IT News & Technology update

Provide comprehensive update related to Computer, technology, software, anti virus and another electric device

Projekt V2: Crazy Computer Case Mod [PICS]

Written by IT News on 11:56 PM

From concept to completion and nine months of labor, this is one pretty fantastic casemod.

read more | digg story

GNU/Linux is the most power-efficient OS on Intel hardware

Written by IT News on 8:24 PM

According to a keynote given at OSCON, Intel's PowerTOP application has allowed developers to get a close-up view of what is sucking power in a GNU/Linux system. Apparently they've gotten so much feedback and patches that they've been able to extend battery life by an hour since the first release, making GNU/Linux the best OS for power saving.

read more | digg story

Are ISPs modifying your web pages?

Written by IT News on 4:27 AM

Last month we learned that some ISPs are inserting ads into web pages requested by their end users. Have you wondered how often this is happening, and whether it's happened to you? This web site is designed by the University of Washington and ICSI to answer these questions. Visit it to see if your ISP is modifying your web pages in flight!

read more | digg story

Linux users are cheap as hell [pic]

Written by IT News on 4:18 AM

Ubuntu Feisty: 0$. Cardboard box: 0$. Duct tape: 1$. Having the bitchin'est case mod this side of the trailer park: priceless.

read more | digg story

Obrolanku: Memperkenalkan c-gold

Written by IT News on 4:11 AM

Obrolanku: Memperkenalkan c-gold

c-gold.com ini lagi sedang memanfaatkan moment atau beneran bisnis ya? atau jangan-jangan hanya HOAX?

Abisnya web dan systemnya copy paste dari e-gold, mirip banget.

Google hack to instantly search for files

Written by IT News on 11:34 PM

Thanks to Jimmy Ruska’s video on YouTube, there are several quirks about phrasing search queries for Google that can find you files in a jiffy. I will detail the method and include it as a Firefox bookmark first, and then I’ll follow up with detailed information on the actual query.

Adding a bookmark

Here’s the process to have a bookmark in Firefox such that you can search for an MP3 song in Google by just typing “music yourSongTitle” in the Firefox address bar.

1. Create a new bookmark

  • Select “Bookmarks” from menu.
  • Select “Organize Bookmarks…
  • Click on the “New bookmark button” (below the files menu)

2. Fill in the following for the fields in the window that appears

  • Name: Enter the name for bookmark. e.g. : Directory Listing
  • Location: Here, copy and paste the following Google query (an explanation follows)

http://www.google.co.in/search?hl=en&q=intitle%3A%22index.of%22
+%28mp3%29+%s+-html+-htm+-php+-jsp&btnG=Google+Search&meta=

(Include the whole query, without the quotation marks)

  • Keyword: This is the word you will use in the address bar to invoke the results for a song title (in our example, it is “music”)
  • Description: Give a description or leave empty

3. Now open a new tab and type “music yourSongTitle” and viola! — you will see links of directory listing for the MP3 you wanted

Deciphering the query

The crux of this hack is the clever usage of Google search tags for narrowing the result to only directory listings with keywords “MP3″ and negating results that include html, htm, php or jsp as directory listings.

Here is the break up of the query and the meaning of the tags:

  • intitle:”index of”: This searches for the “index of” keyword in title of files. This is usually the directory file that contains the list of all files.
  • (MP3): This tag implies a search for files with the keyword “MP3″ in the file name. To add more formats to search, include them separated by the OR (’|') separator.
  • %s: This is where the yourSongTitle you enter gets inserted. A clever innovation here is to separate the keywords in your song name with ‘.’ so that single character separations, such as underscores (’_') between words, are also included in results.
  • -html -htm -php -jsp: This basically tells the search engine that you don’t want (negate) html, htm, php or jsp files that give directory listings.

You can modify the same query for searching pdfs or any other file format. Also, there are few more keywords to limit the search to a particular site (site:siteName) or a filetype(filetype:pdf). I am no promoter of media piracy and the use of Google tag words makes search all the more effective and productive for daily use. Jimmy has also uploaded a new video on the implementation with few more features on his own site.

Nokia acquires social media sharing site ‘Twango’

Written by IT News on 11:13 PM

Nokia’s acquisition of social media sharing website Twango, marks another milestone in the handset majors move to capitalize on the proliferation of media on the web. Already, the N series phones have been branded as Multimedia PCs. This latest move provides more impetus to on the move anytime, anywhere computing.

A quote from the article at Tech.co.uk

“The Twango acquisition is a concrete step towards our Internet services vision of providing seamless access to information, entertainment, and social networks - at anytime, anywhere, from any connected device, in any way that you choose,” commented Anssi Vanjoki, Executive Vice President and General Manager, Multimedia, Nokia.

The move puts more options in the hands of people to share and manage videos, music and documents. Twango is a Washington; Redmond based start-up, founded by ex-Microsofites.

More sources:

Nokia buys media sharing site Twango (News.com)

Nokia announces acquisition of Twango (Pocket-lint)

These are indeed testing times for companies deeply associated with Telecom. Computer firms have been steadily encroaching into erstwhile telecoms space (Google planning to bid for spectrum, Apple launching the iPhone)

Obrolanku: Mengatasi Cacar air

Written by IT News on 2:30 AM

Obrolanku: Mengatasi Cacar air

Cacar air adalah adalah salah satu penyakit umum yang pernah dimitoskan sebaga salah satu penyakit yang pasti dilewati oleh anak-anak, bisakah dicegah?

Obrolanku: Periksa keamanan komputer dengan ProcessScanner

Written by IT News on 3:32 AM

Obrolanku: Periksa keamanan komputer dengan ProcessScanner
Tools ini mirip dengan processexplorer, namun ini online

Cegah resiko terkena kanker payudara

Written by IT News on 2:44 AM

Apa sih "morning sickness" apa iya ada kaitanya dengan kanker payudara? Jika anda seorang perempuan, tentu saja judul artikel ini sering terlintas dibenak anda bukan? Jangan kawatir, berdasarkan sumber yang bisa dipercaya dari sebuah pertemuan bertema "The Society for Epidemiologic Research" yang telah meneliti lebih dari 1.001 perempuan telah..

read more | digg story

An introduction to Yahoo Pipes

Written by IT News on 3:18 AM

Yahoo describes Pipes as “an interactive data aggregator and manipulator that lets you mashup your favorite online data sources”. But what does that mean to the rest of us? This tutorial will take you through the steps to filter the content of one RSS feed (Techmeme) so that content you may have already read isn’t included in your Techmeme feed.

read more | digg story

Sleep is just a bad habit

Written by IT News on 9:30 PM

Two hours of sleep a day is plenty.

read more | digg story

10 virtually instant ways to improve your life

Written by IT News on 9:28 PM

Here are 10 habits you should set aside right away to free yourself from the many problems each one will be causing you.

read more | digg story

The Zero Install system

Written by IT News on 9:25 PM

Zero Install is a way to run software without an explicit installation step. This is easier (install and run becomes just run) and safer (installation doesn't happen as root).

read more | digg story

Create a custom Control Panel in Windows XP

Written by IT News on 9:14 PM

To simplify access to the tools in Windows XP’s Control Panel, Microsoft created the Category View, in which the Control Panel’s tools are organized into categories. If you’re an old-school Windows user, you can still switch back to the Classic View, in which all of the Control Panel’s tools are available. If you admire the simplicity of the Category View but prefer the Classic View, you may want to create your own custom Control Panel that combines the best of both views. Here’s how:

  1. Right-click the Start button and select the Explore command.
  2. Go to File | New | Folder.
  3. Name the new folder My Control Panel.
  4. Right-click your new My Control Panel folder, select the Properties command, choose the Customize tab, click the Change Icon button, and select an icon that will differentiate this folder from all the rest on the Start menu.
  5. Open your new My Control Panel folder, and then open the original Control Panel and select Classic View.
  6. Drag and drop your favorite tools from the original Control Panel to your new My Control Panel folder.
  7. Close both your new My Control Panel folder and the original Control Panel.
Now when you need to use your favorite tool, just click Start | All Programs and at the top of the All Programs menu select the My Control Panel folder. You’ll see your favorite tools in an easy to access drop-down menu.

Worm/Zafi.B - Worm, lates top threats

Written by IT News on 9:35 PM

Virus: Worm/Zafi.B
Date discovered: 11/06/2004
Type: Worm
In the wild: Yes
Reported Infections: High
Distribution Potential: Medium to high
Damage Potential: Medium
Static file: No
File size: 12.800 Bytes

Methods of propagation:
• Email • Peer to Peer

Aliases:
• Symantec: W32.Erkez.B@mm • Mcafee: W32/Zafi.b@MM • Kaspersky: Email-Worm.Win32.Zafi.b • TrendMicro: PE_ZAFI.B • F-Secure: Email-Worm.Win32.Zafi.b • Sophos: W32/Zafi-B • Panda: W32/Zafi.B.worm • Grisoft: I-Worm/Zafi.B • VirusBuster: I-Worm.Zafi.B • Eset: Win32/Zafi.B • Bitdefender: Win32.Zafi.B@mm

Platforms / OS:
• Windows 95 • Windows 98 • Windows 98 SE • Windows NT • Windows ME • Windows 2000 • Windows XP • Windows 2003

Side effects:
• Uses its own Email engine • Lowers security settings • Registry modification

I recommend to always update your virus data files
if you don't have any anti virus installed in your computer, go here

Last 10 Virus Alerts

Written by IT News on 7:07 PM

Sober.X - HIGH RISK Virus Alert
First Report About This Virus:2005-11-19 18:34

Sober.X - MEDIUM RISK Virus Alert
First Report About This Virus:2005-11-19 18:34

Sober.P - MEDIUM RISK Virus Alert
First Report About This Virus:2005-10-06 06:12

Sober.r - MEDIUM RISK Virus Alert
First Report About This Virus:2005-10-06 03:47

RBOT.CBQ - MEDIUM RISK Virus Alert
First Report About This Virus:2005-08-16 23:46

RBOT.CBQ - MEDIUM RISK Virus Alert
First Report About This Virus:2005-08-16 23:46

IRCBot.es - MEDIUM RISK Virus Alert
First Report About This Virus:2005-08-15 18:55

MiniDl-A - MEDIUM RISK Virus Alert
First Report About This Virus:2005-06-03 04:37

BOBAX.P - MEDIUM RISK Virus Alert
First Report About This Virus:2005-06-03 00:26

Mytob.bh - MEDIUM RISK Virus Alert
First Report About This Virus:2005-05-29 22:52

SUSE update for php4 and php5

Written by IT News on 6:59 PM

SUSE has issued an update for php4 and php5. This fixes some vulnerabilities, where one has an unknown impact and others can be exploited by malicious, local users to bypass certain security restrictions and gain escalated privileges, and by malicious people to to cause a DoS (Denial of Service), bypass certain security restrictions, and potentially compromise a vulnerable system.For more information:

SA24089

SA25123

SA25378

SA25456

Solution:Apply updated packages.

Apple QuickTime Multiple Vulnerabilities

Written by IT News on 6:47 PM

Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

click here to continue reading this article

Intel inside $100 laptop?

Written by IT News on 6:36 PM

Intel said Friday it will join the board of the One Laptop Per Child program and contribute funding to the project which created and is distributing the XO computers for education. This comes after Intel execs have been critical of the design, and after they designed and promoted a competing child-focused portable, their $225 Classmate PC, a more conventional machine than the radically rethought XO boxen.


Various sources have recently priced the simple Linux portables at $150-$175 each as a result of hardware upgrades, although the program recently said costs should reach the $100 goal soon, and drop further in short order thereafter. Those would make a dandy e-book reader, and put further price pressure on Sony’s e-book readers.


The XO machines now use AMD CPUs. AMD reps said “Intel’s apparent change of heart is welcome, and we’re sure they can make a positive contribution to this very worthy project for the benefit of children all over the world.”

How to grab user attention with blinking text in an Access form

Written by IT News on 6:29 PM

A virus scan that I use blows what sounds like a foghorn when it’s done. I try to be out of the room because it’s so loud and annoying. I prefer a gentler approach. Blinking signs are a good attention-getter, without being harsh.

There are two ways to blink a control or text: on and off or by switching colors. Of course, blinking text won’t replace a sound cue, but done well, it’s easy on the eyes and nerves.To blink on and off, use a Timer event in the following form:

Private Sub Form_Timer()
Me!control.Visible = Not Me!control.Visible
End Sub

Each time the form executes its timer event, this code toggles the control’s Visible property. You can use this simple technique to blink just about any control, but the control can’t have focus at the time.
Switching between two colors is just as easy:

Private Sub Form_Timer()
With Me!control
.ForeColor = IIf(.ForeColor) = color1, color2, color1)
End With
End Sub

The form’s timer event alternates between color1 and color2. Use integer values or constants for colors. For instance, use 0 or vbBlack for black, and 255 or vbRed for red. This probably works best with a label or command button, but you could use it with any control that has a Fore Color property.

Blinking text doesn’t necessary mean the user has to do anything, but it can. How the user reacts to the text is really up to you. In both of these simple events, the blinking is continuous; it won’t stop when the user takes some action.
If the control or text fails to blink, check the form’s Timer Interval property. A setting of 500 creates a reasonable blink. A setting of 50 is so fast that it creates a neon effect. This works only with forms, as reports don’t have a Timer event.

Private Sub Form_Timer()
Me!control.Visible = Not Me.control.visible
End Sub

10 e-mail habits that waste time and cause problems

Written by IT News on 6:21 PM

Few communications tools give you as much exposure as e-mail. Unfortunately, mistakes in your e-mail will receive that same exposure. Calvin Sun cites 10 common e-mail habits and missteps that annoy him (and maybe you as well) and explains what you can do differently.

click here to continue reading this article

Facebook vs MySpace: The Tale of the Tape

Written by IT News on 1:34 AM

There has been a lot of talk about Facebook unseating MySpace as the top social network. While that may (or may not) happen sometime in the future, the so-called gray lady of Social Networks is holding its own.

read more | digg story

Microholography milks 500GB out of DVD-sized discs

Written by IT News on 1:24 AM

Researchers have found a way to record to nanostructures in DVD-sized discs to store 500GB of data, and the team says that it will eventually be able to store 1 terabyte of data on those same discs with high data throughput rates.

read more | digg story

Microsoft: Live Earth concerts are most watched event in online history

Written by IT News on 1:15 AM

According to Microsoft, the Live Earth concerts were the most watched event in online history. That's pretty impressive for an event that was the least watched television show last Saturday night.

read more | digg story

Open Internet Coalition wants unlocked iPhones for everybody

Written by IT News on 1:10 AM

The Open Internet Coalition is on Capitol Hill to talk about anti-competitive practices in the wireless industry and pitch the need for device portability across carriers, sane termination fees, and smarter management of new spectrum.

read more | digg story

Nouveau Driver 2D performance exceeds Nvidia driver

Written by IT News on 1:06 AM

All the development going on with the free Nouveau has paid off. Today the free driver has outperformed the existing nv driver by 64%. The GtkPerf benchmark was used.

read more | digg story

The Pirate Bay Interview (Video)

Written by IT News on 6:09 AM

The BitLord show released a special episode in which they interview with Brokep from The Pirate Bay. Brokep talks about TPB’s contribution to the BitTorrent scene, their secret upcoming project, the new anonymous P2P protocol they are working on and much more.

read more | digg story

Better than AppleTV? Neuros OSD does the full YouTube

Written by IT News on 6:06 AM

Neuros' hacker-friendly set-top-box can now browse, search and view YouTube -- thanks to the efforts of the open-source community.

read more | digg story

iPhone in depth: the Ars Technica review

Written by IT News on 6:03 AM

Our iPhone review is rather large because we unleashed three (and a half) reviewers on it, all coming from different backgrounds. We pooled our thoughts together, had a few fistfights and a squabble or two ("Keyboard sucks!" "Does not!"), and now present to you our full review. Check out the outline beforehand, or just jump on in.

read more | digg story

Adding pdf file into power point

Written by IT News on 4:30 AM

Converting a PPT to a PDF is like turning meat, veggies, spices and water into stew. Pretty simple.

But adding pdf file into power point is not easy as other files such JPG, GIF and other graphic file format. Some users in my office don't know how to do this.


It's not likely that anybody can do a very good job of it, but it's worth checking the current crop of PDF tools at places like
Planet PDF and PDFZone

But ....
You can import PDF content into PowerPoint in several ways, depending on what software you have and the result you're after.

The simples way is by using Insert object, while the user only familier with Insert picture from file.


Here is the step:

  1. From the Insert menu, klik Object,
  2. From the Insert object dialog, choose Create from file
  3. then browse your pdf file and click OK
Remember, this is an embeded object, when double clicked the object it will automatically open your pdf viewer.

What do you think? if you have the simples way please let me know, so I can share it with people in my office.

GIMP Tricks: Chocolate bar with GIMP

Written by IT News on 11:16 PM

Some time ago I saw a chocolate bar made with Adobe Photoshop somewhere on the Internet. I thought that Gimp can
’t do worse than and I got myself to work. It seemed to be quite easy and here is the result in 28 steps.

read more | digg story

Introducing Our Newest Security Freeware: SecurAble

Written by IT News on 10:16 PM


saOnYellow
Quickly determine which state-of-the-art security features are being offered by your system's processor chip.

Recent AMD and Intel processors contain three features which can be extremely beneficial to the system's overall security. SecurAble probes the system's processor to determine the presence, absence and operational status of each of these three modern processor features.

Click to jump to SecurAble's information and download page.

Yahoo mail vs Gmail, size doesn't matter!

Written by IT News on 8:58 PM

Yahoo Mail LogoAs you may know, both yahoo and google offer free services for webmail. Gmail is the first offering large amount of mailbox capasity folowed by yahoo. Yahoo is now offer a higher storage capacity (unlimited storage, compared to its previous 1000MB).

Gmail Logo Gmail offers 1GB (1000MB) of storage. But is not easy to register if you are common user and don't have enough knowledge on proxy. Right now, Gmail is only available to people who are invited by other existing Gmail users.

I’ve been a long time using Yahoo Mail. Ever since I shut my plasa.com account some years ago, and left all my other free email accounts, I’ve been loyal to Yahoo Mail. I found an auction for Gmail invitation on eBay, I suggest you don't need to pay for free mail service, yahoo is now offring unlimited size of storage.


I need your comment regarding this issue, which one is realy good to have?

Intel vPro: Intel introducing their new processor

Written by IT News on 12:06 AM

Intel® vPro™ Processor Technology
Intel® vPro™ processor technologyIntel is very fast on upgrading their technology on processor. It seem just yesterday they launched the core 2 duo processor, now they have Intel vpro processor.

PCs with Intel® vPro™ Processor Technology
Simplify the management and security of your desktop fleet with PCs featuring the powerful, professional grade capabilities of Intel® vPro™ processor technology. These include built-in manageability, proactive security, and the energy-efficient dual-core performance of Intel® Core™2 Duo processor. Now IT managers can spend less time managing PCs and more time focusing on strategic initiatives that accelerate business success.

Components
Read more at Intel official website

Asus ATI Radeon X1050 PCI-E 16X 256MB DDR VGA DVI TV Retail (EAX1050/TD/256M)

Written by IT News on 11:35 PM

code:EAX1050/TD/256M

Asus ATI Radeon X1050 PCI-E 16X 256MB DDR VGA DVI TV Retail (EAX1050/TD/256M)
ASUS VGA EAX1050 TD 256M RADEON X1050 PCIE 256M(EFFECTIVE MEMORY UP TO 1GB)

Outstanding Gaming Experience:
Supports today's top game titles and combines smooth gaming performance with stunning 3D image quality Superior Visual Output.

Compare price at http://www.shopbot.ca/p-46180.html

Google spreadsheet and Docs is a great idea

Written by IT News on 10:41 PM

According on my first used of Google spreadsheet and documents (beta version) it is clever idea, google know wht people looking for. It's easy to use, fast enough for web based application. Ofcourse to access the Google speadsheet and documents you should have a google account (blogger account is working). On my first look, its nothing different with his mother (mean MS Office.. ).



  • People don't need to learn much when start using this. Who will benefit from this briliant idea?
  • People on work that need to share their documents with their collegues, partners, branches or just share with their family.
  • People that don't have or don't want to buy office licensed from Microsoft (pirate) People that don't want to use oppenoffice Any one that love to share their documents This is realy great idea, in my country not all people have enough budget to buy microsoft office.

I personaly appreaciate on wht geoogle do. How a great and smart idea it this?


Use firewall for your security

Written by IT News on 9:23 PM

If you always connected to the internet to help you find something or for your work, or for just browsing, it's highly recommend to always activate your firewall, especialy if you running windows XP and don't third-party firewall software.

And if you don't know what is firewall,
firewall is a hardware or software device which is configured to permit, deny or proxy data through a computer network which has different levels of trust, in other case i can say that firewall is your god for security. And windows xp SP2 already built in standard firewall.

Windows Firewall, previously known as Internet Connection Firewall or ICF, is a protective boundary that monitors and restricts information that travels between your computer and a network or the Internet. This provides a line of defense against someone who might try to access your computer from outside the Windows Firewall without your permission.

If you're running Windows XP Service Pack 2 (SP2), Windows Firewall is turned on by default. However, some computer manufacturers and network administrators might turn it off. But please do not turm it off for any reasons.

To open Windows Firewall

  1. Click Start and then click Control Panel.
  2. In the control panel, click Windows Security Center.
  3. Click Windows Firewall.

Security Center






Read more regarding windows firewall at http://www.microsoft.com/windowsxp/using/security/internet/sp2_wfintro.mspx
or findout more what is firewall at http://www.webopedia.com/TERM/f/firewall.html

Assemble new pc with asus P5L2D2SE

Written by IT News on 8:39 PM

After got a new Solidedge 3D licensed software, I think that I need new PC with high speed and performance. The candidate should be able to handle the 3D aplication and graphic design such SolidEdge 3D. The old hardware seem to be very slowly, coz it's Intel Pentium 4, 1.8Ghz.

Spending about $600.00 for this new assembled PC (assembled by myslef)
I decide to use ASUS P5L2D2 SE/C, support Intel core 2 DUO, and support Intel Next generation 04B/04A and 05B/05A cpu.

And the processor is Intel core Duo, e4300*, 1.8Ghz, 800Mhz, 2MB L2 Cache.
And the PCI express is Asus EAX1050, 256MB, chipset by ATI.
And the memory is VISIPRO DDR-2, 2 x 1GB
And the Hard disk is 320GB, 7200rpm by Seagate

The OS is Microsoft windows XP pro (event the hardware support vista already)

wooow, coool, great.. this is the fastest machine I have ever, running SolidEdge 3D better then before. It is worthy to have this new PC with only spend $600.00, already include Samsung LCD, 17", DVD-RW by LiteON, Casing by Simbada SimCool, keyboard and mouse by Logitech.

Display your local IP address

Written by IT News on 11:26 PM

There are several ways you can determine your local IP address information:

IPCONFIG

  1. Start / Run / cmd
  2. IPCONFIG /ALL

This will opens a command window. One advantage is that you can send the information to a text file
(IPCONFIG /ALL > c:\ip.txt)
But sometimes the window shows show much information you need to scroll around to find it.

VIEW STATUS

  1. Control Panel / Network Connections / Double click the icons for your network (If the network has an icon in the system tray you can also just double click on that icon)
  2. Click on the Support tab
  3. Click on the Details button
and show you IP address from Internet simply goto http://www.lawrencegoetz.com/programs/ipinfo/



Clrear windows XP virtual memory on shutdown

Written by IT News on 10:37 PM

What is Virtual Memory? and what is the page file? In any windows disk partition by default will exist page file, some times the file is bigger day after day. So, what is the page file for? can we delete or just not activate it? Here you will lear a litle bit about virtual memory and how to clear it when windows shuting down.

Virtual memory is a program instruction on an Intel 386 or later CPU can address up to 4GB of memory, using its full 32 bits. This is normally far more than the RAM of the machine. (The 32nd exponent of 2 is exactly 4,294,967,296, or 4 GB. 32 binary digits allow the
representation of 4,294,967,296 numbers — counting 0.)

The page file in XP is a hidden file called pagefile.sys. It is regenerated at each boot — there is no need to include it in a backup.

To see it you need to have
Folder Options | View set to ‘Show Hidden and System files’, and not to ‘Hide Protected mode System files’. Just if you feel need to clear the cache or page file size, here is to do that on shuting down:

  • Go to Control panel Administrative tools, local security policy.
  • then goto local policies ---> security options. Then change the option for "Shutdown: Clear Virtual Memory Pagefile"


If you think this tips doesn't work for you, send me a comments, otherwise vote me.


Converting FAT into NTFS filesystem

Written by IT News on 9:27 PM

If you are running windows XP or higher version, by default the first installation will suggest you to choose NTFS file system format. If by accident your file system format is Fat or Fat32, you still able to convert into NTFS file system, here is how:

  • Open dos command, goto START | RUN, type CMD followed ENTER; at the command prompt, type CONVERT [driveletter]: /FS:NTFS. e.g C: D: ... Z:
Convert.exe will attempt to convert the partition to NTFS.





Note:
I highly recommend you to backup any important data before coverting the filesystem. This tips is not for windows begginers.

Tips: Shortcut to System properties

Written by IT News on 9:06 PM

Many ways to get into System properties such as goto control panel and double click System icon or by right clicking on my computer folder within explorer.

Here I saw you the shortest way to get the system properties:

  • from your keyaboard, press windows button + pause break button at the same time
Note: assume that your keyboard has a windows logo button or known windows start button




if this tips work for you, please vote or give some comment

Disable the Windows Automatic Update

Written by IT News on 10:16 AM

Just yesterday, got mail from my client, requesting some tips on how to disable the windows automatic update. I'm asking to him "why should you disable the automatic update?" I told him that it's not recommended to disable it windows automatic update, event its posible to do that.

The most probably reason is because he don't have product license, well i don't care about the reason. I decide to help him.

It turns out to be pretty easy. Courtesy of Coding Horror are two ways: you can either use the command line to shut off the Automatic Updates service or manually shut it off in the Services panel.

To shut it off manually:

  1. Go to Start->Control Panel->Administrative Tools and double-click on Services.

  2. Right-click on Automatic Updates and select Stop.


To use the command line:1. Go to Start->Run. Type in "cmd" without quotes to open up the command line.2. Now, type in "net stop wuauserv" without quotes and hit Enter.

Intel is working on anti-cheat technology

Written by IT News on 1:58 AM

It looks like Intel is working on an anti-cheat technology, although this is only a research project at the moment and hardly ready for prime time.

The concept is simple: A chipset records all input from the keyboard and mouse at the hardware level — the game also does the same. If the two doesn’t match, then something else is pumping input into the game, and you are probably ‘cheating.’

The general idea here is that, if something tampers with input, it should be flagged. Obviously, the game will first have to support the chipset, as it will have to be the one querying the hardware in order to compare the various input streams.

You can read more about Intel’s anti-cheat technology in The Inquirer.

Personally, I can immediately see some potential issues with this setup. One main problem would be with hardware or software that reads or writes to the keyboard or mouse queue. I wrote a hotkey plug-in for Winamp a few years ago (Winamp KeyControl), and I can just see how this anti-cheat implementation will scream murder at every other key press.

Additionally, I am pretty sure it will be hacked very quickly when released anyway.

Anything to say on the current state of cheating in online games? Join the discussion, or get back to your work!

DSNless Connection Code Sample

Written by IT News on 1:41 AM

If you have a secure folder on your server, you may want to avoid using DSN because it's a little bit slower. I've set my data folder to be "secure". This means, the folder has full permissions for the asp engine context, but no permissions for the visitors.

Let's create the connection and recodset objects now.

<%
set conn = Server.CreateObject("ADODB.Connection")
set rs = Server.CreateObject("ADODB.Recordset")
%>

First way to define where your database is to use relative location by utilizing Server.MapPath method.

<%

'Define the location of your database
'as follows if you want to use a relative folder.
cDBLocation =
"/securedata/mydatabase.mdb"

'Construct the connection string using MapPath.
sConnSample =
"Provider=Microsoft.Jet.OLEDB.4.0;" & _
"Persist Security Info=False;Data Source=" & _
Server.MapPath(cDBLocation)

%>

You may want to define your physical database location. You should always use the physical location if you can.

<%

'If you are sure about the pyhsical location
'of your database, it's better to use it that way.
cDBLocation =
"c:\securedata\mydatabase.mdb"

sConnSample =
"Provider=Microsoft.Jet.OLEDB.4.0;" & _
"Persist Security Info=False;Data Source=" & _
cDBLocation

%>

After defining the location, it's time to connect to the database and get the records!

As a sample, I've defined two re-usable functions for opening and closing the connections. Of course, there are much better ways depending on the functional needs of your application, but you can still use the following code.

<%

'ADO Constants
Const adOpenForwardOnly = 0
Const adOpenStatic = 3
Const adCmdTable = 2

sub OpenDB(sConn)
'Opens the given connection
'and attachs the recordset to it
conn.
open sConn
set rs.ActiveConnection = conn
'Using a static cursor, you will be able
'to use AddNew and Update methods.
'Consider using adOpenForwardOnly if you
'are only reading records (much faster).
rs.CursorType = adOpenStatic
end sub

sub CloseDB()
'Closes the active connection
'And cleans up the memory
rs.
close
conn.
close
set rs = nothing
set conn = nothing
end sub

%>

You may execute an SQL statement to get your recordset filled:

<%

OpenDB sConnSample

sSQL =
"SELECT Field1, Field2 FROM TestTable"
rs.
Open sSQL,,, adCmdTable

'Display the records anyway you want
CloseDB
%>

I hope this sample gives you a quick overview of connecting to Access Mdb files.
You are always welcome to express your feedback!

World's richest? Gates may have cashed it in

Written by IT News on 1:04 AM

After 13 years as the world's richest person, Bill Gates appears to have been dethroned. But there will probably be no sobbing inside his Medina estate.

In fact, based on his past remarks, the Microsoft Corp. chairman might welcome the news.

Mexican telecommunications tycoon Carlos Slim has taken the crown with a net worth of $67.8 billion, according to estimates by a respected financial news site in Mexico, as reported by multiple news services.

The main reason: a 27 percent surge in the stock price of Slim's wireless company, America Movil, in the second quarter.

At a Microsoft conference in Redmond last year, advertising executive and TV host Donny Deutsch asked Gates if he would be upset if someday he were no longer the world's richest man.

"I wish I wasn't," Gates replied. "There's nothing good that comes out of that."

"It's better than being second," Deutsch said.

"No," Gates replied. "You get more visibility as a result of it."

Slim's new standing might not be considered official until the next publication of Forbes' ranking of the world's richest people.

On this spring's Forbes list, Slim was just behind investor Warren Buffett, the chief executive of Berkshire Hathaway, who had been second on the list for years.

In April, after the publication of the official 2007 list, Forbes reported that Slim had surpassed Buffett to become the world's second-richest man. At the time, Forbes reported that Slim was "breathtakingly close" to passing Gates for the No. 1 spot. Gates' estimated worth was $56 billion at the time.

For the latest estimate of Slim's worth, Reuters quoted financial tracker Eduardo Garcia, from Sentido Comun, an online financial publication in Mexico. Garcia estimates that Gates is currently worth $59.2 billion.

According to an Associated Press report from Mexico City, Garcia's estimate of Gates' wealth was based on a 5.7 percent increase in Microsoft shares in the second quarter, and doesn't include Gates' sizable holdings apart from Microsoft shares.

"But a 26 percent growth rate for a world company like America Movil, that's hard to top for one quarter," Garcia said, according to the AP report.

Gates has put a total of more than $30 billion into the Bill & Melinda Gates Foundation, reducing his personal net worth. Slim recently told The New York Times that he plans to boost the endowments of his companies' foundations to $10 billion in the next four years, from the current total of $4 billion.

Slim, meanwhile, seems just about as interested in holding the "world's richest" title as Gates was. The AP quoted Slim's spokesman as saying, "As he has said many times himself, he is not in any competition."

Free FeedBurner Services by Google

Written by IT News on 1:00 AM

FeedBurner has ceased charging for two premium features following their acquisition by Google in May.

FeedBurner Stats PRO, a service that provides detailed statistics including subscriber numbers, item clickthrough tracking, podcast downloads and aggregate item uses amongst other features, becomes free.

FeedBurner MyBrand, a service that allows users to control the URL of feeds is now free as well; a move that will be strongly welcomed. For many, the biggest argument against using Feedburner was the need to give up control of your feed URL (for example, http://feeds.feedburner.com/Techcrunch). Being able to keep ownership of a feed complete with site branding will drive new many new users to Feedburner, including yours truly.

FeedBurner PRO and MyBrand accounts will not be billed effective from June. Although the services are now free, Feedburner users are required to “upgrade” to them from within the Feedburner control panel.

Protect Your Private Word 2007 Documents

Written by IT News on 11:24 PM

Worried about sensitive data in your Microsoft Word document? you can both encrypt and password protect the document to keep it secure. This feature is very useful if you have to store your documents in a shared location, such as a network folder or home computer.

To encrypt your document, click on the Microsoft Office Button in the upper left hand corner, select Prepare from the left-hand menu and then choose Encrypt Document.

In the Encrypt Document dialog window type in your password for this document.

You will then need to enter in your password again for verification and click OK. You will not receive any type of confirmation message, this window will simply disappear.

By default Word 2007 will save your document with 128-bit advanced encryption. Now when anyone goes to open the document it will automatically ask for the password.

That's all there is to it.

How Easy Rotating Pictures In Word 2007

Written by IT News on 11:19 PM

Another feature that i love from Office 2007 is it ability and easy to rotate any objects such picture. When you are including graphics in a Word document many times you want to place the image in a particular way or at a certain angle. Word 2007 has just the tool for the job.

Open your Word document and click on the picture or graphic you want to move. You will see the edit outline around your graphic. Now left click the top green knob and hold the object and start to rotate it.

4

Below you can see the graphic start to move.

5

In the second picture here I added an object and am rotating it as you will notice the first graphic is at an angle.

7

Here is the result of a couple of simple objects in a Word 2007 document that I rotated around a bit so you have an idea.

8

You can do this with any picture, graphic, and even text!

Place IE7 Menu Bar Back On Top

Written by IT News on 11:17 PM

Do you wish the IE7 Menu bar was located where it was in IE6? Here is how to quickly create a registry fix to move it back to the top.

After you install IE7 you have to make the menu bar appear. Right click an empty spot on the tool bar and place a checkmark next to Menu Bar. It will also show up temporarily if you hold down the Alt key.

You will see that IE 7 puts the Menu Bar underneath the Address Bar which we don't want.

Open up notepad by clicking Start \ Run, type in notepad and click OK.

Copy and paste the following script into notepad. You do not need to modify the code at all. Just copy and paste it into notepad.

REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\]
"ITBar7Position"=dword:00000001

Here is how we turn it into a reg key fix. Click on File \ Save As, but don't click on Save until you read the next step.

Change your notepad Save as type to "All Files" and name the file something like IE7_Toolbar_fix.reg. Naming the file with the .reg extension is the key for this to work. Now you can click on Save.

You have just created a registry fix! Now double click the file you just created.

You will get the following confirmation screen. Click Yes.

The next screen will be confirming the registry key was added.

Close out of Internet Explorer if it is open and relaunch it. The Menu Bar is now on top!

Uninstall

To change the Menu bar back to the original position, use this registry script instead:

REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\]
"ITBar7Position"=dword:00000000

Power becoming a major issue as energy costs rise

Written by IT News on 11:12 PM

Residents of Maryland were recently challenged by their governor to cut their energy consumption by 15% over the next eight years as he pledged to reduce the use of energy by government offices and to increase the energy efficiency of government buildings. This and other energy conservation projects (a quick Google search revealed similar calls in several states) are poised to become large movements, particularly as energy costs balloon as a result of rising oil prices.

State residents challenged on energy savings (Baltimore Sun)

IT shops will be forced to respond to mounting energy costs. Dell has already announced an initiative to cut energy consumption by its servers by 42% while delivering the same or higher performance. Gartner has posited that nine to fifteen percent of most businesses’ energy costs are related to IT, the vast majority from desktop PCs, and suggests “more-aggressive power management” for businesses. HP has also caught the conservation bug, planning to reduce energy usage by 15% over the next three years by using advanced techniques for powering and cooling data centers.

Dell-Emerson Partner to Reduce Power Consumption in Customers’ Data Centers by 42 Percent (WebWire)

Switch off your PCs to cut costs and help the environment (Moneyweb)

Averting the IT Energy Crunch (BusinessWeek)

My organization has already started to reduce energy consumption by closing on Fridays during the summer to save on cooling costs during the hottest months of the year. We have also been asked to look into power management options to reduce PC power consumption.

Phishing and pharming

Written by IT News on 11:07 PM

Using a variety of nefarious methods, phishing and pharming are a consistent problem that threatens everyone with identity theft. If you recognize what these methods are and how malicious users employ them, you can keep yourself and your users from becoming a victim.

A quick review

Phishing involves sending an e-mail that claims to be a legitimate business in an attempt to scam the user into surrendering private information. Pharming involves the same goals with a different method; malicious users employ spyware, keyloggers, domain spoofing, domain hijacking, or domain cache poisoning to obtain personal or private (usually financial) information.

To put it bluntly, criminals try to steal your identity by getting you to divulge financial data such as credit card numbers, account usernames, passwords, and social security numbers. They sell this information, and it then becomes an identity theft crime.

Recognize the methods

The primary method for this crime is to send e-mails that look like valid correspondence coming from a bank asking users to click the link provided and log into their account for some type of important information. But your bank and other institutions where you do business don’t work this way. They may send you an e-mail and ask you to review or verify information. However, they don’t send links to a Web site. You already do business with them, and they know you don’t need the link to the Web site.

If you click that link, one of two things is going to occur. It could download spyware onto your computer, which will then capture your personal information and send it to the criminals. Or, the link will direct you to a Web site that looks and feels like the site you expected — but it’s actually just a front to collect your login information to help the criminals harvest your personal information.

Fight back

To protect yourself and your users against phishing and pharming schemes, here are four rules to live by:

  • Rule 1: Stop clicking links in e-mails that direct you to your bank or a financial institution. Stop filling out forms sent to you by your bank or financial institution. If you want to visit the site to see if you need to confirm/update/verify your account, open up a browser and type the link or retrieve it from your favorites.
  • Rule 2: If you suspect an e-mail is part of a phishing scheme, report it. Report it to the financial institution, the FTC, and the Internet Crime Complaint Center.
  • Rule 3: Update your browser, your antivirus software, and any other security software. The latest versions of such software have phishing filters that detect attempts and warn you if it suspects you’ve surfed to a site that isn’t legitimate.
  • Rule 4: Stop using public computers to access private information. Internet kiosks at hotels and other business are convenient but often have Trojans and keyloggers installed that collect and transmit your information to the criminals. Access personal and financial information only from a computer you trust to be free from these evils.

Final thoughts

Criminals have learned that they don’t need to pull a gun on you to get your wallet or purse. They’re using the Internet to steal everything in your accounts — and your good credit too. Take a few simple steps to stop them, and don’t become an identity theft statistic.

Take steps to safeguard sensitive data

Written by IT News on 9:56 PM

Is your organization responsible for complying with one or more of the many privacy-related pieces of legislation that the U.S. government has enacted over the past decade? It’s a good bet that it is.

Whether it’s the Health Insurance Portability and Accountability Act (HIPAA), which addresses healthcare information, the Gramm-Leach-Bliley Act (GLBA), which addresses financial information, or even the Family Educational Rights and Privacy Act (FERPA), which addresses education information, chances are good that one of these affects your organization in some way.

Compliance is nothing to fool around with, and it’s imperative that your organization understand its responsibilities for safeguarding protected data. Protected data is any information that someone could use to identify an individual. Information protected by legislation can include:

  • Salary and fringe benefits (except for federal employees)
  • Terms of employment (including performance and disciplinary records)
  • Academic and educational history
  • Criminal investigation and arrest history
  • Employment history (including general or security clearance information)
  • Biographical history
  • Social Security information
  • Identification codes
  • Personnel profile (including home address and phone number)
  • Medical history

Your organization’s network obviously contains and/or processes protected sensitive information. Unauthorized disclosure of such sensitive information could adversely impact your organization with both civil and criminal liabilities. To protect yourself and your company, it’s vital that you implement some extra precautions.

Administrator responsibilities

If you’re responsible for the security of your company’s network, then you’re also responsible for overseeing the day-to-day collection, storage, and use of personal data subject to such legislation. You must apply adequate data security safeguards to protect data from the following:

  • Inappropriate disclosure
  • Improper use
  • Access by unauthorized or unapproved users
  • Data tampering

Individuals who fail to follow specific requirements can face fines up to $5,000 per violation, as well as misdemeanor charges. That’s one more reason your organization needs to take appropriate security measures to protect sensitive information. But don’t forget that security measures, no matter how solid, are only as good as the educated employee who wants to do the right thing.

Employee responsibilities

An organization’s users are potentially the weakest link in your security efforts. You’ve heard it before, but it’s worth repeating: Educate your users.

To better protect sensitive data, train all users to do the following:

  • Label all media (e.g., disks and documents) containing sensitive information.
  • Securely store sensitive information.
  • Immediately notify supervisors of any security breach.
  • Don’t send unencrypted sensitive information via e-mail.
  • Log off or use a screen saver with a password when leaving workstations unattended.
  • Erase all data from hard disks before sending PCs off-site for maintenance.
  • Store data on network drives instead of workstations.
  • Be on the lookout for hardware keystroke loggers.

Final thoughts

Privacy-related legislation grew out of a concern over the potential misuse of the vast amounts and types of personal information collected and maintained on corporate networks, which store, manipulate, and transmit the data for a variety of reasons. Don’t become a statistic in the news by mishandling protected information — protect that information with adequate safeguards, and train your users to do the same.

Mike Mullins has served as an assistant network administrator and a network security administrator for the U.S. Secret Service and the Defense Information Systems Agency. He is currently the director of operations for the Southern Theater Network Operations and Security Center.

No visas? No problem. No jobs.

Written by IT News on 9:53 PM

Today’s Microsoft announcement of moving some R&D from Redmond to a new center in Vancouver, British Columbia heralds the first wave of corporate reaction to the failure of immigration ‘reform.’ The quote from Redmond’s representative is about as subtle as a Pan Galactic Gargle Blaster:

The company said the new location will “allow the company to continue to recruit and retain highly skilled people affected by the immigration issues in the U. S.”

Reinforcement came from Big Blue via the Grey Lady, in which IBM explained to the New York Times they would still need some employees stateside, but moving programming work offshore seems to work just dandy.

Of course, no good deed goes unpunished. Articles have appeared explaining that India information workers are becoming too expensive, with both the Wall Street Journal and Infoworld sending messages just as unsubtle as the Microsoft missive above. Nobody’s jobs are safe if quarterly earnings could be adjusted by a penny, it seems.

Let’s not forget about the genesis of all these stories placed by corporate PR flacks into the MSM. You have seen the video of the attorney explaining how his firm can show Mister Employer how to break immigration law and not get caught, when hiring overseas and avoiding qualified Americans, right? That “A” list material had to, at least in some small way, have been responsible for the Congress’ cooling off on immigration reform, and for scuttling the Real ID provisions buried within it. Thank you, Mister Lawyer; for once, Greed Was Good.

BlackBerry enters China market

Written by IT News on 9:51 PM

China now allows BlackBerry sales on the Chinese mainland. Research In Motion, the Canadian creators of the BlackBerry, pursued the deal for eight years. Corporate customers in key Chinese cities such as Beijing, Shanghai and Guangzhou will lead the list, and over five thousand are pre-sold.

Chinese language mods for BlackBerries have been in place for over two years in Hong Kong and Macao. Neighbor nations India and Japan already buy BlackBerries, so with CDMA 2000 1X data and GSM 900MHz cellular networks already deployed in China, the market should be well primed. That market’s considerable; there are more Chinese cellphone users then there are people in the United States.

However, China is also developing a homegrown digital system, TD-SCMA, likely with an eye to reaping the benefits of CDMA without paying Qualcomm’s significant royalty fees. New Chinese phones commonly ship with dual-network capability, as this iClone demonstrates.

Where the Chinese market goes, Chinese developers quickly follow, so it seem logical to expect Blackberry clones soon. Nokia already licenses BlackBerry Connect capability in its 9300 and 9300i smartphones.

ZoneAlarm for Vista 7.1.078.000

Written by IT News on 3:39 AM

ZoneAlarm Free for Vista

With comprehensive multi-layer protection, including best-of-breed antivirus, anti-spyware, and the renowned ZoneAlarm firewall, ZoneAlarm Internet Security Suite 7.1 safeguards PC users against today’s most complex online threats. Through its exclusive operating system firewall, ZoneAlarm Internet Security Suite employs the deepest levels of integration with the Vista operating system to proactively prevent threats that basic, traditional firewalls and signature-based systems miss.

Visit Website
Software Developer Homepage
Download
File Size = 17.56 MB

Google Hacks 1.3

Written by IT News on 3:30 AM

Google Hacks

Google Hacks is a compact utility that will allow its users to search google using different google search hacks. Using Google Hacks one can easily do a music search by using a highly optimized and complex search command that can be obtained just by clicking a number of option boxes that can be found in the program´s interface.

Click here for Official website.
Click here for Download, size 777kb


Search This Blog

Ads and Sponsored by:



Want to subscribe?

Subscribe in a reader.