Sunday, November 2, 2008

Different Microsoft Processes And What Are They?

Most of us would have tried a three finger trick on XP and further OS by microsoft..The combination of alt+ctrl+del gives us the taskmanager..Here under processes you can get a number of process that are running.Have you ever wondered what exactly these processes do??Read more to know....

Svchost:In software Svchost.exe is a generic host process name for services that run from dynamic-link libraries (DLLs) within the Microsoft Windows operating system.At startup, Svchost.exe checks the services part of the registry to construct a list of services that it must load. Multiple instances of Svchost.exe can run at the same time. Each Svchost.exe session can contain a grouping of services. Therefore, separate services can run, depending on how and where Svchost.exe is started. This grouping of services permits better control and easier debugging, but it also causes some difficulty for end users wishing to see the memory usage or vendor legitimacy of individual services and processes.

Winlogon.exe:In computing, Winlogon is the component of Microsoft Windows operating systems that is responsible for handling the secure attention sequence, loading the user profile on logon, and optionally locking the computer when a screensaver is running (requiring another authentication step). The actual obtainment and verification of user credentials is left to other components. Winlogon is a common target for several threats that could modify its function and memory usage. Increased memory usage for this process might indicate that it has been "hijacked".

Lsass.exe:Local Security Authority Subsystem Service (LSASS), is a process in Microsoft Windows operating systems that is responsible for enforcing the security policy on the system. It verifies users logging on to a Windows computer or server, handles password changes, and creates access tokens. It also writes to the Windows Security Log.Should the lsass.exe program end, for example, by the Sasser worm's effects, then a countdown timer will appear on the screen, advising the user to save their work and close all programs before Windows shuts down. This timer, however, can be thwarted by changing the computer's date and time settings or by executing the shutdown -a command.

Ctfmon.exe:ctfmon (ctfmon.exe) is a process used by Microsoft Office to activate the Alternative User Input Text Input Processor (TIP) and also the Microsoft Language Bar. Ctfmon is also a component of Windows XP Tablet PC Edition and Windows Vista which enables advanced user input services in applications (pen and ink, speech etc)

Hkcmd.exe:hkcmd.exe is installed alongside Intel multimedia devices and allows configuration and diagnostic options for these devices. This program is a non-essential process, but should not be terminated unless suspected to be causing problems.

Explorer.exe:explorer.exe is the Windows Program Manager or Windows Explorer. It manages the Windows Graphical Shell including the Start menu, taskbar, desktop, and File Manager. By removing this process the graphical interface for Windows will disappear. This program is important for the stable and secure running of your computer and should not be terminated.

Note: explorer.exe is a process which is registered as a trojan. This Trojan allows attackers to access your computer from remote locations, stealing passwords, Internet banking and personal data. This process is a security risk and should be removed from your system.

These are some of the important system processes


Saturday, November 1, 2008

The Open Sceince Project

The OpenScience project is dedicated to writing and releasing free and Open Source scientific software. We are a group of scientists, mathematicians and engineers who want to encourage a collaborative environment in which science can be pursued by anyone who is inspired to discover something new about the natural world.

Much of the work of science depends on having appropriate tools available to analyze experimental data and to interract with theoretical models. Powerful computers are now cheap enough so that significant processing power is within reach of many people. The missing piece of the puzzle is software that lets the scientist choose between models and make sense of his or her observations. That is where the OpenScience project can help.

They currently have 6 interrelated projects:

* Collecting links about and providing a home for Open Source scientific software projects.
* Advocacy for a distributed model of doing scientific research.
* OOPSE, an open implementation of a force-field based molecular dynamics program for use in chemical and biochemical simulations.
* Jmol, an Open Source Java/Swing based molecular dynamics viewer.
* JChemPaint, an Open Source Java/Swing based molecular structure editor.
* LinkWeaver, an Open Source collection of shell scripts, html, and PHP3 files for managing hierarchical trees of links. is also a place to park a blog for Dan Gezelter, the director of the project. He’s a chemistry professor at Notre Dame who specializes in theoretical and computational chemistry. He’s also an open source evangelist, the original author of Jmol, and the leader of the OOPSE development group.


How to Reset your Ubuntu Password if forgotten

This tutorial would help you Reset your Ubuntu system's Password easily in a few minutes.This is pretty simple to do and requires no expertise whatsoever.Just follow the instructions below and you should be able to reset your ubuntu password.This can be used when you have forgotten your ubuntu password which gives you no access to the machine.So here's how you do it.

Step 1 : When your PC boots, You should see the Grub Menu . Hit the ESC key(escape) as soon as you see the Grub Menu as it would show for only 5-10 seconds
Step 2 : Once that is done Select the Recovery Mode option and then choose "Drop to root shell prompt" from this menu.
Step 3 : Now You would have the root shell prompt.
Step 4 : Enter the following command to reset your Password passwd username where username would be the username of the ubuntu machine of which the password you have forgotten.For example : - passwd hemanth where hemanth is my username
Step 5 : Then type sync and hit ENTER and then restart your pc
Step 6 : Now you should be able to access your ubuntu account without any problem using the new password you created in step 4


Tuesday, October 28, 2008

Data Execution Prevention:-Troubles Caused

Recently whenever i tried to execute some of the programs i used to get the DEP error.Although the information given was satisfactory i decided to go a bit deep into it and check it out..I found an article that was very good for this problem.Here it goes

When you run a program in Microsoft Windows XP Service Pack 2 (SP2) or in Windows XP Tablet PC Edition 2005, you may receive an error message that is similar to the following:

Data Execution Prevention – Microsoft Windows
To help protect your computer, Windows has closed this program.
Name: program name
Publisher: program publisher

Data Execution Prevention helps protect against damage from viruses or other threats. Some programs might not run correctly when it is turned on. For an updated version of this program, contact the publisher. What else should I do?

If you click Close Message, the program quits, and Windows Error Reporting gives you the option to send an error report.

Back to the top
This behavior occurs because Microsoft Windows XP SP2 uses the Data Execution Prevention (DEP) feature to help prevent damage from viruses and from other security threats.

DEP works alone or with compatible microprocessors to mark some memory locations as "non-executable." If a program tries to run code from a protected location, DEP closes the program and notifies you, whether the code is malicious or not.

Back to the top
To avoid this behavior, contact your program vendor to see if an update is available that enables the program to work correctly with DEP.

Back to the top
If your computer is set to apply DEP to all programs and services, the DEP error message will have a Change Settings button. If an update to the program is not available, follow these steps to add an exception for the program from the DEP error message:
1. When you receive the error message that is mentioned in the "Symptoms" section, click Change Settings.
2. Click to select the check box next to the program, and then click Apply.
3. When you are prompted to restart your computer, click OK two times, and then restart your system.

You can also add an exception for the program by using System Properties in Control Panel. To do this, follow these steps:
1. Click Start, click Run, type sysdm.cpl, and then click OK.
2. Click the Advanced tab, click Performance, and then click Settings.
3. In Performance Options, click the Data Execution Prevention tab, and then click Add.
4. In the Open dialog box, locate and then click the program.
5. Click Open, click Apply, and then click OK. When you are prompted to restart your computer, click OK.

Back to the top
This behavior is by design.

Back to the top
If your computer is configured to turn on DEP for essential Windows programs and services only, the Change Settings button will not be available from the DEP error message.

You can view the DEP configuration for your computer in System in Control Panel. To do this, follow these steps:
1. Click Start, click Run, type sysdm.cpl, and then click OK.
2. Click the Advanced tab, and then under Performance, click Settings.
3. In the Performance Options dialog box, click the Data Execution Prevention tab.
4. Note if Turn on DEP for essential Windows programs and services only or Turn on DEP for all programs and services except those I select: is selected.
When your computer is configured to turn on DEP for essential Windows programs and services only, you cannot add an exception for a program. This is the behavior that is by design in Windows XP SP2.

If your computer is configured to turn on DEP for essential Windows programs and services only, and the DEP error message continues to appear, a program may be installed that extends Windows functionality. This program may be installed so that it causes a DEP problem in an important Windows program or service.

If this behavior is recent and has not occurred before, you may be able to prevent the DEP error message by removing recently installed programs.

Back to the top
For additional information about the DEP feature in Windows XP Service Pack 2, click the following article number to view the article in the Microsoft Knowledge Base:
875352 ( A detailed description of the Data Execution Prevention feature in Windows XP Service Pack 2


Sunday, October 26, 2008


Unfortunately i had to change my personal blog url to the one indicated above.Sorry for the trouble if any caused..
The blog address has been mentioned below as a link.

Personal Blog


Saturday, October 18, 2008

Port Forwarding in PpoE mode in UT300R2U Modem

I made this tutorial cos everybody wants to know an easy and best way to port forward Mu torrent. so this is it. this works for any modem as long as you know how to get to your main settings for Your modem like i do in which i am going to show u all.This primarily concentrates on Ppoe mode of Configuration.I have used a client like Mu torrent and My connection Is BSNL..On every other system almost all of this part is similar.This is for the modem UT300r2u.

Go to Mu torrent
options-> preferences-> connection

and in connection on the right hand side untick the LITTLE box which says RANDOMIZE PORT EACH TIME MU TORRENT STARTS [if ticked].
Like The Way I Have Unticked It From The Rest.

If u Dont Know Ur IP address then go to Start-> Run
In Run, Type-> cmd
In cmd window, type-> ipconfig/all

Look For Ur IP Address. and Note It Down First.
Above is the address for my modem main settings. This is step 1 the most essential part which u need to know for your modem.The address i have mentioned is the same for all the bsnl users.
Step 2: is when it asks u for username and password and if your username is admin, and password is admin(unless you have changed it), then type accordingly...

Click on the advanced setup option and click on NAT->DMZ host.
In DMZ Host Type Ur IP Address and click "save/apply".

Once u have clicked save/apply then click on Management.Under Management Click on Save/Reboot.

In Control Panel U Have to open Windows Firewall...
Then U Have to Click on Exepctions Tab in Windows Firewall,and Exceptions Tab, click on Add Port and u shall see a window like the one Below.

Now u may enter the name and port as i have done or u may assign a different name and port for mu torrent.
Once u r done entering the name and the port, click ok and then again click ok to close the Windows Firewall Exceptions Tab and Window.

Open MU TORRENT and click OPTIONS on top, In OPTIONS select SPEED GUIDE and this is what u should be seeing...

Now next to Current Port, type the same Port Number which u typed in the Windows Firewall Exceptions Tab where u Added A Port.Do It Like The Way I Did... and then click on Test if port is forwarded properly.if it has been forwarded properly [And anyways It Should].
Then It Will show u a green patch across the port number.
Once that is done then In SPEED GUIDE window u can click on USE SELECTED SETTINGS.

And u will know this when u look at the bottom portion of utorrent... u will notice a green circle with a white tick inside it.That means all connections are perfect.



How to speed up downloads in a torrent client?

Every one needs and wishes to speed up their torrent downloads,and to do that u have to do some thing called as Port Forwarding.

What is Port Forwarding?

Port forwarding allows remote computers (e.g. public machines on the Internet) to connect to a specific computer within a private LAN.
•The need to forward the packets that come to the router's forwarded port as well as the need to rewrite them so that the machine to which the port is forwarded can reply to the original source address, which in turn leads to the inability of the destination (private) machine to see the actual originator of the forwarded packets, and instead see them as if originating from the router
•Only one networked machine can use a specific forwarded port at one time
•Traditional port forwarding allows the entire world access to the forwarded port, slightly reducing network security.
There are two types of Connection that are possible while connecting to internet..
•Bridge Mode-where you are using your computer to establish a connection to internet.
•PpoE mode-where you are using your modem(router) to establsih connection to internet.

Port Forwarding is required only if your internet connection is in the PpoE mode else all that you have to do is Open your port to achieve good speeds..
To open you port go to Windows Firewall->Click on the exceptions tab->Click on Add port option there->Check the port no that has been used in Torrent by clicking speed guide under options menu->Give a name for your port and give the port no.Save and exit you are done with port opening in Bridge mode.

However Ppoe mode requires a bit of complex settings.I will deal with Port Forwarding In Ppoe mode in next post.


Thursday, October 16, 2008

Microsoft Update Is a Trojan

Hackers are trying to infect innocent computer users with a malicious Trojan horse disguised as a Microsoft security update, in the hours before the software giant issues genuine critical patches as part of its monthly Patch Tuesday cycle, according to security firm Sophos.

The emails, which have the subject line `Security Update for OS Microsoft Windows' claims to have come from Steve Lipner at

The email tells unsuspecting computer users that the attached file is a high-priority update and needs to be installed by users of various versions of Microsoft Windows.

However, running the attached file infects Windows computer users with the Mal/EncPk-CZ Trojan horse, and could give hackers control over your PC. The file attached to the file is named KBxxxxxx.exe (where ‘xxxxxx’ is a randomly generated number) in order to disguise itself as a knowledgebase file.

Sophos is intercepting the malicious emails spammed out by the hackers, which read as follows:

Dear Microsoft Customer,

Please notice that Microsoft company has recently issued a Security Update for OS Microsoft Windows. The update applies to the following OS versions: Microsoft Windows 98, Microsoft Windows 2000, Microsoft Windows Millenium, Microsoft Windows XP, Microsoft Windows Vista.

Please notice, that present update applies to high-priority updates category. In order to help protect your computer against security threats and performance problems, we strongly recommend you to install this update.

Since public distribution of this Update through the official website Microsoft Corporation would have result in efficient creation of a malicious software, we made a decision to issue an experimental private version of an update for all Microsoft Windows OS users.

As your computer is set to receive notifications when new updates are available, you have received this notice.

In order to start the update, please follow the step-by-step instruction:
1. Run the file that you have received along with this message.
2. Carefully follow all the instructions you see on the screen.

If nothing changes after you have run the file, probably in the settings of your OS you have an indication to run all the updates at a background routine. In that case, at this point the upgrade of your OS will be finished.

We apologise for any inconvenience this back order may be causing you.

Thank you,

Steve Lipner
Director of Security Assurance
Microsoft Corp

Awarness is better than Cure.....


Tuesday, October 14, 2008

Antivirus will soon become Obsolete

Antivirus software on your PC could soon be a thing of the past: US engineers have developed a new approach to malicious software detection using ‘cloud computing’, where applications are provided through the Internet.

Traditional antivirus software is becomign increasingly ineffective due to severe vulnerabilities in their engine. The boffins observed malware – malicious software – detection rates as low as 35 per cent against the most recent threats.

The new approach, called CloudAV, moves antivirus functionality into the “network cloud” and off PCs. CloudAV analyses suspicious files using multiple antivirus and behavioural detection programmes simultaneously.

“Our CloudAV virtualises and parallelises detection using multiple antivirus engines, significantly increasing overall protection,” said Farnam Jahanian, professor of computer science at the University of Michigan.

CloudAV is a production quality in-cloud anti virus system, which includes a lightweight, cross platform host agent (Win32, Linux, FreeBSD, Sendmail/Postfix milter, Nokia Maemo) and a network service with ten antivirus engines (Avast, AVG, BitDefender, ClamAV, F-Prot, F-Secure, Kaspersky, McAfee, Symantec, and Trend Micro) and two behavioral detection engines (Norman Sandbox, CWSandbox).

This whole idea is pretty similar to using ThreatFire along with any other anti-virus software, as ThreatFire, keeps the system safe by doing the behavioral analysis of programs making you safe against Zero day threats, whereas another anti-virus will provide the database for already known viruses.

To develop this novel approach, the researchers evaluated 12 traditional antivirus programs – Avast, AVG, BitDefender, ClamAV, CWSandbox, F-Prot , F-Secure , Kaspersky, McAfee, Norman Sandbox, Symantec and Trend Micro – against 7,220 malware samples, including viruses.

Traditional antivirus checks documents and programmes as they are accessed. Because of technological constraints, only one anti-virus detector is typically used at a time.

CloudAV, however, uses 12 different detectors together to determine the safety of any new document or programme received. It is accessible via any computer or mobile device that runs a simple software agent.

The new approach also caches analysis results, speeding up the process compared with traditional antivirus software. This could be useful for workplaces, for example, where multiple employees might access the same document.

CloudAV could also be used in cell phones and other devices that aren't robust enough to carry powerful antivirus software, the scientists said.

More about


Saturday, October 11, 2008

Railwire-The ISP By Indian Railways

Railtel, a public sector organisation under the Railways taking care of the transport behemoths telecommunication aspects, is now planning to exploit its vast reach by providing high speed broadband connectivity.

The venture will be initiated in Karnataka, at Bellary, Tumkur and a small pocket in Whitefield before being extended across the country. It is expected to begin within two months.

Christened “Railwire”, the initiative’s aim is to provide an application driven network with high speed access to the internet at an affordable cost. Given the low PC penetration, Railtel also plans to manufacture “Thin client PCs”, ranging between Rs 4,000 and Rs 5,000, in association with a partner.

iRW002 256 Kbps Rs.320
iRW004 512 Kbps Rs.620
iRW006 1 Mbps Rs.920
iRW008 2 Mbps Rs.1220
iRW010 4 Mbps Rs.2120
iRW012 8 Mbps Rs.3620
iRW014 16 Mbps Rs.6920
iRW016 32 Mbps Rs.13520

Port speeds are on 1:4 contention ratio
Contention ratio is the ratio in which no. of users content for bandwidth on the same port. In short, 4 people will be using the same port/card at the DSLAM in the exchange. So, if the port/card is 4Mbps, then it's contented between 4 users.It means that you will get anywhere between 25% to 100% of the mentioned speed.
Priyatam is offline Add to Priyatam's Reputation Report Post Reply With Quote


Upgrading To Ubuntu 8.10

In case you want to upgrade to the available Beta version from current Hardy to this version,Follow the below steps----->
press Alt+F2 and type in "update-manager -d" (without the quotes) into the command box.
Update Manager should open up and tell you: New distribution release '8.10' is available.
Click Upgrade and follow the on-screen instructions.

Significance of Release----->I had been wondering what might be the significance of these numbers in versions,But it is only after i saw this i realized that 8.04(2008 April Release),8.10(2008 October release)


Thursday, October 9, 2008

Wednesday, October 8, 2008

Rejected by Google Adsense

Even though i had taken care of most of the things while applying for google adsense My application got rejected stating that i had chat site on my blog..I really did not have anything like that.
But how could i understand the complex algorithm that adsense people look at.
Then i came to know from the Admin of that the Third party addons that i had installed on my blog had caused the problem with many Other things like Inclusion of copied content...
I hope to rectify my problems soon and re-apply for adsense...


5 things before you go Online to keep your PC safe.

5 steps to help protect your new computer before you go online

Published: January 8, 2007
Protect Your Computer with Latest Security Tools

The most important aspect of setting up a new computer is to ensure your system has the latest updates and security software installed.

Make sure these are downloaded and installed to help defend against viruses and other potential threats before you connect to the Internet.

And once you're connected, it's equally important to update the operating system and antivirus software on a regular basis.

The following steps will help you set up your new computer with the latest security tools available.

Step 1: Verify firewall

If you're running Windows Vista or Windows XP Service Pack 2 (SP2), you should already have Windows Firewall running, and you can proceed to Step 2.

To see what operating system your computer is running, click Start, My Computer, and then click View system information to open the System Properties window. This information is listed on the General tab under System.

Screenshot of System Propeties window

System Properties window


Tip: With Windows Vista or Windows XP SP2 installed, you can manage Windows Firewall and other security settings in one place to help protect your computer. If you don't have SP2 installed or do not wish to install it, see How to Enable Internet Connection Firewall in Windows XP.

Step 2: Get software updates

Turn on Automatic Updates.

Plug in your modem or network cable for Internet access.

Click Start and point to Control Panel. Select Network Connections in the Control Panel.

Choose Create a new connection to start the Network Connection Wizard.

After you're connected, allow Microsoft Update to install the latest security and software updates.

After all updates are installed and your settings are defined, you're ready to surf the Internet.

Just remember that it's important to be diligent with computer security technologies, so run Microsoft Update regularly, check the latest downloads and product updates, keep Automatic Updates turned on, and be aware of the latest security threats.

Step 3: Download antivirus software

Review the inventory or packing list that came with your computer to make sure the hard disk has all the listed software installed and the original installation CDs are there. This bundle typically includes security software from a recognized computer security company.

In most cases, a trial version of this software should have been preinstalled on the computer or included on a disk. If it wasn't, contact the computer manufacturer for a replacement.

If security software wasn't included with the original order, you should obtain and install antivirus software before continuing.

Microsoft offers Windows Live OneCare, a comprehensive service that helps protect your computer from many different kinds of threats, inlcuding viruses.

Step 4: Download antispyware software

After you've confirmed that you have antivirus software, you should confirm that you have antispyware software. To find out why you need both, see What's the difference between spyware and a virus?

Microsoft offers Windows Defender to help protect against spyware and other unwanted software. If your computer is running Windows Vista, you already have Windows Defender. If your computer is running Windows XP, you can download Windows Defender for free.

Step 5: Record system information

It's a good idea to record your computer's system information in case a technician needs it later. To do so:

Click Start, then Run, and type "msinfo32" in the text field. Click OK to open the System Information window.

Screenshot of System Information window

System Information window

In the window, on theFile menu, click Export.

Name the file and save it to an external storage device such as a blank CD or thumb drive, and store it in a safe place.

Note: Windows Live OneCare also offers easy file backup and restore.

You should also keep the Windows installation CDs and related product key handy.


Ubuntu 8.10 release dates and Schedules

  • 12 June 2008 - Alpha 1 release
  • 3 July 2008- Alpha 2 release
  • 24 July 2008 - Alpha 3 release
  • 14 August 2008 - Alpha 4 release
  • 4 September 2008 - Alpha 5 release
  • 18 September 2008- Alpha 6 release
  • 2 October 2008- Beta release
  • 23 October 2008 - Release Candidate
  • 30 October 2008- Final release of Ubuntu 8.10

Development began with the Ubuntu 8.10 Linux kernel 2.6.26 compared to the version 2.6.24 in Ubuntu 8.04. Recently, it was decided to use the kernel 2.6.27 instead. The main reason for the change is to avoid having to update the kernel and the majority of cases 2.6.27.

This is unusual for a release of Ubuntu, in general, the kernel has been updated in two versions. The last time that the heart was improved in three versions have been sent to Ubuntu Ubuntu 7.04 (nervous, Feisty 2.6.17 and 2.6.20).

The final number at the heart of strange that the heart of wider changes in the heart of even-numbered. However, up to two strange, and is considered stable kernels. The new Linux kernel has been tested! Updated installation of Ubuntu 8.10 is now included in it.


Ubuntu 8.10 Intrepid Ibex Beta Release is out!

With Hardy now past feature-freeze it's time to start to plan
features that are being lined up for inclusion after Ubuntu 8.04 LTS
is released in April.

And so I'd like to introduce you to the Intrepid Ibex, the release
which is planned for October 2008, and which is likely to have the
version number 8.10.

During the 8.10 cycle there will be venturing into interesting new
territory, and they need the rugged adventurousness of a mountain
goat to navigate tricky terrain. The desktop offering will once
again be a focal point as we re-engineer the user interaction model
so that Ubuntu works as well on a high-end workstation as it does on
a feisty little subnotebook. there will also be reaching new peaks of
performance - aiming to make the mobile desktop as productive as

A particular focus for Ubuntu Developers will be pervasive internet access, the
ability to tap into bandwidth whenever and wherever you happen to
be. No longer will you need to be a tethered, domesticated animal -
you'll be able to roam (and goats do roam!) the wild lands and
access the web through a variety of wireless technologies. We want
you to be able to move from the office, to the train, and home,
staying connected all the way.

The Intrepid Ibex will take shape at our next Ubuntu Developer
Summit, an open event to which members of the Ubuntu community,
upstream communities, corporate developers and other distributions
are all invited. That summit takes place in beautiful Prague, in the
Czech Republic from 19th - 23rd May 2008. Together we will draw up
detailed blueprints for Ubuntu 8.10. Please join us there to help
define the Intrepid Ibex:

Ubuntu 8.10 will be our ninth release, and the fourth anniversary of
the first release - 4.10. In those four years, Ubuntu has grown as a
project, an ethos and a community. The Ubuntu community have worked
to set the benchmark for open, inclusive, and collaborative
development processes. They have open specifications, open governance
structures and a willingness to empower everyone to make their
unique contribution to the success of the project.

This has created an extraordinary diversity in participation; a
depth of talent including packagers, programmers, translators,
writers, testers, advocates, technical support, artists and many
others. Those contributions come as much from the corporate world -
Canonical and other companies that have embraced Ubuntu as a core of
their offering - as from a huge number of individual professionals.
It is this combination of expertise and perspectives that makes it
such a pleasure for me to be part of this project, and I thank all
of you for your continued passion, participation, and energy.

Hardy is their best development cycle yet, delivering on our promise
of reliability and stability for the Heron. We must stay focused on
that goal. To the extent that you have a brilliant idea for the
future, you now have a peg to hang it on - the Intrepid Ibex. When
the Hardy Heron has taken flight we will engage fully with the Ibex.
Give it horns!


Tuesday, October 7, 2008

Check out the all New Windows 7 Interface which was formerly known as Blackcomb and Vienna) is the successor of Windows Vista. Windows 7 is expected to be released sometime in 2010.Hope it is a Much more Reliable OS than VISTA..


Thursday, October 2, 2008

The Troublesome Muhaha Virus!!!!

How to remove Orkut Virus: Muhaha!!

Well a friend got the Problem, with this problem i think this Virus again in Action.
Now how to get ride this.. A quick way for orkut addicted those who want a quick access to orkut is as follows..

► Press alt+ctrl+del and goto processes tab

► There you will see a list of processes under the different username, arrange the processes according to your username and search for the process svchost.exe

► Right click and end process or end process tree. Make sure you end the imagename or process which are under your username and not that which are under LOCAL SERVICE OR NETWORK SERVICE.

► This gives you instant access to orkut..

A Similar of this variant gives you error on opening firefox.


The above 4 Steps solution works for the same..

Now a fix to permanently get rid of this nuisance, this pulls the interest of my friends who called me up and took help to access their orkut accounts instantly..

Follow as :-


► Click start->run type c:\heap41a and press Enter. You cannot find this folder by looking through windows explores i.e. My Computer, as this is a hidden folder.

► Delete all the files under this folder by pressing ctrl+a followed by shift+del key

► Now again goto Start->Run and write regedit, this opens registry editor for you.

► Press ctrl+f , a find dialog box opens, type heap41a and let it show you some results

► You should see "[winlogon] C:\heap41a\svchost.exe C:\heap(some number)\std.txt"

► Now delete whatever you see there :D cause you love orkut .. hahahah

Well your PC/LP is cleaned up and now you can open your orkut account without that nuisance.

Make sure you delete all the .exe files which are present at the root of ur pendrive which got created automatically(which you never created). Rather scan your pen drive with a good antivirus.. That should allow you stealth your PC from the attack of MUHAHA

Other Effects

Well this worm/virus removes hidden folder options or you are unable to see hidden folders. so enable the hidden folder option follow the steps as :-

► Goto Start->run type regedit again to open registry editor

► traverse as HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer3.

►There you will see a DWORD key as "NoFolderOptions" . Set its value to 0 or simply delete it


Wednesday, October 1, 2008

My headphone troubles in UBUNTU

This has been annoying me from a very long time,say about 1 month. I installed the Ubuntu 8.04
heron. The OS is so good with all those features,but MY headphones are not working...This had made me very sad.I am hoping to find a solution,i have also posted a screenshot of The output of alsamixer.


Tuesday, September 30, 2008

That's Me


Your Guide To Free Softwares-II

Image Editors software

Photoscape 3.1
Photoscape : Free Photo Editing Software Download
Irfan View
IrfanView - Official Homepage - one of the most popular viewers worldwide
GIMP - The GNU Image Manipulation Program
Faststone Image Viewer 3.6
FastStone Image Viewer, Screen Capture, Photo Resizer ...

Graphics creation softwares

Blender 2.46 - Blender 2.46
DAZ studio
DAZ Productions - 3D Models, 3D Content, and 3D Software
Google Sketchup
Google SketchUp


Skype official website – download Skype free now for free calls and internet calls
ManyCam Virtual webcam 2.3.7
Download ManyCam free virtual webcam and webcam graphics software!
Welcome to ICQ 6 - ICQ Downloads -
Yahoo messenger 8
Yahoo! Messenger - Chat, Instant message, SMS, PC Calls and More
mIRC: Download mIRC
MSN messenger
Windows Live Messenger
Google Talk
Google Talk - Chat online and make free internet calls


Mozilla Thunderbird
ePrompter 2.0
Cactus Spam filter 2.13
Email Tracker pro 2008 8.od

Archieve extracter

Universal Extractor

Download Managers

Download Accelerator pro
DownThem All add on for firefox
Flash Get


WordWeb 5.51


World Wide telescope
Stellarium 0.9.1
Broadband speed test 1.3
Bandwidth Monitor pro 1.3


Excel calendar template 1.4
Master Converter
Virtual fashion Makup 1.0,...348539s,00.htm


Your Guide to free Softwares-I

System information Software

* cpu-z --> cpu Information

* CrystalcpuID --> cpu information

* Everest Home Edition --> System information

* sisoft sandra --> System Software

* speedfan-->Hardware Monitor

Bench Marking softwares

* 3dmark 06 -->3D gaming performance benchmarking

* Prime 95 -->CPU Benchmarking

GUI enhancements

* Rocketdoc-->Docklet

* Lclock --> Windows longhorn clock

* Folderico --> Folder icons

* Royale theme

* Windows vista transformation pack

* Flyakiteosx theme --> Mac OS X theme for Windows xp

* Icolor folder -->Icons for windows

CD/DVD softwares

* CDBurnerXp --> CD/DVD Burner

* DVD Shrink --> DVD ripper

Audio Players/Codecs

* WinAmp --> Player

* Audocity --> Audio editing

* AC3 Filter -->Audio Codec pack

* K-Lite Codec --> Codec Pack for Videos


Xenon Processor Continued

Miscellaneous Xenon Hardware Notes

Some additional notes:
•Xenon is a big-endian system. Both the CPU and GPU process memory in big-endian mode. Games ported from little-endian systems such as the Xbox or PC need to account for this in their game asset pipeline.

•Tapping into the power of the CPU is a daunting task. Writing multithreaded game engines is not trivial. Xenon system software is designed to take advantage of this processing power wherever possible. The Xbox Advanced Technology Group (ATG) is also exploring a variety of techniques for offloading graphics work to the CPU.

•People often ask if Xenon can be backward compatible with Xbox. Although the architecture of the two consoles is quite different, Xenon has the processing power to emulate Xbox. Whether Xenon will be backward compatible involves a variety of factors, not the least of which is the massive development and testing effort required to allow Xbox games run on Xenon.


Xenon-The XBOX 360 Processor

The Xenon game disc drive is a 12× DVD, with an expected outer edge throughput of 16+ MB/sec. Latency is expected to be in the neighborhood of 100 ms. The media format will be similar to Xbox, with approximately 6 GB of usable space on the disk. As on Xbox, media will be stored on a single side in two 3 GB layers.

Industrial Design
The Xenon industrial design process is well under way, but the final look of the box has not been determined. The Xenon console will be smaller than the Xbox console.
The standard Xenon controller will have a look and feel similar to the Xbox controller. The primary changes are the removal of the Black and White buttons and the addition of shoulder buttons. The triggers, thumbsticks, D-pad, and primary buttons are essentially unchanged. The controller will support vibration.

Xenon Development Kit
The Xenon development environment follows the same model as for Xbox. Game development occurs on the PC. The resulting executable image is loaded by the Xenon development kit and remotely debugged on the PC. MS® Visual Studio® version 7.1 continues as the development environment for Xenon.

The Xenon compiler is based on a custom PowerPC back end and the latest MS® Visual C++® front end. The back end uses technology developed at MS for Windows NT on PowerPC. The Xenon software group includes a dedicated team of compiler engineers updating the compiler to support Xenon-specific CPU extensions. This team is also heavily focused on optimization work.
The Xenon development kit will include accurate DVD emulation technology to allow developers to very precisely gauge the effects of the retail console disc drive.


Getting started with the Computer World

Now let me start this blog about posting all the computer information and stuff.
Now for all those who wanted to buy a computer and get started i have given below some good prices in mysore for some very good configuration Assembled PC's.Now the advent of technologies at lower prices makes you have a very powerful computer at a very reasonable price.The price is in my city and might vary a bit in your's

Intel core2duo 2.43 GHz Rs5250
Intel Quad core Rs 8600
Intel Dual core Rs 3900

Intel DG35(latest) Rs4600
Intel DG33 Rs3250
Intel DG31 Rs2800

Go for only transcend or kingston RAM's
2GB ram Rs1650
4GB ram Rs3300

Choose a wise cabinet with SMPS and good looks that will handle your temperature of the CPU well and the one that has good fans for cooling
Good cabinet Rs1000-1500

Nvidia 256mb/512mb graphics card Rs1600/Rs2400

250GB /500 GB Sata Hard Drive Rs 2250

LG15"/17" Monitor LCD screen Rs7100/Rs7800

Logitech Keyboard mouse combo Rs700

LG 18X DVD RW Optical drive Rs1100

Creative inspire 2.1/5.1 Speakers Rs1200/3150

APC UPS 500VA Rs 2250

Hp color printer Rs1650

Headphones Zebronics with MIC Rs300

NOTE::Please take a note to add the 4% VAT to your budget..


Sunday, September 28, 2008

Harsh Truth

Today My mom was waiting in the bus stand when she met up with a Boy just about my age(20).
He was a painter who earns his living by painting sign boards. He struggles for every penny that
he earns.The boy was not having a proper talking ability,his style and content of talking was
as good as that of a 5th standard child. While talikng to him my mom came to know that he just lives
a stop before my stop. He has elder brother and a sister,brother also being a painter working
on signboards.He was telling that his sister studies so well and was so much proud
of it. He's making his sister study knowing the consequences of not studying. He saves as much
money as he can for his family.He doesn't get a job every day,and if he gets, he would
earn about Rs75-80.He walks as much as possible before catching a bus sometimes even
for 10kms.I was so touched by this.How can a person struggle so much for survival??? We
have only 1 bus per hour for our area,in which there will be only either of the 2 conductors,
while one allows him to board the bus by giving a ticket for Rs5( The actual fare is Rs7).
The other doesn't even allow him to board the bus even if he has the difference of Rs0.50.
I realised what was the value of Rs0.50 today. He sometimes has to go to some far way place
to work,then he walks all the way from his home to busstand and back home spending the money
only from stand to that place.I could no longer hear this story narrated by my Mom.
Then i started thinking what was his mistake?? Just because of being born in a poor family
he has to struggle so much for living. I am too emotional in this kind of matters,it disturbs
me a lot.
I was comparing himself with me.I get so much of luxuries in my house,courtesy my parents
even then i am not ready to compromise with my life(Mine is a middle class family). But that
boy has made so much of compromises in his life.At the age where any one of my mentality
would be thinking only about the studying and enjoying, this boy is already working taking
care of the studies of his sister.
Today i have made some important descisions in my life...
-->I will reduce wastage of money on recreation an entertainment.
-->I will study and when i work i will definitely start helping people like him.
-->I will save the money and donate it to some poor boy,for his studies.
-->I will try to make compromises with life,with whatever i have got.
-->I will not waste food and not always wish for delicious food.

But still something is worrying me..
Will we ever see an improvement in the in the families of such people??
If yes How???
What has to be done for the betterment of such people??

Of course everyone dreams about life. Who will care about the dreams of such people??
I am so lucky to be born in atleast a Middle Class family...

Is anyone to be blamed for this?? This is not the story of that single boy,This is story of
Millions of Indians who are COME under BPL(Below Poverty Line).Is the situation same
in other countries or is it only in India???