This isnt a tweak, but a great little feature! For a great way to put your digital photos to work, try creating a slide show presentation for use as a screen saver. Here's how:
1. Right-click an empty spot on your desktop and then click Properties.
2. Click the Screen Saver tab.
3. In the Screen saver list, click My Pictures Slideshow.
4. Click Settings to make any adjustments, such as how often the pictures should change, what size they should be, and whether you'll use transition effects between pictures, and then click OK.
Now your screen saver is a random display of the pictures taken from your My Pictures folder.
POST YOUR TOPICS HERE
Hi friends, This blog welcomes you all to post you own new tricks and tips here. For this you have to just send a mail to sendmytricks@ymail.com
Your post would be posted along with your name and location. For this you have to send a mail to the above mentioned id.
Format for sending mail.
Subject : MY TRICKS
1. Your name [will be displayed if display name not given]
2. Display name [This name would be displayed along with you post]
3. You location [For ex., Chennai, India.]
4. Post topic.
5. Details.
Pictures are also allowed. For that you need to send the pictures as links.
IMPORTANT NOTE : Please do not spam in this mail id. You can send you ideas/problems in this mail id itself.
Your post would be posted along with your name and location. For this you have to send a mail to the above mentioned id.
Format for sending mail.
Subject : MY TRICKS
1. Your name [will be displayed if display name not given]
2. Display name [This name would be displayed along with you post]
3. You location [For ex., Chennai, India.]
4. Post topic.
5. Details.
Pictures are also allowed. For that you need to send the pictures as links.
IMPORTANT NOTE : Please do not spam in this mail id. You can send you ideas/problems in this mail id itself.
Friday, May 30, 2008
Nortel Adds Web 2.0 Software
Nortel's new Adaptive Application Engine software, built around Session Initiation Protocol, allows Nortel customers to create Web 2.0 applications like social networking, blogs, and wikis with IP voice and multimedia.
Operators can choose to run the software on hundreds of Red Hat Enterprise Linux compliant servers.
The Adaptive Application Engine software provides an open programmability environment and web service Application Program Interfaces which allow third-party software developers to easily develop new applications which use call routing, presence and federated IM.
The software is designed to support both smaller service providers as well as tier one providers as well.
The Adaptive Application Engine software can be deployed as a SIP Application Server, as an IMS application server or as advanced capabilities on the Communication Server 2000.
Nortel says the new software will allow service providers to create unified communications services, federated instant messaging and IP communications integrated with Web applications.
The software also supports features such as using TVs to control calls or send instant messages.
The software also will allow service providers to create fixed mobile convergence services such as making mobile phones into office extensions and allowing calls to be moved back and forth across tethered and mobile devices.
Nortel is first among the large traditional switch vendors to make such tools available as a "bolt on" to its existing architecture. Depending on how the software is received, it could be an important step for service providers on the Nortel platform.
Up to this point there has been some skepticism that smaller service providers, in particular, would be able to create these sorts of applications on their own. The software is half the solution. Now Nortel has to pull together a developer community and make those apps available to its customers.
Exploit In Google That Turning It Into ‘Spammers Tool’
Gmails “security flaw is turning it into a spamming machine” , As Insert (Information Security Research Team) reports.
This report by INSERT, the Information Security Research Team, has created a proof of concept that said that by exploiting the flaw that forwords messege by SMTP port spammers can send thousands of messeges. But for this they are supposed to exploit the restriction of 500 bulk emails doe by Gmail. This report also state that there is kind of “trust hierarchy” established between mail providers.
You dont need very special knowldge of hacking for this , INSERT states “anyone can do this”
This document by INSERT presents a vulnerability report and a proof of concept attack that demonstrate how anyone with no special internet access privileges can access this vulnerability and send send spams through this flaw.
The report notes that with the rising volume of spam, e-mailservice providers have made black listing and white listing system for mails by which you can send spams to black lists. Through this they can block IP address of mail sender. But Gmail is spread everywhere as a whitelist member so threat level can be high.
Gmail team has no. official comment on this yet.
In past also through google calender spammers used to spam. Let us see what Google will do this time.
Wish you were here, virtually
Linuxville is such an interesting place, every knook and kranny has details and depths to explore. Besides being able to take it with you (live-CD's), you can as if you had a computer in your computer, run a second OS to see if the grass is greener. It is called a virtual machine and it is all the rage. There are realities in running virtual machines called sharing resources.
So, if you only have 512MB of memory, you would use 256MB of it to run the other operating system. That other operating system would appear to be just another application running but would "Virtually" be another computer (with less resources) running at the same time as your main OS. The effect is that things respond slower depending upon the load. It is not that bad if you have a lot of memory and a higher CPU speed. So, why on earth would you want to do this madness? What is the reason you might want more than one OS anyway?? Well, if the Wine emulator isn't working for you, you could install MS Windows as a virtual machine and run window's apps. Or like I said you could see if other Linux distros are better than what you have now. It is actually more cool because you don't have to burn a CD, just download the ISO file and run it virtually.
Virtual Machine software comes in various packages and depends upon your distro if you can easily use them. VMware is probably the oldest, most well known, then there is VirtualBox which is new and very nice to use. It is a wrestling match to install Virtualbox in Mepis but I will make the effort and tell you all about it. What I am using now is Qemu and it is so slow as I only have 512MB of memory and using KDE eats up a lot of that. But, Qemu is very easy to use. OK, here is one thing in Linux I really want and virtual machines is a big part of it. I want one application that allows me to play or view all the media files on my system. The separate programs are wonderful, but one "front-end" to manage and view it all would be great. I have raved before about Elisa Media Center as being a good looking application for this purpose. I have had terrible luck installing and getting it to run on my Mepis system, no problem in Xubuntu. I have discovered a few more apps that will do the job. They happen to be mini-Linux distros. The first one is called Geexbox. It has quirks but works on my system. Then there is LIMP which also works and Womp which works too. These distros are tiny and are just meant for playing media. I will have to see if they are fit for my needs as I don't need them to stream video or drive a TV tuner card, just view and play what I already have on my computer. Then to have the ability to use or play with all those small Linux distros is great fun. DSL or Damn Small Linux, Wolvix and Puppy Linux and several more are all great to explore. I can save my CD's for permanent collections. Those big distros I'd rather just use the live-CD, they seem to run better. The bottom line is that having as much system memory as you can afford is useful for any OS. Use older hardware if you must but realize how hard it is to support it. You will end up running older versions of Linux to do the job. Please let go of your 8088 and your 386, even 486 cpu's are a trial to support! I would consider a serious upgrade if your stuff is hitting 6 to 8 years old. Then you can enjoy all the modern gadgets and widgets.
Here is another edition of "Linux Truths", this time with a question attached. There is no one Linux that does it all because developer groups tend to focus on certain out comes, so that you can have an out-of-the-box experience. Which Linux distros seems to have the most extensive assortment of popular applications in their repositories, allow app installation without extra steps and have all this without resorting to a DVD size ISO? I ask this because .deb's compiled for one distro might not work in another. Is there a distro that has the depth and breath? Don't say Debian because I know of many applications I can't find in Debian, you have to compile them from source yourself to run in Debian. Ultimately compiling source code allows you to have custom distros. That is the very mechanism that makes software run in your distro, on your computer, specifically. To have software compiled to the "Debian" standard is a general specification. If Ubuntu, based on Debian, is designed differently than Debian, you can't actually expect all software compiled for Ubuntu to run on Debian and vice-versa. The differences might be small, but are just enough for stuff to not install or run. This is why distros usually stock repositories with software compiled to run in their distro. Same source but compiled to run in a different situation. I want to tell all you standardization cheerleaders that it is not a Linux flaw, it's a feature. This is why the same "Linux" can run on so many different types of hardware.
Does this take the fun out of Linux, no, we just see what other folks are using and experiencing. Then we try it, if we have problems or success we share it, voice it, blog it for others to be warned or encouraged. In Linuxville we call that community!!
Oregon case reveals the tie between software piracy and identity theft!
Software Piracy is a multi-billion dollar issue. Whether it's hawked in a spam e-mail, a flea market or on a auction site -- it might not work as well as advertised -- and could even lead to identity theft.
You never know what might be installed in pirated software. The person selling it to you might add a little malicious software (containing a keylogger) and steal all your personal and financial information.
A recent case showing how pirated software leads to identity theft was announced by the Department of Justice:
An Oregon man pleaded guilty today to selling counterfeit computer software with a retail value of more than $1 million, in addition to aggravated identity theft and mail fraud, announced Assistant Attorney General of the Criminal Division Alice S. Fisher and Karin J. Immergut, U.S. Attorney for the District of Oregon. This case is part of the Justice Department’s initiative to combat online auction piracy.
Jeremiah Joseph Mondello, 23, of Eugene, Ore., pleaded guilty to one count each of criminal copyright infringement, aggravated identity theft and mail fraud before U.S. District Court Judge Ann L. Aiken in Eugene. Mondello faces up to 27 years in prison, a maximum fine of $500,000 and three years of supervised release. Sentencing has been set for July 23, 2008.
Although this only appears to be a small win in the overall problem, it illustrates the danger of installing unauthorized software on your system. You might get more than you bargained for:
Mondello admitted to stealing individuals’ identifying information to establish online payment accounts in their names. Mondello acquired victims’ names, bank account numbers and passwords by using a computer keystroke logger program to surreptitiously obtain this information. The keystroke logger program installed itself on the victim’s computer and then recorded the victim’s name and bank account information as the information was being typed. The program then electronically sent the information back to Mondello, and he used this stolen information to establish the online payment accounts.
In other words, the moral of the story is that the money you save buying knock-off software can easily be lost when the seller returns to clean out your financial assets.
Trust me, criminals are not honorable and they could care less, if you get left holding the bag.
Last, but not least, most victims of identity theft are able to get their financial institutions to write-off their losses. However, if they discover you used illegal software -- which happened to contain malicious capabilities -- my guess is they are going to deny your fraud claim.
Modifying Text On XP Start Button!
There's been few articles on the Web about how to change the text on Windows XP Start button. Really that's usually not so easy (mainly because explorer.exe is a binary file that requires a special editor). Just follow this simple step by step tutorial.
Step 1 - Modify Explorer.exe File
In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.
get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip
The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.
The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.
There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!
You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.
Step 2 – Modify the Registry
!!!make a backup of your registry before making changes!!!
Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon
In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.
Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.
Step 1 - Modify Explorer.exe File
In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.
get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip
The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.
The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.
There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!
You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.
Step 2 – Modify the Registry
!!!make a backup of your registry before making changes!!!
Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon
In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.
Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.
Subscribe to:
Posts (Atom)