoft\windows\Currentversion\Run=runonce(c:\windows\smss.exe)&lt;/em&gt; &lt;/li&gt;&lt;li&gt;Check For the virus in the other root partitions and remove the                                     Funny UST Scandal.avi.exe&lt;/li&gt; &lt;/ol&gt;&lt;/ol&gt;If you want to read about other method&#39;s &lt;a href=&quot;http://funny-ust-scandal-avi-exe.blogspot.com/&quot;&gt;click here.&lt;/a&gt;&lt;br /&gt;    &lt;p&gt; &lt;/p&gt;</description><link>http://technochat.blogspot.com/2008/03/worm-removal-funny-ust-scandalaviexe.html</link><author>noreply@blogger.com (Angad Singh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuzYiIVarp-ZIJeggs0b_Gb8yGFItk00H0Sdim9CzSIAR5TQkQOfMQn_J0uVHxSXZ8HqcPac_zdYZfIya7OPhrEb9APY9XILKA1uFs5PcdgaDruLkeCJKAmRS8Nmrf8TZ04yULjwmXvxg/s72-c/funny+scandal+icon.jpg" height="72" width="72"/><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-1925430447882457813</guid><pubDate>Mon, 03 Mar 2008 16:50:00 +0000</pubDate><atom:updated>2008-12-11T00:20:21.874-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Web 2.0</category><title>Web 2.0 : Interactive Visualization, Social Networking</title><description>&lt;div  style=&quot;text-align: justify;font-family:georgia;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;We have entered the new era of Rich Internet Applications (RIAs), as more application on      Web 2.0 i see, more i belief it&#39;s going to be style and user power that will dominate the Internet in future.  I belief the endorsement of Web 2.0 is going to happen via RIAs.&lt;br /&gt;&lt;br /&gt;The &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;core value&lt;/span&gt;&lt;span style=&quot;font-style: italic;font-size:100%;&quot; &gt; &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;of RIAs is to develop Web Applications with users pleasant experience and interactive visualization. In comparision to old client-server technology which demanded high cost and lacked flexibility RIAs lowers the total cost significantly. RIAs also offer scalability, reliability, performance, and security on par with what they are used to with old client-server technology.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;&quot;&gt;Some of the Important Characteristics of Web 2.0  which will play a central role in its wide spread adoption are&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; &lt;b&gt;1. Ajax&lt;/b&gt;  &lt;/span&gt;&lt;/div&gt;&lt;div  style=&quot;text-align: justify;font-family:georgia;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;One ingredient of Web 2.0 is certainly Ajax, basically what &quot;Ajax&quot; means is that web-based applications can now be made to work much more like desktop ones.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;An Ajax application eliminates the start-stop-start-stop nature of interaction on the Web by introducing an intermediary — an Ajax engine — between the user and the server. It seems like adding a layer to the application would make it less responsive, but the opposite is true.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div  style=&quot;text-align: justify;font-family:georgia;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;2. Democracy&lt;br /&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The second big element of Web 2.0 is democracy.  &lt;a href=&quot;http://wikipedia.org/&quot;&gt;Wikipedia&lt;/a&gt; may be the most famous examples of democracy.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Generally when ever we try searching on a topic we end up looking for the relevant material on more than single site because it happens that the owner of single static blog or a &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;website is not able to cover the topic from all perspectives. With the coming up of Wikipedia this concept of shared workspace on web was first introduced, where any user could add on his or her valuable knowledge on a given topic. This  concept has  been a great success, now when ever we are looking for info on any topic our first destination happens to be Wikipedia.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Let us look at some of the existing applications based on Web 2.0&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;boxcontents&quot;  style=&quot;font-size:100%;&quot;&gt;Are you a real dance maniac then here&#39;s a  You Tube like site &lt;/span&gt;&lt;span class=&quot;boxcontents&quot;  style=&quot;font-size:100%;&quot;&gt;DanceJam&lt;/span&gt;&lt;span class=&quot;boxcontents&quot;  style=&quot;font-size:100%;&quot;&gt; . It is all about dance, an effort to create an online community around amateur dancers. At the site, people can upload their dance videos and share them, watch videos that others have uploaded, learn dance moves, and even take part in &quot;dance battles&quot;. This &lt;/span&gt;&lt;span class=&quot;boxcontents&quot;  style=&quot;font-size:100%;&quot;&gt;seems to be based on the Democracy characteristic of Web 2.0.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpT7k_XvzPXY2WfonebduI1fdzLxO2aEuNhFGm2rIBYgaS66UuaKjU5tK-zSrTeEEfWPgXZd1Ecvnc0MeWQwGwhjZdMWQuDvwaI7SxIYJsgdY0AmJcFfmdIao3_MvNBfVDKInmSolTw-Q/s1600-h/untitled3.bmp&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpT7k_XvzPXY2WfonebduI1fdzLxO2aEuNhFGm2rIBYgaS66UuaKjU5tK-zSrTeEEfWPgXZd1Ecvnc0MeWQwGwhjZdMWQuDvwaI7SxIYJsgdY0AmJcFfmdIao3_MvNBfVDKInmSolTw-Q/s200/untitled3.bmp&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5174543983937342658&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;boxcontents&quot;  style=&quot;font-size:100%;&quot;&gt;For visiting the site &lt;a href=&quot;http://dancejam.com/&quot;&gt;click here&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;boxcontents&quot;  style=&quot;font-size:100%;&quot;&gt;Here is a new another &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;interactive &lt;/span&gt;&lt;span class=&quot;boxcontents&quot;  style=&quot;font-size:100%;&quot;&gt;E-mail engine &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Webtop beta comes with a very familiar interface. It is a Web 2.0 application built with flash technology.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-zPCCIqYO4Ka4WwSMSJC_U-r52C2E8DnmHY90I-ykwfiZ56HhyVFa1E24z0smoQ7MYNgOePm864LTANmIMmzXppZaDv_FAXsMQuOvMJDjof1_7p0idQ7B8KcGYysKaWk4ageHGNLfJkE/s1600-h/untitled.bmp&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-zPCCIqYO4Ka4WwSMSJC_U-r52C2E8DnmHY90I-ykwfiZ56HhyVFa1E24z0smoQ7MYNgOePm864LTANmIMmzXppZaDv_FAXsMQuOvMJDjof1_7p0idQ7B8KcGYysKaWk4ageHGNLfJkE/s200/untitled.bmp&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5174556069975313618&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;boxcontents&quot;  style=&quot;font-size:100%;&quot;&gt;For visiting the site &lt;a href=&quot;http://gowebtop.com/webtop/&quot;&gt;click here&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Although it will take some time for wide spread adoption of the web 2.0 but eventually it will happen.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://technochat.blogspot.com/2008/03/web-20-interactive-visualization-social.html</link><author>noreply@blogger.com (Angad Singh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpT7k_XvzPXY2WfonebduI1fdzLxO2aEuNhFGm2rIBYgaS66UuaKjU5tK-zSrTeEEfWPgXZd1Ecvnc0MeWQwGwhjZdMWQuDvwaI7SxIYJsgdY0AmJcFfmdIao3_MvNBfVDKInmSolTw-Q/s72-c/untitled3.bmp" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-5605595790013276780</guid><pubDate>Wed, 27 Feb 2008 15:52:00 +0000</pubDate><atom:updated>2008-03-17T06:27:24.134-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows XP</category><title>Multiple Boot Removal Issue</title><description>&lt;span style=&quot;color: rgb(204, 0, 0);&quot;&gt;Do you have multiple boot of XP and other Operating System on PC, but want to remove anyone of them from start up login?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Steps To Follow.............................&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Right Click on My computer go to properties.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Go to Advanced Tab.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Then Startup and Recovery setting.&lt;/li&gt;&lt;li&gt;Under System Startup&gt; &quot;Edit Start up options manually&quot;.This will open Boot.ini file, you can now remove manually one of the boot up/Operating system options from the multiple boot. Boot file with mutiple boot will look something like this...........&lt;/li&gt;&lt;/ul&gt;[boot loader]&lt;br /&gt;timeout=30&lt;br /&gt;default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS&lt;br /&gt;[operating systems]&lt;br /&gt;multi(0)disk(0)rdisk(0)partition(2)\WINDOWS=&quot;Microsoft Windows XP Professional&quot; /noexecute=optin /fastdetect&lt;br /&gt;multi(0)disk(0)rdisk(0)partition(2)\WINDOWS=&quot;Microsoft Windows XP Professional-set up&quot; /noexecute=optin /fastdetect&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now in the above Boot.ini there are 2 boot options one is the Xp and other is a set setup of Xp this could have been any other operating system which ever is loaded. You just need to delete the option of operating system which you do not want to use any more or is invalid................&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;After removing the option of set up XP Boot .ini will look like.........&lt;br /&gt;&lt;br /&gt;[boot loader]&lt;br /&gt;timeout=30&lt;br /&gt;default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS&lt;br /&gt;[operating systems]&lt;br /&gt;multi(0)disk(0)rdisk(0)partition(2)\WINDOWS=&quot;Microsoft Windows XP Professional&quot; /noexecute=optin /fastdetect&lt;br /&gt;&lt;br /&gt;If you want to read More about it then &lt;a href=&quot;http://mirror.href.com/thestarman/asm/mbr/bootini.html&quot;&gt;clich here&lt;/a&gt;</description><link>http://technochat.blogspot.com/2008/02/multiple-boot-removal-issue.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-6997396218097255212</guid><pubDate>Mon, 25 Feb 2008 05:29:00 +0000</pubDate><atom:updated>2008-03-17T06:31:25.496-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">HD DVD vs Blue Ray</category><title>Microsoft Pulls Plug on HD DVD Players</title><description>Only thing which comes to mind when i think of this long Format War as rightly stated in science is &quot;Survival of the fittest&quot;. With Microsoft taking of its support from HD DVD it seems obvious that Format War is over now.&lt;br /&gt;&lt;br /&gt;Microsoft was one of HD DVD&#39;s main backers, along with Intel Corp. and Japanese electronics maker NEC Corp., and its support for the format was seen as a big win for Toshiba&#39;s format. But  HD DVD lost it&#39;s ground when big players such as Walt Disney, News Corp.&#39;s Twentieth Century Fox ,Warner Bros and Wal-Mart Stores. picked Blu-ray to distribute high-def DVDs. &lt;br /&gt;&lt;br /&gt;For now Microsoft would continue to provide standard warranty support for its HD DVD players.&lt;br /&gt;&lt;br /&gt;For reading More on Format War &lt;a href=&quot;http://technochat.blogspot.com/2008/01/hd-dvd-vs-blue-ray-war-over-blue-ray.html&quot;&gt;click here&lt;/a&gt;</description><link>http://technochat.blogspot.com/2008/02/microsoft-pulls-plug-on-hd-dvd-players.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-4096905664676764738</guid><pubDate>Sun, 24 Feb 2008 07:28:00 +0000</pubDate><atom:updated>2008-03-17T06:34:58.266-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><category domain="http://www.blogger.com/atom/ns#">Open Source</category><title>Open Source Goes Mainstream</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;This Question has been there for many year&#39;s now and most of the people will agree  on this, that Open Source Environment as the most disruptive force in technology. With chain of events happening over the past month it seems we are inching closer to it.&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;First Sun Microsystems Announces Agreement to Acquire MySQL, Developer of the World&#39;s Most Popular Open Source Database for approximately $1 billion. Follow this with news from Microsoft that it would provide access to documentation for its major software products, including Windows Vista, Office 2007 and Exchange Server 2007.&lt;br /&gt;&lt;br /&gt;Let&#39;s first take Suns move of acquiring MySQL.&lt;br /&gt;&lt;br /&gt;Called the largest open-source software deal ever, the merger makes Sun the owner of a critical part of the popular LAMP open-source software stack. It reaffirms Sun&#39;s position as the leading provider of platforms for the Web economy and its role as the largest commercial open source contributor.&lt;br /&gt;&lt;br /&gt;This acquisition accelerates Sun&#39;s position in enterprise IT to now include the $15 billion database market. Sun&#39;s strategic partners Facebook, Google, Nokia, and China Mobile will bring synergies that will change the landscape of the software industry and that will allow MySQL Open Source Database to grow more rapidly with its new adoptions in more traditional applications and enterprises. The complementary product with MySQL&#39;s database are expected to bring new markets for Sun&#39;s systems, virtualization, middleware and storage platforms.&lt;br /&gt;&lt;br /&gt;Sun has been involved in the development of the rival open-source database, PostgreSQL, this acquisition will raise some questions over its future . Although Sun for now shows commitment to reaffirm its commitment to PostgreSQL.&lt;br /&gt;&lt;br /&gt;Another important fact worth mentioning is that Oracle is as also one of the strategic partners of Sun for years. MySQL is one of the most competitive and threats to Oracle Corp., just because it&#39;s cheaper, and in many applications, more practical. What it means by bringing two rivals together is weakness of one would be used as a strength of other and bringing in fruitful results for both. Which means for lower-tier database applications, MySQL can offer the core functionality and with  the advanced features list Oracle could serve the needs as it continues to have the edge over MySQL in this field.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Let&#39;s Now take a look at Microsoft&#39;s interoperability promise&lt;br /&gt;&lt;br /&gt;It seems as an acknowledgment that Microsoft can&#39;t ignore the open-source community&#39;s impact on its business and prominence in the industry any longer.With its move to provide access to documentation for its major software products, including Windows Vista, Office 2007 and Exchange Server 2007, it could repair its tarnished reputation in the technology industry and help the company get out of its own way to compete more effectively with Google.&lt;br /&gt;&lt;br /&gt;Microsoft has been anti-Open Source for a long time but this sudden change in mood is certainly attributed to the growing trend and wide spreed adoption of Open Environment . Now what one can look forward from this move is an restrained access to Microsoft APIs and some interfering from Microsoft.&lt;br /&gt;&lt;br /&gt;Some of the restrictions one could expect to see are, one might require license or developer id from making any changes to Microsoft Products and these IDs would be offered at some suitable registering cost. Another restriction could be developers won&#39;t be allowed to share there changes openly, which means one has to first submit modified product to Microsoft which will then finally be offered to customers under the label of Microsoft.&lt;br /&gt;&lt;br /&gt;If one looks from the point of view of intellectual knowledge which the Microsoft&#39;s product will bring to open market these restrictions might seem worth to be under.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Moral of the Story is Open Source will rule the world one day.................&lt;/div&gt;</description><link>http://technochat.blogspot.com/2008/02/open-source-goes-mainstream.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-7047468857463392615</guid><pubDate>Sat, 16 Feb 2008 09:43:00 +0000</pubDate><atom:updated>2008-03-17T06:27:55.486-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Web 2.0</category><title>Issuu - Turn&#39;s PDF files into online books</title><description>&lt;p&gt;&lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;Issuu is a Web 2.0 service which can convert any PDF files to Flash based online books. &lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;img src=&quot;http://www.techsnack.net/wp-content/uploads/2008/02/issuu.jpg&quot; alt=&quot;Issuu&quot; align=&quot;left&quot; /&gt; Convert your documents into a compatible PDF format. Your PDF must be Version 1.0-1.5 , 100 mb max , 500 pages max and about 100 dpi resolution. When you upload a PDF to Issuu, you are asked to select &#39;Target area&#39; for better listing of your document in search results.&lt;br /&gt;&lt;/p&gt;&lt;p&gt; After Converting your document into a online format using Issuu you can view your document using a Flash player to open it in a neat magazine-style viewer format, you can also post (embed) your Issuu documents on any external site, profile or social networking websites such as MySpace, Facebook, Friendster, Blogger, and etc. Users are able to customize the viewer’s background color and the dimension.&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;The interesting feature is it enable user who doesn’t install PDF plugin to view the book.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;Readers can click the &lt;strong&gt;OPEN PUBLICATION&lt;/strong&gt; button to view the full-screen of the document.&lt;/p&gt;&lt;br /&gt;&lt;div&gt;&lt;embed src=&quot;http://static.issuu.com/webembed/viewers/style1/v1/IssuuViewer.swf&quot; type=&quot;application/x-shockwave-flash&quot; quality=&quot;high&quot; scale=&quot;noscale&quot; salign=&quot;l&quot; wmode=&quot;transparent&quot; flashvars=&quot;mode=preview&amp;amp;previewLayout=white&amp;amp;documentId=080207111428-b427509acc1a427f8ee196c03d06c894&amp;amp;backgroundColor=%23ffffff&amp;amp;layout=grey&quot; style=&quot;width: 425px; height: 204px;&quot; name=&quot;flashticker&quot; align=&quot;middle&quot;&gt;&lt;/embed&gt;&lt;div style=&quot;width: 425px; text-align: left;&quot;&gt;&lt;a href=&quot;http://issuu.com/&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;http://static.issuu.com/webembed/previewers/style1/v1/m1.gif&quot; ismap=&quot;ismap&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://issuu.com/viewer?mode=embed&amp;amp;documentId=080207111428-b427509acc1a427f8ee196c03d06c894&amp;amp;layout=grey&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;http://static.issuu.com/webembed/previewers/style1/v1/m2.gif&quot; ismap=&quot;ismap&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://issuu.com/embed/guide?documentId=080207111428-b427509acc1a427f8ee196c03d06c894&amp;amp;width=425&amp;amp;height=301&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;http://static.issuu.com/webembed/previewers/style1/v1/m3.gif&quot; ismap=&quot;ismap&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://technochat.blogspot.com/2008/02/issuu-turns-pdf-files-into-online-books.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-6749322927321255420</guid><pubDate>Wed, 06 Feb 2008 08:42:00 +0000</pubDate><atom:updated>2008-03-17T06:33:19.502-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><title>Microsoft Bids For Presidential Hold of Internet</title><description>&lt;div align=&quot;justify&quot;&gt;One of the biggest competition which everybody is looking forward these days is the Presidential elections of USA, another war of simila scale is going on between the Microsoft and Google over the supremacy of internet.&lt;br /&gt;&lt;br /&gt;Last week Microsoft a dominant player of desktop PCs showed its interest in acquiring the sinking ship of Yahoo by offering 31$ per share this has led to a mixed response from Internet fraternity. Google one of the prominent stake holders of internet has shown its concern over this issue. They believe the Microsoft will destroy the concept of openness of internet and innovation and will try to monopolize it.&lt;br /&gt;&lt;br /&gt;The potential impact of this Joint venture if it took place could be that, it will make Microsoft one of the major forces of Chatting and Mailing services. Well I have always seen Microsoft as one of the major trend setters in desktop market and Google as force to recon when it comes to internet, I think the competition between the two companies would definitely be fascinating and will be beneficial for the Internet Users and Bloggers as it might open more options to earn while we surf the net.&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;Do You think the same as i do on this issue? please post your opnion on this issue..................... &lt;/div&gt;</description><link>http://technochat.blogspot.com/2008/02/microsoft-bids-for-presidential-hold-of.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-4576074407583048404</guid><pubDate>Fri, 11 Jan 2008 19:37:00 +0000</pubDate><atom:updated>2008-01-11T12:52:59.271-08:00</atom:updated><title>Global Warming a New Challenge For Mr.Ratan Tata</title><description>As a Citizen of India i have some social responsibilities although this is a technical blog but i have decided to use it alongside as a stage to speak out on some social issues.Yesterday a new Tata car &quot;nano&quot; was launched this post is definitely not about its features and accessories, its about is it really what India wants?&lt;br /&gt;&lt;br /&gt;After every car launch we hear this phase &quot;Environment friendly&quot; but do you really think it  means what is said? well i don&#39;t think so as the number of cars are increasing the pollution is definitely  going to increase whether you say it is EURO 3 or EURO 4 compliant. We always see the impact of single car on environment but now with TATA launching Rs. 1 Lakh it will definitely mean more cars on roads and if you see the total combined effect of all the new cars on roads its effect will be devastating .&lt;br /&gt;&lt;br /&gt;These are the Euro norms&lt;br /&gt;&lt;br /&gt;&lt;table border=&quot;0&quot; width=&quot;100%&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Euro 1&lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Euro 2&lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Euro 3&lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Euro 4&lt;/span&gt;&lt;/td&gt;           &lt;/tr&gt;           &lt;tr&gt;             &lt;td&gt;&lt;br /&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;1992 &lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;1995&lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;2000&lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;2004&lt;/span&gt;&lt;/td&gt;           &lt;/tr&gt;           &lt;tr&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Nox &lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;8&lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;7&lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;5&gt;&lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;3&lt;/span&gt;&lt;/td&gt;           &lt;/tr&gt;           &lt;tr&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CO &lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;4.5&lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;4 &lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;2.5&lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;1&lt;/span&gt;&lt;/td&gt;           &lt;/tr&gt;           &lt;tr&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;HC &lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;1.1 &lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;1.1 &lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;0.7 &lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;0.5&lt;/span&gt;&lt;/td&gt;           &lt;/tr&gt;           &lt;tr&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;PM &lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;0.36 &lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;0.15 &lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;0.10&lt;/span&gt;&lt;/td&gt;             &lt;td&gt;&lt;span style=&quot;font-family:arial;&quot;&gt; &lt;0.10&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;Tata has expressed its desire to sell 2.5 lakh in next year or so now  if you analyze the combined effect of all these vehicles considering it to be EURO3 compliant it will contribute Nox: 1000 K units CO: 625K units HC :175 k PM: 225k . Now what do you think about these figures aren&#39;t these figures going to worsen the already choke environment? Isn&#39;t this going to trigger the extinction of Life on earth?&lt;br /&gt;&lt;br /&gt;Only solution what according to me is the best way to deal with this situation is  that their should be a check on the total number of vehicles  which a particular manufacturer could make and also phasing out the delivery of the cars, fixing the number of cars which could be sold in a particular area depending on the environment conditions of the area.&lt;br /&gt;&lt;br /&gt;Few days back i read a report from NASA which said Mumbai is one of the cities which will drown by 2012 due to the effects of global warming. I think one of the major contributors to pollutions are the use of private vehicles, with increase in purchasing power of people their is a growing trend of purchasing cars. This trend could only be stopped if the people are provided with an alternate public transport system which offers them some acceptable comfort level . I think its time to call in Private Public Participation in the Public transportation here i call Mr. Ratan Tata this  is a New Challenge for you.</description><link>http://technochat.blogspot.com/2008/01/global-warming-new-challenge-for.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-4111916244401306732</guid><pubDate>Sun, 06 Jan 2008 19:53:00 +0000</pubDate><atom:updated>2008-12-11T00:20:22.455-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Web 2.0</category><title>Flash web desktop Jooce</title><description>Jooce is something really amazing &lt;span style=&quot;font-size:-1;&quot;&gt;web desktop&lt;/span&gt;      i came across. have you ever heard about online operating system well although it doesn&#39;t exist now but this system made me belief that in near future this could be the next big thing coming our way.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5aM-hNQ2XCOBG54VL8Ax1E1Wu_fX7I-ULsMFxbAyVBNH6poDzwgyBaAfGHRKH5jY_ArGXfsd2Amvb1ZogQBTtZ0zdtlQm2_TuYvgM15IqPXYpn7dCE6jWm_GZvJC7bS79yuUpTi_CCs8/s1600-h/untitled2.bmp&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5aM-hNQ2XCOBG54VL8Ax1E1Wu_fX7I-ULsMFxbAyVBNH6poDzwgyBaAfGHRKH5jY_ArGXfsd2Amvb1ZogQBTtZ0zdtlQm2_TuYvgM15IqPXYpn7dCE6jWm_GZvJC7bS79yuUpTi_CCs8/s320/untitled2.bmp&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5152483367136443218&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Jooce is an &lt;span style=&quot;font-size:-1;&quot;&gt;web desktop&lt;/span&gt; which provides you with all the options of storing and organizing files. Not only this it provides something similar two 3d viewing.It also offers you to save in your contacts from Yahoo, Msn, and Aim . It also has a unique Control panel which helps you set wallpapers, effects, Avtar, and reset password.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOD6FG8Zyjg-yumNNcB7ci2WudBoo0seQEFD9NRFM3Xs2WBlSzr218xVki4hWHTlYYawxmFBRTVvmZbU7EQs9K4bMREMwa2tCfrp8k3CsxIlNIlivTB58T30bY_WQt17TUGQeK_WNbwVc/s1600-h/untitled3.bmp&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOD6FG8Zyjg-yumNNcB7ci2WudBoo0seQEFD9NRFM3Xs2WBlSzr218xVki4hWHTlYYawxmFBRTVvmZbU7EQs9K4bMREMwa2tCfrp8k3CsxIlNIlivTB58T30bY_WQt17TUGQeK_WNbwVc/s320/untitled3.bmp&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5152485355706301282&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Now coming to 3d part well you can switch over from your desktop to your friends desktop and during the switch over it shows something similar to what a 3d browser does. The main thing of importance is that you can easily share files among your contacts.This operating system is of use for users who are always traveling and may need any files in there PC back home to be at their place of reallocation.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkojXMcxPH-QP3ikkSfJkzH3_RHb5fpCCbKKxVNecTgKOcSAFOLCvz2KPSb3w9JUracgYxqWIy4DIo9LzjWJP_aPd_g14D5lP_WrKSNqOJroDJZFxVoc7ibfPopje8max_cS0HiGjZhpc/s1600-h/untitled5.bmp&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkojXMcxPH-QP3ikkSfJkzH3_RHb5fpCCbKKxVNecTgKOcSAFOLCvz2KPSb3w9JUracgYxqWIy4DIo9LzjWJP_aPd_g14D5lP_WrKSNqOJroDJZFxVoc7ibfPopje8max_cS0HiGjZhpc/s320/untitled5.bmp&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5152489311371180930&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This according to me, Jooce will add new dimensions to the way people like to store or share data. Please share in your opinion on this............................&lt;br /&gt;&lt;br /&gt;If you intend to read more about Jooce or want to experience it then here is the link&lt;br /&gt;&lt;br /&gt;http://www.jooce.com/</description><link>http://technochat.blogspot.com/2008/01/flash-file-system-explorer-jooce.html</link><author>noreply@blogger.com (Angad Singh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5aM-hNQ2XCOBG54VL8Ax1E1Wu_fX7I-ULsMFxbAyVBNH6poDzwgyBaAfGHRKH5jY_ArGXfsd2Amvb1ZogQBTtZ0zdtlQm2_TuYvgM15IqPXYpn7dCE6jWm_GZvJC7bS79yuUpTi_CCs8/s72-c/untitled2.bmp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-6520672541176919880</guid><pubDate>Sun, 06 Jan 2008 18:10:00 +0000</pubDate><atom:updated>2008-03-17T06:33:52.257-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Bloggers Tips and Tricks</category><title>Steps to Increase Traffic on Blog :RssHugger</title><description>As i am just 3 months old in blogging i am on the lookout to increase traffic on my blog.I have read many blogs many suggestions some say one has to have quality in posts and some believe you must be frequent in blogging, but as a new blogger what i realize after 3 months of working on the above said principles is that, these things can only come into picture when a blog is reachable to a larger audience. For that it means definitely there should be more websites which refer to your website and you must be frequent in giving out your opinion and appreciating other bloggers for there work.  &lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;So now to work on the new principle which i have suggested two questions which directly comes to my mind is that Firstly Is there anyone who would refer my site and help me in bringing my blog to an global exposure?? and secondly why would any body refer to my site ??.........well well now the answer to my first question I found after a lot of research and it lies in RssHugger.I found that many bloggers who are successful are opting for it to increase traffic.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.rsshugger.com/images/logo.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 196px; height: 69px;&quot; src=&quot;http://www.rsshugger.com/images/logo.png&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Now i would answer for Why? which is my second question. I have figure out that the principles that many blogs which I had read and followed were the answer. For this you need to have some quality posts and frequent posts. Now I would be submitting this review post link about RssHugers to RssHuggers which is one of the conditions laid by them, then they will review my blog and if my blog is good enough then my blog may get some more readers. RssHuggers also provide with another option that is instead of writing a review you can pay them $20.&lt;br /&gt;&lt;br /&gt;RssHugers is a new website that brings bloggers and readers together. Not only rsshuggers help in getting traffic, but it also provide value in building backlinks for search engine optimization. RSS Hugger is the conecpt from Collin LaHay an search engine optimizer, and internet marketer. A recent contest on shoemoney.com inspired Collin to develop this unique concept.&lt;br /&gt;&lt;br /&gt;There are already 577 RSS feeds from various blogs at the time of writing this post. If you want to add your blog, go to rsshugger.com, register and write a review about it. I have given out my opinion now let’s see how much traffic it sends!&lt;br /&gt;&lt;/div&gt;</description><link>http://technochat.blogspot.com/2008/01/stratagical-move-to-increase-traffic-on.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5697967050881972992.post-2928254475123628328</guid><pubDate>Sat, 05 Jan 2008 04:11:00 +0000</pubDate><atom:updated>2008-03-17T06:31:25.497-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">HD DVD vs Blue Ray</category><title>HD DVD vs Blue Ray war Over, Blue Ray ready to became a Standard</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;With the beginning of a New Year comes the good news for consumers, Blue Ray has taken another step towards victory, with it giving us the hope of ending the long battle between HD DVD of Toshiba and Blue Ray disk of Sony.&lt;br /&gt;&lt;br /&gt;Time Warner&#39;s Warner Bros. studio has stopped supporting the HD DVD format and will now work exclusively with Sony&#39;s Blu-ray.With this it seems likely that the balance has tipped permanently in favor of Sony.Warner Bros CEO Barry Meyer contend that the competing formats create confusion that is keeping either format from mass acceptance. But, they say Blu-ray has been the clear consumer winner so far and going with that format makes the most sense going forward.This is a good news for Hollywood, as it will end the confusion of consumers and will enable them to go with next-gen DVDs.&lt;br /&gt;&lt;br /&gt;Let me try to brief about the differences the two technologies&lt;br /&gt;&lt;br /&gt;Capacity&lt;br /&gt;&lt;table&gt;&lt;tbody&gt;&lt;tr&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;Blu-Ray &lt;/th&gt;&lt;th&gt;HDDVD&lt;/th&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;ROM single layer:&lt;/td&gt;  &lt;td&gt; 25GB&lt;/td&gt;&lt;td&gt;15GB &lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;ROM dual layer:&lt;/td&gt; &lt;td&gt;50GB&lt;/td&gt; &lt;td&gt;30GB&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;Highest test:&lt;/td&gt; &lt;td&gt;100GB&lt;/td&gt; &lt;td&gt;45GB&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Theoretical limit:&lt;/td&gt; &lt;td&gt;200GB&lt;/td&gt;                           &lt;td&gt;60GB&lt;/td&gt;&lt;/tr&gt; &lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;Cost&lt;br /&gt;&lt;br /&gt;The 0.65 aperture for HD DVD vs. 0.85 aperture for Blu-ray—thus also making the two pickups technically incompatible despite using lasers of the same type.Blue Ray is definitely costlier than HD DVDs as a special hard coating must also be applied to Blu-ray discs, so their surface is sufficiently resilient enough to protect the data a mere 0.1mm beneath. The added benefit of keeping the data layer closer to the surface, however, is more room for extra layers.&lt;br /&gt;&lt;br /&gt;I always believed that HD DVD was of no competition with Blue Ray , it was just a corporate fight between two old rivals Toshiba and Sony which i knew will end with the technology which has the potential to be a future technology. As things are getting computerized there will be always an ever increasing need for more storage space which clearly means one must support a technology which has the potential to expand to max which will definitely rate Blue Ray ahead.&lt;br /&gt;&lt;br /&gt;Another silent reason which caused this battle was that Blue Ray is developed in Java which lead the rival company Microsoft supporting HD DVD and even today it is still standing by it. Well Well i don&#39;t see Microsoft changing its view point by any means but still i believe as the other big corporate house are in favor of Blue Ray it will end soon with Blue Ray standing a WINNER !&lt;br /&gt;&lt;/div&gt;</description><link>http://technochat.blogspot.com/2008/01/hd-dvd-vs-blue-ray-war-over-blue-ray.html</link><author>noreply@blogger.com (Angad Singh)</author><thr:total>0</thr:total></item></channel></rss>