Monday, December 8, 2008

Block USB drives

It is easy to lock a machine down, disable the floppy, and cdrom in the bios. Many times when you try to disable USB - it disables it entirely.

This can be a real pain on newer laptops or systems that don't even have a PS2 interface for the mouse or keyboard.

There is a simple registry change that will keep the USB storage drivers from starting when the system boots. Keeps people from walking up to a PC and copying data off with a USB key, but allows you to keep your scanner, keyboard, and mouse working.

As always - back your system up before messing around in the registry.

Just open regedit and browse to this key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor

Notice the value 'Start'

Switch this value to 4, and USB storage devices are disabled.

Switch this value to 3, and USB storage devices are enabled.

Monday, November 24, 2008

Mozilla Firefox

Keyboard shortcuts

Spacebar (page down)
Shift-Spacebar (page up)
Ctrl+F (find)
Alt+N (find next)
Ctrl+D (bookmark page)
Ctrl+T (new tab)
Ctrl+K (go to search box)
Ctrl+L (go to address bar)
Ctrl++ (increase text size)
Ctrl+- (decrease text size)
Ctrl-W (close tab)
F5 (reload)
Alt-Home (go to home page)
Control-L Go to address bar
Control-Enter will automatically fill in the “www” and the “.com” and take you there.
Shift-Enter
will automatically fill in the “www” and the ".net" addresses.
Control-Shift-Enter
will automatically fill in the “www” and the ".org" addresses.
Ctrl+Tab (rotate forward among tabs)

Ctrl+Shft+Tab (rotate to the previous tab)

Ctrl+1-9 (choose a number to jump to a specific tab)

Mouse shortcuts

Middle click on link (opens in new tab)
Shift+scroll down (previous page)
Shift+scroll up (next page)

Ctrl+scroll up (decrease text size)
Ctrl+scroll down (increase text size)
Middle click on a tab (closes tab)

Difference between I18n & L10n

Internationalization involves writing and designing an application so that it can be used with different languages, date, time, currency and other values without software modification.

Localization involves writing and designing an application capable of dealing with a specific region, country or language. In a sense, every application written for a specific area is localized. Usually, though, real localization is achieved by core code that accesses locale, location, political or other specific components and modules along with translating text.

A tax or accounting package that deals with, say, the U.S., Canada, Mexico and Brazil would need to be i18n'ed so that displays, reports and values would not have to be specific for each country, but also l10n'ed to handle different accounting and reporting procedures and taxes.

Proper internationalization facilitates localization. Internationalized applications are easier to localize than applications that have hard-coded text, number formats, embedded image names, etc.

Internationalization is typically a design and implementation job for a software engineer. Localization is typically a translation job for those who provide user visible elements. In some cases, however, when a a country or region requires custom features, some localization tasks may require new software modules or business logic. Hopefully the well-internationalized application has been designed for that issue and makes it easy to simply plug in additional functionality without modifying core application logic.

Check out more.

Tuesday, November 11, 2008

What is a Spam?

As wikipedia says, Spam is the abuse of electronic message system to indiscriminately send unsolicited bulk messages. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, Online classified ads spam, mobile phone messaging spam, Internet forum spam and junk fax transmissions.

In other words, we can say spam is flooding the internet with multiple copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Almost all spams are commercial advertising, often for dubious/malicious products, get-rich-quick schemes, etc. Spams cost the sender very little to send, most of the costs are paid by the recipient or the carriers rather than by the sender.

E-mail spams target individual users with direct mail messages. E-mail spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. Email spams typically cost users money out-of-pocket to receive. Many people - anyone with measured phone service - read or receive their mail while the meter is running, so to speak. Spam costs them additional money. On top of that, it costs money for ISPs and online services to transmit spam, and these costs are transmitted directly to subscribers.

How to get rid of Spams?? Read this http://gnosis.cx/publish/programming/filtering-spam.html

Monday, November 3, 2008

Rename several files at once

To rename several files at once:

· Select all of them in any folder view, or in the Windows Explorer, rename the FIRST one in the list, and the rest will follow.

To turn off filenames:

· Hold down the Shift-key when you click to open a folder in Windows Explorer or when switch into thumbnail view. This will turn of the file names, giving more space for the thumbnails. Doing it again turns them back on.

· Try grouping your files. In the top menu bar select View - Arrange icons by - Type, and then View - Arrange icons by… - Show in groups.

Enjoy !!

Enhance Windows Performance !!!

Here is how one can improve the performance of a Windows machine.

· Start > right-click on My Computer and select Properties.

· Click on the "Advanced" tab.
· See the "Performance" section? Click "Settings".
· Disable the following:

Fade or slide menus into view
Fade or slide ToolTips into view
Fade out menu items after clicking
Show Shadows under menus
Slide open combo boxes
Slide taskbar buttons
Use a background image for each folder type
Use common tasks in folders
There, now Windows will still look nice and perform faster.

Clean Prefetch in Windows XP

This is a unique technique for Windows XP. It is well known that it is necessary to scrub registry and TEMP files for Win9X/ME/2000 periodically. Prefetch is a new and very useful technique in Windows XP. However, after using XP some time, the prefetch directory can get full of junk and obsolete links in the Prefetch catalog, which can slow down a computer noticeably.

· Open C(system drive):/windows/prefetch, delete those junk and obsolete files, reboot. It is recommended to carry out this operation on a monthly basis.

Cheers !!!

Saturday, October 25, 2008

Secure your Desktop Icons and Settings , Block Websites

Save your desktop settings and secure it from your nerdy friend by playing with the registry. Simply launch the Registry Editor; go to:


HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

In the right pane create a new DWORD Value named NoSaveSettings and modify it's value to 1. Refresh and restart for the settings to get saved.

Block websites without Software

*Browse C:\WINDOWS\system32\drivers\etc.
*Find the file named "HOSTS".
*Open it in notepad.
*Under "127.0.0.1 localhost" Add 127.0.0.2 www.abcxyz.com .
*Try accessing that site. It is no longer accessable.

For every site after that you want to block, add the entry to this file like
127.0.0.3 www.abcxyz1.com
127.0.0.4 www.abcxyz2.com
127.0.0.5 www.pqrstu.com

Enjoy !


Wednesday, October 22, 2008

What is a Rouge Program?

A Rogue Program is a program using deceptive advertising and false positives as a scare tactic to have one purchase a registered license of the software. In itself , its not harmful.

Most Rogue Programs claim that they are legitimate applications, but are typically clones of other lackluster products repackaged under new names and graphics. These programs also use highly aggressive sales tactics which include ad wares, Trojans displaying fake security alerts, or claiming that they have won awards from major publications and companies. These types of programs are either deliberately deceptive or displaying numerous false security alerts in order to convince one to purchase their software. The most important thing to the developers of Rogue software, is to sell as many copies as they can. That means that the people, or affiliates, who are selling this software can do so by any means. This ultimately leads to deceptive advertising and the use of malware to sell the software.

A common approach by Rogue programs is to display either fake results or exaggerated results when the program scans the computer. When the scan is finished, the user will be shown a list of legitimate files and Windows Registry keys that are flagged as security threats. In some cases, the Rogue programs actually create the files and Windows Registry keys on the computer so that they can be detected as malware. In order to remove these threats, the user is prompted to purchase a license of the software. These fraudulent tactics are used to scare and make one to purchase that software. Now it should be noted that there is nothing wrong with a program requiring you to purchase it before it will remove any infections. It is wrong, though, to display false information to scare you into doing it.

Another common tactic used by Rogues is to advertise, or even directly install itself, through the use of malware. Rogues programs are typically introduced in the computer when a person visits pornographic or sites that offer copyrighted content. In some cases it will be infected by just visiting these site, depending on what security updates are installed, and in other cases an executable is run. Either way, the computer will have malware installed that displays fake security alerts saying that it has got some security risk and must install a piece of software, the Rogue, to remove it.

A list of some of the Rouge Softwares can be found here.

Friday, October 17, 2008

USB Virus : New Folder.exe

“Newfolder.exe” is one of the most cunning Virus that I have come across in recent times.It makes files try launch itself. It affects the Autorun.inf file.Of all, it doesn’t get delete neither get detected by any antivirus software in including AVG, Avast, NOD32, Bit Defender, PC cilin. But EZ or Etrust Or CA antivirus delete it clean, I guess. Quick Heal Security 2008 is also a good option and I prefer using that.

Well there is another tool to delete these two buggers.I have not used this but some my friends say its a good one. Download this tool SmartAV and run it to find USB virus and ‘autorun.inf’. This tool has been designed specially for USB virus. Even you have firewall for USB and it tells you if any unauthorized access happens.

If you do not want to use any antivirus or any tool then simply do perform these steps.
1. Search for Autorun.inf/autorun.inf file in whole computer.
2.Open all the files in notepad one by one.
3.Delete all the contents inside.
4.Save the file, exit and restart the Windows.

This has worked for me, hope it will for you too ! Enjoy.

Funny UST scandal AVI virus

This Funny UST scandal AVI virus is really very irritating. It keeps pestering everytime one send instant messages via Yahoo Messenger. It is really shocking to see the cursor automatically buzzing almost all Yahoo Messenger buddies and sending messages that say "tropen dis ganda nakakatawa". Worse situation, the current status message even displays : "sino gusto funny ust scandal pm nio ko".

Deleting all funny Funny UST scandal.avi files doesn't work. Thankfully, I was able to download the Funny UST Scandal Avi.exe Remover, a Funny UST Scandal Virus Removal Tool.

If you want to remove that Funny UST scandal virus in your PC, just follows these steps.

  1. Download the Funny UST Scandal Avi.Exe Remover zip.
  2. Double click remover.exe and
  3. Click on the "patayin ang tangahing virus button".
This will automatically eliminate the Funny UST scandal AVI virus from your PC.



Thursday, May 22, 2008

a date with the past

A date with the past... Well this isn't a date with my ex girlfriend or something like that. Its a small visit to a place where I have spent the most memorable part of my life.Four years , a major part of my life in which I enjoyed the most .. For those who are still wondering, I went to MANIPAL. The place where I completed my Engineering. First of all I will like to introduce MANIPAL to all those who have never heard of Manipal before or heard and never been there.

Manipal is in true sense a cosmopolis, a unique blend of people from all over the globe. Blessed by the beauty of nature, you will find here a hep culture.It is close to the hearts of all those who have spent some time here. For those who have studied here, it is paradise.End point, KC,Timmy's, Deva's the unforgettable spots in Manipal. Kapu,Malpe,turtle ..the fabulous beaches nearby..

So, now coming to my date.My journey started last friday. There was no plan as such. On Friday morning my room mate, Brajesh told that we are going out of Bangalore for a change. I asked "where?".He said, not decided. Will leave in evening." I said "ok", as we are used to this kind of sudden plans and all.

Throught the night we(me ,Amit and Brajesh) had all the chat about our college life and our present life.We discussed our future too.our bus had some trouble in between and we reached late from the scheduled time.We reached there at around 0830 hrs on Saturday. After sometime we were in shanthala having our tea and smoke. I remembered the not very old days at shanthla.
it used to be our adda when we were here.

In the evening , we went to Turtle beach with loads of beer.It was a nice feeling being there after such a long time.Every one was lost in their good old days. Full moon light on a beach with loads of beer and lots of smoke.... woow !! We boozed..we smoked..we argued..some one was fighting over some topic too !!haha.

We returned back at around 2 in the night after having late night dinner at Karavali (remember?) .. when our beer was over ..obviously..So over all it was a good experience to get back to your not too olden or say golden days.

Next morning , I went to all those places where I used to spent times .. FP, End point, shack poin,Greens,Baliga, Vijaya, 10 th block,9 th block, all the blocks... I was completely lost and felt amazing..wen i remebered all those things associated with those places.I cant put my feelings in words..

Most of the things in college has changed.. and of course its better than we had in our times.


I have no more words to put my feelings..so i think I should stop here.