<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-37006439</id><updated>2024-10-25T00:19:29.974+05:30</updated><title type='text'>`Something to Share` :)</title><subtitle type='html'>Sharing some of the things which I came across..</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>16</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-37006439.post-3189690286555559585</id><published>2007-08-02T18:47:00.003+05:30</published><updated>2008-04-28T14:39:53.253+05:30</updated><title type='text'>Yahoo tracker - Track the Online/Offline status of your Yahoo Buddy</title><content type='html'>Here is a cool site which allows you to monitor the Online/Offline status of any yahoo user.&lt;br /&gt;&lt;a href=&quot;http://www.yahootracker.com/&quot;&gt;http://www.yahootracker.com&lt;/a&gt;&lt;br /&gt;Its completely free and you need not provide your yahoo id :)&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;As found in Home Page&lt;/span&gt;&lt;br /&gt;Yahoo tracker is a web based service that allows you to track online/offline status of your yahoo buddies. You can track even those who are not in your messenger list, your yahoo tracker account is in no way connected to your own yahoo id. There is currently no such tool which tells you whether someone is spying on you using this service or not. The service tracks the online/offline activity of Yahoo messenger user in previous 24 hours, and you can track 12 yahoo users with one account. Data updates after every 10 minutes. Yahoo messenger users will be considered as online even if they are invisible to any number of people (not everyone). Being &quot;on sms&quot; and &quot;on mobile&quot; will also be considerd as online. The Service is being provided only for educational purposes, to let the users know about some of the yahoo loopholes.</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/3189690286555559585/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/3189690286555559585' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/3189690286555559585'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/3189690286555559585'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/08/yahoo-tracker-track-onlineoffline-staus.html' title='Yahoo tracker - Track the Online/Offline status of your Yahoo Buddy'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-1167595519076733402</id><published>2007-05-28T17:15:00.000+05:30</published><updated>2007-06-01T10:36:37.862+05:30</updated><title type='text'>HowTo : HTML Signature in Gmail?</title><content type='html'>Now Firefox users can use HTML signature in there Gmail Account.Firefox is one of the safest, fastest and reliable web browser . It supports addons/extensions which makes the browsing experience more effective.&lt;br /&gt;      Using one of the addon, known as &lt;b&gt;Better Gmail&lt;/b&gt; one can have HTML signatures in Gmail.&lt;a href=&quot;http://pagead2.googlesyndication.com/pagead/iclk?sa=l&amp;amp;num=0&amp;client=ca-ref-pub-7434300132734165&amp;amp;adurl=http://tools.google.com/firefox/toolbar/bundle/%3Fai%3DBGctb4cRaRumLA4vOsQKR2JnOAtGe8hfNwsftAcWNtwEAEAEg58yZBjgBUOHd82Rg5crlg7QOmAGFkwaYAaSfBqABtZXI_QOqAQo1NDE1NzIzOTA3sgEEbnVsbMgBAdoBBG51bGyAAgGoAwM&amp;ai=BJ7Yk4cRaRumLA4vOsQKR2JnOAtGe8hfNwsftAcWNtwEAEAEg58yZBjgBUPDXtej5_____wFg5crlg7QOmAGFkwaYAaSfBqABtZXI_QOqAQo1NDE1NzIzOTA3sgEEbnVsbMgBAdoBBG51bGyAAgGoAwM&quot; title=&quot;Click to Download &quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;p&gt;&lt;b&gt;Better Gmail&lt;/b&gt;, a comprehensive suite of Gmail enhancements, including skins, saved searches, keyboard macros, secure access, attachment icons, attachment reminders, label colors, HTML signatures and more.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/downloads/file/15710/better_gmail-0.6.1-fx.xpi&quot;&gt;Click here to Download Better Gmail&lt;/a&gt; - If you are using Firefox then it may prevent from installing the addon from this blog. So right click on the link and say Save link as. and save the addon to your PC. Or else goto &lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/4866&quot;&gt;https://addons.mozilla.org/en-US/firefox/addon/4866&lt;/a&gt; for downloading the addon&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Installation instructions&lt;/b&gt;&lt;br /&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Drag and drop the .xpi file to the firefox window.&lt;/li&gt;&lt;li&gt;After the installation, restart the firefox to enable the addon.&lt;/li&gt;&lt;li&gt;Open the Firefox Goto Tools-&amp;gt;Addons-&amp;gt; Click on the better gmail -&amp;gt; Preferences -&amp;gt; Enable the HTML signature by clicking on the check box opposite to the Floating Signature &lt;/li&gt;&lt;li&gt;Next step is to setup a signature in GMAIL. Goto settings in GMAIL -&amp;gt; Use Signature and check Allow HTML in Signature. If you know HTML tags then it is easy to make a signature. Or else use some webpage creator/editor to create the signature.  &lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Or do as per the following.&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt; goto &lt;a href=&quot;http://pages.google.com/&quot;&gt;http://pages.google.com&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Create the signature as per your requirement [check &lt;a href=&quot;http://labnol.blogspot.com/2006/08/how-to-add-html-signatures-with-images.html&quot;&gt;http://labnol.blogspot.com&lt;/a&gt; for more reference in creating Signature using googlepages.]&lt;/li&gt;&lt;li&gt;edit the HTML. copy it and paste it in the signature section in gmail&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;!--&lt;br /&gt;google_ad_client = &quot;pub-7434300132734165&quot;;&lt;br /&gt;google_ad_width = 468;&lt;br /&gt;google_ad_height = 60;&lt;br /&gt;google_ad_format = &quot;468x60_as_rimg&quot;;&lt;br /&gt;google_cpa_choice = &quot;CAAQ6YmYhAIaCPEeDUdsxPNaKOm293MwAA&quot;;&lt;br /&gt;google_ad_channel = &quot;5415723907&quot;;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;    &lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/1167595519076733402/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/1167595519076733402' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/1167595519076733402'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/1167595519076733402'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/05/how-tohtml-signature-in-gmail.html' title='HowTo : HTML Signature in Gmail?'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-8741745004211085620</id><published>2007-05-25T19:43:00.000+05:30</published><updated>2007-05-25T21:39:50.410+05:30</updated><title type='text'>SMS Support in Sun Java System Messaging Server version 6.3</title><content type='html'>&lt;p&gt;        This article discusses Short Message Service (SMS) support within Sun Java System Messaging Server 6.3. You can utilize SMS as a   means to quickly notify users with a more real-time, &quot;push&quot; style of communications, for example, to let users know of emergency conditions that require their prompt action.&lt;/p&gt;&lt;br /&gt;&lt;h5&gt;Quick SMS Overview&lt;/h5&gt; &lt;p&gt; Here is the definition of &quot;Short message service&quot; from &lt;a href=&quot;http://en.wikipedia.org/wiki/Short_message_service&quot;&gt;Wikipedia&lt;/a&gt;*:&lt;/p&gt; &lt;blockquote&gt; &lt;p&gt;&lt;b&gt;Short Message Service&lt;/b&gt; (&lt;b&gt;SMS&lt;/b&gt;) is a telecommunications protocol that allows the sending of &quot;short&quot; (160 characters or less) text messages. It is available on most digital &lt;a href=&quot;http://en.wikipedia.org/wiki/Mobile_phone&quot;&gt;mobile phones&lt;/a&gt; and some &lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_digital_assistant&quot;&gt;personal digital assistants&lt;/a&gt; with onboard wireless telecommunications.  The individual messages which are sent are called &lt;b&gt;text messages&lt;/b&gt;, and more colloquially &lt;b&gt;SMSes&lt;/b&gt;, &lt;b&gt;texts&lt;/b&gt;, or even &lt;b&gt;txts&lt;/b&gt; (in &quot;&lt;a href=&quot;http://en.wikipedia.org/wiki/SMS_language&quot;&gt;text speak&lt;/a&gt;&quot;).&lt;/p&gt; &lt;p&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/SMS_gateways&quot;&gt;SMS gateways&lt;/a&gt; exist to connect mobile SMS services with &lt;a href=&quot;http://en.wikipedia.org/wiki/Instant_message&quot;&gt;instant message&lt;/a&gt; (IM) services, the &lt;a href=&quot;http://en.wikipedia.org/wiki/World_wide_web&quot;&gt;world wide web&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Desktop_computers&quot;&gt;desktop computers&lt;/a&gt;, and even &lt;a href=&quot;http://en.wikipedia.org/wiki/Landline&quot;&gt;landline&lt;/a&gt; telephones (through &lt;a href=&quot;http://en.wikipedia.org/wiki/Speech_synthesis&quot;&gt;speech synthesis&lt;/a&gt;). Devices which can connect to mobile phones and PDAs through protocols such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Bluetooth&quot;&gt;Bluetooth&lt;/a&gt; can also sometimes use that link to send SMS messages over the wireless network. SMS arose as part of the widely deployed &lt;a href=&quot;http://en.wikipedia.org/wiki/GSM&quot;&gt;GSM&lt;/a&gt; protocol, but is now also available with non-GSM systems.&lt;/p&gt; &lt;p&gt; The most common application of the service is person-to-person messaging, but text messages are also often used to interact with automated systems, such as ordering products and services for mobile phones, or participating in contests. There are some services available on the Internet that allow users to send text messages free of direct charge to the sender, although users of North American networks will often have to pay to receive any SMS text message. &lt;/p&gt; &lt;/blockquote&gt;&lt;br /&gt;&lt;h5&gt;SMS Support in Messaging Server 6.3&lt;/h5&gt; &lt;p&gt; The short of it is that yes, Messaging Server does support SMS, specifically as a channel within the Messaging Server Message Transfer Agent (MTA). &lt;/p&gt; &lt;p&gt;Messaging Server implements email-to-mobile and mobile-to-email messaging using SMS. You can configure SMS as either one-way (email-to-mobile only) or two-way (both email-to-mobile and mobile-to-email). To enable one-way service only, you must add and configure the SMS channel. To enable two-way service, you must add and configure the SMS channel, and in addition, configure the SMS Gateway Server.&lt;/p&gt; &lt;p&gt;For both one- and two-way SMS, the generated SMS messages are submitted to a Short Message Service Center (SMSC) using the Short Message Peer to Peer (SMPP) protocol. Specifically, the SMSC must provide a V3.4 or later SMPP server that supports TCP/IP. &lt;/p&gt; &lt;p&gt;The following figure shows these configurations: &lt;/p&gt; &lt;p align=&quot;center&quot;&gt; &lt;img src=&quot;http://www.sun.com/bigadmin/features/images/sms_support_msg_server.gif&quot; alt=&quot;logFlowOneTwoWaySMS&quot; border=&quot;1&quot; height=&quot;454&quot; width=&quot;593&quot; /&gt; &lt;/p&gt; &lt;p&gt; One-way SMS: To enable one-way service, the Messaging Server implements an SMPP client (the MTA SMS channel) that communicates with remote SMSCs. The SMS channel converts enqueued email messages to SMS messages as described in &lt;a href=&quot;http://docs.sun.com/app/docs/doc/819-4428/6n6j426d9?a=view#bgbmw&quot;&gt;C.2.2 The Email to SMS Conversion Process&lt;/a&gt; of multipart MIME messages, as well as handling character set translation issues. Operating in this capacity, the SMS channel functions as an (SMPP) External Short Message Entity (ESME). &lt;/p&gt; &lt;p&gt; Two-way SMS: Two-way SMS enables the mail server not only to send email to remote devices, but allows for receiving replies from the remote devices and for remote device email origination. Enabling two-way SMS service requires both the MTA SMS channel (SMPP client), as explained in the previous topic, and the SMS Gateway Server. Sun Java System Messaging Server installs an SMS Gateway Server as part of its general installation process, which you must then configure. &lt;/p&gt; &lt;p&gt; For more information, see &lt;a href=&quot;http://docs.sun.com/app/docs/doc/819-4428/6n6j426d5&quot;&gt;Appendix C, Short Message Service (SMS)&lt;/a&gt; in the &lt;i&gt;Sun Java System Messaging Server 6.3 Administration Guide&lt;/i&gt;. &lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;h5&gt;SMS Mailbox Access and Calendar Gateway&lt;/h5&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-7434300132734165&quot;;&lt;br /&gt;google_ad_width = 120;&lt;br /&gt;google_ad_height = 90;&lt;br /&gt;google_ad_format = &quot;120x90_0ads_al&quot;;&lt;br /&gt;//2007-05-25: blogpost&lt;br /&gt;google_ad_channel = &quot;3871207440&quot;;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt; &lt;p&gt; In addition to the SMS functionality built-in to Messaging Server, a couple of Sun Professional Services folks independently developed an SMS Gateway solution for use with Messaging Server and Calendar Server. Dubbed &lt;i&gt;SMS Mailbox Access and Calendar Gateway&lt;/i&gt;, this solution is primarily targeted at service providers to add value for their subscriber base, though other types of organizations could certainly also use the gateway. &lt;/p&gt; &lt;p&gt; The SMS Gateway provides the following functionality: &lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;b&gt;SMS Notification.&lt;/b&gt; Receive SMS information about each email delivered to the subscriber&#39;s mailbox. Depending on user-configured settings, the following information can be sent in the SMS body: sender, email subject, date and time, size attachment information, and more. Furthermore, the subscribers can read emails using their mobile phones. It is just a matter of responding to the SMS notification and the first part of the email body will be received as another SMS on the mobile device shortly thereafter. To receive another part the subscriber has to respond with SMS to the first one, to receive the third, respond to the second, and so on, until the whole body has been transferred. &lt;/li&gt;&lt;li&gt;&lt;b&gt;Mailbox management via SMS.&lt;/b&gt; This enables support for basic email services. Subscribers can use SMS messages to reply to, forward, or delete the mail stored in their mailbox to receive mailbox status information (for example, the number of messages, how many have been read, and so on), as well as detailed attachment data (filename, type, and size). Mailbox management features also include the ability to send emails using SMS messages and to change notification parameters. &lt;/li&gt;&lt;li&gt;&lt;b&gt;Calendar Event Information.&lt;/b&gt; SMS Gateway sends SMS messages containing information on events in the subscriber&#39;s calendar (Calendar Server) to the subscriber&#39;s mobile phone (depending on user-configured settings). These can include reminders for pending appointments, invitations to meetings, and so on.&lt;/li&gt;&lt;/ol&gt; &lt;p&gt; The SMS Gateway requires Messaging Server, Calendar Server, Directory Server, and custom components developed by Sun. &lt;/p&gt;&lt;br /&gt;&lt;h5&gt; Comparison of Messaging Server SMS Channel and SMS Mailbox Access and Calendar Gateway&lt;/h5&gt; &lt;p&gt; It&#39;s interesting to note that the built-in SMS functionality to Messaging Server and the SMS Mailbox Access and Calendar Gateway do not compete, but are in fact complementary. Here is a summary of the features in both: &lt;/p&gt; &lt;p&gt; &lt;b&gt;SMS Channel&lt;/b&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;General-purpose email/SMS and SMS/email gateway&lt;/li&gt;&lt;li&gt;SMS notification sent as email passes via the channel; mailboxes are not involved&lt;/li&gt;&lt;li&gt;Provides historical record of the messages sent, so mobile users can respond to notifications to reply to email messages&lt;/li&gt;&lt;li&gt;Supports Delivery Status Notifications (DSNs)&lt;/li&gt;&lt;/ul&gt; &lt;p&gt; &lt;b&gt;SMS Gateway&lt;/b&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;SMS Gateway sends notifications when emails are delivered to mailboxes, so they can contain backward references to messages.&lt;/li&gt;&lt;li&gt;Mailboxes must be involved if you want to interact with mailbox but you can think of the Gateway as a general-purpose tool for changing some user parameters in LDAP by means of SMS messages sent.&lt;/li&gt;&lt;li&gt;SMPP connectivity is through the Messaging Server SMS Channel but also SEMA-OIS, UCP, and CIMD2 connectivity independently, if needed, as not all SMSC devices use SMPP.&lt;/li&gt;&lt;/ul&gt; &lt;p&gt; Very briefly:&lt;/p&gt;  &lt;ul&gt;&lt;li&gt;&lt;b&gt;Use SMS Channel&lt;/b&gt; if you want to configure your Messaging Server to be an SMTP to SMS converter, so mail messages transferred through are converted to SMS messages and sent to mobile users, regardless of whether they have mailboxes on your server.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Use SMS Gateway&lt;/b&gt; if you want your Messaging Server users to be notified with SMS about messages that arrive in their mailboxes and to be able to manipulate them by means of SMS messages.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h5&gt;Another Alternative: Multimedia Messaging Service (MMS) Support in Messaging Server&lt;/h5&gt; &lt;p&gt; &lt;a href=&quot;http://www.mobile-phones-uk.org.uk/mms.htm&quot;&gt;MMS&lt;/a&gt;, like Short Messaging Service (SMS), is a way to send a message from one mobile device to another. The difference is that MMS can include not just text, but also sound, images and video. It is also possible to send MMS messages from a mobile phone to an email address. &lt;/p&gt; &lt;p&gt; While Messaging Server has supported SMS for some time, it does not provided built-in support for MMS. Instead, Sun has partnered with companies such as &lt;a href=&quot;http://www.logicacmg.com/&quot;&gt;Logica CMG&lt;/a&gt; to provide the additional functionality required.  &lt;/p&gt;&lt;br /&gt;&lt;h5&gt;For More Information&lt;/h5&gt; &lt;p&gt; For more information on the SMS Mailbox Access and Calendar Gateway, contact &lt;a href=&quot;mailto:Andrzej.Zagrodzinski@Sun.COM&quot;&gt;Andrzej Zagrodzinski&lt;/a&gt; or &lt;a href=&quot;mailto:Wojciech.Chemijewski@sun.com&quot;&gt;Wojciech Chemijewski&lt;/a&gt;. &lt;/p&gt; &lt;p&gt; See the BigAdmin Communications Suite Hub for more information about Sun Java Communications Suite: &lt;/p&gt; &lt;p&gt; &lt;a href=&quot;http://www.sun.com/bigadmin/hubs/comms&quot;&gt;http://www.sun.com/bigadmin/hubs/comms&lt;/a&gt; &lt;/p&gt; &lt;p&gt;&lt;i&gt;*Note: Content from Wikipedia is available under the &lt;a href=&quot;http://en.wikipedia.org/wiki/GNU_FDL&quot;&gt;GNU Free Documentation License (GFDL)&lt;/a&gt;. &lt;/i&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/8741745004211085620/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/8741745004211085620' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/8741745004211085620'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/8741745004211085620'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/05/short-message-service-sms-support-in.html' title='SMS Support in Sun Java System Messaging Server version 6.3'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-8255757288327543261</id><published>2007-05-24T18:04:00.000+05:30</published><updated>2007-05-24T18:09:32.988+05:30</updated><title type='text'>Tips to Keep your computer Clean, Neat and Fast</title><content type='html'>Hi All,&lt;br /&gt;      This I got this piece of text from Internet while I was searching for an Anti-Adware software. I felt this one is good. so sharing with you too.....&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Here&#39;s the deal, my way. &lt;/span&gt;     &lt;span class=&quot;by&quot;&gt;&lt;br /&gt;                      by &lt;a href=&quot;http://forums.cnet.com/community/Brianstech/?tag=usrprfl&quot;&gt;Brianstech&lt;/a&gt; - 3/23/07 7:28 PM&lt;/span&gt;&lt;br /&gt;       &lt;span class=&quot;by&quot;&gt;In reply to: &lt;a href=&quot;http://forums.cnet.com/5208-6132_102-0.html?forumID=32&amp;threadID=239411&amp;amp;messageID=2437386#2437386&quot;&gt;How to Remove Malware, et al, like the computer repair shops&lt;/a&gt;&lt;a href=&quot;http://forums.cnet.com/community/katiebug57/?tag=usrprfl&quot;&gt;&lt;/a&gt;&lt;/span&gt;          &lt;p&gt;I&#39;m one of those who makes decent money fixing people&#39;s computers. I&#39;m an independent, someone who has gained many clients through my years of knowledge, buying and selling, building, networking, and repairs.&lt;br /&gt;&lt;br /&gt;Do you want to know how I keep my own computers running well?&lt;br /&gt;&lt;br /&gt;1. I use a hardware router, Linksys, Netgear, D-Link, it doesn&#39;t matter. And I don&#39;t use extreme security settings.&lt;br /&gt;&lt;br /&gt;2. I use Firefox as my browser. Maybe once every few months I&#39;ll use Internet Explorer to achieve something I can&#39;t with Firefox, and that&#39;s usually for experimental purposes. A few years back I got fed up with all the crap invading my computer EVERY FEW MINUTES with IE. Switched to Firefox, and the whole internet world opened its arms to me. I never looked back.&lt;br /&gt;&lt;br /&gt;I CANNOT use Firefox without some enhancements. They&#39;re called extensions. NoScript is the most important, it won&#39;t allow a single site to run scripts (including bad ones) without your approval. Next is Adblock Plus, something that speeds loading times with every click as it blocks all those &quot;leecher&quot; ads from loading. I compliment that with AdBlock FiltersetG Updater.&lt;br /&gt;&lt;br /&gt;Go to &lt;a href=&quot;http://www.mozilla.com/en-US/firefox/&quot; target=&quot;_blank&quot;&gt;http://www.mozilla.com/en-US/firefox/&lt;/a&gt; to learn all about it.&lt;br /&gt;&lt;br /&gt;Also, I always install SpywareBlaster. I&#39;m not sure exactly how it works, but it helps keep the bad guys out. That&#39;s always good.&lt;br /&gt;&lt;br /&gt;3. CCleaner. It&#39;s a simple small free program I couldn&#39;t live without. It takes mere seconds to eliminate all my internet history, cookies and cache. Not to mention emptying the Recycle Bin, and it even has a simple Registry cleaner.&lt;br /&gt;&lt;br /&gt;CCleaner is not a security program, it qualifies as a utility. But it makes all my security scanning programs almost completely worthless. I know, I&#39;ve tested it too many times. After a week or so of internet usage I&#39;ve run Spybot or AdAware to see they would find the usual list of benign cookies. Running CCleaner first makes AdAware, Spyboy S&amp;amp;D, Ewido, and even Doctor Alex a waste of my time. They all find nothing, for about 2 years now.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ccleaner.com/&quot; target=&quot;_blank&quot;&gt;http://www.ccleaner.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;4. Background programs. I DO NOT ALLOW programs to load and run with Windows. Install your camera software, scanner software, TV tuner software, DVD media player, sound card and mixer, Itunes, it doesn&#39;t stop. They all want to be in your face every minute you are on your computer. And they are constantly hovering, waiting for you to request their services, at the cost of your time and RAM. Why do they do this? Obviously it&#39;s greed.&lt;br /&gt;&lt;br /&gt;So you shut them down. And still they occupy CPU cycles while they constantly seek updates because you didn&#39;t STOP that also!&lt;br /&gt;&lt;br /&gt;I use my digital camera about once every few months, my scanner even less. Why do they embed their software up my operating system&#39;s wahoo?&lt;br /&gt;&lt;br /&gt;STOP THEM.&lt;br /&gt;&lt;br /&gt;5. Email. Not much to say, I simply DON&#39;T allow HTML to get through all three accounts. All my email accounts are set up for &quot;text only&quot;, so the crooks can&#39;t can&#39;t infest my computer as easily. I also take the time to block the address or domain of every spammer, and only get about 2 unwarranted emails a year. I&#39;m very serious.&lt;br /&gt;&lt;br /&gt;And my life will never be changed by ANYTHING I read in an email. It&#39;s email for gosh sakes! When I read &quot;Your Paypal account has been accessed by a third party&quot;, I laughed. I logged onto Paypal to see it was only a scammer&#39;s attempt to get me to react through clicking their link to provide them with my account information. THERE ISN&#39;T A SINGLE EMAIL THAT WOULD EVER RAISE MY BLOOD PRESSURE!! Nowadays they can install scary stuff in your PC as soon as you open their email, unless you use &quot;text only&quot;.&lt;br /&gt;&lt;br /&gt;I almost wish they would still try, but it&#39;s been over 2 years since the last scam emails.&lt;br /&gt;&lt;br /&gt;THAT ABOUT SUMS IT UP.&lt;br /&gt;&lt;br /&gt;I don&#39;t use an antivirus although I wouldn&#39;t recommend that to all common users.&lt;br /&gt;&lt;br /&gt;And I download through torrents (filesharing) while surfing Russian Porno sites. I&#39;m a registered hacker on a few gamer sites. Sometimes I go down those dark internet alleys looking for trouble, and I always find nothing.&lt;br /&gt;&lt;br /&gt;I&#39;m also an established member of eBay, almost 5 years of buying and selling on 2 accounts. Established means I&#39;m also an active member of their communities, the Answer Center and different Groups.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/8255757288327543261/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/8255757288327543261' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/8255757288327543261'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/8255757288327543261'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/05/tips-to-keep-you-r-computer-clean-neat.html' title='Tips to Keep your computer Clean, Neat and Fast'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-1592970310141498277</id><published>2007-05-24T17:35:00.000+05:30</published><updated>2007-05-24T20:07:00.223+05:30</updated><title type='text'>Malware Alarm</title><content type='html'>&lt;strong&gt;Description of Malware Alarm &lt;/strong&gt;&lt;br /&gt;&lt;p&gt;           Malware Alarm is a Trojan disguised as an anti-spyware application. It installs stealthily onto a user&#39;s system, uses aggressive advertising, and produces false positives that may goad the user into purchasing the application.&lt;/p&gt;          &lt;p&gt;&lt;strong&gt;Recommendation for Malware Alarm &lt;/strong&gt;&lt;br /&gt;       It is highly recommended that this application be removed from the system.&lt;/p&gt;          &lt;p&gt;&lt;strong&gt;Trusted&lt;/strong&gt;: No        &lt;br /&gt;       &lt;strong&gt;Trojan&lt;/strong&gt;: Yes        &lt;br /&gt;       &lt;strong&gt;Chronic&lt;/strong&gt;: No        &lt;br /&gt;       &lt;strong&gt;Adware&lt;/strong&gt;: No        &lt;br /&gt;       &lt;strong&gt;Carrier&lt;/strong&gt;: No        &lt;br /&gt;       &lt;strong&gt;Browser Hijacker&lt;/strong&gt;: No        &lt;br /&gt;       &lt;strong&gt;Dialer&lt;/strong&gt;: No        &lt;br /&gt;       &lt;strong&gt;Commercial Keylogger&lt;/strong&gt;: No        &lt;br /&gt;       &lt;strong&gt;Remote Administration Tool&lt;/strong&gt;: No        &lt;br /&gt;       &lt;strong&gt;Suspected&lt;/strong&gt;: No          &lt;/p&gt;          &lt;p&gt;&lt;strong&gt;Company Name&lt;/strong&gt;: NA&lt;br /&gt;       &lt;strong&gt;Platforms Affected&lt;/strong&gt;:        &lt;br /&gt;       &lt;strong&gt;Methods of Distribution&lt;/strong&gt;: Downloadable from its site&lt;br /&gt;       &lt;strong&gt;Variants/Versions&lt;/strong&gt;:        &lt;br /&gt;       &lt;strong&gt;Release Date&lt;/strong&gt;: NA&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;How to Remove MalwareAlarm?&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;                You wont be able to uninstall this trojan. Or delete it. So for removing this do the following &lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open Task manager by pressing Ctrl+Shift+Esc&lt;/li&gt;&lt;li&gt;Kill the process named MalwareAlarm&lt;/li&gt;&lt;li&gt;Goto C:\Program Files and delete the Folder MalwareAlarm&lt;/li&gt;&lt;li&gt;Delete the start menu entries by going to start-&gt;All Programs-&gt;MalwareAlarm&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Next in Run type &quot;regedit&quot; and search for &quot;MalwareAlarm&quot; and remove all the entries&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/1592970310141498277/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/1592970310141498277' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/1592970310141498277'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/1592970310141498277'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/05/malware-alarm.html' title='Malware Alarm'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-1253058786209058942</id><published>2007-05-22T16:11:00.000+05:30</published><updated>2007-05-22T16:18:04.801+05:30</updated><title type='text'>How to help prevent SSH attacks...</title><content type='html'>Im not a huge Linux Expert but i have enough knowledge to run and secure a server.&lt;br /&gt;&lt;br /&gt;I was given some instructions on what to do to prevent this from happening so im going to share them here to help others secure their SSH and reduce the possibility of one of these bots (or humans) accessing your server via root. &lt;h4 style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Install Brute Force Detection (BFD)&lt;/span&gt;&lt;/h4&gt;This nifty tool will basically detect and help prevent people and bots trying to access your server by entering a list of random passwords - it will ban and block the IP’s that attempt to brute force your server.&lt;br /&gt;&lt;br /&gt;To install BFD you must first install the APF firewall - instructions on doing so can be found over at webhostgear dot com&lt;br /&gt;&lt;br /&gt;Once you have installed APF you may install BFD:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Step 1:&lt;/b&gt; Login to your server as &quot;root&quot;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Step 2:&lt;/b&gt; Download the latest release of BFD&lt;br /&gt;&lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;wget http://www.rfxnetworks.com/downloads/bfd-current.tar.gz&lt;/div&gt;  &lt;b&gt;Step 3:&lt;/b&gt;&lt;br /&gt;Un-Tar the archive&lt;br /&gt;&lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;tar -xvzf bfd-current.tar.gz&lt;/div&gt;  &lt;b&gt;Step 4:&lt;/b&gt;&lt;br /&gt;Move to the newly created BFD directory&lt;br /&gt;&lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;cd bfd-0.X&lt;/div&gt;  &lt;b&gt;Step 5:&lt;/b&gt;&lt;br /&gt;Run the installation utility, once installed it will give you a completion message.&lt;br /&gt;&lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;./install.sh&lt;/div&gt;  &lt;b&gt;Step 6:&lt;/b&gt;&lt;br /&gt;Edit the config file&lt;br /&gt;&lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;nano /usr/local/bfd/conf.bfd&lt;/div&gt;  &lt;b&gt;Change This:&lt;/b&gt;&lt;br /&gt;&lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;ALERT_USR=&quot;0&quot;&lt;/div&gt;  &lt;b&gt;To This:&lt;/b&gt;&lt;br /&gt;&lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;ALERT_USR=&quot;1&quot;&lt;/div&gt;  &lt;b&gt;and This:&lt;/b&gt;&lt;br /&gt;&lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;EMAIL_USR=&quot;root&quot;&lt;/div&gt;  &lt;b&gt;To This:&lt;/b&gt;&lt;br /&gt;&lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;EMAIL_USR=&quot;you@yourdomain.com&quot;&lt;/div&gt;  &lt;b&gt;Step 7:&lt;/b&gt;&lt;br /&gt;Now to prevent getting locked out, its best that you edit the ignore list, this is a list of IP’s that wont be affected by the BFD system.&lt;br /&gt;&lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;nano /usr/local/bfd/ignore.hosts&lt;/div&gt;  &lt;b&gt;Add your IP to the list, e.g:&lt;/b&gt;&lt;br /&gt;&lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;123.12.123.1&lt;/div&gt;  &lt;b&gt;Step 8:&lt;/b&gt;&lt;br /&gt;You can now start BFD by running the following command as root:&lt;br /&gt;&lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;/usr/local/sbin/bfd -s&lt;/div&gt;  The install of BFD is now complete. Time for the next item on the security list…  &lt;h4 style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Moving SSH To A New Port&lt;/span&gt;&lt;/h4&gt; As silly as this may sound, moving SSH is actually one of the better methods of helping to stop unauthorized access. Moving the port will give the impression that the server is either non-functional or does not have SSH setup.&lt;br /&gt;&lt;br /&gt;If you have APF installed, make sure to add the new port to the list of open ports before applying the below modifications - failure to do so could leave you locked out of your system.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Step 1:&lt;/b&gt; Pick yourself a port number (higher 4 digit numbers are usually better as they are less likely to already be in use). E.g. 8470&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Step 2:&lt;/b&gt;Here we will open up the SSH config file, at the top of the file is the current port number (22), you can just change this to the new one: &lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;nano /etc/ssh/sshd_config&lt;/div&gt;  &lt;b&gt;Step 3:&lt;/b&gt;&lt;br /&gt;Restart the SSH server &lt;div style=&quot;border: 1px dotted rgb(187, 187, 187); color: rgb(68, 68, 68);&quot;&gt;/etc/rc.d/init.d/sshd restart&lt;/div&gt;  &lt;b&gt;Step 4:&lt;/b&gt;&lt;br /&gt;Login with the new port number!&lt;br /&gt;If using putty the port number defaults to 22 however you can change this when entering the server IP.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Step 5:&lt;/b&gt; If everything is working, you can now edit your APF config and close off port 22 as its no longer needed!</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/1253058786209058942/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/1253058786209058942' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/1253058786209058942'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/1253058786209058942'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/05/how-to-help-prevent-ssh-attacks.html' title='How to help prevent SSH attacks...'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-5216305499584021031</id><published>2007-05-19T19:54:00.000+05:30</published><updated>2007-05-19T21:02:17.180+05:30</updated><title type='text'>Google SketchUp</title><content type='html'>&lt;p&gt;&lt;b&gt;SketchUp&lt;/b&gt; is a 3D modelling program designed for professional architects, civil engineers, filmmakers, game developers, and related professions. It was designed to be more intuitive, flexible, and easy-to-use than other 3D modelling programs, which often have steep learning curves.&lt;a href=&quot;http://www.sketchup.com/?id=3&quot; class=&quot;external autonumber&quot; title=&quot;http://www.sketchup.com/?id=3&quot; rel=&quot;nofollow&quot;&gt;[1]&lt;/a&gt; Several features allow designers to &quot;play&quot; with their designs, unlike what is possible in other 3D CAD programs. It is marketed as an easy-to-use conceptual tool with a simple interface.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;http://www.sketchup.com/&quot;&gt;http://www.sketchup.com/&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;Some of its key features include:&lt;/p&gt;  &lt;ul&gt;&lt;li&gt;A smart drawing cursor (inference) system that allows users to draw 3D objects using a 2D screen and mouse.&lt;/li&gt;&lt;li&gt;Simple massing study capability via &quot;push-pull&quot;.&lt;span style=&quot;margin: 0px 0px 0px 5px; float: right; text-align: right;&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-7434300132734165&quot;;&lt;br /&gt;google_ad_width = 200;&lt;br /&gt;google_ad_height = 90;&lt;br /&gt;google_ad_format = &quot;200x90_0ads_al&quot;;&lt;br /&gt;//2007-05-19: blogpost&lt;br /&gt;google_ad_channel = &quot;3871207440&quot;;&lt;br /&gt;google_color_border = &quot;336699&quot;;&lt;br /&gt;google_color_bg = &quot;FFFFFF&quot;;&lt;br /&gt;google_color_link = &quot;0000FF&quot;;&lt;br /&gt;google_color_text = &quot;000000&quot;;&lt;br /&gt;google_color_url = &quot;008000&quot;;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;An interactive &lt;a href=&quot;http://en.wikipedia.org/wiki/Heliodon&quot; title=&quot;Heliodon&quot;&gt;Heliodon&lt;/a&gt;, or sun angle simulator.&lt;/li&gt;&lt;li&gt;A fast, easy way to animate camera and sun movements.&lt;/li&gt;&lt;li&gt;Models can be individually colored with an assortment of solid colors, textures and materials.&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;       SketchUp was developed by startup company &lt;span class=&quot;new&quot;&gt;@Last Software&lt;/span&gt;, Boulder, Colorado which was formed in 1999.&lt;a href=&quot;http://www.sketchup.com/?id=3&quot; class=&quot;external autonumber&quot; title=&quot;http://www.sketchup.com/?id=3&quot; rel=&quot;nofollow&quot;&gt;[2]&lt;/a&gt; SketchUp was first released in August 2000&lt;a href=&quot;http://www.sketchup.com/?id=4&amp;recordid=3&quot; class=&quot;external autonumber&quot; title=&quot;http://www.sketchup.com/?id=4&amp;amp;recordid=3&quot; rel=&quot;nofollow&quot;&gt;[3]&lt;/a&gt; as a general purpose 3D content creation tool. It won a Community Choice Award at its first tradeshow in 2000.(&lt;a href=&quot;http://www.digitalcad.com/Htm/Articles/2000/11_00b/digicad.htm&quot; class=&quot;external text&quot; title=&quot;http://www.digitalcad.com/Htm/Articles/2000/11_00b/digicad.htm&quot; rel=&quot;nofollow&quot;&gt;A/E/C SYSTEMS Fall 2000&lt;/a&gt;)&lt;a href=&quot;http://www.sketchup.com/?id=4&amp;recordid=1&quot; class=&quot;external autonumber&quot; title=&quot;http://www.sketchup.com/?id=4&amp;amp;recordid=1&quot; rel=&quot;nofollow&quot;&gt;[4]&lt;/a&gt; It quickly found a market in architecture and building design industries, however, and was revised to suit the needs of working professionals. The key to its early success was in its fast learning curve, allowing for a shorter learning period than other commercially available 3D tools. &lt;p&gt;As of &lt;i&gt;SketchUp 5&lt;/i&gt;, features were added to allow the user to extrude and widen as well as the ability for a face to &quot;follow&quot; the cursor around an object.&lt;/p&gt;  &lt;p&gt;On March 14, 2006, Google acquired @Last Software,&lt;a href=&quot;http://www.sketchup.com/index.php?id=7&amp;recordid=109&quot; class=&quot;external autonumber&quot; title=&quot;http://www.sketchup.com/index.php?id=7&amp;amp;recordid=109&quot; rel=&quot;nofollow&quot;&gt;[5]&lt;/a&gt; attracted by their plugin for Google Earth.&lt;/p&gt;  &lt;p&gt;On January 9, 2007 &lt;i&gt;SketchUp 6&lt;/i&gt; was released, featuring a handful of new tools as well as a beta version of &lt;i&gt;Google SketchUp LayOut&lt;/i&gt;. LayOut includes a handful of 2D vector tools, as well as page layout tools making it easier for professionals to create presentations without jumping to a third-party presentation program.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/5216305499584021031/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/5216305499584021031' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/5216305499584021031'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/5216305499584021031'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/05/google-sketchup.html' title='Google SketchUp'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-1847083121539570392</id><published>2007-05-19T19:32:00.000+05:30</published><updated>2007-05-19T21:00:17.212+05:30</updated><title type='text'>Twittering with Google Talk</title><content type='html'>What are you doing right now? It&#39;s a pretty simple question. Me? I&#39;m writing this post. Maybe you&#39;re &quot;eating a magnolia cupcake,&quot; or &quot;at work, but shopping online.&quot; Or maybe you&#39;re &quot;thinking of how to use the word of the day in a sentence: &lt;a title=&quot;polypropolene&quot; href=&quot;http://en.wikipedia.org/wiki/Polypropylene&quot;&gt;polypropolene&lt;/a&gt;.&quot;&lt;br /&gt;&lt;br /&gt;&lt;a title=&quot;Twitter&quot; href=&quot;http://www.twitter.com/&quot;&gt;Twitter&lt;/a&gt; is a site that makes it easy to let the world know what you&#39;re doing, and see what other people are up to in a fun, social environment. You can think of it as low-effort mini-blogging. And you can update your status with even less effort by using Google Talk. Just &lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;add twitter@twitter.com&lt;/span&gt; to your contact list and shoot off an IM to it about how you&#39;re &quot;cooking up some spicy chicken &lt;a title=&quot;jambalaya&quot; href=&quot;http://en.wikipedia.org/wiki/Jambalaya&quot;&gt;jambalaya&lt;/a&gt;&quot; or &quot;walking the cat.&quot; (Cats can go on walks, too.)&lt;br /&gt;&lt;span style=&quot;margin: 0px 0px 0px 5px; float: right; text-align: right;&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-7434300132734165&quot;;&lt;br /&gt;google_ad_width = 200;&lt;br /&gt;google_ad_height = 90;&lt;br /&gt;google_ad_format = &quot;200x90_0ads_al&quot;;&lt;br /&gt;//2007-05-19: blogpost&lt;br /&gt;google_ad_channel = &quot;3871207440&quot;;&lt;br /&gt;google_color_border = &quot;336699&quot;;&lt;br /&gt;google_color_bg = &quot;FFFFFF&quot;;&lt;br /&gt;google_color_link = &quot;0000FF&quot;;&lt;br /&gt;google_color_text = &quot;000000&quot;;&lt;br /&gt;google_color_url = &quot;008000&quot;;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;&lt;/span&gt;&lt;br /&gt;You can also use Talk with Twitter on a mobile device. Using the &lt;a title=&quot;RIM Blackberry Google Talk Client&quot; href=&quot;http://www.blackberry.com/GoogleTalk&quot;&gt;RIM Blackberry Google Talk Client&lt;/a&gt; you can quickly and easily send status updates to Twitter, and we&#39;ll all know how you&#39;re shoveling yourself out of a foot of snow. Advanced apologies to our NYC office, we&#39;ve got &lt;a title=&quot;sun here in Mountain View&quot; href=&quot;http://www.google.com/search?q=weather+mountain+view&quot;&gt;sun here in Mountain View&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Add twitter@twitter.com to your Google Talk contacts to check it out.</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/1847083121539570392/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/1847083121539570392' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/1847083121539570392'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/1847083121539570392'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/05/twittering-with-google-talk.html' title='Twittering with Google Talk'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-4384956514634288512</id><published>2007-05-19T16:50:00.000+05:30</published><updated>2007-05-20T18:01:46.960+05:30</updated><title type='text'>Clam AntiVirus proves to be prosperous in the battle against email attacks</title><content type='html'>&lt;span style=&quot;;font-family:arial;font-size:100%;&quot;  &gt;&lt;a name=&quot;112a03ea56edaa05_FTE_article&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;One Blaster worm can ruin your whole day -- but Clam AntiVirus is free, fast, and can save the day. Clam AntiVirus is an antivirus toolkit for &lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;http://go.techtarget.com/r/1454242/6171520&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;Unix&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);font-family:arial,trebuchet,verdana;font-size:100%;&quot;  &gt;, specializing in email scanning on mail gateways. Product features include a multi-threaded &lt;a href=&quot;http://go.techtarget.com/r/1454243/6171520&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;&lt;script&gt;&lt;!-- D([&quot;mb&quot;,&quot;daemon\u003c/a\&gt;, command-line scanner and automatic virus database updates. ClamAV detects more than 116,000 viruses, worms and Trojans, including \u003ca href\u003d\&quot;http://go.techtarget.com/r/1454244/6171520\&quot; target\u003d\&quot;_blank\&quot; onclick\u003d\&quot;return top.js.OpenExtLink(window,event,this)\&quot;\&gt;Microsoft Office macro viruses\u003c/a\&gt; and \u003ca href\u003d\&quot;http://go.techtarget.com/r/1454245/6171520\&quot; target\u003d\&quot;_blank\&quot; onclick\u003d\&quot;return top.js.OpenExtLink(window,event,this)\&quot;\&gt;mobile malware\u003c/a\&gt;.\n\u003cp\&gt;\nWhen a new worm spreads, the development team usually releases a database update in less than an hour. Users can develop their own signatures, and submit them -- or suspect files -- to the developers. Updates work either in an interactive mode (on demand from the command line) or as a daemon (updating silently in the background). All virus updates are digitally signed to validate proof of authenticity. \n\u003cp\&gt;\nClam AntiVirus is capable of scanning files and directories, including recursive directories. Its multi-threaded execution makes use of the numerous CPU processors found in most contemporary machines. ClamAV also protects against malware hidden within archives by scanning inside compressed files. ClamAV supports ZIP, RAR, SFX, TAR, GZIP, MS cabinet (CAB) files, CHM (compiled HTML), BinHex and more. The product is also capable of examining several special file formats, including HTML, RTF, PDF,\n uuencode, TNEF (winmail.dat) and JPEG files looking for hidden exploits.\n\u003cp\&gt;\nIn addition to scanning files and folders, Clam AntiVirus scans data streams for viruses that may attempt to traverse the network. ClamAV is also extensible and supports added functionality via third-party add-on modules, such as the phishing module that blocks SSL mismatches in URLs to prevent users from being redirected to phony look-alike identity-theft sites. SpamAssassin users may appreciate the third-party plug-in for SpamAssassin, which calls ClamAV and adds a score based on the result of\n ClamAV&amp;#39;s scan. \n\u003cp\&gt;\nClam AntiVirus is an active open source project licensed under the \u003ca href\u003d\&quot;http://go.techtarget.com/r/1454246/6171520\&quot; target\u003d\&quot;_blank\&quot; onclick\u003d\&quot;return top.js.OpenExtLink(window,event,this)\&quot;\&gt;&quot;,1] );  //--&gt;&lt;/script&gt;daemon&lt;/a&gt;, command-line scanner and automatic virus database updates. ClamAV detects more than 116,000 viruses, worms and Trojans, including &lt;a href=&quot;http://go.techtarget.com/r/1454244/6171520&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;Microsoft Office macro viruses&lt;/a&gt; and &lt;a href=&quot;http://go.techtarget.com/r/1454245/6171520&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;mobile malware&lt;/a&gt;.&lt;/span&gt;&lt;span style=&quot;;font-family:arial;font-size:100%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;p  style=&quot;font-family:arial;&quot;&gt;   &lt;span style=&quot;color: rgb(0, 0, 0);font-size:100%;&quot; &gt;When a new worm spreads, the development team usually releases a database update in less than an hour. Users can develop their own signatures, and submit them -- or suspect files -- to the developers. Updates work either in an interactive mode (on demand from the command line) or as a daemon (updating silently in the background). All virus updates are digitally signed to validate proof of authenticity.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);font-size:100%;&quot; &gt;Clam AntiVirus is capable of scanning files and directories, including recursive directories. Its multi-threaded execution makes use of the numerous CPU processors found in most contemporary machines. ClamAV also protects against malware hidden within archives by scanning inside&lt;span style=&quot;margin: 0px 0px 0px 5px; float: right; text-align: right;&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-7434300132734165&quot;;&lt;br /&gt;google_ad_width = 200;&lt;br /&gt;google_ad_height = 90;&lt;br /&gt;google_ad_format = &quot;200x90_0ads_al&quot;;&lt;br /&gt;//2007-05-19: blogpost&lt;br /&gt;google_ad_channel = &quot;3871207440&quot;;&lt;br /&gt;google_color_border = &quot;336699&quot;;&lt;br /&gt;google_color_bg = &quot;FFFFFF&quot;;&lt;br /&gt;google_color_link = &quot;0000FF&quot;;&lt;br /&gt;google_color_text = &quot;000000&quot;;&lt;br /&gt;google_color_url = &quot;008000&quot;;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;&lt;/span&gt; compressed files. ClamAV supports ZIP, RAR, SFX, TAR, GZIP, MS cabinet (CAB) files, CHM (compiled HTML), BinHex and more. The product is also capable of examining several special file formats, including HTML, RTF, PDF, uuencode, TNEF (winmail.dat) and JPEG files looking for hidden exploits.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);font-size:100%;&quot; &gt;In addition to scanning files and folders, Clam AntiVirus scans data streams for viruses that may attempt to traverse the network. ClamAV is also extensible and supports added functionality via third-party add-on modules, such as the phishing module that blocks SSL mismatches in URLs to prevent users from being redirected to phony look-alike identity-theft sites. SpamAssassin users may appreciate the third-party plug-in for SpamAssassin, which calls ClamAV and adds a score based on the result of ClamAV&#39;s scan.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);font-size:100%;&quot; &gt;Clam AntiVirus is an active open source project licensed under the &lt;a href=&quot;http://go.techtarget.com/r/1454246/6171520&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;&lt;script&gt;&lt;!-- D([&quot;mb&quot;,&quot;General Public License\u003c/a\&gt; (GNU). Most popular Unix-based operating systems are supported, including Linux, Solaris, BSD and Mac OS X. There is also a ClamAV Windows port offered at w32.clamav.net. ClamAV excels at flagging malware, though falls short in its ability to auto-block active threats. Nonetheless Clam AntiVirus is a\n worthy arrow in your security quiver.\n\u003cp\&gt;\n\u003ci\&gt;Scott Sidel is an ISSO with Lockheed Martin.\u003c/i\&gt; \u003cbr\&gt;\u003cbr\&gt;\n \n     \n       \n           \n    \u003c/p\&gt;\u003c/p\&gt;\u003c/p\&gt;\u003c/p\&gt;\u003c/p\&gt;\u003c/p\&gt;\u003c/p\&gt;\u003c/font\&gt;\u003c/a\&gt;\u003c/p\&gt;\u003c/td\&gt;\n     \u003ctd width\u003d\&quot;20\&quot;\&gt;\u003cimg src\u003d\&quot;http://media.techtarget.com/searchSecurity/images/spacer.gif\&quot; width\u003d\&quot;20\&quot; height\u003d\&quot;1\&quot; alt\u003d\&quot;\&quot;\&gt;\u003c/td\&gt;\n           \u003ctd width\u003d\&quot;160\&quot; valign\u003d\&quot;top\&quot;\&gt;\n     \u003cdiv align\u003d\&quot;center\&quot;\&gt;\n       \n\n \n \n \n \u003c/div\&gt;\n      \n      \n       \n  \n  \u003ctable width\u003d\&quot;100%\&quot; border\u003d\&quot;0\&quot; cellspacing\u003d\&quot;0\&quot; cellpadding\u003d\&quot;1\&quot;\&gt;\n    \u003ctr\&gt;\n      \u003ctd bgcolor\u003d\&quot;#99ADC2\&quot;\&gt;\n\n       \u003ctable width\u003d\&quot;100%\&quot; border\u003d\&quot;0\&quot; cellspacing\u003d\&quot;0\&quot; cellpadding\u003d\&quot;2\&quot;\&gt;\n         \u003ctr\&gt;\n           \u003ctd\&gt;\u003cfont face\u003d\&quot;arial, trebuchet, verdana\&quot; color\u003d\&quot;#FFFFFF\&quot; size\u003d\&quot;1\&quot;\&gt;\u003ca name\u003d\&quot;112a03ea56edaa05_highlights\&quot;\&gt;\u003c/a\&gt; SITE HIGHLIGHTS\u003c/font\&gt;\u003c/td\&gt;\n         \u003c/tr\&gt;\n       \u003c/table\&gt;\n\n      \u003c/td\&gt;\n    \u003c/tr\&gt;\n  \u003ctr\&gt;\n   \u003ctd bgcolor\u003d\&quot;#99ADC2\&quot;\&gt;\n       \u003ctable width\u003d\&quot;100%\&quot; border\u003d\&quot;0\&quot; cellspacing\u003d\&quot;0\&quot; cellpadding\u003d\&quot;5\&quot;\&gt;\n         \n      \n       \u003ctr\&gt;\n            \u003ctd bgcolor\u003d\&quot;#FFFFFF\&quot;\&gt;\n        \n           \u003ca href\u003d\&quot;http://go.techtarget.com/r/1454247/6171520\&quot; target\u003d\&quot;_blank\&quot; onclick\u003d\&quot;return top.js.OpenExtLink(window,event,this)\&quot;\&gt;\u003cfont face\u003d\&quot;arial, trebuchet, verdana\&quot; size\u003d\&quot;1\&quot;\&gt;Convergence of security and network management has pros and cons\u003c/font\&gt;\u003c/a\&gt;\u003cbr\&gt;\n         \u003cfont face\u003d\&quot;arial, trebuchet, verdana\&quot; size\u003d\&quot;1\&quot;\&gt;\n        In the past 10 years, there has been a gradual centralization of security functions, driven by the need for auditing and compliance accountability. Today a number of organizations are moving security operations into other business groups, like networking, data center or applications. View this tip and examine the pros and cons of integrating security into your network. \u003c/font\&gt;\n        \u003cbr\&gt;&quot;,1] );  //--&gt;&lt;/script&gt;General Public License&lt;/a&gt; (GNU). Most popular Unix-based operating systems are supported, including Linux, Solaris, BSD and Mac OS X. There is also a ClamAV Windows port offered at w32.clamav.net. ClamAV excels at flagging malware, though falls short in its ability to auto-block active threats. Nonetheless Clam AntiVirus is a worthy arrow in your security quiver. &lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/4384956514634288512/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/4384956514634288512' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/4384956514634288512'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/4384956514634288512'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/05/clamantivirus-proves-to-be-prosperous.html' title='Clam AntiVirus proves to be prosperous in the battle against email attacks'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-4252561494624568633</id><published>2007-05-18T19:52:00.000+05:30</published><updated>2007-05-21T21:34:55.220+05:30</updated><title type='text'>Google Book Search becomes more comprehensive</title><content type='html'>&lt;a href=&quot;http://books.google.com/&quot;&gt;Google Book Search&lt;/a&gt; allows you to instantly search the full text of over a million digitized books, but we thought that wasn&#39;t quite enough. Now when you search you&#39;ll get both digitized book results as well as records for millions of other books that still just exist in the analog world.&lt;br /&gt;&lt;br /&gt;When you view these new added book records, you can often read reviews, a summary, or see what other people had to say about the book around the web. Since these books haven&#39;t been digitally indexed yet, you can&#39;t preview the text online, but if you&#39;ve discovered something great, we offer links to buy the book or &lt;a href=&quot;http://googleblog.blogspot.com/2006/08/finding-wealth-in-your-library-and.html&quot;&gt;find it in a library near you&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;We&#39;re doing this because we want to offer users the most comprehensive book search in the world - whether it&#39;s a book you can &lt;a href=&quot;http://books.google.com/books?id=cyokAAAAMAAJ&amp;pg=PPA7&quot;&gt;read online now&lt;/a&gt;, &lt;a href=&quot;http://books.google.com/books?id=dO-sDl1ySHoC&amp;amp;printsec=frontcover&quot;&gt;preview samples&lt;/a&gt;, &lt;a href=&quot;http://books.google.com/books?id=HbwYAAAAMAAJ&amp;dq=paul+otlet&amp;amp;amp;amp;amp;amp;amp;amp;q=documentation&amp;amp;pgis=1&quot;&gt;see a few snippets&lt;/a&gt;, or just read what &lt;a href=&quot;http://books.google.com/books?vid=ISBN0783556756&quot;&gt;others have written&lt;/a&gt; about the book. We&#39;re still very busy digitizing millions more books, but want to make as much discoverable as possible today.&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-7434300132734165&quot;;&lt;br /&gt;google_ad_width = 728;&lt;br /&gt;google_ad_height = 15;&lt;br /&gt;google_ad_format = &quot;728x15_0ads_al&quot;;&lt;br /&gt;//2007-05-18: blogpost&lt;br /&gt;google_ad_channel = &quot;3871207440&quot;;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;To find out more, check out our post on &lt;a href=&quot;http://booksearch.blogspot.com/2007/05/found-more-books.html&quot;&gt;Inside Google Book Search&lt;/a&gt;।&lt;br /&gt;                                            Source - &lt;a href=&quot;http://googleblog.blogspot.com/&quot;&gt;http://googleblog.blogspot.com&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/4252561494624568633/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/4252561494624568633' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/4252561494624568633'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/4252561494624568633'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/05/google-book-search-becomes-more.html' title='Google Book Search becomes more comprehensive'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-7962231849394680174</id><published>2007-05-18T13:56:00.000+05:30</published><updated>2007-05-18T14:14:01.066+05:30</updated><title type='text'>Red Hat to build &#39;Global Desktop&#39;</title><content type='html'>&lt;p&gt;&lt;a href=&quot;http://www.redhat.com/&quot; target=&quot;_blank&quot; title=&quot;Red Hat&quot;&gt;Red Hat&lt;/a&gt; is preparing to release a new &#39;Global Desktop&#39; that over time will grow into an online desktop which integrates online services into a client desktop platform. &lt;/p&gt;  &lt;p&gt;The platform will allow users to access online and local data in a unified way.&lt;/p&gt;  &lt;p&gt;Red Hat has teamed up with Intel for the platform. Local PC manufacturers will build the actual systems.&lt;/p&gt;  &lt;p&gt;The computers will target small businesses and governments in emerging economies, and the software will be made available on Intel&#39;s Classmate PC, a low cost notebook computer for students.&lt;/p&gt;  &lt;p&gt;The software borrows from the One Laptop Per Child (OLPC) project, with about 95 per cent of the code overlapping.&lt;/p&gt;  &lt;p&gt;The OLPC uses an adapted version of Red Hat&#39;s Fedora Linux. The Global Desktop won&#39;t share the OLPC&#39;s &#39;Sugar&#39; user interface, but will come bundled with applications such as Firefox and OpenOffice.&lt;/p&gt;  &lt;p&gt;The first version of the software is due out in June and will use a traditional user interface.&lt;/p&gt;  &lt;p&gt;Subsequent updates will move to a model where traditional applications are integrated with online services, said Red Hat chief technology officer Brian Stevens.&lt;/p&gt;  &lt;p&gt;&quot;It will take online services and integrate them richly into a client desktop, and make them first class citizens with the traditional applications,&quot; Stevens said in a keynote at the Red Hat Summit in San Diego.&lt;/p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-7434300132734165&quot;; google_ad_width = 120; google_ad_height = 90; google_ad_format = &quot;120x90_0ads_al_s&quot;; //2007-05-18: blogpost google_ad_channel = &quot;3871207440&quot;; //--&gt;&lt;br /&gt;&lt;/script&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;&lt;p&gt;Integrating online services with local data is required for the next-generation desktop, he argued. Data will be pulled onto the client using service oriented architectures (SOAs).&lt;/p&gt;  &lt;p&gt;&quot;To the user the desktop metaphor is dead. We don&#39;t believe that recreating a Windows paradigm in an open source model will do anything to advance the productivity in the life of users,&quot; Stevens added.&lt;/p&gt;  &lt;p&gt;&quot;Users aren&#39;t sitting in isolation anymore. The Windows paradigm doesn&#39;t have anything to add to the experience of the user.&quot;&lt;/p&gt;  &lt;p&gt;Stevens also unveiled a project that attempts to put a user&#39;s operating system on a USB stick. The software will execute as in a virtual compartment. &lt;/p&gt;  &lt;p&gt;Red Hat chief executive Matt Szulik stressed in his opening keynote at the event that reinventing the desktop was crucial for the company to enter the desktop market. If it merely copied Windows, the project would fail, he argued. &lt;/p&gt;  &lt;p&gt;&quot;Trying to become the appendage on the existing incumbent would become a failing solution. The landscape is littered with people that tried to subscribe into becoming a component of that infrastructure and that infrastructure,&quot; Szulik said.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/7962231849394680174/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/7962231849394680174' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/7962231849394680174'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/7962231849394680174'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/05/red-hat-to-build-global-desktop.html' title='Red Hat to build &#39;Global Desktop&#39;'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-2917246467494591552</id><published>2007-05-18T01:54:00.000+05:30</published><updated>2007-05-18T02:45:07.966+05:30</updated><title type='text'>What To Do When AdSense Serves The Wrong Ads</title><content type='html'>&lt;span style=&quot;font-size:14;&quot;&gt;&lt;/span&gt;&lt;strong&gt;&lt;/strong&gt;The most common frustrations among AdSense publishers are 1) Google serving inappropriate ads on their web pages, 2) low click-through rates and 3) low payouts per click।&lt;br /&gt;&lt;br /&gt;This article discusses the first frustration, which is highly correlated with the other issues, and discusses what webmasters can do to combat it.&lt;br /&gt;&lt;br /&gt;To begin, it is important to understand how Google determines what ads to serve via the AdSense program. This explanation goes back to April 2003 when Google acquired Santa Monica, CA-based Applied Semantics. Applied Semantics&#39; products are based on its patented CIRCA technology, which understands, organizes, and extracts knowledge from websites and information repositories in a way that mimics human thought and enables more effective information retrieval. A key application of the CIRCA technology is that it allows Google to, without human intervention, understand the key themes on web pages in order to deliver relevant and targeted advertisements.&lt;br /&gt;&lt;br /&gt;However, the CIRCA technology is not always accurate or appropriate to the page. For example, in a general web page about health topics, AdSense is currently serving ads for insulin even though only two words in one paragraph relate to insulin. Rather, the site is much more focused on dieting.&lt;br /&gt;&lt;br /&gt;&lt;table class=&quot;verdana&quot; bgcolor=&quot;#eeeeee&quot; width=&quot;375&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td align=&quot;center&quot; bgcolor=&quot;#000000&quot;&gt;&lt;table bgcolor=&quot;#ffffff&quot; width=&quot;100%&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td class=&quot;verdana&quot; align=&quot;center&quot; bgcolor=&quot;#ffffff&quot;&gt;LinksManager manages reciprocal links, and helps increase website traffic through linking with other like-minded quality sites -&gt; &lt;a href=&quot;http://action.ientry.net/?RC=36648&amp;AI=18099&quot;&gt;more info&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;One explanation may be that the CIRCA technology is tied to keyword pricing and inventory (e.g., AdWords advertiser daily budgets), and that AdSense serves ads that it hopes to maximize revenues. However, this often violates a critical AdSense rule - if the ads do not relate to the topic discussed on the web page, visitors will not click on them. Likewise, TopPayingKeywords.com always tells clients never to try and trick AdSense. That is, if customers are coming to your page from a link or advertisement for one topic (e.g., hair styles), never try to create a page about an unrelated topic (e.g., mortgages), just because that unrelated topic is an expensive keyword. While you will be serving expensive ads, because the topics are not correlated, visitors are unlikely to click on them.&lt;br /&gt;&lt;br /&gt;Getting AdSense to serve the correct ads is a trial-and-error process. In the health page example above, all it took to get AdSense to remove the insulin ads was to remove the paragraph in the text that mentioned insulin. Fortunately, AdSense often updates itself within just a few hours, so it&#39;s easy to keep modifying your site until the most relevant, and hopefully most expensive, ads are served.&lt;a href=&quot;http://www.toppayingkeywords.com/&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;center&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-7434300132734165&quot;;&lt;br /&gt;google_ad_width = 728;&lt;br /&gt;google_ad_height = 90;&lt;br /&gt;google_ad_format = &quot;728x90_as&quot;;&lt;br /&gt;google_ad_type = &quot;text_image&quot;;&lt;br /&gt;//2007-05-17: blog, site&lt;br /&gt;google_ad_channel = &quot;2333686664+1432552136&quot;;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-7434300132734165&quot;; google_ad_width = 728; google_ad_height = 90; google_ad_format = &quot;728x90_as&quot;; google_ad_type = &quot;image&quot;; //2007-05-17: blog google_ad_channel = &quot;2333686664&quot;; //--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;/center&gt;</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/2917246467494591552/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/2917246467494591552' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/2917246467494591552'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/2917246467494591552'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/05/what-to-do-when-adsense-serves-wrong.html' title='What To Do When AdSense Serves The Wrong Ads'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-7297081570120492829</id><published>2007-05-17T22:19:00.000+05:30</published><updated>2007-05-17T22:24:12.651+05:30</updated><title type='text'>Windows Server 2008 (Longhorn): A look inside the new features for Active Directory</title><content type='html'>&lt;span class=&quot;a3&quot;&gt;                Interest in Microsoft Windows Server 2008 (code-name Longhorn), the newest member of the Windows Server family, took a dramatic turn two weeks ago when Microsoft released beta 3 to the public. It certainly is big news within the Active Directory community, as a plethora of new features and changes have been included. While there is certainly plenty to talk about, now seems like a good time to review a few of the major points regarding Longhorn and Active Directory. &lt;p&gt;While I could write hundreds of pages on all the new features in Windows Server 2008, I have singled out two very significant features that will probably relate to most Active Directory deployments: the read-only domain controller (RODC) and server roles.&lt;/p&gt;  &lt;blockquote&gt;&lt;i&gt;&lt;b&gt;Note:&lt;/b&gt; Server roles incorporate a lot of the new features in Longhorn, so this is a pretty good list of those features.&lt;/i&gt;&lt;/blockquote&gt;  &lt;b&gt;Read-only domain controller (RODC)&lt;/b&gt;  &lt;p&gt;This is perhaps the marquee feature for Active Directory in Windows Server 2008. In Microsoft&#39;s continuing effort to improve the branch office scenario, this will be a giant step forward. &lt;/p&gt;&lt;br /&gt;&lt;p&gt;The RODC hosts a read-only copy of the Active Directory database. In addition, the administrator can determine which accounts will be replicated to the DC, and replication is unidirectional. This solves a lot of security issues at remote sites since it will minimize accounts exposed at the site (presumably not any admin accounts), and anything compromised at the site will not make it out of the site. Combined with the new BitLocker technology, RODC will allow deployment of DCs at smaller sites where it was not feasible before. &lt;/p&gt;  &lt;p&gt;&lt;b&gt;Server Core&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;Microsoft said at TechEd 2006 that Server Core was developed as a response to customer requests to provide a lean server operating system that would permit specific server functions to run without all the overhead of the GUI. That&#39;s right -- a Windows OS without a GUI! Well … almost. After logon, you will be presented with a desktop with no start menu, taskbar or icons, and two command windows. Installation of roles such as Dynamic Host Configuration Protocol (DHCP), DNS, file services and print server will be done completely from the command line.&lt;/p&gt;  &lt;p&gt;So why don&#39;t we just boot into a command environment and do away with the whole GUI thing? Because this environment will still allow you to open applications such as Event Viewer, notepad and others.&lt;/p&gt;  &lt;p&gt;In addition to making the server better defined for administrative purposes and reducing the hardware resources required, Server Core also permits better security at remote sites, allowing a smaller footprint of exposure.&lt;/p&gt;  &lt;p&gt;The core roles available include:&lt;/p&gt;  &lt;li&gt;&lt;b&gt;&lt;i&gt;Active Directory Domain Services&lt;/i&gt;&lt;/b&gt;&lt;/li&gt;  &lt;blockquote&gt;* &lt;i&gt;Auditing&lt;/i&gt; -- Allows auditing of &quot;Directory Service Changes&quot; to better track changes to Active Directory objects and attributes.  &lt;p&gt;* &lt;i&gt;Fine-Grained Password Policies (FGPP)&lt;/i&gt; -- Allows a more granular password policy to be applied to specific sets of users that will trump the policy set in the domain level Group Policy. FGPP is defined as an attribute in the AD and not implemented through Group Policy. (Should be a lot of fun to troubleshoot!) &lt;/p&gt;&lt;p&gt;* &lt;i&gt;Read-only domain controller&lt;/i&gt;  &lt;/p&gt;&lt;p&gt;* &lt;i&gt;Restartable Active Directory Domain Services&lt;/i&gt; -- How cool will it be to simply turn off the AD, perform tasks like offline database defragmenting, then turn it back on without a reboot? &lt;/p&gt;&lt;p&gt;* &lt;i&gt;Snapshot Viewer&lt;/i&gt; -- Think of this as a staged object recovery. It allows you to view a deleted object in multiple disk snapshots and determine which one to restore.&lt;/p&gt;&lt;/blockquote&gt;  &lt;li&gt;&lt;b&gt;&lt;i&gt;Active Directory Certificate Services (AD CS)&lt;/i&gt;&lt;/b&gt; -- There are many new features added in AD CS from Windows Server 2003.&lt;/li&gt;  &lt;li&gt;&lt;b&gt;&lt;i&gt;Active Directory Lightweight Domain Services (AD LDS)&lt;/i&gt;&lt;/b&gt; -- This is the new version of the Active Directory Application Mode (ADAM) product.&lt;/li&gt;  &lt;li&gt;&lt;b&gt;&lt;i&gt;Active Directory Rights Management Service&lt;/i&gt;&lt;/b&gt; -- The old Windows Rights management product gets new features such as delegation of administration, a new MMC interface, integration with AD Federated Services and, of course, it can be installed as a server role.&lt;/li&gt;  &lt;li&gt;&lt;b&gt;&lt;i&gt;DHCP server&lt;/i&gt;&lt;/b&gt;&lt;/li&gt;  &lt;li&gt;&lt;b&gt;&lt;i&gt;DNS server&lt;/i&gt;&lt;/b&gt;&lt;/li&gt;  &lt;li&gt;&lt;b&gt;&lt;i&gt;File Services&lt;/i&gt;&lt;/b&gt; -- This role includes Services for Network File System (NFS), some new NTFS features and the new Windows Server Backup, replacing the old NT Backup. Note that this new backup program does not support tape devices. However, the tape drivers are still available and can be used by third-party tape devices, including Microsoft&#39;s Data Protection Manager.&lt;/li&gt;  &lt;li&gt;&lt;b&gt;&lt;i&gt;Network Policy and Access Services&lt;/i&gt;&lt;/b&gt; -- This role includes network services such as VPN, RADIUS and dial up servers as well as routers and 802.11 wireless access. Network Access Protection (NAP) deployment is also included in this role.&lt;/li&gt;  &lt;li&gt;&lt;b&gt;&lt;i&gt;Print Server&lt;/i&gt;&lt;/b&gt;&lt;/li&gt;  &lt;li&gt;&lt;b&gt;&lt;i&gt;Streaming Media Services&lt;/i&gt;&lt;/b&gt; -- This role can be used to deploy streaming digital media content and manage Windows Media servers.&lt;/li&gt;  &lt;li&gt;&lt;b&gt;&lt;i&gt;Application Server&lt;/i&gt;&lt;/b&gt; -- This role provides an environment that allows applications to run. Features include IIS, .NET Framework v 3.0 and 2.0, ASP.NET, COM+, Message Queuing and Windows Communication Foundation (WCF).&lt;/li&gt;  &lt;p&gt;As you can see, that is quite a list, but it still doesn&#39;t cover everything. There are a lot of other features and improvements, such as the new Terminal Services Gateway and BitLocker drive encryption. These are some interesting features that you owe it to yourself and your company to explore. &lt;/p&gt;&lt;p&gt;I&#39;d also like to point out that according to Microsoft&#39;s upgrade roadmap, Longhorn will include all of the features in the Windows Server 2003 R2 release. This includes the important Distributed File System (DFS) improvements with the new DFS replication engine, plus the incorporation of Windows Services for Unix features such as NFS. Note that although R2 is &lt;i&gt;not&lt;/i&gt; a required upgrade for Windows Server 2003 or Longhorn Server, it &lt;i&gt;does&lt;/i&gt; allow the uses of new components that will be incorporated in Longhorn.   &lt;/p&gt;&lt;p&gt;You can &lt;a href=&quot;http://www.microsoft.com/windowsserver/longhorn/default.mspx&quot; target=&quot;_blank&quot;&gt;download the Longhorn Beta 3 bits&lt;/a&gt; from Microsoft. If you don&#39;t have a lot of spare hardware hanging around that will support Windows Server 2008, use Microsoft&#39;s free Virtual Server, VMware Server or Workstation. All these virtualization products allow you to build a Longhorn environment or a mixed mode Longhorn-Windows 2003 environment without risking hardware. Then again, I don&#39;t need to tell you all the virtues of virtualization. &lt;/p&gt;&lt;p&gt;So with that, I encourage you to get the downloads, start exploring and watch for future articles in this space.  &lt;/p&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/7297081570120492829/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/7297081570120492829' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/7297081570120492829'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/7297081570120492829'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/05/windows-server-2008-longhorn-look.html' title='Windows Server 2008 (Longhorn): A look inside the new features for Active Directory'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-972375674426258909</id><published>2007-05-07T16:34:00.000+05:30</published><updated>2007-05-07T16:34:19.444+05:30</updated><title type='text'>OpenLDAP Software 2.3 Administrator&#39;s Guide: Introduction to OpenLDAP Directory Services</title><content type='html'>&lt;a href=&quot;http://www.openldap.org/doc/admin23/intro.html&quot;&gt;OpenLDAP Software 2.3 Administrator&#39;s Guide: Introduction to OpenLDAP Directory Services&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;       Notes for Configuring Openldap for Linux.</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/972375674426258909/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/972375674426258909' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/972375674426258909'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/972375674426258909'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/05/openldap-software-23-administrators.html' title='OpenLDAP Software 2.3 Administrator&#39;s Guide: Introduction to OpenLDAP Directory Services'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-1469617145784101010</id><published>2007-04-03T17:37:00.000+05:30</published><updated>2007-04-03T17:37:33.293+05:30</updated><title type='text'>tcp_forward</title><content type='html'>&lt;a href=&quot;http://marginalhacks.com/bin/tcp_forward&quot;&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/1469617145784101010/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/1469617145784101010' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/1469617145784101010'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/1469617145784101010'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2007/04/tcpforward.html' title='tcp_forward'/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-37006439.post-116262401981641080</id><published>2006-11-04T12:34:00.000+05:30</published><updated>2006-11-04T12:38:37.260+05:30</updated><title type='text'></title><content type='html'>Hi Pals,&lt;br /&gt;&lt;br /&gt;Share something which is useful to all in this blog.&lt;br /&gt;You can post urls and anything which is useful here.</content><link rel='replies' type='application/atom+xml' href='http://prajish.blogspot.com/feeds/116262401981641080/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/37006439/116262401981641080' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/116262401981641080'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/37006439/posts/default/116262401981641080'/><link rel='alternate' type='text/html' href='http://prajish.blogspot.com/2006/11/hi-pals-share-something-which-is.html' title=''/><author><name>Prajish</name><uri>http://www.blogger.com/profile/17861492904685427379</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='19' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj61S2-dlEWgCQgIWYMg5WjwT9MN7h5dvLGthuPYcF-hBvI2GWARrZK8dOBe7vR_qkCvQ06YtGjrkWHqmxQHWfdD9GKmvTYs0tM-Xsmrt4IrLOzakElY66PVglXXl1egQ/s220/MeBoxingHead.jpg'/></author><thr:total>0</thr:total></entry></feed>