Friday, June 11, 2010

Flaws in man-management

As a HR executive mote world different places ku jai meetings attend karibaku hue. Ehipari eka conference re mora speech diajiba ku thila. Sethipain mu with lots of excitement  sehi place ku jaithili. Excitement ethipain sehi town re mora eka favorite general store thila. Mu last three years re jetebele ethaku ase sehi general store ru mora darakara sabu saman anithae. Sehi general store ti bahut homely lage  and taha quite big general store ate. Mu first day dina sehi store ku gali and mote darkarthiba shampoo , conditioner ,etc sales-man ku kahili debaku. Matra  sales man kahila  sehi brand ra  shampoo , conditioner sarijaichi and taha next day asiba. As a brand loyal  mu mora favorite brand ku kebe leave kare nahin. Tenu mu  pare asibi kahi mu rahithiba hotel ku palei asila. Conference three days chalila. and eha bahut  successful madhya rahila.

 

Conference sariba pare mu mora staying au one day adhika karideli jaha phalare mu sehi general store ku jai paribi . The very next day mu sehi general store ku gali . Sehi general store ra two counter thila. And two pate people purcase kariparuthile also payment kariparuthile. And mu again sehi general store re thiba mora favorite counter number two ku gali. Sethare sehi odl sales man thila. mu taku mora saman magili se kahila sehi jinisha asinahin. Tapare mu kichis window shopping kali. and payment sehi sales man ku kali jaha  sehi counter re thiba  customer karuthile.  

Mu dekhili that sales man sabu product ra rate tara MRP rate tharu 10% reduce kari billing karuthila. mu quite surprise hoigali. again total rate tharu 5% kati se mo tharu payment receive kala. Mu ekdum se surprise hoigali. Karan ete kum re ehi sabu saman miliba in today's world re  almost impossible. But my dear readers according to  Hitler, nothing  is impossible. impossible is saying it self i m possible. So mu eha think kari setharu payment kari mora saman ani hotel ku back kali.

 

Hotel re mote tike upset feel heuthila. Karan ehipari jadi chaiba tebe one day mu jetebele ehaku puni asibi setebele perhaps mora favorite general store ku au paibi nahin.Sehi store  close hoijaithiba. Tapare mu mane mane analyze kali keunthare fault rahila jaha phalare ehipari eka successfully run karuthiba mora favorite general store ti close heba pai agei chalichi !

Mu dekhili sethare payment counter boli kichi nahin. Jeun counter ru neba sehi counter re thiba sales man  sabu transaction bujhuchanti. Jjaha phalare semane nijara man mani chaleichanti. Either sehi sales man fool hoithibe or bahut clever jaha phalare se nijara dissatisfaction jaha tahara owner upare achi se, ehipari sujhauchi. Also mu mark karichi sabu super mall manankare  each floor re one  payment counter klarithanti. Matra here five sales man achanti and they are also transaction dayitware achanti.

 

Ehithiru eka conclusion ku asi hauchi as a owner tame sabu belle sajaga drusthy rakhithiba and also one window system sabubelle payment pain rakhiba.

 

Subscribe to My Feed , Subscribe to My Twitter
Technorati Tags: ,,,,
Wednesday, June 09, 2010

premier commenting system available on the Internet for blogs and websites

You can give your blog readers the opportunity to better engage your blog's content and each other.The value of insightful comments,end to maze of sub-par comments and responses.comment voting,cutting through all of the other nonsense comments,subscribe to comment RSS feeds can be found on premier commenting system available on the Internet for blogs and websites named IntenseDebate.After installing this you will notice increase in reader engagement,enriches your site's community,reply by email,threaded comments,social traffic drive,comment voting.IntenseDebate supports install process for WordPress, Blogger, TypePad, and Tumblr with more .You can install IntenseDebate on a custom site also generic snippet of JavaScript for custom installs also available and all this for free !

 

Creating an account is a piece of cake , just visit here ,choose a username, enter your email and password and done.To Install Intense Debate go to www.intensedebate.com and enter your blog or website url and select "Get Intense Debate” and follow the steps through install process.One short coming is that it will not achieve yours existing comments only the newer comments will show up  in the Intense Debate and the older comments before this installation will stay but not show of in the IntenseDebate charter.By default, all of your previous comments will remain as they are.Sorry there is one way to import all these previous comments to Intense Debate in one go,but sadly as per my knowledge goes Blogger importer and exporter are currently disabled due to some bugs.Just check the site if they have updated it or so.

One thing named as Avatar / Gravatar is of good integration and especially if you have Gravatar then it will show nice to you in yours comment profile.Twitter & FriendFeed integrations there and it is common and now-a-days prerequisite.OpenID sometimes not working, and the installation on Blogger is not automated at least in my system security setting and it is is unlike disqus so you have to manually edit HTML in blogger, I do not know whether this has been corrected or not but be sure to check it out.It works excellent with IE8 so install while on IE 8.It is for sure after installing this you will notice yours blog’s slow appearance as it uses java script and usual java script is slow to load.

 

Sometimes in some browsers IntenseDebate comment system not showing so it is better to enable JavaScript and then check yours blog and it will resurface.So install IntenseDebate the premier commenting system available on the internet for yours websites/blog before anyone does.

  Subscribe to My Feed ,Subscribe to My Twitter
Technorati Tags: ,,,,
Tuesday, June 08, 2010

Unique Bharat (India):2

  • Satya juga re India ku Bharat boli kuha jauthila.

  • Aryabhatta zero digit ku world ku deichanti.

  • Chess ra invention India re hoithila.

  • World's First Granite Temple heuchi Brihadeswara temple . Eha  Tamil Nadu re Tanjavur thare abstita .

  • World's first university heuchi Takshila. Eha 700 BC re pratistha karajaithila.Ethire  10,500  tharu adhika  students from all over the world ru study kariparuthile also 60 ru adhika subjects upare teaching  diajauthila.

  • "pi" ra value  6th century re  first Indian Mathematician  Budhayana calculate karithile. Pare ehaku  Pythagorean Theorem  bhabare samaste janagala.

  • Ladakh valley re thiba the Dras and Suru rivers majhire Baily  Bridge abasthita. Eha world ra sabu tharu Highest bridge  . August  1982 re  Indian Army nka dwara eha nirmana karajaithila.

Eha thila some specific information of Bharat and eha second edition Unique Bharat edition ra and this time eha Odia re lekhagala .

Subscribe to My Feed ,Subscribe to My Twitter
 
Technorati Tags: ,,
Monday, June 07, 2010

What are fallacies?

 

Fallacies area unit deserts that soften give-and-takes. By encyclopaedism to face for them in your  and extras' written communication, you can fortify your knowledge to  the words you construct, promise, and discover. It is evidentiary to cognise  thing about fallacies: opening , dishonest  words area unit absolute , very uncouth and can be quite an convincing, at minimal  to the causative   or . You can find out wads of happenings of deceitful abstract thought in publishing firms, promotional materials, and opposite communicators. minute, it is s hard-fought to assess whether an contestation is . An disputation  be very feeble, middling watery, moderately reinforced, or very strengthened. An word that has  s or effort power have some severe parts and some washy unspecified s. The mental object of this but to helper you bet critically at your personal  argumentations and motivate them .

 

Fallacies expanse organisation geographical area that relent utilise.- By encyclopaedism to visage for them in your  and specials' codified human action, you can inclose your psychological feature to  the Good Books you create mentally, dedication, and name. It is indicant to cognize  abstraction about fallacies: motility , dishonorable  computer memory units domain thing living , very  and can be quite a an disenchanting, at least  to the responsible   or . You can line up out slew of s of  technical  mentation in business stable s, subject matter s, and diametric souls. distance, it is s rocklike- to judge whether an arguing is . An difference of opinion  be very weak , mediocre diluted , fairly , or very strong . An Good Book that has  s or movement exponent have some  component and some weak ones. The psychical cognitive content of this but to benefactor you look critically at your personation  debates and propel them at peace from the "namby-pamby and toward the "merchandise  alter of the indication.

 

Educator verbal creation taxs want you to make an evidence- is, to inform argues for a special demand or explanation you  swing . You  have been told that you call for to make your debates more orderly or stronger. And you have upset that you only ' a dianoetic being or wondered what it average for an difference of opinion to be equipotent. eruditeness to make the good contentions you can is an  bear on, but it isn't unsufferable:  is thing anyone can do, with usage!

 

Subscribe to My Feed ,Subscribe to My Twitter
 
Technorati Tags: ,,
Sunday, June 06, 2010

Vipre Antivirus Suit does it again !

In my recent visit to India I bought Chip-Intelligent Computing ,computer related monthly . One Chip dual layer 8.5GB DVD there with it. In the afternoon ,after a hectic scheduling of meeting and some seminars, I reached in my lounge.Then i insert the DVD into my laptop and went to the tools section and security subsection of it.

There I saw one file SetupDr.Alex 5.93 MB. My laptop is protected by Vipre Antivirus Suit.On double clicking on the SetupDr.Alex ,Vipre Antivirus Suit on system trey gives me a warning message :

 

A known bad programme attempting to run was blocked –Program:SetupDr.Alex (Trojan) Risk name: Trojan.Win32.Generic!BT

 

Why I want to install it simple I want it to review and publish in the blog for you but Vipre Antivirus Suit sees it in as Trojan, interesting I do not have any idea whether it is a false positive or a real one but as usual I go with my anti virus suit that is Vipre Antivirus Suit.

What is Trojan:

Trojan is a general term for malicious software that is installed under false or deceptive pretenses or is installed without the user's full knowledge and consent. Most Trojans exhibit some form of malicious, hostile, or harmful functionality or behavior.

 

Further more Vipre Antivirus Suit recommends : 

 

This is a high risk and should be removed immediately as it may compromise your privacy and security, make dangerous changes to your computer's settings without your knowledge and consent, or severely degrade your computer's performance and stability.

 

Vipre Antivirus Suit gives the analysis of this which is as follows:

 

<?xml version="1.0" encoding="UTF-16"?>
<APEvent SchemaVersion="4.0.0" DefaultConfig="false" EventTypeEnum="2" TimeoutInSeconds="0" MonitorID="3001" MsgID="{51EB06A3-C9C7-4CB4-B449-5A950091AD84}" MonitorTypeEnum="3" RecommendScan="true" SDKVersion="4.0.3248" ThreatDefVersion="5756" APEventID="{9BF37C57-3B49-4642-8DAD-0B1C2A39D276}" IsAllowOk="true" IsAllowAlwaysOk="true" IsBlockOk="true" IsBlockAlwaysOk="true" IsQuarantineOk="true" EventActorEnum="2" EventDateTime="2010-05-27T14:02:52">
<LaunchMonitor FilePath="G:\fscommand\SetupDrAlex.exe" FileSize="6225352" MD5="7b1e81bfd59e2d74f0477df2e24aaf2a" CRC8="4F5EADAB21D30000" KnownAsEnum="2" ThreatID="4150696" AddedToUserKnown="false" Company="" FileVersion="" ProductName="" ProductVersion="" Description="" Copyright=""/>
    <FinalDispositionInfo DispositionEnum="2" AuthorityEnum="2" QuarantineStatusCode="1" QID="" UserName="" ErrorEnum="0"/>
</APEvent>

 

follow me on twitter ,get email updates
This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.
 
 
Technorati Tags: ,,,,,,,,,,,
del.icio.us Tags: ,,,,,,,,,,,
Saturday, June 05, 2010

about ittech

blog consists of five categories; system tech & tips , travel , recipe , management and poetry. System consists of freeware, free shareware promos, free full softwares and killer tech tips. Travel consists of travel and tourism and elaborate dissection of various travel knowledge based articles .Conventional, ancient as well as modern recipes tried and tested. Management articles especially that up HR, STRESS related from my personal HR experiences. Poems written by me during my holidaying time as well as leisure weekends. Coming soon knowledge-based articles on BLOG-MONEY-MAKING, MONITISING THE BLOG and AFFILATE MARKETING.

Wednesday, June 02, 2010

What is DNS:

Domain Name System (DNS) is a hierarchical or distributed database that contains the mapping of DNS domain names of various types of data ,such as IP addresses .DNS enable the location of computers and services by user-friendly names , and it also enables the discovery of other informations stored in the database.(Microsoft ).Domain Name System (DNS) is the translation of human friendly computer names (such as websites) to computer IP addresses in a way computers understand. Once armed with an IP address, your computer can communicate directly with it's intended destination.(Comodo).

 

Authoritative DNS:

 

Authoritative DNS refers to the servers in the Domain Name System that are responsible for giving the "authoritative" IP address for the domain name you are asking for or telling you where else you should look for that answer. (Comodo).

 

Recursive DNS:

 

Recursive DNS refers to the portion of the overall DNS system that, when asked for the IP address of a specific domain name, will get the response. Recursive servers many a times use cached  in memory so speed up in browsing.Sometimes it will have to start querying authoritative servers to get the answer.So, recursive server make browsing  quick, efficient, and safe manner if proper and secure DNS used like OpenDNS or Comodo Secure DNS and as far as my knowledge goes both are free to use.

 

To manually configure TCP/IP to use DNS :

 

Open Network Connections.

Right-click the network connection you want to configure, and then click Properties.

On the General tab (for a local area connection) or the Networking tab (all other connections), click Internet Protocol (TCP/IP), and then click Properties.

If you want to obtain DNS server addresses from a DHCP server, click Obtain DNS server address automatically.

 

If you want to manually configure DNS server addresses, click Use the following DNS server addresses, and in Preferred DNS server and Alternate DNS server, type the preferred DNS server and alternate DNS server IP addresses. Here the concept of Comodo Secure DNS or OpenDNS comes.These manually change in setting may increase yours browsing speed to a great extent and I will be writing some articles in the coming days over these DNS.As these DNS browsing speeds depends upon their cache and apparently both these services have mammoth cache which ultimately speeds up browsing.Quality of service, security, and reliability of these DNS service providers is of paramount importance.

 

*follow me on twitter * **get email updates**

 

This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.

 

Technorati Tags: ,,,,,,
del.icio.us Tags: ,,,,,,
Tuesday, June 01, 2010

Display proudly your Followers on Blogger/BlogSpot:

Bloggers' following feature enables to show off yours followers in yours blog in a way By following your blog, your readers tell you and the world that they’re a fan of what you post.Yours dashboard will show number of yours followers,a click on the Followers icon, you can browse your followers, observe their activities and what they are writing and what they are thinking about yours blog.In this way you can know who are followers of yours blog and now we will discus how to show it off in yours blog.

 

Your followers can stay updated with your blog with the Reading List inside their blog dashboard The Blogs I’m Following tab automatically shows the latest posts from all the blogs you follow. You can follow any blog even blogs that haven’t added the Followers widget or aren’t hosted on Blogger. Just click the “Add” button and type in the blog’s URL.

 

 

You can show them off by adding the Followers gadget to your blog’s sidebar. From the “Layout | Page Elements” tab, click “Add a Gadget” and select “Followers” from the gadgets list. The Followers gadget shows the profile pictures of your followers and gives your readers a “Follow This Blog” link to join up,

With Google Reader see a special folder in Reader called “Blogs I’m Following,” .You can follow blogs subscribe in the reader in addition to it.From the Reading List on your Blogger Dashboard, click “Add,” then “Import from Google Reader.”

 

Sources & Citations : Blogger Buzz

 

follow me on twitter **get email updates**

 

This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.

 

Monday, May 31, 2010

Savitri Amabashya- the Sada Suhagan Festival

Savitri Mabasya, “the Sada Suhagan Festival of Hindu girls and women” is fast approaching. The mythological significance of the festival dates back to the legendary saga of Savitri and Satyaban of the days of yore.

 

Whether it is a story or a fact is immaterial to me, but the lasting and living impression it has on a very large section of Hindus can hardly be over-emphasised. I believe that it has its definite root, otherwise the fruit of faith would have been unthinkable. That the practice of observing the festival with its annexed austerity by the Hindu girls and women from time immemorial is based upon facts of the incident described in “Savitri Puran”.

 

Satyaban as described in the epic verse was gifted with a short life-span, well known to Savitri who had intense love for him which culminated in their magnetic marriage. How she chased Lord  Jamaraj, the God of Death and Retribution and won back her husband with her sharp intellect and resolute will executed with onerous dedication and faithfulness is an oft-quoted achievement unparalleled in the history of Hindu women annals.

 

All girls and women including children of the sex of the Sevak Brahmin families of Lord Jagannath of Puri observe this festival with much austerity and religious fervour every year, fasting althrough the day. All available varieties of fruits in the locality are prchased and offered to Goddess Savitri and are only eaten in the evening and without anything else intake till the ensuing dawn.Savitri Amabashya is the revelation of Hindu cultural intensity and wife-husband perennial bond which many others are found emulating.

*follow me on twitter *
**get email updates**
This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.

Technorati Tags: ,,,,,,,,,,
del.icio.us Tags: ,,,,,,,,,,
Sunday, May 30, 2010

7How I Wonder What you are!

By Prosumer

The other day when I was in a market at Mumbai VT, I was attracted by the varieties of sweets and the scent of a cluster of shops which were as decorative as they were attractive to look at. I was utterly at a loss to decide as to what way to move and which shop to land in. I found a sweet shop way ahead in attractiveness than the others, though the rates displayed on the menu chart were slightly higher.

 

I was not bothered about the cost-factor. What prompted me to go to that shop was the show case where some samples of food-stuff were displayed. The owner was well-mannered wearing a winning smile across his lips with a pair of specs with gold lining.

 

I asked for the Menu and soon the chart came with a saluting waiter. I ordered for a few sweet dishes and some snacks. Within 15 minutes all items of my order found the table. I finished all that I ordered in grand fashion and with great satisfaction. Then the waiter came with the bill which was not only higher than 10% over and above others, but water and waiter were also charged. The overall expenditure for me was 20% more than what normally should have been.

The real situation was that the shop I was in was not a sweet shop, but it had catering license for which it took 10% service tax. Again, he was taking 10% cost over and above other sweet vendors because he had to purchase the sweets at the catalogued rate from the nearby shops just after orders were placed with the waiters. His arguments were persuasive as he claimed that as he had to purchase at a higher rate, he had to pass on the cost burden on the customers. But I was bemused.

*follow me on twitter *
**get email updates**
This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.
del.icio.us Tags: ,,,,,,
Technorati Tags: ,,,,,,
Saturday, May 29, 2010

CrystalDiskInfo reviewed

Introduction:

CrystalDiskInfo is a HDD/SSD utility which supports S.M.A.R.T.,a part of external USB disks , monitoring health status and temperature ,graph of S.M.A.R.T. information ,control AAM/APM settings .CrystalDiskInfo is distributed under The modified BSD License.  CrystalDiskInfo does not support Windows 95/98/Me/NT4. CrystalDiskInfo supports only IDE (Parallel ATA) and Serial ATA disks connected internal ATA controller. CrystalDiskInfo supports a part of USB-HDD. CrystalDiskInfo does not support RAID disks and IDE (Parallel ATA) and Serial ATA disks connected external ATA controller.

About:

Zip edition and the installer edition of CrystalDiskInfo is available from here .For zip edition installation uncompress the zip file into any folder.If you are updating to a newer version then uncompress the zip file into the folder of previous version installed.For Installer Edition ,simply execute installer.Please remember when uninstalling if you use "Startup Feature" or "Event Log Feature", please turn off it before you execute uninstaller. You can set  alarm setting for temperature and health status.You can select auto refresh period .CrystalDiskInfo supports only IDE (Parallel ATA) and Serial ATA disks connected internal ATA controller (Chipset included). CrystalDiskInfo supports a part of USB-HDD. CrystalDiskInfo does not support RAID disks and IDE (Parallel ATA) and Serial ATA disks connected external ATA controller.

Can not open help file (manual-en.chm)You cannot open HTML Help files from Internet Explorer after you install security update 896358 or Windows Server 2003 Service Pack 1 (Microsoft support online)

Download:

Download CrystalDiskInfo before anyone does ,from here

*follow me on twitter *
**get email updates**
Technorati Tags: ,,,,,
del.icio.us Tags: ,,,,,
This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.

twitter,email updates

follow me on twitter ,get email updates
This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.

Friday, May 28, 2010

Previewing Chitika | Premium on Your Site

Of late am trying to put some ads on my site so that it will have some professional look as well as may generate revenue!Since Chitika | Premium ads will only display to your US and CA search engine traffic, you can see how they look on your site in 2 ways:of course if you are not in US and Canada.If you are from the US or CA, you can hit your page from any major search engine (Google, Yahoo, Bing, etc.)

Detail:

If you are not in US and Canada want to preview Chitika | Premium ads what way look in yours site/blog then there is some workaround which I got from Chitka website itself, it is easy.

Add #chitikatest=keyword to the end of your URL in your browser's address bar (for example - www.yourdomain.com#chitikatest=doctor) in my site say www.ittech.cz.cz#chitikatest=Prosumer

then the ad put by you in yours website from Chitika | Premium will display even if you are not in US and Canada.You will now see how the Chitika | Premium ad looks on your site for whatever keyword you used in the test (in the example, we used "Prosumer").

Chitika | Premium shows perfectly targeted ads to your search engine traffic (US and CA users)You can run Chitika | Premium on the same page as your Google Adsense ads

So try Chitika | Premium in yours website before anyone does.

Link:

Here is the link. (affl link)

 

*follow me on twitter *
**get email updates**
This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.
del.icio.us Tags: ,,
Technorati Tags: ,,
Wednesday, May 26, 2010

a-squared Anti-Dialer provides a complete defense against Dialers.

Dialers are small programs that change the Internet access number of a modem-equipped computer to a much more expensive number. Costs can rise as high as several hundred bucks per dial attempt. Dialers are small programs that either change your existing internet access telephone number or create a new internet connection on a computer system. After the program is downloaded and installed, the dialer connects to the internet via modem or ISDN-card. The existing internet connection is usually disconnected. The dialer sets itself as the default connection, then uses a very expensive phone number to dial in. Usually, dialers only work with Microsoft Windows operating systems.

characteristics:

a-squared Anti-Dialer provides a complete defense against Dialers. Scan all files on your hard disks for Dialer behavior using the Dialer scanner. The integrated background guard protects the PC from new infections.Sometimes it is possible that the system may be unstable after removing a Dialer because it already manipulated too much. Therefore it is recommended to place detected Dialer always in Quarantine first before removing it permanently.a-squared Anti-Dialer has an manual update feature which is free and do not forget it to run it from time to time so that you will always be secure and also yours money will be saved from the lackluster ideas of dialers.You do not have to be a specialist to free yourself from Malware.It is designed for both computer expert or a beginner and it is very easy to use and highly customizable.

Download:

Download now!

a-squared Anti-Dialer is free for private use only. Business users and private users who need personal support and help, please buy a Pro license.Order now.

 

*follow me on twitter *
**get email updates**

This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.
Technorati Tags: ,,,,,
del.icio.us Tags: ,,,,,
Tuesday, May 25, 2010

Tweetcount Plugin for WordPress

This plugin uses BackType Connect to find all the links your posts receive on Twitter. It shows the number of tweets you have, and lets users retweet your posts quickly and easily.Show the number of times your posts have been linked on Twitter and let readers retweet.

Features

Specify one of the following URL shorteners for retweets:

bt.io (default), awe.sm (custom), bit.ly, su.pr, digg, tinyurl. Specify the color, size and location of the

button.Specify what text you would like used for the retweets.

Installation

It is recommended that you backup your database before installing.Download the plugin.Unzip the plugin and upload the backtype-connect directory to /wp-content/plugins/ . Activate the plugin through the 'Plugins' menu in WordPress .Configure the plugin through the 'Settings' > 'BackType Connect' menu option.Click the 'Enable' button to start importing comments.

Information

Version 2.0

Last Updated December 19th, 2009

Recommended Word press 2.7+ .You can see the plugin running live on BackType blog

Download Version 2.0 for WordPress »

version 2.0 — .zip

Sources and citations: Backtype

 

*follow me on twitter *
**get email updates**
This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.

del.icio.us Tags: ,,,,,
Technorati Tags: ,,,,,
Monday, May 24, 2010

KeePass Password Safe revisited

Gone are the days, when we have single or may be couple of password to deal with, we are here in the era of web 3 and lots of interactive website, are prowning upon, which requires singing off and thus lots of log in informations to be kept in a safe chamber so that those can be remembered and can be gettable, generated with a toss of coin at will. As we are living in a cyber world where lots of malicious Trojans' lurking here and there, so not only the password management is necessity but also security and authenticity are gaining increasing importance across the spectrum of life. So, we need tools that will help us protect our critical and vital informations and documents. Personal favorite of this author is KeePass Password Safe(http://keepass.soundforge.net).

functions:

Kee Pass databases are encrypted using AES, Twofish symmetric ciphers. These are much respected security encryption mechanism. The important functionality of  Kee Pass process to disk, which normally happens , the user’s password will not be cached . In more simpler term , if you copy password from Kee Pass, to any web address , and you delayed in making paste functions, then the paste options disappears. This means that the  user’s password won’t be cached thus protecting user’s password from hacking. As passwords are hashed in Kee Pass using SHA-256, and kept in an encrypted form in the Kee Pass process memory thus stopping the windows from caching the user’s  password from caching. It is an important security condition. Even the passwords users security-enhanced password edit controls, so that even the passwords entered in these controls aren’t even visible in the process memory of  Keep Pass, thus making it a stubborn and majestic password manager.For the entire Kee Pass to open you need one master password , that will decrypt/open the complete database. You can use Key-discs as it is more stubborn and requires  a file to decrypt the database of Kee Pass.

Revisit:

It is more strong but, it i:s advisable for advanced users. If you loss the key-discs then your database loss forever, cannot be recovered. So, for basic users , one master password is good enough though it is a separate master, if one loses the master password, then also KeePass database loss forever. So, important is one has to keep safe the master password or the key-discs, whatever the case one may use. The most important part of Keep Pass is its portability/the application doesn’t need to be installed. The installer automates the creating of links in the Star Menu. Also, a binary zip package available , which maintains only  the main executable files. This one runs without installing anything. The second one is more suitable for USB drivers/pen drives/flash drives. The program does not create any Registry keys or does not create any .ini files in your Windows directory. It runs without any additional libraries. After the un-installations , the binary zip package or installer package, Kee Pass leaves no trace on one’s system. It is a super password manager . The password list create by Kee Pass be exported to various formats like TXT, HTML, XML, CSV, or its own native formats and it is compatible with password safe V2. The password list should not be hidden in windows as then the Kee Pass can show existing passwords but it will not record any new passwords. Kee Pass features a built-in random password generator , with lots of user defined options. Kee Pass has a plug in architecture but these may compromise yours security of Kee Pass, approach with caution.

Download:

KeePass Password Safe

 

*follow me on twitter *
**get email updates**
This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.

Technorati Tags: ,,,,
del.icio.us Tags: ,,,,
Sunday, May 23, 2010

Comodo Internet Security 2010 brushed up: Part 2

The firewall itself is very robust and includes an intrusion detection system (or HIPS feature -- called "Defense+" in Comodo). It also provides buffer overflow protection (a "memory firewall"), a training mode to automatically create rules for programs you trust, and a parental control password to automatically block all alerts (so children and inexperienced users do not make poor decisions on popup alerts). System scan consists of various simple function like scan of critical areas of PC or entire scan or deep scan,schedule scan with preset or custom option .Comodo is comparatively new to antivirus business, its detection rate is good,but there are some false positives but of late and on the successive versions this has been reduced considerably.Comodo’s excellence in network security has been prominent point in buying this CIS 2010 suit.Now-a-days security parameters changed ,it is completely different compared to seven or eight years back.

Lots of network vulnerabilities creates hole in the system making the system prone to malware attacks.In addition to this Comodo Secure DNS avoids yours domain spoofing and makes yours browsing experience a safer, smarter and faster Internet.Comodo's Secure DNS's server infrastructure currently spans 15 locations (nodes) and five continents around the world. This allows us to offer you the most reliable fully redundant DNS service anywhere. Each node has multiple servers, and is connected by several Tier 1 carriers to the Internet.Combine this with Comodo’s  huge cache and we can get the answers you seek faster and more reliably than ever before.As a leading provider of computer security solutions Comodo is  keenly aware of the dangers that plague the Internet today.

‘Name cache invalidation' solution signals the Comodo Secure DNS recursive servers whenever a DNS record is updated, fundamentally eliminating the concept of a TTL.

Directing your requests through our highly secure servers can also reduces your exposure to the DNS Cache Poisoning attacks that may affect everybody else using your ISP.The "Threatcast" community feature helps you respond to alerts by allowing you to see how others typically respond,but it is resource heavy and it slows down yours connection and the saddest part of all is it is hardly gives the response so if you want you can ignore it.I will be writing about Comodo Secure DNS in the days to come to have a detailed and comprehensive understanding of this functionality.

Conclusion:

It is always difficult to review a suit according to security parameters  as these are now-a-days dynamic and constantly changing and evolving with times.So, the network security is of paramount importance in security suit as Comodo has upper hand in network security through one of the outstanding firewall if manages well so CIS is gaining the upper hand.If you disable behavior monitoring in the following firewalls, then they still provide excellent inbound protection, minimal/marginal outbound filtering, and additional features such as port stealthing.Most of the suit contains the firewall and now-a-days firewalls are important for yours privacy protection as you can know which software installed on yours system is connecting yours browsers and going to internet without yours knowledge and you can then disable it .No matter how big yours security suit is  its performance depends largely with the conditionality that whether yours OS is patched or unpatched or whether you instant messenger,yours email clients or softwares where updated to the latest security features and most important aspect whether you are following the safe computing practices or not!

Follow me on twitter 

Download

  http://www.personalfirewall.comodo.com/

http://www.personalfirewall.comodo.com/download_firewall.html

http://forums.comodo.com/comodo_internet_security_cis_firewall_av_and_defense-b125.0/

Download the 200+ page PDF CIS User Guide.

http://personalfirewall.comodo.com/support.html

http://www.comodo.com/secure-dns/index.html

Sign Up Now and Receive one month free of Comodo Internet Security Pro!

 

 

del.icio.us Tags: ,,,,,,,
Technorati Tags: ,,,,,,,

CRT monitor losing control

While on leave ,invite by cousins for a get-together.I reached there and then as usual I sat with their computer for sometime. Two CRT monitor ,one is IBM (E 74) and the other is HP Compaq.There is a peculiar tendency in these CRT monitors as these automatically changes the brightness,contrast and unable to control it even through monitors built in switches. Sometimes the viewing space is wider automatically and sometimes the viewing space is shorter automatically.For these very phenomenon the start menu gone missing in the first instance and in the second instant it has been reduce to the size of a miniature.So,incidentally to work with this adverse effect monitor , is being a stress and also difficult to handle many a times as cousin subsequently add to the conversation.

 

These are obviously serious problems as for the first time I have seen ,hardware seems good and softwares and OS is good and no viruses as far as my test , so million dollar question is where is the problem and why the  monitor losing control.I advise him, to take these CRT monitors to service centre may be some lose switching problem.In response he said hen had done this earlier with no success .Then I recommended him for opting for a LCD screen but he said he wants to stick with these monitors and buying of LCD desktop not in his plan of action may be after two years .So, the bottom line so far he will be suing these monitors for next two years.

The OS in these desktops are Windows XP SP3 and I have seen these WIN XP SP 3 is sometimes causing picture grain if you have not updated to its latest critical definitions.If you have got Windows XP SP3 from OEM means with the desktop or laptop then if you install it and then the SP3 , the resultant is some times picture distortion in some CRT monitors for some PCs.So, I have advise him to add Ryan VM add-on with the existing original OEM Windows XP SP3 and make slipstreamed of it and then install the OS all over again .As I have seen  some Intel graphic drive caused some problems and hence this peculiar phenomenon appeared. This will reduce this irritant considerably.

 

In fact after slipstreamed installation this peculiar phenomenon which I describe in the paragraph one disappeared but with some restart it shows again but the movement of the screen not there.I advise him to use ASC Pro or ASC Free and run the all in one scan and this also reduce this phenomenon.I advise him to uninstall the Adobe Photoshop on his CRT monitor instead use it on LCD based monitor or laptop.There is some apprehension that the adobe Gamma setting may be causing this screen error.Turn off clear type screen fonts as it is smoothing the screens for better viewing but it is meant for LCD screen as it is not for  CRT monitor.

 

The bottom line is CRT monitor losing control is a queer problem.after the slipstreamed installation of OS , if this phenomenon again occurs then go to Intel Graphic Media Accelerator Driver,then go to its Graphic Property (Cltr+Alt+F12),Display Setting from the left broad menu,then change anything of the three available that is Color Quality,Screen Resolution and Refresh Rate and change any one quantity and then apply and then the dialogue box will appear confirm the desktop change and the dialogue box will show if you do not respond within 15 seconds ,these changes will be cancelled.Then click cancel , here you go you will then look at the desktop realise that CRT monitor losing control of its screen size and the adjust  of contrast ,brightness etc. bar is not at the centre of the desktop windows so not blocking any of yours viewing area.

 

I hope if you are facing similar type of problems like yours CRT monitor losing control and color bar in the middle of yours desktop screen then these few problem solving methods you can try upon and if you have invented then let me and the world know as it seems a  queer problem but at least we have manage it or in a sense we have quarantined it.

follow me on twitter 

Technorati Tags: ,,,,
del.icio.us Tags: ,,,,
Saturday, May 22, 2010

Delete webpage history

Specifically we will be talking about IE8 and we know most of have knowledge about it and this time here is just a reminder in case you have just forget it how to delete browsing history of IE8.It is also part of safer computing practices and also it is one of many steps you should be taking in order to keep yours system healthy and fast.Internet Explorer stores information about the websites you visit, as well as information that websites frequently ask you to provide (such as your name and address).In this way you can safeguard yours privacy on line as well as offline and if you are on a public computer then it is a must step when you finished the browsing session as you don't want any of your personal information to be left behind.

 

Internet Explorer stores temporary Internet files ,cookies ,a history of the websites you've visited,information that you've entered into websites or the Address bar,passwords  these informations.To delete all browsing history in IE8 click the Safety button, and then click Delete Browsing History. Select the check box next to each category of information you want to delete. Select the Preserve Favorites website data check box if you do not want to delete the cookies and files associated with websites in your Favorites list. Click Delete. This could take awhile if you have a lot of files and history. 
 

Conclusion: Then close all instances of IE8 ,so that the cookies those are residing still in the memory will be erased after it.You can use Internet Explorer's InPrivate Browsing feature to avoid leaving a history as you browse the web.Deleting your browsing history does not delete your list of favorites or subscribed feeds.

 

follow me on twitter 

del.icio.us Tags: ,,,,,
Technorati Tags: ,,,,,
Friday, May 21, 2010

How to use Disk Management to configure basic disks in Windows XP

This step-by-step article describes how to use the Windows XP Disk Management snap-in to configure a basic disk and prepare it for use. I got it from Microsoft KB article Q309000 .This simple information but it requires yours careful observation and Microsoft has written one very simple article on it. A basic disk is a physical disk that contains primary partitions, extended partitions, or logical drives. Partitions and logical drives on basic disks are also known as basic volumes. If you are running Windows XP Professional  you must use basic volumes, because the operating system cannot access data that is stored on dynamic volumes.You create a full back up of your disk contents before you make any changes to your disks or volumes.

 

To start Disk Management:

  1. Log on as administrator or as a member of the Administrators group.
  2. Click Start, click Run, type compmgmt.msc, and then click OK.
  3. In the console tree, click Disk Management. The Disk Management window appears.

To create a new partition or logical drive on a basic disk:

  • In the Disk Management window, complete one of the following procedures, and then continue to step 2:
  • To create a new partition, right-click unallocated space on the basic disk where you want to create the partition, and then click New Partition.
  • To create a new logical drive in an extended partition, right-click free space on an extended partition where you want to create the logical drive, and then click New Logical Drive.
  • In the New Partition Wizard, click Next.
  • Click the type of partition that you want to create (either Primary partition, Extended partition, or Logical drive), and then click Next.
  • Specify the size of the partition in the Partition size in MB box, and then click Next.
  • Decide whether to manually assign a drive letter, let the system automatically enumerate the drive, or do not assign a drive letter to the new partition or logical drive, and then click Next.
  • Specify the formatting options you want to use .
  • Confirm that the options that selected are correct, and then click Finish.

The new partition or logical drive is created and appears in the appropriate basic disk in the Disk Management window.

follow me on twitter

 

del.icio.us Tags: ,,,,
Technorati Tags: ,,,,
Thursday, May 20, 2010

Turn your photos into beautiful paintings, sketches or drawings in seconds.

FotoSketcher is a 100% free program which can help you convert your digital photos into art, automatically. If you want to turn a portrait, the photograph of your house or a beautiful landscape into a painting, a sketch or a drawing then look no further, FotoSketcher will do the job in just a few seconds.You can create stunning images to make original gifts for your friends or relatives. Create birthday cards, season's greetings stationery or simply print your work of art and hang it on the wall.

 

Different styles are available: pencil sketch, pen and ink drawing, various painting renderings. You can also improve your original photo with simple tools (enhance contrast, sharpen, simplify image, increase luminosity, color saturation etc...).

FotoSketcher is completely free .It runs on any version of Microsoft Windows , no Mac version available.

Download from here. follow me on twitter 

Technorati Tags: ,,,,,,,
    
del.icio.us Tags: ,,,,,,,
Wednesday, May 19, 2010

Display proudly your Followers on Blogger/BlogSpot

Bloggers' following feature enables to show off yours followers in yours blog in a way By following your blog, your readers tell you and the world that they’re a fan of what you post.Yours dashboard will show number of yours followers,a click on the Followers icon, you can browse your followers, observe their activities and what they are writing and what they are thinking about yours blog.In this way you can know who are followers of yours blog and now we will discus how to show it off in yours blog.

You can show them off by adding the Followers gadget to your blog’s sidebar. From the “Layout | Page Elements” tab, click “Add a Gadget” and select “Followers” from the gadgets list. The Followers gadget shows the profile pictures of your followers and gives your readers a “Follow This Blog” link to join up,

Your followers can stay updated with your blog with the Reading List inside their blog dashboard The Blogs I’m Following tab automatically shows the latest posts from all the blogs you follow. You can follow any blog even blogs that haven’t added the Followers widget or aren’t hosted on Blogger. Just click the “Add” button and type in the blog’s URL.

With Google Reader see a special folder in Reader called “Blogs I’m Following,” .You can follow blogs subscribe in the reader in addition to it.From the Reading List on your Blogger Dashboard, click “Add,” then “Import from Google Reader.”

follow me on twitter 
Sources & Citations : Blogger Buzz
Tuesday, May 18, 2010

2Education on Customer Service

Let me give you a lively recall of a recent incident of a medicine retail dealer helping me in a manner none of my friends and relatives could help me for about half a decade till then.

My requirement was the regular supply of a particular tablet of meagre cost which remained unavailable for all these years, though i had tried at every retail outlet relentlessly through self and through others, being contented with the substitute thereof which hardly gave me the comfort of the originally prescribed tablet.

 

I was not at all a customer of the new retailer i visited and my approach to him was only incidental and casual as i had made it a habit to ask every medicine shop i visited over the years hoping against hope to get the supply. The man immediately greeted me gleefully as i rushed to his shop and offered me help despite heavy rush of customers and contacted a number of dealers and whole- sellers across chennai and delhi spending his most valuable and scarce time on a trivial transaction which was a loss for him so far as the cost factor on mobile bill was concerned. But after 35 to 40 minutes of hectic trial, he seemed like hitting the jackpot as inimitable and winning smile played across his lips. He asked me to kindly give him my cell phone number so as to enable him to contact me as the consignment arrived. Indeed, the consignment arrived on the third day and i collected the booty on the third day itself without any extra charge for postal expenses which the retailer bore.

 

This was a very simple marketing strategy by the retailer which fetched him a new customer whose full loyalty is assured for him as i have decided to stay his customer for ever.

This for me is an education on customer service and a very practical and highly effective one as a single help by the retailer could shatter my brand-loyalty of four decades as i vowed to become a loyal customer of the new dealer.

follow me on twitter 

Technorati Tags: ,,,,,,
del.icio.us Tags: ,,,,,,
Sunday, May 16, 2010

Use Twitter with Text Messaging!

Twitter is more fun when used through your mobile phone. I personally prefer the web version though.Setting up using twitter with text messaging is smart easy.Believe it or not it is easy.Standard message and data rates may apply of the mobile operator.Log in to yours existing twitter account if you have not then you can create one for yours by going here.Then log in to yours account .Then at the top of yours account go to Settings, then Mobile and then you reach at a page where everything is self explanatory.

Use Twitter with Text Messagin 2

Choose your country as it seems it is not available for every country so first check whether you qualify for it or say otherwise whether yours country is in the twitter’s list then enter your mobile phone number ,then choose yours mobile career and click verify button and verify it.

 

Use Twitter with Text Messaging

 

What is the gain accessing twitter from mobile:

The prime question is what is the benefit, yes there are some benefit as it is mobile and you can twit while walking.Send tweets with text messaging on your phone.Receive texts for DMs and the tweets from users you want to be notified about.Clicking the phone icon on a users profile page or your followers page sets Tweet notifications for that user.

Do more than Tweet! Send these commands to Twitter:

RT username
Retweet a user's latest tweet
FAV username
Favorite a user's latest tweet
D username your-message
Send a direct message to a user

FOLLOW username
Start following a user
UNFOLLOW username
Stop following a user
ON/OFF
Turn all Tweet notifications on or off
ON/OFF username
Set Tweet notifications for a user on or off (you'll still be following them even if you set it to off)
GET username
Shows you the latest tweet from any user

So sign up twitter before anyone does so.

 

del.icio.us Tags: ,,,,
Technorati Tags: ,,,,
Saturday, May 15, 2010

Resetting to Learning Mode in Firewall of VIPRE® Antivirus Suit

VIPRE Antivirus is high-performance antivirus software that doesn't slow down your PC like older, traditional security products. It is a completely new breed of product that fully integrates antivirus, antispyware and with the introduction of VIPRE Premium, breakthrough firewall protection. It does not bloat.VIPRE Antivirus Premium version you get a 2-way desktop firewall, and additional, more advanced intrusion protection. This feature can be enabled and more proactively used when you use Firewall with learning mode.

resetting to learning mode in firewall of Vipre Antivirus Suit

Reset to Learning Mode:

Resets to the VIPRE Firewall "Learning Mode" default settings. Learning mode will prompt you whenever there is an attempt made for a network connection. It is more secure than the so called default protection and it is recommended. If you are running the firewall in simple mode then followings are the procedure to change it to Learning mode .In simple mode if HIPS enabled then default action will be “allow” but in Learning mode HIPS default action will be “allow with notify” so more security.File menu, select Settings. Click the Firewall tab, click Reset to Defaults.Reset Firewall Defaults dialog box displays. Reset to Learning Mode: Resets to the VIPRE Firewall "Learning Mode" default settings. Learning mode will prompt you whenever there is an attempt made for a network connection. What follows is an optional step.if you suspect that one of the user-defined rules you created is causing problems and don't know which one to fix. Then select Delete all user defined firewall rules .Click OK on the Reset Firewall Defaults dialog box. Click OK on the Firewall Settings screen.then the resetting to learning mode in firewall of Vipre Antivirus Suit done.

Please remember Learning Mode,will frequently prompt you to essentially teach the VIPRE Firewall how to act. You will be prompted to take action on activity by applications and for certain Operating System actions. Your actions to the prompts can be remembered and applied to this activity in the future, by creating or modifying a rule.

So download VIPRE® Antivirus Suit before anyone does so.

follow me on twitter 

Technorati Tags: ,,,
del.icio.us Tags: ,,,
Friday, May 14, 2010

The computer keeps disconnecting from the internet

HI, today we will be talking about a situation in a dial-up connection where the computer keeps disconnecting from the internet and how to rectify.It may be yours possible solution.This could have been due to yours Internet Explorer or yours email client especially from Microsoft's setting.Let us observe it one by one.First the Internet Explorer.In Internet Explorer go to

Tools>Internet Options>Connections>Dial Up settings>Advanced Dial –up setting

 

and confirm that ‘Disconnect when connection may no longer be required ’ is turned off .

Now check Outlook Express or in my case Windows Live Mail from Microsoft.Go to

Menu (Alt+M)>Option>Connection and then turn off ‘Hang up after sending and receiving’

 the computer keeps disconnecting from the internet

Then check yours dial-up connection and observe whether yours computer is keeping disconnecting from the internet frequently now or  this problem is over.So, now you do not worry about yours computer keeps disconnecting from the internet time and again .

Follow me on twitter 

del.icio.us Tags: ,,,,,,
Technorati Tags: ,,,,,,