Skip to main content

Posts

Showing posts from 2007

10 dirty little secrets you should know about working in IT

If you are preparing for a career in IT or are new to IT, many of the “ dirty little secrets ” listed below may surprise you because we don’t usually talk about them out loud. If you are an IT veteran, you’ve probably encountered most of these issues and have a few of your own to add — and please, by all means, take a moment to add them to the discussion. Most of these secrets are aimed at network administrators, IT managers, and desktop support professionals. This list is not aimed at developers and programmers — they have their own set of additional dirty little secrets — but some of these will apply to them as well. >> 10.) The pay in IT is good compared to many other professions, but since they pay you well, they often think they own you Although the pay for IT professionals is not as great as it was before the dot-com flameout and the IT backlash in 2001-2002, IT workers still make very good money compared to many other professions (at least the ones that require only an a...

Chinese Student Sues Microsoft for Privacy Violation

A Beijing college student claims that Microsoft's antipiracy program violates his privacy, according to a Chinese government-controlled news site. A Beijing college student has sued Microsoft Corp., claiming that its antipiracy program violated his privacy, a Chinese government-controlled news site reported last week. According to China.org.cn, a news portal run by China's State Council Information Office, Lu Feng has sued Microsoft and its Chinese subsidiary, Microsoft (China) Co., in a People's Court. Lu's lawsuit said Microsoft's Windows Genuine Advantage (WGA) antipiracy software posed a threat to his privacy and the security of his PC, which runs Windows XP. He also claimed that he was not properly informed before XP installed WGA Notifications, a separate program that flags counterfeit copies and nags users running pirated versions. " The suit asks the court to order Microsoft to delete the information it harvested from Lu's PC, provide an uninstalle...

Building your Fist JavaScript Application!

JavaScript is what is called a Client-side Scripting Language. That means that it is a computer programming language that runs inside an Internet browser (a browser is also known as a Web client because it connects to a Web server to download pages). The way JavaScript works is interesting. Inside a normal Web page you place some JavaScript code . When the browser loads the page, the browser has a built-in interpreter that reads the JavaScript code it finds in the page and runs it. Web page designers use JavaScript in many different ways. One of the most common is to do field validation in a form. Many Web sites gather information from users in online forms, and JavaScript can help validate entries. For example, the programmer might validate that a person's age entered into a form falls between 1 and 120. Another way that web page designers use JavaScript is to create calculators. Now its time to built your own javascript calculator! The following code represents a simple Fahrenh...

QuickTime Bug Gives Hackers New Drive-by Attack

The bug, when paired with Firefox, allows hackers to hijack PCs and Macs. " The risk is more to firefox than Internet Explorer " Until fixes are in place for QuickTime, Firefox, and other affected applications, Symantec recommends that users update anti-virus software and browse with the fewest user privileges possible......... Read More>>

Major threats to A network

In terms of security a threat is an action or tool, which can exploit and expose vulnerability and therefore compromise the integrity of the given system. Not all threats are equal in terms of their ability to expose and exploit the vulnerability. In this regard the main threat to a network comes from malicious hackers and from intruders. The following are some of the major attacks which are known to be the major threats to any particular network. Exploit attack: In this type of attack, the attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability. Social engineer attack: With a social engineer attack, the attacker compromises the network or system through social interaction with an individual (such as through email or phone can) and tricks the individual into divulging information that can be used in a subsequent attack. For example, a hacker may call the employee, impersonate the network adm...

Skype Warns Users about Circulating Worm

A worm targeting Windows PCs is spreading through the service's instant messenger, making the VoIP's chat software the latest to come under the hacker gun. Skype Ltd. warned its users Monday that a worm targeting Windows PCs is spreading through the service's instant messenger, making the Voice over IP (VOIP)'s chat software the latest to come under the hacker gun. Read More>>

Could one of these five companies be the next Microsoft?

So, if a company were to take Microsoft’s crown, who would it be? The graveyard of failed challengers is littered with names like ..... Cisco or Google or Apple or Amazon or Zoho ... Which one? Click here to read the full article>>

Forcing the users to shutdown when their time is up!

If you have many users who uses your PC or even your home office/small office PC, you find it difficult to control the time they use the PCs, sometimes you have a hard time in explaining why you need the Pc to be shutdown after sometimes or why you need that “some one” to leave you PC for a particular time span. So here comes a handy solution for that, which will even be very useful to system administrators of enterprise level networks. In order to do this, you need a third party utility application, because Microsoft hasn’t included this feature in their OS versions. First thing first, Click the link to download the UtilityBeyound Logic Shutdown for Windows NT/2000/XP! UtilityBeyond Logic Shutdown for NT/2000/XP is a simple freeware utility that you can schedule to run, and it will do the job every time without modifying user rights. Download the utility, and extract it into a directory. Then, follow these steps: Go to Start Run, type cmd, and press [Enter]. Navigate to the directory...

Is Apple the New Microsoft?

Don't look now, but the role of the industry's biggest bully is increasingly played by Apple, not Microsoft... Read More>>

Why do you think formatting the PC is the only Cure?

Most of the problems that force us to format our PC are due to System registry problems. When ever you encounter some problems with your windows machine, the first think comes may be to format the PC, this isn’t surprising when most of the Asians, especially Maldivians uses pirated software, but never the less still there exits many smart ways that you can repair most of the windows problems. You don’t have to always format, but if you think it doesn’t consume your time and is very easy for you, then you are most welcome in that regard. Most of the PC problems start when we start accessing the internet and if we don’t have a good anti virus software installed in our PC, we will end-up corrupting our computer, many a times this results in corruption of the system registry. System registry is the most important place of the windows operating system, so if you end-up corrupting it, you will experience all sort of disappointing things, many a times will result a slow performance. Registry ...

“The crazy dual booting…! Aren’t there an easy way???” what about Virtual PC?

You have always wanted to learn many Operating systems, probably other than windows, but your concern is the pain taking dual booting process, where you install windows and Linux on the same machine or even multiple windows OS when it comes to learning and getting ready for certificate exams like MCSE and so forth. So here is the solution for that! I am talking about Virtual PC, referred as hardware virtual machine, a Software application that is built to work as a virtual PC so that you can install multiple operating systems on the same computer without formatting the hard disk and without making any damage to the actual system. That’s not all; you can even work on different Operating systems simultaneously. Sounds good? Let’s see what we have to do to make this as real as you might imagine. Getting handy with a Virtual PC Software application. First thing you need to do is getting a virtual PC software and there are two good products out there that I recommend, one is VMware and anot...

Have you ever wished that if you could hide your personal user account from the Windows Welcome screen?

One of the unfortunate side effects of the Welcome Screen is the listing of all of the user accounts on the computer. What if there is an account that you do not want the whole world to see? Using the same features that Microsoft uses to hide system accounts from the Welcome Screen. You can hide user accounts as well. Hiding user accounts can be done by a simple hack in the registry. Hidden away in the local system settings is a list of accounts that Microsoft does not want to appear on the Welcome screen. These accounts are primarily system accounts under which different processes that run in the background use to execute. To hide a user from the Welcome screen, all you have to do is create an entry on the list for the user you want to hide. Removing a user account from Welcome Screen Before You make any changes to registry , please create a restore point in your computer, so incase if anything goes out of hand you can always restore your computer to the earlier state and another the ...

Are You Bored with the default boot screen that you see every time you boot your windows Xp machine?

The answer of many users will be yes, but what prevents them changing it? well the answer may depend on whom it is being asked, But One thing is sure! Many users are afraid of the side effects of using such a third party software to change the default XP boot Screen, if so here is a grate solution for that! But before do any thing or change any system files, it is always recommended that you create a restore point on your computer, so in case if any thing goes out of hand, it can be always restored to the earlier state! The BootSkin app is a great piece of software, but it does not do everything.Currently it does not allow you to use the thousands of boot screens that were made especially for the program. The good news is there is a very handy hack that can be done in order to convert other boot screen compatible with the one I am gonna mention, i hope in future i will present all those cool hacks that you have been waiting for! Click here to download BootSkin software for FREE! Usi...

Do you want to make your Hard Disk Portable?

USB portable hard disks are becoming very popular nowadays, because of its ease of use and its compatibility with laptops, but it has one down side, its double as the price of normal SATA or IDE hard disk. Now there comes an alternate option for budget users, that’s SATA/ IDE to USB Cable. This cable comes with DC power adapter which can be plugged in to the AC power supply, there by making any SATA or IDE hard disk portable with a computer or laptop having a USB port. Its average cost is 25us$ or even cheaper in some case. So dear friends don’t get disappointed because some of your rich friends buy USB hard disks, because you also can make your hard disk portable, just buy the SATA/IDE to USB kit and that’s it. This is not only true for Hard disks, any disk drive which supports IDE or SATA can be connected to the USB port of your computer using this very handy little kit. So lets get this cable and make each hard disk a portable disk!

It’s not an imagination or Science fiction, but it’s the technology.

It is true that long checkout lines at the grocery store are one of the biggest complaints about the shopping experience, but soon these lines could disappear when the ubiquitous Universal Product Code(UPC), bar code is replaced by smart labels, also called radio frequency identification (RFID) tags. RFID tags are intelligent bar codes that can talk to a networked system to track every product that you put in your shopping cart. Imagine going to the grocery store, filling up your cart and walking right out the door. No longer will you have to wait as someone rings up each item in your cart one at a time. Instead, now the shopping basket will communicate with the billing system and as soon as you arrive at the counter, your total amount will be already calculated and displayed to you by the cashier. Is it too factious? Do I sound Crazy? Dear friends, all what I said can be accomplished by the RFID tags and its proper implementation. These RFID tags will communicate with an electronic r...

Why when shared, Windows XP cannot communicate with winodws Vista in the Same Local network?

Network Map in Microsoft® Windows Vista™ diagrams the connections between network devices to help you troubleshoot connectivity problems. Network Map uses a discovery protocol called Link-Layer Topology Discovery (LLTD) in order to query the other devices on the network to determine how the network is organized. Computers running Windows Vista include the software components that implement the LLTD protocol. For other devices on the network to be placed on the map, they must have a discovery protocol enabled that can respond to the mapping computer's requests. This means in order to communicate windows Xp with Windows Vista we need to install a Portocol known as LLTD from microsoft website, unfortunately only licensed versions of widnows XP can download and install this protocol from microsoft website? "Too bad, Our poor, pirated copy users have to face the dificulties.... " but why most of the asians always use pirated copies of any software they USE? But if u crack wind...

What Slows Windows Down?

Well this seems to bea question that every body wants find the answer. People always complain about their computer or laptop being so slow, so is it the hardware which makes the differance or the software that we install or the operating system itself? well the answer is rather complicate then making one of them responsible for all the slow downs. "It happens rather gradually. when i bought my computer, it was very fast and i was very impressed with its performance but now i find it to be slower than 80s celeron system." says my frend who bought a intel pentium D PC system in last month with 1GB of RAM. so is it really the Hardware whihc plays the role or proper maintenance of the PC? or is it the corroption of the operating system which kills the speed of the computer ? What Slows Windows Down? check the link out for a nice reseach