Increase Your Site/Blog Traffic..Register here

By Rockstar Template | Monday, November 20, 2006


to increase the traffic .. goto this link below and register .. it will increase ur trafficby making others to search about your blog using key words..

Find Blogs in the Blog Directory






DATA RECOVERY SOFTWARES....

By Rockstar Template | Tuesday, October 31, 2006


Looking for the best data recovery software can be a real nightmare when you
have just lost, seemingly irretrievably, much of your work. But if you don't
panic and look carefully for the best solution, than very often it is
possible to retrieve much if not all of your lost data.



Read full article and find data recovery software links at *
http://www.scriptinn.com/misc/datarecovery_tips/*






A GMAIL ACCOUNT WITH OUT INVITATION....

By Rockstar Template | Tuesday, October 31, 2006


If you follow my steps you might be able to open a new Gmail account. follows these steps:

1. install the Google tool bar for IE from http://toolbar. google.com/

2. then visit http://www.google. com/tools/ toolbar/buttons/ gallery or it will do it automatically after you install it

3. on the right hand side of this page http://www.google. com/tools/ toolbar/buttons/ gallery you will find most popular buttons.

4. click on G-mail add

5. it will add it on you Google toolbar

6. then in your Google toolbar there should be a button called setting and a small round thingy which I don't know what its called click there

7. then click on Sign In

8. a small logon screen will appear and on the bottom of the small screen you will see Create an account now click there and it will take you to the registering page.

9. Enter the details

10. and they will send you an invitation to your e-mail address for opening a Gmail account.






RENAMING THE ADMIN ACCOUNT IN "WINDOWS XP"

By Rockstar Template | Thursday, September 28, 2006


»Windows Vista Report »Windows 2000 Server »Windows Server 2003
by Greg Shultz

Save to my Workspace
Takeaway:
Make it twice as hard for a potential hacker to get into your system by renaming the Administrator account. Here's how to do so in Windows XP Home and Pro.

--------------------------------------------------------------------------------

The Administrator account exists on all computers running Windows XP Professional and Home. This gives potential hackers, half the information they need to access your computer—all they have to do is guess your password.

You can make it more difficult for unauthorized persons to get into your system by renaming the Administrator account. Follow these steps for a Windows XP Pro machine:

Go to Control Panel and open Administrative Tools. Double-click the Local Security Policy.
When the Local Security Settings snap-in appears, double-click Accounts: Rename Administrator Account policy.
When the Accounts: Rename Administrator Account Properties dialog box appears, type a new name in the text box, and click OK.
Follow these steps to rename the Administrator account in Windows XP Home:

Press [Windows]R to access the Run dialog box.
In the Open text box, type Control userpasswords2 and click OK to access the User Accounts dialog box.
Select the Administrator Account from the list and click the Properties button.
In the User Name text box, type a new name, and click OK.






THE HACKERSSS

By Rockstar Template | Sunday, September 24, 2006


Hackers are the people who hack a system in network.
There are three types of hackers.They are :-

1) White-Hat Hackers
~ ~ ~ ~ ~ ~ ~ ~

This are the hackers who hack a network to check
the security holes.
He use his knowledge to make better security for users.He share
his knowledge with
others.Ethical hackers or simply hackers are under this group.

2) Black-Hat Hackers
~ ~ ~ ~ ~ ~ ~ ~

This are the hackers who hack a network and
distroy all he wants and
he do harm to every one.He works for black undergrounds. He create
viruses,worms and
he bombs anonymous mails,and he uses D.O.S (Denial Of Service)
attack to make a server
hang and become offline.He is called Cracker.If you see some
sites with skulls and some
XXX pictures it can be crackers site.He don't want to share his
knowledge and he want to
misguide newbies to nithing and fed-up with disappointment.

3) Brown-Hat Hackers
~ ~ ~ ~ ~ ~ ~ ~

This are the people who are in between Hackers and
Crackers.They some times
hack and else crack.They are cool people and share there
knowledge to there friends or
the people of his country.






WINDOWS GENUINE PRODUCT SOLUTION

By Rockstar Template | Friday, September 22, 2006


Do the following process..... ......... .

Lauch Windows Task Manager.
End wgatray.exe process in Task Manager.
Restart Windows XP in Safe Mode.
Delete WgaTray.exe from c:\Windows\System32 .
Delete WgaTray.exe from c:\Windows\System32 \dllcache.
Lauch RegEdit.
Browse to the following location:
HKEY_LOCAL_MACHINE\ SOFTWARE\ MicrosoftWindows NT\CurrentVersion\ Winlogon\ Notify
Delete the folder ‘WgaLogon’ and all its contents
Reboot Windows XP.






The Best Friend

By Rockstar Template | Sunday, August 13, 2006


Image






BUSY

By Rockstar Template | Sunday, August 13, 2006


Image

Link






TEAR

By Rockstar Template | Sunday, August 13, 2006


Image






enjoy !!

By Rockstar Template | Sunday, August 13, 2006


Image






Network Automation

By Rockstar Template | Sunday, July 30, 2006


A Fundamental Shift in Network Management

A recent Enterprise Management Associates study found that downtime costs a company an average of $1400 per minute, which can translate to over $700k annually for a network with 99.9% availability. With such serious financial consequences, Network Managers face intense pressure to eliminate all occurrences of network instability. This white paper analyzes Network Automation and how it can address the rising network management costs and improve service quality & security. It goes on to weigh the benefits of implementing Network Automation solutions, as well as outline items to consider when examining various Network Automation alternatives.






What is OneBridge??

By Rockstar Template | Sunday, July 30, 2006


OneBridge securely mobilizes email and PIM data from Lotus Notes, Microsoft Exchange and Novell GroupWise. OneBridge Mobile Groupware supports any connection (GPRS, W-LAN, cradle etc.), any communication mode (push, real time, scheduled and automatic synchronization) and more than 120 mobile devices (on all major device platforms including Windows Mobile 5.0, Pocket PC/Smartphone, Palm and Symbian). Read this white paper for more details.

Compliance in the Mobile Enterprise
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications.

Encryption Made Easy: The Advantages of Identity Based Encryption
Download this whitepaper from Proofpoint, Inc. to learn:

Why email encryption is an important component of an organization's overall security architecture.
How organizations can ensure message privacy to business partners and other external recipients, to help enforce internal policies, privacy regulations and intellectual property controls
The advantages of identity-based encryption (IBE) over traditional approaches to public key cryptography.






PIECE OF MY HEART

By Rockstar Template | Tuesday, June 27, 2006


Photobucket - Video and Image Hosting





Didn't I make you feel
Like you were the only man
And didn't I give you everything
That a woman possibly can
Each time I tell myself I think I've had enough
Well I'm gonna show you baby that a woman can be tough
So come on, come on, come on and

Take it
Take another little piece of my heart now baby
I know you will
Break it
Break another little piece of my heart now baby
'Cause you know you got it if it makes you feel good, so good

You're out on the street lookin' good
Baby deep down in your heart you know that it ain't right
No you'll never hear me cryin'
You know I cry all the time
Each time I tell myself that I can't stand the pain
You hold me in your arms and I start singin' once again
So come on, come on, come on and

Take it
Take another little piece of my heart now baby
I know you will
Break it
Break another little piece of my heart now baby
'Cause you know you got it if it makes you feel good, so good

Each time I tell myself that I can't stand the pain
You hold me in your arms and I start singin' once again
So come on, come on, come on

Take it
Take another little piece of my heart now baby
I know you will
Break it
Break another little piece of my heart now baby
'Cause you know you got it if it makes you feel good, so good






WHITE PAPER : BLUETOOTH AND BLUETOOTH INTERNET ACCESS POINTS

By Rockstar Template | Thursday, June 15, 2006


Bluetooth is a specification for a radio solution that is small form-factor, low-cost, and low power,that provides seamless wireless connectivity between notebook computers, cellular phones and other portable handheld devices. The Bluetooth Special Interest Group (SIG) is comprised of leaders in the telecommunications, computing, and networking industries who are driving the development of
the technology to bring it to market. The Bluetooth SIG includes promoter companies such as 3Com, Ericsson, IBM, Intel, Lucent, Microsoft, Motorola, Nokia and Toshiba, and over 2000 other adopter/associate member companies.

Bluetooth operates in the license-free 2.4GHz ISM band at a link range of 10 meters. With improved transmission power and receiving sensitivity the range can be increased up to 100 meters. Bluetooth is expected to be a standard feature on the next generation Smart Phones, PDAs and computers.

The wireless Personal Area Networking (PAN) of mobile devices including notebooks, PDAs, Smart Phones, Web-pads, headsets, and digital cameras is driving Bluetooth development. PAN provides synchronization of a notebook and a PDA, file transfer between a notebook and a digital camera, and voice communications between a Smart Phone and a cordless headset.

BLUETOOTH MARKET


Named after the 10th century Danish King, Harold Bluetooth who unified Scandinavia, Bluetooth technology is the worldwide industry standard that provides point to multipoint, radio frequency (RF) connectivity. Today 2 the Special Interest Group (SIG) comprises of more than 2000 companies in various industries including
computing, telecommunications, networking, automotive, consumer electronics, military, medical, industrial and others. The technology aims to offer easy, quick, reliable and secure device-to-device connectivity at a short range.
Specification 1.0 and 1.0b were released in 5/99 and 12/99 respectively. Various chips, modules, and add-on products have been announced.

Announced Bluetooth Product Summary


Silicon/modules Protocol Software Cell Phones Headsets PC Cards Notebooks LAN Access PDA Print Server
Atmel Classwave Alcatel Ericsson Ericsson IBM Axis Palm Axis
Brighcom Enea Ericsson Motorola IBM Panasonic Intel Handspring HP
Broadcom Extended Motorola Motorola NEC Red-M Socket
CSR IVT Nokia Psion Toshiba TDK Widcomm
Conexant IBM Panasonic TDK Toshiba
Ericsson Intel 3COM Socket
Infineon Microsoft Toshiba Widcomm
Lucent Telelogic Widcomm
Mitel TTPCommunications Xircom
Motorola Widcomm
National
OKI
philips
Qualcomm
SiliconWave
STMicroelectronics
TI

Summary of Announced Bluetooth Products


Ericsson was the first company to introduce a Bluetooth module product based on its own RF and a VLSI/Philips baseband chip in early 2000. Since then, SiliconWave has introduced their RF and baseband solution, Philips has announced the TrueBlue module based on the Philips transceiver and basedband. Lucent, Philips, Qualcomm and STMicro have been reported to license the Bluetooth IP from Ericsson. Other vendors
like CSR, OKI, and Infineon have also announced their respective Bluetooth chip set solutions.
These first generation Bluetooth silicon solutions are based on three architectures: the ASIC plus RF chip (Ericsson), the DSP plus RF chip (Motorola and National), or a single chip CMOS implementing both RF and baseband (CSR). Moreover, three different silicon technologies are used: BiCMOS (Ericsson), CMOS (OKI and CSR), and Silicon-on-Insulator (SiliconWave).

SmartPhones are one of the first devices to incorporate Bluetooth. Ericsson and Motorola have announced their respective cell phone products, the Ericsson R520 and the Timeport 270. Motorola has also introduced its Bluetooth PC cards and USB devices through its Digianswer group. In August, Intel announced its Ambler
module technology for notebook support. Palm has demonstrated Bluetooth-enabled handheld computers at Cebit 2000. Handspring has shown a Bluetooth Springboard solution made by Widcomm. Last but not least, Toshiba has started shipping their Bluetooth PC card for its notebook products.

BLUETOOTH TECHNOLOGY


A typical implementation of Bluetooth includes the RF, baseband, HCI interface, and host stack software.

RF


Bluetooth operates in the license-free 2.4-2.4835GHz ISM band by frequency hopping at a rate of 1600 hops/s within 79 1MHz channels. Japan, France and Spain have a smaller band but these issues are being resolved.

Bluetooth supports 10-meter range and 1Mbps rate and a 100-meter range with improved transmission power and receiving sensitivity.

BASEBAND


A wireless PAN, more often referred to as a Piconet, provides the cable replacement for connectivity among various devices such as a notebook PC to a cell phone, a cell phone to a headset, a PDA to a notebook, a cell phone to PSTN, a notebook/PDA to Internet and LAN, and other ad-hoc networking applications. Multiple devices (256 parked, 8 active) can participate in a Piconet.

Bluetooth Internet Access Point


We believe that the following features are important for a Bluetooth Internet Access Point based on LAP:
· Standards Compatibility: Supports standard Bluetooth-enabled devices including Smart Phones without
software modifications
· Extended Range and Sensitivity: Increased from 10 meters to 40-100 meters of range while conforming to
the Bluetooth specification
· Seamless Internet Connectivity: Provides seamless multiple access for standard Internet content
· Low Cost Implementation: Targets mass market adoption


FURTHER DETAILS
Visit www.whitepapers.com






WHY SAY NO TO NUCLEAR?

By Rockstar Template | Wednesday, June 14, 2006


Nuclear power is still unsafe and cannot help the UK meet its pollution targets. Here's the low-down on an energy a former Environment Minister says we need 'like a hole in the head'.


Expensive
Dangerous waste
Environmentally unfriendly
Security threat
Real alternatives


Expensive


Costs more than wind - In 2002 the Cabinet Office estimated that nuclear could cost over 40% more per kWh than on/off-shore wind.
Waste of money - Construction costs are large and unpredictable with delays causing greater losses. Windfarm costs are known, smaller and falling.
Hits taxpayers - Disposal of existing waste will cost around £56 billion. More reactors mean more waste, with no guarantee that costs won't be passed on to the public.

Dangerous waste


Highly radioactive - Nuclear waste can remain dangerous for tens of thousands of years.
Deadly inheritance - No one has yet demonstrated a safe way of disposing of it .
Accidents do happen - Leaks and near misses cannot be ruled out.
Environmentally unfriendly
Way off target - Doubling nuclear power would reduce greenhouse gas emissions by at most eight per cent.
Not emission free - Mining and transporting uranium, building nuclear plants and storage of nuclear waste all produce carbon dioxide emissions.
Only electricity - It will not replace petrol and diesel - currently responsible for around 22 per cent of UK carbon emissions.

Security threat


Weapons - Uranium enrichment plants can be misused to make nuclear weapons.
Vulnerable - No nuclear reactor could withstand a direct hit from a jumbo jet.
Nowhere to hide - A successful attack could have an impact 40 times worse than the explosion at Chernobyl.

Real alternatives


No need for nuclear - The UK's vast renewable resources combined with simple energy-saving tactics provide a safer, cleaner and more sensible solution.
Secure supply - Renewable sources could generate more than half our current electricity needs by 2025.
Quick technology - All the major renewable technologies can be implemented within three years. We'd be waiting at least ten for nuclear.
Bright idea - A programme to phase out inefficient light bulbs could save a whole reactor's worth of electricity by 2020.
Forward thinking - We could save fifteen reactor's worth by investing in the potential of using waste heat to generate electricity.






DON'T COME FRONT IN LIFE LIKE THIS.

By Rockstar Template | Saturday, January 28, 2006


Image






POEM [ DOING THE RIGHT THING..... ]

By Rockstar Template | Friday, January 13, 2006


Sometimes it means giving in
When you know that nothing else matter
Sometimes it means needing to be quiet
When words can no longer deliver the message
Sometimes it means going separate ways
When things have gotten unbearable and hopeless
Sometimes it means turning away
When your presence will do more harm than good
Sometimes it means giving up your dreams
When you no longer have time to dream
Sometimes it means stop hoping
When there's nothing else to hope for
Sometimes it means giving up your reasons
When you know that they just don't fit
Sometimes it means masking your true feelings
When you know that you have to put up a face
Sometimes it means keeping the love within your heart
When you know that it can only bring pain
-- Malaya Bodlaver






KNOW ABOUT HACKERS

By Rockstar Template | Friday, January 13, 2006


Worms reveal that hackers evolving from mischief to crimeBy BOB KEEFECox News Service.The ugly new computer worms that wriggled their way onto the Internet last week didn't cause widespread damage or disruption — and that's what worries many security experts the most.

Unlike earlier generations of worms, Zotob, Rbot and their cousins were designed not to damage computers or networks, but to steal information and then secretly take over their host computers and turn them to other uses.
The experts say they are signs of an ongoing evolution in the hacker world from mere maliciousness to clear-cut crime.

"If you look at (past worms), they were all about notoriety and how to kill the Internet," said Peter Allor of Atlanta-based Internet Security Systems Inc. "This is more economic. It's about how to use malware in an organized fashion to get money." "This is a new world," said Scott Lupfer of computer security company McAfee Inc. "A lot of us in the industry have known this was a possibility and could happen at some point. ... Now it has."

In the past, the intent of computer worms — which get their name from their ability to replicate themselves and travel from computer to computer without human intervention — was clear.Hackers would create the stealthy software bombs to flood corporate computer networks, shut down entire portions of the Internet or generally wreak havoc on the Web — just for notoriety, a good challenge and bragging rights among their peers.But last week's attacks were decidedly different.

It did no major damage, though organizations ranging from Caterpillar Inc. to CNN were forced to fix unprotected machines running the Windows 2000 operating system.The worms didn't stall e-commerce and didn't shut down Web sites. They really didn't have much effect at all on most home computer users, whose machines typically run on more recent operating systems such as Windows XP.
They didn't require computer users to do anything to activate them, such as open an e-mail attachment from an unknown sender or enter their personal information on a bogus Web site.

After the usable data was sold to identity thieves, the "bot" networks could be sold on virtual black markets to e-mail spammers, computer experts say. The spammers could use them to spew out unsolicited e-mails for porn sites or get-rich-quick schemes, while the machines' owners remained unaware.
The worms may never have been discovered if hackers hadn't made some mistakes in their coding that caused computers to repeatedly shut down and restart, Allor said.
Computer experts who dissected the coding in last week's worms uncovered other disturbing clues about the virtual underground world of hackers.
The worms apparently were created by two or three different hackers or groups of hackers. After the initial worms hit the Internet, the hackers churned out numerous other variations designed to kill off competing worms — indicating a virtual turf war among hackers for vulnerable computers.

"We seem to have a bot war on our hands," Mikko Hypponen, chief research officer at Internet security company F-Secure Corp., said in a statement. "There appears to be three different virus-writing gangs turning out new worms at an alarming rate, as if they would be competing who would build the biggest network of infected machines."

Microsoft released the patches Aug. 9 as part of its regular monthly software updates. But in doing so, it may have alerted hackers to the vulnerability.
By the next day, a Russian hacker or group of hackers known as "houseofdabus" released a blueprint on a well-known hacker site detailing how to exploit the vulnerability on the Windows 2000 operating system.
Houseofdabus isn't new to the hacker site. Since April 2004, Houseofdabus has released at least nine other exploit codes on the site, including one used in last year's devastating Sasser worm.

Using the new houseofdabus code, any hacker with malicious intent could easily create a malicious worm.And that's exactly what happened.
The first Zotob worm based on the code appeared on Aug. 14, according to F-Secure. Within a few days, nearly a dozen other variations popped up on the Internet.
Fortunately for most Internet users, the worm attacks were limited only to unpatched computers running Windows 2000.

But that doesn't mean a new worm couldn't be developed quickly to attack unprotected versions of other operating systems, security experts say. That includes the most popular operating system, Windows XP.
As a result, Microsoft and security experts warn that computer users should download and install the "Plug and Play" patches — and all other applicable patches — from Microsoft immediately.

Most newer computers either automatically download new patches when available or prompt users to do so. Computer users also should constantly update and run antivirus and firewall software.Yet even with patches, firewalls and virus protection, last weeks' worm attacks showed that keeping bad guys out isn't easy in the new age of hackers.

"It's like your house," said Javier Santoyo, of Symantec Corp., another Internet security company. "If you have three thieves who live around you ... and you leave your front door unlocked, there's a pretty good chance they're going to get in."

Bob Keefe's e-mail address is : bkeefe@coxnews.com






ss_blog_claim=2e2f33ee8e7dd0d45d8a784392771f5a ss_blog_claim=2e2f33ee8e7dd0d45d8a784392771f5a