Monday, May 24, 2010

KeePass Password Safe revisited

Gone are the days, when we have single or may be couple of password to deal with, we are here in the era of web 3 and lots of interactive website, are prowning upon, which requires singing off and thus lots of log in informations to be kept in a safe chamber so that those can be remembered and can be gettable, generated with a toss of coin at will. As we are living in a cyber world where lots of malicious Trojans' lurking here and there, so not only the password management is necessity but also security and authenticity are gaining increasing importance across the spectrum of life. So, we need tools that will help us protect our critical and vital informations and documents. Personal favorite of this author is KeePass Password Safe(http://keepass.soundforge.net).

functions:

Kee Pass databases are encrypted using AES, Twofish symmetric ciphers. These are much respected security encryption mechanism. The important functionality of  Kee Pass process to disk, which normally happens , the user’s password will not be cached . In more simpler term , if you copy password from Kee Pass, to any web address , and you delayed in making paste functions, then the paste options disappears. This means that the  user’s password won’t be cached thus protecting user’s password from hacking. As passwords are hashed in Kee Pass using SHA-256, and kept in an encrypted form in the Kee Pass process memory thus stopping the windows from caching the user’s  password from caching. It is an important security condition. Even the passwords users security-enhanced password edit controls, so that even the passwords entered in these controls aren’t even visible in the process memory of  Keep Pass, thus making it a stubborn and majestic password manager.For the entire Kee Pass to open you need one master password , that will decrypt/open the complete database. You can use Key-discs as it is more stubborn and requires  a file to decrypt the database of Kee Pass.

Revisit:

It is more strong but, it i:s advisable for advanced users. If you loss the key-discs then your database loss forever, cannot be recovered. So, for basic users , one master password is good enough though it is a separate master, if one loses the master password, then also KeePass database loss forever. So, important is one has to keep safe the master password or the key-discs, whatever the case one may use. The most important part of Keep Pass is its portability/the application doesn’t need to be installed. The installer automates the creating of links in the Star Menu. Also, a binary zip package available , which maintains only  the main executable files. This one runs without installing anything. The second one is more suitable for USB drivers/pen drives/flash drives. The program does not create any Registry keys or does not create any .ini files in your Windows directory. It runs without any additional libraries. After the un-installations , the binary zip package or installer package, Kee Pass leaves no trace on one’s system. It is a super password manager . The password list create by Kee Pass be exported to various formats like TXT, HTML, XML, CSV, or its own native formats and it is compatible with password safe V2. The password list should not be hidden in windows as then the Kee Pass can show existing passwords but it will not record any new passwords. Kee Pass features a built-in random password generator , with lots of user defined options. Kee Pass has a plug in architecture but these may compromise yours security of Kee Pass, approach with caution.

Download:

KeePass Password Safe

 

*follow me on twitter *
**get email updates**
This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.

Technorati Tags: ,,,,
del.icio.us Tags: ,,,,

Sunday, May 23, 2010

Comodo Internet Security 2010 brushed up: Part 2

The firewall itself is very robust and includes an intrusion detection system (or HIPS feature -- called "Defense+" in Comodo). It also provides buffer overflow protection (a "memory firewall"), a training mode to automatically create rules for programs you trust, and a parental control password to automatically block all alerts (so children and inexperienced users do not make poor decisions on popup alerts). System scan consists of various simple function like scan of critical areas of PC or entire scan or deep scan,schedule scan with preset or custom option .Comodo is comparatively new to antivirus business, its detection rate is good,but there are some false positives but of late and on the successive versions this has been reduced considerably.Comodo’s excellence in network security has been prominent point in buying this CIS 2010 suit.Now-a-days security parameters changed ,it is completely different compared to seven or eight years back.

Lots of network vulnerabilities creates hole in the system making the system prone to malware attacks.In addition to this Comodo Secure DNS avoids yours domain spoofing and makes yours browsing experience a safer, smarter and faster Internet.Comodo's Secure DNS's server infrastructure currently spans 15 locations (nodes) and five continents around the world. This allows us to offer you the most reliable fully redundant DNS service anywhere. Each node has multiple servers, and is connected by several Tier 1 carriers to the Internet.Combine this with Comodo’s  huge cache and we can get the answers you seek faster and more reliably than ever before.As a leading provider of computer security solutions Comodo is  keenly aware of the dangers that plague the Internet today.

‘Name cache invalidation' solution signals the Comodo Secure DNS recursive servers whenever a DNS record is updated, fundamentally eliminating the concept of a TTL.

Directing your requests through our highly secure servers can also reduces your exposure to the DNS Cache Poisoning attacks that may affect everybody else using your ISP.The "Threatcast" community feature helps you respond to alerts by allowing you to see how others typically respond,but it is resource heavy and it slows down yours connection and the saddest part of all is it is hardly gives the response so if you want you can ignore it.I will be writing about Comodo Secure DNS in the days to come to have a detailed and comprehensive understanding of this functionality.

Conclusion:

It is always difficult to review a suit according to security parameters  as these are now-a-days dynamic and constantly changing and evolving with times.So, the network security is of paramount importance in security suit as Comodo has upper hand in network security through one of the outstanding firewall if manages well so CIS is gaining the upper hand.If you disable behavior monitoring in the following firewalls, then they still provide excellent inbound protection, minimal/marginal outbound filtering, and additional features such as port stealthing.Most of the suit contains the firewall and now-a-days firewalls are important for yours privacy protection as you can know which software installed on yours system is connecting yours browsers and going to internet without yours knowledge and you can then disable it .No matter how big yours security suit is  its performance depends largely with the conditionality that whether yours OS is patched or unpatched or whether you instant messenger,yours email clients or softwares where updated to the latest security features and most important aspect whether you are following the safe computing practices or not!

Follow me on twitter 

Download

  http://www.personalfirewall.comodo.com/

http://www.personalfirewall.comodo.com/download_firewall.html

http://forums.comodo.com/comodo_internet_security_cis_firewall_av_and_defense-b125.0/

Download the 200+ page PDF CIS User Guide.

http://personalfirewall.comodo.com/support.html

http://www.comodo.com/secure-dns/index.html

Sign Up Now and Receive one month free of Comodo Internet Security Pro!

 

 

del.icio.us Tags: ,,,,,,,
Technorati Tags: ,,,,,,,

CRT monitor losing control

While on leave ,invite by cousins for a get-together.I reached there and then as usual I sat with their computer for sometime. Two CRT monitor ,one is IBM (E 74) and the other is HP Compaq.There is a peculiar tendency in these CRT monitors as these automatically changes the brightness,contrast and unable to control it even through monitors built in switches. Sometimes the viewing space is wider automatically and sometimes the viewing space is shorter automatically.For these very phenomenon the start menu gone missing in the first instance and in the second instant it has been reduce to the size of a miniature.So,incidentally to work with this adverse effect monitor , is being a stress and also difficult to handle many a times as cousin subsequently add to the conversation.

 

These are obviously serious problems as for the first time I have seen ,hardware seems good and softwares and OS is good and no viruses as far as my test , so million dollar question is where is the problem and why the  monitor losing control.I advise him, to take these CRT monitors to service centre may be some lose switching problem.In response he said hen had done this earlier with no success .Then I recommended him for opting for a LCD screen but he said he wants to stick with these monitors and buying of LCD desktop not in his plan of action may be after two years .So, the bottom line so far he will be suing these monitors for next two years.

The OS in these desktops are Windows XP SP3 and I have seen these WIN XP SP 3 is sometimes causing picture grain if you have not updated to its latest critical definitions.If you have got Windows XP SP3 from OEM means with the desktop or laptop then if you install it and then the SP3 , the resultant is some times picture distortion in some CRT monitors for some PCs.So, I have advise him to add Ryan VM add-on with the existing original OEM Windows XP SP3 and make slipstreamed of it and then install the OS all over again .As I have seen  some Intel graphic drive caused some problems and hence this peculiar phenomenon appeared. This will reduce this irritant considerably.

 

In fact after slipstreamed installation this peculiar phenomenon which I describe in the paragraph one disappeared but with some restart it shows again but the movement of the screen not there.I advise him to use ASC Pro or ASC Free and run the all in one scan and this also reduce this phenomenon.I advise him to uninstall the Adobe Photoshop on his CRT monitor instead use it on LCD based monitor or laptop.There is some apprehension that the adobe Gamma setting may be causing this screen error.Turn off clear type screen fonts as it is smoothing the screens for better viewing but it is meant for LCD screen as it is not for  CRT monitor.

 

The bottom line is CRT monitor losing control is a queer problem.after the slipstreamed installation of OS , if this phenomenon again occurs then go to Intel Graphic Media Accelerator Driver,then go to its Graphic Property (Cltr+Alt+F12),Display Setting from the left broad menu,then change anything of the three available that is Color Quality,Screen Resolution and Refresh Rate and change any one quantity and then apply and then the dialogue box will appear confirm the desktop change and the dialogue box will show if you do not respond within 15 seconds ,these changes will be cancelled.Then click cancel , here you go you will then look at the desktop realise that CRT monitor losing control of its screen size and the adjust  of contrast ,brightness etc. bar is not at the centre of the desktop windows so not blocking any of yours viewing area.

 

I hope if you are facing similar type of problems like yours CRT monitor losing control and color bar in the middle of yours desktop screen then these few problem solving methods you can try upon and if you have invented then let me and the world know as it seems a  queer problem but at least we have manage it or in a sense we have quarantined it.

follow me on twitter 

Technorati Tags: ,,,,
del.icio.us Tags: ,,,,

Saturday, May 22, 2010

Delete webpage history

Specifically we will be talking about IE8 and we know most of have knowledge about it and this time here is just a reminder in case you have just forget it how to delete browsing history of IE8.It is also part of safer computing practices and also it is one of many steps you should be taking in order to keep yours system healthy and fast.Internet Explorer stores information about the websites you visit, as well as information that websites frequently ask you to provide (such as your name and address).In this way you can safeguard yours privacy on line as well as offline and if you are on a public computer then it is a must step when you finished the browsing session as you don't want any of your personal information to be left behind.

 

Internet Explorer stores temporary Internet files ,cookies ,a history of the websites you've visited,information that you've entered into websites or the Address bar,passwords  these informations.To delete all browsing history in IE8 click the Safety button, and then click Delete Browsing History. Select the check box next to each category of information you want to delete. Select the Preserve Favorites website data check box if you do not want to delete the cookies and files associated with websites in your Favorites list. Click Delete. This could take awhile if you have a lot of files and history. 
 

Conclusion: Then close all instances of IE8 ,so that the cookies those are residing still in the memory will be erased after it.You can use Internet Explorer's InPrivate Browsing feature to avoid leaving a history as you browse the web.Deleting your browsing history does not delete your list of favorites or subscribed feeds.

 

follow me on twitter 

del.icio.us Tags: ,,,,,
Technorati Tags: ,,,,,

Friday, May 21, 2010

How to use Disk Management to configure basic disks in Windows XP

This step-by-step article describes how to use the Windows XP Disk Management snap-in to configure a basic disk and prepare it for use. I got it from Microsoft KB article Q309000 .This simple information but it requires yours careful observation and Microsoft has written one very simple article on it. A basic disk is a physical disk that contains primary partitions, extended partitions, or logical drives. Partitions and logical drives on basic disks are also known as basic volumes. If you are running Windows XP Professional  you must use basic volumes, because the operating system cannot access data that is stored on dynamic volumes.You create a full back up of your disk contents before you make any changes to your disks or volumes.

 

To start Disk Management:

  1. Log on as administrator or as a member of the Administrators group.
  2. Click Start, click Run, type compmgmt.msc, and then click OK.
  3. In the console tree, click Disk Management. The Disk Management window appears.

To create a new partition or logical drive on a basic disk:

  • In the Disk Management window, complete one of the following procedures, and then continue to step 2:
  • To create a new partition, right-click unallocated space on the basic disk where you want to create the partition, and then click New Partition.
  • To create a new logical drive in an extended partition, right-click free space on an extended partition where you want to create the logical drive, and then click New Logical Drive.
  • In the New Partition Wizard, click Next.
  • Click the type of partition that you want to create (either Primary partition, Extended partition, or Logical drive), and then click Next.
  • Specify the size of the partition in the Partition size in MB box, and then click Next.
  • Decide whether to manually assign a drive letter, let the system automatically enumerate the drive, or do not assign a drive letter to the new partition or logical drive, and then click Next.
  • Specify the formatting options you want to use .
  • Confirm that the options that selected are correct, and then click Finish.

The new partition or logical drive is created and appears in the appropriate basic disk in the Disk Management window.

follow me on twitter

 

del.icio.us Tags: ,,,,
Technorati Tags: ,,,,

Thursday, May 20, 2010

Turn your photos into beautiful paintings, sketches or drawings in seconds.

FotoSketcher is a 100% free program which can help you convert your digital photos into art, automatically. If you want to turn a portrait, the photograph of your house or a beautiful landscape into a painting, a sketch or a drawing then look no further, FotoSketcher will do the job in just a few seconds.You can create stunning images to make original gifts for your friends or relatives. Create birthday cards, season's greetings stationery or simply print your work of art and hang it on the wall.

 

Different styles are available: pencil sketch, pen and ink drawing, various painting renderings. You can also improve your original photo with simple tools (enhance contrast, sharpen, simplify image, increase luminosity, color saturation etc...).

FotoSketcher is completely free .It runs on any version of Microsoft Windows , no Mac version available.

Download from here. follow me on twitter 

Technorati Tags: ,,,,,,,
    
del.icio.us Tags: ,,,,,,,

Wednesday, May 19, 2010

Display proudly your Followers on Blogger/BlogSpot

Bloggers' following feature enables to show off yours followers in yours blog in a way By following your blog, your readers tell you and the world that they’re a fan of what you post.Yours dashboard will show number of yours followers,a click on the Followers icon, you can browse your followers, observe their activities and what they are writing and what they are thinking about yours blog.In this way you can know who are followers of yours blog and now we will discus how to show it off in yours blog.

You can show them off by adding the Followers gadget to your blog’s sidebar. From the “Layout | Page Elements” tab, click “Add a Gadget” and select “Followers” from the gadgets list. The Followers gadget shows the profile pictures of your followers and gives your readers a “Follow This Blog” link to join up,

Your followers can stay updated with your blog with the Reading List inside their blog dashboard The Blogs I’m Following tab automatically shows the latest posts from all the blogs you follow. You can follow any blog even blogs that haven’t added the Followers widget or aren’t hosted on Blogger. Just click the “Add” button and type in the blog’s URL.

With Google Reader see a special folder in Reader called “Blogs I’m Following,” .You can follow blogs subscribe in the reader in addition to it.From the Reading List on your Blogger Dashboard, click “Add,” then “Import from Google Reader.”

follow me on twitter 
Sources & Citations : Blogger Buzz

Tuesday, May 18, 2010

2Education on Customer Service

Let me give you a lively recall of a recent incident of a medicine retail dealer helping me in a manner none of my friends and relatives could help me for about half a decade till then.

My requirement was the regular supply of a particular tablet of meagre cost which remained unavailable for all these years, though i had tried at every retail outlet relentlessly through self and through others, being contented with the substitute thereof which hardly gave me the comfort of the originally prescribed tablet.

 

I was not at all a customer of the new retailer i visited and my approach to him was only incidental and casual as i had made it a habit to ask every medicine shop i visited over the years hoping against hope to get the supply. The man immediately greeted me gleefully as i rushed to his shop and offered me help despite heavy rush of customers and contacted a number of dealers and whole- sellers across chennai and delhi spending his most valuable and scarce time on a trivial transaction which was a loss for him so far as the cost factor on mobile bill was concerned. But after 35 to 40 minutes of hectic trial, he seemed like hitting the jackpot as inimitable and winning smile played across his lips. He asked me to kindly give him my cell phone number so as to enable him to contact me as the consignment arrived. Indeed, the consignment arrived on the third day and i collected the booty on the third day itself without any extra charge for postal expenses which the retailer bore.

 

This was a very simple marketing strategy by the retailer which fetched him a new customer whose full loyalty is assured for him as i have decided to stay his customer for ever.

This for me is an education on customer service and a very practical and highly effective one as a single help by the retailer could shatter my brand-loyalty of four decades as i vowed to become a loyal customer of the new dealer.

follow me on twitter 

Technorati Tags: ,,,,,,
del.icio.us Tags: ,,,,,,

Sunday, May 16, 2010

Use Twitter with Text Messaging!

Twitter is more fun when used through your mobile phone. I personally prefer the web version though.Setting up using twitter with text messaging is smart easy.Believe it or not it is easy.Standard message and data rates may apply of the mobile operator.Log in to yours existing twitter account if you have not then you can create one for yours by going here.Then log in to yours account .Then at the top of yours account go to Settings, then Mobile and then you reach at a page where everything is self explanatory.

Use Twitter with Text Messagin 2

Choose your country as it seems it is not available for every country so first check whether you qualify for it or say otherwise whether yours country is in the twitter’s list then enter your mobile phone number ,then choose yours mobile career and click verify button and verify it.

 

Use Twitter with Text Messaging

 

What is the gain accessing twitter from mobile:

The prime question is what is the benefit, yes there are some benefit as it is mobile and you can twit while walking.Send tweets with text messaging on your phone.Receive texts for DMs and the tweets from users you want to be notified about.Clicking the phone icon on a users profile page or your followers page sets Tweet notifications for that user.

Do more than Tweet! Send these commands to Twitter:

RT username
Retweet a user's latest tweet
FAV username
Favorite a user's latest tweet
D username your-message
Send a direct message to a user

FOLLOW username
Start following a user
UNFOLLOW username
Stop following a user
ON/OFF
Turn all Tweet notifications on or off
ON/OFF username
Set Tweet notifications for a user on or off (you'll still be following them even if you set it to off)
GET username
Shows you the latest tweet from any user

So sign up twitter before anyone does so.

 

del.icio.us Tags: ,,,,
Technorati Tags: ,,,,

Saturday, May 15, 2010

Resetting to Learning Mode in Firewall of VIPRE® Antivirus Suit

VIPRE Antivirus is high-performance antivirus software that doesn't slow down your PC like older, traditional security products. It is a completely new breed of product that fully integrates antivirus, antispyware and with the introduction of VIPRE Premium, breakthrough firewall protection. It does not bloat.VIPRE Antivirus Premium version you get a 2-way desktop firewall, and additional, more advanced intrusion protection. This feature can be enabled and more proactively used when you use Firewall with learning mode.

resetting to learning mode in firewall of Vipre Antivirus Suit

Reset to Learning Mode:

Resets to the VIPRE Firewall "Learning Mode" default settings. Learning mode will prompt you whenever there is an attempt made for a network connection. It is more secure than the so called default protection and it is recommended. If you are running the firewall in simple mode then followings are the procedure to change it to Learning mode .In simple mode if HIPS enabled then default action will be “allow” but in Learning mode HIPS default action will be “allow with notify” so more security.File menu, select Settings. Click the Firewall tab, click Reset to Defaults.Reset Firewall Defaults dialog box displays. Reset to Learning Mode: Resets to the VIPRE Firewall "Learning Mode" default settings. Learning mode will prompt you whenever there is an attempt made for a network connection. What follows is an optional step.if you suspect that one of the user-defined rules you created is causing problems and don't know which one to fix. Then select Delete all user defined firewall rules .Click OK on the Reset Firewall Defaults dialog box. Click OK on the Firewall Settings screen.then the resetting to learning mode in firewall of Vipre Antivirus Suit done.

Please remember Learning Mode,will frequently prompt you to essentially teach the VIPRE Firewall how to act. You will be prompted to take action on activity by applications and for certain Operating System actions. Your actions to the prompts can be remembered and applied to this activity in the future, by creating or modifying a rule.

So download VIPRE® Antivirus Suit before anyone does so.

follow me on twitter 

Technorati Tags: ,,,
del.icio.us Tags: ,,,

Friday, May 14, 2010

The computer keeps disconnecting from the internet

HI, today we will be talking about a situation in a dial-up connection where the computer keeps disconnecting from the internet and how to rectify.It may be yours possible solution.This could have been due to yours Internet Explorer or yours email client especially from Microsoft's setting.Let us observe it one by one.First the Internet Explorer.In Internet Explorer go to

Tools>Internet Options>Connections>Dial Up settings>Advanced Dial –up setting

 

and confirm that ‘Disconnect when connection may no longer be required ’ is turned off .

Now check Outlook Express or in my case Windows Live Mail from Microsoft.Go to

Menu (Alt+M)>Option>Connection and then turn off ‘Hang up after sending and receiving’

 the computer keeps disconnecting from the internet

Then check yours dial-up connection and observe whether yours computer is keeping disconnecting from the internet frequently now or  this problem is over.So, now you do not worry about yours computer keeps disconnecting from the internet time and again .

Follow me on twitter 

del.icio.us Tags: ,,,,,,
Technorati Tags: ,,,,,,

Thursday, May 13, 2010

I Love You More Than Words Can Say...

None to me is as special as you can be
I knew it is the four-lettered word- love
I Love you more than Words could ever tell .

Oh! my dearest love,
Leave me not,

I Love you more than Words could ever tell
lest darkness will dense me
and I will not
Live in this world of
Loves, Labors Lost.

Gazing at the stars
On a dark, cold night,
I wish you can hear
I wish you can see
How I miss you

I find myself smiling
I know you also feel the same way as I
I know you feel me in your heart,
I can know everything because of telepathy !!!

I Love you more than Words could ever tell .

Though  a Ocean
Kept us apart but only in body
And never in heart and soul

Oh my  soul of honor
These feelings are true to my heart,

Too many words left unspoken
Because of tonsils
But I have so much to tell
Too many things left undone
Because of fever
But I have so much in mind

I Love you more than Words could ever tell .

Oh! My Dearest Love
Listen to the unsung, undeclared
Music of my heart .

Love I to You,
I love You
More each day
I will love You
Till my last breath
Until the Sun refuses to eliminate.

follow me on twitter 
Technorati Tags: ,,,,,,
del.icio.us Tags: ,,,,,,

Wednesday, May 12, 2010

My Freezing Experience

Whether you believe it or not, the refrigerator in use at our home developed a hole from inside made by a mouse(animal of course not from my system’s !) to make an abode for its kith and kin. The mouse cut into it from backside of the refrigerator for a summer cooling experience with its wife and children, feasting on the stored stuffs and sleeping with air-conditioning experience. The inside was too spacious for its family members to dance and dine with musical screaming.

No, I was never worried at the plight of my refrigerator. It provided me an opportunity to go for a fresh one. So long as Mr.Kelvinator was present, I had the worrisome exposure to the old and the bold and no matter how it functioned, I had the universal acclaimed theology of “ old products are more customer friendly” was always in view in my mind along with a lively picture of how it grew into old age from childhood and orphanage.

At last, we at home decided to retire our old freeze as it had already seen two decades of rise and fall of its functions and malfunctions. we had to give it a safe refuge in a clean corner of our store room where it is enjoying its much-needed rest.

All on a sudden, Mr. Samsung entered into our drawing room to take the place of Mr. Kelvinator and all of us forgot the old and bygone days of our lovely and lusty relationship with Mr. Kelvinator and greeted Mr. Samsung with rare gaiety.

follow me on twitter 

del.icio.us Tags: ,,,,,,
Technorati Tags: ,,,,,,

Tuesday, May 11, 2010

I can't follow people: follow limits on Twitter

On my twitter on the last weekend suddenly my follow limits halted showing an error message in  browser when I try to perform an action.I doubted what is the real cause so I googled and reached at the Twitter help page and got the explanations and the reason behind the blocking of follow limits and realized that this has been blocked only for today.The reason is as follows.

Twitter has imposed reasonable limits to help prevent system and user abuse.If you hit a technical limit means it means you've exceeded one of these limits:1,000 updates per day,250 direct messages per day,150 API requests per hour,Follow limit also API Limits .Every user can follow 2000 people total. Once you’ve followed 2000 users, there are limits to the number of additional users you can follow: this limit is different for every user and is based on your ratio of followers to following. But in my case I just followed 20 people and twitter said the follow limits of mine on twitter exceeded today .

If I hit a limit, what should I do?

yeah,this is an important aspect.If you've reached a daily limit, wait 24 hours (or one hour for API requests) and you'll be able to perform the action again.If you've reached a follow limit, you’ll need to wait until you have more followers before you can follow additional users. Follow limits are systematic. Support cannot remove follow limits.

Last word:

Why does Twitter have follow limits at all? Do twitter think I’m a spammer?Twitter thinks hitting a follow limit does not mean I am a spammer.These limits help twitter improve site performance and reliability and helps twitter to make it a nice place for everyone. Well I do not think so if it continue to do this and limit the followers then certainly one day it will loss its importance as this is the niche for which twitter is famous for . Other companies like Google with its Google buzz now opening arms and wants us to use it and it is now entirely up to users what to decide upon.Frankly I am bit confused.

Follow me on Twitter

Sources & Citations:

Follow Limits and Best Practices help page  ,I can't follow people: follow limits

Technorati Tags: ,,,,,,
del.icio.us Tags: ,,,,,,

Monday, May 10, 2010

Kontactr is a one-click free contact form service.

Kontactr is a one-click free contact form service. Kontactr is a free one-click contact form service that allows you to create your own free contact form so that people can contact you without knowing your email address. You receive Spam only when Spammers get to know your email address. With your Kontactr, your email address is completely concealed. So you don't have to fear spammers anymore. Read Terms of use and then just click on the sign up link and create yours contact form ,register and login to your account, you'll see your very own Kontactr link. You can post it anywhere instead of posting your email address.

Kontactr

With Kontactr, you can fight against the amount of spam that you receive daily. Protect your email address by using highly secure contact form.You can also use Kontactr simple tools to embed the form right into your own website.Sign up with Kontactr :it takes no more than 15 seconds to sign up with Kontactr,Get your form's code :it is available in various forms. Buttons, widgets etc..Add it to your website:Now, you have a beautiful, secure contact form on your website.You can do it with  Embed widgets-- Plain HTML widget and AJAXified widget.

How to change yours email address ?

Login to your account and click on the "Change Email" to change your email address.

What can you do if you don't want to contacted through Kontactr ?

Just login to your account and click on the "Inactivate" link to turn off your form. You can reactivate it anytime you want.

So,webmasters please go here and start making one-click free contact form service with a spam free mail account.

Test:

Excellent tool ,clean and simple,secure, CAPTCHA Protection,customizable, to match your website,best of all, its free.If you get a large blank space when you use Kontactr on Blogger. it is better to use AJAX widget which is problem free simple and easy to use.Ajax embedded widget allows users to contact you without leaving your website.We recommend using this widget, as this is much more simple than the HTML embedded widget as HTML embedded widget is only recommended for advanced users. Please see yours blog’s contact button code.

follow me on twitter 

 

Technorati Tags: ,,,,,
del.icio.us Tags: ,,,,,blogging

Sunday, May 09, 2010

Get a FREE Domain Name - www.YOU.co.nr !!!

Basic Free Domain Name package was designed to provide fast and hassle free solution to everyone who wishes to get cool and free domain name of .co.nr domain name that looks like a real paid domain.You get a FREE DOMAIN NAME such as www.yourname.co.nr plus a lot of value added features, the most important of them are the following:

  • Ability to use your free domain name with and without WWW, and more
  • No banners or popup ads, actually, NO ANY ADS at all
  • Free URL Cloaking also known as Free URL Masking
  • Free URL Forwarding, also known as Free URL Redirection
  • Intelligent Free Path Forwarding and Advanced Free META TAGS support

conr domain

What is .NR domain name?

Dot NR top level domain name is a ccTLD (country code top level domain) for Republic of Nauru, .NR ccTLD is assigned by ICANN and can be used and accessed worldwide, and it is operated by the respected .NR Domain Name Registry .(CenpacNet Inc)

Observations

No setup fees, no monthly fees, no yearly fees, no renewal fees, etc. And you can use your free domain name as long as you wish (or as long as our service exists). It will take you 5-10 minutes to signup and your domain will be activated immediately. You only need a website to point your domain to it and you can begin using your free domain name!Enjoy your banner-free & free domain name!You can host your website anywhere you wish and point your free domain name to your website. If you ever decide to change your hosting provider you can fastly and easily modify your free domain name to point it to your new hosting provider. Only 1 minute.URL cloaking is used to mask your real website address (that might be long and difficult to remember) with your new Domain Name web address. So, your free domain name will always be in the location bar of your website visitors.The most important META TAGS like Description, Keywords, Revisit-After etc. are supported. (META TAGS are important for your site to be indexed by search engines)

Use this Free Domain Name package before anyone does !

follow me on twitter 

,,,,,
 Technorati Tags: ,,,,,

Saturday, May 08, 2010

Dealing with failures

Who understands nuances of life , we couldn’t praise him more but we would still like to wish, having many failures, he will succeed one day. He had more room for failures to accumulate and moderate as he is wishful that law of averages would coma one day. The very same way we marvel at the therapeutic capabilities of water, the simplicity and the maturity, the best of outings ever since the colossal failures, spend an hour talking to yourself, come to at yours terms, and realise there is more to the world than the mere  successes and failures. With the both humbleness and dexterity, all of us make believe and identify and express our concerns about a rather peculiar trend really not cool at all to make us believe that we are not the protagonists of Shakespeare arean tragedies. We should not look cut out. It will seem to you everything is going against you, yours mental aptitude should be one positive pillar which should not be stumble upon, instead it should be deliciously and passionately convert into a wall of confidence to protect and support you in the long run.dealing with failures


Failure dents yours confidence, but surprise yourself by handling the  failures. Be prepared and unaffected to the pressures of failures , it is more sensitive so be careful, always cheer up, and always accept failure, as the law of averages will always catch up. Be cool and composed and put yours hands on the pulse of things,may be it is a weird feeling to start with change  the way people look at you; you can feel like you know nothing, can have a bewildered reaction - ‘Really ! That’s true !’. Make discussions you can have learning curve, summerise yours line of  thoughts , and  make perfection in yours delivery of thoughts and synchronise it with yours thoughtful actions. Even in boom-crash markets you have to have a honed business sense over substantive market propositions. Always be a thinker, study the environment, and observe and feel the world as a scroll of success. Always yourself, depending on what matters, the answers may be dramatically different, but it may also be nothing for some . Think about innovations and quality enhancement, make changes if required change further. Expand yours coverage, redesign yours ideas based on feedback also if required revamped and also create new ideas or topics of yours interest. Share yours ideas, interact with others is fruitful way. Use various interactive mediums like twitter , facebook, friendsteirs, blogs, get feedback from yours community you may get brutal feedback or may get constructive feedback , analyse all and make a right decision. Now, you have a lot of ideas to work on.

Always keep an eye on the trends in technology, the unprecedented economic upheaval, create new and innovative business models, build things, products, build network and build business. So, the last word, with all those practical tips, lessons from successful technology, and with opportunity at proper time, with more bridges to connect, many opportunities are spreading both hands at you  spread the word, create togetherness, and build a great future. Make failures a stepping stone to success.

follow me on twitter 

Technorati Tags: ,,,
del.icio.us Tags: ,,,

Friday, May 07, 2010

Managing Advertisement Blocking

I got VIPRE® Antivirus Premium v.4.0 through this promotion on the first week of March,about it I have written detailed review ,see here ,also I have written and blogged about how I uninstalled VIPRE® Antivirus Premium v.4.0 in the two series ,part 1 and part 2.Today I will talk about “Managing Advertisement Blocking” with VIPRE® Antivirus Premium v.4.0.managing advertising blocking with vipre

VIPRE Premium's Advertisement Blocking uses a list of malicious ad sites and text strings contained in the site addresses compiled by SunbeltLabs.It will show as Defs You can add, edit, or delete a user-defined Domain/URL, and block/unblock an advertisement Domain/URL.

Domain/URLs that are unblocked (disabled) will essentially override the "Block 3rd party advertisements" setting. It will show you as User.

To add, edit, or delete a user-defined Domain/URL:
Navigate to the Web Filter Settings screen.

(File>Settings>Firewall tab>Web Filter Settings button)

Select the Block 3rd party advertisements check box, and then click Change. The Advertisement blocking by URL dialog box displays.
To add an advertisement filter, click Add. The Add an Advertisement filter dialog box displays.
-or-
To edit a user-defined advertisement filter, select a row in the table and click Edit. The Modify an Advertisement filter dialog box displays.
-or-
To delete a user-defined advertisement filter, select a row in the table and click Delete. The item is removed immediately. Click OK to close.
Select one of the following options:
Sub-string: Looks for a match of the string you enter anywhere within a URL (i.e. adserver009).
Wild card: Allows for "?" and "*" to match any character in the URL (i.e. *.sunbeltsoftware.com).
Regular expression: This is to be used by experts who are familiar with the regular expression syntax (i.e. adtrack\d*\).
Enter a URL or Web page expression that reflects the selection you made in Step 4.
Click OK to add the URL or Web page to the Advertisement blocking by URL dialog box.
On the Firewall Settings screen, verify that Enable Web Filtering is selected.

 

To block/unblock an advertisement Domain/URL:
It is very easy .Navigate to the Web Filter Settings screen.

(File>Settings>Firewall tab>Web Filter Settings button)

Select the Block 3rd party advertisements check box, and then click Change. The Advertisement blocking by URL dialog box displays. Navigate to a desired item in the list, and then select to Enable or unselect to Disable. Click OK to save changes and close the dialog box. On the Firewall Settings screen, verify that Enable Web Filtering is selected

 

About VIPRE® Antivirus Premium v.4.0:VIPRE (Virus Intrusion Protection Remediation Engine) is uniquely designed to reduce computer frustration with its low system resource usage, faster boot times, few popups, and a broad-range of detection and remediation of viruses, trojans, worms, and spyware.

The VIPRE Firewall provides bi-directional protection, protecting you from both incoming and outgoing traffic. It can be run in either "Simple" or "Learning" modes. Simple for the basic user running mostly behind the scenes; and Learning for a more experienced user with frequent user interaction. From either mode, you can further customize your Firewall settings.

follow me on twitter

 

del.icio.us Tags: ,,,,,
Technorati Tags: ,,,,,

Thursday, May 06, 2010

My Tweet Followers

 MyTweetFollowers. is the best place for you to grow your twitter network and gain a ton of followers.Go there,it's free and will help you get the followers you need.If you want to enhance the followers number then it its the right place you have arrived.You login and then follow people to be added to free section where people will follow you in return. MyTweetFollowersis in no way affiliated with twitter ,it is been said by this website. As this website suggests it is the best way to get tons of followers on Twitter.

You will be Log in using yours Twitter Username and Twitter Password to use MyTweetFollowers

my tweet followers

After it you will enter into a page where you will see both the vip followers means the paid one and the regular followers , if you wish  you can go for paid vip followers but am talking about the regular followers means the free ones .This service is free until you opt for their paid service the vip followers as the website said.After following the persons then a pop up window will come up and will say now you can join and go to the below of website then click the plus sign and you are done. "Thank you for taking the time to join MyTweetFollowers.com" this means that the process completed and thus by going through this process again and again you can increase yours followers outstandingly.

MyTweetFollowers says

MyTweetFollowers.com is the best way to find a ton of people that want to follow you on twitter! It's pretty easy to use if you just follow the simple instructions:

1. Click the follow button below the users picture to follow them.
2. You have to follow all of the VIP riders.
3. You have to follow at least 20 of the regular riders.

You can always deactivate this by going to opt out.

Website:  MyTweetFollowers

Follow me on Twitter

Technorati Tags: ,,
del.icio.us Tags: ,,

Wednesday, May 05, 2010

FREE Scrapbooking Software that lets you capture anything from the Web in an instant?

MyFotoPad is Scrapbooking Software that is completely FREE It does all the things you need in most scrapbooking functions without having to pay over the top prices for software.Write wherever you want anywhere you like.Draw anything you like just like pen and paper.Use and create your own collages for your pictures.Capture any Bit of the screen you need from the Web or Elsewhere.Have AUDIO recordings as part of your scrapbook.Change your Photos to Black and White.

my fotopad

Give your Pictures a Sepia effect for a Dated look.Emboss your pictures to give that 3-D look.Create a Torn look on your pictures.Soften, Blur or Sharpen pictures at will.Lighten Darken and improve the contrast of your pictures.Convert your Scrapbooking to HTML pages.

Conclusion:

Just plain works. Very easy to use. The screen capture from the Web is outstanding, drag and drop anything MyFotoPad does the rest it's made scrapbooks much more interesting.Picture additions flexibility also additional functionality of adding audio recording is quite a bonus.It is a cool applications and free also.Just a caution before downloading the software brief visit to any of  sponsors sites so be careful with a sense.As the other is saying We have teamed up with our sponsors so that we can make this a FREE service.

So download MyFotoPad before anyone does so.

*follow me on twitter *

del.icio.us Tags: ,,,
Technorati Tags: ,,,

Tuesday, May 04, 2010

Five critical updates for Microsoft system(2010-04-14 )

microsoft Microsoft has published five updates for critical vulnerabilities in its operating systems / applications, as well as five important and one moderate updates in its software advisories.Critical updates in the sense of Microsoft is of important and significant and a must update in order to protect yours system running Microsoft softwares and appliances.You can get more ,detailed information from here.From this page you can search for the links of Microsoft's Security Bulletins MS10-019 - MS10-029 in order to have detailed observation.

In short the critical update addresses these issues . One privately reported vulnerability in Windows Media Player,Microsoft MPEG Layer-3 audio codec,Windows Media Services,two privately reported vulnerabilities in Windows Authenticode Verification,One publicly disclosed and several privately reported vulnerabilities in SMB Client.

(Source)

If you have yours automatic updates enabled then it will download these critical security vulnerabilities for you or you can go Microsoft windows update site  in order to manually patch yours OS.

* follow me on twitter *

Technorati Tags: ,,,,
del.icio.us Tags: ,,,,

Monday, May 03, 2010

Command-Line Options with USBDeview

USBDeview is a small utility that lists all USB devices that currently connected to your computer, as well as all USB devices that you previously used.To know more about this freeware please refer to this post earlier published.

usbdeview

 

Execute a command when you insert a USB device:


Starting from version 1.10, USBDeview allows you to execute a command from exe/cmd/bat file in every time that insert a USB device to your system. In order to use this feature, go to 'Options->Advanced Options', select the 'Execute..' check-box, and type the exe/cmd file that you want to run. You can also use the following special variables in this command
string: %device_name%, %device_desc%, %drive%, %serial_number%, %vid%,
%pid%, %vid_hex%, %pid_hex%
USBDeview will automatically replace these variables with the appropriate data of the device that you inserted. For example, if you want to pass to your exe file 2 parameters - the serial number of the device, and the drive letter:
c:\temp\test.exe "%serial_number%" "%drive%"

Stop/Disconnect Command-Line Options:

* /stop {/showmsg} {\\RemoteComputer} <Device Name>
  Stop/disconnect a USB device by specifying its name or description. You don't have to specify the whole name or description. You can also specify only a part of the name or description string, and USBDeview will identify it. For example, If the device name is 'Kingston DataTraveler 2.0', you can simply put 'kingston' or 'DataTraveler' in the device name parameter, and USBDeview will disconnect the right device. If you want that a message/balloon will be displayed after the device is disconnected, add the '/showmsg' parameter. (Windows 2000 displays a message-box, Windows XP displays a balloon) If you want to disconnect a device in a remote computer, specify the remote computer name, with \\ prefix. You must login to the remote computer with admin rights in order to do that.
  Examples:
  USBDeview.exe /stop /showmsg "DVD RW"
  USBDeview.exe /stop "DataTraveler"
  USBDeview.exe /stop \\comp01 "SanDisk Cruzer"

* /stop_by_serial {/showmsg} {\\RemoteComputer} <Device Name>
  Similar to /stop command, but instead of specifying a device name, you should specify the serial number of the device Works only with mass storage devices.
  Examples:
  USBDeview.exe /stop_by_serial ea051261
  USBDeview.exe /stop_by_serial /showmsg 876534513

* /stop_by_drive {/showmsg} {\\RemoteComputer} <Device Name>
  Stop/disconnect a USB device by specifying its drive letter. Works only with USB flash drives and CD/DVD devices.
  Examples:
  USBDeview.exe /stop_by_drive g:
  USBDeview.exe /stop_by_drive /showmsg f:
  USBDeview.exe /stop_by_drive /showmsg \\comp02 t:

* /stop_by_class {/showmsg} {\\RemoteComputer} <USB Class;USB
  SubClass;USB Protocol>
  Stop/disconnect a USB device by specifying the class/subclass/protocol  combination. For example, if you want to stop all 'Mass Storage' devices, you should specify the following class/subclass/protocol combination: 08;06;50
  Examples:
  USBDeview.exe /stop_by_class /showmsg 08;06;50
  USBDeview.exe /stop_by_class 03;01;02

* /stop_by_pid {/showmsg} {\\RemoteComputer} <VendorID;ProductID>
  Stop/disconnect a USB device by specifying the VendorID/ProductID. You can specify only the VendorID if you want to disconnect all devices with that VendorID.
  Examples:
  USBDeview.exe /stop_by_pid /showmsg 13fe;1a00
  USBDeview.exe /stop_by_pid 04f9

* /stop_all {/showmsg} {\\RemoteComputer}
  Stop/disconnect all USB devices currently connected to your computer.

Disable/Enable/Remove Command-Line Options:


Starting from version 1.20, you can also use the following commands to disable, enable or remove USB devices from command-line:
* /disable {\\RemoteComputer} <Device Name>
* /disable_by_serial {\\RemoteComputer} <Device Name>
* /disable_by_drive {\\RemoteComputer} <Device Name>
* /disable_by_class {\\RemoteComputer} <USB Class;USB SubClass;USB
  Protocol>
* /disable_by_pid {\\RemoteComputer} <VendorID;ProductID>
* /disable_all {\\RemoteComputer}
* /enable {\\RemoteComputer} <Device Name>
* /enable_by_serial {\\RemoteComputer} <Device Name>
* /enable_by_drive {\\RemoteComputer} <Device Name>
* /enable_by_class {\\RemoteComputer} <USB Class;USB SubClass;USB
  Protocol>
* /enable_by_pid {\\RemoteComputer} <VendorID;ProductID>
* /enable_all {\\RemoteComputer}
* /remove {\\RemoteComputer} <Device Name>
* /remove_by_serial {\\RemoteComputer} <Device Name>
* /remove_by_drive {\\RemoteComputer} <Device Name>
* /remove_by_class {\\RemoteComputer} <USB Class;USB SubClass;USB
  Protocol>
* /remove_by_pid {\\RemoteComputer} <VendorID;ProductID>
* /remove_all {\\RemoteComputer}
* /remove_all_connected - Remove all connected USB devices.
* /remove_all_disconnected - Remove all disconnected USB devices.

Save Command-Line Options:


/stext <Filename>
Save the list of all USB devices into a regular text file.

/stab <Filename>
Save the list of all USB devices into a tab-delimited text file.

/scomma <Filename>
Save the list of all USB devices into a comma-delimited text file.

/stabular <Filename>
Save the list of all USB devices into a tabular text file.

/shtml <Filename>
Save the list of all USB devices into HTML file (Horizontal).

/sverhtml <Filename>
Save the list of all USB devices into HTML file (Vertical).

/sxml <Filename>
Save the list of all USB devices to XML file.

/sort <column>
This command-line option can be used with other save options for sorting by the desired column. If you don't specify this option, the list is sorted according to the last sort that you made from the user interface. The <column> parameter can specify the column index (0 for the first column, 1 for the second column, and so on) or the name of the column, like "Device Name" and "Description". You can specify the '~' prefix character (e.g: "~Description") if you want to sort in descending order. You can put multiple /sort in the command-line if you want to sort by
multiple columns.

Examples:
USBDeview.exe /shtml "f:\temp\usb-list.html" /sort 2 /sort ~1
USBDeview.exe /shtml "f:\temp\usb-list.html" /sort "Device Type" /sort
"Device Name"

/nosort
When you specify this command-line option, the list will be saved without
any sorting.

Download:

Download USBDeview from here .

del.icio.us Tags: ,,,
Technorati Tags: ,,,

Sunday, May 02, 2010

Unique Bharat (India) | ittech

Unique Bharat (India) ittech

Hi am back again

Unique Bharat (India)

  • Bharat is the biggest English communicative nations in the world.
  • The four religions brought into existence in Bharat Hinduism, Buddhism, Jainism, and Sikhism.
  • Chess was invented in Bharat.
  • India was the richest country on earth continuously until the time of British invasion in the early 17th Century.
  • Sanskrit is the mother of all the European languages and Indian languages. Think about the words pitri *(Sanskrit) and English is father, matari (Sanskrit) and in English it is mother.
  • Bharat is the world’s largest, oldest, continuous civilization.
  • Bharat never invaded any country in her last 10000 years of history.
  • Varanasi(Benares) of Uttar Pradesh of Bharat is the oldest, continuously inhabited city in the world today.
  • The value of pi was first calculated by Budhayana ,he discovered what is known as the Pythagorean Theorem in the 6th century long before the European mathematicians.
  • The pioneer of wireless communication was Prof. Jagdish Bose not Marconi proved by IEEE .
  • The highest test century (cricket) by SR Tendulkar and highest ODI century by SR Tendulkar and first man on the earth to score a double hundred in ODI history is SR Tendulkar who is Bharatiya  (Indian)
  • The decimal system was developed in Bharat  in 100 BC.
  • World’s first urban culture Harappan culture in Sindhu Valley (Indus Valley Civilization) was in Bharat with lots of modern day lookalike town structures.

Sources & Citations:  India : Amazing Facts and Photos

follow me on twitter 

 

Technorati Tags: ,,,,,,,,,,,,,,,
del.icio.us Tags: ,,,,,,,,,,,,,,,