Tuesday, October 28, 2008

Data Execution Prevention:-Troubles Caused

Recently whenever i tried to execute some of the programs i used to get the DEP error.Although the information given was satisfactory i decided to go a bit deep into it and check it out..I found an article that was very good for this problem.Here it goes

When you run a program in Microsoft Windows XP Service Pack 2 (SP2) or in Windows XP Tablet PC Edition 2005, you may receive an error message that is similar to the following:

Data Execution Prevention – Microsoft Windows
To help protect your computer, Windows has closed this program.
Name: program name
Publisher: program publisher

Data Execution Prevention helps protect against damage from viruses or other threats. Some programs might not run correctly when it is turned on. For an updated version of this program, contact the publisher. What else should I do?

If you click Close Message, the program quits, and Windows Error Reporting gives you the option to send an error report.

Back to the top
This behavior occurs because Microsoft Windows XP SP2 uses the Data Execution Prevention (DEP) feature to help prevent damage from viruses and from other security threats.

DEP works alone or with compatible microprocessors to mark some memory locations as "non-executable." If a program tries to run code from a protected location, DEP closes the program and notifies you, whether the code is malicious or not.

Back to the top
To avoid this behavior, contact your program vendor to see if an update is available that enables the program to work correctly with DEP.

Back to the top
If your computer is set to apply DEP to all programs and services, the DEP error message will have a Change Settings button. If an update to the program is not available, follow these steps to add an exception for the program from the DEP error message:
1. When you receive the error message that is mentioned in the "Symptoms" section, click Change Settings.
2. Click to select the check box next to the program, and then click Apply.
3. When you are prompted to restart your computer, click OK two times, and then restart your system.

You can also add an exception for the program by using System Properties in Control Panel. To do this, follow these steps:
1. Click Start, click Run, type sysdm.cpl, and then click OK.
2. Click the Advanced tab, click Performance, and then click Settings.
3. In Performance Options, click the Data Execution Prevention tab, and then click Add.
4. In the Open dialog box, locate and then click the program.
5. Click Open, click Apply, and then click OK. When you are prompted to restart your computer, click OK.

Back to the top
This behavior is by design.

Back to the top
If your computer is configured to turn on DEP for essential Windows programs and services only, the Change Settings button will not be available from the DEP error message.

You can view the DEP configuration for your computer in System in Control Panel. To do this, follow these steps:
1. Click Start, click Run, type sysdm.cpl, and then click OK.
2. Click the Advanced tab, and then under Performance, click Settings.
3. In the Performance Options dialog box, click the Data Execution Prevention tab.
4. Note if Turn on DEP for essential Windows programs and services only or Turn on DEP for all programs and services except those I select: is selected.
When your computer is configured to turn on DEP for essential Windows programs and services only, you cannot add an exception for a program. This is the behavior that is by design in Windows XP SP2.

If your computer is configured to turn on DEP for essential Windows programs and services only, and the DEP error message continues to appear, a program may be installed that extends Windows functionality. This program may be installed so that it causes a DEP problem in an important Windows program or service.

If this behavior is recent and has not occurred before, you may be able to prevent the DEP error message by removing recently installed programs.

Back to the top
For additional information about the DEP feature in Windows XP Service Pack 2, click the following article number to view the article in the Microsoft Knowledge Base:
875352 (http://support.microsoft.com/kb/875352/) A detailed description of the Data Execution Prevention feature in Windows XP Service Pack 2


Sunday, October 26, 2008


Unfortunately i had to change my personal blog url to the one indicated above.Sorry for the trouble if any caused..
The blog address has been mentioned below as a link.

Personal Blog


Saturday, October 18, 2008

Port Forwarding in PpoE mode in UT300R2U Modem

I made this tutorial cos everybody wants to know an easy and best way to port forward Mu torrent. so this is it. this works for any modem as long as you know how to get to your main settings for Your modem like i do in which i am going to show u all.This primarily concentrates on Ppoe mode of Configuration.I have used a client like Mu torrent and My connection Is BSNL..On every other system almost all of this part is similar.This is for the modem UT300r2u.

Go to Mu torrent
options-> preferences-> connection

and in connection on the right hand side untick the LITTLE box which says RANDOMIZE PORT EACH TIME MU TORRENT STARTS [if ticked].
Like The Way I Have Unticked It From The Rest.

If u Dont Know Ur IP address then go to Start-> Run
In Run, Type-> cmd
In cmd window, type-> ipconfig/all

Look For Ur IP Address. and Note It Down First.
Above is the address for my modem main settings. This is step 1 the most essential part which u need to know for your modem.The address i have mentioned is the same for all the bsnl users.
Step 2: is when it asks u for username and password and if your username is admin, and password is admin(unless you have changed it), then type accordingly...

Click on the advanced setup option and click on NAT->DMZ host.
In DMZ Host Type Ur IP Address and click "save/apply".

Once u have clicked save/apply then click on Management.Under Management Click on Save/Reboot.

In Control Panel U Have to open Windows Firewall...
Then U Have to Click on Exepctions Tab in Windows Firewall,and Exceptions Tab, click on Add Port and u shall see a window like the one Below.

Now u may enter the name and port as i have done or u may assign a different name and port for mu torrent.
Once u r done entering the name and the port, click ok and then again click ok to close the Windows Firewall Exceptions Tab and Window.

Open MU TORRENT and click OPTIONS on top, In OPTIONS select SPEED GUIDE and this is what u should be seeing...

Now next to Current Port, type the same Port Number which u typed in the Windows Firewall Exceptions Tab where u Added A Port.Do It Like The Way I Did... and then click on Test if port is forwarded properly.if it has been forwarded properly [And anyways It Should].
Then It Will show u a green patch across the port number.
Once that is done then In SPEED GUIDE window u can click on USE SELECTED SETTINGS.

And u will know this when u look at the bottom portion of utorrent... u will notice a green circle with a white tick inside it.That means all connections are perfect.



How to speed up downloads in a torrent client?

Every one needs and wishes to speed up their torrent downloads,and to do that u have to do some thing called as Port Forwarding.

What is Port Forwarding?

Port forwarding allows remote computers (e.g. public machines on the Internet) to connect to a specific computer within a private LAN.
•The need to forward the packets that come to the router's forwarded port as well as the need to rewrite them so that the machine to which the port is forwarded can reply to the original source address, which in turn leads to the inability of the destination (private) machine to see the actual originator of the forwarded packets, and instead see them as if originating from the router
•Only one networked machine can use a specific forwarded port at one time
•Traditional port forwarding allows the entire world access to the forwarded port, slightly reducing network security.
There are two types of Connection that are possible while connecting to internet..
•Bridge Mode-where you are using your computer to establish a connection to internet.
•PpoE mode-where you are using your modem(router) to establsih connection to internet.

Port Forwarding is required only if your internet connection is in the PpoE mode else all that you have to do is Open your port to achieve good speeds..
To open you port go to Windows Firewall->Click on the exceptions tab->Click on Add port option there->Check the port no that has been used in Torrent by clicking speed guide under options menu->Give a name for your port and give the port no.Save and exit you are done with port opening in Bridge mode.

However Ppoe mode requires a bit of complex settings.I will deal with Port Forwarding In Ppoe mode in next post.


Thursday, October 16, 2008

Microsoft Update Is a Trojan

Hackers are trying to infect innocent computer users with a malicious Trojan horse disguised as a Microsoft security update, in the hours before the software giant issues genuine critical patches as part of its monthly Patch Tuesday cycle, according to security firm Sophos.

The emails, which have the subject line `Security Update for OS Microsoft Windows' claims to have come from Steve Lipner at securityassurance@microsoft.com.

The email tells unsuspecting computer users that the attached file is a high-priority update and needs to be installed by users of various versions of Microsoft Windows.

However, running the attached file infects Windows computer users with the Mal/EncPk-CZ Trojan horse, and could give hackers control over your PC. The file attached to the file is named KBxxxxxx.exe (where ‘xxxxxx’ is a randomly generated number) in order to disguise itself as a knowledgebase file.

Sophos is intercepting the malicious emails spammed out by the hackers, which read as follows:

Dear Microsoft Customer,

Please notice that Microsoft company has recently issued a Security Update for OS Microsoft Windows. The update applies to the following OS versions: Microsoft Windows 98, Microsoft Windows 2000, Microsoft Windows Millenium, Microsoft Windows XP, Microsoft Windows Vista.

Please notice, that present update applies to high-priority updates category. In order to help protect your computer against security threats and performance problems, we strongly recommend you to install this update.

Since public distribution of this Update through the official website Microsoft Corporation would have result in efficient creation of a malicious software, we made a decision to issue an experimental private version of an update for all Microsoft Windows OS users.

As your computer is set to receive notifications when new updates are available, you have received this notice.

In order to start the update, please follow the step-by-step instruction:
1. Run the file that you have received along with this message.
2. Carefully follow all the instructions you see on the screen.

If nothing changes after you have run the file, probably in the settings of your OS you have an indication to run all the updates at a background routine. In that case, at this point the upgrade of your OS will be finished.

We apologise for any inconvenience this back order may be causing you.

Thank you,

Steve Lipner
Director of Security Assurance
Microsoft Corp

Awarness is better than Cure.....


Tuesday, October 14, 2008

Antivirus will soon become Obsolete

Antivirus software on your PC could soon be a thing of the past: US engineers have developed a new approach to malicious software detection using ‘cloud computing’, where applications are provided through the Internet.

Traditional antivirus software is becomign increasingly ineffective due to severe vulnerabilities in their engine. The boffins observed malware – malicious software – detection rates as low as 35 per cent against the most recent threats.

The new approach, called CloudAV, moves antivirus functionality into the “network cloud” and off PCs. CloudAV analyses suspicious files using multiple antivirus and behavioural detection programmes simultaneously.

“Our CloudAV virtualises and parallelises detection using multiple antivirus engines, significantly increasing overall protection,” said Farnam Jahanian, professor of computer science at the University of Michigan.

CloudAV is a production quality in-cloud anti virus system, which includes a lightweight, cross platform host agent (Win32, Linux, FreeBSD, Sendmail/Postfix milter, Nokia Maemo) and a network service with ten antivirus engines (Avast, AVG, BitDefender, ClamAV, F-Prot, F-Secure, Kaspersky, McAfee, Symantec, and Trend Micro) and two behavioral detection engines (Norman Sandbox, CWSandbox).

This whole idea is pretty similar to using ThreatFire along with any other anti-virus software, as ThreatFire, keeps the system safe by doing the behavioral analysis of programs making you safe against Zero day threats, whereas another anti-virus will provide the database for already known viruses.

To develop this novel approach, the researchers evaluated 12 traditional antivirus programs – Avast, AVG, BitDefender, ClamAV, CWSandbox, F-Prot , F-Secure , Kaspersky, McAfee, Norman Sandbox, Symantec and Trend Micro – against 7,220 malware samples, including viruses.

Traditional antivirus checks documents and programmes as they are accessed. Because of technological constraints, only one anti-virus detector is typically used at a time.

CloudAV, however, uses 12 different detectors together to determine the safety of any new document or programme received. It is accessible via any computer or mobile device that runs a simple software agent.

The new approach also caches analysis results, speeding up the process compared with traditional antivirus software. This could be useful for workplaces, for example, where multiple employees might access the same document.

CloudAV could also be used in cell phones and other devices that aren't robust enough to carry powerful antivirus software, the scientists said.

More about


Saturday, October 11, 2008

Railwire-The ISP By Indian Railways

Railtel, a public sector organisation under the Railways taking care of the transport behemoths telecommunication aspects, is now planning to exploit its vast reach by providing high speed broadband connectivity.

The venture will be initiated in Karnataka, at Bellary, Tumkur and a small pocket in Whitefield before being extended across the country. It is expected to begin within two months.

Christened “Railwire”, the initiative’s aim is to provide an application driven network with high speed access to the internet at an affordable cost. Given the low PC penetration, Railtel also plans to manufacture “Thin client PCs”, ranging between Rs 4,000 and Rs 5,000, in association with a partner.

iRW002 256 Kbps Rs.320
iRW004 512 Kbps Rs.620
iRW006 1 Mbps Rs.920
iRW008 2 Mbps Rs.1220
iRW010 4 Mbps Rs.2120
iRW012 8 Mbps Rs.3620
iRW014 16 Mbps Rs.6920
iRW016 32 Mbps Rs.13520

Port speeds are on 1:4 contention ratio
Contention ratio is the ratio in which no. of users content for bandwidth on the same port. In short, 4 people will be using the same port/card at the DSLAM in the exchange. So, if the port/card is 4Mbps, then it's contented between 4 users.It means that you will get anywhere between 25% to 100% of the mentioned speed.
Priyatam is offline Add to Priyatam's Reputation Report Post Reply With Quote


Upgrading To Ubuntu 8.10

In case you want to upgrade to the available Beta version from current Hardy to this version,Follow the below steps----->
press Alt+F2 and type in "update-manager -d" (without the quotes) into the command box.
Update Manager should open up and tell you: New distribution release '8.10' is available.
Click Upgrade and follow the on-screen instructions.

Significance of Release----->I had been wondering what might be the significance of these numbers in versions,But it is only after i saw this i realized that 8.04(2008 April Release),8.10(2008 October release)


Thursday, October 9, 2008

Wednesday, October 8, 2008

Rejected by Google Adsense

Even though i had taken care of most of the things while applying for google adsense My application got rejected stating that i had chat site on my blog..I really did not have anything like that.
But how could i understand the complex algorithm that adsense people look at.
Then i came to know from the Admin of http://indiabroadband.net that the Third party addons that i had installed on my blog had caused the problem with many Other things like Inclusion of copied content...
I hope to rectify my problems soon and re-apply for adsense...


5 things before you go Online to keep your PC safe.

5 steps to help protect your new computer before you go online

Published: January 8, 2007
Protect Your Computer with Latest Security Tools

The most important aspect of setting up a new computer is to ensure your system has the latest updates and security software installed.

Make sure these are downloaded and installed to help defend against viruses and other potential threats before you connect to the Internet.

And once you're connected, it's equally important to update the operating system and antivirus software on a regular basis.

The following steps will help you set up your new computer with the latest security tools available.

Step 1: Verify firewall

If you're running Windows Vista or Windows XP Service Pack 2 (SP2), you should already have Windows Firewall running, and you can proceed to Step 2.

To see what operating system your computer is running, click Start, My Computer, and then click View system information to open the System Properties window. This information is listed on the General tab under System.

Screenshot of System Propeties window

System Properties window


Tip: With Windows Vista or Windows XP SP2 installed, you can manage Windows Firewall and other security settings in one place to help protect your computer. If you don't have SP2 installed or do not wish to install it, see How to Enable Internet Connection Firewall in Windows XP.

Step 2: Get software updates

Turn on Automatic Updates.

Plug in your modem or network cable for Internet access.

Click Start and point to Control Panel. Select Network Connections in the Control Panel.

Choose Create a new connection to start the Network Connection Wizard.

After you're connected, allow Microsoft Update to install the latest security and software updates.

After all updates are installed and your settings are defined, you're ready to surf the Internet.

Just remember that it's important to be diligent with computer security technologies, so run Microsoft Update regularly, check the latest downloads and product updates, keep Automatic Updates turned on, and be aware of the latest security threats.

Step 3: Download antivirus software

Review the inventory or packing list that came with your computer to make sure the hard disk has all the listed software installed and the original installation CDs are there. This bundle typically includes security software from a recognized computer security company.

In most cases, a trial version of this software should have been preinstalled on the computer or included on a disk. If it wasn't, contact the computer manufacturer for a replacement.

If security software wasn't included with the original order, you should obtain and install antivirus software before continuing.

Microsoft offers Windows Live OneCare, a comprehensive service that helps protect your computer from many different kinds of threats, inlcuding viruses.

Step 4: Download antispyware software

After you've confirmed that you have antivirus software, you should confirm that you have antispyware software. To find out why you need both, see What's the difference between spyware and a virus?

Microsoft offers Windows Defender to help protect against spyware and other unwanted software. If your computer is running Windows Vista, you already have Windows Defender. If your computer is running Windows XP, you can download Windows Defender for free.

Step 5: Record system information

It's a good idea to record your computer's system information in case a technician needs it later. To do so:

Click Start, then Run, and type "msinfo32" in the text field. Click OK to open the System Information window.

Screenshot of System Information window

System Information window

In the window, on theFile menu, click Export.

Name the file and save it to an external storage device such as a blank CD or thumb drive, and store it in a safe place.

Note: Windows Live OneCare also offers easy file backup and restore.

You should also keep the Windows installation CDs and related product key handy.


Ubuntu 8.10 release dates and Schedules

  • 12 June 2008 - Alpha 1 release
  • 3 July 2008- Alpha 2 release
  • 24 July 2008 - Alpha 3 release
  • 14 August 2008 - Alpha 4 release
  • 4 September 2008 - Alpha 5 release
  • 18 September 2008- Alpha 6 release
  • 2 October 2008- Beta release
  • 23 October 2008 - Release Candidate
  • 30 October 2008- Final release of Ubuntu 8.10

Development began with the Ubuntu 8.10 Linux kernel 2.6.26 compared to the version 2.6.24 in Ubuntu 8.04. Recently, it was decided to use the kernel 2.6.27 instead. The main reason for the change is to avoid having to update the kernel and the majority of cases 2.6.27.

This is unusual for a release of Ubuntu, in general, the kernel has been updated in two versions. The last time that the heart was improved in three versions have been sent to Ubuntu Ubuntu 7.04 (nervous, Feisty 2.6.17 and 2.6.20).

The final number at the heart of strange that the heart of wider changes in the heart of even-numbered. However, up to two strange, and is considered stable kernels. The new Linux kernel has been tested! Updated installation of Ubuntu 8.10 is now included in it.


Ubuntu 8.10 Intrepid Ibex Beta Release is out!

With Hardy now past feature-freeze it's time to start to plan
features that are being lined up for inclusion after Ubuntu 8.04 LTS
is released in April.

And so I'd like to introduce you to the Intrepid Ibex, the release
which is planned for October 2008, and which is likely to have the
version number 8.10.

During the 8.10 cycle there will be venturing into interesting new
territory, and they need the rugged adventurousness of a mountain
goat to navigate tricky terrain. The desktop offering will once
again be a focal point as we re-engineer the user interaction model
so that Ubuntu works as well on a high-end workstation as it does on
a feisty little subnotebook. there will also be reaching new peaks of
performance - aiming to make the mobile desktop as productive as

A particular focus for Ubuntu Developers will be pervasive internet access, the
ability to tap into bandwidth whenever and wherever you happen to
be. No longer will you need to be a tethered, domesticated animal -
you'll be able to roam (and goats do roam!) the wild lands and
access the web through a variety of wireless technologies. We want
you to be able to move from the office, to the train, and home,
staying connected all the way.

The Intrepid Ibex will take shape at our next Ubuntu Developer
Summit, an open event to which members of the Ubuntu community,
upstream communities, corporate developers and other distributions
are all invited. That summit takes place in beautiful Prague, in the
Czech Republic from 19th - 23rd May 2008. Together we will draw up
detailed blueprints for Ubuntu 8.10. Please join us there to help
define the Intrepid Ibex:


Ubuntu 8.10 will be our ninth release, and the fourth anniversary of
the first release - 4.10. In those four years, Ubuntu has grown as a
project, an ethos and a community. The Ubuntu community have worked
to set the benchmark for open, inclusive, and collaborative
development processes. They have open specifications, open governance
structures and a willingness to empower everyone to make their
unique contribution to the success of the project.

This has created an extraordinary diversity in participation; a
depth of talent including packagers, programmers, translators,
writers, testers, advocates, technical support, artists and many
others. Those contributions come as much from the corporate world -
Canonical and other companies that have embraced Ubuntu as a core of
their offering - as from a huge number of individual professionals.
It is this combination of expertise and perspectives that makes it
such a pleasure for me to be part of this project, and I thank all
of you for your continued passion, participation, and energy.

Hardy is their best development cycle yet, delivering on our promise
of reliability and stability for the Heron. We must stay focused on
that goal. To the extent that you have a brilliant idea for the
future, you now have a peg to hang it on - the Intrepid Ibex. When
the Hardy Heron has taken flight we will engage fully with the Ibex.
Give it horns!


Tuesday, October 7, 2008

Check out the all New Windows 7 Interface which was formerly known as Blackcomb and Vienna) is the successor of Windows Vista. Windows 7 is expected to be released sometime in 2010.Hope it is a Much more Reliable OS than VISTA..


Thursday, October 2, 2008

The Troublesome Muhaha Virus!!!!

How to remove Orkut Virus: Muhaha!!

Well a friend got the Problem, with this problem i think this Virus again in Action.
Now how to get ride this.. A quick way for orkut addicted those who want a quick access to orkut is as follows..

► Press alt+ctrl+del and goto processes tab

► There you will see a list of processes under the different username, arrange the processes according to your username and search for the process svchost.exe

► Right click and end process or end process tree. Make sure you end the imagename or process which are under your username and not that which are under LOCAL SERVICE OR NETWORK SERVICE.

► This gives you instant access to orkut..

A Similar of this variant gives you error on opening firefox.


The above 4 Steps solution works for the same..

Now a fix to permanently get rid of this nuisance, this pulls the interest of my friends who called me up and took help to access their orkut accounts instantly..

Follow as :-


► Click start->run type c:\heap41a and press Enter. You cannot find this folder by looking through windows explores i.e. My Computer, as this is a hidden folder.

► Delete all the files under this folder by pressing ctrl+a followed by shift+del key

► Now again goto Start->Run and write regedit, this opens registry editor for you.

► Press ctrl+f , a find dialog box opens, type heap41a and let it show you some results

► You should see "[winlogon] C:\heap41a\svchost.exe C:\heap(some number)\std.txt"

► Now delete whatever you see there :D cause you love orkut .. hahahah

Well your PC/LP is cleaned up and now you can open your orkut account without that nuisance.

Make sure you delete all the .exe files which are present at the root of ur pendrive which got created automatically(which you never created). Rather scan your pen drive with a good antivirus.. That should allow you stealth your PC from the attack of MUHAHA

Other Effects

Well this worm/virus removes hidden folder options or you are unable to see hidden folders. so enable the hidden folder option follow the steps as :-

► Goto Start->run type regedit again to open registry editor

► traverse as HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer3.

►There you will see a DWORD key as "NoFolderOptions" . Set its value to 0 or simply delete it


Wednesday, October 1, 2008

My headphone troubles in UBUNTU

This has been annoying me from a very long time,say about 1 month. I installed the Ubuntu 8.04
heron. The OS is so good with all those features,but MY headphones are not working...This had made me very sad.I am hoping to find a solution,i have also posted a screenshot of The output of alsamixer.