Tuesday, August 28, 2007

Browse BLOCKED websites with Opera Mini™ 4 beta simulator & other smart ways

Many Websites are blocked all over the world using Web Filters. Here with this article I am proving some tips and trips to overcome blocked or Banned sites.
  1. Try using some smart Websites

    1. Bitty (http://www.bitty.com/) With this web site, they inbuilt one mini browser it will help you
    2. Try Google mobile search (http://google.com/gwt/n)


    3. ikuphi.com is a free anonymous web based proxy service. With ikuphi.com Proxy you can browse your favorite web sites anonymously and even from behind a firewall with blocked ports. Whether you're on the job, at school or college university, a public terminal, or anywhere else with a web browser, you can use ikuphi.com Proxy to view your favorite web sites!

      Your privacy is obviously important to you, and ikuphi.com Proxy ensures your privacy by letting you browse the Web as an anonymous user. Web sites often track, log, and analyze your IP address, geographical information, web browser, and other personal information.ikuphi.com Proxy makes your browsing experience totally anonymous by hiding information such as your IP address from web servers.




      6. Ghost Surf
      Invisibility on the Internet By surfing the Web you are exposed to hackers, bombarded by advertisements and subjected to spyware. Everything you do and download online can be watched. Hackers, Webmasters, other users of your computer and even your boss can see your surfing habits. Your personal and credit card information is readily available. Anti-virus and firewall applications don't solve these problems. GhostSurf Platinum is the answer. GhostSurf Platinum protects your privacy and prevents Internet pests from spoiling your online experience. GhostSurf ensures your safety online by providing an anonymous. you can download using below link http://download.tenebril.com/pub/bin/ghostsurf-trial.exe

7. PHProxy (http://www.phproxy.com/)

8. Copy and Paste this link into the browser and try http://google.com/gwt/n

Wednesday, August 15, 2007

Microsoft's New HD Photo Format Could Be JPEG Killer

Microsoft hopes its new digital-photo file format will one day replace the widely used JPEG format as the industry standard for electronic photography and digital imaging.

Microsoft on Tuesday said an international standards body has agreed to vote on whether to accept the company's new digital-photo file format as a standard, which Microsoft hopes will one day replace the widely used JPEG format as the industry standard for electronic photography and digital imaging.

The Joint Photographic Expert Group has agreed to submit formal balloting of HD Photo to JPEG's national delegations for approval by the fall. The tentative name for the spec is JPEG XR.

Expected to help Microsoft's cause is the fact that the company is making the technology available without charge. "Microsoft's royalty-free commitment will help the JPEG committee foster widespread adoption of the specification and help ensure that it can be implemented by the widest possible audience," JPEG said in a statement.

Microsoft claims the new file format would enable digital photographers and editors to capture and transmit higher quality images at half the size of photos created in today's JPEG standard. The company also claims HD Photo produces fewer unwanted visual artifacts and offers lossless data compression, which means no visual information is lost when the file is shrunk and then recreated to its original size.

The current JPEG standard has been around for 20 years and is used by photographers at major news organizations such as the Associated Press. It's also found in image editing programs, including those built by Adobe Systems, and is supported in digital cameras and printers.

Microsoft has already released HD Photo in the market through its own products. The file format is natively supported by its new Windows Vista operating system and in .Net Framework 3.0. HD Photo is also supported by Apple's Mac OS X operating system.

In trying to drive the technology further into the market, Microsoft has developed a plug-in that adds HD Photo support to Adobe's popular Photoshop editing program.

The format is supported on various Microsoft products as well as Apple's Mac OS X operating system.

Tuesday, August 14, 2007

Microsoft SharedView - an excellent gift from Bill Gates uncle

Recently, Microsoft has released the beta version of ShareView, a new kind of instant messenger. It could let you:

+ Share your documents (every kinds of files)
+ Share your desktop view with others
+ Make a conference with multi-users
+ Integration with Microsoft Word
Here are 3 simple but powerful SharedView actions:-
CONNECT
- Connect with up to 15 people in different locations and invite them to share with you.

SHOW - Share, review, and update documents with multiple people in real-time.

SHARE
- with up to 15 people in a session. Anyone can share, and the person sharing can give control to anyone else.

You could manage, host the conference, invite others, let someone see these documents but not other ones. It is really a great and my wished tool to me for a long time. As an entrepreneur, currently, I often work with freelancers, clients and partners remotely. It is hard to discuss and finalize the design just by emails or direct meetings.
If you are in my same situation, let try it, I guarantee that you would love it soon. And in the future, if we could have a chance to work together, it must easily for both of us, right?
You can have more information & download from below URL:
http://www.connect.microsoft.com/site/sitehome.aspx?SiteID=94

Friday, August 10, 2007

How to Edit/Remove Windows Saved Password

Method: 1

Click Start; Click Run; type Control keymgr.dll; and press Enter

Method: 2

1. Open Command Prompt or Run

2. Type "rundll32.exe keymgr.dll, KRShowKeyMgr" and press Enter to open Stored User Names and passwords windows.

3. You have 3 options: Add, Remove, Properties and Close

Thursday, August 9, 2007

Deploy Applications using Group Policy

One of the biggest chores that administrators have to deal with is application lifecycle management. Whether an office has 20 PCs or 20,000, no one likes the idea of going from machine to machine with an installation CD every time a new version of an application is released. There are programs that are designed to help administrators manage applications across a network, but most tend to be overly complicated and expensive.

What you might not realize though is that Windows Server contains tools that you can use to deploy applications throughout your organization without having to buy any third party software. I will tell you up front though that the built in software deployment tools are not as good as what you would get in a third party application. Therefore, if you already have a copy of SMS Server or something similar, you will probably want to keep using it. Finally Group Policy is not designed for Deploying Applications.

Before We Begin

The technique that I'm about to show you will allow you to deploy applications through the Active Directory. One of the major limitations behind this type of application deployment is that you can only use this technique to deploy certain types of applications. Specifically, you can install Windows Installer packages (.MSI files), Transform Files (.MST files), and patch files (.MSP files).

A few years ago, this limitation was a major hurdle because almost no one packaged applications in the three supported file types. You could use the Active Directory to deploy Microsoft Office, but that was about it. Today, it's common for applications to include a Windows installer package (a .MSI file), so it's a lot easier to deploy applications through the Active Directory than it used to be.

Even if the application that you want to deploy doesn't include a Windows Installer package, you aren't completely out of luck. It's possible to make your own MSI file for an existing application.


Creating MSI Files

Windows does not natively contain the necessary tools for you to create your own MSI files. Instead, you will have to rely on a third party MSI creation tool. There are several good tools available for free. Two of the more popular choices are MAKEMSI (http://www.labrinth.net.au/~dbareis/makemsi.htm) and WinInstall LE 2003

(http://www.ondemandsoftware.com/freele.asp).

The reason why .MSI files are the preferred installer package for Windows is because of the file format's capabilities. When you install or uninstall an MSI file on a machine running Windows XP, Windows creates a system restore point. Furthermore, MSI files allow the application to be "self healing". But basically this means that if part of the application is damaged or removed, then Windows has enough information to replace the damaged or missing parts. Finally, MSI files allow the system to automatically perform a rollback to its previous state if an installation should fail.


With MSI files having so many capabilities, it should come as no surprise that MSI files tend to be a bit complex. MSI files are actually database files with information pertaining to every file and setting that the application installs or modifies. Because of this complexity, most of the MSI file creation utilities require you to do at least some scripting when you create an MSI file.

I prefer to use the WinInstall LE tool to create MSI files. It doesn't require any scripting, but it is a little time consuming to use. WinInstall LE requires you to have a machine with a clean Windows installation and network connectivity. The software then takes a snapshot of this machine and saves the configuration image. You would then install the application that you want to create the MSI file for and take another snap shot. WinInstall would then compare the snapshots and use the differences between the two images to create an MSI file and the corresponding installation package.


This method is a little time consuming, but is far less tedious than writing scripts. Another advantage to using this method is that it is possible to install multiple applications on to the clean machine prior to taking the second snap shot. This means that you can create a single MSI file and installation package that deploys multiple applications.


Publishing and Assigning Applications
Now that you know how to create an MSI file, there is one last concept that I need to talk about before I show you how to deploy an application thorough the Active Directory.


As you may already know, in an Active Directory environment, group policies are the main component of network security. Group policy objects can be applied either to users or to computers. Deploying applications through the Active Directory is also done through the use of group policies, and therefore applications are deployed either on a per user basis or on a per computer basis.


There are two different ways that you can deploy an application through the Active Directory. You can either publish the application or you can assign the application. You can only publish applications to users, but you can assign applications to either users or to computers. The application is deployed in a different manner depending on which of these methods you use.


Publishing an application doesn't actually install the application, but rather makes it available to users. For example, suppose that you were to publish Microsoft Office. Publishing is a group policy setting, so it would not take effect until the next time that the user logs in. When the user does log in though, they will not initially notice anything different. However, if the user were to open the Control Panel and click on the Add / Remove Programs option, they will find that Microsoft Office is now on the list. A user can then choose to install Microsoft office on their machine.


One thing to keep in mind is that regardless of which deployment method you use, Windows does not perform any sort of software metering. Therefore, it will be up to you to make sure that you have enough licenses for the software that you are installing.


Assigning an application to a user works differently than publishing an application. Again, assigning an application is a group policy action, so the assignment won't take effect until the next time that the user logs in. When the user does log in, they will see that the new application has been added to the Start menu and / or to the desktop.


Although a menu option or an icon for the application exists, the software hasn't actually been installed though. To avoid overwhelming the server containing the installation package, the software is not actually installed until the user attempts to use it for the first time.


This is also where the self healing feature comes in. When ever a user attempts to use the application, Windows always does a quick check to make sure that the application hasn't been damaged. If files or registry settings are missing, they are automatically replaced.


Assigning an application to a computer works similarly to assigning an application to a user. The main difference is that the assignment is linked to the computer rather than to the user, so it takes effect the next time that the computer is rebooted. Assigning an application to a computer also differs from user assignments in that the deployment process actually installs the application rather than just the application's icon.


Deploying Applications
Setting up the actual deployment is simple. The biggest thing that you must remember is that the MSI file and the corresponding package must exist within a network share, and everyone must have read permissions for that share.

To perform the deployment, open the Group Policy Editor.
To publish or assign an application to a user, navigate the Group Policy Console
1. Navigate to User Configuration, expand Software Settings, expand Software Installation.
2. Now, right click on the Software Installation container and select the New, Package commands from the shortcut menu. Select the appropriate MSI file and click Open.
3. You are now asked whether you want to Publish or Assign the application. Make your selection and click OK.

The process for assigning an application to a computer is almost identical. The only real difference is that you would use the Software Settings Software Installation container beneath the Computer Configuration container rather than beneath the User Configuration container.

Conclusion

In this article, I have explained how you can create an MSI installer for an application and deploy that application through a group policy setting. Keep in mind that group policy is hierarchical in nature though. This means that when you are setting up the deployment policy you will have to be careful to make sure that the policy applies to the appropriate users or computers

Turn your PC into an FTP Server

Anyone can run a full-functioning FTP server, even on your home PC. FTP is the fastest, most secure, reliable means of transferring files, so why not take advantage of these features for every file you transfer over the Internet.

Why an FTP Server?

E-mail attachments really don't cut it. With e-mail, you have little control of how long it takes for someone to get your file. There are limits on file size and you're unable to resume downloads that cut-out before they are complete. Running an FTP server on your computer can virtually guarantee that your friends, co-workers, and venders can get all your files in a timely, secure manner.

Running an FTP server is safe. FTP servers allow you full control over who can login to your computer, which files they can access, and whether or not they're able to upload.

What Do You Need?

To run your own FTP server all you need is a computer with an Internet connection (any Internet connection will do) and FTP server software.

Now there are number of options when choosing FTP server software. Like all Internet software, FTP server software is available at all price ranges. The server that is best for you depends on how often you intend on running your FTP server, how many people you expect to access your FTP server and the amount of money you're willing to spend.

For those people who don't plan on publicizing their FTP sever and/or won't have a constant Internet connection to their FTP server, there are plenty of shareware or freeware FTP servers that would work for you. Go to your favorite download site and pick an FTP server that looks best to you.

For those people looking for a more robust FTP server, we recommend WS_FTP Server (available free for thirty days). This sister product to WS_FTP Pro runs on Windows and is the ideal choice for personal use, schools, ISPs or any business organization that needs to share files with an unlimited number of users.

How Do I Do It?

After installing your FTP server client, there are only a few things you need to do to get started.

To begin, you need to decide what kind of logins your users have. If you want to allow everyone to have access to your files, you will want to make sure that your FTP server is setup to allow 'anonymous logins'. This option is the default for most FTP servers and is how browsers and FTP clients first attempt to login to an FTP server.

If you want to grant permissions on an individual basis, then you want to disallow 'anonymous logins' and set-up a login user name and password. Depending on which FTP server you choose, you may also be able to allow access based on an individual's IP address.

Second, you need to know the IP address of your computer so people can connect to your FTP server. There are two way to do this. Some FTP server clients will show you the 'home IP' address in the FTP server setup or in the text display when the server becomes 'on-line'. Look around and you should be able to find it. If you can't, open you DOS Command Prompt and type 'ipconfig' (or 'winipcfg' for older versions of Windows). This command will list your IP address, among other things.

Note: If you use a dial-up Internet connection, your IP address changes with every new Internet connection or dial-up session. You will need to check the IP address every time you login to your ISP. You may have to rerun your FTP setup with every new dial-up session for it to capture your new IP address.

Most FTP servers manage user accounts in a fairly simple way, allowing you to easily change passwords, directory permissions, access limitations and other FTP server functions. You can change these attributes as you get more comfortable with your FTP server.

As long as you have taken care of the login issues and you have your machine's IP address, you're ready to start running your very own FTP server. Keep in mind, in order for people to connect to your FTP server you must be connected to the Internet and your FTP server must be 'running'. You might want to test the server by logging in with WS_FTP before you tell others to connect.

A Few Important Tips:

  • Watch Your Permissions – Be careful to not give users permissions that they shouldn't have. This is especially important when giving write or delete permissions. You don't want to end up with a full hard drive or missing files.

  • Control Your Bandwidth – Make sure you don't allow too many people into your server at once. This could either take bandwidth away from you, or make your users experience slow downloads. Most FTP servers allow you to set send rates as well.

  • Prohibit Multiple Logins – If you don't prohibit multiple logins, users will be able to take multiple files at the same time. In most cases, this just slows your server down and takes away from other users.

  • Allow Resuming – Most FTP servers can allow users to resume broken transfers. This feature is a real blessing to modem users and can really help get big files across slow lines.

  • Keep a Log – Keep a log of all server activity. This information can help you out in many ways. Logging can help tell you who is coming to your site and what they are doing on it. Again, most FTP server software supports logging.
    Always Update User Accounts – Make sure that you remove old accounts and organize new ones. Most FTP server software allows you to classify users in groups.

Anything else to Know?

Take it easy at first. There are reasonable limitations to FTP server capability depending on your connection to the Internet. Good luck and have fun!

Wednesday, August 8, 2007

Resize a partition in Windows Vista using Vista’s own feature

The good news is that Windows Vista has own feature as "Shrink Volume" and can manage your partition resizing.


To resize a partition with Windows Vista, follow these steps:

Be sure to back up any valuable information, because there is a slight chance that data can be lost when dealing with partitions.


1) Click on the Start menu

2) Right click on Computer and click on Manage














3) You may get a User Account Control dialog; just click Continue
4) In the left pane, open up the Storage category and click on Disk Management
5) Here, you will find your partitions for your disks. Right click on the partition you like to modify

6) Click on Extend Volume or Shrink Volume to extend or shrink the selected partition.


USB Storage & Windows Vista ReadyBoost

Windows Vista has a new performance feature called ReadyBoost. This feature enables the use of a USB storage device instead of the slow paging file on your hard disk when you're low on physical memory (RAM). The logic is simple - the USB storage device is faster than your hard disk drive.

In order for ReadyBoost to work in Windows Vista, your USB storage device must meet the following requirements:
- the device must have at least 64MB storage.
- the device must be USB 2.0 compliant.
- the device must have a minimum read speed of 3.5 MB/s.
- the device must have a minimum write speed of 2.5 MB/s.

Follow these steps to enable ReadyBoost:
1. Plug in USB storage device.
2. Go to Computer, right-click on the removable storage device and select Properties.
3. Click on the ReadyBoost tab.
4. Select Use This Device and set the amount of space to use for the system file.
5. Click OK.

Tuesday, August 7, 2007

Google Preparing Mobile Focused Search Site

Google is developing a new search service for cellphones that will be focused on mobile specific content such as ringtones and games, according to a report from the Wall Street Journal.

The new search site is said to enable users not only to find a list of mobile content providers, but will also provide an easy purchase interface for selected sites, most likely through Google Checkout. Google has apparently been working "for months with content providers — including large entertainment companies and smaller mobile-media aggregators" in preparation for the services launch. The report goes on to say that Google may also include a social-networking component that would let Gmail users exchange content.

Google already provides a number of mobile focused products, from mobile friendly versions of Google search through to a Gmail app for mobile phones. It would appear to be a logical step for Google to offer a mobile focused site such as this. Where the offering becomes interesting is in the challenge it presents to cellphone operators who profit well from services such as ringtones. On one hand we have AT&T offering unlimited data plans on the iPhone, on the other we have cellphone providers such as Verizon which are blocking VOIP services and other web apps because it wants to milk maximum profits from every user. I'd find it hard to believe given history so far that mobile operators will allow Google to undermine one of their most lucrative revenue streams without a fight.

3 Security tips for Remove Spyware

Spyware is a very common way that some websites and internet organizations have of collecting information about users and their surfing habits. This information is then used to develop targeted marketing strategies according to user's habits. Many times, these marketing strategies are also done through spam or adware.


 

One of the most frequent ways that these sites distribute spyware is through freeware programs. When you install such a program, many times it also installs a system without your consent that then starts collecting information about your surfing habits. In spite of the fact that most of the times it is harmless, it may however also be used with malicious intentions.

Whichever the case, spyware should not be present on your PC at all.


 

Steps to remove:

  • There are two spyware removal applications that are very effective against spyware:

    Install these applications, which have free versions and you will be able to download updates from respected sites, and run them frequently to remove unwanted spyware.

  • Some mallware, like the CW adware and mallware (CoolWebSearch), may not be removed by these two applications. If you still have unwanted pop-ups after running both Ad-Aware and Spybot, it is most probably due to CW adware. To remove it, install and run CWShredder.
  • Ad-Aware will remove the Aureate/Radiate spyware, but reinfection may occur afterwards. To prevent reinfection, look for a file named "advert.dll" on your system. If you find it, delete the file. However, if you try to delete it and cannot, you will have to reboot your PC in Safe Mode, which will most probably allow you to delete it. After deleting, create an empty text file and name it advert.dll, give it read-only properties and save it to the Windows - System directory. Once the file is in place, configure Ad-Aware to ignore it.

Windows control panel icons and their associated files

Below is a small chart of the available files and their associated control panel icons. Please keep in mind that not all of the below files or icons are available in all versions of Microsoft Windows and may be missing because the associated hardware device, software program, or other setting is not installed. In the below chart we have also listed which icons are listed in each of the Windows Operating Systems. Icons that have asterisks(*) in the availability section indicate that a third-party software program not available through the Microsoft Windows CD must be installed before the icon is displayed.

Control Panel Icon

Associated file

95/98/ME

NT

2000/XP

Accessibility Options

Access.cpl

Yes

Yes

Yes

Add/Remove Hardware

Hdwwiz.cpl

Yes

Yes

Yes

Add/Remove Programs

Appwiz.cpl

Yes

Yes

Yes

Date/Time

TimeDate.cpl

Yes

Yes

Yes

DirectX

directx.cpl

*

*

*

Display

Desk.cpl

Yes

Yes

Yes

Fax

Fax.cpl

Yes

 

Yes

Find Fast

Findfast.cpl

Yes

Yes

 

Fonts

Main.cpl

Yes

Yes

Yes

GSNW

Nwc.cpl

 

Yes

 

Intel Pro Set

Proset.cpl

 

Yes

 

Internet

Intelcpl.cpl

Yes

Yes

Yes

Infrared Settings properties

Irprops.cpl

  

Yes

Java Plug-in x.x.x - This icon and its associated
file changes by version.

plugincplx_x.cpl

*

*

*

Joystick Properties or Game Controllers

Joy.cpl

Yes

Yes

Yes

Keyboard

Main.cpl

Yes

Yes

Yes

Licensing

Liccpa.cpl

 

Yes

 

Macfile

Sfmmgr.cpl

 

Yes

 

Mail and Fax

Mlcfg32.cpl

 

Yes

 

Microsoft Mail Post Office

Wgpocpl.cpl

Yes

  

Modems

Modem.cpl

Yes

Yes

 

Mouse

Main.cpl

Yes

Yes

Yes

Multimedia

Mmsys.cpl

Yes

Yes

Yes

Network Connections properties

Ncpa.cpl

 

Yes

Yes

Network Properties

Netcpl.cpl

Yes

  

ODBC32

Odbc32.cpl

Yes

Yes

Yes

Passwords

password.cpl

Yes

  

PCCard

Devapps.cpl

 

Yes

 

Ports

Ports.cpl

 

Yes

 

Power Options properties

Powercfg.cpl

  

Yes

Printers

Main.cpl

Yes

Yes

Yes

QuickTime

Quicktime.cpl

*

*

*

Regional Settings

Intl.cpl

Yes

Yes

Yes

Services and Devices

Srvmgr.cpl

 

Yes

 

SCSI Adapters

Devapps.cpl

 

Yes

 

Server

Srvmgr.cpl

 

Yes

 

Sounds

Mmsys.cpl

Yes

Yes

Yes

Speech Properties

Sapi.cpl

  

Yes

System

Sysdm.cpl

 

Yes

Yes

Tape Devices

Devapps.cpl

 

Yes

 

Telephony or Phone and Modem Options Properties

Telephon.cpl

 

Yes

Yes

TweakUI

Tweakui.cpl

*

*

*

UPS

Ups.cpl

 

Yes

 

User Accounts properties

Nusrmgr.cpl

  

Yes

VirusScan

Avsmcpa.cpl

*

*

*

Setup failed while registering ISA Server filters

Problem: When installing ISA Server, the following error message is displayed:

Setup failed while registering Wspadmin.dll

Details:
The function My_LoadLibrary failed at the function Registrator::RegisterComControl

Cause:
This may occur when ISA Server 2004 is installed on a computer where a previous installation of one of the following programs was not completely removed:

 • Microsoft ISA Server 2004

 • Microsoft ISA Server 2000

 • Microsoft Proxy Server 2.0

Solution:
To resolve this issue, remove the remnants of the previous ISA Server installation or the previous Proxy Server installation, and then reinstall ISA Server 2004. To do this, follow these steps:

  • Start Microsoft Windows Explorer.
  • Remove the following folder if it exists:

%programfiles%:\Microsoft ISA Server

  •  Locate the %WINDIR%\System32 folder, and then remove all the following files if they exist:
    • Cachctrs.h
    • Cachctrs.ini
    • Latui.dll
    • Mspapi.dll
    • Msfpc.dll
    • Msfpcui.dll
    • Msphlpr.dll
    • Msplog.dll
    • Mspmon.dll
    • Mspmsg.dll
    • Mspsec.dll
    • Mspui.dll
    • Pfctrs.h
    • Pfctrs.ini
    • Ratlib.dll
    • Msfpcstg.dll
    • W3papi.dll
    • W3pctrs.h
    • W3pctrs.ini
    • W3pmib.dll
    • Wspapi.dll
  •  Run the ISA Server 2004 Setup program.