After seeing the different versions of Windows that may be running in your environment, you will be pleased to know that Windows 7 editions are not as complex. Microsoft released 11 different Windows 7 editions, counting the different 32-bit and 64-bit versions as separate versions. Some versions you might never see as most administrators will be working with the Professional and/or Enterprise/Ultimate editions. Below is a listing of the 11 different versions:� Windows 7 Home Basic� Windows 7 Starter� Windows 7 Home Premium� Windows 7 Home Premium 64-bit� Windows 7 Home Premium N� Windows 7 Professional� Windows 7 Professional 64-bit� Windows 7 Enterprise� Windows 7 Enterprise 64-bit� Windows 7 Ultimate� Windows 7 Ultimate 64-bitA brief introduction to each version:� Windows 7 Starter � the...
Top Spywares in 2010
Appin�s research lab in Asia and Europe does regular research on spyware and malware analysis/reverse engineering and evaluates which spywares have maximum spread. The summary of research on top spywares is underneath:1. PurtyScan: is a pop-up advert. It attracts the user by giving propositions to find pornographic content/spyware on your computer and clean it. However once the user clicks it he/she will be taken to a website with much more spyware and adware waiting to infiltrate your computer.2. Gator: Gator tracks your online browsing so that it can tailor itself to your likes. The computer user is flooded with banner ads attempting to catch your attention. This often ends up on computers through sharing files on Kazaa or other P2P programs or downloading freebies from random sites.3. CoolWebSearch:...
The Spyware Trends
In one of the honeypots we had to collect spywares, the number of spywares collected hit a meter of 376 unique families and over 3000 samples in a single day which is quite high for a single honeypot. The spywares are rising in number and are spreading capability over different platforms like windows, Windows Mobile, Macintosh, Android, Symbian etc.A new trend of spyware has come into picture called Spear Spyware. The spear spyware is one which is targeted to a particular organization or a set of individuals and hence has no signature, is based on target�s infrastructure. Such kind of spywares are very difficult to detect and are meant to capture specific information like files, username/passwords, banking information, keylogs, screenshots of the target computer.Another trend obtained saw...
Flexcrypt
Flexcrypt is a cryptographic toolkit that is used for encryption/decryption of data for individuals and small businesses, for communication and storage of emails, hard drive, instant messaging text, files, folders and others. Flexcrypt has a very smooth step-wise install where the users have to provide simple and straightforward data about the location of install and other details.Once the installation is complete, Flexcrypt would automatically open up (when the option in the last step of installation to Launch Flexcrypt is enabled). When Flexcrypt runs on your system, you would see the small lock image in your task pane notifications to indicate that it is running.Once you have installed Flexcrypt, running it and using it every single time is a piece of cake. This is the easiest installation...
Label:
Privacy Tools
A Brief History Of Linux Text Editors
Years ago, text files were primarily used for system administration-related files, such as startup scripts and configuration files. But as computers evolved, people began using text files to write essays and term papers for school work. However, once the home computing market grew and word processors came onto the scene, those text files were once again relegated to system administration functions. It is in this environment that text editors such as the MS-DOS Editor and Windows Notepad were created.Although text files are still used for system administration purposes, they�ve taken on a new purpose. Specifically, text files are used to create all sorts of tools, from desktop programs to sophisticated Web pages. To be sure, programmers creating desktop programs use programs that give a complete...
Keep Your SSD Windows 7 Installation Under Control
Try to find more places to save room, hopefully keeping your SSD from filling up too fast. Because many Windows operations for installing new programs, creating temp files, and saving work default to the drive where you installed Windows, it�s very easy to fill up a smaller SSD even if you store the majority of your data on a separate hard drive. You need an ongoing strategy to keep your OS drive slim and trim.Restore Space With System RestoreIntroduced several Windows versions ago, System Restore can be a true lifesaver when a Registry mishap, destructive virus, or bad program/driver install whacks your system. It has saved us more than once from a full Windows reinstallation. However, this tool is also a space hog.To manage the space System Restore occupies, start by right-clicking Computer...
Is Ubuntu right for you?
New users to Ubuntu may find that it takes some time to feel comfortable with the operating system. You will no doubt notice many similarities to both Microsoft Windows and Mac os x, as well as some things that work very differently. Users coming from Mac os x are more likely to notice similarities due to the fact that both Mac os x and Ubuntu originated from Unix. Before you decide whether or not Ubuntu is right for you, we suggest giving yourself some time to grow accustomed to the way things are done�and expect to find that some things are different to what you are used to. We also suggest taking the following into account:� Ubuntu is community based. That is, Ubuntu is made, developed, and maintained by the community. Because of this, support is probably not available at your local computer...
Will my XP software still work if I upgrade to Windows 7?
Almost certainly. Most programs that work in Windows XP and Windows Vista will have no trouble in Windows 7, though there are a few exceptions, of course. To confirm that a particular program works in the new environment, look it up at the Windows 7 compatibility center. Once there, you can browse through program types or search by the program�s name. or visit the program�s Website and see what it says on the matter. If you discover that a program you want to keep and continue to use does have a problem, you have four options.1. Run the program in XP compatibility mode. Right-click the program file or a shortcut to the program on the Start menu, and select Properties. Click the Compatibility tab. check Run this program in compatibility mode for and select one of the XP options from the pull-down...
2010 Processors You Care The Most About
Cores and threads were a common theme if you shopped for a processor in 2010. AMD and Intel both released models with six cores, while the quadcore models got a little faster. We also saw a greater number of unlocked processors from Intel. Unlocked Intel CPU options include the Intel Core i7-980X, the Core i7-875K, and the Core i5-655K. To find AMD�s unlocked processors, you can just look for the Black Edition label.Winner: Intel Core i7-875K$342; www.intel.comThe Intel Core i7-875K supports Hyper-Threading, Turbo Boost, and 8MB of Smart Cache. And because the Core i7-875K comes with an unlocked multiplier, you can overclock the CPU without adjusting related QPI speeds on the computer. That freedom means you don�t have to worry about making sure that the memory timings, ratios, and voltages...
Label:
Hardware review
Why can�t Windows 7�s XP Mode see other computers on my network? It can access the Internet.
Windows 7�S XP mode (part of the Windows Virtual pc) lets you run a separate version of XP inside the newer OS. The Virtual pc is a free but very large download (it contains a complete copy of XP) that works in the professional and Ultimate editions of Windows 7. If you have Windows 7 running nicely on your network, with access to the Internet, networked printers, and shared folders on other computers, XP mode is likely to disappoint you initially. You�ll probably get the Internet just fine, but not your local network. So you�ll have to set up XP for the network separately. First, however, you have to tell Windows 7 how XP should access the network. If you are currently running XP mode, exit it before moving on to this step of the process.In Windows 7, click Start, type virtual, select Windows...
Ubuntu Creating Canonical
In order to pay developers to work on Ubuntu full time, Shuttleworth needed a company to employ them. He wanted to pick some of the best people for the jobs from within the global free and open source communities. These communities, inconveniently for Shuttleworth, know no national and geographic boundaries. Rather than move everyone to a single locale and office, Shuttleworth made the decision to employ these developers through a virtual company. While this had obvious drawbacks in the form of high-latency and low-bandwidth connections, different time zones, and much more, it also introduced some major benefits in the particular context of the project. On one hand, the distributed nature of employees meant that the new company could hire individuals without requiring them to pack up their...
Integrating Chat Using the Live Feed
The Live Feed option enables users to chat live side-by-side with either streaming or static content on your website. Users access their Facebook accounts and use the status update feature to carry on conversations.The Live Feed was first implemented and made uber famous during the Presidential Inauguration of Barack Obama (see Figure 4.7). During the Inauguration, CNN streamed the events live on CNN.com and, using Facebook Connect, allowed you to chat with your friends who were also watching on CNN.com.No one could have ever expected how many people would decide to take to CNN.com and start chatting away, sharing this once-in-a-lifetime experience, with their friends. According to Mashable.com� CNN generated more than 136 million page views.� More than 600,000 status updates posted through...
What Does Ubuntu Mean?
At this point, the Warthogs had a great team, a set of goals, and a decent idea of how to achieve most of them. The team did not, on the other hand, have a name for the project. Shuttleworth argued strongly that they should call the project Ubuntu.Ubuntu is a concept and a term from several South African languages, including Zulu and Xhosa. It refers to a South African ideology or ethic that, while difficult to express in English, might roughly be translated as�humanity toward others,� or �I am what I am because of who we all are.� Others have described ubuntu as �the belief in a universal bond of sharing that connects all humanity.� The famous South African human rights champion Archbishop Desmond Tutu explained ubuntu in this way:A person with ubuntu is open and available to others, affirming...
A definition of cyber security
Cyber security can be broadly described as protecting personal/business or government digital assets from cyber attack from individuals, organised criminals or foreign governments. Cyber security encompasses three threat vectors; cyber warfare; cyber terrorism and cyber attacks. Each of these threat vectors�will need to be addressed by a country�s citizens, its businesses (private and public) and national and local governments (including a nation-states armed forces).A country�s digital infrastructure is often referred to as its strategic national asset. The major problem facing most nation-states (particularly in the West) is the lack of a central body to co-ordinate and implement military and corporate/government cyber security strategies. There is also a growing reliance in the West to...
Label:
Cyber Security
History of Ubuntu - The Warthogs
There has been no lack of projects attempting to wrap GNU, Linux, and other pieces of free and open source software into a neat, workable, and user-friendly package. Mark Shuttleworth, like many other people, believed that the philosophical and pragmatic benefits offered by free software put it on a course for widespread success. While each had its strengths, none of the offerings were particularly impressive as a whole. Something was missing from each of them. Shuttleworth saw this as an opportunity. If someone could build the great free software distribution that helped push GNU/Linux into the mainstream, he would come to occupy a position of strategic importance.Shuttleworth, like many other technically inclined people, was a huge fan of the Debian project (discussed in depth later in this...
XtraGrid Layout View
The Grid View displays data in a two-dimensional table. This topic describes the Grid View and its basic features. The Views and Levels topic provides brief information about Views in general. Like Card Views, Layout Views display data records as cards, consisting of card fields. However, unlike Card Views, Layout Views support multiple card layouts and allow card fields to be arranged within a card in numerous ways. The Layout View's features are powered by the comprehensive layout management library used in the XtraLayoutControl Suite. To use a Layout View in your application, ensure that the DevExpress.XtraLayout.vX.Y.dll library is referenced by the project. Card Layouts The Layout View represents data in a card format, where records are represented by cards, and record fields are represented...
Label:
DevExpress,
XtraGrid
XtraGrid Grid View
The Grid View displays data in a two-dimensional table. This topic describes the Grid View and its basic features. The Views and Levels topic provides brief information about Views in general. Grid View Basics The bound data is arranged in columns and rows. Each column's GridColumn.FieldName property corresponds to a unique field name within the data source. All columns are stored in the ColumnView.Columns collection. Each row can be identified by its row handle. See the Identifying Rows and Cards topic for details. The Overview of Columns and Card Fields and Rows and Cards Overview topics provide detailed information about columns and rows respectively. The Grid View is the ancestor of the Banded Grid View and Advanced Banded Grid View. The latter two display data in a tabular form similar...
Label:
DevExpress,
XtraGrid
XtraGrid Views Hierarchy
XtraGrid uses views to display data from a bound data source. This document describes the hierarchy of View classes provided by XtraGrid. Views Hierarchy � BaseView is the ultimate View class and it implements basic functionality. The class is abstract and so you cannot create instances. It declares virtual methods to work with editors, appearances, hints, details, and saving and restoring layouts, but these are implemented by class descendants. � ColumnView introduces methods to work with columns and rows/records. The class is abstract, so you cannot create instances. Columns represent fields from the bound data source, while rows correspond to data source records. ColumnView does not determine how columns and rows are arranged. The ColumnView class implements methods to manipulate columns,...
Label:
DevExpress,
XtraGrid
History of Ubuntu - Mark Shuttleworth
No history of Ubuntu can call itself complete without a history of Mark Shuttleworth. Shuttleworth is, undeniably, the most visible and important person in Ubuntu. More important from the point of view of history, Shuttleworth is also the originator and initiator of the project�he made the snowball that would eventually roll on and grow to become the Ubuntu project. Shuttleworth was born in 1973 in Welkom, Free State, in South Africa. He attended Diocesan College and obtained a business science degree in finance and information systems at the University of Cape Town. During this period, he was an avid computer hobbyist and became involved with the free and open source software community. He was at least marginally involved in both the Apache project and the Debian project and was the first...
iPhone Typing Tricks
Once you�re comfortable with the keyboard, there are further ways to make typing easier. Here are a few more iPhone typing tricks you can use to make your keyboard entry faster and easier.ContractionsWhen you want to type a contraction like can�t or shouldn�t, don�t bother putting in the apostrophe. The iPhone is smart enough to guess that cant is can�t. Of course, if you�re referring to a slope or tilt, be sure to tap the word itself to decline the change from the noun to the contraction.If you�re typing a word like we�ll, where the uncontracted word well is a common word, just add an extra l. The iPhone corrects welll to we�ll and shelll to she�ll.TIP: Other contraction tricks include itsa, which gets corrected to its, and weree, which gets corrected to we�re.Punctuation DraggingIf you plan...
Does high availability mean that a fault-tolerant machine is needed?
Traditionally, fault tolerant machines were based around hardware redundancy, and able to survive hardware failures without any break in service.High availability no longer requires such fault-tolerant machines. There are many solutions based on cluster architectures that are able to satisfy the majority of high availability needs.It should be noted that the reliability and maintainability capabilities of the platforms used to construct a cluster system are of primary importance in obtaining a system able to meet extreme availability needs.Fault-tolerant systems are used in situations when the time between a failure and complete resumption of services must be very short. Hardware reliability continues to improve (a trend that will continue for technology reasons), while software reliability...
Label:
Server Architectures
Are RISC processors dead, killed by Intel?
What drives the market to settle on an architecture is, almost certainly, the availability of applications; IA-32 (Intel Architecture 32-bit, once known as x86) has clearly benefited from this effect since the introduction of the PC. This architecture, because of its complexity, is not positioned to offer the best performance potential; but its extremely large sales volumes allowed Intel to make substantial investments in research and development (R&D), allowing its processors to match the best RISC processors (except for floating point).Development of IA-32 has not stopped, and RISC processors will have an increasingly difficult time competing with the architecture for entrylevel and mid-range systems.With the new IA-64 architecture, Intel squarely faces RISC machines on their own ground�high...
Label:
Server Architectures
Organizing iPhone Apps with Folders
iOS 4 brought a smile to the face of many longtime iPhone users with the addition of folders. Previously, app icons could not be organized except by locating them all on the same page. Each page could contain up to 16 apps, so if you had a lot of apps, you were often flipping through ten or more screens of apps to find the one you needed.Now, iOS 4 provides folders. Each folder can hold up to 12 apps, and each Home screen can have up to 12 folders�that�s 144 apps per screen, not including those in the Home row at the bottom of the iPhone display.Here are some tips on creating and using folders:� To organize similar apps into folders, tap and hold one app until it begins to wiggle, and then drag and drop it on another app of the same type. For example, to create a game folder, you can tap and...
Attack Methods used by spywares to spread
Appin has various honeypots which did studies over botnets, methods used to spread botnets which capture various attack, exploits which are used to spread spywares. Some of the examples are given below:1. Email based attacks: Ever got an email prompting you to click a link or download a pdf. Beware this is one of the most common methods used to spread spywares and there have been countless such attacks spreading out of Chinese and Russian IP addresses.2. Pornographic and free tools download websites: These websites are honeypots created to attract people and spread spywares through browser vulnerabilities being exploited.3. Spyware removal tools which act as spyware: Spyware removal tools prompt a user to check their system for spywares but the police become a thief in no time. A lot of these...
Wireless Signal Modulation
Signal modulation is a technique used to combine a signal being transmitted with a carrier signal for transmission. The receiver demodulates the transmitted signal and regenerates the original signal. Normally the carrier signal is a sine wave of a high frequency. The input signal could be digital (digital modulation) or analog (analog modulation). In either case, the three basic characteristics of a signal are utilized for modulation. The device that performs this modulation and demodulation is the modem. Modulation is often referred to as signal encoding. Analog signals can be modulated by the following methods.Amplitude ModulationFor AM signals, the output signal is a multiplication of the input signal with a carrier wave. The amplitude of the carrier wave is determined by the input analog...
Label:
Wireless Networking
WILL CLOUD BE EVIL?
Cloud computing, beside the other thousand of other meanings, refers to the possibility of running applications, or websites, on different virtualized hosts, with the benefit of scaling the need for CPU and memory instantly. The business model is in use now is a pay per cycle. Cost depends on the number of CPU cycles and the CPU-time consumed.Thomas Roth, is a german guy who has cracked SHA-1 password with rented distributed CUDA computing. Although SHA-1 160bit is thought to be,relatively, insecure, it is still used for SSL and other important implementations. This sounds even more ironic if we consider that most of the SSL CA using MD5 when Sotirov et al, in 2009, managed to crack SSL through MD5 collisions, switched over to SHA-1 few days later.New cloud cracking services are coming up....
Label:
Internet Security
Wireless Signal Multiplexing
Modulations of analog signals or digital data are concerned with a single input signal to be converted efficiently into other forms. In contrast, multiplexing is a collection of schemes that addresses the issue of transmitting multiple signals simultaneously in a wireless system in the hopes of maximizing the capacity of the system. The devices for multiplexing and demultiplexing are multiplexers and demultiplexers, respectively. If signals of the same frequency are spatially separated from each other such that no frequency overlapping occurs at any given place, then multiple signals of different frequencies can be transmitted and received without a problem. Radio stations are an excellent example of this spatial division multiplexing : AM and FM radio signals only cover the area in which...
Label:
Wireless Networking
XtraGrid Views and Levels
XtraGrid does not actually display data itself. It uses Views to represent data from the bound data source. Views specify how records and record fields are arranged. They provide multiple edit, display and customization options, provide means for changing the look and feel, etc. Views You can use one of the following Views to display data according to your needs: � Grid View displays data in a two-dimensional table. � Layout View displays records as cards while supporting multiple field and card layouts. � Banded Grid View displays data in a tabular form similar to a Grid View, while organizing columns into bands � Advanced Banded Grid View displays data similar to a Banded Grid View. However, columns can be arranged one under another, and can have different heights. � Card View displays data...
Label:
DevExpress,
XtraGrid
How Do I Become Warning Free?
If you�re starting a new project from scratch, writing warningfree code is easy. But if you�re starting from an existing codebase, it can be much less straightforward. The chances are that the first time you increase your compiler�s warning level or run a new tool, you will disappear under a tidal wave of warnings. Often these result from systemic issues with the code�common mistakes you�ve made over and over again, which have gone unnoticed until now, but each instance of which generates a warning. There are also issues that tend to �percolate� through the code generating many warnings (const-correctness in C++ is a classic example).The solution is to be pragmatic. Most static analysis tools provide fine-grained control over which warnings are generated where (via comments embedded in the...
Label:
Debugging,
Software Engineering