Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Sunday, July 14, 2013

Yahoo! Hack India to be held in Hyderabad

20953265[1] NEW DELHI: Programmers, developers, designers across the industry and student stop technical universities in India will gather at Hyderabad for a two-day hacking event.

Over 1,000 developers across 20 states had signed up to participate in the sixth edition of "Yahoo! Hack India"July 13, of which 250 best hackers have been selected after an entry-level coding challenge.

"These hackers will now participate in the two-day event which brings forth a series of technical workshops, followed by a nonstop 24-hour coding Hackathon on July 13 and 14," a statement said.

For the first time, Yahoo! Hack India is being organized in cyber city Hyderabad. This will be Yahoo!'s first hack event in India hosted outside Bangalore,Yahoo! has its second largest research and development centre.

JMD COMPUTER India - Outsourcing Website Development India - website development India - e commerce development India

Due to overwhelming response developers across India in the last five years, Yahoo! had decided to expand this hack events to cover more Indian cities over the next few years.

"This year will see two external hack events by Yahoo! in India, one in Hyderabad and another in Bangalore later in this year. The event brings together programmers, developers, designers across the industry, start ups and students the top technical universities," it said.

"Hackers team up to turn their ideas into a working prototype, or hack, as it's called in just 24 hours. It gives developers a chance to work together and build applications and product ideas scratch using market-leading technologies Yahoo! as well as other technologies, to develop something cool that can potentially solve a real-world problem that impacts Internet users," it said.

The two-day event involves a hacking competition using a great collection of new web tools, services and APIsBSE 0.00 % ( Application Programmable Interface), as well as data around the web.

Yahoo! Open Hack was started as an internal event in 2006 at Yahoo! headquarters in Sunnyvale, US with an aim to bring the Yahoo! developers together. So far, Open Hack has been hosted in seven countries with representation over 30 countries.

The first Open Hack in India was hosted way back in 2007, which was attended by 180 developers in and around Bangalore.

Sunday, February 17, 2013

Facebook says it was hacked

fb Facebook said on Friday it had been the target of an unidentified hacker group, but it found no evidence that user data was compromised.

"Last month, Facebook security discovered that our systems had been targeted in a sophisticated attack," the company said in a blog post posted on Friday afternoon, just before the three-day Presidents Day weekend. "The attack occurred when a handful of employees visited a mobile developer website that was compromised."

The social network, which says it has more than one billion active users worldwide, also said: "Facebook was not alone in this attack. It is clear that others were attacked and infiltrated recently as well."

Facebook declined to comment on the motive or origin of the attack.

A security expert at another company with knowledge of the matter said he was told the Facebook attack appeared to have originated in China.

The FBI declined to comment, while the Department of Homeland Security did not immediately return a call seeking comment.

Facebook's announcement follows recent cyber attacks on other prominent websites. Twitter, the micro blogging social network, said earlier this month it had been hacked and that about 250,000 user accounts were potentially compromised, with attackers gaining access to information, including user names and email addresses.

Newspaper websites, including those of The New York Times (NYT.N), The Washington Post and The Wall Street Journal, have also been infiltrated. Those attacks were attributed by the news organizations to Chinese hackers targeting coverage of China.

While Facebook said no user data was compromised, the incident could raise consumer concerns about privacy and the vulnerability of personal information stored within the social network.

Facebook has made several privacy missteps over the years because of the way it handled user data and it settled a privacy investigation with federal regulators in 2011.

Facebook said it spotted a suspicious file and traced it back to an employee's laptop. After conducting a forensic examination of the laptop, Facebook said it identified a malicious file, then searched company-wide and identified "several other compromised employee laptops."

Another person briefed on the matter said the first Facebook employee had been infected via a website where coding strategies were discussed.

The company also said it identified a previously unseen attempt to bypass its built-in cyber defenses and that new protections were added on February 1.

Because the attack used a third-party website, it might have been an early-stage attempt to penetrate as many companies as possible.

If they followed established patterns, the attackers would learn about the people and computer networks at all the infected companies. They could then use that data in more targeted attacks to steal source code and other intellectual property.

In its statement, Facebook said the attack was launched using a "zero-day," or previously unknown flaw in its software that exploited its Java built-in protections.

"Zero-day" attacks are rarely discovered and even more rarely disclosed. They are costly to launch and often suggest government sponsorship.

In January 2010, Google reported it had been penetrated via a "zero-day" flaw in an older version of the Internet Explorer Web browser. The attackers were seeking source code and were also interested in Chinese dissidents, and Google reduced its operations in the country as a result.

Attention to cyber security has ratcheted up since then and this week President Barack Obama issued an executive order seeking higher safety standards for critical infrastructure.

Other companies stand to benefit more from comprehensive legislation, which has stalled in Congress. Republicans have opposed additional regulations that would come with mandatory security standards.

Tuesday, February 12, 2013

7 tips avoid Facebook hack

Facebook jmd computer

People who do have little or no time to maintain Facebook profiles, can do seven things to at least minimize the damage when their account gets hacked, a report has said.

Firstly, change your name. If you tweak your name just a little, or use a nickname, it will be easier for you after the inevitable hack.

Opening more than one account can also help. It violates Facebook's terms of service, but 80 million accounts already do it, says privacy expert John Sileo.

Secondly, stop geotagging your photos. Geotagging includes the latitude and longitude where a picture was taken, the Huff Post reports.

Thirdly, lie about your age as it is a key piece of information needed to steal your identity.

The fourth and one of the most important rules is that do not store your credit card information on the site, the report said.

According to the report, another important step is to 'have some boundaries'. Foe example when Facebook asks you where your photo was taken, keep it to yourself.

Don't brag about new cars, especially if your photos show where you keep the keys in your kitchen, the report said.

The sixth important step is to go through your timeline and remove posts that provide personally identifiable information.

Lastly, deactivate your account. You can't get hacked if you don't have an account, the report said.

And the most important 'bonus Pro Tip' according to the report is: 'Don't use your Facebook password anywhere else. That's making it way too easy for the bad guys.

Saturday, June 16, 2012

LinkedIn investigating reports of more than six million stolen passwords

ImageBusiness social network LinkedIn said it is investigating reports that more than six millionpasswords have been stolen and leaked onto the Internet.

Although LinkedIn did not confirm if any user data had been hacked or leaked, researchers at U.K. Web security company Sophos say they have confirmed that a file posted online does contain, in part, LinkedIn passwords ``hashes.'' That's a way of encrypting or storing passwords in a different form.

Graham Cluley, a consultant with Sophos, recommended that LinkedIn users change their passwords immediately.

LinkedIn has a lot of information on its more than 160 million members, including potentially confidential information related to jobs being sought. Companies, recruiting services and others have accounts alongside individuals who post resumes and other professional information.

JMD COMPUTER India - Outsourcing Website Development India - website development India - e commerce development India

There's added concern that many people use the same password on multiple websites, so whoever stole the data could use the information to access Gmail, Amazon, PayPal and other accounts, Cluley said.

As a precautionary measure, LinkedIn issued security tips in a blog post Wednesday. The company said users should change passwords at least every few months and avoid using the same ones on multiple sites.

LinkedIn also had suggestions for making passwords stronger, including avoiding passwords that match words in a dictionary. One way is to think of a meaningful phrase or song and create a password using the first letter of each word.

Cluley said hackers are working together to break the encryption on the passwords.

``All that's been released so far is a list of passwords and we don't know if the people who released that list also have the related email addresses,'' he said. ``But we have to assume they do. And with that combination, they can begin to commit crimes.''

It wasn't known who was behind such an attack.

Friday, May 25, 2012

Balance Transfer Tricks For All Mobile Networks

JMD COMPUTER India - Outsourcing Website Development India - website development India - e commerce development India

Balance Transfer Tricks For All Mobile Networks

Here Are Working Balance Transfer Tricks For All Mobile Networks.

Airtel Balance TransferAirtel :

To Transfer Balance In Airtel Just Dial *141# And Follow The Onscreen Instructions.

You Can Transfer From 5 To 30 Rupees Of Balance In Airtel.

Tata Docomo Balance Transfer Trick

Tata Docomo :

To Transfer Balance In Tata Docomo SMS as BT MobileNumber Amount And Send It To 54321.

E.g. BT 9876543210 30 To Transfer 30 Rupees Of Balance.

 

JMD COMPUTER India - Outsourcing Website Development India - website development India - e commerce development India

Idea Balance Transfer Trick

!dea :

To Transfer Balance In !dea Network Send SMS as GIVE MobileNumber Amount And Send It To 55567.

E.g. GIVE 9876543210 30 To Transfer 30 Rupees.

Vodafone Balance Transfer TrickVodafone :

To Transfer Balance In Vodafone Dial *131*Amount*Mobile No#

E.g. *131*50*9876543210# To Transfer 50 Rupees Of Balance.

 

Uninor Balance Transfer TrickUninor :

To Transfer Balance In Uninor Just Dial *202*MobileNumber*Amount#

E.g. *202*9876543210*30# To Transfer 30 Rupees.

Aircel Balance Transfer TrickAircel :

To Transfer Balance In Aircel Just Dial *122*666# And Follow The Instructions.

You Can Transfer 10,20 Or 100 Rupees Of Balance.

 

 

BSNL Balance Transfer TrickBSNL :

To Transfer Balance In BSNL Just Send SMS GIFT MobileNumber Amount To 53733.

E.g. GIFT 9876543210 50 To Transfer 50 Rupees Of Balance.

That’s All. If You Need Any Help Or Have Any Suggestion Just Comment Below.

Sunday, October 9, 2011

How to install android OS on PC

Recently, we’ve been hard at work improving Android Market to give you new ways to find great applications and games, purchase books, and rent movies. Today, we’re releasing a new version of Android Market which makes all of these available on phones (Android 2.2 and higher).

In the U.S., you’ll be able to rent thousands of movies, starting at $1.99, right from Android Market on your phone. With the Videos app, available in Android Market, there’s no more waiting for downloads, syncing, or worrying about storage space. Simply sign into Android Market with your Google account, and you can rent movies from anywhere – the web, or your Android phone or tablet – and start watching instantly. You can also download movies to your device so they’re available for viewing when you don’t have an internet connection.

JMD COMPUTER India - Outsourcing Website Development India - website development India - e commerce development India

Also in the U.S., you can now purchase books from Android Market on your phone. Like movie rentals, books are linked to your Google account, so they’re instantly available across all of your devices – computer, phone, or tablet – without the need for wires or downloads.

You’ll be delighted to find we’ve overhauled Android Market to make it faster, easier, and more fun to discover great apps, movies, and books. We’ve created more space to feature some of the most interesting content of the week on the home page. We’ve added more top charts, with newer, more relevant items, and we’ve made it easy to swipe through these charts as you browse the store. We’ve also introduced new collections of great content, like staff picks and Editors’ Choice apps.

The new Android Market will be rolling out in the coming weeks to Android 2.2 and higher phones around the world. You don’t need to do anything - the update is automatic on supported phones. If you’re in the U.S., you’ll also be able to download the Videos app, rent movies, and buy books once you receive the new Android Market.

Your phone is about to get a lot more interesting! Enjoy the new Android Market.

How to Install Android on Local Desktop Computer

First of all open this link and Download Android V 0.3 download here:

 http://code.google.com/p/live-android/downloads/list as per Above Video.

Posted by Paul Montoy-Wilson, Product Manager

 

Sanket Barot

http://jmdcomputerindia.com

Saturday, July 16, 2011

Protect your Data, Passwords

artical PictureIt’s hard to remember multiple passwords and keep sensitive information secure in this digital age. Whether you use a Mac, PC or smartphone, various free tools can help you with this by securing all passwords with a master password, encrypting data and securely wiping any sensitive info explain Karan Bajaj & Hitesh Raj Bhagat

EXCLUSIVELY FOR MAC OSX
Encrypt This

Simply drag and drop the files/folders you want to protect onto the application’s icon. It will then ask you to set a password for accessing the files and then create a protected disk image of your content.
Get it from www.nathansheldon.com

Pastor
One of the simplest password managers for MAC, Pastor requires a master password to be set to access all the stored passwords and serial numbers. It even comes with a password generator.
Get it from www.mehlau.net

Password Vault Lite
This app stores all your passwords online and safeguards them with a master password. It can also run from a USB drive and features an auto-lock timer that locks the program after some inactivity.
Get it from www.lavasoftware.com

TXTCrypt
As the name suggests, TXTcrypt works for text and not for files. Simply type in any text (mails/notes), protect it with a password and share it with anyone. The receiver needs the password and TXTcrypt to decrypt and read it.
Get it from www.txtcrypt.com

EXCLUSIVELY FOR WINDOWS PCs
AxCrypt

An open-source encryption solution, AxCrypt integrates with Windows Explorer to give you encryption options with a simple right click. The developers also offer portable versions (to use on flash drives).
Get it from www.axantum.com/axcrypt

Crypt4Free
Crypt4Free is a small package that allows easy encryption and schredding (secure deletion) of files on your Windows system. It also compresses encrypted files to reduce size while sending.
Get it from www.aeppro.com

MyPadlock
MyPadlock locks down all your passwords using 128-bit AES encryption — all you need to remember is one master password in order to access all the passwords you have stored inside. Data is stored locally.
Get it from www.mypadlock.com

Zero Footprint Crypt
Equally suited to both beginners and experts, Zero Footprint Crypt works just like a file explorer (with the same tree-style/hierarchy structure). After encryption, you can also use it to securely wipe the original file from the drive.

Get it from www.goo.gl/k4oE4 Available across multiple platforms KeePass
Perhaps the most popular cross-platform password safe, KeePass is easy to use, totally free (open source) and uses the most secure encryption algorithms around.
www.keepass.info

Lastpass
LastPass not only stores all passwords and login data, it also stays synced across browsers, giving you access to your passwords wherever you are.
www.lastpass.com Password Dragon Written using Java, Password Dragon is a password manager that works on Linux and can even be stored on and launched from a USB flash drive.
www.passworddragon.com

TrueCrypt
TrueCrypt creates a virtual encrypted disk on the machine — you can add, copy, paste files into the drive and it encrypts onthe-fly. It can also be used to encrypt external drives.
www.truecrypt.org

Apps for Android
File Locker
File Locker comes with its own file browser. You can batch select and encrypt/decrypt files irrespective of size. It also allows you to open documents from within the app and notifies you if a file is left unlocked by mistake. The interface can be configured to either display all files, only locked files or only unlocked files.

Pocket
Pocket allows you to save login information for websites, bank accounts and so on under various categories. The application requires a master password to view the data stored inside and allows you to copy text while keeping it masked. This way no one can read your login credentials even if the app is left running.

Apps for iOS
Enlume

With Enlume Password Manager, you can store your passwords and other information in a categorised way. If you categorise the information you store, it also becomes easy to search. The data is then protected by a master password—if the password is incorrectly entered too many times, it locks down the app for 24 hours.

TheVault
The Vault is a password manager for iOS devices that keeps your login credentials secure. Apart from passwords, it can also store screenshots and photos as well. All the information is stored on the device itself and it also allows importing of data from other password storing applications as well.

Apps for BlackBerry
iLocker Lite

iLocker offers enhanced security by allowing you to lock any application with a password. It can be set to lock an application after the phone is locked, immediately and even at a scheduled time. This way, not only are all your applications protected, even the content inside the application is kept safe from prying eyes.

Password Manager
Password Manager Secret Server stores important passwords in an intuitive user interface that makes it easy to organise and access. You can create a favorite list of passwords or securely share a password with any one you want. A nice touch is that it shows you which password was recently accessed or modified within the app.

- JMDComputerIndia.com

Wednesday, July 13, 2011

How to remove new folder.exe virus from pendrive

If you are using pen drive for data transfer at school, college or at your office you must have come across this virus. This virus creates an exe file in your USB drive with the name New Folder.exe. Here are some symptoms of thremove new folder.exe virusis virus.

  • Task manager is disabled.
  • Registry Editor is disabled.
  • Folder options not working.
  • Taking too much time for accessing pen drive.
  • Uses half of your computers processing power.

You can easily remove this virus from your computer by using Smart Virus Remover tool. It is a small 550 Kb file. Just download the file from the link given at the end of this article. Run this downloaded exe by double clicking on it. Then click on “Delete Autorun.inf file”.

After that click on” Remove virus from USB”. The virus will be removed from your pen drive. To restore your task manager, registry editor and other things which were disabled by virus – click on “Restore Default Windows Settings”.

- JMDComputerIndia.com

Thursday, April 14, 2011

Cyber attack hits WordPress.com, 18 million blogs compromised

image Automatic, the company that owns the Word Press.com blogging platform that powers more than 18 million blogs, announced this morning that its servers had been broken into and source code, among other things, could have been exposed.

 

Word Press founder Matt Mullenweg writes 'Tough note to communicate today: Automatic had a low-level (root) break-in to several of our servers, and potentially anything on those servers could have been revealed.'

According to Mullenweg, the break-in was limited but proprietary information could have been accessed:

We have been diligently reviewing logs and records about the break-in to determine the extent of the information exposed, and re-securing avenues used to gain access. We presume our source code was exposed and copied. While much of our code is Open Source, there are sensitive bits of our and our partners' code. Beyond that, however, it appears information disclosed was limited.

Update: According to Automatic, this break-in 'affects most of Automatic's services Root level access potentially allows access to everything on the servers."

Tech Crunch's Alexia Tsosis argues that Mullenweg is downplaying the severity of the incident, pointing out that "Word Press.com VIP customers are all on 'code red' and in the process of changing all the passwords/API keys they've left in the source code." Tech Crunch, among other big blogs, is a WordPress VIP customer.

"While Automatic is down playing the leak, site source code includes API keys and Twitter and Face book passwords," writes Tsosis.

Mullenweg says that the investigation is ongoing and that they have "taken comprehensive steps to prevent an incident like this from occurring again."

Mullenweg also suggests that users should use strong passwords, different passwords for each site and, "If you have used the same password on different sites, switch it to something more secure." In other words - change your passwords, folks.

- JMDComputerIndia.com

Sunday, March 13, 2011

BELKIN Play Max wireless router

One of the best routers available today with just one flaw. The name ‘Play Max’ raised our expectation before we actually tested this IEEE 802.11n based router and when we did it we were not at all disappointed, in fact disappointment came from other features.  image

Once out of box what you have in hand is a compact clean looking router with hidden antennas and single indicator light and WPS button in front for hassle free secure connection setup. Number of connection ports at back is where Play Max has edge when compared with other similar products; there are 5 gigabit ports (1xWAN, 4xLAN) which would be ample for any wired connection plus being gigabit would mean faster data transfer speeds.  2 USB 2.0 ports are also present at the back for connecting external USB based storage devices with FAT 16/32 and NTFS file system, USB printers are also supported by Play Max giving you ability to convert your USB based printer to network one.

Setting up this router was the simplest of jobs and a mere 3 step process with initial configuration provided in small booklet attached to box. To use most of the features of this router including using USB storage/printer you have to install router management software that would sit in task bar and add to CPU usage, which as per us is a major con of Play Max. The main issue we faced with the router was that it does not support plugging in a 3G USB modem.

To test the performance of this router which supports true dual band in 2.5 Ghz and 5 GHz  band respectively, we carried out two tests. First we used Qucheck 3.0 to test throughput, we connected one machine with wire to router and other wirelessly to N based laptop (both laptop and machine were running Windows 7) and then checked throughput over TCP protocol. Play Max was able to transfer 1000 Kb payload at 64 mbps which is one of the best scores we have seen. In second test we transferred 40 MB of mixed data from machine to laptop; Play Max was able to complete this transfer in 4 seconds which is again very high when compared to other products. We also tried using the router to stream HD videos from a windows media center to an Xbox 360 over WiFi, and it worked great.

Besides performance and features there are number of bundled utilities for different purposes like torrent gene for downloading files to external storage, bit boost for traffic prioritization, music mover for wireless music play from external storage. All in all, a high performing router with not so user friendly bundled software.

Wednesday, March 9, 2011

XPRSS – easy to use feed reader for BlackBerry

XPRSS is a fast, clean and easy to use feed reader for BlackBerry smartphone users. There are very few feed readers available in the market which can come anyway near XPRSS.

XPRSS comes preloaded with variety of feed categories. You can easily add new feeds of your choice. Variety of options are available for the user to choose from. One can add feeds to the reader directly using the feed url or just by giving the main website address and it will automatically find the feed location.

The most useful feature of it is it also allows the user to import feeds using OPML. So if you are an existing google feed reader user or using some other software to manage your feeds, you can simply export your feeds and import it into XPRSS.

If you like sharing what you discover then again XPRSS comes handy. It allows you to share articles directly from the post page to almost all popular social booknarking and social media sites. So if you are a BB geek and love to stay updated all the time then XPRSS is a must have app for you.

Download XPRSS for blackberry (Freeware)

Friday, March 4, 2011

3 free softwares to turn your Webcam into video surveillance camera

There are many situations in which you require to monitor your work area or your home. Here we have few free softwares which can turn your Webcam into a surveillance camera ;-) .

1. Rise Sun:

Rise Sun is a free Windows based video security software. Which uses a webcam for motion detection. In case of any movement detection it automatically takes a snapshot and saves it on your hard disk. It can ring an alarm if any movement is detected.  You can read more about this software and download it from here.

2. TeboCam:

TeboCam does the same job as Rise Sun. But it can send you emails also in case of any activity. TeboCam can generate snapshots at regular intervals and if any movement is found it can create emails and send the snapshots to you via mail or it can directly upload it on the website. To know all the features of it just download it and use it ;-) . Here is the download link. TeboCam

3. Prog’z WebCamSpy:

Prog’z WebCamSpy is not as good as the previous two softwares mentioned here. But it can be used to make your webcam a spy cam. It is a lightweight software. Does not require much resources to work. It just sits silently and takes snapshots using webcam at regular interval and saves them on your computer. It also can zoom on particular portion while recording so you can use it for monitoring specific areas. Download Prog’z WebCamSpy

If you know any other good software which can be used for the same purpose then please share it with us using comments form below. :)

Interesting story behind Trojan Horse

We all have heard about the viruses named Trojan Horse, Trojan Horse is a kind of virus which appears to perform it’s intended tasks, But silently steals all the information from your computer or harms your computer in a way which may be difficult to recover.

Interestingly I got to know a story about the name Trojan Horse virus, Here it goes…

In Greek Mythology they believe there was a city called, City Of Troys & there was other kingdom of Greeks. They fought for about 10 years and the war was called the Trojan War. After 10 years of fight the greeks still had nothing in their hands, it was a fruitless siege , So the greeks declared that they quit from the War.

Now the greeks built a giant horse made of wood & gave it as a trophy of victory to the citizens of Troy called TROJANS. The trojans happily took the horse inside the city. On the same night the trojans were busy celebrating their victory while 30 soldiers who were hiding inside the Giant Wooden Horse came out  & opened the city gates for the Greek Army. The Greek army then destroyed the entire troy city.

Since then everything that causes the target to bring a vulnerable object in to a secured area is referred as a Trojan Horse. Hence the name Trojan Horse is given to viruses that pretend to be something else, but once they are inside the system they start messing up the entire system.

SvcHost Exe process info & virus details

What is an SVCHost.exe file? & What is it doing in your task manager?

An svchost.exe file is a windows generic host process & is there for a good reason, This files is a native integral part of the windows operating system. It basically supports various windows services running from the Dynamic Link Library (DLL) files of windows. The services that may require SVCHOST.Exe include Windows Firewall, Automatic System Updates, Windows themes , Plug and play, Fax & printer services & many more. These services ideally start automatically when the windows system starts. These files are found in all windows operating systems launched after windows 2000 NT. (i.e Windows XP, Vista & 7).

clip_image001

When your windows system boots, The Svchost.exe file checks the windows registries & automatically builds a list of services that needs to be loaded. Usually each SVChost.exe carries different services from windows. If you find multiple SVChost.exe files in your task manager, there is nothing to worry about, it’s absolutely normal for windows to run multiple svchost.exe simultaneously.

SVCHOST.exe Virus & Removal

It is possible for malicious software’s to modify the windows registry & make SVCHOST.exe process to load the wrong malicious .dll files. Which will endup in making your computer or network affected with viruses and malewarez.

Another common approach is those viruses files are names SCVHOST.exe did you see the difference in the filenames? SVC vs SCV??

What this file sCvhost.exe does is that it allows hackers to access all your personal information, This is a virus of tye W30/Agobot-S, You may also call this a trojan horse. Since it hides itself with a genuine process name.

How to remove Svchost.exe virus or sCvhost.exe virus:

1. Removing the Svchost virus can be a very tedious task, Though i personally managed to somehow remove the virus using advanced tactics, It is not recommended that you try and follow the same, Because a single mistake could lead to a damaged Operating system, Which would be difficult to recover.

2. So instead of giving you the steps I find it appropriate to suugest you that you should use an Anti-virus to do this for you.

3. You can grab your self a free copy of antivirus over here (Norton Internet Security).

100% CPU utilization error in SVCHOST.EXE Process & Memory Leaks:

The first solution to this problem is that you may just want to restart the computer, Most of the times this will solve your problem, Another quick solution for this problem is to start the task manager & find the process causing this problem & then right click the process name and set the priority to low.

Saturday, November 13, 2010

Walkie Talkies FAQ

Q: Which radio band is right for me?
A: FRS Walkie Talkies are ideal for folks who generally wish to use these for outdoor purposes such as when hunting, fishing or camping. They are free of interference from business and government agencies and don't require you to have a license. GMRS have a much broader range for talk, extending up to five miles. These aren't intended for hobby use, rather they're meant for purposeful communications such as business or commercial activity. You must obtain a license from the FCC in order to operate in this band.

Q: What's the advantage of GPS-enabled Walkie Talkies?
A:
GPS units are equipped to map out your route, location and destination. These are ideal for the great outdoors to ensure your safety and prevent you from getting lost.

Q: What's the advantage of weather-alert enabled Walkie Talkies?
A: Weather-alert Walkie Talkies can provide you with advanced warning of severe weather to come. With an advanced signal to notify you of approaching storms, you can take the necessary precautions to make sure you and your family are safe.

Q: What brands manufacture Walkie Talkies?
A: There are a variety of brands on the market today. Here, on WalkieTalkies.com, we'll be carrying brands such as Audiovox, Cobra, Kenwood, Cherokee, Garmin Rino, Uniden, Midland and Sylvania.

Q: How do I know how what distance capability I'll need?
A: People who plan to use these for general outdoor activities such as walking or biking usually only need 2 or 5-mile capabilities. Same probably goes for business people who might use these at trade shows or the like. However, if the planned use is for greater distance activities such as hunting, hiking or camping, greater capabilities might be preferred to ensure safety and effective communication.

Q: What's the difference in channels?
A: Channels 1-7 are solely for use with the FRS/GMRS system. Channels 8-14 are solely for FRS and 15-22 is for GMRS. Some radios will only give you one Channel option where some will give you seven. Consider a 14-channel unit if you plan to use your radio in a large, urban environment where GMRS is already popular.

Walkie Talkie Distances

Size doesn't matter, right? Well, perhaps. But when comparing distance capabilities in walkie-talkies it sure does! There's the more common 2-mile and 5-mile units. And then theres the less common like the 7-mile, 8-mile or even 10-mile units. Your range of service needed really just depends on what your use will be. Hikers, for example, might prefer a greater range of distance.

image  image

The important thing to keep in mind when considering distance is that buildings, hills and other tall, solid structures can very easily get in the way of your transmitted signal. Distance is especially an issue with hunters, hikers and campers. FRS radios can grant you a range of up to 2 miles, whereas GRMS units can typically take you up to 5 miles. Just remember that the height of the antennae may be more important than the level of your radio's output power.

image

The greater distance units, like the 7-mile, 8-mile or 10-mile radios, may be more ideal for folks who generally do a lot of caravanning on road trips. The walkie-talkies would be great for outdoorsmen or hunters when they catch their target so they could buzz their buddies into helping them carry the large animal back to their vehicle.

Whatever the case may be, it's free two-way communications, where you don't have to rely on a cell-phone tower to get signal. With just the push of a button, you can easily get the attention of your friends, family and coworkers and get your message across. And you can do it knowing that in this case; when it comes to two-way radio distance range, size does matter.

Walkie Talkie Channels

How many channels do I need? Just like your radio or TV at home, walkie-talkies utilize channels to obtain their signal. FRS radios typically have either seven or 14 channels. Though, in most cases, the manufacturer will give you 38 possible CTCSS tones to use in the receiving and transmitting of your handheld radio. This means that, with a 14-channel radio, you could have up to 532 separate channel configurations or frequencies. GMRS units provide you up to 22 channels.

However, please note that when in a well-populated area, anyone with CTCSS disabled on their walkie-talkie will be able to hear your radio transmission on their radio. The tones, sometimes called interference or squelch codes, are meant to help prevent this. They help filter out static, noise and unwanted chatter on the two-way radio channels. Just select a predetermined channel and code, and you can communicate only with someone using the exact same channel and code. Just remember that your conversation may be semi-private and that privacy is not guaranteed.

      image     image

Channels 1-7 are solely for use with the FRS/GMRS system; including the more common 2 channels and 4 channels. Eight through 14 channels are solely for FRS, and GMRS gives you between 15 channels and 22 channels for a wide range of communication options. Even though FRS offers 14 channels, some radios come with only one channel and some with only seven. These radios can cost half as much and, for most people, be completely adequate. The sturdy single channel radios are good for business use. Other cheaper models with one channel are just toys. The one and seven channel radios generally have the GMRS interstitial frequencies and not the FRS-only channels. Consider a 14-channel unit if you plan to use your radio in a large urban environment where GMRS is already popular.

Having a 15-channel or more GMRS unit definitely provides you with more choices for your business communications. Though, if you're on an FRS/GMRS system, having 2 channels or 4 channels might suit you just fine. Be sure to determine your use and functionality before making your final selection.

Walkie Talkie

Welcome to the best source for Walkie Talkie Information!

Here, you'll find all sorts of information on Walkie Talkies. You'll learn about different scenarios in which one would need or want a hand-held radio. And you'll discover that there are plenty of options to choose from. Learn the difference between FRS and FRS/GMRS. Learn about GPS-enabled and weather-alert enabled units. And learn how distance and channels play a major role. Want to explore price, brand and accessories? That's all here, too & all at the click of a button. So, come on in. Take a look around. And educate yourself on the Walkie Talkie.

Walkie Talkies Informationimage

  • Different types of Walkie Talkies
  • Accessory options for your handheld radio
  • Available brands on the market
  • The distance dilemma in choosing a Walkie Talkie
  • Different channels for FRS and GRMS units
  • You get what you pay for

WalkieTalkies.com is your one stop shop for useful information on two-way hand-held radios. Find helpful commentary to assist you in your education of Walkie Talkies.

How to Choose the Right Walkie Talkies

Selecting the right Walkie Talkie for your needs is going to take some research. Things to consider include:

  • What will your purpose be?
  • Where do you plan on using the unit(s)?
  • Will you need any additional accessories?

Check out the articles on this site to help you determine which type is right for you.

Saturday, August 28, 2010

kamaal ka salesman

Ek bar ek Shopping Mall ne ek naya gujarati salesman hire kiya. Salary badhne lagi-din dugni, raat chauguni.

Boss ne socha is ladke se mujhe milna hai. Boss Mall par aaya, usne dekha ladka ek customer ko fishing-rod bechraha tha.

Woh door khada ho kar hi usko customer se deal karte dekhne lagaa. Ladke ne fishing-rod bech di. Customer ne kaha kitne rupaye, ladka bola Rs.800/-.

Yeh kahkar ladke ne customer ke shoes dekhe aur bola, itne mehange shoes pahankar fishing karne jayenge? Ek sport shoe bhi kharid lijiye, customer ne sport shoes bhi kharid liye.

Ab ladke ne kaha talaab kinare dhoop mein baithna padega, ek cap bhi kharid lijiye to theek rehega, customer ne cap bhi kharid li. Ab ladke ne kaha, machli pakadne mein bahut intezar karna padega, kuchch eatables, wafer, biscuits, bhi le jayiye, customer ne woh bhi kharid liye. Ladka bola machli pakdenge to rakhenge kahan ? Yeh ek Rs.100/- ki basket bhi le lijiye, customer ne woh bhi kharid li.

Ab total bill bana Rs.2000/- ka.

Boss bahut khush hua. Usne ladke ko bulaya aur kaha, tum to kamal ke salesman ho. Woh aadmi fishing rod kharidane ayaa . . aur tumane usey itna sara samaan bech diya, very good.

Ladka bola, ' Sir, woh aadmi to 'Stayfree' napkin kharidane ayaa tha uski biwi ke liye, maine kaha, char din tu ghar par kya karega, '"Jaa Machli pakad”.

- JMD Computer                                                  Give Comment

Sunday, August 1, 2010

Convert text from image files using Free-OCR

If you don’t know, OCR stands for Optical Character Recognition and is mainly used to identify and extract characters from images, mostly from scanned pages.

Free-OCR is a free and easy to use web service using which you can extract text from your image files in few simple steps.

  1. Go to Free-Ocr.com.
  2. Click on the “Browse” button to upload your image.
  3. Enter the CAPTCHA code.
  4. Select the language of the text in image file from the drop down menu.
  5. Click on the “Send File’ button.
  6. Wait while your image is being uploaded on the server and it is processed.
  7. A text box containing the text extracted from the image will be shown on the next page. Now you can copy and edit this text in the way you want.

The Free-OCR supports some basic image file formats like JPEG, GIF, TIFF, BMP etc. The final output is almost flawless. You can try using it for any scanned image of a printed paper.

Free-OCR.com is a free online OCR (Optical Character Recognition) tool. You can use this service to extract text from any image you supply.

This service is free, no registration necessary. We also do not need your email address.

Just upload your image files. Free-OCR takes either a JPG, GIF, TIFF BMP or PDF (only first page).

The only restriction is that the images must not be larger than 2MB, no wider or higher than 5000 pixels and there is a limit of 10 image uploads per hour.

Free-OCR can handle images with multi-column text and also supports more languages: Bulgarian, Catalan, Czech, Danish, Dutch, English, Finnish, French, German, Greek, Hungarian, Indonesian, Italian, Latvian, Lithuanian, Norwegian, Polish, Portuguese, Romanian, Russian, Serbian, Slovak, Slovene, Spanish, Swedish, Tagalog, Turkish, Ukrainian, Vietnamese.

- JMD Computer                                                  Give Comment

 
Design and Bloggerized by JMD Computer