Skip to main content

Posts

Showing posts from September, 2007

10 dirty little secrets you should know about working in IT

If you are preparing for a career in IT or are new to IT, many of the “ dirty little secrets ” listed below may surprise you because we don’t usually talk about them out loud. If you are an IT veteran, you’ve probably encountered most of these issues and have a few of your own to add — and please, by all means, take a moment to add them to the discussion. Most of these secrets are aimed at network administrators, IT managers, and desktop support professionals. This list is not aimed at developers and programmers — they have their own set of additional dirty little secrets — but some of these will apply to them as well. >> 10.) The pay in IT is good compared to many other professions, but since they pay you well, they often think they own you Although the pay for IT professionals is not as great as it was before the dot-com flameout and the IT backlash in 2001-2002, IT workers still make very good money compared to many other professions (at least the ones that require only an a...

Chinese Student Sues Microsoft for Privacy Violation

A Beijing college student claims that Microsoft's antipiracy program violates his privacy, according to a Chinese government-controlled news site. A Beijing college student has sued Microsoft Corp., claiming that its antipiracy program violated his privacy, a Chinese government-controlled news site reported last week. According to China.org.cn, a news portal run by China's State Council Information Office, Lu Feng has sued Microsoft and its Chinese subsidiary, Microsoft (China) Co., in a People's Court. Lu's lawsuit said Microsoft's Windows Genuine Advantage (WGA) antipiracy software posed a threat to his privacy and the security of his PC, which runs Windows XP. He also claimed that he was not properly informed before XP installed WGA Notifications, a separate program that flags counterfeit copies and nags users running pirated versions. " The suit asks the court to order Microsoft to delete the information it harvested from Lu's PC, provide an uninstalle...

Building your Fist JavaScript Application!

JavaScript is what is called a Client-side Scripting Language. That means that it is a computer programming language that runs inside an Internet browser (a browser is also known as a Web client because it connects to a Web server to download pages). The way JavaScript works is interesting. Inside a normal Web page you place some JavaScript code . When the browser loads the page, the browser has a built-in interpreter that reads the JavaScript code it finds in the page and runs it. Web page designers use JavaScript in many different ways. One of the most common is to do field validation in a form. Many Web sites gather information from users in online forms, and JavaScript can help validate entries. For example, the programmer might validate that a person's age entered into a form falls between 1 and 120. Another way that web page designers use JavaScript is to create calculators. Now its time to built your own javascript calculator! The following code represents a simple Fahrenh...

QuickTime Bug Gives Hackers New Drive-by Attack

The bug, when paired with Firefox, allows hackers to hijack PCs and Macs. " The risk is more to firefox than Internet Explorer " Until fixes are in place for QuickTime, Firefox, and other affected applications, Symantec recommends that users update anti-virus software and browse with the fewest user privileges possible......... Read More>>

Major threats to A network

In terms of security a threat is an action or tool, which can exploit and expose vulnerability and therefore compromise the integrity of the given system. Not all threats are equal in terms of their ability to expose and exploit the vulnerability. In this regard the main threat to a network comes from malicious hackers and from intruders. The following are some of the major attacks which are known to be the major threats to any particular network. Exploit attack: In this type of attack, the attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability. Social engineer attack: With a social engineer attack, the attacker compromises the network or system through social interaction with an individual (such as through email or phone can) and tricks the individual into divulging information that can be used in a subsequent attack. For example, a hacker may call the employee, impersonate the network adm...

Skype Warns Users about Circulating Worm

A worm targeting Windows PCs is spreading through the service's instant messenger, making the VoIP's chat software the latest to come under the hacker gun. Skype Ltd. warned its users Monday that a worm targeting Windows PCs is spreading through the service's instant messenger, making the Voice over IP (VOIP)'s chat software the latest to come under the hacker gun. Read More>>

Could one of these five companies be the next Microsoft?

So, if a company were to take Microsoft’s crown, who would it be? The graveyard of failed challengers is littered with names like ..... Cisco or Google or Apple or Amazon or Zoho ... Which one? Click here to read the full article>>

Forcing the users to shutdown when their time is up!

If you have many users who uses your PC or even your home office/small office PC, you find it difficult to control the time they use the PCs, sometimes you have a hard time in explaining why you need the Pc to be shutdown after sometimes or why you need that “some one” to leave you PC for a particular time span. So here comes a handy solution for that, which will even be very useful to system administrators of enterprise level networks. In order to do this, you need a third party utility application, because Microsoft hasn’t included this feature in their OS versions. First thing first, Click the link to download the UtilityBeyound Logic Shutdown for Windows NT/2000/XP! UtilityBeyond Logic Shutdown for NT/2000/XP is a simple freeware utility that you can schedule to run, and it will do the job every time without modifying user rights. Download the utility, and extract it into a directory. Then, follow these steps: Go to Start Run, type cmd, and press [Enter]. Navigate to the directory...

Is Apple the New Microsoft?

Don't look now, but the role of the industry's biggest bully is increasingly played by Apple, not Microsoft... Read More>>

Why do you think formatting the PC is the only Cure?

Most of the problems that force us to format our PC are due to System registry problems. When ever you encounter some problems with your windows machine, the first think comes may be to format the PC, this isn’t surprising when most of the Asians, especially Maldivians uses pirated software, but never the less still there exits many smart ways that you can repair most of the windows problems. You don’t have to always format, but if you think it doesn’t consume your time and is very easy for you, then you are most welcome in that regard. Most of the PC problems start when we start accessing the internet and if we don’t have a good anti virus software installed in our PC, we will end-up corrupting our computer, many a times this results in corruption of the system registry. System registry is the most important place of the windows operating system, so if you end-up corrupting it, you will experience all sort of disappointing things, many a times will result a slow performance. Registry ...

“The crazy dual booting…! Aren’t there an easy way???” what about Virtual PC?

You have always wanted to learn many Operating systems, probably other than windows, but your concern is the pain taking dual booting process, where you install windows and Linux on the same machine or even multiple windows OS when it comes to learning and getting ready for certificate exams like MCSE and so forth. So here is the solution for that! I am talking about Virtual PC, referred as hardware virtual machine, a Software application that is built to work as a virtual PC so that you can install multiple operating systems on the same computer without formatting the hard disk and without making any damage to the actual system. That’s not all; you can even work on different Operating systems simultaneously. Sounds good? Let’s see what we have to do to make this as real as you might imagine. Getting handy with a Virtual PC Software application. First thing you need to do is getting a virtual PC software and there are two good products out there that I recommend, one is VMware and anot...

Have you ever wished that if you could hide your personal user account from the Windows Welcome screen?

One of the unfortunate side effects of the Welcome Screen is the listing of all of the user accounts on the computer. What if there is an account that you do not want the whole world to see? Using the same features that Microsoft uses to hide system accounts from the Welcome Screen. You can hide user accounts as well. Hiding user accounts can be done by a simple hack in the registry. Hidden away in the local system settings is a list of accounts that Microsoft does not want to appear on the Welcome screen. These accounts are primarily system accounts under which different processes that run in the background use to execute. To hide a user from the Welcome screen, all you have to do is create an entry on the list for the user you want to hide. Removing a user account from Welcome Screen Before You make any changes to registry , please create a restore point in your computer, so incase if anything goes out of hand you can always restore your computer to the earlier state and another the ...