September 6, 2009
June 14, 2009
How to write HTML code in your post
When we want to write our HTML code in our post , unfortunately we cannot write the code directly as we type.This is because whatever we write is executed in HTML and PHP form and thereby , making the actual code disappear.
There are coupleof methods and in this post we discuss one of them
firstly we need to convert following HTML parts in our code to the following
- Replace all & symbol with &
- Replace all <> with &lt; &gt;
- and finally all " with &quot;
for example- if we need to post
<code><strong>techQE code</strong></code>
we replace all to get the following code to be written
< ;code> ;< ;strong> ;techQE code< ;/strong> ;< ;/code> ;
other methods will crop up in later posts .
for any DBTS plz comment
Read more...June 10, 2009
NoKia - unKNOWN codes
Secret Codes Of Nokia Mobiles:
These special key sequences entered fromkeyboard of phone allow you to get some important information like IMEI number, release date, software version and much more.
You can also choose default language, activatenetmonitor ect.
1610/1630
*#170602112302# (software version)
1610/1611
IMEI number: -*# 0 6 #
Software version: -* # 1 7 0 6 0 2 1 1 2 3 9 2 #
Simlock status: - # 9 2 7 0 2 6 8 9 #
2110
*#9999# (software version)
2110i/2110e
*#170602112302# or (depends on model)*#682371158412125# (software version)
NOKIA3110
*#06# -IMEI
*#3110# -Software version
##002# - allows to turn off voice mail.
*#7780# - restore factory settings
*#746025625#(or *#sim0clock#) - to check if clock of sim (SIM-Clock) can be
stopped (SIM-Clock-stop is akind of standby mode which saces battery)
*#92702689# (or *#war0anty#) -"warranty code:"- you have to enter one of the
following codes:
6232 (OK)displays month and year of production date (ie "0198")
7332 (OK) - displays date of last repair - if there is (ie. "DATE NOT SAVED")
7832 (OK) - displays date of purchase - if there is (ie. "DATE NOT SAVED")
9268 (OK) -displays serial number
37832 (OK) -sets purchase date in format MMYY (MM - month, YY - year)- attention:
you can set it only once, so beware !
87267 (OK)-displays message "Confirm Transfer?" - meaning is unknown (?)
* # 9 2 7 0 2 6 8 9 # -Simlock info
*#31# (call) -sets if your phone no. will be hidden or not (works only in some
networks)
*#76# (call) -sets if target phone number when you call should be displayed (works
only in some networks)
*#77# (call) -(work s only in some networks)
*#33/35# (call -displays message "Service not active".
**31# (call) -your no. will not be showed to others when you make a call
3210
*#06# -IMEI
*#0000# -software version
*#92702689# (or *#war0anty#)- enters service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system Enhanced Full Rate .
*4720# -Turns on battery save mode - saves about 30 % of energy.
#4720# -Turns off battery save mode.
xx# -Replace xx with desired phonebook entry - press # and you will see it on
display.
51XX
*#06# -IMEI
*#0000# - Software version
*#92702689#( or *#war0anty#) Enter service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system - Enhanced Full Rate.
*4720# -Turns on battery save mode - saves about 30 % of energy.
#4720# -Turns off battery save mode.
#pw+1234567890+1 -provider lock status
#pw+1234567890+2 -Network lock status
#pw+1234567890+3 -Provider lock status
#pw+1234567890+4 - SimCard lock status
NOKIA 61XX
*#06# -IMEI
*#0000# ;-*#99 99# (Nokia 6130)
*#92702689# (or *#war0anty#) Software versionEnter service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system - Enhanced Full Rate.
*4720# -Turns on battery save mode - saves about 30 % of energy.
#4720# -Turns off battery save mode.
NOKIA8810
*#06# - IMEI
*#0000# -Software version
*#92702689# (or *#war0anty#) Enter service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system - Enhanced Full Rate.
*4720# -Turns on battery save mode - saves about 30 % of energy
#4720# -Turns off battery save mode - saves about 30 % of energy
NOKIA99OO
*#06# -IMEI
*#682371158412125# -Software version
*#3283# -Displays week and year of manufacture, ie. 1497 means 14th week of 1997.
NOKIA 911O
*#06# IMEI
*#0000# SOFTWARE VERSION
*3370# Turns on sound encoding system - Enhanced Full Rate.
#3370# Turns off sound encoding system - Enhanced Full Rate.
*4720# Turns on battery save mode - saves about 30 % of energy.
#4720# Turns off battery save mode.
NOKIA 81XX
*#06# IMEI
*#8110# Software version
xx# Replace xx with desired phonebook entry - press # and you will see it on
display
*#92702689# (or *#warOanty#)
"Warranty code:" - you have to enter one of the following codes:
9268 (OK) displays IMEI (International Mobile Equipment Identification)
6232 (OK) displays date of manufacture in format MMYY (MM - month, RR - year)
7832 (OK) displays date of purchase
7332 (OK) displays date of repair or upgrade
37832 (OK) sets date of purchase in format MMYY (MM - month, RR - year) -
attention: you can set it only once, so beware !!!
87267 (OK) transmits user data/move data do service PC
How To Take Screenshot Linux ( Ubuntu )
There are several ways to take a screenshot Linux in general.
If you aren't using GNOME, then the GNOME-specific items won't work.
One way to take a screenshot in Ubuntu is to go to the main menu:
Applications —> Accessories —> Take Screenshot.
You can also take a screenshot of the entire screen by pushing the
"Print Screen" (PrtSc) button on your keyboard. To get a screenshot of
only the active window, use Alt-PrtSc.
How to Take a Screenshot in Linux With the Terminal (ImageMagick)
If you need a delay before taking the screenshot (for example,
to get a screenshot of a menu that would disappear if you took
a screenshot with GNOME) ImageMagick is the best way.
make sure you have ImageMagic installed: type import -version in the terminal.
If ImageMagick is installed, you will see the ImageMagick version number.
To install ImageMagick in Ubuntu (or any Debian-based distro),
just type sudo apt-get install imagemagick.
To take a screenshot in the terminal with ImageMagick,
type the following line into a terminal and then click-and-drag
the mouse over a section of the screen:
import MyScreenshot.png
GNOME will beep once when the screenshot begins, and once again when the
screenshot is complete. Then type eog MyScreenshot.png in the terminal to
view your screenshot. "eog" is the command to start Eye of GNOME.
To capture the entire screen after a delay (so you can open some menus or whatever),
type sleep 10; import -window root MyScreenshot2.png.
The first part of that line, sleep 10; will give you a 10 second delay before
the screenshot begins. The next part, import -window root,
tells ImageMagick to import the "root" window — that is, the entire screen.
The last part MyScreenshot2.png is the name of your screenshot.
To install scrot (on Ubuntu) type:
sudo aptitude install scrot
To take a screenshot in Linux from the terminal with scrot type:
scrot MyScreenshot.png
To get a screenshot and immediately open it in the GIMP, type:
scrot -q 85 -d 5 screenshot.png && gimp screenshot.png &
The -q option sets the quality. The -d sets the delay.
The && means that if the first command is true, then execute the second.
The final & means to run the commands in the background so that you
can still use that terminal for other commands.
To take a screenshot with the GIMP,
find the following menu option: File —> Acquire —> Screen Shot.
You will then be offered some options for the screenshot such as length
of delay and whether you want to take a screenshot of the entire screen, or just a window.
Snapper Firefox Screenshot Extension
to take a screenshot of a section of a web page, use Snapper.
A great Firefox extension for taking screenshots is called ScreenGrab.
ScreenGrab will take screenshots of entire web pages
even the parts that run off the screen. Read more...
How to take Screenshots
This document describes how to capture an image of the screen in Windows (all versions).
- Press the PrintScreen key on the keyboard
to capture an image of the entire screen and store it in the Windows clipboard.
- Press Alt & Print Screen (sometimes labeled as Prt Sc)
When the desired image is stored in the windows clipboard
(only one image can be stored at a time), it can be extracted
by opening a word process program (Microsoft Word, Microsoft Publisher, etc.)
or an image manipulation program (such as Adobe Photoshop or Microsoft Paint),
and selecting Paste from the Edit menu or press Control & V.
In Windows Vista
In Vista (except in Home Basic), there is a tool called the Snipping Tool.
To open it, click on the start menu, type 'snip', then hit enter.
The Snipping Tool opens, and a white mask is applied on the screen.
In the drop-down menu for the 'New' button, choose from a free-form snip,
rectangular snip, window snip, or full-screen snip.
In free-form snip mode, draw around the area you want to be captured.
Drag a rectangle in rectangular snip mode. For window snip mode,
select the window you want to capture. In full-screen mode, just selecting it
from the drop-down menu makes the capture.
The snipped image is then opened within the Snipping Tool, but is also copied
to the Windows clipboard for use in other applications. Read more...
June 9, 2009
Introducing - Computer worm
In computer terminology, a Worm is a self-replicating threat that travels
through a network and settles in a computer via a variety of online applications
like e-mails, chat clients, P2P clients, etc. A worm does not attach itself to any
program that explicitly needs to be executed for its spread. Instead, it travels
through networked applications and primarily replicates itself up to a point
where the network is clogged with its clones, preventing it from being used by
legitimate applications.
The different types of worms you could encounter are:
E-mail worm:
This type of worm uses e-mail as its vehicle. When an infected e-mail reaches
your inbox, it does nothing unless the e-mail is opened to be read. When you
open the mail, you may see an attachment or a link to a real or fictitious web site.
The moment you click on the link and visit the web site, the worm gets triggered.
Once activated, it starts searching your address book and sends e-mails to your
contacts. It can even fake the sender’s address, so that the recipient assumes that
the mail is not from someone he knows. Clearly, across an office network consisting
of tens or hundreds of users, the numbers of ficticious e-mails traversing the mail
servers grow exponentially over a short time. E-mail worms often bring down
mail servers and clog their functioning.
File sharing network worm:
This worm generally proliferates through a shared folder of a machine.
It creates a copy of itself and masks its intent by using a seemlingly harmless
and unassuming name. The moment you connect to a networking site like ‘kazaa.com’
and your sharing folder gets accessed, the copy of the worm moves from your computer
to other computers in the file sharing network. With millions of computers actively
being used to access files from peer-to-peer networks, these worms can proliferate
very quickly. Another popular type of worm is the instant messaging worm
(similar to the email worm, but uses an instant messenger service as its vehicle).
Trojan:
Trojans are malicious programs that pose as legitimate applications.
When users execute such programs, blissfully unaware of their real intent,
the host computer gets infected. Once on your computer, it may strike in a
variety of ways, ranging from capturing what you see on your screen to logging
what you type. The captured information is then sent to the author of that
malware through the Internet. You could therefore stand to lose precious data,
bank passwords and the like. The different types of Trojans include remote access
Trojans, where others can gain access to and even take over your machine,
data sending Trojans that scan your computer and send data to the author, and
destructive Trojans that simply delete files on the host computer. Trojans can also
infect your computer and you may face denial of service (unavailability of data).
Trojans even have the potential to counter anti-virus software by changing their
coding DNA (a process known as polymorphism), making it harder to detect.
Some Trojans are developed such that they will only be activated on particular
dates, or when certain pre-defined conditions are met by the computer.
These Trojans are known as ‘Time bombs’ and ‘Logic bombs’ respectively.
Spyware Like Trojans, Spyware is also a type of computer application, developed
with the intention of stealing information from your computer. These applications
can steal data including the history of web sites you have visited, passwords that
you have used to access online secure services, etc . However, unlike Trojans and
worms, spyware cannot replicate but it does exploit the host computer for
commercial gain. These include everything from throwing unsolicited
pop-up advertisements, capturing your web browser’s home page and
directing it elsewhere. This type of application cannot spread by itself,
therefore its efficacy depends solely on whether you choose to install the
software. Since users wouldn’t intentionally install applications that are
detrimental to their interest, spyware represents itself as a utility application,
for example, a web accelerator, a free image utility, etc. Spyware often piggy-backs
on to shareware applications found on download web sites or application CDs.
Adware:
Adware is more of an annoyance than a threat. Typically found in applications
downloaded from questionable web sites, it infects the host computer by
downloading and installing other advertising material and displaying it on
your computer via annoying popups that appear while you use Internet applications.
This is where adware generally gets confused with advertising-supported software.
The latter is not malicious and only displays an advertisement within the window of
the application program (such as trial or shareware versions of software). Adware,
on the other hand, displays advertisements randomly, often when you least expect it.
The last call:
This new breed of Internet threats may or may not be harmful to users,
but they do hamper the performance of computers. To protect computers
from today’s digital threats, an anti-virus program is a good place to start.
for application suites that specifically offer protection against all of these
threats and not just ones that offer plain vanilla virus protection. In today’s
world, data security requires blanket protection systems that do it all.
You can also install anti-spyware and adware application like NoAdware,
ErrorDoctor, Spynukke, AdAware, etc. Secondly, it is important to exercise
caution on what applications and fi les are downloaded. This includes your
mail attachments.
Chain mails with attachments (such as .exe, .com, .scr, .bat, or .pif),
download sites that contain links of questionable web sites, applications
that aren’t from trusted sources should all raise a user’s alarm bells.
Most of the time, the battle against malware can be won before
it even begins—all it takes is a bit of vigilance.
Browse faster - simple tips
For those of you who have slower connections, here are the ways to speed up
your connection.Use the following tips to browse faster with a limited bandwidth.
Always use Firefox and Opera to browse the web: Both FF and Opera are faster
than IE and have got lots of Bandwidth saving features.
For instance, the new version of Gmail pre-fetches the emails for faster performance
which is a bandwidth sucker. It loads all emails including those which you have
no intention reading at that time.
Block unwanted Images:
Opera can block images via a button on the View bar.
A Firefox Add-on ImgLikeOpera does the same on Firefox.Most websites
usually contain lots of animations and images which we don’t even notice.
If you need any images, you can always load specific images
(Right click > View image on Opera and Right click > Load image on FF).
Use "Load cached images" option.
Block Flash and Adsense:
Use the Adblock Plus Firefox Add-on to block Adsense Ads and Flash animations.
A flash ad can be as big as 200 kb or even more! This add-on makes pages load
faster and saves on bandwidth. If you have ever been to Digg, you might have
noticed the number of Ads per page. How fast would the pages load if there
were no ads?
Remove the Bandwidth Intensive Plugins:
Some Firefox Add-on’s like those that bring you the Alexa ranks or Google PR,
connect with their server to bring you the stats. If you don’t need those stats,
disable those plugins. If you need the stats sometimes, but not every now and \then, then create a different Firefox profile with those plugins.
Hibernate Windows instead of Shutting Down:
Hibernation saves your desktop the way you left it
(Microsoft says that even the mouse location is saved).
Save your windows and continue work from last days end.
That’s saves a lot of unnecessary pageloads and saves bandwidth!
Use Desktop Clients like Pidgin and TweetDeck:
Pidgin is an open source chat client that can connect to multiple chat networks
at the same time. Moreover it’s a very light client that doesn’t suck bandwidth
the way Gtalk does. TweetDeck is a must have fo. It makes the twitter
experience more enjoyable by fetching the tweets so that you don’t have
to refresh your pages to see if you have new tweets.
Block Automatic Updates:
Most software have the automatic updates enabled by default.
The software detects when you are connected to the internet and checks
and downloads updates. So you loose control on your bandwidth.
Instead, Disable all automatic updates and all softwares towards
the end of the month, when you know how much usage remains.
Disable Opening of Files inline:
Browsers open PDF files and Video files inline. It might open a PDF without
telling you how big the file is. Worst part, the browser becomes non-responsive
until it completes loading the file.
Result: You waste bandwidth on a large PDF which you have no intention reading.
You can disable that in Firefox Options.
Monitor your usage:
Use a Network monitor to know how much you use and how much
bandwidth remains. It helps in planning things better.
Use a Free Bandwidth meter from ShaPlus. It’s a good one and has the necessary options.