Wednesday, November 17, 2010
Tuesday, November 2, 2010
send free sms all over india using way2sms tool(without advt.)
Send free sms anywhere using way2sms tool without the hassles of advertisement.
How to run the Program ?
Simply double clicking the program, it should run.
Java should be installed on your machine.
if it's not installed then download it from the link given below.
How to run the Program ?
Simply double clicking the program, it should run.
Java should be installed on your machine.
if it's not installed then download it from the link given below.
Requirements:
Quotes in movie
A Beautiful Mind (2001)
Jennifer Connelly (Alicia): I need to believe, that something extraordinary is possible.
Jennifer Connelly (Alicia): I need to believe, that something extraordinary is possible.
A Beautiful Mind (2001)
Russell Crowe (Nash): Find a truly original idea. It is the only way I will ever distinguish myself. It is the only way I will ever matter.
Russell Crowe (Nash): Find a truly original idea. It is the only way I will ever distinguish myself. It is the only way I will ever matter.
As Good As It Gets Movie Quotes (1997)
Jack Nicholson (Melvin Udall): I've got a really great compliment for you, and its true.
Jack Nicholson (Melvin Udall): I've got a really great compliment for you, and its true.
Helen Hunt (Carol Connelly): I'm so afraid you're about to say something awful.
Jack Nicholson (Melvin Udall): Don't be pessimistic, it's not your style. Anyway, here goes: I've got this, what, ailment. Now, my doctor, this shrink I used to go to all the time, says that in fifty to sixty percent of cases, a pill really helps. I HATE pills, hate them. I'm using the word "hate" about pills. Anyway, my compliment to you is the night after you came over and said that you would never . . . well, you were there, you know what you said. Anyway, the very next morning, I started taking the pills.
Inspirational Quotes
-Attitude determines altitude.
- Anonymous
- Anonymous
-There is nothing either good or bad, but thinking makes it so.
- William Shakespeare
-Attitude to me is more important than facts. It is more important than the past, than education, than money, than circumstances, than failures, than success, than what other people think, say or do. It is more important than appearance, gift, or skill. It will make or break a company...a church...a home.
Monday, November 1, 2010
Human head and brain size
The human head contains 22 bones, consisting the cranium and the facial bones. The cranium is formed by 8 bones: the frontal bone, two parietal bones, two temporal bones, the occipital bone in the back, the ethmoid bone behind the nose, and the sphenoid bone. The face consists of 14 bones including the maxilla (upper jaw) and mandible (lower jaw). (The skull has many little holes in its base which allow the cranial nerves to travel to their destinations.)
The cranium protects the brain, which, for an average adult male weighs about 1400 gram (49 oz). The brain of Russian novelist Turgenev, weighed 2021g (71 oz), Bismarck’s brain weighed 1807g (64 oz), while that of famous French statesman Gambetta was 1294g (46 oz). Female average brain mass is slightly less than that of males. The largest woman’s brain recorded weighed 1742g (61 oz). Einstein’s brain weighed 1230 gram (43.39 ounces), meaning Einstein’s brain was smaller than average.
An elephant’s brain weighs 5000g (176oz or 11 lb), a whale’s 10000g (352oz or 22lb). In proportion to the body, the whale has a much smaller brain than man. This seem to give man the edge, until it was discovered that the dwarf monkey has 1g of brain per 27g (0.95oz) of body, and the capuchin monkey has 1g of brain per 17,5g body, whereas man has 1 gram of brain to 44g of body.
Who invented the light bulb?
Who invented the light bulb? No, it wasn’t Thomas Edison. Light bulbs – in particular Starr’s electric lamp – were in use 50 years before Edison applied for the patent in 1879. In addition, British inventor Joseph Swan was awarded a light bulb patent the previous year. Edison went on to make big buck from the light bulb but Swan sued Edison for infringement and won. As part of the settlement, Edison was forced to take Swan in as a partner but later bought him out in the company that was to become General Electric.
In 1883, the US Patent Office ruled that Edison’s patent on the light bulb might have been based on that of William Sawyer and were invalid. It is not that Edison stole the idea: there are many examples of different people thinking up the same concept at more-or-less the same time.
Friday, September 10, 2010
Hack a Website Using Remote File Inclusion
Remote file inclusion is basically a one of the most common vulnerability found in web application. This type of vulnerability allows the Hacker or attacker to add a remote file on the web server. If the attacker gets successful in performing the attack he/she will gain access to the web server and hence can execute any command on it.
Searching the Vulnerability
Remote File inclusion vulnerability is usually occured in those sites which have a navigation similar to the below one
Monday, September 6, 2010
How To Delete/Remove Khatra.exe/Xplorer.exe/gHost.exe Virus from Your Computer?
This virus has some symptoms when ever you try to open browser and search remove khatra.exe the browser will automatically close, you can’t not delete khatra.exe or gHost.exe or Xplorer.exe which are created by the same virus as these processes will keep running.
Let’s discuss the removal procedure to delete khatra.exe or gHost.exe or Xplorer.exe virus
Fix:
Follow the procedure below
Let’s discuss the removal procedure to delete khatra.exe or gHost.exe or Xplorer.exe virus
Fix:
Follow the procedure below
Is your PC taking too much time to Shutdown?
Does your system take a lot of time to shutdown? If yes, follow the tips listed below to speed up system shutdowns.
Close All Running Programs
When you give the command to shutdown Windows, the shutdown process first closes down all applications and processes running on it and then shuts down itself. Therefore, if your system is slow in shutting down, it is recommended that you first close all programs running on the computer and displayed in the system tray and then give the shutdown command.
Resolve Problems Related to Buggy and Outdated Drivers
Buggy and outdated device drivers may also cause problems during system shutdown. To see if there are problems with device drivers on your computer, do the following:
Close All Running Programs
When you give the command to shutdown Windows, the shutdown process first closes down all applications and processes running on it and then shuts down itself. Therefore, if your system is slow in shutting down, it is recommended that you first close all programs running on the computer and displayed in the system tray and then give the shutdown command.
Resolve Problems Related to Buggy and Outdated Drivers
Buggy and outdated device drivers may also cause problems during system shutdown. To see if there are problems with device drivers on your computer, do the following:
Fixing WMP.dll Error Message
An error message similar to the one given below may be displayed on your computer screen when you try to open Windows Media Player on your computer:The file wmp.dll has a version number of 9.0.0.3075 where 9.0.0.2980 was expected. Windows Media Player is not installed properly and must be reinstalled.You may not be able to fix the error even by reinstalling the Media Player and the error message may display when you try to launch the application soon after re-installation.
To resolve this issue, open Start menu, select Run, type the following error message, and then press Enter.
C:\windows\inf\unregmp2.exe /UpdateWMP
To resolve this issue, open Start menu, select Run, type the following error message, and then press Enter.
C:\windows\inf\unregmp2.exe /UpdateWMP
Sunday, September 5, 2010
Pavan Kalyan’s KOMARAM PULI Censor Report
Much Much Awaited .. Max. Postponed Movie at last completed Censor work .Good News For Pavan Fans Censor People appreciated Pavan’s Character in Komaram Puli.
Censor Report:
Censor Certificate : A (18 Years and above)
Run Time: 163 Minutes
Run Time: 163 Minutes
Performance:
Plus:
1.Pavan kalyan
2.S.J suriya
3.Rahman music
4.Nikisha
1.Pavan kalyan
2.S.J suriya
3.Rahman music
4.Nikisha
Pavan Kalyan looks amazing,he rocks with all his styles,Dialog Delivery and Mannerism ,Nikisha Looks Hot,Director S.J.Suriya was confident about 1st half ,i.e, 1st taking will be missed in 2nd half.Interval bang and Emotional scenes were super.Sriya song was too hot
Minus:
1. 2nd half starting
2. Dialog could have been better
3.Graphics
2. Dialog could have been better
3.Graphics
Verdict:
Movie starts of well good action,comedy sequence and interval bang makes K.Puli 1st half rock. A good hype is generated in 1st half gets destroyed in 2nd half.Movie Reduces its pace. But 2nd Half looks Good in last 30-35 minutes.Overall Komram Puli Above Average Product from Singamala Ramesh .Pavan Fans will Love it.
How To Apply Restrictions And Prevent Users From Changing Files On Your Hard Drive ?
How can we revert all the changes made by user after the user log off or system restart, this is quite a custom requirement when the you want to remove all the changes being made to your computer made by any other user who had used your computer once in a while.

Removing all the changes made by the user will remove all the created files by that user and software being installed by the user, you can more over apply certain restrictions also on the users using your computer, all this can be achieved by a free utility by Microsoft called Steady State
Fix:
Fix:
To Find Windows XP Key Inside CD (Manually)
Are you worried to remember your XP key.Its no more, here is a solution for it :).Your cd key is preserved in the cd itself.
Steps to follow to find Windows XP CD key:
1. Bring your Windows XP CD and insert it into your computer’s CD/DVD ROM/ RAM.
2. Now, browse your Windows XP CD and find the folder I386.
Steps to follow to find Windows XP CD key:
1. Bring your Windows XP CD and insert it into your computer’s CD/DVD ROM/ RAM.
2. Now, browse your Windows XP CD and find the folder I386.
Removing Newfolder.exe Virus manually
What is Newfolder.exe?
The real name of this virus is Iddono. This threat copies its file(s) to your hard disk. Its typical file name is Iddono. Then it creates new startup key with name Iddono and value newfolder.exe. You can also find it in your processes list with name newfolder.exe or Iddono.This virus is very difficult to eliminate manually, but you can find solution for removal below.
The real name of this virus is Iddono. This threat copies its file(s) to your hard disk. Its typical file name is Iddono. Then it creates new startup key with name Iddono and value newfolder.exe. You can also find it in your processes list with name newfolder.exe or Iddono.This virus is very difficult to eliminate manually, but you can find solution for removal below.
Manual Solution(if u dont have an anti-virus):
Step1:1. Search for autorun.inf file. It is a read only file so you will have to change it to normal by right clicking the file , selecting the properties and un-check the read only option
2. Open the file in notepad and delete everything and save the file.
Does Websites Asks To Press F1 Key ? DON’T PRESS IT
Microsoft has been reported of a vulnerability discovered in Windows operating systems Windows XP, Windows 2000 and Windows Server 2003 which exploits the VB Script. Microsoft has recently released an Advisory named “Microsoft Security Advisory (981169)”
As per the advisory there is a vulnerability that if a user presses F1 Key on being asked by a Website or webpage, the website can run potentially malicious code or script on such computers. That computer can get hacked, information can be stolen or it may also lead to data theft.
As per the advisory there is a vulnerability that if a user presses F1 Key on being asked by a Website or webpage, the website can run potentially malicious code or script on such computers. That computer can get hacked, information can be stolen or it may also lead to data theft.
Friday, August 27, 2010
CSE Imp Questions and bits for 1st mid
These imp ques are taken 4m raghu engg colleg website......
You can download by clicking on the respective link
III CSE Descriptive
III CSE Objective
enjoy:)...
You can download by clicking on the respective link
III CSE Descriptive
III CSE Objective
enjoy:)...
Sunday, August 22, 2010
10 unexplained sounds
We have mysteries around us and they leave us head scratching everytime, just taking the sound’s category, we have these ten.
10. Slow Down
“Slow Down” is a sound recorded on May 19, 1997, in the Equatorial Pacific ocean by the U.S. National Oceanic and Atmospheric Administration. The source of the sound remains unknown. The name was given because the sound slowly decreases in frequency over about 7 minutes. The sound was detected at 15°S 115°W / 15°S 115°W / -15; -115. It was recorded using an autonomous hydrophone array. The sound has been picked up several times each year since 1997. One of the hypotheses on the origin of the sound is moving ice in Antarctica. Sound spectrograms of friction closely resemble the spectrogram of the Slow Down. This suggests the source of the sound could be a friction phenomenon of ice rubbing over land. More of similar to this were recorded but later in different areas and different frequencies namely; Julia, Upsweep, and Train.
9. Electronic voice phenomenon
Caution: the recording is violent and may be too intense for some listeners.
“Electronic Voice Phenomenon” or the Phantom Words are electronically generated noises that resemble speech, but may or may not be the result of intentional voice recordings or renderings. Some have claimed these sounds are of paranormal origin, while others give explanations such as apophenia (finding significance in insignificant phenomena), auditory pareidolia (interpreting random sounds as voices in their own language) but no explanation is generally accepted. Now thousands of people across world spend their free time in wandering around haunted locations and installing recorders and video cameras in hopes of spooks and apparition. The evidence could be found at City of Dundee in Scotland, a city packed full of dead people, really a huge part of this city is formed over a massive ancient graveyard. It’s here wondering among the deceased, many EVP investigators have recorded strange findings.
10 Most expensive cars
Here is a list of the ten most expensive cars in the world that are still sold on the market.
Bugatti Veyron
With a price tag of $1,700,000, the Bugatti Veyron holds the distinction of being the most expensive car available on the market today. The Bugatti Veyron also claims the spot for the second fastest car in the world, right behind the SSC Ultimate Aero, with a top speed of 253 mph+. However, it is the fastest accelerating car and can go 0-60 in 2.6 seconds.
Lamborghini Reventon
The Lamborghini Reventon retails for $1,600,000. This version of the Lamborghini packs a lot of power and is the company’s most expensive model. It can reach 60 mph in 3.3 seconds with a top speed of 211 mph. The car has a slick jet-inspired design and is rare: only 20 are manufactured each year.
Monday, August 16, 2010
Google Defends Net Neutrality Plan
Despite a high degree of opposition, Google is defending its net neutrality proposal co-authored with broadband and wireless provider Verizon. The search giant on Thursday issued counterarguments on six points (Google calls them myths) that the company believes have been misunderstood about its proposal. Google says the proposed framework defends net neutrality, would protect the current Internet we enjoy today, and is definitely not about writing legislation from the boardroom.
Let's take a look at the highlights from Google's defense.
We're No Sell-Outs
Google says its proposal has not sold out the fundamental concept of net neutrality. The idea that an Internet provider should not be allowed to restrict Web data traffic based on the traffic's contents."No other company is working as tirelessly [as Google] for an open Internet," the company's statement says. Google goes on to explain how it felt compelled to negotiate a framework with Verizon, because of the stagnant political situation in Washington. The company then said the proposal has "key enforceable protections" for users, which is better than having no protection at all.
The problem is it's unclear whether the Google-Verizon proposal really would protect users. The proposal leaves wireless networks out of net neutrality regulation entirely. The agreement would also create a two-tiered Internet with a net neutral public Internet (the World Wide Web we use today), and a private non-neutral Internet for premium services that could be packaged similarly to cable television. Given the financial incentives from wireless and the private Internet, it's unclear whether the public Internet would survive under this system.
Doesn't Kill Wireless Neutrality
Google says its proposal would not eliminate network neutrality over wireless cellular networks. The company believes the proposal's transparency rules that force companies to publicly report wireless traffic management policies would ensure providers played fair. Google also stuck to its belief that the wireless market is competitive enough that it doesn't warrant net neutrality regulation. "Network and device openness is now beginning to take off as a significant business model in this [the wireless] space," Google says.I'm not really sure what Google means when it says openness is taking off in the wireless market. Perhaps the company is referring to the fact that you can buy a variety of devices like the iPhone or any number of Android devices that are permanently locked to one carrier. Maybe it's the idea that all four major cellular providers are often criticized for their high early termination fees, device exclusivity contracts that cut out smaller vendors, uniform text messaging costs or other sneaky fees that tend to sneak up on users.
Google also says that managing a wireless network is different from a wired broadband network since Internet traffic sent over airwaves is less robust than its cabled counterpart.
Won't Cannibalize Public Internet
The regular Internet is not going anywhere, Google says. The Google-Verizon framework puts several safeguards in place to make sure the current Internet stays the way it is, according to the search giant. The proposal would force broadband providers to comply with "consumer protection and nondiscrimination standards" before offering private Internet services.Private services must also be "distinguishable in purpose and scope" from what you get on the regular Internet. Finally, the FCC would be able to intervene and prevent carriers from reducing public Internet broadband capacity.
That last point sounds nice, but what about the first two? What exactly will those "nondiscrimination standards" be? How will they be defined to ensure fair play?
Google also says the private services are supposed to be different "in purpose and scope" from what you can get on the regular Internet. Google points to several examples of these new services such as gaming channels, home health monitoring, or more secure banking. The problem with this idea is that, as author Jeff Jarvis recently pointed out, it sounds like the private Internet could be reserved for "anything new." You're offering a new encryption standard on your Website? That's the private Internet. Got a new version of Halo? Private. A new 3D streaming service from Netflix? Private.
Where would this proposal draw the line between upgraded Web services and those that are truly different "in purpose and scope" from what you can get online right now?
Google defends several other points in its blog post. The company says the net neutrality framework was not influenced by business decisions surrounding Android, Google's mobile operating system. The search giant also says this proposal is about moving the debate forward not backward as some have contended.
TCS to bring the power of cloud computing to SMBs
Tata Consultancy Services (TCS), the country’s biggest software exporter, is ready to roll out what is internally being talked about as group chairman Ratan Tata’s next dream project. The company’s senior management has even called it the ‘Nano of IT’. The ambitious project, which is a ‘cloud’ offering, is expected to be launched mid-September, with the lofty aim of making information technology affordable to the country’s 35 million small and medium businesses (SMBs).
Developed by a 250-member TCS team, the cloud offering promises to lower the cost of ownership by 35-40%, compared with the traditional licensing model. Expensive capex investments required in IT will be converted into a monthly subscription model. Pricing per user for the entire IT stack will be Rs 8,000-10,000 per month. The stack includes hardware, networking and software. New customers will be locked in for three years, sources close to the development told FE.
The service is expected to be a major growth engine for TCS. FE has learned that executives have been internally talking about raising up to $1 billion a quarter in the coming years from the service, though it is early days yet. Initially, the focus will be on the domestic market, but the firm plans to take the offering overseas later. To begin with, TCS is confident of adding 100 customers every quarter or 400 in a year’s time.
Cloud services, delivered over the Internet, are an on-demand paradigm that can disrupt the way IT services are delivered today. Cloud computing uses virtualisation technologies and can potentially make an enterprise shed all of its IT assets one day — servers, storage, and applications can all be rented as per the requirement from cloud service providers.
The TCS service has been piloted with 75 customers and Ratan Tata is likely to review the project later this month. “We are checking with his calendar and trying to get a date for the launch in September,” a source said.
When officially launched, this would be one of the biggest cloud rollouts in the world, and perhaps Ratan Tata’s last big-ticket project before he retires in 2012 as Tata group chairman.
Developed by a 250-member TCS team, the cloud offering promises to lower the cost of ownership by 35-40%, compared with the traditional licensing model. Expensive capex investments required in IT will be converted into a monthly subscription model. Pricing per user for the entire IT stack will be Rs 8,000-10,000 per month. The stack includes hardware, networking and software. New customers will be locked in for three years, sources close to the development told FE.
The service is expected to be a major growth engine for TCS. FE has learned that executives have been internally talking about raising up to $1 billion a quarter in the coming years from the service, though it is early days yet. Initially, the focus will be on the domestic market, but the firm plans to take the offering overseas later. To begin with, TCS is confident of adding 100 customers every quarter or 400 in a year’s time.
Cloud services, delivered over the Internet, are an on-demand paradigm that can disrupt the way IT services are delivered today. Cloud computing uses virtualisation technologies and can potentially make an enterprise shed all of its IT assets one day — servers, storage, and applications can all be rented as per the requirement from cloud service providers.
The TCS service has been piloted with 75 customers and Ratan Tata is likely to review the project later this month. “We are checking with his calendar and trying to get a date for the launch in September,” a source said.
When officially launched, this would be one of the biggest cloud rollouts in the world, and perhaps Ratan Tata’s last big-ticket project before he retires in 2012 as Tata group chairman.
Microsoft to release IE9 public beta on Sept. 15
Microsoft on Thursday announced that it will release a public beta of Internet Explorer 9 on Sept. 15, a little less than five weeks from now.
Thursday's announcement followed a comment made late last month by Kevin Turner, the company's chief operations officer, that the IE9 beta would show up in September. Until today, Microsoft had declined to set a date or even confirm Turner's statement.
Microsoft first announced IE9 in March, and it has released four developer preview builds since then. The most recent one appeared on Aug. 5, and at that time the company said the fourth such preview would be the last.
But while those previews have trumpeted the new browser's "Chakra" JavaScript engine, its graphics-processor-powered hardware acceleration and its support for the new HTML5, as well as the fact that it is more in line with current Web standards, Microsoft hasn't as much as whispered about IE9's look and feel.
The developer previews have relied on an nearly-nonexistent interface that lacks even the most basic navigational features, such as a Back button or even an address bar.
Most expect that Microsoft will debut IE9's user interface in the beta next month.
According to reports earlier this year, IE9 was to feature a look copied from Windows Phone 7's "Metro" interface. Today, Neowin.net said sources had told it that Metro is out and a "simplistic UI similar to that of Google's Chrome" is in.
If so, it wouldn't be a surprise: Other browser makers, notably No. 2 Mozilla, have headed in that direction, too, as they follow the lead of Google and its cleaner-composed Chrome. Mozilla's next major upgrade, Firefox 4, will feature tabs on top and will eliminate the traditional Windows menus above the browser's content area, two features popularized by Chrome.
IE is on a two-month upswing in usage share, according to the most recent data from metric firm Net Applications, and Microsoft has to hope that IE9 will be able to maintain that momentum.
However, earlier this month Roger Capriotti, a product management lead on Microsoft's IE team, refused to be drawn into a discussion of the company's goals for IE9, or even whether the company thought the new version would entice erstwhile users to come back to the browser.
Vince Vizzaccaro, an executive at Net Applications, had previously pegged IE's increase in usage share to the growth of Windows 7, the Microsoft operating system that includes IE8, and to a national television advertising campaign in the U.S. More recently, he had other explanations.
"[The two-month increase] is more than a blip for IE," said Vizzaccaro in an interview last week. "Something is working for them. Maybe it's related to ongoing privacy concerns on the part of people with Google."
Microsoft has said nothing about a ship date for IE9, though many have speculated on an April 2011 release to coincide with MIX, the company's annual Web conference, which is slated to take place April 12-14, 2011, in Las Vegas.
It's possible the ship date will be significantly later: Microsoft finalized IE8 a full year after it released the first public beta for that browser. If it maintains the same pace for IE9, the upgrade's final edition might not appear until September 2011.
Wednesday, August 11, 2010
Microsoft Scrambles to Squash Bug in Windows Kernel
Microsoft on Friday said it is investigating an unpatched vulnerability in Windows after an Israeli researcher revealed a bug in the operating system's kernel driver.
Artwork: Chip TaylorAccording to Gil Dabah, a researcher from Tel Aviv who goes by the nickname "arkon," the Windows' kernel harbors a heap overflow vulnerability. Dabah also posted a short proof-of-concept to demonstrate the bug on RageStorm.com, a site he and two others run.
"Microsoft is investigating reports of a possible vulnerability in Windows Kernel," said Jerry Bryant on Friday. "Upon completion of the investigation, Microsoft will take appropriate actions to protect customers." Microsoft issues regular patches, but last week released a fix for a critical zero-day hole.
In an alert published Friday , Danish bug tracker Secunia pinpointed the bug in the "Win32k.sys" kernel-mode device driver, the kernel component of the Windows subsystem. Attackers could exploit the flaw using "GetClipboardData," an API (application programming interface) that retrieves data from the Window clipboard.
A successful exploit would allow hackers to execute their attack code in kernel mode, which would then let them infect the PC with malware or pillage any data on the machine.
The flaw exists in several versions of Windows, including XP SP3, Server 2003 R2, Vista, Windows 7 and Windows Server 2008 SP2, said Secunia, which rated the bug as "less critical," the firm's second-lowest threat ranking.
Microsoft has patched 13 Windows kernel vulnerabilities this year. In June, for example, MS10-032 patched three vulnerabilities in Win32k.sys; in April, it quashed eight bugs with MS10-021 ; and in February, MS10-015 fixed two flaws.
One researcher with experience digging up kernel bugs said the latest is business as usual. "I don't think there's been more than a few days this year that Microsoft [hasn't] been vulnerable to public kernel flaws," said Tavis Ormandy on Twitter . Ormandy reported three of this year's kernel vulnerabilities to Microsoft.
Most of those bugs were rated as "important," Microsoft's second-highest ranking, because they could not be exploited remotely, but required an attacker to have physical access to the PC and valid log-in credentials. It's likely that Dabah's find will as well.
Microsoft will issue 14 security updates, including 10 for Windows, on Tuesday. But unless the company found Dabah's flaw on its own, or the vulnerability was reported by another researcher earlier -- it's not unheard of for several researchers to stumble across the same bug -- a fix won't appear until September or later.
Artwork: Chip TaylorAccording to Gil Dabah, a researcher from Tel Aviv who goes by the nickname "arkon," the Windows' kernel harbors a heap overflow vulnerability. Dabah also posted a short proof-of-concept to demonstrate the bug on RageStorm.com, a site he and two others run.
"Microsoft is investigating reports of a possible vulnerability in Windows Kernel," said Jerry Bryant on Friday. "Upon completion of the investigation, Microsoft will take appropriate actions to protect customers." Microsoft issues regular patches, but last week released a fix for a critical zero-day hole.
In an alert published Friday , Danish bug tracker Secunia pinpointed the bug in the "Win32k.sys" kernel-mode device driver, the kernel component of the Windows subsystem. Attackers could exploit the flaw using "GetClipboardData," an API (application programming interface) that retrieves data from the Window clipboard.
A successful exploit would allow hackers to execute their attack code in kernel mode, which would then let them infect the PC with malware or pillage any data on the machine.
The flaw exists in several versions of Windows, including XP SP3, Server 2003 R2, Vista, Windows 7 and Windows Server 2008 SP2, said Secunia, which rated the bug as "less critical," the firm's second-lowest threat ranking.
Microsoft has patched 13 Windows kernel vulnerabilities this year. In June, for example, MS10-032 patched three vulnerabilities in Win32k.sys; in April, it quashed eight bugs with MS10-021 ; and in February, MS10-015 fixed two flaws.
One researcher with experience digging up kernel bugs said the latest is business as usual. "I don't think there's been more than a few days this year that Microsoft [hasn't] been vulnerable to public kernel flaws," said Tavis Ormandy on Twitter . Ormandy reported three of this year's kernel vulnerabilities to Microsoft.
Most of those bugs were rated as "important," Microsoft's second-highest ranking, because they could not be exploited remotely, but required an attacker to have physical access to the PC and valid log-in credentials. It's likely that Dabah's find will as well.
Microsoft will issue 14 security updates, including 10 for Windows, on Tuesday. But unless the company found Dabah's flaw on its own, or the vulnerability was reported by another researcher earlier -- it's not unheard of for several researchers to stumble across the same bug -- a fix won't appear until September or later.
Indian outsourcing industry hits out at US visa bill
NEW DELHI — India's flagship outsourcing industry has slammed a US bill that could double the cost of a work visa in a move targeting high-profile Indian software exporters. The measure would boost annual US visa costs for India?s outsourcing industry by 200-250 million dollars annually, the National Association of Software and Services Companies (NASSCOM) warned.
S. Gopalakrishnan, chief executive of India's second-largest outsourcer Infosys Technologies, told reporters late Monday he was "saddened and disheartened" by the step and said the sector would lobby strongly against it.
India, which already holds at least 50 percent of the global outsourcing market, has become the world's back office where Western firms set up call centres, number-crunching and software development outlets to cut costs.
But the 50-billion-dollar industry also sends skilled workers to the United States to develop software and direct projects for US clients.
The visa legislation, sponsored by two Democratic senators and passed unanimously by the Senate last week, still needs to be approved by the US House of Representatives and signed into law by President Barack Obama.
The row has erupted as India gets ready to host Obama later this year.
With anti-outsourcing anger stoked by high US unemployment, critics denounce the Indian firms as "body shops" because they provide Indian professionals to US companies rather than employing Americans.
"We think it (the bill) goes against the notion of free trade and is discriminatory," India's third-largest outsourcer, Wipro, said in a statement.
The measure would raise by 2,000 dollars per application the US fee paid by any company with more than 50 people in which over half the workforce has H-1B and L-1 visas earmarked for skilled foreign workers, industry officials say.
The current visa fee is 2,500 dollars.
The proposal is to use proceeds from the fee hike to pay for the US government's plans to boost security along its border with Mexico to help crack down on illegal immigration and drug smuggling.
"While we understand the need for heightened border security, we believe the extra fees will produce negative consequences for both US and Indian companies," said NASSCOM president Som Mittal.
Sponsors of the bill on a Senate website said the legislation would hike fees on particular Indian companies -- including Wipro, Infosys, Tata and Satyam -- which they accuse of seeking to "exploit" the two categories of visas to "import foreign workers into the United States."
Indian IT firms fly thousands of employees each year to the United States to work at their clients' locations as on-site technicians and engineers in what critics claim is a violation of the "spirit" of US immigration law.
US high-tech firms such as Microsoft, which bring skilled immigrants into the United States on the same visas, would not be hit by the bill as the vast majority of their workforce is composed of Americans.
"US companies, which use the bulk of these visas, would remain unaffected by the legislation," NASSCOM's Mittal said. "This is simply unfair to foreign companies."
S. Gopalakrishnan, chief executive of India's second-largest outsourcer Infosys Technologies, told reporters late Monday he was "saddened and disheartened" by the step and said the sector would lobby strongly against it.
India, which already holds at least 50 percent of the global outsourcing market, has become the world's back office where Western firms set up call centres, number-crunching and software development outlets to cut costs.
But the 50-billion-dollar industry also sends skilled workers to the United States to develop software and direct projects for US clients.
The visa legislation, sponsored by two Democratic senators and passed unanimously by the Senate last week, still needs to be approved by the US House of Representatives and signed into law by President Barack Obama.
The row has erupted as India gets ready to host Obama later this year.
With anti-outsourcing anger stoked by high US unemployment, critics denounce the Indian firms as "body shops" because they provide Indian professionals to US companies rather than employing Americans.
"We think it (the bill) goes against the notion of free trade and is discriminatory," India's third-largest outsourcer, Wipro, said in a statement.
The measure would raise by 2,000 dollars per application the US fee paid by any company with more than 50 people in which over half the workforce has H-1B and L-1 visas earmarked for skilled foreign workers, industry officials say.
The current visa fee is 2,500 dollars.
The proposal is to use proceeds from the fee hike to pay for the US government's plans to boost security along its border with Mexico to help crack down on illegal immigration and drug smuggling.
"While we understand the need for heightened border security, we believe the extra fees will produce negative consequences for both US and Indian companies," said NASSCOM president Som Mittal.
Sponsors of the bill on a Senate website said the legislation would hike fees on particular Indian companies -- including Wipro, Infosys, Tata and Satyam -- which they accuse of seeking to "exploit" the two categories of visas to "import foreign workers into the United States."
Indian IT firms fly thousands of employees each year to the United States to work at their clients' locations as on-site technicians and engineers in what critics claim is a violation of the "spirit" of US immigration law.
US high-tech firms such as Microsoft, which bring skilled immigrants into the United States on the same visas, would not be hit by the bill as the vast majority of their workforce is composed of Americans.
"US companies, which use the bulk of these visas, would remain unaffected by the legislation," NASSCOM's Mittal said. "This is simply unfair to foreign companies."
Wipro recognized as first bluetooth test facility in INDIA
BANGALORE: Global software major Wipro Technologies has been recognised as India's first Bluetooth qualification test facility by the Bluetooth trade association, the IT bellwether said late Tuesday.
Bluetooth is an open wireless technology standard for exchanging data over short distances (using short length radio waves) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security.
The recognition makes Wipro competent to perform Bluetooth qualification conformance or compliance tests, the company said in a statement here.
"We will test products submitted by members of the Bluetooth special interest group at our test lab in the electronics city campus. The tests will also include Bluetooth protocol conformance," said Wipro vice-president C.P. Gangadharaiah.
Bluetooth qualification is the certification process required for any product using Bluetooth wireless technology and a pre-condition of the intellectual property (IP) license for Bluetooth technology.
"India is known for its strong software expert pool. Many profiles and protocol stacks of Bluetooth-enabled products were developed in India. This market is influential in the Bluetooth original equipment manufacturer (OEM) automotive market and in the Bluetooth mobile advertising," Bluetooth chief technology officer Andy Glass said in the statement.
Bluetooth technology has expanded beyond headset and mobile phone applications to high-growth market segments, including health and fitness and gaming.
"Gaming is the second largest application in terms of Bluetooth shipments. About 1,000 new Bluetooth enabled product designs were evolved and over 3,000 Bluetooth enabled products were tested and qualified in 2009," Glass added.
Bluetooth is an open wireless technology standard for exchanging data over short distances (using short length radio waves) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security.
The recognition makes Wipro competent to perform Bluetooth qualification conformance or compliance tests, the company said in a statement here.
"We will test products submitted by members of the Bluetooth special interest group at our test lab in the electronics city campus. The tests will also include Bluetooth protocol conformance," said Wipro vice-president C.P. Gangadharaiah.
Bluetooth qualification is the certification process required for any product using Bluetooth wireless technology and a pre-condition of the intellectual property (IP) license for Bluetooth technology.
"India is known for its strong software expert pool. Many profiles and protocol stacks of Bluetooth-enabled products were developed in India. This market is influential in the Bluetooth original equipment manufacturer (OEM) automotive market and in the Bluetooth mobile advertising," Bluetooth chief technology officer Andy Glass said in the statement.
Bluetooth technology has expanded beyond headset and mobile phone applications to high-growth market segments, including health and fitness and gaming.
"Gaming is the second largest application in terms of Bluetooth shipments. About 1,000 new Bluetooth enabled product designs were evolved and over 3,000 Bluetooth enabled products were tested and qualified in 2009," Glass added.
Sunday, August 8, 2010
What is phishing?
Phishing is a type of attack whose goal is to steal private information, such as login credentials or credit card numbers, usually to carry out various types of financial fraud. An attacker impersonates a trusted entity, such as a bank, government, ISP, or large web site, and tries to trick people into giving up their private information. These attacks often take the form of "urgent" emails asking people to take immediate action in order to prevent some impending disaster. Examples include topics such as the following:
- "Our bank has a new security system. Update your information now or you won't be able to access your account."
- "We couldn't verify your information; click here to update your account."
- Sometimes the email claims that something awful will happen to the sender (or a third party), as in "The sum of $30,000,000 is going to go to the Government unless you help me transfer it to your bank account."
The concept behind such an attack is simple: Someone masquerades as someone else in an effort to deceive people into sharing personal or other sensitive information with them. Phishers can masquerade as just about anyone, including banks, email and application providers, online merchants, online payment services, and even governments. And while some of these attacks are crude and easy to spot, many of them are sophisticated and well constructed. That fake email from "your bank" can look very real; the bogus "login page" you're redirected to can seem completely legitimate.
If you think you may have encountered a phishing site, please report the suspicious site to us.
How to Hack Facebook Password using keylogger
Hacking Facebook Account Password: Facebook Keylogging for Hacking Facebook
Everyday I get emails wherein my readers ask me How to Hack a Facebook Account? You as the reader are most likely reading this because you want to hack into someone’s facebook account. So in this post I have decided to uncover the real and working way to hack any facebook account. Actually there are many ways to hack someones facebook password like Phishing, Keylogging or using Hacking softwares used to hack facebook password. In this post i'm going to show you how to hack someones facebook account password using a keylogger - Emissary Keylogger.
How to Hack Facebook Password using Keylogger?
1. First of all Download Emissary Keylogger. It takes screenshots of the victim's computer and sends it to your gmail along with the logs.
2. Make sure that you have Microsoft .Net Framework installed in your Windows. You can download it from www.microsoft.com/net/. Else it won't work.
3. Extract the files using WinRar or any other zip/unzip program.
4. Open "Emissary.exe" to see something like this:
How to Create Your Own Phisher to Hack Any Website Account Password
Learn how to hack any website account password | Phishing Creator Tool
Previously i've posted how to hack websites using phishing, like eBay, Gmail and Facebook. Here i want to show you how to make a phishing page using a Phishing Creator - Super Phisher and get account information for various websites from many people. Тhis is the easyest and also a very effectively way to make a phisher and hack any website account password.

Here are some features of Super Phisher:
- Fastest phisher maker tool ever
- Makes phisher for almost any site
- Useful for users who dont knows HTML, PHP coding
- No manual work except entering URL of website, for which u want to make phisher
- Fully automated tool
- Small in size.
- Instant access to phishers you created.
Thursday, August 5, 2010
Censor Talk: DON SEENU (Exclusive)
Mass Hero RAVI Teja Upcoming movie “DON SEENU” is purely a laugh riot..A movie purely based on point “A boy who is inspired from amitabh’s ‘DON’ and wanna be DON after he grows up”
Recently on Aug 03, movie passed through censor recieved U/A (Unrestricted Public Exhibition with parental guidance for children below 12 years) cerificate.Except Two minor Cuts(violence scene and hot bits in song), no major edits have Censor people done with it.Movie made with budget of 23crores .Movie 160+ min run time .
Recently on Aug 03, movie passed through censor recieved U/A (Unrestricted Public Exhibition with parental guidance for children below 12 years) cerificate.Except Two minor Cuts(violence scene and hot bits in song), no major edits have Censor people done with it.Movie made with budget of 23crores .Movie 160+ min run time .
USA wasted $ 1024 Billions on War from 2001 for what?
The calculator busily counting out how much money the United States has spent on wars since 2001 has raced past $1 trillion — $1,024 billion plus at the start of August. There is little point in trying to give a more refined figure since the clock ticks remorselessly on, mesmerizingly faster than you can write the sum down, about $260,000 blown away in each passing minute.*
Meanwhile, the wars are being lost rather than won, U.S. and allied soldiers are dying and being maimed every day, tens and sometimes hundreds of innocent civilians are killed daily, and billions of dollars are being wasted and millions of lives being destroyed for no good reason apart from the overweening egos of politicians who are not prepared to admit that they are wrong.
25 Facts of A R Rahman
1. Rahman has no nick names. All the family members including sisters and his mom call him “Rahman” with full fleged love and affection.
2. Due to the family situation Rahman discontinued his studies in Padma Sheshadree Higher Secondary School during his 9th.
3. Rahman doesnt celebrate his birthday in a grandeur way. Early morning prayers, orphanage visits are the activities he do on that day peacefully.
Wednesday, August 4, 2010
What is Solar Tsunami?
While almost everyone knows about the tsunami, that refers to destructive waves of the sea, the news of solar tsunami heading towards Earth has left the world jittery of the relatively new and unknown phenomenon.
Solar Tsunami is a towering wave of hot plasma racing across the sun's surface. It has suddenly grabbed the attention of the inhabitants of the third planet from the sun as the news of the waves heading towards earth hit the headlines on Tuesday, Aug 3.
Solar Tsunami is a towering wave of hot plasma racing across the sun's surface. It has suddenly grabbed the attention of the inhabitants of the third planet from the sun as the news of the waves heading towards earth hit the headlines on Tuesday, Aug 3.
Monday, August 2, 2010
Beauty of Mathematics! !!!!!!
1 x 8 + 1 = 9
12 x 8 + 2 = 98
123 x 8 + 3 = 987
1234 x 8 + 4 = 9876
12345 x 8 + 5 = 98765
123456 x 8 + 6 = 987654
1234567 x 8 + 7 = 9876543
12345678 x 8 + 8 = 98765432
123456789 x 8 + 9 = 987654321
1 x 9 + 2 = 11
12 x 9 + 3 = 111
123 x 9 + 4 = 1111
1234 x 9 + 5 = 11111
12345 x 9 + 6 = 111111
123456 x 9 + 7 = 1111111
1234567 x 9 + 8 = 11111111
12345678 x 9 + 9 = 111111111
123456789 x 9 +10= 1111111111
This is what happens in ZIMBABWE!!!!!
This is what it looks like in Zimbabwe?????
(Inflation at 231 million percent a year has meant 25 million Zimbabwe dollars equals to just 1 US dollar)
The pictures below look funny, but the story is really sad??..
Visiting the neighborhood grocer!
Seen water falls??? Now see Fire falls... !!!
Yosemite National Park, California, USA
This park was gazetted as a national park in 1890. It is world famous for its rugged terrain, geysers, waterfalls and century-old pine trees. It covers 1200 sq km and the "fire" waterfall of El Capitan is one of the most spectacular of all scenery.
The spectacular view of the waterfall is created by the reflection of sunlight hitting the falling water at a specific angle. This rare sight can only be seen during a 2-week period towards the end of Feburary. To photograph this rare event, photographers would often have to wait and endure years of patience in order to capture it. The reason is because its appearance depends on a few natural phenomena occurring at the same time, and luck.
First is the formation of the waterfall. The water is formed by the melting of snow and ice at the top of the mountain. It melts between the month of December and January and by the end of February there might not be much snow left to melt.
Second is the specific angle of the sun’s rays hitting the falling water. The sun's position must be exactly at a particular spot in the sky. This occurs only in the month of February and during the short minutes of dusk. If it is a day full of clouds or something is obscuring the sun, you can only take pictures of your own sorry faces on the waterfall. It coincides with the fact that the weather in the National Park at that time of the year is often volatile and unpredictable. It compounds the difficulty of getting these pictures.
However, someone DID and we all get to see them!!!
Subscribe to:
Posts (Atom)