Pages

123

February 24, 2012

:: Android 4.0 Ice Cream Sandwich ::

ASUS Transformer ICS 4.0 Update
Android 4.0 Honeycomb v.9.2.1.11 update rolling out now for the Transformer TF101
ASUS prides itself on not only delivering the best products but also continuously improving the experience with regular firmware updates.
If you have an Eee Pad Transformer TF101 then you’ve waited patiently for the promised Android 4.0 Ice Cream Sandwich update and we are excited to announce that the first wave of updates for TF101 firmware v.9.2.1.11 started today in Taiwan.
The update will start to roll out across more regions as the week progresses with the US following on 2/24.

You can check out the gallery above for what’s new for Ice Cream Sandwich on the Transformer TF101. Here’s a run down of some of the key updates:
  • Create folders in the Home Screen
  • Quick launch of the camera from lock screen
  • Additional screen capture method
  • Additional browser functions
  • Special camera effects and photo editing
  • Swipe to close tasks or notifications
  • Font size modification
  • Other minor user interface changes
EnjOy.-))
MamoOn.

February 22, 2012

:: How Computer Virus Works ::



How Computer Virus Works



Strange as it may sound, the computer virus is something of an Information Age marvel. On one hand, viruses show us how vulnerable we are -- a properly engineered virus can have a devastating effect, disrupting productivity and doing billions of dollars in damages. On the other hand, they show us how sophisticated and interconnected human beings have become.

For example, experts estimate that the Mydoom worm infected approximately a quarter-million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. The ILOVEYOU virus in 2000 had a similarly devastating effect. In January 2007, a worm called Storm appeared -- by October, experts believed up to 50 million computers were infected. That's pretty impressive when you consider that many viruses are incredibly simple.

­­When you listen to the news, you hear about many different forms of electronic infection. The most common are:

•Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by
attaching to other programs) or wreak havoc.

•E-mail viruses - An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software [source: Johnson].

•Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.

•Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.


Virus Origins

Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person.

Unlike a cell, a virus has no way to reproduce by itself. Instead, a biological virus must inject its DNA into a cell. The viral DNA then uses the cell's existing machinery to reproduce itself. In some cases, the cell fills with new viral particles until it bursts, releasing the virus. In other cases, the new virus particles bud off the cell one at a time, and the cell remains alive.

A computer virus shares some of these traits. A computer virus must piggyback on top of some other program or document in order to launch. Once it is running, it can infect other programs or documents. Obviously, the analogy between computer and biological viruses stretches things a bit, but there are enough similarities that the name sticks.

People write computer viruses. A person has to write the code, test it to make sure it spreads properly and then release it. A person also designs the virus's attack phase, whether it's a silly message or the destruction of a hard disk. Why do they do it?

There are at least three reasons. The first is the same psychology that drives vandals and arsonists. Why would someone want to break a window on someone's car, paint signs on buildings or burn down a beautiful forest? For some people, that seems to be a thrill. If that sort of person knows computer programming, then he or she may funnel energy into the creation of destructive viruses.

The second reason has to do with the thrill of watching things blow up. Some people have a fascination with things like explosions and car wrecks. When you were growing up, there might have been a kid in your neighborhood who learned how to make gunpowder. And that kid probably built bigger and bigger bombs until he either got bored or did some serious damage to himself. Creating a virus is a little like that -- it creates a bomb inside a computer, and the more computers that get infected the more "fun" the explosion.

The third reason involves bragging rights, or the thrill of doing it. Sort of like Mount Everest -- the mountain is there, so someone is compelled to climb it. If you are a certain type of programmer who sees a security hole that could be exploited, you might simply be compelled to exploit the hole yourself before someone else beats you to it.

Of course, most virus creators seem to miss the point that they cause real damage to real people with their creations. Destroying everything on a person's hard disk is real damage. Forcing a large company to waste thousands of hours cleaning up after a virus is real damage. Even a silly message is real damage because someone has to waste time getting rid of it. For this reason, the legal system is getting much harsher in punishing the people who create viruses.


Virus History

Traditional computer viruses were first widely seen in the late 1980s, and they came about because of several factors. The first factor was the spread of personal computers (PCs). Prior to the 1980s, home computers were nearly non-existent or they were toys. Real computers were rare, and they were locked away for use by "experts." During the 1980s, real computers started to spread to businesses and homes because of the popularity of the IBM PC (released in 1982) and the Apple Macintosh (released in 1984). By the late 1980s, PCs were widespread in businesses, homes and college campuses.

The second factor was the use of computer bulletin boards. People could dial up a bulletin board with a modem and download programs of all types. Games were extremely popular, and so were simple word processors, spreadsheets and other productivity software. Bulletin boards led to the precursor of the virus known as the Trojan horse. A Trojan horse is a program with a cool-sounding name and description. So you download it. When you run the program, however, it does something uncool like erasing your disk. You think you are getting a neat game, but it wipes out your system. Trojan horses only hit a small number of people because they are quickly discovered, the infected programs are removed and word of the danger spreads among users.

The third factor that led to the creation of viruses was the floppy disk. In the 1980s, programs were small, and you could fit the entire operating system, a few programs and some documents onto a floppy disk or two. Many computers did not have hard disks, so when you turned on your machine it would load the operating system and everything else from the floppy disk. Virus authors took advantage of this to create the first self-replicating programs.

Early viruses were pieces of code attached to a common program like a popular game or a popular word processor. A person might download an infected game from a bulletin board and run it. A virus like this is a small piece of code embedded in a larger, legitimate program. When the user runs the legitimate program, the virus loads itself into memory­ and looks around to see if it can find any other programs on the disk. If it can find one, it modifies the program to add the virus's code into the program. Then the virus launches the "real program." The user really has no way to know that the virus ever ran. Unfortunately, the virus has now reproduced itself, so two programs are infected. The next time the user launches either of those programs, they infect other programs, and the cycle continues.

If one of the infected programs is given to another person on a floppy disk, or if it is uploaded to a bulletin board, then other programs get infected. This is how the virus spreads.

The spreading part is the infection phase of the virus. Viruses wouldn't be so violently despised if all they did was replicate themselves. Most viruses also have a destructive attack phase where they do damage. Some sort of trigger will activate the attack phase, and the virus will then do something -- anything from printing a silly message on the screen to erasing all of your data. The trigger might be a specific date, the number of times the virus has been replicated or something similar.


Virus Evolution

As virus creators became more sophisticated, they learned new tricks. One important trick was the ability to load viruses into memory so they could keep running in the background as long as the computer remained on. This gave viruses a much more effective way to replicate themselves. Another trick was the ability to infect the boot sector on floppy disks and hard disks. The boot sector is a small program that is the first part of the operating system that the computer loads. It contains a tiny program that tells the computer how to load the rest of the operating system. By putting its code in the boot sector, a virus can guarantee it is executed. It can load itself into memory immediately and run whenever the computer is on. Boot sector viruses can infect the boot sector of any floppy disk inserted in the machine, and on college campuses, where lots of people share machines, they could spread like wildfire.

In general, neither executable nor boot sector viruses are very threatening any longer. The first reason for the decline has been the huge size of today's programs. Nearly every program you buy today comes on a compact disc. Compact discs (CDs) cannot be modified, and that makes viral infection of a CD unlikely, unless the manufacturer permits a virus to be burned onto the CD during production. The programs are so big that the only easy way to move them around is to buy the CD. People certainly can't carry applications around on floppy disks like they did in the 1980s, when floppies full of programs were traded like baseball cards. Boot sector viruses have also declined because operating systems now protect the boot sector.

Infection from boot sector viruses and executable viruses is still possible. Even so, it is a lot harder, and these viruses don't spread nearly as quickly as they once did. Call it "shrinking habitat," if you want to use a biological analogy. The environment of floppy disks, small programs and weak operating systems made these viruses possible in the 1980s, but that environmental niche has been largely eliminated by huge executables, unchangeable CDs and better operating system safeguards.


Other Threats

Viruses and worms get a lot of publicity, but they aren't the only threats to your computer's health. Malware is just another name for software that has an evil intent. Here are some common types of malware and what they might do to your infected computer:

•Adware puts ads up on your screen.
•Spyware collects personal information about you, like your passwords or other information you type into your computer.
•Hijackers turn your machine into a zombie computer.
•Dialers force your computer to make phone calls. For example, one might call toll 900-numbers and run up your phone bill, while boosting revenue for the owners of the 900-numbers. [source: Baratz and McLaughlin]


E-mail Viruses

Virus authors adapted to the changing computing environment by creating the e-mail virus. For example, the Melissa virus in March 1999 was spectacular. Melissa spread in Microsoft Word documents sent via e-mail, and it worked like this:

Someone created the virus as a Word document and uploaded it to an Internet newsgroup. Anyone who downloaded the document and opened it would trigger the virus. The virus would then send the document (and therefore itself) in an e-mail message to the first 50 people in the person's address book. The e-mail message contained a friendly note that included the person's name, so the recipient would open the document, thinking it was harmless. The virus would then create 50 new messages from the recipient's machine. At that rate, the Melissa virus quickly became the fastest-spreading virus anyone had seen at the time. As mentioned earlier, it forced a number of large companies to shut down their e-mail systems.

The ILOVEYOU virus, which appeared on May 4, 2000, was even simpler. It contained a piece of code as an attachment. People who double-clicked on the attachment launched the code. It then sent copies of itself to everyone in the victim's address book and started corrupting files on the victim's machine. This is as simple as a virus can get. It is really more of a Trojan horse distributed by e-mail than it is a virus.

The Melissa virus took advantage of the programming language built into Microsoft Word called VBA, or Visual Basic for Applications. It is a complete programming language and it can be programmed to do things like modify files and send e-mail messages. It also has a useful but dangerous auto-execute feature. A programmer can insert a program into a document that runs instantly whenever the document is opened. This is how the Melissa virus was programmed. Anyone who opened a document infected with Melissa would immediately activate the virus. It would send the 50 e-mails, and then infect a central file called NORMAL.DOT so that any file saved later would also contain the virus. It created a huge mess.

Microsoft applications have a feature called Macro Virus Protection built into them to prevent this sort of virus. With Macro Virus Protection turned on (the default option is ON), the auto-execute feature is disabled. So when a document tries to auto-execute viral code, a dialog pops up warning the user. Unfortunately, many people don't know what macros or macro viruses are, and when they see the dialog they ignore it, so the virus runs anyway. Many other people turn off the protection mechanism. So the Melissa virus spread despite the safeguards in place to prevent it.

In the case of the ILOVEYOU virus, the whole thing was human-powered. If a person double-clicked on the program that came as an attachment, then the program ran and did its thing. What fueled this virus was the human willingness to double-click on the executable.


Phishing and Social Engineering

While you may be taking steps to protect your computer from becoming infected by a virus, you may very well run into another, more insidious type of attack. Phishing and other social engineering attacks have been on the rise. Social engineering is a fancy term for someone trying to get you to give up your personal information -- online or in person -- so they can use it to steal from you. Anti-spam traps may catch e-mail messages coming from phishers, but the U.S. Computer Emergency Readiness Team says the best way for you to beat them at their own game is to be wary. And never give out your personal or financial information online.


Worms

A worm is a computer program that has the ability to copy itself from machine to machine. Worms use up computer time and network bandwidth when they replicate, and often carry payloads that do considerable damage. A worm called Code Red made huge headlines in 2001. Experts predicted that this worm could clog the Internet so effectively that things would completely grind to a halt.

A worm usually exploits some sort of security hole in a piece of software or the operating system. For example, the Slammer worm (which caused mayhem in January 2003) exploited a hole in Microsoft's SQL server. "Wired" magazine took a fascinating look inside Slammer's tiny (376 byte) program.

Worms normally move around and infect other machines through computer networks. Using a network, a worm can expand from a single copy incredibly quickly. The Code Red worm replicated itself more than 250,000 times in approximately nine hours on July 19, 2001 [Source: Rhodes].

The Code Red worm slowed down Internet traffic when it began to replicate itself, but not nearly as badly as predicted. Each copy of the worm scanned the Internet for Windows NT or Windows 2000 servers that did not have the Microsoft security patch installed. Each time it found an unsecured server, the worm copied itself to that server. The new copy then scanned for other servers to infect. Depending on the number of unsecured servers, a worm could conceivably create hundreds of thousands of copies.

The Code Red worm had instructions to do three things:

•Replicate itself for the first 20 days of each month
•Replace Web pages on infected servers with a page featuring the message "Hacked by Chinese"
•Launch a concerted attack on the White House Web site in an attempt to overwhelm it [Source: eEye Digital Security]
Upon successful infection, Code Red would wait for the appointed hour and connect to the www.whitehouse.gov domain. This attack would consist of the infected systems simultaneously sending 100 connections to port 80 of www.whitehouse.gov (198.137.240.91).

The U.S. government changed the IP address of www.whitehouse.gov to circumvent that particular threat from the worm and issued a general warning about the worm, advising users of Windows NT or Windows 2000 Web servers to make sure they installed the security patch. .

A worm called Storm, which showed up in 2007, immediately started making a name for itself. Storm uses social engineering techniques to trick users into loading the worm on their computers. So far, it's working -- experts believe between one million and 50 million computers have been infected [source: Schneier].

When the worm is launched, it opens a back door into the computer, adds the infected machine to a botnet and installs code that hides itself. The botnets are small peer-to-peer groups rather than a larger, more easily identified network. Experts think the people controlling Storm rent out their micro-botnets to deliver spam or adware, or for denial-of-service attacks on Web sites.


Reported Viruses

According to a report by Symantec published in September 2007, the company received more than 212,000 reports of viruses, worms and other threats during the first half of 2007, a 185% increase over the second half of 2006.
How to Protect Your Computer from Viruses


An Anti-virus Virus?

As we've discussed, worms attack known vulnerabilities in computer operating systems. Someone came up with the idea of turning worm tech around and created a variation of the MSBlast worm that would automatically patch the hole in the operating system and send itself out to other computers to do the same. Sounds like a good idea, right? Not so fast. MSBlast.D, Nachi or Welchia, as it was known, turned out to be more trouble than good. As it multiplied and scanned corporate networks for the vulnerability, it clogged network traffic[source: Lemos].


You can protect yourself against viruses with a few simple steps:

•If you are truly worried about traditional (as opposed to e-mail) viruses, you should be running a more secure operating system like UNIX. You never hear about viruses on these operating systems because the security features keep viruses (and unwanted human visitors) away from your hard disk.

•If you are using an unsecured operating system, then buying virus protection software is a
nice safeguard.

•If you simply avoid programs from unknown sources (like the Internet), and instead stick with commercial software purchased on CDs, you eliminate almost all of the risk from traditional viruses.

•You should make sure that Macro Virus Protection is enabled in all Microsoft applications, and you should NEVER run macros in a document unless you know what they do. There is seldom a good reason to add macros to a document, so avoiding all macros is a great policy.

•You should never double-click on an e-mail attachment that contains an executable. Attachments that come in as Word files (.DOC), spreadsheets (.XLS), images (.GIF), etc., are data files and they can do no damage (noting the macro virus problem in Word and Excel documents mentioned above). However, some viruses can now come in through .JPG graphic file attachments. A file with an extension like EXE, COM or VBS is an executable, and an executable can do any sort of damage it wants. Once you run it, you have given it permission to do anything on your machine. The only defense is never to run executables that arrive via e-mail.

I hope this article help you alot understand how the computer virus works and how to protect your computer against computer viruses. There is no 100% protection for computer viruses but having this knowledge will minimize the virus attack in your computer.

EnjOy.. =))
MamoOn..

::Pakistan Aeronautical Complex manufactures affordable tablets for students & techies! [Specs and Details]::


Pakistan Aeronautical Complex manufactures affordable tablets for students & techies! [Specs and Details]

Recently news spread around like fire that Pakistan Aeronautical Complex (PAC) KAMRA is developing some Tablets. Pakistan Aeronautical Complex is mostly known for making State of the art [citation needed] Fighter Aircrafts. Hats Off to PAKISTAN AIR FORCE!! This is first time ever that any of armed forces factories has come up with a plan to jump into this field and it’s like a leap of faith for them. With Apple and different Android and Windows Phones already around techies and students of Pakistan it will be hard for them to do it.




PAC has done alliance with a company named INNAVTEK International (H.K.) for designing and manufacturing of its first three products. Two of them are Tablets with different specs and third is the Note Book. Products are available for sale via their website. The Android based tablets, which from looking at pictures seems to be enough capable as Galaxy Tabs of Samsung of HTC Flyer are, but they have a huge market to cover and they have to make their product worthy to get attention of people.

Why PAC PAD 1 is for you?


* Professional grade performance
* Vibrant crisp color display
* Unrestrained web browsing and downloading
* Full computing power in a tablet format
* Multitouch capacitive screen
* 7 inch LCD display with full HD resolution

Price: PKR 15,500



Product Specifications:












Why PAC eBOOK 1 is for you?

* Carry your personal library everywhere
* Reduce the amount of books using trees contributing to the green factor
* Manage your timetable and meetings with a robust planner
* Entertainment and work at your disposal
* Built-in Li-ion battery providing more than 5 hours of usage time
* 7” Panel with a resolution of 800×480 and 262 colors

Price: PKR 8,500



Products Specifications:





Why PAC nBOOK 1 is for you?

* Best computing power to have in bag with 1.6GHz Atom processor and 1 GB RAM
* Portable, powerful, reliable and affordable
* 1920x 1080 screen resolution with HDMI output supported
* 4 hours battery time
* internet access via gigabit Ethernet and WiFi 802.11 b/g
* best choice for students and professionals
* install operating system of your choice
* professional grade performance
* 1 megapixel webcam for video chat and video recording

Price: PKR 23,500



Products Specifications:





Products are now Available, For place your orders click here
Contact for inquiries or purchase of Product:



Marketing Executive

Fahd Chishty
Cell: +92 300 9579 776
Email: sales@cpmc.pk

Display Centers:

KAMRA

PAC Commissary, ARF PAC Kamra

RAWALPINDI:

Phone: +92 (51) 5110 007

Outlet # 1 Outlet # 2

Shop No. 15, Singapore Plaza, Shop No. 16, Singapore Plaza,
Bank Road, Saddar, Rawalpindi Bank Road, Saddar, Rawalpindi

Outlet # 3 Outlet # 4

Shop No. 4, Paris Plaza, Shop No. 21, Paris Plaza,
Commercial Market, Rawalpindi Commercial Market, Rawalpindi



EnjOy..=))
MamoOn..

February 17, 2012

Having trouble in installing the drivers? Try this one DriverPack Solutions..!!!

Having trouble in installing the drivers? Try this one DriverPack Solutions..!!!


Having trouble in installing the drivers for your personal computer or laptop...??

Try DriverPack Solutions.DriverPack Solution is the most popular program for automated driver installation. It has a lot of new features and is optimized for all platforms (x32-x64). The program will install drivers on any computer...!

The main features are as under.
1. Fast installation of Windows drivers
DriverPack Solution is the most popular program for automated drivers installation. DriverPack Solution has more than 9,000,000 users all over the world.
2. Any driver for any computer in one program
DriverPack Solution simplifies the process of reinstalling Windows on any computer. No more problems of searching and installing drivers. Everything will be done in couple of mouse clicks.
3. Free distribution
DriverPack Solution is open source software and it’s distributed freely under the GNU GPL license. This means everyone can customize the program making it even better!

Download it Here...!!!

If you like this post kindly Like it...!!!!
It will take your 5-6 seconds...!!!

EnjOy..=))
MamoOn..

February 16, 2012

:: CRACK INTERNET DOWNLOAD MANAGER (IDM) MANUALLY ::

Hello Guys, Today I am going to post and explain about this techniques that how to crack a manually any latest version of Internet Download Manager (IDM)…No need of any keygen,any crack, download idm from official website and crack it manually. By Using these steps you can crack idm without any registration. Follow the following steps to crack IDM…



STEP BY STEP GUIDE TO CRACK IDM :

  • Step # 1
Download IDM from its official website www.internetdownloadmanager.com and if you already install IDM then do it update by going to help and then click on “chek for updates”.
  • Step # 2
Now open you c drive, and then open windows folder, open system32 folder, now open drivers folder and now open etc folder and click on hosts file….or open hosts file in notepad. Path –> C:\Windows\System32\drivers\etc.
  • Step # 3
Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now u will be able to edit the hosts file and save changes in it.
Note : It is not allowed to make changes in hosts file in Windows 7…So for windows 7 users, the soloution is given below.

For Windows 7 Users

For Windows 7 users, due to security reasons you will not be able to save hosts file.so follow this steps :
  • First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file. 
  • Now right click on hosts file and go to its properties then go to Security tab select Users under Group or user names and click on edit button,Permission For Host Window will get open.
  • In that window select Users account and grant permission in bellow section which is “Permission for SYSTEM” by clicking all checkbox under “Allow” Name and press Ok.Dnt click on any Deny check box. 
  • Otherwise the best option is copy this hosts file to desktop and delete it from etc folder…Now edit hosts file(which copied on desktop)…Make changes according to next step, now again do it copy to etc folder.. 
  • Step # 4
Now,at the end of the host file copy and paste the below codes :
127.0.0.1 tonec.com
127.0.0.1 www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
127.0.0.1 mirror2.internetdownloadmanager.com

Now hosts file will look like this :

  
After adding these piece of code, save the notepad file. And exit from there. 
  • Step # 5
Now open IDM and click on Registration. When you click on registration, Now a new dialog(window) appears that is asking for Name, Last Name, Email Address and Serial Key. 
  • Step # 6
Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:
  1. HUDWE-UO689-6D27B-YM28M 
  2. UK3DV-E0MNW-MLQYX-GENA1 
  3. 398ND-QNAGY-CMMZU-ZPI39
  • Step #7
After you click ok, it will show an message that you have registered IDM successfully.
Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire.
That means it will remain full version for life time and you can update it without any problem in future.

That's All Enjoy guys..... :))
MamoOn...

February 09, 2012

:: Windows XP Home Edition: gpedit.msc (group policy) editing via registry ::


Windows XP Home Edition: gpedit.msc (group policy) editing via registry

It is possible to install gpedit.msc snap-in for MMC in Windows XP Home Edition. I found the list of necessary files on pagesperso-orange.fr (in French), which also had the archive of all the necessary (again, French) files and the installation batch-file.
Warning: you proceed at your own risk. If you do not know what you are doing – please don’t :)
Download (original) French gpedit-pour-xp-home.zip.
Download English gpedit for windows xp home.zip (also in 7zip archive).
Here are instructions for manual MMC snap-in installation. Original French-version archive had a batch file which does installation automatically, which I also added to the English archive (gpedinst.bat). But you must manually verify that batch file fits your system before running it! It might be safer to follow the instructions manually.
  • Put these files:
    appmgmts.dll
    appmgr.dll
    fde.dll
    fdeploy.dll
    gpedit.msc
    gpedit.dll
    gptext.dll
    into %SystemRoot%\system32 folder (most often it’s just c:\windows\system32)
  • put these files:
    system.adm
    inetres.adm
    conf.adm
    into %SystemRoot%\system32\GroupPolicy\ADM\ (create if this folder doesn’t exist)
  • finally, run these commands one by one in the CMD window:
    regsvr32 gpedit.dll
    regsvr32 fde.dll
    regsvr32 gptext.dll
    regsvr32 appmgr.dll
    regsvr32 fdeploy.dll
That should make gpedit.msc callable as Start -> Run -> gpedit.msc.
Other language versions of the necessary files can be retrieved from corresponding-language installations of WinXP Professional; English version can also be downloaded directly from Microsoft website ( e.g. here , or search for “Group Policy ADM Files” at microsoft.com). Also, you can extract necessary files from available Windows distributions: just don’t forget, that “filename.dl_” is a compressed version of “filename.dll”, and can be uncompressed by using XP-bundled extract command.

Geeks corner:
  1. a comprehensive list of the “Group Policy/User Configuration/Administrative Templates” settings in Windows XP Home Edition
  2. an extremely comprehensive Excel sheet, which maps numerous *.adm-file options to their registry equivalents – Group Policy Settings Reference (PolicySettings.xls). This file is for Windows 2000, Windows XP, and Windows 2003
Disclaimer: I do not know if modifying (e.g. by adding gpedit) your WinXP HE is a violation of any EULAs. It’s your own responsibility to check this out and comply with any such regulations. Also, be advised that modifying any settings using gpedit.msc on WinXP HE may render some parts of the OS inoperable (in my opinion). You have been warned!

EnjOy.. =)
MamoOn..

February 07, 2012

:: Total Video Converter 3.71 HD For Free + Serial key ::

Total Video Converter 3.71 HD For Free + serial key


 

E.M. Total Video Converter is a piece of extremely powerful and full-featured converter software that supports almost all video and audio  formats. The software is designed to convert video for your mobile video player as 3gp, mp4, PSP, PS3, iPod, iPhone etc and also VCD or DVD player, XBOX360.

New Total Video Converter 3.7 lets you experience Unparalleled High-Definition movie. It is the best and unique software today with incomparable support for converting and burning video to AVCHD disc which can work on PS3 and Blu-ray player. Meanwhile, it supports for converting and burning video to HD formats like H.264 TS, Mpeg-2 TS, WMV-HD, MKV-HD, DivX-HD, Divx-HD, MOV-HD, FLV-HD and MP4-HD.

E.M. Total Video Converter V3.71 New Features (update version):
  1. Integrate into Windows Explorer with context menu.
  2. Add a brand new Skin.
  3. Fully support Windows 7.

Total Video Converter supports reading the following file formats: 

Video Formats:

Convert from Real Video Rmvb (.rm,.rmvb)  
Convert from MPEG4 (.mp4)  
Convert from 3gp (.3gp, 3g2)  
Convert from Game Psp (.psp)
Convert from MPEG1 (.mpg, mpeg)  
Convert from MPEG2 PS (.mpg, mpeg, vob)  
Convert from MPEG2 TS (DVB Transport Stream)  
Convert from DIVX (.divx)  
Convert from Ms ASF (.asf, .wmv)  
Convert from Ms ASF (.asf, .wmv)  
Convert from Ms AVI (.avi) 
Convert from Macromedia Flash video FLV (.flv)  
Convert from Apple Quicktime (.mov)  
Convert from FLIC format (.fli, .flc)  
Convert from Gif Animation (.gif)  
Convert from DV (.dv)  
Convert from Matroska (.mkv)  
Convert from ogm (.ogm)  
Convert from Video Formats Dx9 Directshow can open
 
Audio Formats:

Convert from CD audio (.cda)  
Convert from MPEG audio (.mp3, mp2)  
Convert from Ms WAV (.wav)  
Convert from Ms WMA (.wma)  
Convert from Real Audio (.ra)  
Convert from OGG (.ogg)  
Convert from Amr audio (.amr)  
Convert from AC3 (.ac3)  
Convert from SUN AU format (.au)  
Convert from Macromedia Flash embedded audio (.swf)  
Convert from Audio Formats Dx9 Directshow can open  


Game Video Formats:

 
Technologies format, used in some games(.4xm)  
Playstation STR  
Id RoQ used in Quake III, Jedi Knight 2, other computer games  
Format used in various Interplay computer games,Interplay MVE  
Multimedia format used in Origin's Wing Commander III computer game,WC3 Movie  
Used in many Sega Saturn console games, Sega FILM/CPK  
Multimedia formats used in Westwood Studios games, Westwood Studios VQA/AUD  
Used in Quake II, Id Cinematic (.cin)  
Used in Sierra CD-ROM games, Sierra VMD  
Used in Sierra Online games, .sol files  
Electronic Arts Multimedia, Matroska  
Used in various EA games; files have extensions like WVE and UV2  
Nullsoft Video (NSV) format  

Step 1
Download Total Video Converter
Step 2
Install it on Your Computer
Step 3
Download Serial Key
Password: xpeldrockers
Step 4
Enter Serial Key & Get Registered
 
EnjOy.. :))
MamoOn..
 

February 04, 2012

::What is CAPTCHA and How it Works?::

What is CAPTCHA and How it Works?


CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.
 
Captcha
 
Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So in this post you will find a detailed information on how CAPTCHA works and why they are used.
 

What Purpose does CAPTCHA Exactly Serve?

CAPTCPA is mainly used to prevent automated software (bots) from performing actions on behalf of actual humans. For example while signing up for a new email account, you will come across a CAPTCHA at the end of the sign-up form so as to ensure that the form is filled out only by a legitimate human and not by any of the automated software or a computer bot. The main goal of CAPTCHA is to put forth a test which is simple and straight forward for any human to answer but for a computer, it is almost impossible to solve.
 

What is the Need to Create a Test that Can Tell Computers and Humans Apart?

For many the CAPTCHA may seem to be silly and annoying, but in fact it has the ability to protect systems from malicious attacks where people try to game the system. Attackers can make use of automated softwares to generate a huge quantity of requests thereby causing a high load on the target server which would degrade the quality of service of a given system, whether due to abuse or resource expenditure. This can affect millions of legitimate users and their requests. CAPTCHAs can be deployed to protect systems that are vulnerable to email spam, such as the services from Gmail, Yahoo and Hotmail.
 

Who Uses CAPTCHA?

CAPTCHAs are mainly used by websites that offer services like online polls and registration forms. For example, Web-based email services like Gmail, Yahoo and Hotmail offer free email accounts for their users. However upon each sign-up process, CAPTCHAs are used to prevent spammers from using a bot to generate hundreds of spam mail accounts.
 

Designing a CAPTCHA System

CAPTCHAs are designed on the fact that computers lack the ability that human beings have when it comes to processing visual data. It is more easily possible for humans to look at an image and pick out the patterns than a computer. This is because computers lack the real intelligence that humans have by default. CAPTCHAs are implemented by presenting users with an image which contains distorted or randomly stretched characters which only humans should be able to identify. Sometimes characters are striked out or presented with a noisy background to make it even more harder for computers to figure out the patterns.
Most, but not all, CAPTCHAs rely on a visual test. Some Websites implement a totally different CAPTCHA system to tell humans and computers apart. For example, a user is presented with 4 images in which 3 contains picture of animals and one contain a flower. The user is asked to select only those images which contain animals in them. This Turing test can easily be solved by any human, but almost impossible for a computer. 
 

Breaking the CAPTCHA

The challenge in breaking the CAPTCHA lies in real hard task of teaching a computer how to process information in a way similar to how humans think. Algorithms with artificial intelligence (AI) will have to be designed in order to make the computer think like humans when it comes to recognizing the patterns in images. However there is no universal algorithm that could pass through and break any CAPTCHA system and hence each CAPTCHA algorithm must have to be tackled individually. It might not work 100 percent of the time, but it can work often enough to be worthwhile to spammers.
EnjOy.. =))
MamoOn..

February 01, 2012

:How to Change the Logon Screen Background in Windows 7 :

How to Change the Logon Screen Background in Windows 7

Win 7 Customized Logon ScreenHow would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the logon screen background.
 
1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.
2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or 1024 x 768. You can use any of the photo editing software such as Photoshop to compress and set the resolution for your image. Once you’re done, save this image as backgroundDefault.jpg.
3. You will need to copy this image to
C:\Windows\system32\oobe\info\backgrounds
You will need to create that path if it does not already exist on your computer.
4. Now open the Registry Editor (Start -> Run -> Type regedit) and navigate to the following key
HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\
LogonUI\Background
If Background does not exist rightclick LogonUI, select New and then Key, and then name it Background. Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and select New and then DWORD and name it OEMBackground.
5. Double-click on OEMBackground and set the Value Data to 1.
6. Now log-off to see the new logon screen background. If you would like to revert back to the default background, just set the Value Data back to 0.
I hope you like this trick. Just try out and give your feedback!

EnjOy.. :))
MamoOn..

:: How to Create Your Own Customized Run Commands ::

How to Create Your Own Customized Run Commands

Run commandThe Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command

Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.
1. Right click on your Desktop and select New -> Shortcut.
2. You will see a “Create Shortcut” Dialog box as shown below

Create Shortcut

3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.
4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie”. Click on “Finish”.
5. You will see a shortcut named “ie” on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.
6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say “ff” for Firefox, “ym” for Yahoo messenger, “wmp” for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.
I hope you like this post! Pass your comments
EnjOy.. :))
MamoOn..