Saturday, January 31, 2009

How to fix "Windows XP could not start the following is missing or corrupt"

A corrupt registry is the usual headaches for most of the computer users. Registry is an important part of your Windows operating system, it is what we call the central space. It stores all data on your PC, then a small error can cause big
problems.

Yesterday I was called to repair a friends PC, because his PC receives an error when he tries to start Windows XP. He thinks of reformatting the PC but has chosen to call me first to seek advice. Below is the error, he receives when loading Windows XP. Luckily I was able to rescue him from formatting his PC.



Use the procedures that you can follow to be able to restore a corrupted registry, and usually start up again on Windows XP. The procedures below also applies to the following registry key errors.
  • Windows XP could not start because the following file is missing or corrupt: \ WINDOWS \ system32 \ config \ system

  • Windows XP could not start because the following file is missing or corrupt: \ WINDOWS \ system32 \ config \ software

  • Stop: c0000218 (Registry File Failure) The registry administrator can not load the hive (file): \ SystemRoot \ System32 \ Config \ SOFTWARE or its log or alternate.
Start Recovery Console

To fix registry errors, you need Windows XP Recovery Console. You can start from a Windows XP CD or boot directly to the Recovery Console.

Follow these steps to boot into Windows XP Recovery Console
  • Put your Windows XP CD-ROM drive

  • Restart your computer, make sure that your BIOS is set to boot from CD

  • When you see the "Press any key to boot from CD ..." press the space bar or any key.

  • Wait until you see the "Welcome to Setup" screen, press R to start the Recovery Console

  • Choose the Windows installation that you want to load

  • Enter password and press Enter

  • You should now be at C: \ Windows> prompt

  • Repair Copy files via Recovery Console


If your Windows installation is on another drive you replace the drive letter in the procedure below.

At the Recovery Console command prompt, type the following lines and press ENTER after each line:

md tmp
copy c: \ Windows \ system32 \ config \ system c: \ windows \ tmp \ system.bak
copy c: \ Windows \ system32 \ config \ software c: \ windows \ tmp \ software.bak
copy c: \ Windows \ system32 \ config \ sam c: \ windows \ tmp \ sam.bak
copy c: \ Windows \ system32 \ config \ security c: \ windows \ tmp \ security.bak
copy c: \ Windows \ system32 \ config \ default c: \ windows \ tmp \ default.bak

delete the C: \ Windows \ system32 \ config \ system
delete the C: \ Windows \ system32 \ config \ software
delete the C: \ Windows \ system32 \ config \ Sam
delete the C: \ Windows \ system32 \ config \ security
delete the C: \ Windows \ system32 \ config \ default

copy c: \ windows \ repair \ system c: \ Windows \ system32 \ config \ system
copy c: \ windows \ repair \ software c: \ Windows \ system32 \ config \ software
copy c: \ windows \ repair \ Sam C: \ Windows \ system32 \ config \ Sam
copy c: \ windows \ repair \ security c: \ Windows \ system32 \ config \ security
copy c: \ windows \ repair \ default c: \ Windows \ system32 \ config \ default

Quit Recovery Console by typing "exit." When the computer restarts, press F8 and then select Safe Mode

Restart in Safe Mode and a Recent Snapshot Backup

Restart the computer in Safe Mode by pressing F8 during the initial bootup and select Safe Mode. Once in Safe Mode, make sure the files and folders are visible so you can access them. Follow these instructions to achieve this.
  1. Open My Computer

  2. Click the Tools menu and then click Folder Options.

  3. Click the View tab.

  4. Under Hidden files and folders, click to select Show hidden files and folders, and then click to clear the Hide protected operating system files (Recommended) check box.

  5. Click Yes when the dialog box that confirms that you want to display these files appears.
In My Computer, double-click the drive where you installed Windows XP (usually drive C) to view a list of folders. Then double-click "System Volume Information" folder. This folder contains the system restore points stored on your computer. The folders are similar
_restore (EE42BEB8-700A-495F-8004-53D26C2E12C5)
You may receive an Access Denied error message when trying to access the System Volume Information folder.
C: \ System Volume Information is not available. Access is denied.
You received this error message because you are logged into folder that does not have permissions set on the folder. To correct this, please follow the instructions in Microsoft Knowledge Base article 309531 to access and continue.


Once you have access to snapshots, use the following instructions to copy one of the latest snapshots for Windows \ TMP folder, so you have access to it.
  1. The System Volume Information folder, click View, then click Details to display the date of each snapshot folder.

  2. Open a folder that was created at the current time, but rather before the problem began.

  3. Open Snapshot subfolder

  4. Check the following files and copy and paste them into C: \ Windows \ TMP folder
    • _REGISTRY_USER_.DEFAULT
    • _REGISTRY_MACHINE_SECURITY
    • _REGISTRY_MACHINE_SOFTWARE
    • _REGISTRY_MACHINE_SYSTEM
    • _REGISTRY_MACHINE_SAM

  5. Rename the files that you just copied into the C: \ Windows \ TMP folder.
    • Rename _REGISTRY_USER_.DEFAULT to DEFAULT
    • Rename _REGISTRY_MACHINE_SECURITY for security
    • Rename _REGISTRY_MACHINE_SOFTWARE software
    • Rename _REGISTRY_MACHINE_SYSTEM for system
    • Rename _REGISTRY_MACHINE_SAM to SAM

  6. When your done rename files, restart your computer again with the Recovery Console


Replace Repair files with a current backup of the Registry

In the Recovery Console again, type the following commands at the prompt to replace the files with a current backup. You must press ENTER after each command.

Part C: \ Windows \ system32 \ config \ Sam
Part C: \ Windows \ system32 \ config \ security
Part C: \ Windows \ system32 \ config \ software
Part C: \ Windows \ system32 \ config \ default
Part C: \ Windows \ system32 \ config \ system

copy c: \ windows \ tmp \ software c: \ Windows \ system32 \ config \ software
copy c: \ windows \ tmp \ system c: \ Windows \ system32 \ config \ system
copy c: \ windows \ tmp \ Sam C: \ Windows \ system32 \ config \ Sam
copy c: \ windows \ tmp \ security c: \ Windows \ system32 \ config \ security
copy c: \ windows \ tmp \ default c: \ Windows \ system32 \ config \ default

Once the files have been changed, type exit at the command prompt to restart Windows in Normal mode.



Using System Restore to return to a good Backup Point

Because there is more to a System Restore than just the registry files, follow these steps to restore your computer to a good backup point.
  1. Click Start, then click All Programs.

  2. Click on Accessories, then click System Tools.

  3. Click System Restore, and then click Restore to a previous restore point and finish the restore process.

Tuesday, January 27, 2009

Microsoft Internet Explorer Navigation Keyboard Shortcuts:


CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)

Microsoft Management Console (MMC) Main Window Keyboard Shortcuts:

• CTRL+O (Open a saved console)
• CTRL+N (Open a new console)
• CTRL+S (Save the open console)
• CTRL+M (Add or remove a console item)
• CTRL+W (Open a new window)
• F5 key (Update the content of all console windows)
• ALT+SPACEBAR (Display the MMC window menu)
• ALT+F4 (Close the console)
• ALT+A (Display the Action menu)
• ALT+V (Display the View menu)
• ALT+F (Display the File menu)
• ALT+O (Display the Favorites menu)


MMC Console Window Keyboard Shortcuts:

• CTRL+P (Print the current page or active pane)
• ALT+Minus sign (-) (Display the window menu for the active console window)
• SHIFT+F10 (Display the Action shortcut menu for the selected item)
• F1 key (Open the Help topic, if any, for the selected item)
• F5 key (Update the content of all console windows)
• CTRL+F10 (Maximize the active console window)
• CTRL+F5 (Restore the active console window)
• ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
• F2 key (Rename the selected item)
• CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)


Remote Desktop Connection Navigation:

• CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
• ALT+PAGE UP (Switch between programs from left to right)
• ALT+PAGE DOWN (Switch between programs from right to left)
• ALT+INSERT (Cycle through the programs in most recently used order)
• ALT+HOME (Display the Start menu)
• CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
• ALT+DELETE (Display the Windows menu)
• CTRL+ALT+Minus sign (-) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
• CTRL+ALT+Plus sign (+) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer).

Microsoft Natural Keyboard Shortcuts:


Windows Logo (Display or hide the Start menu)
• Windows Logo+BREAK (Display the System Properties dialog box)
• Windows Logo+D (Display the desktop)
• Windows Logo+M (Minimize all of the windows)
• Windows Logo+SHIFT+M (Restore the minimized windows)
• Windows Logo+E (Open My Computer)
• Windows Logo+F (Search for a file or a folder)
• CTRL+Windows Logo+F (Search for computers)
• Windows Logo+F1 (Display Windows Help)
• Windows Logo+ L (Lock the keyboard)
• Windows Logo+R (Open the Run dialog box)
• Windows Logo+U (Open Utility Manager)

Accessibility Keyboard Shortcuts:

• Right SHIFT for eight seconds (Switch FilterKeys either on or off)
• Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
• Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
• SHIFT five times (Switch the StickyKeys either on or off)
• NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
• Windows Logo +U (Open Utility Manager)


Windows Explorer Keyboard Shortcuts:

• END (Display the bottom of the active window)
• HOME (Display the top of the active window)
• NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
• NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
• NUM LOCK+Minus sign (-) (Collapse the selected folder)
• LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
• RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

Windows Keyboard Shortcuts

General Keyboard Shortcuts:

CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
• Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)

Dialog Box Keyboard Shortcuts:

CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Difference between IPv4 vs IPv6

Introduction::

IPv4 is currently the dominant Internet Protocol version, and was the first to receive widespread use.

The Internet Engineering Task Force (IETF) has designated IPv6 as the successor to version 4 for general use on the Internet. It significantly increases the size of the address space used to identify communication endpoints in the Internet, thereby allowing it to continue its tremendous growth rate.

IPv6 is also said to be IPng (IP Next Generation).

Limitations in IPv4:

Up to now we are using IPv4.
IPv4 was remarkably but in spite of that it is beginning to have problems. Most importantly, there is a growing shortage of IPv4 addresses, which are needed by all new machines added to the Internet.

The limited address range forces organizations to use Network Address Translation (NAT) firewalls to map multiple private addresses to a single public IP address.NATs does not support standards-based network-layer security and also creates complicated barriers to VoIP, and other services.

Security was also an issue for IPv4. Although there are lots of ways of encrypting IPv4 traffic, such as using the IPSec protocol, but unfortunately all of the IPv4 encryption methods are proprietary and no real standard encryption methods exist.

IPv6 Features:

The IPv6 header has a new header format that is designed to minimize header overhead. This optimization is achieved by moving both non-essential fields and optional fields to extension headers that appear after the IPv6 header. Intermediate routes can process the streamlined IPv6 header more efficiently. IPv4 headers and IPv6 headers do not interoperate. IPv6 is not a superset of functionality, that is backward compatible with IPv4 is not possible. A host or router must use an implementation of both IPv4 and IPv6 to recognize and process both header formats. The IPv6 header is only twice as large as the IPv4 header, even though IPv6 addresses are four times as large as IPv4 addresses.


  • IPv6 features a larger address space than that of IPv4.
  • IPv6 offers a higher level of built-in security, and it has been specifically designed with mobile devices in mind.
  • Unlike mobile IPv4, Mobile IPv6 (MIPv6) avoids triangular routing and is therefore as efficient as normal IPv6.
  • IPv6 can easily be extended by adding extension headers after the IPv6 header.
  • IPv4 limits packets to 64 KB of payload. IPv6 has optional support for packets over this limit, referred to as jumbograms, which can be as large as 4 GB.
  • The use of jumbograms may improve performance over high-MTU networks. The presence of jumbograms is indicated by the Jumbo Payload Option header
  • IPv6 also includes standardized support for QoS.
Difference Between IPv4 and IPv6

IPv4

  • Source and destination addresses are 32 bits (4 bytes) in length.
  • IPSec support is optional.
  • IPv4 header does not identify packet flow for QoS handling by routers.
  • Both routers and the sending host fragment packets.
  • Header includes a checksum.
  • Header includes options.
  • Address Resolution Protocol (ARP) uses broadcast ARP Request frames to resolve an IP address to a link-layer address.
  • Internet Group Management Protocol (IGMP) manages membership in local subnet groups.
  • ICMP Router Discovery is used to determine the IPv4 address of the best default gateway, and it is optional.
  • Broadcast addresses are used to send traffic to all nodes on a subnet.
  • Must be configured either manually or through DHCP.
  • Uses host address (A) resource records in Domain Name System (DNS) to map host names to IPv4 addresses.
  • Uses pointer (PTR) resource records in the IN-ADDR.ARPA DNS domain to map IPv4 addresses to host names.
  • Must support a 576-byte packet size.
IPv6

  • Source and destination addresses are 128 bits (16 bytes) in length.
  • IPSec support is required.
  • IPv6 header contains Flow Label field, which identifies packet flow for QoS handling by router.
  • Only the sending host fragments packets; routers do not.
  • Header does not include a checksum.
  • All optional data is moved to IPv6 extension headers.
  • Multicast Neighbor Solicitation messages resolve IP addresses to link-layer addresses.
  • Multicast Listener Discovery (MLD) messages manage membership in local subnet groups.
  • ICMPv6 Router Solicitation and Router Advertisement messages are used to determine the IP address of the best default gateway, and they are required.
  • IPv6 uses a link-local scope all-nodes multicast address.
  • Does not require manual configuration or DHCP.
  • Uses host address (AAAA) resource records in DNS to map host names to IPv6 addresses.
  • Uses pointer (PTR) resource records in the IP6.ARPA DNS domain to map IPv6 addresses to host names.
  • Must support a 1280-byte packet size .


Monday, January 26, 2009

About Intel Core i7 i7-965 Processor

Intel Core i7 i7-965 Processor

Intel Core i7 i7-965 Processor

(3.2GHz, 4x1MB, 6.4GT/s QPI, LGA1366 Socket B - MPN: BX80601965)
Price Range: $1,019.99 - $1,122.67 from 10 Sellers
Description: The Intel Core i7 processor features a 4-core, 8 software thread design with Intel Hyper-Threading Technology. Combined with Intel Turbo Boost technology, which accelerates the processor to match your workload, you'll get incredible performance no matter what your computing needs.


Collapse All Sections
Description: Core i7 i7-965 Quad Core Processor
Manufacturer: Intel
Lowest Price: $1,019.99
User Reviews: Not Rated
Rebates: (None)
Quick Glance
Processor Class: Intel Core i7
Processor Socket: Intel Socket B (LGA 1336)
Processor Type: 4
Bus Speed: 6.4 GT/s
Processor Speed: 3200
Processor Speed + Class
Bus Speed: 6.4 GT/s
Processor Speed: 3.2 GHz
Processor Class: Intel Core i7
Physical + Memory Specifications
L3 Cache Size: 8 MB
L2 Cache Size: 1 MB
Number of Processor Cores: 4
Processor Socket: Intel Socket B (LGA 1336)
Warranty
Warranty Information: 3 Year Limited Warranty
More Info
General

Core i7 motherboards

By now you've no doubt read all about Intel's new Core i7 processor. You know that the CPU otherwise known as Nehalem is based on an all-new architecture, complete with four cores (or eight, if you count Hyper-Threading), three levels of cache, an integrated memory controller, and a QuickPath Interconnect replacement for the front-side bus. You know that the Core i7 is unequivocally the fastest desktop processor around, and that in some cases, it's a fair bit quicker, clock-for-clock, than Intel's already impressive Penryn designs. Naturally, you want one. Badly.

Saddling up a Core i7 won't be as easy as plugging one of the new chips into your current system, though. Nehalem is built on a new LGA1366 package that isn't compatible with the existing LGA775 infrastructure. Without a front-side bus, the Core i7 also requires a chipset compatible with its QuickPath Interconnect: Intel's own X58 Express. You'll need a whole new motherboard to join the Core i7 party, then. But which one?

Intel has its own X58 board, of course—the latest in a series of attempts to effectively cater to overclockers and PC enthusiasts. As one might expect, Taiwanese giant Asus has an iron in the fire, too. We've had the P6T Deluxe in the labs for weeks now, and it's laden with all the rich features you'd expect from a perennial favorite.

To find out which of these two is the best option for those eager to adopt Intel's latest microarchitecture, we've run them through a grueling gauntlet of performance, peripheral, power consumption, and overclocking tests. Read on for a detailed look at the first Core i7 motherboards to make it into the Benchmarking Sweatshop.


Introducing the X58 IOH
The Core i7's new interconnect requires a compatible chipset, and right now, the only game in town is Intel's X58 Express. Only one component of this fresh core logic offering is actually new, though. That would be the north bridge chip, which Intel refers to as the IOH, or I/O Hub. Previous Intel chipsets have branded their north bridge components MCHs, or Memory Controller Hubs, but since the Core i7 moves the memory controller to the processor, IOH is much more fitting for the X58.

Intel manufactures the X58 IOH using 130nm process technology that feels a little antiquated given the company's fabrication prowess. After all, AMD has been building north bridge chips on a power-efficient 55nm node since March. One might expect the X58 to present a thermal challenge; however, according to at least one motherboard maker, the chip is no more difficult to cool than Intel's last flagship, the X48 Express.

Thanks to its lack of a memory controller, the X58 is a much simpler design than its predecessor. The chip is essentially a bundle of point-to-point links, the most important of which is a QuickPath Interconnect that hooks into the Core i7 processor. This interconnect is made up of a pair of 20-bit links (one for upstream and another for downstream) that push 4.8 or 6.4GT/s, depending on your choice of Core i7 processors. QPI only uses 16 bits for data (the other four are reserved for error-checking), giving the interconnect an effective 19.2 or 25.6GB/s of aggregate bandwidth—a much bigger pipe than even Intel's fastest front-side bus.


The X58 IOH

All that processor bandwidth will certainly come in handy given the fact that the X58 IOH also sports 36 lanes of second-generation PCI Express. Four of those lanes are reserved for peripherals and expansion slots, with the remaining 32 dedicated to graphics. Naturally, those graphics lanes can be split evenly between a pair of full-bandwidth x16 slots. It's also possible to arrange the lanes in a three-slot x16/x8/x8 setup and in a four-way-x8 config.

Like previous Intel chipsets, the X58 Express has full support for AMD's CrossFire multi-GPU scheme, including three- and four-way configs. SLI will also be supported—a first for Intel platforms (not including uber-expensive Skulltrail systems). However, actual SLI certification will be done at the motherboard level rather than being tied to the chipset. Certified motherboards will have a special key embedded in their BIOS that Nvidia's graphics drivers will check prior to enabling SLI. To date, Asus, DFI, ECS, EVGA, Foxconn, Gigabyte, and MSI have licensed SLI for their X58 boards. Intel is conspicuously missing from that list, though. When asked whether its X58 board would support SLI, Intel said it and Nvidia had "not found mutually acceptable business terms for certification."


The last ingredient in the X58's connectivity soup is Intel's DMI interconnect. This link offers up to 2GB/s of bandwidth, which seems a little light given the massive pipes seen elsewhere in the Core i7. However, DMI does allow the X58 to hook into Intel's existing ICH10 series south bridge chips.

Those familiar with Intel's P45 chipset will no doubt recognize the ICH10, and more specifically, the RAID-equipped ICH10R. You'd recognize this chip if you're familiar with Intel's last generation of chipsets, too, since it's little more than a die shrink of the old ICH9 series. There's nothing new here, but that's not necessarily a sign of weakness. After all, the ICH10R does pack six 300MB/s Serial ATA ports with support for novel Matrix RAID configurations and more traditional multi-drive arrays. You get a dozen USB ports, too, and an integrated Gigabit Ethernet MAC. Six gen-one PCIe lanes round out the package, offering more than enough bandwidth for onboard peripherals and expansion slots.

Overall, the ICH10R has feature parity (and in some cases, superiority) with its rivals from AMD and Nvidia. Even more importantly, the chip has proven itself to be remarkably reliable and free of niggling little issues. Given the current core logic chipset climate, that's a very good thing.

Dinosaurs could survive cold conditions

Dinosaurs were able to survive colder temperatures than was previously thought, according to new research that casts doubt on theories that they were killed off by plummeting temperatures caused by climate change.

Palaeontologists have unearthed a rich variety of dinosaur fossils in an area that would have been one of the most northerly regions of the world in the period just before the giant reptiles died out, between 65 and 68 million years ago.

At the time, the world was far warmer and the continents were still to move to their current positions. Northeastern Russia, where the remains have been found, would have been just 1,000 miles from the North Pole, inside what is now called the Arctic Circle. Average temperatures would have been around 50F (10C).

Fossil hunters found remains of duck billed dinosaurs, fossilised teeth belonging to relatives of the heavily armoured Triceratops and even teeth belonging to relatives of the giant meat eater Tyrannosaurus rex.

The palaeontologists, based at the Royal Belgian Institute of Natural Sciences, also found fragments of dinosaur egg shells alongside the Arctic dinosaur remains, providing the first proof the animals were able to reproduce in these relatively cold, northern climates.

Dinosaurs have typically been thought of as being tropical creatures, but the discovery suggests they were able to survive in far colder conditions than had been appreciated.

One of the most common theories for the extinction of the dinosaurs was that the global climate cooled to the point that the animals could not survive. But the new discovery suggests dinosaurs were capable of adapting to cold conditions.

Professor Pascal Godefroit, who led the research on the polar dinosaurs, believes they faced a far more speedy decline, most likely caused by a massive meteor impact around 66 million years ago.

"For the first time we have firm evidence that these polar dinosaurs were able to reproduce and live in those relatively cold regions," he said.

"There is no way of knowing for sure, but dinosaurs were probably warm blooded just like modern birds, which are the direct descendants of dinosaurs.

"We have no remains of cold-blooded reptiles such as turtles, crocodilians and lizards in that area which suggests it was too cold for them.

"The dinosaurs were incredibly diverse in polar regions – as diverse as they were in tropical regions. It was a big surprise for us."

Among the dinosaur remains to have been found at Kakanaut, in northeastern Russia, include fossils of bipedal herbivores known as Ornithopods along with larger, lumbering plant eaters, similar to Ceratop dinosaurs, known as Edmontonia.

Teeth belonging to small meat eaters, including the 6ft long Troodon, which carried retractable claws, and relatives of the Velociraptors made famous by Jurassic Park, known as Dromaeosaurids were unearthed.

Remains of large tyrannosaurid dinosaurs, relatives of the formidable Tyranosaurus Rex, were also discovered.

Previously the most northerly dinosaur remains to be found have been in Alaska, but scientists have always assumed the creatures migrated south during the winter months to avoid the cold and long periods of darkness.

Professor Godefroit and his team, however, now claim they have evidence to suggest dinosaurs were year round residents of high latitudes and fed on evergreen plants during the winter. They have reported their findings in the German journal Naturwissenschaften.

He believes that the findings that so many dinosaurs were living in relatively cold regions right up until the time they became extinct, provides strong evidence against theories that climate change gradually killed them off.

Instead he believes debris thrown up by the meteor impact that created the Chicxulub Crater, on the Yucatan Peninsula in Mexico, blanketed the atmosphere and reduced the amount of sunlight reaching the planet's surface.

This would have caused a dramatic reduction in the amount of plant life on the planet, which would have caused a rapid collapse in the food chain as the large plant eating dinosaurs died out, as well as the meat eaters that preyed upon them.

He said: "The meteor impact would have led to the equivalent of a global polar night that could have lasted for several years. Even the polar dinosaurs that were used to finding food in such conditions would have struggled for that length of time."

Robert Spicer, from the Open University, told the scientific journal Nature that the findings show that dinosaurs were far more robust than had been realised.

He said: "It makes me ask very serious questions about what could make animals that were resilient enough to live under these conditions to suddenly go extinct."





Enable desktop effects with some additional features (fedora)

Follow the below instructions

1) Add livna repo
$ sudo rpm -ivh http://rpm.livna.org/livna-release-8.rpm
$ sudo rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-livna
Note: disable livna-devel & liva-testing repos if enabled by default.

2) Install nvidia driver
$ sudo yum install kmod-nvidia
Note: May require a system restart.

3) Even though FC8 comes with compiz more additional softwares are required to use it better so install the below softwares.
$ sudo yum install compiz-fusion compiz-fusion-gnome compiz-fusion-extras compiz-fusion-extras-gnome compiz-manager gnome-compiz-manager

4) Enable the desktop effects and enjoy!

Want to run windows (IE) in linux


First extract and install the wine package from internet by running the command in the "terminal".

------------------------------------------------------------------------

@localhost ~]$ yum -y install wine cabextract

------------------------------------------------------------------------


After extracting and installation.

Step:1> Go to the file location (i.e) where the file is located in the Drive that u want to run in the linux through terminal. To go to that location use the command cd Path to the file (file path ).

Ex
: /home/Bruce/Documents/wine.

Step:2> Type " wine explorer.exe "(with out quotes(") ) in the terminal.

Step:3> Use the browser to surf the internet and enjoy.

Another Method to run (with out using terminal ).

Step:1> Go to the file location by GUI ( Graphical User Interface ) that is through mouse.

Step:2> Run the file by clicking it.

wine has capbility of running some of the windows files in linux .

Install RealPlayer 10 Media Player (Fedora)

This one is a little tricky only because the latest official release is horribly out of date and doesn't even use ALSA for sound. So rather than deal with annoying workarounds I think the easiest thing to do now is to just use the latest daily build that's available. I'm currently using RealPlayer-10.1.0.3114-20070503.i586.rpm which you can just download and install. This one pretty much "just works" and doesn't seem to have any bugs I can see.

Just install it:

$ rpm -ihv RealPlayer-10.1.0.3114-20070503.i586.rpm

Then whenever you want to view something just use /usr/bin/realplay. Here is a link to a cute test video to make sure it's working for you.

If you also installed Mplayer above then you will likely run into a problem where the Mplayer provided Real Media plug-in will be run instead of the one installed by the RealPlayer package. The mplayer verison of the plug-in does not work correctly in most cases and causes more problems than it solves. The only way I've found to get rid of it is to just simply delete the plug-in files:

# cd /usr/lib/mozilla/plugins
# rm mplayerplug-in-rm.*

Install VLC (VideoLAN Client)

Multimedia can be the achilles heel of Linux, but with just a little work you should be able to play just about anything your friends can. Besides Mplayer the other great video player is called VLC. It too is trivially easy to install once you have your repositories set up:

# yum -y install vlc

Once the client and a zillion dependencies get installed you can play a huge variety of video formats easy with the command vlc

Install MPlayer Media Player with codecs and skins in fedora

At some point you're probably going to want to play a QuickTime, AVI or ASF file so you'll want the MPlayer media player. Fortunately with the FreshRpms repositories it's also very easy to download and install. Then you can go ahead and install mplayer and all it's dependencies:

# yum -y install mplayer mplayer-gui mplayer-skins mplayer-fonts mplayerplug-in

This command line will download the whole kit and kaboodle, command line utilities, plug-ins, etc. If you want to play content from a command line you will want to use the gmplayer version which will include a skin-able control panel. Restart your web browser after that whole mess is done installing and you'll also have a plug-in for Mozilla so you can play embedded content. While you're at it be sure to configure mplayer to use the Pulse sound system rather than the default. It just works better. Edit the file ~/.mplayer/config and add the following line:

ao=pulse

You can enable support for mms streaming by opening Firefox and click on the special URL about:config. Right click on the list and choose New then choose String. For the preference name enter network.protocol-handler.app.mms then for the string value enter gmplayer.

Special 64-bit instructions:
The above installs the 64-bit version of everything but because your other plug-ins are 32-bits you need to run the 32-bit version of Firefox, which won't be able to use the 64-bit version of the plug-in you just installed. The plug-in can use the 64-bit version of the mplayer application just fine so all you need to do then is to install the 32-bit mplayerplug-in plus a dependency it requires. If you know of any easier way to do this please let me know below.

# rpm -ihv http://ftp.freshrpms.net/pub/freshrpms/fedora/linux/7/mplayerplug-in/mplayerplug-in-3.40-1.fc7.i386.rpm

And finally you'll probably also want some additional codecs to play all that proprietary video that seems to have infected the Internet. Go to the MPlayer Download page and find the Binaries Codec Package section then follow the link for codecs directory. There you will grab the latest all codecs file. You'll need to install those files in /usr/local/lib/codecs. Here are the steps. Remember the exact file names may change at some point. If you also installed xine you will need a symlink since it expects codecs to be in a different directory.

# gtar xjvf all-20071007.tar.bz2
# mv all-20071007/* /usr/local/lib/codecs
# ln -s /usr/local/lib/codecs /usr/lib/codecs
# ln -s /usr/local/lib/codecs /usr/local/lib/win32

Install DVD player for fedora

Currently I find the DVD player that works best is the Xine Multimedia Player which is found in the Livna repository so installing it is just this simple:

# yum -y install xine xine-lib xine-skins xine-lib-extras-nonfree libdvdcss

This will install the xine DVD/VCD/CD player. Now to get xine to automatically play a DVD upon insertion instead of the Totem player which can't actually play DVDs, you can simply use the gconftool-2 utility as follows:

$ gconftool-2 --set /desktop/gnome/volume_manager/autoplay_dvd_command \
'xine --auto-play --auto-scan dvd' --type='string'

Install the grip CD ripper in fedora & flash plugins (Fedora)

To install CD Ripper run the following in the terminal

-------------------------

# yum -y install grip
-------------------------


Install Macromedia Flash/Shockwave plug-in:-

Flash Plug-in 9.0

32-bit instructions:

It's now "Windows easy". Just go to a site that uses flash such as YouTube and try to view a video. At the top of the window you will get a prompt like this:

Just click on Install Missing Plugins and follow the prompts. It will install the plug-in for the currently installed user only, not system wide.


64-bit instructions:


Type the following in the terminal.

-------------------------------------------------------------------------------

# rpm -ivh http://linuxdownload.adobe.com/adobe-release/adobe-release-i386-1.0-1.noarch.rpm

# rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-adobe-linux

# mkdir -p /usr/lib/mozilla/plugins

# yum install nspluginwrapper.{i386,x86_64} pulseaudio-lib.i386

# yum install flash-plugin

# mozilla-plugin-config -i -g -v

--------------------------------------------------------------------------------

Type the above all those alternatively you will flash plugin .

Install MP3 Plug-in for Xmms & Rhythmbox in Fedora

Just use yum to automatically install the MP3 plug-ins for xmms and Rhythmbox like this:

type in the terminal as shown below:

-----------------------------------------------------------------------------


# yum -y install xmms xmms-mp3 xmms-faad2 gstreamer-plugins-ugly \
gstreamer-plugins-bad libmad libid3tag

-----------------------------------------------------------------------------

where "-y " is nothing but it will automatically say yes to all queries while installing through terminal

Need to do an update of the whole system linux ( fedora )

This will most likely pick up official Fedora updates as well as updated packages from the Livna repository. This might take a while.

# yum -y update

Adding repositories to linux

Before you add repositories it's probably a good idea to make sure your system is fully updated first. At this point I'm prefering the Livna repository as it's the most useful and complete but at some point I might need to add another one for things that are lacking there. The easiest way to get started is to install the livna-release packages:

---------------------------------------------------------------

# rpm -ihv http://rpm.livna.org/livna-release-8.rpm

---------------------------------------------------------------

Please note: If you are upgrading from a previous release this command will fail with a conflict. Skip to the next section on upgrading from a previous release instead.

When adding additional repositories be very careful as many respositories don't mix well. It's ok to add specialized repositories such as the one for Flash below, but when mixing general repositories such as FreshRPMs, Livna or ATrpms there are often conflicts that are difficult to recover from.

You can browse the packages available there at http://livna-dl.reloumirrors.net/fedora/8/.
Upgrading from previous Fedora

There are a few things you need to do when upgrading from a previous version of Fedora. This was tested only with Fedora 7 so older versions may not work quite as easily. The first thing you want to do is upgrade the repository package for the newer version.

---------------------------------------------------------------

# rpm -Uhv http://rpm.livna.org/livna-release-8.rpm

---------------------------------------------------------------

how to know the architecture of linux

Fedora comes with a ton of software but there are still plenty of packages of interest to most users that are not included for a variety of reasons.

These instructions can vary depending on 32bit or 64bit architecture. If there is a difference it will be noted. If you don't know which architecture you're running you can run the following command:

$ uname -m
x86_64
...or...
i686

how to play all video formats in linux (Fedora )

Let us get started. Are you ready?

playing music and video in Fedora 9

1. Open a terminal and switch to root user.
Launch the terminal from the panel menu
Click Applications->System Tools->Terminal
On the terminal type: su -
Type your root password and hit enter key on the keyboard.

2. Check whether sound is properly configured on your system.
play /usr/share/sounds/startup3.wav

If you hear sounds proceed further. Otherwise check volume control and sound devices configuration. Below is the output when you play the wav sound file from the terminal.
Input File : '/usr/share/sounds/startup3.wav'
Sample Size : 16-bit (2 bytes)
Sample Encoding: signed (2's complement)
Channels : 2
Sample Rate : 44100

Time: 00:02.50 [00:00.00] of 00:02.50 ( 100.0%) Output Buffer: 110.36K

Done.

3. Enable the rpm.livna.org repository.

"rpm -ivh http://rpm.livna.org/livna-release-8.rpm "

3a. If you are using Fedora 9 use

"rpm -ivh http://rpm.livna.org/livna-release-9.rpm "

4. Remove the totem and xine packages installed on your computer. Let us use the totem packages from the rpm.livna.org instead. From this step we will use yum. Close other applications that use yum in the background. Pirut - Add/Remove Software and Software Updater use yum as back end. You may also have to stop yum-updatesd daemon running on your computer.


"yum remove totem totem-mozplugin totem-plparser xine xine-lib "

Use these commands to kill the existing yum processes if you encounter any issues running yum.

"killall yum-updatesd "
"rm /var/run/yum.pid "

5. Download and install the codecs from rpm.livna.org.

"yum install gstreamer-plugins-bad gstreamer-plugins-bad-extras gstreamer-plugins-ugly xine-lib-extras-nonfree "

6. Download and install totem player and its plugins.

"yum install totem-xine totem-xine-mozplugin totem-xine-galago totem-xine-lirc "

7. Optionally download and install other media players.
a) Audicious

"yum install audacious-plugins-nonfree-aac audacious-plugins-nonfree-alac audacious-plugins-nonfree-lame audacious-plugins-nonfree-mms audacious-plugins-nonfree-mp3 audacious-plugins-nonfree-tta audacious-plugins-nonfree-wma audacity-nonfree "

b) ffmpeg: FFMpeg is a complete and free Internet live audio and video
broadcasting solution. It can encode in real time in many formats including MPEG1 audio
and video, MPEG4, h263, ac3, asf, avi, real, mjpeg, and flash.

"yum install ffmpeg ffmpeg-libs ffmpeg2theora gstreamer-ffmpeg "

c) mplayer

"yum install mplayer mplayer-doc mplayer-fonts mplayer-gui mplayerplug-in gnome-mplayer "

d) xmms

"yum install xmms-faad2 xmms-mp3 xmms-normalize "

e) Rhythmbox

"yum install rhythmbox-lirc rhythmbox-upnp "

f) Others

"yum install vlc "


Note:- Type all the specified things with out quotes ( " ) in the "terminal"

Launch your favorite multimedia application from the GNOME panel and play your favorite music or video.

Change Internet Explorer's Caption

Don't like the caption of Internet Explorer caption? Want to change
it? Open the registry editor and go to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet
Explorer\Main.
In the right pane create a new String Value names Window Title
(Note the space between Window and Title). Right click on this
newly created String Value and select Modify. Type in the new
caption you want to be displayed. Restart for the settings to take
place.


NOTE:- This is only for your knowledge to know all the features of windows xp . So plz don't do this for illegal things.

Making the Internet Explorer & the Explorer Toolbars Fancy

The Internet Explorer toolbar looks pretty simple. Want to make it
fancy and kewl? Why not add a background image to it. To do this
kewl hack launch the Windows Registry Editor and go to the
following key: HKEY_CURRENT_USER\SOFTWARE\Microsoft\
Internet Explorer\Toolbar\.
Now in the right pane create a new String Value and name it
BackBitmap and modify it's value to the path of the Bitmap you
want to dress it up with by rightclicking on it and choosing Modify.
When you reboot the Internet Explorer and the Windows Explorer
toolbars will have a new look.


NOTE:- This is only for your knowledge to know all the features of windows xp . So plz don't do this for illegal things.

Customizing the Right Click Context Menu of the Start Menu

When you right click on the start menu, only 3 options pop up:
Open, Explore, and Find. You can add your own programs to this
pop up menu( which comes up when we right click on it.) Open
Regedit and go to the following registry key:
HKEY_CLASSES_ROOT\Directory\Shell
Right click on the shell and create a new Sub Key (You can create a
new SubKey by right clicking on the Shell Key and selecting New >
Key.). Type in the name of the application you want to add to the
start menu. I want to add Notepad to the Start Menu and hence I
name this new sub key, Notepad. Now right click on the new
registry key that you just created and create yet another new key
named Command. Enter the full path of the application, in this case
Notepad in the default value of Command in the right
pane. So I Modify the value of the default string value and enter the
full pathname of Notepad:
c:\wndows\notepad.exe.
Now press F5 to refresh. Now if you right click on the Start Button
you will find a new addition to the Pop Up Menu called Notepad.
Clicking on it will launch Notepad.
We can not only add but also remove the existing options in this
pop up box.
To delete the Find option, go to the following registry key:
HKEY_CLASSES_ROOT\Directory\Shell\Find
Delete Find. DO NOT delete Open else you will not be able to open
any folders in the Start Menu like Programs, Accessories etc.
BMP Thumbnail As Icon
You can actually change the default BMP icon to a thumbnail version
of the actual BMP file. To do this simply go to
HKCU\Paint.Picture\Default. In the right pane change the value of
default to %1. Please note however that this will slow down the
display rate in explorer if there are too many BMP thumbnails to
display. You can use other icons too, simply enter the pathname.To
restore back to the normal change the vale of default back to:
C:\Progra~1\Access~1\MSPAINT.EXE,1.


NOTE:- This is only for your knowledge to know all the features of windows xp . So plz don't do this for illegal things.

Secure your Desktop Icons and Settings

You can save your desktop settings and secure it from your nerdy
friend by playing with the registry. Simply launch the Registry
Editor go to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Policies\Explorer
In the right pane create a new DWORD Value named
NoSaveSettings and modify it's value to 1. Refresh and restart for
the settings to get saved.


NOTE:- This is only for your knowledge to know all the features of windows xp . So plz don't do this for illegal things.

Change the Default Locations

To change the default drive or path where Windows will look for it's
installation files, go to the key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersio
n\Setup\SourcePath
Now you can edit as you wish.


NOTE:-
This is only for your knowledge to know all the features of windows xp . So plz don't do this for illegal things.

Delete the Tips of the Day to save 5KB


Windows 95 had these tips of the day which appeared on a system
running a newly installed Windows OS. These tips of the day are
stored in the Windows Registry and consume 5K of space. For those
of you who are really concerned about how much free space your
hard disk has, I have the perfect trick.
To save 5K go to the following key in Regedit:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersio
n\Explorer\Tips
Now simply delete these tricks by selecting and pressing the DEL
key.


NOTE:-
This is only for your knowledge to know all the features of windows xp . So plz don't do this for illegal things.

Pop a banner each time Windows Boots

To pop a banner which can contain any message you want to
display just before a user is going to log on, go to the key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVers
ion\WinLogon
Now create a new string Value in the right pane named
LegalNoticeCaption and enter the value that you want to see in the
Menu Bar. Now create yet another new string value and name it:
LegalNoticeText. Modify it and insert the message you want to
display each time Windows boots. This can be effectively used to
display the company's private policy each time the user logs on to
his NT box. It's .reg file would be:
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVer
sion\Winlogon]
"LegalNoticeCaption"="Caption here."


NOTE:-
This is only for your knowledge to know all the features of windows xp . So plz don't do this for illegal things.

Take Over the Screen Saver

To activate and deactivate the screen saver whenever you want,
goto the following registry key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\ScreenSavers
Now add a new string value and name it Mouse Corners. Edit this
new value to -Y-N. Press F5 to refresh the registry. Voila! Now you
can activate your screensaver by simply placing the mouse cursor
at the top right corner of the screen and if you take the mouse to
the bottom left corner of the screen, the screensaver will
deactivate.


NOTE:- This is only for your knowledge to know all the features of windows xp . So plz don't do this for illegal things.

Disabling Display of Drives in My Computer

This is yet another trick you can play on your geek friend. To
disable the display of local or networked drives when you click My
Computer go to :
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Policies\Explorer
Now in the right pane create a new DWORD item and name it
NoDrives. Now modify it's value and set it to 3FFFFFF (Hexadecimal)
Now press F5 to refresh. When you click on My Computer, no drives
will be shown. To enable display of drives in My Computer, simply
delete this DWORD item. It's .reg file is as follows:
REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersio
n\Policies\Explorer]
"NoDrives"=dword:03ffffff

NOTE:- This is only for your knowledge to know all the features of windows xp . So plz don't do this for illegal things.

Ban Shutdowns : A trick to Play

In this section I teach you, how to disable the Shut Down option in
the Shut Down Dialog Box. This trick involves editing the registry,
so please make backups. Launch regedit.exe and go to :
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Policies\Explorer
In the right pane look for the NoClose Key. If it is not already there
then create it by right clicking in the right pane and selecting New >
String Value.(Name it NoCloseKey ) Now once you see the
NoCloseKey in the right pane, right click on it and select Modify.
Then Type 1 in the Value Data Box.
Doing the above on a Win98 system disables the Shut Down option
in the Shut Down Dialog Box. But on a Win95 machine if the value
of NoCloseKey is set to 1 then click on the Start > Shut Down
button displays the following error message:
This operation has been cancelled due to restrictions in effect on
this computer. Please contact your system administrator.
You can enable the shut down option by changing the value of
NoCloseKey to 0 or simply deleting the particular entry i.e. deleting
NoCloseKey.
Instead of performing the above difficult to remember process,
simply save the following with an extension of .reg and add it's
contents to the registry by double clicking on it.
REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersio
n\Policies\Explorer]
"NoClose"="1"

Note::-This is only to know the all features of windows xp .Don't do this for illegal things

How to connect to internet with mobile in fedora

Procedure::-

1> First connect u r Gprs enabled mobile to PC .

2> Then check for the Port that is using. We can check it by opening "terminal" and type

"dmesg" in the terminal. you will get lot of information , go to the end of the information and look for the port used by u r mobile. it looks like this.



From terminal::

Bluetooth: L2CAP socket layer initialized
Bluetooth: RFCOMM socket layer initialized
Bluetooth: RFCOMM TTY layer initialized
Bluetooth: RFCOMM ver 1.8
usb 2-1: new full speed USB device using ohci_hcd and address 2
usb 2-1: configuration #1 chosen from 1 choice
usbcore: registered new interface driver cdc_ether
drivers/usb/class/cdc-acm.c: Ignoring extra header, type -3, length 4
cdc_acm 2-1:1.1: ttyACM0: USB ACM device
usb 2-1: bad CDC descriptors
usbcore: registered new interface driver cdc_acm
drivers/usb/class/cdc-acm.c: v0.25:USB Abstract Control Model driver for USB modems and ISDN adapters
usbcore: registered new interface driver rndis_host
hda-intel: Invalid position buffer, using LPIB read method instead.
fuse init (API version 7.8)
SELinux: initialized (dev sda7, type fuseblk), uses genfs_contexts
SELinux: initialized (dev sda8, type fuseblk), uses genfs_contexts
SELinux: initialized (dev sda5, type fuseblk), uses genfs_contexts
SELinux: initialized (dev sda6, type fuseblk), uses genfs_contexts
SELinux: initialized (dev sda1, type fuseblk), uses genfs_contexts
PPP generic driver version 2.4.2
PPP Deflate Compression module registered



Here u can see my mobile device connected to USB port ttyACM0: USB ACM device.

3> After confirmation of u r device go to option "System " from u r desktop which is defaulty in the top.

Goto System -> Administration -> Network ->New -> Modem Connection


From here u have to configure u r device if it is not detected automatically
which i have said above ( ex:- ttyACM0) and click "Forward" .

4> In the next step u will get prefix ,areacode,phone number........etc fill the all
all the blanks with appropriate information provided by u r ISP (Internet
Service Provider) after finishing this step click "Forward " for the next
step also and finally finish all the above task succesfully .

5>click "connect " to connect to the internet and enjoy the power of web.

Sunday, January 25, 2009

Exiting Windows the Cool and Quick Way



Normally it takes a hell lot of time just Shutting down Windows, you have to move your mouse to the Start Button, click on it, move it again over Shut Down, click, then move it over the necessary option and click, then move the cursor over the OK button and once again (you guessed it) click.This whole process can be shortened by creating shortcuts on the Desktop which will shut down Windows at the click of a button.
Start by creating a new shortcut( right click and select New> Shortcut). Then in the command line box, type (without the quotes.)

'C:\windows\rundll.exe user.exe,exitwindowsexec'

This Shortcut on clicking will restart Windows immediately without any Warning. To create a Shortcut to Restarting Windows, type the following in the Command Line box:

'c:\windows\rundll.exe user.exe,exitwindows'

This Shortcut on clicking will shut down Windows immediately
without any Warning.



how to delete autorun.inf

Now a days the mostly affecting worms with pendrives ,memcards (memory cards),flash drives which we can't open the pendrive or drives etc .because it is effected with autorun.inf . If once it affected it is very difficult to open pendrives because it shows autoplay instead of open . so there is a secure way to remove the worm in u r system is given below and check it in u r system to remove .

Note:plz Don't open the pendrive by doublick . Use rightclick and open option to view the files in the pendrive . Because it can be attatched to u r system ,so plz beware of that .

Method::1

Go to command prompt by typing "cmd " in run and then select the drive (ex:- c: ,d: )which is effected .and then type the following command .


1> attrib -a -s -h -r autorun.inf

2> del autorun.inf


Another mehtod :

If u r not familiar with the above method use a software for better protection for pendrives , flash drives etc. The software which can prevent by the attack of autorun.inf and some other worms " USB DISK SECURITY " . but u need full version to delete all worms detected by the software.

Download Link:-

www.download.com/USB-Disk-Security/3000-2239_4-10708708.html

Eset Smart Security

Although many of the antivirus available in the market , the newly emerging and fastly growing antivirus is Eset smart security (NOD32) . The first product of the Eset is NOD32 with some nice features . Eset is best antivirus for the user with no internet connection , less Ram , slow processors etc. It has ability to detect viruses ,worms,spywares,threats,attacks etc. because it not only uses the signature based
updates to scan the files but also heuristic and advanced heuristic scaning engines are available to scan , even though it is not up to date (virus signature database ).
its user interface in removing viruses,worms......etc is very good . It automatically cleans files by showing an intimaiton at the end of the bottom right corner. It take
very less CPU usage to run on the PC's .

Strong Against Viruses

ESET's NOD32 antivirus gets accolades from all the major independent testing labs. It's certified for virus detection by ICSA Labs and for detection and cleaning by West Coast Labs—WCL also gives it several other checkmark certifications, including antispyware and anti-Trojan. NOD32 has grabbed the VB100% brass ring in every test by Virus Bulletin for the past five years. And Andreas Clementi's AV-Comparatives rated it ADVANCED + (the top rating) for both on-demand virus cleanup and nonsignature virus detection.

Virus and spyware protection are completely integrated, though the advanced setup tree lets you adjust their configurations individually. The standard scan examines memory, disk boot sectors, and all files on all local drives. You can define a custom scan that performs a subset of the standard scan. A powerful scheduling utility automates tasks such as looking for updates, maintaining the logs, and checking files that launch at start-up. In advanced mode, you can use the scheduler to run a scan or even a third-party application on a daily or weekly basis, at a specified interval from 1 to 43,200 minutes (30 days), or whenever a certain trigger event occurs, such as computer start-up or user log-on.

Note, however, that by default the only scheduled scan is the automatic start-up file check. ESET reasons that, because no file can launch without being vetted by the real-time scanner, a scheduled scan isn't strictly necessary. That's a reasonable position. If a regular full scan makes you feel warm and happy, switch to Advanced mode and fire up the scheduler. Here's an unusual touch: You can configure ESS to send a notification via e-mail or the network Messenger service if a virus removal or other security event takes place. ESS scans incoming POP3 e-mail for viruses and malware, but doesn't scan outgoing mail.


So-So Against Spyware

I installed ESS on a collection of test systems infested with malware samples, including adware, spyware, Trojan horses, rootkits, and rogue antispyware. As often happens, I had trouble with one system due to a malicious program that interferes with the installation of security software. On advice from ESET technical support, I ran the company's online scanner—it cleaned up the mad-dog malware and allowed me to complete the installation.

ESS scanned my standard clean test system in 20 minutes; a repeat scan took only 16 minutes. That's speedy—other products generally take from about 24 minutes to an hour on the same system. The test system is a virtual machine with limited disk space, so the timings are only useful as a relative measure. On the other hand, scanning was horrendously slow on one of the test systems, due to all the entrenched malware. After more than an hour, I rebooted into Safe Mode and ran ESS. This launched the Safe Mode scan, which is a stripped-down command-line process—after returning from Safe Mode, you have to check the log to see what it did.

On another system, the scan hung up at the exact same file over and over again, and this time scanning in Safe Mode didn't help. ESET tech support asked a few questions and requested a copy of the offending file. It turns out I discovered a bug in the product, but the very next day they pushed out an update that allowed the scan to finish. ESS's frequent signature updates are very fast, and even this program update took only a minute or so.

ESS distinguishes several categories of non-virus malware. Detection of Adware/Spyware/Riskware is enabled by default, and at install time I chose to detect "Potentially unwanted applications." I didn't realize immediately that detection of "Potentially unsafe applications" (keyloggers, for example) is a different feature, one not enabled by default. I had to turn on that option by changing the ThreatSense parameters in four separate places. And of course I had to repeat all the scans I had run before making this change (sigh). ESET could benefit from a little interface tweaking in this area.

During scanning on several systems, ESS repeatedly popped up notification that it had quarantined one threat or another—but in many cases it reported the same threat again and again. That's not very encouraging; it suggests that the program sees a threat but can't manage to remove it. The quarantine pop-ups warned that cleanup wouldn't be complete until reboot, as did many of the lines in the manual scan log, so I made sure to reboot before checking for successful cleanup.

Out of a possible 10 points, ESS scored a disappointing 7.1. It did remove all the rootkits and Trojans, but it tried and failed to remove many threats, and completely missed several others. In a number of cases, files that it claimed to have quarantined were still present. And even when it did successfully remove all executables associated with a threat (as it must to get full credit from us for removal), it left behind tons of data files and Registry debris. Norton Internet Security 2008 scored 9.3 on this same test, while Panda Internet Security 2008 swept the field for a score of 10.

I made sure to turn on the many "Potentially unsafe applications" options before running a parallel scan using commercial keyloggers. ESS managed 2.0 out of 10 on this test, taking the low-score no-prize away from Panda. It completely ignored the majority of the samples. Even when it recognized and attempted to quarantine other samples, it didn't succeed; most of them kept running despite ESS's efforts. It's definitely possible to identify and remove these products—NIS 2008 scored 10 of 10 on this same test. On the other hand, someone would have to enter your office and physically install the keylogger, so I give less weight to this test. No single security app is going to stand up to spies who are that determined.

I tested the program's ability to prevent malware from infesting a clean system, hoping for better results. ESS's first line of defense is "Web access protection"—blocking the download of known malware. I tried re-downloading all of my malware samples to see if WAP would catch them. It didn't block any of the commercial keyloggers. Among the other malware samples whose URLs were still valid, WAP caught just over half. That's a good start, but McAfee's SiteAdvisor and Trend Micro's TrendProtect blocked almost all the still-present threats.

When I opened the folder containing my already-downloaded samples, ESS quarantined about a third of them on sight. That's not so hot compared with McAfee Total Protection or Trend Micro Internet Security Pro 2008. MTP killed off all but two samples on sight, and TIS 2008 got all but one. For reasons unknown, ESS reported each quarantine action five or six times, but in the end it did eliminate the malware installers that it recognized. And when I teased it with hand-modified versions of those files, it whacked them just the same.

As in the cleanup test, ESS was most effective against the worst malware, perhaps reflecting its antivirus roots. It completely missed several samples, though, and failed to remove a number of those it did recognize. In this case, failure means that it allowed one or more executable files to be installed on disk. Even its successes were messy, with tons of data files and Registry items installed. Overall, it scored 7.4 out of 10 for spyware blocking. In this same test, MTP scored 9.3, TIS 2008 got 9.8, and Panda once again swept completely with an impressive 10 of 10.

In a separate test using commercial keyloggers, ESS recognized only half the samples and didn't manage to block the installation of any it recognized. All but one of the samples it tried to block managed to install and run, and several were visibly logging keystrokes and monitoring other activities. Trying and failing seems almost worse than not trying at all (though I give half-credit for trying). ESS scored 2.5 of 10 in this test, taking the low-score prize for keylogger blocking away from Panda. NIS 2008 blocked all the commercial keyloggers and scored a perfect 10 of 10.

The product's performance in getting rid of malware and keeping it out of a clean system is about the same as that of its previous NOD32 2.5—meaning it's not so great. In theory, the tight integration of antivirus, antispyware, and firewall should provide muy macho protection. In practice, it just doesn't.


Basic Firewall

ESET doesn't sell a firewall product separately from ESS—it's designed as an integrated part of the whole. The firewall notices when you connect to a new network and asks whether or not to allow file sharing. In your home office, sure, you'll allow it; at the Internet café you won't (if you're smart). It's completely effective at hiding your computer from outside attack by putting all its ports in Stealth mode. None of my Web-based port scan attacks could get through, and it specifically logged several as port scan attacks. Of course, Windows Firewall does just as good a job of stealthing the ports. Still, not every suite firewall was able to ace these tests.

In its default Automatic filtering mode, the firewall doesn't attempt to control which programs can access the Internet—it just watches Internet traffic and blocks all incoming packets that weren't requested. If you set the firewall for interactive filtering, you get simple user-confirmation program control. Each time a program tries for Internet access, the firewall asks you the first time whether to allow it. Where some firewalls preconfigure access for hundreds—or thousands—of known programs, ESS asks about every single program—including those built into Windows. And where most other firewalls add all programs that access the Internet during a limited "training period" to the trusted list, ESS's automatic filtering does not. Your choice, then, is no program control at all, or old-school, plenty-o-pop-ups program control. While control freaks may enjoy the endless allow/deny power trips, the average user will quickly become annoyed.

After tuning on Interactive filtering, I tried to get around the firewall's program control using a dozen-odd "leak test" programs that exercise techniques used by malware. ESS's real-time protection quarantined all but the newest of these, identifying them as—surprise—leak test programs. But, with real-time protection turned off, the firewall didn't see that these sneaky programs were evading its filter. ESET representatives pointed out that the product is meant to be used as a whole, and that turning off portions of the protection is not advised. I say that if some zero-day Trojan gets past signature-based protection, I'd be happier if my firewall could keep it from "phoning home."

I tried my best to put ESS's firewall protection out of action by using common malicious program techniques. Killing off the user interface in Task Manager was a snap, but the kernel providing the actual protection just wouldn't die. I couldn't stop the product's essential Windows service, but by setting its status to Disabled and rebooting I managed to keep it from launching. This caused ESS to hang at its splash screen, but the firewall protection was unaffected. And I found no way to turn it off by tweaking the Registry. The only attack that worked was my Rube-Goldberg utility that sends fake mouse clicks to simulate a user turning off protection—a very unlikely attack.

You can get the same degree of protection from one of the popular free personal firewalls such as ZoneAlarm or Comodo. The main advantage here is that the firewall is totally integrated with the suite's other protective elements. The disadvantage is that, at the level of protection I recommend, you're going to get a lot of pop-ups for a while.


Smooth Spam Stopper

Many spam filters work directly on the POP3 e-mail stream, so if they don't support your e-mail client, you can just define a message rule to sort the spam. ESS's antispam module works only with Outlook, Outlook Express, or Windows Mail, but it will filter POP3, IMAP, Exchange-based mail, or any e-mail account that's compatible with one of its supported e-mail clients. If you're among the vast majority who rely on one of the supported clients, ESS's antispam is more flexible than most. But if you use Thunderbird, Eudora, or The Bat!, you'll have to look elsewhere for antispam.

To avoid filtering out valid mail, ESS whitelists everyone in your address book, checking for new additions each time you launch the e-mail client. It also whitelists any address to which you send mail, as well as the sender of any message you actively mark as Not Spam. A toolbar integrated into the supported e-mail clients offers quick access to antispam settings, plus buttons to mark a message as Spam or Not Spam and to add the sender to your whitelist or blacklist.

Refreshingly, even in the advanced setup tree, there's very little to configure in the antispam realm. The default settings are all sensible, and no significant adjustment is necessary (or possible).

The antispam is clever; the question is, is it tough? To find out, I configured Outlook Express to download mail from two spam-infested real-world accounts and let it process about 2,000 messages. Before starting, I cleared the whitelist, forcing it to evaluate each message based solely on its content. Where a POP3-based solution can slow the download of mail, ESS had no effect whatever on performance. Afterward I sorted the inbox into valid mail from individuals, undeniable spam, and newsletters (valid bulk mail), discarding anything not clearly matching one of these categories. I did the same for the ESET Antispam folder. Then I crunched some numbers.

Spam accounted for over half the messages, and ESS caught nearly 80 percent of it. The majority of the valid messages were newsletters, and it marked less than half a percent of those as spam. That's impressive, as many antispam products have trouble distinguishing between valid bulk mail and spam. But it tossed over 13 percent of valid mail from individuals into the spam folder, which isn't good. Yes, if I had left the whitelist in place, none of those messages would have been blocked. It does seem, though, that this spam filter might occasionally toss valid mail coming from contacts that you've never communicated with before. Keep that whitelist updated!

ESET Smart Security 3.0 is definitely a highly integrated security suite with a solid AV component. If you don't need parental control and want a small-footprint solution, it may do the job. If ESET wants to climb to the top of the security suite heap, however, I'd like to see significantly better accuracy in detecting non-virus malware and in successfully handling the threats it does detect.

Sub-Ratings:
Antivirus:
Antispam:
Antispyware:
Firewall:
Parental/Privacy: N/A

top ten internet security 2009 reviews

The protection is in u r hand. Then why u choose the best one. Below it shows the reviews of top ten internet security in 2009 by comparing with other products . choose the best protection for u r PC.





Rank #1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Excellent score Excellent
Very good score Very Good
Good score Good
Fair score Fair
Poor score Poor
BitDefender Internet Security ZoneAlarm Internet Security Kaspersky Internet Security Webroot Internet Security BullGuard Internet Security Trend Micro Internet Security Pro McAfee Internet Security AVG Internet Security Norton Internet Security Norman Security Suite
BitDefender Internet Security ZoneAlarm Internet Security Kaspersky Internet Security Webroot Internet Security BullGuard Internet Security Trend Micro Internet Security Pro McAfee Internet Security AVG Internet Security Norton Internet Security Norman Security Suite
Reviewer Comments Read Review
Watch Video Review
Read Review
Read Review
Watch Video Review
Read Review
Read Review
Read Review
Read Review
Read Review
Read Review
Read Review
Lowest Price Buy BitDefender Internet Security 2009
$39.95
Buy ZoneAlarm Internet Security 2009
$39.95
Buy Kaspersky Internet Security 2009
$59.95
Buy Webroot Internet Security Essentials
$59.95
Buy BullGuard Internet Security 8
$69.95
Buy Trend Micro Internet Security Pro 2009
$49.95
Buy McAfee Internet Security 2009
$64.99
Buy AVG Internet Security 7.5
$54.99
Buy Norton Internet Security 2009
$69.99
Buy Norman Security Suite 2008
$41.96
Overall Rating Excellent Excellent Excellent Excellent Excellent Excellent Very Good Very Good Very Good Very Good
Ratings
Firewall Excellent Excellent Excellent Excellent Excellent Excellent Very Good Very Good Excellent Very Good
Antivirus Excellent Excellent Excellent Very Good Excellent Excellent Excellent Excellent Excellent Excellent
Antispyware Excellent Excellent Excellent Excellent Very Good Excellent Excellent Very Good Excellent Very Good
Other Security/Features Excellent Excellent Very Good Excellent Excellent Excellent Excellent Good Very Good Very Good
Ease of Use Excellent Excellent Excellent Excellent Excellent Very Good Very Good Very Good Very Good Very Good
Ease of Installation/Setup Excellent Excellent Excellent Excellent Excellent Excellent Very Good Very Good Very Good Very Good
Help/Support Excellent Very Good Excellent Excellent Excellent Excellent Very Good Very Good Very Good Excellent
View Specifications Go! Go! Go! Go! Go! Go! Go! Go! Go! Go!
View Screenshots View BitDefender Internet Security screenshots View ZoneAlarm Internet Security screenshots View Kaspersky Internet Security screenshots
View BullGuard Internet Security screenshots
View McAfee Internet Security screenshots View AVG Internet Security screenshots View Norton Internet Security screenshots View Norman Security Suite screenshots
Upgrade
Upgraded Version Total Security
Work Space Security


McAfee Total Protection


Firewall
ICSA Certified


Check Mark
Check Mark Check Mark Check Mark

W.C.L. PC Firewall Certified Check Mark
Check Mark


Check Mark Check Mark

File Protection Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark
Personal Information Protection Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark
Check Mark Check Mark
Registry Protection Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark
Check Mark Check Mark
Port Monitoring Check Mark Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark Check Mark Check Mark
Network Traffic Monitoring Check Mark Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark Check Mark Check Mark
Data Filtering Check Mark Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark Check Mark Check Mark
Antivirus
ICSA Certified Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark Check Mark Check Mark Check Mark
VB 100% Certified Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark Check Mark Check Mark Check Mark
W.C.L. Level 1 Certified Check Mark Check Mark Check Mark

Check Mark Check Mark Check Mark Check Mark
W.C.L. Level 2 Certified Check Mark Check Mark Check Mark

Check Mark Check Mark Check Mark Check Mark
On-access Scanning Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Real-time Scanning Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
On-demand Scanning Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Scheduled Scanning Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Heuristic Scanning Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Manual Scanning Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Scan Compressed Files Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Auto-clean Infected Files Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Quarantines Infected Files Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
P2P File Sharing Protection Check Mark Check Mark Check Mark Check Mark

Check Mark

Check Mark
Detailed Virus Information Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark
Outbreak Notice Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark
Check Mark Check Mark
Antispyware
ICSA Certified
Check Mark Check Mark Check Mark
Check Mark Check Mark Check Mark Check Mark
Descriptions of Found Spyware Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark
Real-time Blocking and Protection Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Detects Adware Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Detects Spyware Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Detects Keyloggers Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Detects Trojans Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Browser Hijackers/BHO's Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Security
Antispam Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Anti-phishing Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark Check Mark Check Mark Check Mark
Privacy/Parental Control Check Mark Check Mark Check Mark

Check Mark Check Mark

Check Mark
Scans Emails Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Website Filters Check Mark Check Mark Check Mark
Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Features
Website History Log
Check Mark
Check Mark Check Mark Check Mark Check Mark
Check Mark
Password Protection Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark
Check Mark Check Mark
Automatic Program Updates Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark
Local Data Backup Check Mark
Check Mark Check Mark Check Mark
Check Mark


Reports and Logs Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark Check Mark Check Mark Check Mark
Technical Help/Support
Telephone Support Check Mark Check Mark Check Mark Check Mark
Check Mark Check Mark
Check Mark Check Mark
Email Support Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Online Chat Check Mark

Check Mark Check Mark Check Mark Check Mark
Check Mark
Tutorials Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
User Manual/User Guide Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
FAQ/Knowledgebase Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
User Forums/Blogs
Check Mark Check Mark
Check Mark


Check Mark Check Mark
Supported Configurations
Windows Vista Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Windows XP Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Windows 2000 Check Mark Check Mark

Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark