Pages

30 November 2009

Turn your Mobile phone into Web Camera

000ed873_medium.gif
Turn your camera phone into a high quality wireless (WiFi or Bluetooth) or wired (USB) web camera. Mobile phone as webcam with Mobiola® Web Camera 3
Main Functionality

* Transforms your mobile phone into a high-quality PC webcam.
* Connects mobile phone to PC using USB, WiFi (select models) and Bluetooth connectivity.
* BlackBerry Storm supported (USB connection).
* Wi-Fi support for BlackBerry phones.
* High Video transmission speed.
* Screen Capture functionality, when device screen can be demonstrated on PC real-time.
* Cool video effects. Have fun and impress your friends!
* Works with Skype, Yahoo, YouTube, MSN, AOL IM, ICQ and many others as standard USB webcam.

Download

17 November 2009

Scarry Popup

You can use this trick to scare your friends or to make something useful, like reminders you put in Windows Start-up.

Here are the steps on how to do a pop-up:

1. Open Notepad and type:

text1=msgbox("your text here",52,"your title here")




You can write as many text message boxes as you want. The many you write the many pop-ups will appear.

2. Save the text as popup.vbs. Be sure the change the 'Save as Type' to 'All Files' .



3. You can use scary messages to make a prank to your friends, like:

text1=msgbox("Virus Detected",52,"Warning: VIRUS")
text2=msgbox("Virus is installing on your system",52,"Installing...")
text3=msgbox("Virus is installing on your system",52,"Installing...")


Can't fool me as me using Macbook pro.

Amazing Google Trick To Find Private Pictures

Maybe you are a "voyeur".

Maybe you need some pictures for your school work.

Of course you can go to a dedicated website where you can find lot of free pictures.

But you can also dig some private pictures directories.

Try this little code in Google, you may find lot of Non public pictures
Quote:
intitle:index.of +"Indexed by Apache::Gallery"
You can also narow your search by adding a word at the end, for example:
Quote:
intitle:index.of +"Indexed by Apache::Gallery" +dbilla
Maybe some of you guys use Apache Gallery for your own private pictures.

If you want to verify if your own private pictures ares indexed, just paste this code in Google.
Quote:
www.YourSite intitle:index.of +"Indexed by Apache::Gallery"
(Replace YourSite by the server hosting your pictures (your URL.)

Example
Quote:
www.courirpouraider.ch intitle:index.of +"Indexed by Apache::Gallery"

Knowing who hacked u???

Open dos command,go to -(Start/Run/type "command" without inverted commas and hit enter),& in the MSDOS prompt,type:
netstat -a
(make sure you include the space in between the "t" and the "-a").

This command will show u the host name of the lamer and ofcorse urz also ..ur host name will be under local address and his wud be under foreign address.. note any suspicious name and every numbr u c aftr the host name under foreign address which is new and suspicious there(numbers are ports but i consider u totally unaware).
After ur done,now type
Netstat -an (again a space between "t" and "-an")

this will list all connections in numerical form, which makes it a lot easier to trace malicious users....Hostnames can be a little confusing if you don't know what you're doing (although they're easily understandable, as we shall see later). Also, by doing this, you can also find out what your own IP address is, which is always useful.

It wud look a bit like this
Proto.....Local Address.....Foreign Address.....State
TCP.......0.0.0.0:135.......0.0.0.0:0...........Li stening
TCP.......127.0.0.1:1026....0.0.0.0:0...........Li stening
TCP.......Your IP:Port......0.0.0.0:0...........Listening
TCP.......Your IP:Port......A New IP:Port.......Established

A New IP:Port -note that stuff
Now that u have a IP Addess and a host name,type
tracert type IP address/Hostname here

write whole thing there.. thats after u write tracert give a space then type A New IP we found in last step.. give a / then write..Host name we found in first step.remember no port there to be added..
This will trace the lamer which is prolly using a trojan on ur computer to do what he wants..result will give u some ip addresses ..note all of them
now go to ip2location.com/free.asp
write ip addresses in the box and see where the ips belong to..some ips will give u ISPs like mtnl ... last ip wud be his ip ..now call ur or his ISP & inform dem abt it!

10 November 2009

How to Clone a Hard Drive

Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn't know that all that you needed, was already set up on your current system? Well, it is... and if you follow this tut, you shouldn't have much of a problem.


Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.

First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.

Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.

Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the "Full" button.

Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says "Autofix Errors".

Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:

Click on the "Start" button, then click on the "Run..." button, then place the following into the Runbox:

"XCOPY C:\*.*D:\ /c/h/e/k/r" (minus the quotes, of course) then press the "Enter" button.

If you receive an error message, then remove the space from between XCOPY and C:\

Anything that should happen to come up in the DOS box, just click "Y" for "Yes". When its all finished, pull the original Master from the system, designate the Slave as the Master (change your jumpers), then check your new Master out.

This tut has worked and has been tested on all systems except for Windows 2000, so you really shouldn't have any problems. If, by any chance, you should come across a snag, message me and I'll walk you through it.

08 November 2009

How To Block IP Addresses On Linux Server

Take a look at your log file (/var/log/secure for Fedora Core 4) and you will discover numerous automated ssh hacking attempts using dictionary attack. So now you have identified the offending addresses. How do you stop them?

Here comes the magic mantra which uses iptables (packet) firewall:

iptables -A INPUT -s a.b.c.d -j DROP

Replace a.b.c.d with the offending IP address. Repeat this for each of the offending IP addresses.

How To Disable Windows Genuine Advantage Warning

It's a manual way to remove WGA notification tool available from internet -

Update: Please follow this procedure instead:
How To Disable Windows Genuine Advantage Notification in 3 Simple Steps

—original post continued—
Kill the process wgatray.exe in Windows TaskManager (Select it then right click and select End task) and restart Windows XP in safe mode. Now delete the following files:

Delete WgaTray.exe from c:\windowss\system32
Delete WgaTray.exe from c:\windows\system32\dllcache

Start Windows Registry editor and delete the folder "WGALOGON" located in the following location:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\WinlogonNotify.
Delete all references in your registry to WgaTray.exe (repeat search using F3 function key).

How to Hide Text in Notepad

notepad-icon.jpg
Hidding is innate with us and that needs no saying. Most of the time I locked the the MS Word files to save the classifieds. Well who knew we could do that with notepad as well. Often you do all the coding for webpages in notepad and you gotta keep some of those hidden. What you do is look for a utility to hide your text. You simply don't need it. There's an easy hack to hide the notepad files. Let's see how?

Before I begin let me tell you the text files you create with this hack won't show up even with Windows or DOS whatever be the file settings. These files will only be accessible if you know the exact file name used while creating the file. Let's begin with the steps

Step 1
Launch the command prompt. Go to Run and Type cmd and press Enter.

Step 2
Use DOS command to get to the desired folder.

Step 3

Type in the notepad VisibleFile.txt:HiddenFile.txt and hit Enter. (These are just examples change the VisibleFile.txt or HiddenFile.txt filenames according to your choice)

When you are prompted to Create a New file, click Yes.
Step 4

Enter the data you want to hide. Next save the file and close the notepad.
Step 5

Go to the location where you have saved the file. You can see the VisibleFile.txt file (non-hidden) there. Now you can add any text of your choice.
Step 6

In order to open and read/write the hidden file. Type in VisibleFile.txt:HiddenFile.txt in the command prompt and press Enter.

That's done and you hidden file HiddenFile.txt will not be visible under Windows Explorer or DOS. Remember deleting the visible file or the hidden (VisibleFile.txt)) will also delete the file (HiddenFile.txt) you.

05 November 2009

Nokia AEON concept phone

The Nokia “Aeon”?

Nokia maintains a Research and Development website that is usually filled with, well Research and Development stuff. Mostly it’s just boring images of scientists and r&d people at work – at least until you scroll to the top. That’s where the images of Nokia’s latest “research concept” phone are currently housed.

1.jpeg2.jpeg
3.jpeg



The “Aeon” seems to be your “typical” razr-thin candybar form factor cell phone with no actual buttons. No, it’s not the next generation of Nokia’s L’amour Fashion Collection. The bottom half of the prototype pictured here is actually a touch-screen display that can change (I might be going out on a limb here) into any kind of menu, button, keypad, whatever. It’s so damn cool that I’m almost speechless. I mean, yeah, the touch screen method brings up a ton of quirky problems – like causing damage to the display with those pointy thumbs of yours, among others – but it’s also so innovative and (brilliantly simple) that I can’t even associate it with the Nokia name. What happened to those super thick oversized fatso phones that Nokia keeps churning out?

So the Aeon got me pretty excited about what’s coming in the future of wireless technology. Of course, by the time this phone actually comes to market (if ever), I’m sure Motorola will have similar devices available, all with those really annoying vowel-less names that nobody wants to pronounce. I really hope their next set of phones are called KRPR or something. It’d be more fitting.

04 November 2009

Setting Up A Hackers Workstation

1.jpg
















My Workstation



Operating System:

Which OS to use, choice is all yours. Windows in all cases is not so ‘made for hacking’ according to me. Whatever XP,Vista or windows 7. They are all just OS which are made for novice public which can learn computers.

If you are a regular Linux user, Then shift to Backtrack Linux. It is Linux made for hacker geeks & completely embedded with all penetration testing tools in it. You can Download Backtrack here. But if you have never used Linux & wish to learn then you can use basic Linux distributions like Ubuntu. But remember that you or not supposed to learn Linux desktop environment like windows, you have to learn its shell or terminal. (command prompt of Linux)

As I said Choice is all yours you can go with Windows also. Its all on you. (Suggestion: If you can’t make it habit to learn new things, you can never be a HACKER)

Hackers Toolkit:


In your root directory or C:/ in windows make a folder named Tools. So that you can access all tools from command prompt easily E.g.  c:/tools/example


Go surf for these tools enlisted.





What are these tools ? Why are they used for ? How to use it ? are some of the questions that are striking your head. Chill all dudes & babes, I am here to help you with each of the tools listed above. All you have to do is first download them all & place in your root directory.



WEP Cracking

FUN FACTS:

WEP stands for Wired Equivalent Privacy
WEP is used to secure wireless networks from eavesdroppers
WEP usually takes hours to crack


WEP has always been a long and tedious job, but this tutorial you crack it in 3 minutes


1. Run Kismet to find your target network. Get the SSID and the channel.
2. Run Airodump and start capturing data.
3. With Aireplay, start replaying a packet on the target network. (You can find a ‘good packet’ by looking at the BSSID MAC on Kismet and comparing it to the captured packet’s BSSID MAC).
4. Watch as Airodump goes crazy with new IVs. Thanks to Aireplay.
5. Stop Airodump when you have about 1,000 IVs.
6. Run Aircrack on the captured file.
7. You should see the WEP key infront of you now.

PROGRAMS USED:

-Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system
.
It is designed for Linux.

You can download it at www.kismetwireless.net
A windows version can be downloaded at Renderlab

-Aircrack (Includes Airodump, Aireplay, Aircrack and optional Airdecap for decrypting WEP/WPA capture files)

Aircrack is the 802.11 WEP and WPA-PSK keys cracking program that can recover this keys once enough encrypted packets have been captured with airodump.

Airdecap is used to decrypt WEP/WPA capture files.

Airmon can be used to configure the wireless card

Aireplay is used to inject frames.

Airodump is used for packet capturing of raw 802.11 frames and is particularly suitable for collecting WEP IVs (initialization vectors) for the intent of using them with aircrack-ng.

Download the whole suit at Aircrack


Disguise as GoogleBot to view Hidden Content of a Website


googlebot1.jpg



Ever experienced this? You ask Google to search something and it will return a lot of relevant results, but if you try to open the ones with the most promising content, you are confronted with a registration page instead, and the stuff you were looking for will not be revealed to you unless you agree to a credit card transaction first. This means that Google is able to see what a normal netizen cannot see.

The reason behind this is that Google uses a Bot called GoogleBot and most of websites which force users to register or even pay in order to search and use their content, leave a backdoor open for the GoogleBot because a prominent presence in Google searches is known to generate sales leads, site hits and exposure. Examples of such sites are Expert-Exchange, Windows Magazine, .Net Magazine, Nature, and many other sites around the globe.

What if you could disguise as GoogleBot then you can also see what GoogleBot can.

How to Disguise as GoogleBot?

It is Quite simple. You just need to change your browser’s User Agent. To change your Browser’s User Agent follow the steps given below:



* Copy the following code segment into a notepad file and save it as Useragent.reg or you may also download it.

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]
@=”Googlebot/2.1″
“Compatible”=”+http://www.googlebot.com/bot.html”

* Now Double-Click on the file Useragent.reg to merge the registry file into your Windows Registry.
* Now Restart your computer. This is required to apply the changes made into the Registry.
* Voila! You’re done! Now you have become GoogleBot.

How Revert back to Normal Agent?

* For IE users : To restore the IE User Agent, Follow the Given Steps Below:
o Copy the following code segment into a notepad file and save it as Normalagent.reg or you may also download it:

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]
@=”Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)”

o Now Double-Click on the file Normalagent.reg to merge the registry file into your Windows Registry.
o Now Restart your computer. This is required to apply the changes made into the Registry.
* For Opera Users : Opera allows on-the-fly for switching of User Agents through its “Browser Identification” function.


* For Firefox users : Just download User Agent Switcher extension for Firefox.

o Now Goto Tools -> User Agent Switcher -> Options -> Options.
o Click “User Agents”
o Click ” Add” and fill the following information in the form
+ Description: Googlebot
+ User Agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
+ App Name: Googlebot
+ App Version: 5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
+ Platform: +http://www.google.com/bot.html
+ Vendor:
+ Vendor Sub:
o Click “OK”.
o Now you may change the user agent on the fly.

02 November 2009

Scientists to build swarm of world's most advanced flying microbots

robobee-thumb-550x585-26841.jpg


Jeez, wouldn't it be fun to have your own swarm of robot bees? Someone at Harvard thought so, convincing the National Science Foundation to pony up $10 million for the development of a whole colony full of wing-flapping bee bots. The project will challenge the scientists to build the world's most advanced flying microbots, creating swarms of tiny autonomous individuals that can make their own decisions, dock with each other, simulate pollination, and contribute to the entire group.

"Inspired by the biology of a bee and the insect's hive behavior, we aim to push advances in miniature robotics and the design of compact high-energy power sources; spur innovations in ultra-low-power computing and electronic "smart" sensors; and refine coordination algorithms to manage multiple, independent machines. BTW, our robobees don't sting..."


The Harvard researchers have a head start: They'll take what they learned with a life-sized robotic fly they created in 2007, improve upon its tiny brain and smart sensors, and then develop software that exploits the advantages of hive intelligence. This is going to be amazing. How will they fit power sources, computing devices and navigation inside a package the size of a bee? Let's just hope they use this for good, and not for evil.

Check out this diagram of one of the robotic flying sea monkeys:

image_large-thumb-550x298-26842.jpg

01 November 2009

JPEG Binding

As posted earlier on my blog "Hide Your Files In A Picture"


Do you know most of the virus that infiltrate your computer
are stored secretly in a jpeg image? Well if you are not aware of this then you must read it.

# You will need the following.. Windows 2000 / XP
# Basic Knowledge of the Command Prompt

# WinRar

1. Gather your image and the files you wish to lodge into it. Here I have ABC.txt which I will hide inside my Madhuri.jpg.
2. Add the files you want to hide into a new RAR archive. (so ABC.txt.rar created newly)
3. Open Command Prompt and go to the folder where your files are located, e.g., ‘C:\hidden’.
5. At command prompt type ‘copy /b Madhuri.jpg + ABC.txt.rar Apple.jpg’ (without quotes).
(Madhuri.jpg is the picture I want to show, ABC.txt.rar is the file to be hidden, and Apple.jpg is the file which contains both.
6. Now test the Apple.jpg by double clicking it, and verifying it still opens.
7. Now try opening that same Apple.jpg file from menu: file->open of WinRar. It will show the original hidden file meeting.txt.

Done !!!!!

Now apple.jpg is a simple JPEG for others, but it contains a secret file ABC.txt for you !!!!!!!!!

You can also Encrypt your message like this while sending

Security Alert: Fraud Calls

Hello Friends,

If you receive a phone call on your Mobile from any person saying that they are checking your mobile line, and you have to press #90 or #09 or any other number. End this call immediately without pressing any numbers. Friends there is a fraud company using a device that once you press #90 or #09 they can access your SIM card and make calls at your expense. Forward this message to as many friends as u can, to stop it. This information has been confirmed by both Motorola and Nokia. There are over 3 million affected mobile phones. You can check this news at CNN web site
also.

Super Bluetooth Hack

28rpfrc.jpg
This is a New Version of Super Bluetooth Hack for Conventional and Mobile-based Symbian. This program through MDM can be used to control other people’s mobile phone at a distance (10-15 metres, it’s Then)

Super Bluetooth hack New 2008

More in New Version :

1) Connect via BT/Irda
2) Reading SMS
3) Changing time/alarms
4) Pressing keys…

What else can you do once connected to a another phone via blue tooth?

1) Read SMS matches.
2) Turn off telephone.
3) Switch on music.
4) Choose modes (normal, without sound …)
5) Block Phone.
6) Read his Contacts
7) Change Profile
8) Play his Ringtone even if phone is on silent
9) Restore Factory Settings.
10) Restart the phone
11) Change Ringing Volume
And here comes the best
“Call from his phone” it includes all call functions like hold etc.
And much, much more

Install:
1) Download
2) Pour on the mobile
3) Run the Installer (what you download, incidentally need JAVA)
4) He finds it, and you will be able to run software

5) Choose the language and going configured
6) Click Connection
7) Click search devices
8) Choose the “victim”
9) AND MANAGE

Creating Fake Gmail login page

1253867976_gmail_red.png

Now with this trick you can easily hack your friend's Gmail account without any problems because this phisher is the latest one which is present on the internet.First thing you should be knowing is what is a Phisher...So here it is

In Phishing a person tries to make a copy of the Web page of the actual server and tries to deceive the person by showing him that it is the web page of the server.For ex.I'll make a Yahoo Phisher and I'll try to send my web page to my victim which is hosted in some other site to come and give his e-mail and password so that he can receive some benefits,but when he types in the password and e-mail,the info is stored in another file...In that way i can hack him !

How to Setup your Own Gmail Phisher ?

The same process should be followed as given for Yahoo Fake Login, Facebook Phisher.But for the new visitor of this blog I'm posting it again

Download:Gmail Fake login Page/Phisher.

This phisher is 100% working and is virus free.


Now lets begin with our hacking then.....


1.First of all you got to download the phisher page and extract the files into a folder.



2. Create an account in anyone of these free hosting sites.(I would prefer 110mb.com since its quite easy to handle)

www.110mb.com

www.t35.com

www.freehostia.com


3 .Now upload all the files into your respective file hosting service,but keep one thing in mind ..DO NOT UPLOAD FILES INTO A DIRECTORY



4. In the case of 110mb.com,To upload the files you gotta go to file manager in 110mb.com


Hack Gmail Passwords

5. Then you can test it and open "index.htm" and provide this link to your victim



6. After the victim types in his information then a new file will be created in your file manager with the name "Passwords.htm".So when you open the file you will find the Username and password entered by your victim !

Crack Gmail Passwords


10. Now you have successfully setup a fake login page which is ready to hack passwords !If you like this post then please don't forget to subscribe !

I will be publishing more of these fake logins...so keep updated to my blog by subscribing !


My personal fake login page is GMAIL FAKE LOGIN
Try put anything in user name and password and u will see in comments.

Quantum Cryptography

Its is based on famous Werner Heisenberg uncertainty principle

Heisenberg.jpeg.jpg

0a1c02498125a255a2f5b0e58908a8ae.png

According to Heisenberg its meaning is that it is impossible to determine simultaneously both the position and velocity of an electron or any other particle with any degree of accuracy or certainty


Cryptography is basically the making and breaking of codes. So quantum cryptography is the making and breaking of codes using quantum physics.

At the moment, we use complicated maths equations to code important (and secret) information that we want to send around the place - things like banking details or credit card info. Now, these codes are really hard to break - so hard it would take millions of computers millions of hours to solve them. But if we end up with quantum computers (and we're heading that way pretty fast), these codes could be broken in moments. So we need to find a new way of encrypting our data to keep it safe, and the answer may well be quantum cryptography.

If you've read about quantum physics and quantum computing, you'll know that in the quantum world you can't measure something without changing it, and this quirk could be used to make the safest coding system around!

To use quantum cryptography, you firstly need a pair of photons (little packets of light). These photons must be "linked" at the quantum level. This way, if you do something to one (like measure its polarity for example), the other one will be affected. This pair of photons (or lots of pairs) can then be used to send the "key" for your code. If anyone, other than your receiver, tries to look at your photon key they'll change it and end up with nothing. Not only that, but you'll be able to tell that someone tried to hack into your system!


What is Quantum Computing?

So…Quantum Computing…yeah, what is it? Hey, some of us still have trouble with understanding just plain old computing , let alone the extra confusing quantum stuff. Quantum Computing can be a very confusing thing, that doesn’t mean we should ignore it and put in the too hard basket, because the applications for this are incredible.

In the future, quantum computing will allow us to do the work that millions of conventional computers would take millions of years of to do, in a fraction of a second. And Australians (surprise, surprise) are leading the way in this research. Good on us!

Quantum Computing relies quite heavily on something called quantum uncertainty, that just means you can’t know all the information about a quantum particle (eg. an electron) without changing it. It is impossible to measure both the position and momentum (movement) of a quantum particle at the same time.

In a conventional computer, information is stored as ‘bits’, 8bits = 1 byte, 1000 bytes = 1 megabyte…etc. Bits are either 1’s or 0’s, or On or Off. This is how the whole computer and digital thing works, using bits that are either on or not. The quantum bit or ‘quibit’ (pronounced kwibit) is a variation of this with the uncertainty thrown in. Quibits can be both 1 AND 0 at the same time, not one or the other, as well all the combinations of the other numbers in between. This makes an infinite amount of information that can be stored in just 1 quibit.

With this kind of computing power, the applications for high powered computing is enourmous. People used to talk about mobile phones having more computing power than NASA did to send people to the moon, imagine having that, and more, in one single bit!

Miracle of Grid computing

The Story Of Multiple Cores
" The geniuses at Intel decided to add more processors and gave birth to the Dual Core and Quad Core Processors seen today..."


Gordon Moore - the man who proposed Moore's law



v11_4.jpg



Trivia: Did you know ?

The first Intel chip brought out in 1971 had a processor speed of 740KHz, while today's processors easily touch 3 GHz - an increase of 4000 times in 30 years!

This is being counteracted by building smaller transistors which will generate lesser heat. But how much smaller can it get? The latest 45-nm Intel chips deal with transistors around 200 atoms in width (A silicon atom has a diameter of .2 nanometres). At these lengths, quantum effects creep in and make it very hard to construct predictable systems. This means that we cannot make the processors any faster without overheating them unless we find an effective way to cool them down.

v11_5.jpg


Intel Penryn 45nm chip


But that did not stop the geniuses at Intel/AMD from coming up with new ways to extend Moore’s Law. They decided to add more processors and gave birth to the Dual Core and Quad Core processors we see today. But does this really make your computer faster? Of course, you might think that more processors mean more computing power. Indeed, it means more potential computing power. How much of this is used?

Let us take an example. Say you have 2 processors which can do 2 “jobs” per second. You have 4 jobs. Of course, you can give 2 jobs to each processor and finish your work twice as fast (assuming the jobs are independent). Now, what if you have only 1 job? Does the second processor help? It could, if we can split the job into smaller steps. Let us assume each job consists of 4 “steps” A, B, C and D as shown in the diagram (also called a Directed Acyclic Graph for those of you who remember CS1102 J). But you need to do A first, and with the answer you get from A, you can do B and C and when both are done, you need to do D. How will you distribute this among the 2 processors?
v117.JPG

Directed Acyclic Graph showing splitting of a job

grid01.jpg


Typical Grid farm

We can ask processor 1 (lets call it P1) to do A (and P2 remains idle). Then we do B and C simultaneously. But wait! P2 does not know the answer to A. So, we send the information over from P1 to P2. But remember this takes time. Then, when P1 is done with B, it has to wait for P2 (because of the time wasted in transferring the answer). When P2 is done, it sends the information back to P1 (which again takes time) and P1 does D using the results of B and C.

v116.gif

Algorithms to split jobs are crucial in Grid Computing.

The job was definitely done faster; But definitely not twice as fast. And both processes remained idle for significant times, so their efficiency was not all that great. Unfortunately, most “jobs” in real life are heavily interdependent and cost of transferring resources might be significant. Now imagine how complex this would get if you had 8 processors and how much processing power would be wasted! So, in this case, more is NOT always better as everyone would make you believe. Algorithms have been developed to solve this problem. In fact, developing algorithms to split jobs between processors is currently an active area of research, especially in Grid computing where a large number of processors are separated by the internet and the cost of transferring resources is very significant. The algorithms cannot be so time consuming that you take more time to decide where to run something than actually running it!

Trivia: Did you know

In a basic Grid computing system, every computer can access the resources of every other computer belonging to the network.


I hope this helped you understand why your Core 2 Duos with the same GHz number are not anywhere near twice as fast as your Pentium 4s.


Anyways once again the day is saved, thanks to some good marketing and determination and Moore’s Law continues to hold. But how long will it last? We have to wait and see!

Screen rotation on nokia N1600

IT's a very cool trick to see screen rotation on Nokia N 1600
Just press *#5512#
Phone screen will be rotated 90 degree
Continue with *#5513# 180 degree
*#5514# 270 degree
*#5515# back to normal that is now rotated 360 degree

31 October 2009

Make ur xp genuine in one line steps(no software needed works 100%)

1.Goto "start"
2.Run-type in "regedit"
3.Goto "local-machine-software-microsoft-window s nt-current version-wpaevents"
4.choose "oobe timer" in the rights panel
5.in the window,delete all the things.
6.close regedit
7.goto start-run-type in "%systemroot%\system32\oobe\msoobe.exe /a"
8.choose the second option "use phone to activate"
9.click "change product key"
10.type in the serial:thmpv-77d6f-94376-8hgkg-vrdrq
11.click "update"
12.click"remember later"
13.after that restart the computer
14.after restart goto start-run-type in "%systemroot%\system32\oobe\msoobe.exe /a"
15.it should come up with a message"windows activated"-finished!

It was tested & it works 100 % Only For Windows XP.

How To Use Multiple Google Talk Accounts In The Same Time



If you have several Google Talk accounts, you may want to run multiple instances of Google Talk at once but by default you can't do it. Here is a little tutorial on how you can do that:

1. Right click on the desktop.

2. Select New - Shortcut.

3. Paste this into the text box: "C:\program files\google\google talk\googletalk.exe" /nomutex

If you didn't installed Google talk to the default location, change c:\program files\google\google talk\googletalk.exe to the location you installed Google Talk.

4. Click Next.

5. Give it a random name.

6. Click Finish.

Edit Any Website You Want



This is a java script which allows u to edit any website........ change every text in the website.... but not save it!!!!!

1. Go to any website

2. Paste the below code in the address bar of your browser

3. You can edit the website , but you cannot save it.


javascript:document.body.contentEditable='true'; document.designMode='on'; void 0

Hide Your Files In A Picture

Steps:
1. Save the picture of choice to your desktop.
2. Make a new .rar or .zip folder on your desktop.
3. Add the files you want to hide into the .zip or .rar
4. Click start menu, run, cmd.
5. In Command Prompt type cd "desktop" with the quotation marks.
6. Now type in copy /b picturename.jpg + foldername.rar outputfilename.jpg
( If you use .zip then: copy /b picturename.jpg + foldername.zip outputfilename.jpg)
7. Now there should be the outputed file name with a .jpg extension on the desktop.
( Do not close Command Prompt just yet )
8. Double click it to open the picture and check it out.
9. When your done looking, and want to view the hidden files
Type: ren outputfilename.jpg outputfilename.rar or zip
Now you're done!
A quick info-fact:
With this technique of hiding files in a jpg you can send this to anyone and they just have to rename the file extension to .zip or .rar.

Crack the XP and validate u r copy


Use the trick . it is work 90%

paste the text in to Notepad and save it as a .reg file

execute it and make u r os as a genuine ........


Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"
"ProductId"="55274-640-7450093-23464"
"DigitalProductId"=hex:a4,00,00,00,03,00,00,00,35, 35,32,37,34,2d,36,34,30,2d,\
37,34,35,30,30,39,33,2d,32,33,34,36,34,00,2e,00,00 ,00,41,32,32,2d,30,30,30,\
30,31,00,00,00,00,00,00,00,62,fc,61,4c,e0,26,33,16 ,05,d3,54,e7,a0,de,00,00,\
00,00,00,00,49,36,c2,49,20,47,0c,00,00,00,00,00,00 ,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,33,33,35,30,30,00 ,00,00,00,00,00,00,65,10,\
00,00,74,99,dd,b0,f7,07,00,00,98,10,00,00,00,00,00 ,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00 ,c4,ae,d6,1c
"LicenseInfo"=hex:e7,77,18,19,f8,08,fc,7d,e8,f0,df ,12,6e,46,cb,3f,ad,b2,dd,b9,\
15,18,16,c0,bc,c3,6a,7d,4a,80,8b,31,13,37,5a,78,a2 ,06,c8,6b,b9,d9,dd,cc,6a,\
9c,c5,9b,77,aa,07,8d,56,6a,7c,e4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents]
"OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,f d

FORMAT UR MOBILE PHONE (Nokia S60)

....VERY RARE TRICK...ONLY PROFESSIONALS AND WIZKID KNOW IT...

Here is the trick for complete formatting of ur virus infected or other problem arriving mobile phone...

This trick is for almost all nokia models....

1.Switch off ur phone...
2.Remove sim card & memory chip...
3.Now press & hold keys - 3,*,call(green) ...
4.Then without leaving these three buttons press power button...
5.Formatting task will be started...
6.Remember its a very rare trick....

Bush hid the facts


For those of you using Windows, do the following:

1.) Open an empty notepad file
2.) Type "Bush hid the facts" (without the quotes)

3 .) Save it as whatever you want.
4.) Close it, and re-open it.

How to connect your friend’s pc and solve his problems sitting at ur home

Its very easy and useful for us to help our friends with their computer problems.This trick allows you to access your friend's computer and then solve the problem by sitting at your home no matter if u r on other OTHER end of the world.

Just follow the instructions.

1- Go to link and free download the software.
Team Viewer

Your friend should have installed it too.

2- install it not run it.

3- check on personal

4- Agree on both terms

5- Use normal installation and click next.

6-setup is finished.

Now when it starts it will give u ur ID and PASS.
In order to access ur friends computer u will need his Pass AND ID then click on Connect to partner.His desktop will appear on UR desktop.

Trick: Restart only Windows, not your Computer

When you click on the SHUTDOWN button, make sure to simultaneous press SHIFT Button. If you hold the Shift key down while clicking on SHUTDOWN button, you computer would restart without restarting the Computer.
This is equivalent to term "HOT REBOOT"

Clean Your RAM & Make Your Comp Speed Better



Clean your RAM
You may recognize that your system gets slower and slower when playing and working a lot with your Desktop or a laptop. That’s because your RAM is full of remaining progress pieces you do not need any more.
Open the notepad and type

FreeMem=Space(64000000)
in this file and save it as RAMcleaner.vbs [ You should choose the “All Files” option when u save it ]

Run the file and ur RAM may be cleaned :>
Of course u can edit the code in the file for a greater “cleaning-progress”.

FreeMem=Space(128000000)

just try it out.. it worked for me.

Hide your Hard Disk Drives | Hide Important data from other USERS



When you need to secure your important data from other users, there are so many choice over there like folder protect,hide folder and much more. But imagine if your data size is more than 100 GB then it is not easy to burn it on CD or protect it. So don't worry friends, I am posting a trick by using this trick you can save your full drive by hiding it from other users. You can hide your drives without any Registry Edit.


1. Log on as Administrator

2. Click on Start button then click on Run > Type CMD

3. Now type diskpart at the command prompt and wait for 5 seconds to appear diskpart> utility.

4. To show the list of volume, type list volume
command after the diskpart> prompt, this command will show you all system drives detail.


5. Now Select the volume that you want to hide for example

If you want to hide F drive then first type select volume 2 (in this case) and hit enter button

6. After selecting volume, type Remove letter F (in this case) to hide F drive.

7. DONE. Now you hide your drive successfully..to verify go to My Computer and check drives

8. But next time, when you want to unhide the F drive, just type assign letter F command after loading volume 2.

Try to create a folder



In windows we cannot use the name CON for any folder.. even tech from the Microsoft couldn't resolve it..
But here again, is the solution to create the folder named con and other system variables.

1) go to run dialog.
2) type cmd/command (command prompt gets opened)
3) go to root directory like C:\ or D:\ etc
4) type md\\.\\c:\\con ....(here is done)
5) check the folder on the respected drive.

Top 33 Torrent search engine

1. The Pirate Bay
(Pirate Bay is quickly becoming the favorite torrent search site of millions of P2P downloaders. Like Isohunt, Pirate Bay has an immense database of the latest torrents.)

2. Torrentz.com

3. TorrentTyphoon.com
(a unique bittorrent search engine that searches several of the most popular sites. )

4. Torr-bott.com

5. TorrentIt.com
(a limited-membership database with high quality service)

6. Yotoshi.com
(one of the more advanced, dead torrent filtering search engines )

7. bittorrent.com
(the official Torrent website by Bram Cohen, the designer of the Python BitTorrent format.)

8. Torrent-finder.com
(one of the more advanced, filter most torrent engine )

9. Bitoogle.com
(the 'original' bittorrent search engine)

10. Bi-Torrent.com

11. Torrentmatrix.com
(Urgent: Torrentmatrix requires you to sign up with a free membership to confirm your email identity. The membership will be capped at 100,000 members, and as of June 5, there were 92,000 members. Join today if you wish to participate in this popular forum for Torrent sharing.)

12. MiniNova.org

13. Torrentspy.com

14. TvTorrents.com
(Specializes in television shows)

15. TvTorrents.ws (Under Repair)
(More television shows)

16. HyperTorrent.com

17. Torrentreactor.to
(Torrentreactor is making a comeback from a hijacking and an uncooperative hosting service. They have recently moved to a different server setup and a Tonga country domain outside the USA. Read the the details on their home page.)


18. torrentbox.com

19. btefnet.net (Temporarily Shut Down)
(UPDATE: the Btefnet webmaster has shut down the site voluntarily under threat of civil litigation. While it was running, Btefnet specialized in television shows, and it was a very popular search database while it lasted.)

20. LegalTorrents.com
(As the name implies, this is a database of public-domain content.)

21. BitTorrents.com
(The resurrection of Suprnova.org, which was plagued by hijackers in 2004. This reborn service is a paid subscription at approximately $40USD for each year of unlimited access. If you can afford the price, Bittorrents.com provides a very broad P2P database)

22. BTbot.com

23. Torrentsearch.us

24. Bitoogle.com

25. Throughput.de

26. Bitower.com

27. Thinktorrent.com (Temporarily Down)

28. FileList.org

29. FileMP3.org

30. TorrentBytes.net

31. torrentportal.com

32. LokiTorrent.com (Temporarily Shutdown)
(In a precedent-setting MPAA civil law suit, Loki has been shut down by court order as of Feb 10, 2005. To add insult to injury, the MPAA has left a trashy saber-rattling message at the lokitorrent home page in an attempt to intimidate other P2P users. P2P users everywhere are mourning the loss of this excellent service, and the MPAA is estranging even more Internet users with its heavy-handed campaign.)

33. Commonbits.com (This new beta search site is dedicated to media on progressive political content: audio, video, photos, reports, transcripts and other files. This is a place for activists to share their message, and for people to learn about other political choices.)

watch secret star wars on telnet



1) Open RUN Prompt and type "telnet" (Without quotes). You can find Run Prompt by pressing the Windows and R button together or you can find it in the Start Menu.

2) A Black color Command box appears.

3) Type O and press Enter. ( O stands for Open Port in Microsoft Telnet ).

4) Now type after the prompt "towel.blinkenlights.nl" without the quotes

5) Press Enter and Voila!!!! , You will see Star Wars Movies being played out.


What amuses one is the characters in the movie , the environment , and the fonts are made out of all the characters in ASCII table.

U must have an internet connection .speed do doesn't matter

29 October 2009








Apple-iTablet.jpg




Apple’s iPad was coming a long way but hey, here’s something that’s giving the fans-of-the-forbidden-geek-fruit new hope. Well, we did finally not waste our time by rumoring around with the size and announcement of the tablet, though the latter came even earlier than we projected. To be more specific, the ‘real’ iPad will sport a 10.7 inch touch screen display and will run on the iPhone OS! There’s also word that it will have both, 3G and non-3G versions. That’s surely cool. We can expect the iPad announcement by January 19th 2010. The release date is most likely to be in the middle of the year. So long, so bad.

Create A Huge File



You can create a file of any size using nothing more than what's supplied with Windows. Start by converting the desired file size into hexadecimal notation. You can use the Windows Calculator in Scientific mode do to this. Suppose you want a file of 1 million bytes. Enter 1000000 in the calculator and click on the Hex option to convert it (1 million in hex is F4240.) Pad the result with zeroes at the left until the file size reaches eight digitsó000F4240.

Now open a command prompt window. In Windows 95, 98, or Me, you can do this by entering COMMAND in the Start menu's Run dialog; in Windows NT 4.0, 2000, or XP enter CMD instead. Enter the command DEBUG BIGFILE.DAT and ignore the File not found message. Type RCX and press Enter. Debug will display a colon prompt. Enter the last four digits of the hexadecimal number you calculated (4240, in our example). Type RBX and press Enter, then enter the first four digits of the hexadecimal size (000F, in our example). Enter W for Write and Q for Quit. You've just created a 1-million-byte file using Debug. Of course you can create a file of any desired size using the same technique.

Unlimited Rapidshare Downloads



Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps:

clean up IE or netscape cookie( In this case the one that belong to rapidshare website)
On Command prompt
type -----> ipconfig /flushdns <---Enter
type -----> ipconfig /release <---Enter
type -----> ipconfig /renew <---Enter
type -----> exit <--------Enter


Or save these commands in a bat file and run it everytime you need to fool Rapidshare server.Remember to clean up rapidshare cookie in your temp Internet files folder.

Now you should be ready to download as many files as you want from their server.

And there is this cool link: paste it in the browser and see
CODE
LINK

PC vs. Mac death match: Snow Leopard beats Windows 7



Windows 7 is a worthy rival, but Mac OS X Snow Leopard is the better operating system by a whisker for discriminating professionals

I have a confession: I'm a switcher. My long journey with Windows, which began even before Windows with MS-DOS, ended with Windows Vista. While so many others navigated the Vista debacle by sticking with Windows XP, I gave Vista a try -- and gave up. I leapt to the Mac OS.

Could Windows 7 lure me back?



Windows 7 was built to fix the problems that plagued Vista, and it unquestionably succeeds in doing that. It's a bit less bloated, and it runs a bit faster. The annoying security alerts from User Account Control have been quieted. And the compatibility issues with third-party software and hardware device drivers have largely been ironed away; after all, it's been two and a half years since Vista debuted. Windows 7 even includes a virtual "XP mode" for running legacy programs.

[ Which is better? The Mac OS and Windows 7 UIs face off. | Get InfoWorld's 21-page hands-on look at the next version of Windows, from InfoWorld’s editors and contributors. | Find out what's new, what's wrong, and what's good about Windows 7 in InfoWorld's "Windows 7: The essential guide." ]

Windows 7 goes a few steps beyond merely repairing Vista. It borrows --and improves on -- tricks from the Mac's playbook to make it easier and faster to organize files and launch programs. Like Apple's operating system, Windows 7 not only looks good, but it has tools and shortcuts that help you work more efficiently. If there were ever a Windows that could challenge Mac OS X, Windows 7 is it.

Still, once you've had Mac, can you ever go back? Mac OS X Leopard received rave reviews for good reason, and Snow Leopard further improved OS X. Although the changes to the GUI are minimal (why mess with success?), there are important improvements under the hood, including a recoded, 64-bit Finder that takes better advantage of multicore processors. Snow Leopard also makes the Mac a better fit with PC-oriented businesses with integrated Mail, Address Book, and iCal support for Microsoft Exchange Server 2007.

After spending a few weeks with both new operating systems and exposing each to my geek's gauntlet of everyday tasks -- e-mail, instant messaging, Web surfing, blogging, creating and editing Office documents, Web page creation, and audio, video, and photo editing -- I have to call Snow Leopard the winner. All considered, from starting up to backing up, Mac OS X still offers the best overall user experience. The competition was close, though -- far closer than it's been in quite a while.

Read on to find out how Windows 7 and Snow Leopard compare in usability, features, security, and speed. In some areas the winner is clear, while in others I have to call it a draw. Generally where one wins, the other is not far behind. Perhaps not surprisingly, Apple and Microsoft largely agree on how an operating system should look and act when you're trying to get work done. The similarities are often striking.

One last note before we dive into the details: To test the operating systems, I installed each on a dedicated laptop computer that had previously been running the earlier version. In each case, either shipping or release candidate code was used for the initial installation, and each was current with all patches and updates as of the date of testing.

Usability: File exploring While noting that there are options you can set to determine just how files and folders will be displayed, both Windows 7 and Snow Leopard follow the same basic script for letting you find files. The larger units (computer, network, libraries, and so on) are on the left side of the window, while details are on the right.

Windows 7 places more options in front of the user with the bar at the top of the window, while Snow Leopard tends to place the options under buttons there. No huge difference here, though I'll say that the "more intuitive" description that Mac users love to throw around suffers a bit when intuition is hidden under icons. It's true that you can add tasks to the toolbar in Mac OS X, but it requires more work than simply accepting the default options in Windows 7.

The larger difference comes in Windows 7's treatment of "libraries." In a library, you can collect files of various sorts without moving them from the folder where they're stored; libraries can even collect files from different disks. It's easy to create these collections of whatever you'd like and pin them to the left-hand side of the window. If you're like me, a file pack rat who tends to work on a number of different projects at once, then the libraries can be a major improvement in the way you work with files.

Verdict: Yes, Snow Leopard has the ability to move documents into stacks on the Dock, but the Windows 7 libraries are much more powerful and flexible. Advantage: Windows 7.

Usability: Launching applications There is no more iconic visual symbol for Mac OS X than the dock, that strip at the bottom of the screen where frequently used applications live. It's easy to forget that you can launch most programs from the applications folder, but good to remember before your dock becomes hopelessly overcrowded. Snow Leopard didn't make significant changes to the dock, so users accustomed to the Leopard way of doing things should be comfortable with Snow Leopard's as well.

Windows 7, on the other hand, makes significant changes to the Windows task bar. It's now possible to pin applications to the task bar to make it far more Mac-like. Further, Windows 7 improves on the Mac model by allowing you to pin folders to the task bar, as well. The Windows 7 task bar can also be moved around the screen, appearing at the bottom, top, or either side, though most users will find it easier to let it sit at the bottom, where it's always been.

Verdict: The ability to pin folders is a genuine improvement to the Windows task bar, especially when your work requires you to constantly refer back to the same set of files. Advantage: Windows 7.

Usability: Managing windows One of the more noticeable functions of Windows Aero is the "glass" view of the desktop. When the cursor hovers over a small bar in the lower-right corner of the screen, all the active windows turn transparent, allowing you to see the desktop underneath. A variation on this comes when you hover over an application on the taskbar, to bring up a thumbnail of the application screen (or rows of thumbnails, if the app has multiple windows open), then hover over the thumbnail; the application's window becomes active while all other windows become transparent. The visual effect is pretty cool, even if the functionality isn't required in every situation.

The Snow Leopard equivalent comes when you click and hold on a dock icon that represents an application that is running. A shrunken application window appears over a darkened desktop, and the application can be chosen with a single click. The Snow Leopard representation comes forward regardless of which Spaces desktop the application is running within, so it's a fast way to jump between the various desktops. Snow Leopard can also let you see all of the running applications in small, side-by-side windows, so it's easy to choose which you should hop to next.

Verdict: While the Windows 7 application and desktop view is graphically richer, the Snow Leopard method is more fully integrated within the rest of the user interface. By a narrow margin, the advantage goes to Snow Leopard.

Usability: Searching The Mac OS X Spotlight offers a powerful way to launch both applications and data files by typing a search string, then choosing the desired file from the results list. While Windows Vista has a search function as part of the Start menu, it's not as powerful as the Mac OS X Spotlight. In Windows 7, the search feature gets major upgrades, becoming a genuine rival for the Mac OS X Spotlight.

If you open the Start menu and begin typing, Windows 7 will bring up a list of programs, control panel items, documents, and media files whose titles contain the string you're typing. This is very similar to the approach Spotlight takes, and it's powerful enough to be faster than scrolling through the application menus if you have more than a very basic set of applications on your system.

What we're really seeing is that both Windows and the Mac OS are converging toward a common model, in which most applications (and the most common data files) will be accessed through icons on the dock or the menu bar, while less-common apps and data are accessed through rapid search results. The traditional Start menu and application folder are obviously being replaced by more efficient ways of launching applications.

Verdict: Both companies have reached similar conclusions about the best ways of navigating applications as well as files, so there's no clear advantage for one over the other. Draw.

Performance: An extra inch Microsoft promised to make Windows 7 faster and leaner than Vista, and InfoWorld lab tests show slight improvements on both counts. OfficeBench, which measures the time required to complete a variety of Microsoft Office tasks, puts Windows 7 at roughly 4 percent faster than Vista (and 15 percent slower than XP). InfoWorld's OfficeBench tests also show that Windows 7 uses about 8 percent less RAM than Vista when running an identical workload. PC World WorldBench tests likewise indicate "incremental" speed improvements.

Whether Snow Leopard is faster than Leopard seems to depend both on the task and on the machine. In Macworld tests, the biggest consistent speed improvements were in system shutdowns and initial Time Machine backups. Snow Leopard was no faster than Leopard at starting up or running a Photoshop script, and it was slower at duplicating a 1GB file in the Finder and at waking from sleep. Results for other tasks were inconsistent across an iMac, a MacBook Pro, and a Mac Pro.

In short, Leopard users may or may not notice the additional oomph provided by Snow Leopard's 64-bit Finder, QuickTime X, or Safari 4 browser. Further, the effects of two other behind-the-scenes innovations won't be felt until application programmers begin to take advantage of them. Snow Leopard's Grand Central Dispatch will allow programmers to optimize application performance on multicore processors, while OpenCL will let them tap certain graphics processors to give the CPU a helping hand.

The good news today, however, is that both operating systems snap to attention relatively quickly. In my startup tests, Windows 7 required 2 minutes, 17.9 seconds to move from power-button press to ready. Snow Leopard moved from button press to ready in 1 minute, 15.1 seconds. Naturally, I recorded these times was with no password required; password protection will cost you a few more seconds, but I consider it a good investment.

While the two systems weren’t identically configured in terms of the applications that load on startup, they were configured similarly. Each loaded a firewall, antivirus software, Dropbox (a cloud file storage system), Plaxo (cloud contact manager), and the Evernote clipper. Each started a network and Bluetooth service set. Each had a healthy number of fonts available and the same set of three printers on the network. In short, they were loaded with software that users might regularly use to get their jobs done.

In general responsiveness, for doing things like launching applications and switching tasks, I couldn't say that one was any faster than the other. I found the two to be very similar. There is one area, though, in which Snow Leopard seemed to perform better than Windows 7, and that’s in continous operation over the course of several days.

Here’s what I mean: I’m forever shutting the lid on my laptop, picking it up, and heading to another location. If I don’t think about it, I can go several days without shutting the system down. Each of the systems does, eventually, need a reboot to keep everything happy, but Snow Leopard can easily go four or five days without requiring a full power-off and cold boot. Windows 7 seems happiest when I reboot it every couple of days, though that’s a major improvement over Vista, which wanted to be shut down every night. I understand that my way of operating probably isn’t best, but it’s also not uncommon, and Snow Leopard seems to enforce garbage collection and polite behavior of applications a bit better than Windows 7.

Verdict: Neither operating system seemed more responsive or faster than the other. There's a clear winner in boot speed, as Snow Leopard is ready a full minute faster than Windows 7. In terms of ability to handle continuous operation, while Windows 7 is a dramatic improvement over Vista, I still have to give the nod to Snow Leopard.

Security: Fortress vs. outpost Windows 7 has made several important strides in security over Vista. The most important centers around improvements in User Account Control, the security feature most responsible for users' profanity-laced tirades against Vista.

The problem with Vista's UAC is that it is a blunt instrument for controlling application installation and activity. With Windows 7, the controls over UAC and the warnings it gives have become much finer-grained, allowing the user to tell UAC that a particular application or process is trusted, and should therefore not be the source of incessant warnings and permission requests. The changes make UAC in Windows 7 a much more useful security technology because it's much less likely to be turned off by the user.

Both Windows 7 and Snow Leopard offer built-in encryption, an important feature if you store personal or company data on a laptop. Snow Leopard has the ability to encrypt your home folder -- the place where virtually all your documents and data files will live unless you explicitly tell them to go somewhere else. It's set up through a simple check box in a system preferences dialog, and it requires relatively little processing overhead after its initial encryption session.

Windows 7 inherits BitLocker drive encryption from Vista with one important update and one significant limitation. The limitation is that BitLocker, which can encrypt an entire disk or any chosen files or folders, is only available in the Ultimate and Enterprise editions of the operating system. The improvement is that, if you have Ultimate or Enterprise installed, you can now encrypt USB thumb drives as you would a hard disk. That's a nontrivial consideration, and one that could drive the selection of a Windows 7 version.

BitLocker can be controlled through AppLocker, a Windows 7 Enterprise feature that permits central control of the applications allowed to run on a system or group of systems. AppLocker is, along with Direct Access (a secure remote access method that can eliminate the need for third-party VPN software), a significant step up in corporate security for Windows 7.

Both Windows 7 and Snow Leopard have built-in firewalls, and each operating system allows for fine control over resource sharing, computer identity display, and network discovery. Many commenters have made the point that Windows 7 security is more advanced and capable than the security built into Snow Leopard. That is almost certainly true. It's equally true that the number of exploits attempted against Windows machines versus Macintosh computers make stronger security a more stringent requirement for the Windows system.

There's another thing I have to mention: system updates. In the time I've had Windows 7 installed, there has been a regular stream of patches and updates. I know that patching vulnerabilities is crucial, and I applaud Microsoft for moving quickly on this front, but the fact that I am regularly informed of updates plants questions in my head over security and reliability. Snow Leopard has been updated, yes, but at far less frequent intervals than Windows 7, a pattern that each operating system is continuing from its predecessor.

Verdict: I'd love to have a clear winner on this point, but in considering everything I'm going to call security a draw. Each system is better than its predecessor. Neither is perfect, but each will allow me to work without constant fear of data loss. It's a good draw, but a draw nonetheless.

Compatibility: Role reversalIn some ways, it's a bit early to draw conclusions about overall compatibility with existing applications, but a couple of statements can be made. First, I have been surprised by the number of Mac applications requiring new versions to work properly with Snow Leopard. For an operating system upgrade that did not carry a new user interface or entirely new code base, the number of bent and broken applications has been large. From Microsoft Office applications through Firefox and even less popular applications, many apps have required new versions in order to function with Snow Leopard.

So far, I have found very few applications that refuse to run with Windows 7. There are a couple, including the ZoneAlarm firewall, but most of the personal productivity apps have run quite well to this point. I suspect there will be a flood of new application versions that take advantage of the updated user interface presented by Windows 7, but those are upgrades, rather than patches to allow basic functionality.

Verdict: We're a long way from Vista. The compatibility points go to Windows 7.

Built-in apps and utilities Apple made significant improvements to Mail, Address Book, and iCal in Snow Leopard, bringing Exchange 2007 compatibility to these built-in apps. When you add the functions of iLife ($79), many of the basic communication and media production tasks most consumers (and many business users) will need to accomplish can be handled without spending a whole lot extra on application software.

Microsoft has taken the opposite approach, stripping Mail, Movie Maker, and other basic application software out of Windows 7. This succeeds in making the footprint smaller for users who don’t want or need these functions. If you do need them, Microsoft has made Windows Live versions of Mail, Movie Maker, Writer (for blogging), and other applications available for free download. The new Live apps seem quite good, but obtaining them requires another step for users to go through.

Here's another small, but telling, issue with the basic applications from each company. While the Mac's Mail has been improved to work with Exchange Server 2007 out of the box, Windows Live Mail requires that the Exchange Server use the IMAP 4 protocol (rather than the native Exchange protocols) to delver mail. I’m not sure why this is so, but if you want to have Exchange functionality without buying additional software, then the Mac is the better answer. Go figure.

There are, of course, some additional apps and functions that are common to both operating systems. Each comes with its own browser, Internet Explorer 8 for Windows 7 and Safari 4 for Snow Leopard. Each is much improved over previous editions, and each is a modern, tabbed, fully functional Web browser. IE8 has far more add-in programs available than Safari 4. Whether you consider this a good or bad thing depends heavily on your philosophy of the Web browser. Me? I use Firefox as my principal browser on both platforms.

File sharing on local networks is relatively straightforward on both systems, with each even finding the other on its list of available computers. It’s worth noting that both the Mac and Windows 7 have file sharing and local network features that become much richer and easier to use if they’re part of a homogenous network -- if all the computers on the network are either Macs or Windows 7 machines. When traveling outside my local network I found Snow Leopard to be the easier system to use when finding and making connections to other networks. Windows 7 is much better than Vista at making wireless network connections, but it still wanted to put too many networks in the “unknown” category and hang on to public settings even after I came back to my office network. It’s much better than it was, but Snow Leopard still requires much less user involvement for most situations.

Backup is a critical area that Snow Leopard still wins outright. With Time Machine I plug in a USB hard drive and forget about it. Windows Backup is sufficient for most individual users, but it requires setup and isn’t nearly as simple as Time Machine. Since, for most users, setting up any backup routine is an issue of overcoming lethargy and complication, the Snow Leopard solution wins here.

Verdict: The basic applications from both Microsoft and Apple are far better than they were even two years ago, and you can’t beat the price. Although the system utilities for networking, file sharing, backups, and other tasks are largely equivalent on both platforms, the Mac's are typically simpler to use. The advantage here, while not huge, goes to Snow Leopard.

A cat by the tailAlthough I gave Snow Leopard the edge in most categories, it was a much closer contest than this former Vista user expected. I would be content to use either operating system as my daily work platform, and in fact there will be a role in my office for both. Neither left me cursing its shortcomings, and each will be able to support the sort of applications I need to be productive for some time to come.

The good news for both Mac and Windows users is that the belt will rest easily with Apple for only a short time. Windows 7 is clearly the operating system that Vista should have been, and Windows is now on a par with Mac OS X. Windows could easily pull ahead as future developments like WinFS come on line.

As the lights come up the Mac faithful can stand proud, but the rematch is coming -- and it promises to be a doozy.

What Should I Do With Image Files?






1. What's a image file?
(>) A image file is a CD/DVD, but instead of insert it into your CD/DVD-Rom, you open it from inside your Hard Disk. So, it's a file that replaces a normal CD/DVD. Inside the image are the CD/DVD files like if it were a CD/DVD.

2. What are the image files extensions?
(>) There's many extensions, but the most common are:
(>) iSO (Generic image file)
(>) BiN/CUE (Generic BiN image file)
(>) NRG (An image created using Nero Burning ROM)
(>) iMG/CCD/SUB (An image created using CloneCD)
(>) MDF (An image created using MagicISO Maker)

There are many other images, but these are the most common.

3. How to open a image file?
(>) The most common way to open image files, is to use a virtual CD/DVD-Rom. It's like a normal CD/DVD-Rom, only that you mount the images directly from your computer, installing a simple program.

4. What program should i use to create images files?
(>) Usually a CD/DVD Burning software has that option, but personally i use UltraISO. It allow me to create an ISO, BiN/CUE, NRG and iMG/CCD/SUB image file.

5. What program should i use to mount the images?
(>) Daemon-Tools is the most powerful one to use, and the most simple too.

6. How to burn a image file?
(>) Some image files must be burned using a certain software in order to work fine, but usually a common CD/DVD burning software works fine. I use Nero Burning ROM to burn my images.

7. How to work with Daemon-Tools?
(>) 1. Install the software into your Hard Drive. After installing reboot (or not) your PC.
(>) 2. After 1. , open Daemon-Tools. It will appear in your startup bar.
(>) 3. Right click on it, go to Virtual CD/DVD-ROM ª Set number of devices ª 2 Drives. If you want to use more drives you can set it on. I personally use 2. It's your decision.
(>) 4. Right click on it, go to Virtual CD/DVD-ROM ª Device x: [X:](....). Here you will mount your image. Just choose the image to open it (x means Device 1 or 2, etc.)([X:] the letter of your device).
(>) 5. Done, now your image is working like a CD.

8. How to burn with Nero Burning ROM?
(>) 1. Install Nero Burning ROM.
(>) 2. Open it, choose what is the storage type you gonna use to burn the image, or is a CD or a DVD.
(>) 3. Go to Copy and Backup ª Burn Image to Disc.
(>) 4. Choose the image you want to burn.
(>) 5. Done, let it burn baby!

FiNAL NOTES:
(>) If you want to burn a BiN with Nero Burning ROM, you will have to have the CUE file. When you are going to open the image, if it's BiN, you open the CUE file. If you don't have the CUE and you don't want to download it, it's simple:
1. Open Daemon-Tools.
2. Mount your BiN file.
3. Open Nero Burning ROM.
4. Open it, choose what is the storage type you gonna use to burn the image, or is a CD or a DVD.
5. Go to Data ª Make Data CD.
6. Now open the image you mounted through your virtual drive. Select all files, and drag the files into Nero Burning ROM window that is opened.
7. Done, let it burn.

26 October 2009

Give a look of Mac OS X on Windows XP

header.png


Flyakite OSX (visually) transforms your Windows XP desktop environment into a a complete simulation of a Mac computer, including cursors, sounds, visual styles, login screen and other details. The program bundles a variety of individual tool to add additional Mac functionality such as colored folder icons
, taskbar, dock and much more. FlyakiteOSX is not a simple desktop skins, but makes extensive changes to your system – it can automatically create a Windows Restore Point, allowing you to safely revert any changes. If you are a fan of the Mac interface but prefer the Windows operating system, this is a must-try software. Even the Publisher’s website will make every Mac fan feel warm and toasty.

FlyakiteOSX.jpg

Install Windows 7 from USB











Windows 7 can run on machines with lower specs than required for Windows Vista, and many users are actually finding it runs better than Windows XP on lower spec machines. It’s also ideal to run on newer netbook machines, but unfortunately many of these do not include a DVD drive so how do you install windows 7 on a machine without a DVD drive?

I spent yesterday researching this exact problem and I managed to install Windows 7 on my LG X110 netbook in around 20 minutes using a 4GB USB Drive. Setting up the USB drive to install Windows 7 was fairly easy in the end, and the installation was quicker than a DVD drive, so this method is perfect if you want to install Windows 7 quickly on several machines
"It's Much faster to install from USB than installer DVD/CD"


How To Install Windows 7 From A USB Drive


1. Find a standard 4GB USB Drive and plug it into your machine
2. Click Start in your enter ‘cmd’ in the run field. Once cmd is open type in ‘diskpart’ and a new window will open
3. In the new diskpart window type:

* ‘list disk’ : This lists all the disk drives attached to your machine
* Look for your USB drive and note the number and then type: ’select disk #’, where ‘#’ is your USB disk number
* then type ‘clean’
* then type ‘create partition primary’
* then ’select partition 1′
* then ‘active’
* then ‘format fs=fat32 quick’






Once you’ve finished these steps you then need to copy your Windows 7 files to the USB. To do this you have to mount your Windows 7 ISO as a virtual DVD. Finally boot your computer choosing USB as boot from BIOS

Doing this is easy:

1. Install MagicDisk (free)
2. once installed, right-click on MagicDisk in your system tray click on ‘Virtual CD/DVD-Rom’, select your DVD drive
3. then ‘Mount’ and in the dialog window that opens up, select your Windows 7 ISO
4. Now in windows Explorer, click on your DVD drive and you should see all the Windows 7 Files. All you have to do now is copy and paste all the files to your USB key and you have a Windows 7 USB Installation Stick!
5. Install the stick in the PC you want to install Windows 7 on and boot up. Remember to change your bios to allow booting from USB

If you follow the steps above then you should have no problems installing Windows 7 from a USB key. But if you do, leave a comment below, or even better visit the Windows 7 Forum for even better Windows 7 support.