Sunday, October 25, 2009

Shifting from Win XP to Win 7 ?? Check this out first!!!

How to shift from XP to Windows 7


Microsoft's much-awaited operating system Windows 7 is finally here. After the disappointing performance of Vista, Microsoft is banking high on Windows 7 to give it the much required fillip in the PC market.

Two-year old Vista failed to make a dent in the market. The OS' biggest rival turned has been not an OS from a rival company or from the Open Source community, but Microsoft's own operating system XP. According to Forrester Research (done few months ago), 86 per cent of corporate PCs continue to rely on the eight-year-old Vista predecessor Windows XP.

However, most analysts believe that it is time that XP users too start planning their migration path to Windows 7. Here's a guide for XP users to help them smoothly migrate to the new operating system, Windows 7.

Which version to install?

Which version to install?

Windows 7 packs both 32-bit and 64-bit installation discs. 64-bit operating systems can handle large amounts of memory roughly 4GB RAM. However, not all computers are 64-bit capable.

To check, right click on My Computer and click Properties. If you don’t see "x64 Edition" listed, then you are running the 32-bit version of Windows XP. If "x64 Edition" is listed under System, you are running the 64-bit version of Windows XP and can run the 64-bit version of Windows 7.

How to check compatibility with your hardware

How to check compatibility with your hardware

To check for the Windows 7's compatibility with your computer's hardware, devices, or programmes that might affect the its installation, download and run the free Windows 7 Upgrade Advisor.

It will list any issues that it finds and gives recommendations on what to do before you upgrade to improve your PC's compatibility with Windows 7.

Moving files and settings

Moving files and settings

Microsoft recommends using Windows Easy Transfer, a free download, which will help users move their files and settings to another location before they install Windows 7. Later they can use Windows Easy Transfer again to move files and settings back to PC after Windows installation is completed. However, Windows Easy Transfer doesn't move programmes. Users will have to reinstall their programmes manually after Windows 7 installation is complete. Windows Easy Transfer will provide you with a list of programmes that you are currently using with Windows XP.

In case you don't go for Windows Easy Transfer, you will need to copy files manually to an external location, such as CDs, DVDs, an external hard disk, or a USB flash drive before installing Windows 7, and then move them back after Windows installation is completed.

Installing Windows 7

Installing Windows 7

To get started, connect your PC to the Internet so that you can get installation updates during the process. Select either the 32-bit or 64-bit Windows 7 installation disc, depending on your system requirements.

Enter the Windows 7 installation disc and Setup should start automatically. If it doesn't, click Start, click My Computer, open the Windows 7 installation disc on your DVD drive, and then double-click setup.exe.

On the Install Windows page, click Install now. On the 'Which type of installation do you want?' page, click Custom. Choose the partition containing Windows XP (this is often the computer's C: drive), and then click Next. (Do not select your external USB hard drive.) In the Windows.old dialog box, click OK.

Moving your files and settings back

Moving your files and settings back

After the installation is over, users can run Windows Easy Transfer again and move files and settings back to the computer.

Be sure you run Windows Easy Transfer before you reinstall your programmes. This is because Windows Easy Transfer moves your files back to where your old programmes will expect them to be when you reinstall them.

Ensure that your external hard disk or other storage device that contains Windows Easy Transfer migration file is connected to the computer. Click the Start button, click Computer, and under Hard Disk Drives, double-click your storage device. Browse to the location where you saved the Easy Transfer file, called Windows Easy Transfer - Items from old computer, and double click the file.

On the `Choose what to transfer to this computer' page, a user can decide how the user accounts from Windows XP are transferred to Windows 7.

Reinstall programmes and update drivers

Reinstall programmes and update drivers

Once your files and settings are back on your computer, you can reinstall your programmes and check for new or updated drivers.

Windows Easy Transfer provides a report detailing the programmes you used in Windows XP that you might want to reinstall. To reinstall your programmes, you need to use the installation discs or setup files.

thanks to india infotech for info !

Thursday, October 22, 2009

Computer Humour Pics .. u'll have fun !!

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Photobucket

Monday, October 19, 2009

World's First 128GB USB Drive

Posted Image

Kingston has introduced world's first 128GB USB drive. This 128GB drive joins Kingston's DataTraveler 200 series drives with 32GB and 64GB capacity. Kingston will be offering new DataTraveler 200 USB drives at $120 (Rs. 5,700 approx.) for 32GB, $213 for 64GB and whopping $546 (Rs. 26,200 approx.) for 128GB. Now seriously, one can buy a standard netbook for the price of 128GB USB drive.

Kingston's new DT200 USB drives features Password Traveler, a password protection feature for protecting critical data inside. The capless design features slide-in feature to protect the USB connector.

All new 32GB, 64GB and 128GB DT200 USB flash drives are certified for Windows Vista and enhanced for Windows ReadyBoost feature. Windows ReadyBoost is available in Windows Vista and Windows 7 to use any USB flash drive as a drive for system disk cache to improve the performance. However, it should be noted that Password Traveler won't operate properly if Windows ReadyBoost feature is in use.

Another company called EdgeTech has also come out with cheaper DiskGO 128GB USB flash drive for $390 (Rs. 18,700 approx.).

Kingston offers new DT200 USB flash drives with five years warranty and free tech support.Now you can have a massive space of 120gb in ur pockets :) ........

Tips On Google Search !! Very Useful !!

Hello guyz!!

This is an important discussion about how to search in google for different results. As we know the google is a powerful search option for all known as r best friend :yes4: , but how it work?. Here we go..

Google combines PageRank with sophisticated text-matching techniques to find pages that are both important and relevant to your search. Google tries to match your query by manipulating huge functions like how many times the term appears on the page and examines it. This makes a google a powerful search engine and user friendly.

We can search the google by using deferent operators that are defined by google.

Five Tips On Google Search

Sometimes when you search on Google you might not get the desired results or you might need to search a lot by changing the keywords you are searching for.

1. The “+” Sign : Google ignores some words like the, how and many other digits and words which actually slow down the search speed. Now if a common word is essential for you and you want google to look for it the just give a space, put the “+” sign and type in the word. By this google makes sure that, that word is actually included in the search as well. I came to knew of this as i was searching for a Book, but google was not showing the desired results, i used this technique and was able to get the details I was looking for.

2. Synonym Search with “~”(Tildy) Sign : If in case you want to search for the term as well it’s synonym, then in that case just add the “~” sign just in front of your term, you will then see the links for the same terms synonym. This can be really helpful in case you are searching for some specific results

3. Use of Keyword “OR” : In case you want the search results to show two different categories then in that case you can use the Keyword “OR”. This will make sure that you will get the results accordingly. Similarly you can also use “AND”, but in this case google will show you pages where both the parameters are met, whereas in case of keyword “OR”, any parameter that matches up, those links will be displayed.

4. Getting links of Specific Site : Sometimes you might visit a site but not able to find the links or accurate pages in that site. What do you do? Just click on links to get the specific page? Well a simple answer is search through Google. Suppose you want to search for groups site in google.com, then simple type in “groups site:google.com”. You will see op tins coming for the google groups. This is a pretty old method is very useful to get to a specific page of a site. The code for this would be “site:”

5. Search within a Range : You can search in Google within a desired range be it be Money, Weight, Age or any thing else, you just need to define the range and you will get the results you require. You need to type in the range as separated by “..”. But make sure you specify the unit as well like for money, weight, length or any thing else. Like, for Example:- TV 21..32 inches

Let us know what are the elements, functions and factors involve in the part of search.

Google Operators:
Operators are used to refine the results and to maximize the search value. They are your tools as well as ethical hackers’ weapons
Basic Operators:

+, -, ~ , ., *, “”, |,


Advanced Operators:
allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange

(+) force inclusion of something common
Google ignores common words (where, how, digit, single letters) by default:

Example: StarStar Wars Episode +I

(-) exclude a search term
Example: apple –red

(“) use quotes around a search term to search exact phrases:
Example: “Robert Masse”
Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results

(~) search synonym:
Example: ~food
Return the results about food as well as recipe, nutrition and cooking information

( . ) a single-character wildcard:
Example: m.trix
Return the results of M@trix, matrix, metrix…….

( * ) any word wildcard

Advanced Operators: “Site:”
Site: Domain_name :: Find Web pages only on the specified domain. If we search a specific site, usually we get the Web structure of the domain

Examples:
site:http://studentshangout.com
Advanced Operators: “Filetype:”

Filetype: extension_type : Find documents with specified extensions

The supported extensions are:

- HyperText Markup Language (html) - Microsoft PowerPoint (ppt)
- Adobe Portable Document Format (pdf) - Microsoft Word (doc)
- Adobe PostScript (ps) - Microsoft Works (wks, wps, wdb)
- Lotus 1-2-3 - Microsoft Excel (xls)
(wk1, wk2, wk3, wk4, wk5, wki, wks, wku) - Microsoft Write (wri)
- Lotus WordPro (lwp) - Rich Text Format (rtf)
- MacWrite (mw) - Shockwave Flash (swf)
- Text (ans, txt)

Note: We actually can search asp, php and cgi, pl files as long as it is text-compatible.

Example: Budget filetype: xls
Advanced Operators “Intitle:”

Intitle: search_term :: Find search term within the title of a Webpage

Allintitle: search_term1 search_term2 search_term3
Find multiple search terms in the Web pages with the title that includes all these words
These operators are specifically useful to find the directory lists

Example:
Find directory list: Intitle: Index.of “parent directory”


Searching google: The following are syntaxes and corresponding examples try them


Advanced Operators “Inurl:”

Find search term in a Web address
Inurl: search_term

Find multiple search terms in a Web address
Allinurl: search_term1 search_term2 search_term3

Examples:
Inurl: cgi-bin
Allinurl: cgi-bin password
Advanced Operators “Intext;”

Find search term in the text body of a document.
Intext: search_term

Find multiple search terms in the text body of a document.
Allintext: search_term1 search_term2 search_term3

Examples:
Intext: Administrator login
Allintext: Administrator login
Advanced Operators: “Cache:”

Find the old version of Website in Google cache
Cache: URL
Sometimes, even the site has already been updated, the old information might be found in cache

Examples:
Cache: http://yahoo.com

Advanced Operators:
Conduct a number range search by specifying two numbers, separated by two periods, with no spaces. Be sure to specify a unit of measure or some other indicator of what the number range represents

Examples:
Computer $500..1000
DVD player $250..350
Advanced Operators: “Daterange:”

Daterange: - :: Find the Web pages between start date and end date

Note: start_date and end date use the Julian date
The Julian date is calculated by the number of days since January 1, 4713 BC. For example, the Julian date for August 1, 2001 is 2452122

Examples:
2004.07.10=2453196
2004.08.10=2453258
Vulnerabilities date range: 2453196-2453258

Advanced Operators “Link:”

Link: URL :: Find the Web pages having a link to the specified URL

Related: URL :: Find the Web pages that are “similar” to the specified Web page

info: URL :: Present some information that Google has about that Web page

Define: search_term :: Provide a definition of the words gathered from various online sources

Examples:
Link: yahoo.com
Related: yahoo.com
Info: yahoo.com

Define: Network security - Advanced Operators “phonebook:”

rphonebook :: Search residential listings only
bphonebook :: Search business listings only
Phonebook :: Search the entire Google phonebook

Examples:
Phonebook: robert las vegas (robert in Las Vegas)
Phonebook: (702) 944-2001 (reverse search, not always work)

The phonebook is quite limited to U.S.A. But the Question rises What can Google can do for an Ethical Hacker? Search sensitive information like payroll, SIN, even the personal email box

Vulnerabilities scanner ::Transparent proxy

So how but if i tell u a different way to search
k lets do this type in the following statements n c d results
I can only provide u the guidelines, now u need to implement your Creativity to Keep it rolling. :cool:

http://yahoo.com
Salary
Salary filetype: xls site: edu

Security social insurance number
Intitle: Payroll intext: ssn filetype: xls site: edu

Security Social Insurance Number
Payroll intext: Employee intext: ssn Filetype: xls
Filetype: xls “checking account” “credit card” - intext: Application -intext:
Form (only 39 results)

Financial Information
Intitle: “Index of” finances.xls (9)

Personal Mailbox
Intitle: Index.of inurl: Inbox (inurl: User OR inurl: Mail) (220)

Confidential Files
“not for distribution” confidential (1,760)
Confidential Files
“not for distribution” confidential filetype: pdf (marketing info) (456)

OS Detection
Use the keywords of the default installation page of a Web server to search.
Use the title to search

Use the footer in a directory index page
OS Detection-Windows
“Microsoft-IIS/5.0 server at”


OS Detection - Windows
Default web page?
Intitle: “Welcome to Windows 2000 Internet Services” IIS 5.0

OS Detection –Apache 1.3.11-1.3.26
Intitle: Test.Page.for.Apache seeing.this.instead

OS Detection-Apache SSL enable
Intitle: Test.page “SSL/TLS-aware” (127)

Search Passwords
Search the well known password filenames in URL
Search the database connection files or configuration files to find a password and username
Search specific username file for a specific product

Inurl: etc inurl: passwd
Intitle: “Index of..etc” passwd
Inurl: admin.pwd filetype: pwd
Filetype: inc dbconn
Filetype: inc intext: mysql_connect
Filetype: ini +ws_ftp +pwd (get the encrypted passwords)
Filetype: log inurl: “password.log”


Search Username
+intext: "webalizer" +intext: “Total Usernames” +intext: “Usage Statistics for”

License Key
Filetype: lic lic intext: key (33) (license key)

Sensitive Directories Listing
Powerful buzz word: Index of
Search the well known vulnerable directories names

Sensitive Directories Listing
“index of cgi-bin” (3590)

Sensitive Directories Listing
Intitle: “Index of” cfide (coldfusion directory)

Sensitive Directories Listing
Intitle: index.of.winnt

Get the serial number you need ! (Works for most of the products)
1) Go to Google.

2) Use Keyword as "Product name" 94FBR

3) Where, "Product Name" is the name of the item you want to find the serial number for.

4) And voila - there you go - the serial number you needed.

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches:
Code:

"Photoshop 7"+94FBR
"Age of Mythology"+94FBR
"Nero Burning Rom 5.5"+94FBR

Final Touch:: try these keyword strings
you can search files on Rapidshare server too.

Just go to Google.com and punch “site:rapidshare.com” followed by:

“inurl:pdf” for Ebooks in PDF Format
“inurl:avi|wmv|mpg|nva” for Movies
“inurl:mp3|ogg|wma” for Audio Files
“inurl:exe” for executable application
“inurl:zip|rar|7zip|tar” for RAR, ZIP, 7ZIP or TAR compressed archieve

Examples:

If your searching for Google Earth in ZIP format, then you must search for “site:rapidshare.com inurl:googleearth” (obviously without the quotes)

Similarly if your searching for XYZ video, then it should be something like “site:rapidshare.com nurl:avi|wmv|mpg|nva XYZ”

For finding PHP scripts in web:
php.null intitle:"index of /"


String to find out private pictures directories:

Try this little code in Google, you may find lot of Non public pictures

intitle:index.of +"Indexed by Apache::Gallery"

Thursday, October 15, 2009

Trasparent Phone !!! just check it out !!!

Window Phone perception phone On one hand, clear intangible phones. This Window Phone has one striking feature - its translucent housing varies depending on the weather...!

Thus, on sunny days, the screen will be completely transparent, on a rainy day it will appear with virtual drop effect, but it is covered with frost when it is frost. I.e., transparent screen will look like as well as present a Window into a variety of weather.Don't know how it will be realistic, but atleast, very unique…!

Have a look at the Images

Posted Image

Posted Image

Posted Image

Posted Image

Posted Image

Posted Image

Kwel phone na ........

Computer viruses: description, prevention, and recovery!!

Computer viruses


INTRODUCTION

Contents:

� How to determine whether your computer is infected with a computer virus, a worm, or a trojan
� How to recover from an infection
� How to prevent future infections from a computer virus

What is a computer virus?

A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.

Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Therefore, you must never open an e-mail attachment unless you know who sent the message or unless you are expecting the e-mail attachment. Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread by using downloads on the Internet. Computer viruses can be hidden in pirated software or in other files or programs that you may download.

Symptoms of a computer virus

If you suspect or confirm that your computer is infected with a computer virus, obtain the current antivirus software. The following are some primary indicators that a computer may be infected:

� The computer runs slower than usual.
� The computer stops responding, or it locks up frequently.
� The computer crashes, and then it restarts every few minutes.
� The computer restarts on its own. Additionally, the computer does not run as usual.
� Applications on the computer do not work correctly.
� Disks or disk drives are inaccessible.
� You cannot print items correctly.
� You see unusual error messages.
� You see distorted menus and dialog boxes.
� There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension.
� An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted.
� An antivirus program cannot be installed on the computer, or the antivirus program will not run.
� New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.
� Strange sounds or music plays from the speakers unexpectedly.
� A program disappears from the computer even though you did not intentionally remove the program.

Note: These are common signs of infection. However, these signs may also be caused by hardware or software problems that have nothing to do with a computer virus. Unless you run the Microsoft Malicious Software Removal Tool, and then you install industry-standard, up-to-date antivirus software on your computer, you cannot be certain whether a computer is infected with a computer virus or not.

Symptoms of worms and trojan horse viruses in e-mail messages

When a computer virus infects e-mail messages or infects other files on a computer, you may notice the following symptoms:

� The infected file may make copies of itself. This behavior may use up all the free space on the hard disk.
� A copy of the infected file may be sent to all the addresses in an e-mail address list.
� The computer virus may reformat the hard disk. This behavior will delete files and programs.
� The computer virus may install hidden programs, such as pirated software. This pirated software may then be distributed and sold from the computer.
� The computer virus may reduce security. This could enable intruders to remotely access the computer or the network.
� You receive an e-mail message that has a strange attachment. When you open the attachment, dialog boxes appear, or a sudden degradation in system performance occurs.
� Someone tells you that they have recently received e-mail messages from you that contained attached files that you did not send. The files that are attached to the e-mail messages have extensions such as .exe, .bat, .scr, and .vbs extensions.

Symptoms that may be the result of ordinary Windows functions

A computer virus infection may cause the following problems:

� Windows does not start even though you have not made any system changes or even though you have not installed or removed any programs.
� There is frequent modem activity. If you have an external modem, you may notice the lights blinking frequently when the modem is not being used. You may be unknowingly supplying pirated software.
� Windows does not start because certain important system files are missing. Additionally, you receive an error message that lists the missing files.
� The computer sometimes starts as expected. However, at other times, the computer stops responding before the desktop icons and the taskbar appear.
� The computer runs very slowly. Additionally, the computer takes longer than expected to start.
� You receive out-of-memory error messages even though the computer has sufficient RAM.
� New programs are installed incorrectly.
� Windows spontaneously restarts unexpectedly.
� Programs that used to run stop responding frequently. Even if you remove and reinstall the programs, the issue continues to occur.
� A disk utility such as Scandisk reports multiple serious disk errors.
� A partition disappears.
� The computer always stops responding when you try to use Microsoft Office products.
� You cannot start Windows Task Manager.
� Antivirus software indicates that a computer virus is present.

How to remove a computer virus

Even for an expert, removing a computer virus can be a difficult task without the help of computer virus removal tools. Some computer viruses and other unwanted software, such as spyware, even reinstall themselves after the viruses have been detected and removed. Fortunately, by updating the computer and by using antivirus tools, you can help permanently remove unwanted software.

To remove a computer virus, follow these steps:

1. Install the latest updates from Microsoft Update on the computer.
2. Update the antivirus software on the computer. Then, perform a thorough scan of the computer by using the antivirus software.

How to protect your computer against viruses

To protect your computer against viruses, follow these steps:

1. On the computer, turn on the firewall.
2. Keep the computer operating system up-to-date.
3. Use updated antivirus software on the computer.
4. Use updated antispyware software on the computer.

Source: Microsoft :p

If u need info abt any adware, malware, dailer, worms, viruses or surveillence tools, feel free 2 ask..

Tuesday, October 13, 2009

World's Most Complicated Watch!!!

The World's Most Complicated Watch-





World's Most Complicated Watch

Company: Jaeger-LeCoultre

Price: $2,500,000
You are looking at the world’s most complicated wrist watch as of 2009. The Hybris Mechanica Grande Sonnerie from Jaeger-LeCoultre holds an impressive 26 complications in a single mechanical timepiece -- trumping the last complex watch weighing in at 25. The price of $2.5 million is somewhat misleading as the Grande Sonnerie model is not sold alone. Instead, the watch arrives as part of a set (limited to 30 sets total) of three timepieces that together represent a total of 55 complications. In addition to the Grande Sonnerie model, the Hybris Mechanica set includes the Gyrotourbillon model and the Reverso a Tryptique timepieces -- all arriving in a safe as the presentation box.



Aside from telling the time, the beautiful Jaeger-LeCoultre Hybris Mechanica Grande Sonnerie watch focuses on two major functions including the perpetual calendar and the ornate chiming functions. The Jaeger-LeCoultre caliber 182 flying tourbillon movement is massively complex with over 1,300 parts. The gongs and hammers of the Jaeger-LeCoultre Hybris Mechanica Grande Sonnerie include the ability to play the full "Carillon de Westminster" melody, a grande sonnerie, petit sonnerie, and has a minute repeater



If you are one of the 30 people who will own this timepiece, you will probably want to be careful with it. Aside from the obvious fragility of the ultra detailed movement, this is a seriously collectible timepiece. Thought $2.5 million was a lot? Wait 10 or 20 years and see what the watch is worth then. The watch itself comes in an 18k white-gold case and is 44mm wide by 15mm thick. Part of the mystique is how Jaeger-LeCoultre is able to fit everything into the case: Sapphire crystals on the front and rear of the watch provide a clear view into the surprisingly easy-to-read dial -- given everything that it does -- as well as the ornately decorated movement on the front and rear of the watch.

Amazing Pen !!!! [must see ]

Check out this amazing pen !!!!















Well , i guess u would surely like to have one ... isnt it ??