tag:blogger.com,1999:blog-275292382023-03-23T06:57:26.067-07:00New TechnologyGB Technologieshttp://www.blogger.com/profile/10873173056079722551noreply@blogger.comBlogger47125tag:blogger.com,1999:blog-27529238.post-1152707063027401062006-07-12T05:22:00.000-07:002007-03-11T19:14:03.056-07:00Watch TV over the internet using Skype!<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.19.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.15.jpg" border="0" alt="" /></a><br />Novac from Japan has come up with a software, which enables watching TV from a PC using the free <a href="http://onlytech.blogspot.com/2006/06/what-is-skype.html">Skype</a> video conferencing facility.<br /><br />So in order to make this functional, Skype and the Novac software needs to installed on a PC. The software comes with a USB analog tuner, which can be that is all that is required to watch TV on the internet.<br /><br />This Novac package comes for $85 and Skype is free.<br /><br />Using the Skype video-calls facility the TV can ping you over IM and you can instruct the TV to change channels as well.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1152631413655296362006-07-11T08:17:00.000-07:002006-07-12T20:54:42.393-07:00What is Sony VAIO UX180P?<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.18.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.14.jpg" border="0" alt="" /></a><br />Sony has released a device similar to a <a href="http://onlytech.blogspot.com/2006/05/origami-umpc.html">UMPC (Ultra Mobile PC)</a>, but sporting more processing power, higher resolution, integrated keyboard and EDGE. This device as seen in the picture above is the UX180P. It is priced at $1800, which is almost double the cost of a regular UMPC like the Samsung Q1.<br /><br />The best feature of the Sony UX180P like other UMPCs is easy mobility. In terms of mobility it can be compared to a <a href="http://onlytech.blogspot.com/2006/06/what-is-oqo-model-01.html">OQO</a> device, and can fit in a carry case like in the picture shown below.<br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/2.5.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/2.5.jpg" border="0" alt="" /></a><br />Microsoft has announced support of its upcoming <a href="http://onlytech.blogspot.com/2006/06/what-is-new-in-microsoft-longhorn-part.html">Vista</a> Operating system for the UX180P.<br /><br />Some of the hardware configurations of the UX180P includes 512MB RAM and Core Solo U1200. It has a nicely integrated QWERTY keyboard which slides smoothly in the background as shown below.<br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/3.2.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/3.2.jpg" border="0" alt="" /></a><br />The device comes pre-installed with Windows XP Professional and loads of adware and trialware, which eventually slow down the performance of the machine. Much of the drivers are available on the recovery disk and it is not very easy to install a fresh operating system and then to load the drivers separately.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1152557705156541422006-07-10T11:54:00.000-07:002007-03-05T01:58:38.183-08:00A multipurpose Bluetooth headset by BlueAnt<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.17.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.13.jpg" border="0" alt="" /></a><br />BlueAnt X5 Stereo <a href="http://onlytech.blogspot.com/2006/06/what-is-bluetooth.html">Bluetooth</a> Headset is a newly released high-tech yet multi-function set of head phones that is packed with a bunch of features that are able to stream clear stereo music from various devices with Bluetooth capabilities such as mobile phone, PDA, iPod, MP3 player as well as computer. <br /><br />It can also take calls over internet applications such as <a href="http://onlytech.blogspot.com/2006/06/what-is-skype.html">Skype</a> or MSN through VoIP technology. The Bluetooth Audio Streamer is capable of sending CD quality stereo music from one device to another through A2DP technology: Advanced Audio Distribution Profile. <br /><br />The x5 is capable of handling up to 10 devices within a range of 10 meters. The support for AVRCP Bluetooth profile allows remote control of Windows Media Player, Winamp, WinDVD and other compatible music applications. <br /><br />It has a 3.5mm line-in jack for your iPod or MP3 player and one touch redial/answer function for your mobile phone. Upon fully charged, X5 could last up to 12 hours of talk time and up to 200 hours of standby time. The battery is removable, you can power it up by using a mini USB connection which is actually for the detachable microphone. <br /><br />In summary, the BlueAnt X5 Stereo Bluetooth Headset is just a perfect gadget which covers most of the usage for any devices.Anonymousnoreply@blogger.com2tag:blogger.com,1999:blog-27529238.post-1152450448735736102006-07-09T06:06:00.000-07:002006-07-09T06:07:29.036-07:00Top 10 MP3 players under $100Following are MP3 players which offer the basic requirements and do not cost more than $100. <br /><br />All the devices listed below offer a minimum of 512 MB of storage and two or more of the following characteristics: good sound quality; a stylish, compact design; advanced features such as an FM radio or recording capabilities; and an impressive battery life.<br /><br /><strong>1. Samsung YEPP YP-MT6X (512MB)</strong><br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.16.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.12.jpg" border="0" alt="" /></a><br /><strong>The good:</strong> Superior AA battery life; solid sound quality; compact and durable; highly readable display for such a small player; FM radio; voice, radio, and line-in recording; next-track readout; MP3, DRM WMA, and OGG playback.<br /><strong>The bad:</strong> Too many operational instructions to remember; FM radio and voice recordings placed in random play queue; line-in encoding requires uncommon 2.5mm plug.<br /><strong>The bottom line:</strong> For a Windows user, the Samsung YEPP YP-MT6 is a superior choice to the Apple iPod Shuffle, thanks to its compact design, its good sound quality, and its many useful features and functions.<br /><br /><strong>2. Samsung YP-U2 (512MB) </strong><br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/2.4.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/2.4.jpg" border="0" alt="" /></a><br /><strong>The good:</strong> The affordable Samsung YP-U2 is a supercompact MP3 player with a convenient plug-in USB design; it includes an FM tuner, a voice recorder, subscription compatibility, a legible LCD, and an intuitive interface. Plus, it features an extensive set of equalizer and DSP sound settings. Sound quality is quite impressive, but there is a caveat.<br /><strong>The bad:</strong> The placement of the headphone jack is not that impressive. It has an average battery life, the subpar voice-recording quality, and the audible clicks when starting or stopping a song. Additionally, the Samsung YP-U2 does not ship with a lanyard or an armband, and it currently maxes out at 512MB.<br /><strong>The bottom line:</strong> Despite some minor issues, the simple but feature-friendly YP-U2 from Samsung will be a hot seller, thanks to a sweet price and great overall sound quality. It's a good choice for budget-minded users looking for their first MP3 player.<br /><br /><strong>3. Sony NW-E105 Network Walkman (512MB) </strong><br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/3.1.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/3.1.jpg" border="0" alt="" /></a><br /><strong>The good:</strong> Fantastic battery life; inexpensive; solid sound quality; gets really loud; innovative rocking faceplate controls.<br /><strong>The bad:</strong> No FM tuner or recording options; inelegant software; must use SonicStage app to transfer songs.<br /><strong>The bottom line:</strong> Budget-conscious music fans who want more than the Apple iPod Shuffle has to offer will be pleased with Sony's NW-E100 flash players.<br /><br /><strong>4. Cowon iAudio G2 (1GB) </strong><br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/4.2.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/4.1.jpg" border="0" alt="" /></a><br /><strong>The good:</strong> The Cowon iAudio G2 delivers great sound quality and sound-enhancement options, plays protected WMA files, and features line-in recording.<br /><strong>The bad:</strong> The Cowon iAudio G2 is a bit large for a flash-based player, lacks an FM tuner, and most notably, uses the slow USB 1.1 protocol for transfers. <br /><strong>The bottom line:</strong> The Cowon iAudio G2's terrific audio quality and ease of use overcome its lack of USB 2.0 connectivity.<br /><br /><strong>5. Creative MuVo TX FM (512MB) </strong><br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/5.0.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/5.0.jpg" border="0" alt="" /></a><br /><strong>The good:</strong> Cool design; USB 2.0; comes with armband and belt clip; great sound; easy to use.<br /><strong>The bad:</strong> Tiny screen; no USB extension cable. <br /><strong>The bottom line:</strong> Creative's MuVo TX FM is a great option for people who want a small, lightweight, and gymworthy player with a decent feature set.<br /><br /><strong>6. Creative Zen Nano Plus (512MB) </strong><br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/6.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/6.jpg" border="0" alt="" /></a><br /><strong>The good:</strong> Plenty of cool color options; ultracompact design; comes with a belt clip, a case, and an armband; impressive, but not great, sound and recording quality; supports DRM-protected songs; includes FM, voice, and line-in recording features.<br /><strong>The bad:</strong> Small LCD; no true playlist support.<br /><strong>The bottom line:</strong> This is feature-packed flash player and cheap device for the features it provides.<br /><br /><strong>7. iRiver T30 (512MB) </strong><br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/7.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/7.jpg" border="0" alt="" /></a><br /><strong>The good:</strong> Supports subscription WMA files; small and light; solid audio quality; voice and line-in recording.<br /><strong>The bad:</strong> No FM radio; occasional glitches in playing subscription downloads.<br /><strong>The bottom line:</strong> The T30 is a basic player by iRiver standards, but Janus support makes it an attractive flash-based device.<br /><br /><strong>8. MobiBlu DAH-1500i (512MB) </strong><br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/8.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/8.jpg" border="0" alt="" /></a><br /><strong>The good:</strong> The cute and stylish MobiBlu DAH-1500i features a user-friendly, ultra-tiny design; a bright OLED screen; and useful extras such as FM tuning and recording, voice recording, and SRS Wow sound effects. This MP3 player also works as a removable flash drive and is DRM compatible.<br /><strong>The bad:</strong> The MobiBlu DAH-1500i uses a nonstandard USB cable and has poor battery life.<br /><strong>The bottom line:</strong> It is a good device for people fond of tiny things.<br /><br /><strong>9. SanDisk Sansa m250 (2GB) </strong><br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/9.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/9.jpg" border="0" alt="" /></a><br /><strong>The good:</strong> Available in up to 4GB capacity; solid value; includes FM tuner and voice recorder; compatible with WMA DRM 10 (Janus) and Audible files; decent controllers; on-the-go playlists.<br /><strong>The bad:</strong> Bulky (but lightweight); no line-in recording; poorly backlit display; only one quality option for voice recording. <br /><strong>The bottom line:</strong> With its many features as well as its compatibility with audiobooks and subscription-based music, the SanDisk Sansa m200 series is an overall great value. <br /><br /><strong>10. MobiBlu B153 (512MB) </strong><br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/10.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/10.jpg" border="0" alt="" /></a><br /><strong>The good:</strong> The MobiBlu B153 offers unbeatable battery life as well as nifty features such as an FM radio, line-in recording, and SRS Wow sound effects. Podcast Ready software comes loaded on the device, allowing for automatic updating of subscribed podcasts from any Internet-connected computer.<br /><strong>The bad:</strong> The MobiBlu B153's design is bad, and navigation is strictly via folder trees, so there's no sorting by artist, album, genre, and so on. Also, the screen is small in relation to the device. <br /><strong>The bottom line:</strong> MobiBlu's B153 isn't the most stylish MP3 player on the block, but if you're looking for an ultra-long-lasting device with plenty of features, it may be just the ticket.<br /><br />Source - Reviews by CNETAnonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1152367367686769482006-07-08T07:00:00.000-07:002007-02-24T00:36:40.563-08:00In - car PC with GPS Navigator, DVD and more<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.15.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.11.jpg" border="0" alt="" /></a><br />Do you hate cables and chargers in your car?<br />If yes, this in-dash car PC from Prober Industries, called the “E319″, is for you. <br /><br />The device functions as an entertainment center and has a 6.5″ touch screen with 800×480 resolution with a 65 degree viewing angle. Speaking of angles, it can connect to backview camera using a CVBS video input port so you can see what’s behind when you are backing out of your garage.<br /><br />It can connect to the internet using GPRS networks and can be used as a cell phone over GSM networks. <br /><br />The car PC components aren’t that impressive but it should be good enough for playing your media files. It has a 20GB HD with 128 MB of RAM which connects to a 400MHz AMD AU1200 processor running Microsoft Windows CE 5.0.<br /><br />The specs on the GPS receiver isn’t all that clear but the navigation system supposedly can provide voice guidance and route planning.<br /><br />Besides all these, other features that are worth mentioning: AM/FM radio, DVD, VCD, CD, MP3 player. <br /><br />There are USB and headset ports in front and a stylus pen. <br /><br />The price is not given but Prober Industries is willing to share that info if you put in an order for 100 or more units.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1152190121119758732006-07-06T05:24:00.000-07:002006-07-06T11:54:07.540-07:00The 10 Most Destructive PC Viruses Of All TimeComputer viruses are like real-life viruses: When they're flying around infecting every PC (or person) in sight, they're scary. But after the fact...well, they're rather interesting, albeit in a gory kind of way. With this in mind, we present, in chronological order, the 10 most destructive viruses of all time. <br /><br /><strong>CIH (1998)</strong><br /><br /><em>Estimated Damage:</em> 20 to 80 million dollars worldwide, countless amounts of PC data destroyed<br /><br />Unleashed from Taiwan in June of 1998, CIH is recognized as one of the most dangerous and destructive viruses ever. The virus infected Windows 95, 98, and ME executable files and was able to remain resident in a PC's memory, where it continued to infect other executables. <br /><br />What made CIH so dangerous is that, shortly after activated, it would overwrite data on the host PC's hard drive, rendering it inoperable. It was also capable of overwriting the BIOS of the host, preventing boot-up. Because it infected executable files, CIH wound up being distributed by numerous software distributors, including a demo version of an Activision game named Sin. <br /><br />CIH is also known as the Chernobyl virus because the trigger date of certain strains of the virus coincides with the date of the Chernobyl nuclear reactor accident. The virus is not a serious threat today, thanks to increased awareness and the widespread migration to Windows 2000, XP, and NT, none of which are vulnerable to CIH. <br /><br /><strong>Melissa (1999)</strong><br /><br /><em>Estimated Damage:</em> 300 to 600 million dollars<br /><br />On Friday, March 26, 1999, W97M/Melissa became front-page news across the globe. Estimates have indicated that this Word macro script infected 15 to 20 percent of all business PCs. The virus spread so rapidly that Intel, Microsoft, and a number of other companies that used Outlook were forced to shut down their entire e-mail systems in order to contain the damage. <br /><br />The virus used Microsoft Outlook to e-mail itself to 50 names on a user's contact list. The e-mail message contained the sentence, "Here is that document you asked for...don't show anyone else. ;-)," with an attached Word document. Clicking open the .DOC file -- and thousands of unsuspecting users did so -- allowed the virus to infect the host and repeat the replication. Adding insult to injury, when activated, this virus modified users' Word documents with quotes from the animated TV show "The Simpsons." <br /><br /><strong>ILOVEYOU (2000)</strong><br /><br /><em>Estimated Damage</em>: 10 to 15 billion dollars<br /><br />Also known as Loveletter and The Love Bug, this was a Visual Basic script with an ingenious and irresistible hook: the promise of love. On May 3, 2000, the ILOVEYOU worm was first detected in Hong Kong. The bug was transmitted via e-mail with the subject line "ILOVEYOU" and an attachment, Love-Letter-For-You.TXT.vbs. Similar to Melissa, the virus mailed itself to all Microsoft Outlook contacts. <br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.14.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.10.jpg" border="0" alt="" /></a><br />The virus also took the liberty of overwriting music files, image files, and others with a copy of itself. More disturbingly, it searched out user IDs and passwords on infected machines and e-mailed them to its author. <br /><br />An interesting footnote: Because the Philippines had no laws against virus-writing at the time, the author of ILOVEYOU was not charged for this crime. <br /><br /><strong>Code Red (2001)</strong><br /><br /><em>Estimated Damage:</em> 2.6 billion dollars<br /><br />Code Red was a computer worm that was unleashed on network servers on July 13, 2001. It was a particularly virulent bug because of its target: computers running Microsoft's Internet Information Server (IIS) Web server. The worm was able to exploit a specific vulnerability in the IIS operating system. Ironically, Microsoft had released a patch addressing this hole in mid-June. <br /><br />Also known as Bady, Code Red was designed for maximum damage. Upon infection, the Web site controlled by the affected server would display the message, "HELLO! Welcome to http://www.worm.com! Hacked By Chinese!" Then the virus would actively seek other vulnerable servers and infect them. This would go on for approximately 20 days, and then it would launch denial of service attacks on certain IP addresses, including the White House Web server. In less than a week, this virus infected almost 400,000 servers, and it's estimated that one million total computers were infected.<br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/2.3.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/2.3.jpg" border="0" alt="" /></a><br /><strong>SQL Slammer (2003)</strong><br /><br /><em>Estimated Damage:</em> Because SQL Slammer erupted on a Saturday, the damage was low in dollars and cents. However, it hit 500,000 servers worldwide, and actually shut down South Korea's online capacity for 12 hours.<br /><br />SQL Slammer, also known as Sapphire, was launched on January 25, 2003. It was a doozy of a worm that had a noticeable negative impact upon global Internet traffic. Interestingly enough, it didn't seek out end users' PCs. Instead, the target was servers. The virus was a single-packet, 376-byte worm that generated random IP addresses and sent itself to those IP addresses. If the IP address was a computer running an unpatched copy of Microsoft's SQL Server Desktop Engine, that computer would immediately begin firing the virus off to random IP addresses as well. <br /><br />With this remarkably effective way of spreading, Slammer infected 75,000 computers in 10 minutes. The outrageously high amounts of traffic overloaded routers across the globe, which created higher demands on other routers, which shut them down, and so on. <br /><br /><strong>Blaster (2003)</strong><br /><br /><em>Estimated Damage:</em> 2 to 10 billion dollars, hundreds of thousands of infected PCs<br /><br />The summer of 2003 was a rough time for businesses running PCs. In rapid succession, IT professionals witnessed the unleashing of both the Blaster and Sobig worms. Blaster, also known as Lovsan or MSBlast, was the first to hit. The virus was detected on August 11 and spread rapidly, peaking in just two days. Transmitted via network and Internet traffic, this worm exploited a vulnerability in Windows 2000 and Windows XP, and when activated, presented the PC user with a menacing dialog box indicating that a system shutdown was imminent. <br /><br />Hidden in the code of MSBLAST.EXE -- the virus' executable " were these messages: "I just want to say LOVE YOU SAN!!" and "billy gates why do you make this possible? Stop making money and fix your software!!" <br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/3.0.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/3.0.jpg" border="0" alt="" /></a><br />The virus also contained code that would trigger a distributed denial of service attack on windowsupdate.com on April 15, but Blaster had already peaked and was mostly contained by then. <br /><br /><strong>Sobig.F (2003)</strong><br /><br /><em>Estimated Damage:</em> 5 to 10 billion dollars, over 1 million PCs infected<br /><br />The Sobig worm hit right on the heels of Blaster, making August 2003 a miserable month for corporate and home PC users. The most destructive variant was Sobig.F, which spread so rapidly on August 19 that it set a record (which would later be broken by MyDoom), generating over 1 million copies of itself in its first 24 hours. <br /><br />The virus infected host computers via innocuously named e-mail attachments such as application.pif and thank_you.pif. When activated, this worm transmitted itself to e-mail addresses discovered on a host of local file types. The end result was massive amounts of Internet traffic.<br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/4.1.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/4.0.jpg" border="0" alt="" /></a><br />On September 10, 2003, the virus deactivated itself and is no longer a threat. Microsoft has announced a $250,000 bounty for anyone who identifies Sobig.F's author, but to date, the perpetrator has not been caught. <br /><br /><strong>Bagle (2004)</strong><br /><br /><em>Estimated Damage:</em> Tens of millions of dollars...and counting<br /><br />Bagle, a classic but sophisticated worm, made its debut on January 18, 2004. The malicious code infected users' systems via the traditional mechanism -- an e-mail attachment -- and then scoured Windows files for e-mail addresses it could use to replicate itself. <br /><br />The real danger of Bagle (a.k.a. Beagle) and its 60 to 100 variants is that, when the worm infects a PC, it opens a back door to a TCP port that can be used by remote users and applications to access data -- financial, personal, anything -- on the infected system. According to an April 2005 TechWeb story, the worm is "usually credited with starting the malware-for-profit movement among hackers, who prior to the ground-breaking worm, typically were motivated by notoriety." <br /><br />The Bagle.B variant was designed to stop spreading after January 28, 2004, but numerous other variants of the virus continue to plague users to this day. <br /><br /><strong>MyDoom (2004)</strong><br /><br /><em>Estimated Damage:</em> At its peak, slowed global Internet performance by 10 percent and Web load times by up to 50 percent<br /><br />For a period of a few hours on January 26, 2004, the MyDoom shockwave could be felt around the world as this worm spread at an unprecedented rate across the Internet via e-mail. The worm, also known as Norvarg, spread itself in a particularly devious manner: It transmitted itself as an attachment in what appeared to be an e-mail error message containing the text "Mail Transaction Failed." Clicking on the attachment spammed the worm to e-mail addresses found in address books. MyDoom also attempted to spread via the shared folders of users' Kazaa peer-to-peer networking accounts. <br /><br />The replication was so successful that computer security experts have speculated that one in every 10 e-mail messages sent during the first hours of infection contained the virus. MyDoom was programmed to stop spreading after February 12, 2004. <br /><br /><strong>Sasser (2004)</strong><br /><br /><em>Estimated Damage:</em> Tens of millions of dollars<br /><br />Sasser began spreading on April 30, 2004, and was destructive enough to shut down the satellite communications for some French news agencies. It also resulted in the cancellation of several Delta airline flights and the shutdown of numerous companies' systems worldwide. <br /><br />Unlike most previous worms, Sasser was not transmitted via e-mail and required no user interaction to spread. Instead the worm exploited a security flaw in non-updated Windows 2000 and Windows XP systems. When successfully replicated, the worm would actively scan for other unprotected systems and transmit itself to them. Infected systems experienced repeated crashes and instability. <br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/5.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/5.jpg" border="0" alt="" /></a><br />Sasser was written by a 17-year-old German high school student, who released the virus on his 18th birthday. Because he wrote the code when he was a minor, a German court found him guilty of computer sabotage but gave him a suspended sentence. <br /><br />Source - Information WeekAnonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com1tag:blogger.com,1999:blog-27529238.post-1152101995326701742006-07-05T05:18:00.000-07:002006-07-05T05:19:55.823-07:00A T-Shirt with a live digital clock<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.13.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.9.jpg" border="0" alt="" /></a><br />Don’t mind being a walking clock yourself ? Or desperately looking for some attention ? Then dress-up for the occasion with the digital clock T-shirt. <br /><br />This amusing unisex T-shirt has 4 AAA batteries that are within a hidden, washable battery compartment. The batteries last from 12-36 hours depending on whether you are operating in the digital clock or stop-watch mode. The clock itself can be switched on/off through a small button located on the pack. <br /><br />It is highly likely you will catch a few stares wearing this T-shirt. It might also be a good idea to wear one when you want to get across a not-so-subtle message to people who never seem to get to places on time.<br /><br />It is available from latestbuy at $59.95 apiece. Buy only if you are looking for some pricey fun.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1152017724381750732006-07-04T05:49:00.000-07:002007-03-22T00:20:29.626-07:00An online free equivalent of Microsoft Visio<a href="http://photos1.blogger.com/blogger/1592/2689/1600/3.jpg"><img style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="http://photos1.blogger.com/blogger/1592/2689/400/3.jpg" border="0" /></a><br />Too many online software offerings seem to be challenging the Microsoft Office products these days. After online spreadsheet (equivalent of Excel) and notebook (equivalent of OneNote) by Google, Gliffy is offering an online diagramming tool, which is equivalent to Visio.<br /><br />Gliffy provides the following features:<br /><br />· Diagramming in your web browser without downloading additional software<br />· Similar to Visio, yet in your web browser<br />· Desktop application feel in a web-based diagramming solution<br />· Add collaborators to your work and watch it grow<br />· Link to published Gliffy drawings from your blog or wiki<br />· Create many types of diagrams like Flowcharts, UI wireframes, Floor plans, Network diagrams, any simple drawing or diagramAnonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1151942522178078002006-07-03T08:58:00.000-07:002007-03-19T08:29:47.060-07:00How to pick the right camera phone?<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.6.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.3.png" border="0" alt="" /></a><br />Most of us will agree that the usage of mobile phones is growing by the day. If the mobile phone can also double up as a camera, it can be used to take pictures and preserve any special occurrence during the time when we are not carrying our cameras. Hence picking up a right camera phone requires some amount of knowledge and awareness. We have done some research around it and following are the key points which needs to be considered when buying a camera phone.<br /><br />In simplest terms, there are 2 key factors for selecting a camera phone, picture quality and ease of transferring photos to a PC. <br /><br />The picture quality of a camera phone will not match the quality of the dedicated camera, but the higher end camera phones can take pictures which are good enough to be printed. <br /><br />If the camera phone is to be used for more than spur-of-the-moment shots, a minimum of 1.3-megapixel model would be required; these are common now in popular, mainstream phones like the LG VX8300 for Verizon. Two-megapixel camera phones like the Samsung MM-A800 for Sprint take photos that are good for printing and saving for posterity, but they're more expensive. The one 3MP camera phone in the U.S., the Nokia N80, doesn't take shots much better than the best 2MP phones, but it has a ton of other powerful features.<br /> <br />A few camera phones such as the Sony Ericsson W810i Walkman offer autofocus, but most are fixed focus, so the objects should be placed more than a few feet away for the best pictures. Sadly, camera-phone flashes are so weak that they reach only a few feet. In low-light situations, 3 to 6 feet is the sweet spot for camera-phone shots. <br /><br />Camera phones can also capture video. For capturing video with a camera phone, there are few phones that support 352-by-288, 15 frame-per-second (fps) video, such as the Samsung SGH-T809 for T-Mobile. Now, 15 fps isn't as good as a dedicated digital camera and nowhere near the quality of a real camcorder, but it will do in a pinch. Many camera phones record video at 176-by-144 or even 128-by-96, which is hardly archival quality. <br /><br />Having a camera on the phone is pretty useless if the pictures can’t get off it. For many low-end camera phones, the only option is picture-messaging shots to yourself, a friend, or to a picture-sharing or printing service. Unfortunately, that's often expensive, difficult, and clumsy. <br /><br />Most camera phones enable connectivity with a PC using USB, <a href="http://onlytech.blogspot.com/2006/06/what-is-bluetooth.html">Bluetooth</a>, Infrared or <a href="http://onlytech.blogspot.com/2006/06/what-is-firewire.html">Firewire</a> technologies. Generally any mode of connectivity which does not requires complex software installation and configuration should be just fine. Most USB and Bluetooth phones can communicate with a PC or laptop without much pain. The better way is to opt for a camera supporting the SD Memory card which can store the photos while in the mobile and the same card can be removed from the mobile phone and inserted in a PC or laptop for photo transfer.<br /><br />Pictures can also directly be printed from a camera phone to a growing range of printers, including the Epson PictureMate. Some phone supports PictBridge printing over a USB cable, like the LG LX550 Fusic for Sprint. Some phones can also send photos to printers over Bluetooth, but that's more difficult to set up than a USB connection.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1151761951867215612006-07-01T06:49:00.000-07:002006-07-03T00:04:36.893-07:00The World’s most expensive phone!<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.12.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.8.jpg" border="0" alt="" /></a><br />Welcome to the billionaires lounge – please, pull up a throne, light a Honduran cigar and marvel at what is unquestionably the most expensive phone in the world.<br /><br />We can just imagine its maker, Goldvish, sitting in a Genevan underground lair and drumming its fingers together mischievously while it dreamt up the €1-million (£690,000) ‘Piece Unique’.<br /><br />It must come bedecked with 100-carats of the finest grade diamonds, it chuckled, and be part of such an impossibly limited production line that it’ll make the Jules Rimet trophy seem common. <br /><br />As is befitting of a phone that makes Vertu’s Signature Platinum seem as exclusive as a Lion bar, little else is known about it – there’s apparently a secret compartment, but the specs won’t contain anything like a 10MP camera. It’s all about the bling.<br /><br />Goldvish has, though, announced more details about its lower end phones, which start from a pathetic €18,900 (£13,075). The ‘Illusion’ models will have a mere 18ct gold casing and sport Bluetooth, an FM radio, a 2MP camera and come bundled with a 2GB SD card.<br /><br />The collection will be available from a select number of jewellers across Europe from September.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1151670928595974532006-06-30T05:33:00.000-07:002006-08-10T00:32:55.240-07:00What is a BULLET-proof USB drive?<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.11.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.7.jpg" border="0" alt="" /></a><br />Pretec have made a flash drive called as i-Disk Bullet proof, which comes in sizes from 128 MB to 2 GB.<br /><br />It is claimed to be resistant from water, ice, fire and of course, bullet. No word of being grenade proof though.<br /><br />It can transfer data at the rate of 20 Mbps and has write speed of 12 Mbps.<br /><br />Some bloggers are planning to test the product for their claim of being bullet proof at their local rifle range.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1151498830918281242006-06-28T05:44:00.000-07:002006-06-29T10:23:14.716-07:00A cellphone in a wrist watch<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.10.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.6.jpg" border="0" alt="" /></a><br />The picture above shows a wrist watch, CEC GSM F88, which has features like built in mobile phone, color display, speaker phone for conferencing, and a 3-megapixel camera for video conferencing.<br /><br />It weighs just around 3.5 ounces or 100 grams and is available for around $1100.<br /><br />Other features of this product include a built-in microphone, voice dialing, 4 minutes of video recording, infrared connectivity, tools for scheduling and alarm clock. <br /><br />The number pad can be found on the straps and the product comes with pre-installed world cup games.<br /><br />Considering the size of the product, it has an amazing set of features and seems to be missing only a MP3 player and FM radio.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com2tag:blogger.com,1999:blog-27529238.post-1151325312732349702006-06-26T05:28:00.000-07:002006-06-26T05:39:03.920-07:00The first Windows Mobile 5.0 phones with 3G/W-CDMA released by HTC!<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.9.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.5.jpg" border="0" alt="" /></a><br />MTeoR (left) and TyTN are the new mobile phones released by HTC under its own brand name. MTeoR is the 3G smartphone version and TyTN is the Windows Mobile Pocket PC. <br /><br />Although HTC (High Tech Computer Corp) is an old timer in mobile phone manufacturing business, it used to manufacture mobile phones for other brands, rather than its own. HTC entered the PDA market with its popular O2 model PDAs. MTeoR and TyTN are the first phones to be released under the HTC brand name. <br /><br />With these phones, HTC claims to have made the first Windows Mobile 5.0 phones with 3G/W-CDMA.<br /><br />Both the models will start shipping in July 2006.<br /><br />Peter Chou, CEO of HTC Corp. said at the product launch: “We have a rich heritage of innovation and aim for our products to continue being the devices of choice on the Microsoft Windows Mobile platform. Our operator and OEM strategy remains key to this success, and we are committed to further strengthening our partner relationships by providing customised and differentiated offerings.” <br /> <br />The HTC MTeoR, the world’s first 3G Windows Mobile 5.0 Smartphone, is a stylish, slim-line, candy bar device. It may be small, just 112.4 x 49 x 14.8mm and weighing a mere 120g, but this neat device is a powerful and “smart” phone. The HTC MTeoR features Windows Mobile 5.0 Direct Push technology for immediate synchronization of email, calendar and notes plus document viewers for PDF, Word, Excel and PowerPoint. It’s the ideal choice for busy people on the road who only want to carry one small device. MTeoR has a 2.2” TFT LCD screen and a built-in 1.3 megapixel camera.<br /><br />Designed with easy messaging in mind, TyTN features Direct Push email technology available with Windows Mobile 5.0, internet browsing, synchronization with Microsoft Outlook Calendar, Contacts and email, and the ability to work on applications in the Microsoft Office suite such as Word, Excel, PowerPoint and viewing PDF documents. TyTN comes equipped with a 2.8” colour display with touch-screen. It also features a jog wheel for easy, one-hand operation. The image below shows the TyTN.<br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/2.1.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/2.1.jpg" border="0" alt="" /></a>Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1151154171807977122006-06-24T05:56:00.000-07:002007-03-04T03:58:46.166-08:00What is Skype?<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.4.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/320/1.1.png" border="0" alt="" /></a><br />Skype is an internet telephony provider, where users who have installed the Skype client on their computers can talk to each other free of charge using VoIP (Voice over IP). The Skype client is also available for free and the program can work across firewalls and NAT, thereby allowing anyone on the internet to talk to anyone else.<br /><br />Skype was developed by the founders of KaZaA and is currently owned by eBay.<br /><br />For communication with traditional phone systems, Skype has a paid service which allows a computer to dial and receive calls from traditional phones. In the paid service, voicemail is also supported.<br /><br />Skype maintains the users contact lists online supports video conferencing.<br />Skype is platform independent and can be installed on Windows, Mac and Linux. However, the functioning of Skype is not a roller-coaster ride with Linux and Mac. It works best with Windows. Skype also works with PocketPC.<br /><br />Since Skype uses a peer-to-peer model rather than the traditional client-server model, the infrastructure can scale up very easily without any need for major upgrades. Incidentally, it is rumored that Skype has to manage only the login servers and the entire routing is taken care of by the peers. As of this writing, 100 million plus customers are serviced by Skype.<br /><br />The unpopular part of Skype is the mechanism for call routing. Let’s say, UserA is trying to communicate with UserB. The call from UserA to UserB may happen directly or can be routed through another user, UserC. In this case, UserC becomes a ‘Supernode’ and is functioning as a router between UserA and UserB. This unduly penalizes UserC for being a part of the Skype network. Also, the software is a closed source software and proprietary. Hence no customizations or add-ons can be added by software developers.<br /><br />Although the product has not been reverse-engineered by independent developers, Skype is believed to have made good use of encryption technology in its product and the software codes are well-written.<br /><br />The average age of Skype subscribers is 29.7 years. About 46% of the subscribers are from Europe and 13% from China. These numbers are derived by SR Consulting, which reviewed some 4 million users profile of Skype.<br /><br />Skype client is very easy to set up. For people who have not set up a Skype client, here are the steps:<br /><br />1. Download the software. <br />2. Install the software. It automatically configures itself for your computer and network. <br />3. Register as a Skype user. <br />4. Get a headset for your computer. <br />5. Locate another Skype user. Searching tools make this easy. <br />6. Click on a Skype contact name. You can do this from a variety of places within the client application. <br />7. Talk free to people anywhere in the world.<br /> <br />The clarity of the call in Skype is amazingly clear and most people don’t appear to be talking from the other side of the world.<br /><br />Apart from making regular calls to Skype users, it also facilitates conference calls between a maximum of 5 users, file transfers and instant messaging.<br /><br />Netgear recently announced a Skype compatible phone. The phone removes the dependency of placing calls from the PC. Instead it connects directly to a WiFi router for connection. Similar products from other companies are also in the pipeline.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1151071077656163522006-06-23T06:55:00.000-07:002006-06-23T06:57:58.190-07:00What is Casio Exilim EX-Z70?<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.8.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.4.jpg" border="0" alt="" /></a><br />Casio has introduced a 7.2 megapixel camera called as Exilim EX-Z70. It will be available from early July 2007 in black color. The silver color model will be available from a month later than the black one.<br /><br />It is slightly smaller than the current version of the slim and stylish product series called as Exilim EX-Z60 with 2.5 inch LCD, 3x optical zoom and digital image stabilization.<br /><br />The weight of this digital camera is 118-grams and it will cost around $425. The Z60 is available at $249.<br /><br />Like the previous products in the series, the EX-Z70 will have the Easy Mode feature. This provides an easy 3-step settings mechanism for digital camera beginners. It is available with 3 easy menus for image size, flash and self timer.<br /><br />For those who are choosy about the looks of their camera, the EX-Z70 has smooth round edges, giving a very elegant look.<br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/2.0.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/2.0.jpg" border="0" alt="" /></a>Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1150896445525175552006-06-21T06:27:00.000-07:002006-06-21T06:27:27.520-07:00What is Ubuntu Linux?<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.2.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.0.png" border="0" alt="" /></a><br />Ubuntu is a Linux distribution for desktops and Servers. The current version is 6.06 LTS. It is distributed by Canonical Ltd.<br /><br />The current Ubuntu release supports PC (Intel x86), 64-bit PC (AMD64) and PowerPC (Apple iBook and Powerbook, G4 and G5) architectures.<br /><br />According to some estimates, it has some 16000 software built-in including word processors and spreadsheets from OpenOffice and Firefox. Also the server version has built-in web server, email server, database, file services and programming tools.<br /><br />Below is a screen shot of Ubuntu:<br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/2.1.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/2.png" border="0" alt="" /></a><br />The biggest user of this product is the Andalusian regional government in Spain which has hundreds of thousands of desktops running Ubuntu, according to Canonical’s Chief Operating Officer, Jane Silber.<br /><br />Canonical releases a new version of Ubuntu every six months with the latest updates. Earlier, support was provided for each version for 18 months, which Canonical has increased to 3 years for desktop and 5 years for server releases. This change is effective from the release 6.06 as of 1st Jun 2006. Hence the name LTS which stands for Long Term Support.<br /><br />There is almost no similarity between Windows and Ubuntu. Also the installation procedure is non-GUI and needs some Linux skills to handle. But once, Ubuntu is installed, the box is ready with the operating system and all the required software for productivity and fun.<br /><br />There is some good news for someone who has a Windows computer and would like to try Ubuntu. He can simply run Ubuntu from the CD without impacting his Windows OS or any of the applications. Also Ubuntu can be dual-booted with Windows.<br /><br /><strong>What is the cost of Ubuntu?</strong><br /><br />Since the meaning of the African word Ubuntu means ‘humanity towards others’, and also like most versions of Linux, Ubuntu is a free product. Ubuntu has a very friendly community of developers for online support. Canonical have lined up with some 200 partners who can also provide support for Ubuntu.<br /><br />Ubuntu is available for download and can fit in a single CD. This CD is referred to as a Live CD and can be used to run Ubuntu from a desktop without having to copy files to the hard disk.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1150814140128890152006-06-20T07:33:00.000-07:002006-10-03T17:45:26.583-07:00What is Wizxer WXP350?<a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.5.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/1.1.jpg" border="0" alt="" /></a><br />Here is a cool device which has functionalities like playing video and audio from a 30 GB hard disk with a display of 4 inches.<br /><br />Apart from playing audio and video, the device has a 1.3 megapixel camera built-in.<br /><br /><strong>So what does it provides in addition to my trusted iPod?</strong><br /><br />Other features like FM radio, car navigation using GPS, UMS, an ebook reader, VOIP capability, Wifi, Bluetooth and audio / video recording is also included. It can also be connected to a projector for presentations and also to TV sets.<br />The device runs on Windows CE, which enables tasks like surfing internet and accessing emails.<br /><br />The only components missing are the mobile phone and Windows Mobile 5.0. Hopefully, these components would be included in the next version of the product.<br /><br />The device is made by a Korean company called as Wizxer.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1150738979423717292006-06-19T10:41:00.000-07:002006-06-19T17:58:05.873-07:00What is Hybrid Hard Drive?<a href="http://photos1.blogger.com/blogger/1592/2689/1600/7280743542918386.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;" src="http://photos1.blogger.com/blogger/1592/2689/400/7280743542918386.jpg" border="0" alt="" /></a>How about a computer which can boot up almost 30 seconds faster, and a laptop which can last on battery for 45 min more than the usual battery time? By combining traditional rotating magnetic storage with flash memory, Samsung plans to create hard drives called as hybrid hard drive.<br /><br />So in short, Hybrid Hard Drive = Traditional Disk + Flash memory<br /><br />"These kind of drives have the best of both worlds and this could be a great drive for consumers wanting to use their PCs for entertainment," said Nicole d'Onofrio, an analyst at research firm Current Analysis. "I estimate we'll see other manufacturers with hybrids by the end of this year or beginning of 2007." <br /><br />The idea is to use the larger storage capacity of traditional drives and use the speed and reliability of the flash memory combined with power efficiency into a single unit.<br /><br />The hybrid hard drive contains a 1Gb flash memory chip from Samsung's OneNAND family. Incoming data is directly recorded to the chip. When the chip is about full, the hard drive wakes up, takes the data, records it and goes back into idle. This is the reason for laptops consuming less power since hard disk rotation is one of the key consumers of power. In HHD, the hard disk rarely spins and hence the laptop is estimated to stay longer on batteries.<br /><br />Also the applications are stores in the flash memory enabling faster boot-ups.<br />This product will be compatible with the upcoming Microsoft Vista Operating System.<br /><br />"Hybrid hard disks and Windows ReadyDrive Technology are integrated advancements that improve the performance and reliability of computers using Windows Vista, especially notebook computers," said Mike Sievert, Microsoft's corporate vice president in the Windows Client Marketing division, in a statement. <br /><br />People have mixed opinions about Hybrid Hard drives. The earlier comment which was from Nicole d’Onofrio sounded like a favorable one. Following are some non-favorable ones from Gartner.<br /><br />Joseph Unsworth, a principal analyst at Gartner, was of the opinion that Intel’s Robson will be a better market-puller than Samsung’s HDD "Robson offers flash right on the chipset," he said. "We're going to see a lot of notebooks with Robson, and you don't need Vista to run it." He said he expects Robson to be out in first quarter of 2007. <br /><br />Gartner analyst John Monroe downplayed the value of the Samsung HHD technology. "There is nothing new in having cache on a hard drive -- it's been done for years," he said. "The basic difference here is that it is bigger and nonvolatile. The main reason you would need it is because Vista takes so long to boot." <br /><br />With mobile devices, it might have some value, he said. "But probably not with desktop machines, which are often left on."Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1150465798283328712006-06-16T06:49:00.000-07:002006-06-16T07:09:33.696-07:00What is Diskpart.exe in Microsoft Windows?<p>Ever ran out of disk space on a particular partition / volume with ample of free space in the server? If yes, the only options are to either backup the data, break partitions, and recreate them again with more appropriate size, or to figure out ways in which the existing partition which is running out of space can be extended. There have been non-Microsoft tools available in the market to extend the partition. A similar tool from Microsoft was much desired for uniformity of the tools by a single manufacturer.<br /><br />Diskpart.exe is a tool introduced by Microsoft, to extend the data volumes in Windows 2000, Windows XP and Windows 2003.<br /><br />It is a command line utility to extend the existing partitions by using the unallocated space displayed in Disk Management.<br /><br />Diskpart.exe can be used to extend both Basic as well as Dynamic partitions. When extending a NTFS partition, Microsoft recommends to perform the action in Safe Mode or Active Directory Restore Mode in order to prevent the open handles to the drive from causing to fail the process.<br /><br />There are some requirements for extending the partitions by using the Diskpart.exe utility with the ‘extend’ command:<br /><br />• The volume must be formatted with the NTFS file system.<br /><br />• For Basic volumes, the unallocated space for the extension must be the next contiguous space on the same disk. For example, consider F: needs to be extended and there are 3 Hard Disks on the server. F: is on the second disk and the unallocated free space is on the third disk. This does not satisfies the condition for running the Diskpart utility with the extend command. Also if the F: and the unallocated space are in the same drive, but there is another partition created in between them, does not meet the requirement.<br /><br />• For Dynamic Volumes, the unallocated space can be any empty space on any Dynamic disk on the system.<br /><br />• Only the extension of data volumes is supported. System or boot volumes may be blocked from being extended, and you may receive the following error:<br />Diskpart failed to extend the volume. Please make sure the volume is valid for extending<br /><br />• You cannot extend the partition if the system page file is located on the partition. Move the page file to a partition that you do not wish to extend.<br /><br />Following are the steps to extend the partition using Diskpart:<br /><br />1. At a command prompt, type diskpart.exe.<br /><br />2. Type list volume to display the existing volumes on the computer.<br /><br />3. Type Select volume volume number where volume number is number of the volume that you want to extend.<br /><br />4. Type extend [size=n] [disk=n] [noerr] . The following describes the parameters:<br /><br />size=n<br /><br />The space, in megabytes (MB), to add to the current partition. If you do not specify a size, the disk is extended to take up all of the next contiguous unallocated space.<br /><br />disk=n<br /><br />The dynamic disk on which to extend the volume. Space equal to size=n is allocated on the disk. If no disk is specified, the volume is extended on the current disk.<br /><br />noerr<br /><br />For scripting only. When an error is thrown, this parameter specifies that Diskpart continue to process commands as if the error did not occur. Without the noerr parameter, an error causes Diskpart to quit with an error code.<br /><br />5. Type exit to quit Diskpart.exe.<br /><br />Diskpart will notify about the successful completion of the command and the space will be added to the existing partition.<br /><br />There is a special condition when extending a Simple Volume on a Dynamic Disk in Windows 2000 and Windows XP. If the volume was created originally in the Basic Disk and then the disk was upgraded to a Dynamic disk, the volume cannot be extended. However, if the disk was already Dynamic when the volume was created, then Diskpart can be run successfully. The above condition applies only to Simple Volumes and not the Striped Sets and the rest. This condition was removed from Windows 2003 and does not apply in its case.<br /><br />Diskpart comes built-in with Windows 2003 and Windows XP. However, for Windows 2000, the utility needs to be downloaded from Microsoft’s web site.<br /><br />Diskpart can also be used to perform other disk related tasks like adding disks to or breaking a mirror, making a particular partition active, assign drive letters to partitions, converting basic disks to dynamic and empty dynamic disks to basic and more.</p>Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1150290751868394262006-06-14T06:12:00.000-07:002006-06-14T06:14:33.296-07:00What is new in Microsoft Longhorn? – Part 2 of 2Continued from <a href="http://onlytech.blogspot.com/2006/06/what-is-new-in-microsoft-longhorn-part.html">‘What is new in Microsoft Longhorn? – Part 1 of 2'</a><br /><br />New features in Microsoft Longhorn (Continued) are:<br /><br />11) Microsoft will introduce <strong>‘Network Access Protection’ or NAP</strong> in Longhorn. The idea behind NAP is to identify and isolate virus-infected or ‘unhealthy computers’ from the network. NAP works in conjunction with DHCP and VPN. One of the common nuisance which will be avoided from NAP is from a visitors laptop connecting to the corporate network. If the visitors laptop is infected or unhealthy, it will automatically be detected and removed from the network. This provides the facility for the visitor to use the corporate network and the IT Administrator the facility to allow the visitor access to the corporate network without worrying about the viruses coming in from his machine.<br /><br />12) In Windows 2003, there was an option to <strong>disable</strong> the <strong>USB</strong>. However, this option was not intelligent enough to differentiate between a USB storage device from a USB mouse. Most administrators wanted USB to be disabled so that users cannot copy data and take it out with them. However, with the existing technology, if the administrators took a hard call and did disable USB, they were left with no other option but to go in for other non-USB devices like a PS2 mouse. In Longhorn, the Group Policy will provide options to disable different device types connecting to USB, thereby providing the administrators to manage security as well as provide non-risky USB privileges to the users. Also XML files are set to replace the ADM for managing the templates used by Group Policy.<br /><br />13) Microsoft will introduce a successor to Remote Installation Services (RIS) in Longhorn called as <strong>Windows Deployment Services (WDS)</strong>. The data available till this writing mentions that WDS will support the Windows Imaging Format (WIM).<br /><br />14) Microsoft will introduce <strong>ClickOnce</strong> in Longhorn. This will allow for applications and programs to be installed on the computers by providing a single. This will make life simpler for the end user and in combination with software distribution mechanisms like SMS, will also help facilitate licensing compliance.<br /><br />15) Error messages will be replaced by Task Dialogs in Longhorn. Task Dialogs will contain troubleshooting information and links in addition to the error message, thereby empowering non-technical users, to perform some basic level of troubleshooting before approaching for help.<br /><br />16) <strong>Peer Name Resolution Protocol (PNRP)</strong> is like a poor man's DNS in that it allows hosts to discover one another. This will be especially useful for a small company not intending to use DNS but still would prefer some amount of name resolution. PNRP uses the Winsock 2 Namespace Provider API. Apparently PNPR only works on IPv6. Could be used for applications to find and connect with each other.<br /><br />17) Microsoft had improved the event logging in Windows 2003, by providing more details for the problem and in some cases also providing the resolution steps. According to Microsoft, this improvement is still better in Longhorn.<br /><br />18) Using any current imaging technology, if an existing machine needs to be re-installed by using OS imaging, it is well understood that the data will have to be backed up and restored. This means, the time taken to backup and restore the data adds up to the lost productivity time of the user. Using the XImage feature in Longhorn, Windows Vista images can be deployed on machines without losing files.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1150215707530058512006-06-13T09:20:00.000-07:002006-06-24T17:22:11.046-07:00What is GSM technology for mobile phones?GSM stands for Global System for Mobile Communications. It was a digital standard first offered commercially in 1991. It is used to send and receive phone calls and is currently the most popular mobile phone transmission technology globally.<br /><br />The GSM standard uses TDMA digital technology, which allows for three different voice calls to be placed in the same time slot, rather than one call using the old analog "cell" phones. This is possible through digital compression that GSM then builds upon with the addition of encryption. A GSM phone takes up the same amount of transmission space as the old technology, but has the additional benefit of added security.<br /><br />GSM phones work with SIM cards or ‘Subscriber Identification Module’. This is a small card with a built-in chip which is fitted in the back of the phone. The SIM card is the heart of the GSM phone, since it enables the phone to communicate with the service provider. SIM cards are provided by the service providers and can also store contact information and SMS messages. SIM cards provides the additional benefit of changing handsets without changing the phone number or losing out on SMS and contacts.<br /><br />GSM technology is also responsible for the popularity of SMS messages in Asia and Europe.<br /><br />GSM got a boost in the US due to Cingular Wireless becoming America’s largest mobile provider, choosing to adopt GSM technology.<br /><br />Using a GSM phone is highly recommended for someone traveling abroad, since it is a widely used technology and it is very easy to get a local SIM card of the visiting country and ‘Go Mobile’.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com2tag:blogger.com,1999:blog-27529238.post-1150127426359213492006-06-12T08:50:00.000-07:002006-08-09T10:58:03.810-07:00What is new in Microsoft Longhorn? – Part 1 of 2Longhorn is the code-named for the upcoming version of Microsoft Windows.<br /><br />When we write of new features in Longhorn, we mean the new features in Microsoft Windows Vista (Desktop version) as well as Microsoft Windows Server 2007 (Server version).<br /><br />Following are the new features in Microsoft Longhorn:<br /><br />1) Longhorn has a new feature called <strong>Server Manager</strong> that lets administrators configure servers with only the components they need for specific tasks, such as file servicing, Web serving, DNS or DHCP. Server Manager includes 17 roles.<br /><br />2) Longhorn will include a component called as <strong>Windows Hardware Error Architecture (WHEA)</strong>. According to Microsoft, WHEA lets users manage potential error sources such as processor, memory, cache and I/O bus. Hardware vendors will stipulate certain attributes to be managed on each hardware component. WHEA will not cover such components as fans and will not support PCI Express in the first version of Longhorn.<br /><br />3) Longhorn will include the <strong>BitLocker</strong> technology, which is used to prevent malicious software or users from executing a boot sequence that is different than what is stored in BitLocker.<br /><br />4) Active Directory Federation Services (<strong>ADFS</strong>) was introduced in Windows 2003 R2. In Longhorn, Digital Rights Management (<strong><a href="http://onlytech.blogspot.com/2006/05/what-is-drm.html">DRM</a></strong>) functionality will be added to ADFS, making it more secure.<br /><br />5) Longhorn will have exciting graphics which will clearly differentiate its interface from Windows XP or Windows 2000. It achieves this with the use of a high end user interface called <strong>Aero Glass</strong> which provides stunning animations, vector graphics-based icons and screen elements, and translucencies. The beauty is, depending on the hardware configuration of the machine, Longhorn will auto-configure the machine to provide Aero Glass. If Longhorn finds the machine not-so-suitable to run Aero Glass, it will be auto-configured to run a scale down user interface called as <strong>Aero Express</strong>. This will be an Aero Glass type interface with XP style graphics.<br /><br />6) In order to prevent the users on the client computers to be a member of the Local Administrators group, Microsoft will be introducing a concept called <strong>‘Least Privileged User Account’</strong>. This is basically a secure code compartment in which most application code will typically run, something like the ‘Local System’ account under which the Services in Windows currently run. When trusted applications need administrator-level access, they can temporarily run in Protected User mode. It is an optional feature and administrators can continue working in the same old way if they choose to.<br /><br />7) Microsoft aims to further reduce the number of events which require a reboot in Longhorn. The aim is to reduce the number of reboots required in Longhorn by 70% as compared to Windows XP or Windows 2003. Microsoft also plans to incorporate a concept called <strong>‘hot patching’</strong> which can update the kernel level drivers with the newly released patches and still would not require a reboot. As a disclaimer, there will still be some patches which will require the machine to be rebooted post-installation.<br /><br />8) Longhorn will provide built-in protection against <strong>spyware</strong> and <strong>viruses</strong>. Also the administrators would be able to centrally control the anti-virus and anti-spyware features for organization wide uniformity.<br /><br />9) Longhorn introduces a concept of <strong>Virtual Folders</strong>. The easiest way to understand a virtual folder is to compare it with a saved query in a search box. For example, if there are 20 files in the computer with words MCSE anywhere in it, and a Virtual Folder called as MCSE is created. Each time a new file is added to the computer with the content of MCSE or an existing file is removed, the contents of the virtual folder MCSE will be updates. The Virtual Folder will be displayed in blue color as compared to yellow of the regular folders.<br /><br />10) Longhorn is also back to the Windows NT 4.0 concept of Backup Domain Controllers (BDCs). Only this time they are called <strong>Read-Only Domain Controllers (RODC)</strong>. According to Microsoft, RODCs are better for branch office situations where the security and IT skill set will not be at par with the central office. RODC will have Universal Group Caching on by default.<br /><br /><span style="color:#ff0000;">Part 2 of this document is available </span><a href="http://onlytech.blogspot.com/2006/06/what-is-new-in-microsoft-l_115029075186839426.html"><span style="color:#ff0000;">here</span></a><span style="color:#ff0000;">.</span>Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1149880757658972702006-06-09T12:18:00.000-07:002006-06-09T12:19:17.840-07:00A letter from Eric Schmidt, CEO, GoogleFreedom of access to information on the Internet is a topic that we believe is of great interest and importance to Inside AdSense readers. Our CEO Eric Schmidt has written a letter to you, our publishers, on the subject of "net neutrality" -- read below for the full text: <br /><br />Dear AdSense Publisher,<br /><br />There's a debate heating up in Washington, DC on something called "net neutrality" – and the outcome of this debate may very well impact your business. Therefore, we are taking the unprecedented steps of calling your attention to this looming crisis and asking you to get involved. <br /><br />Sometime in the next few days, the House of Representatives is going to vote on a bill that would fundamentally alter the Internet. That bill would give the big phone and cable companies the power to choose what you will be able to see and do on the Internet. <br /><br />Today the Internet is an information highway where anybody – no matter how large or small, how traditional or unconventional – has equal access to everyone else. On the Internet, a business doesn't need the network's permission to communicate with a customer or deploy an innovative new service. But the phone and cable monopolies, who control almost all broadband Internet access, want the power to choose who gets onto the high-speed lanes and whose content gets seen first and fastest. They want to build tollbooths to block the on-ramps for those whom they don't want to compete with and who can't pay this new Internet tax. Money and monopoly, not ideas and independence, will be the currency of their Internet. <br /><br />Under the proposed "pay-to-play" system, small- and medium-sized businesses will be placed at an automatic disadvantage to their larger competitors. Those who cannot afford the new Internet tax – or who want to compete directly with the phone and cable companies – will be marginalized by slower Internet access that will inevitably make their sites less accessible, and therefore less appealing. <br /><br />Creativity, innovation and a free and open marketplace are all at stake in this fight. Imagine an Internet in which your access to customers is constrained by your ability to cut a deal with the carriers. Please call your representative in Congress at 202-224-3121. For more information on the issue, and more ways to make your voice be heard, visit www.ItsOurNet.org. <br /><br />Thank you for your time, your concern and your support.<br /><br />Eric Schmidt <br />CEO of Google Inc.<br /><br />P.S. -- If you are unsure of who represents you in Congress, you can look them up by zip code at http://www.house.gov. And if you would like to stay informed about this issue, and other policy issues affecting Google, you can opt-in to our policy mailing list at http://groups-beta.google.com/group/googlepolicy/subscribe (powered by Google Groups).<br /><br />Source: <a href="http://adsense.blogspot.com/2006/06/letter-from-eric-schmidt-ceo.html">Adsense</a>Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1149832799814823692006-06-08T22:53:00.000-07:002006-06-08T23:00:08.403-07:00What’s new in Microsoft Exchange 12 / Microsoft Exchange 2007?Following are the new features / improvements in Exchange 2007:<br /><br />1) Exchange 2007 will be available only in 64-bit version. The objective behind this move according to Microsoft is that messaging has become mission critical application for most organizations, and complexities in terms of email usage through multiple clients, security considerations using multiple security groups and <a href="http://onlytech.blogspot.com/2006/05/ipsec.html">IPSec</a> has pushed the servers at the extreme end of hardware capacity which can be supported on a 32-bit architecture. Hence the result for most organizations is, increase in the number of Exchange servers which add up to cost and manageability issues. Hence, if there is only a 64-bit version available, the companies could consolidate their servers and save on cost and benefit from lesser complexity. Exchange 2007 with run on x64 and not on Itanium (IA 64). Exchange 2007 will run on 64-bit versions of Windows 2003 Server or Windows 2003 R2 server.<br /><br />2) The Unified Messaging feature of Exchange 2007 is a mind-boggling one. It provides the feature to combine email, phone (voicemails) and fax in a single system. For example, the voicemails and fax will now be delivered directly to the users mailbox. It will also save costs for companies by preventing them from maintaining three separate systems. What great flexibility will this provide for users who are mobile and can now check on their smart phones about a fax received in the office!<br /><br />3) Another great feature is Outlook Voice Access (OVA). Using our traditional phone systems, we can call into the voicemail systems and retrieve or delete our voice mails. With a voicemail system integrated with Exchange 2007, not only will the voice mails be accessible, but the mails and calendar entries will also be read out by the voicemail system. This means that if you are traveling, and running out of battery of your laptop and want to check on a few mails, all you need to do is call up the voicemail system and ask it to read the mails out for you. You can also reply, forward or delete mails.<br /><br />4) If a mailbox has to be moved from one Exchange server to another, in the current version the users Outlook session will have to be terminated. However, in Exchange 2007, the mailbox move between servers is absolutely transparent to the user and his Outlook will keep functioning as ever. This will help the IT department to quickly move the mailboxes if a particular Exchange server needs to be taken offline for unplanned maintenance. They can undertake this activity any time during the day without bothering to inform the users.<br /><br />5) Exchange 2007 comes with a UNIX style command-line management shell called as ‘Monad’. This command line interface provides an ultimate management experience and allows the administrator to perform everything using the command line or scripts which could traditionally only be done using GUI. Refer to the picture below<br /><br /><p><a href="http://photos1.blogger.com/blogger/1592/2689/1600/2.0.png"><img style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="http://photos1.blogger.com/blogger/1592/2689/320/2.0.png" border="0" /></a><br />6) The Exchange System Manager has a component called as Toolbox. This comes built-in with Exchange Server Best Practice Analyzer, Exchange Server Performance Monitor and Exchange Queue Viewer. This makes the day-to-day task of the Admin team further simpler, by providing a common interface to perform their value added activities.<br /></p><p><a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.3.jpg"><img style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="http://photos1.blogger.com/blogger/1592/2689/320/1.1.jpg" border="0" /></a><br />7) A log-shipping type of backup mechanism has been introduced in Exchange 2007. Like in SQL, log-shipping can be used to replicate the changes made to the database server to a different server. In case of the first server crash, the second server has the complete data and can be brought online pretty quickly without restoration tapes. This feature is called as ‘Continuous Backup’ in Exchange 2007. With this feature, disaster recovery or a single mailbox recovery will become a breeze in Exchange 2007.<br /></p><p>8) Thankfully, there will be no more STM files. Unfortunately, STM files were known to grow in size all of a sudden, and produce all kind of problems, most of the times due to antivirus settings issues. Exchange 2007 will have a different mechanism for providing web content.<br /></p><p>9) Exchange 2007 can host up to 50 databases on a single server with the Enterprise edition and can use up to 2 billion log files.<br /></p>Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0tag:blogger.com,1999:blog-27529238.post-1149777378843675822006-06-08T07:09:00.000-07:002006-06-08T07:38:33.646-07:00What is Rights Management Services (RMS)?Worried about the confidential company data landing in wrong hands? If yes, Rights Management Services is the answer. The objective of RMS for Windows 2003 is to control access to the data whether it is online or offline, inside or outside the firewall. So even if the sensitive data finds its way to the wrong hands, the data still cannot be accessed rendering it useless.<br /><br />This is independent of domain memberships or operating systems. So even if I am the administrator of a given computer or a domain and I receive a file or mail which is RMS protected, no matter what I do as an administrator, I would not be able to access it.<br /><br />OK, so the working of RMS requires three components:<br /><br />1) RMS running on Windows 2003 and Active Directory<br />2) Applications supporting RMS, for example, Microsoft Exchange and Outlook<br />3) Policies in place to provide the right level of access to the right people.<br /><br />The way in which RMS controls access to the data is by sticking the access information with the data. So unlike a file secured by NTFS, which loses all security information as soon as it is copied to a FAT or FAT32 partition, or sent to someone by mail, RMS protects the data even if it is handed over to someone without access by mail or by a pen drive.<br /><br />Using RMS is a pretty simple task. Any user who wants to protect a message from being accessed by an unauthorized user, or let’s say the sender wants to restrict what the recipient of the message can and cannot do. For example, the sender wants to restrict the recipient from printing the message and also the recipient should not be able to forward it. The sender would like to allow the recipient to reply to the message though. This can be done by the sender himself by using few simple clicks in his Outlook client. So not only does RMS prevents data from reaching the wrong hands, it also controls effectively what actions the intended recipient can and cannot do.<br /><br />A couple of examples below from Microsoft:<br /><br /><ul><li>A company manager has access to the online sales system. She pulls up sales information about last quarter's unit sales using her browser. Because the information is sensitive, specific restrictions have been applied to the report: She cannot print, copy, or paste the data. RMS helps the company protect its sensitive quarterly sales data from accidental or deliberate leaks before its official earnings announcement. <br /></li><li>A CEO needs to send an e-mail message that contains confidential information about an upcoming reorganization to his executive staff. In Microsoft Office Outlook 2003, he selects a template to specify that recipients can only read the e-mail message, and that they cannot copy, paste, edit, or forward the information. The recipients receive the e-mail message in Outlook 2003, with the usage policies automatically applied to the message. The CEO has a new level of confidence that this sensitive information will be viewed only by his executive staff. <br /><br /></li></ul><p>Below are some screenshots on how this can be done from the client end.<br />Figure 1 below displays the option from MS Excel from where RMS can be initiated. </p><a href="http://photos1.blogger.com/blogger/1592/2689/1600/1.1.png"><img style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="http://photos1.blogger.com/blogger/1592/2689/320/1.0.png" border="0" /></a>Figure 1<br /><br />Figure 2 shows the various level of rights and user selection that can be done for a RMS client. The user opted for permission needs to be a valid user in the AD.<br /><br /><a href="http://photos1.blogger.com/blogger/1592/2689/1600/2.png"><img style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="http://photos1.blogger.com/blogger/1592/2689/320/2.png" border="0" /></a>Figure 2<br /><br />The user receiving this document also needs to have the RMS client installed on his machine in order to open the protected data.<br /><br />RMS is also pretty straightforward to setup in the back end. All it requires is Windows 2003 Server, SQL Database and Active Directory. This combined with the client end application supporting RMS is enough for RMS to work.<br /><br />Microsoft provides the SDK for software developers to provide the RM capability in their products.<br /><br />The component of RMS which is embedded in MS Office products is called as ‘Information Rights Management’ or IRM.<br /><br />RMS is based on public key cryptography, using <a href="http://onlytech.blogspot.com/2006/05/what-role-does-certificate-play-in.html">digital certificates</a> to identify users and determine their access rights. The RMS server issues the certificates. When an internal RMS server is set up in the organization, it uses Windows authentication for issuance of the certificates.Anonymoushttp://www.blogger.com/profile/10873173056079722551noreply@blogger.com0