This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

MMC Console Window Keyboard Shortcuts

MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)

Mail formats- Plain text, Rich text and HTML

Plain Text– Rich Text – HTML?

Why is it that in some messages that you reply to, you can change the font and make standard formatting changes just like a word processor but others you can not? The format of the message determines the flexibility you have when replying to or creating a new email message. There are three standard formats for an email message. They are described below.

* Plain Text - A plain text message is an email message that does not include colors, fonts or formatting. It is the most basic type of email that is easily readable by all e-mail clients today. It does not support pictures displayed directly in the message body (although you can include them as attachments).

* Rich Text - Outlook Rich Text Format (RTF) is a Microsoft format that only some e-mail programs understand, mainly the Microsoft Office Outlook clients. You can use RTF when sending messages within a company that uses Microsoft Exchange Server ( i.e. OSU). RTF supports text formatting, including bullets, alignment, and links.

* HTML Format – HTML supports text formatting, numbering, bullets, alignment, horizontal lines, pictures (including backgrounds), HTML styles, stationery, signatures, and linking to Web pages. This type of format provides the greatest range of formatting possibilities.


When using Outlook, how do I make changes or choose a Format?

How to change the format of your message depends on if you have Word as your email editor. To determine if Word is your editor, do the following:
In Outlook Click Tools – Options
Click on the Mail Format tab
If the "Use Microsoft Word to edit email messages" is checked then Word is your editor. Please use the instructions below for MS Word as your editor.
Otherwise please use the instructions below for Word is not your editor.

MS Word as your editor
When composing a message with Word as your email editor you have the option of creating a message in Plain Text, Rich Text or HTML Format. In the email, you can choose your format via the format toolbar drop down menu.

MS Word is not your editor

If Word is not your email editor, select the Format menu in the email and click the format you would like to use - Plain Text, Rich Text , or HTML.

When replying to an email message, you can also change the message format. With the message open, select the Format menu; click the format you would like to use (Plain Text, HTML, or Rich Text).
When should you use one type of format over another?

Rich Text can be used in place of Plain text when you are in an environment that uses one of the Microsoft Outlook email clients. CN recommends using Rich Text formatted messages to give you additional formation features. Email clients that can't support rich text formatted messages will simply drop the formatting and show them in plain text.

HTML formatting should only be used when there is a need to insert graphics or specifically format a message to look a certain way. While Outlook can display HTML messages please keep in mind that not all e-mail programs can.

If you have questions about the different formats or would like advice on which format is best to use please contact your CN support team.
Take the complete training here http://tss.oregonstate.edu/cn/soft_tips/docs/outlook/?page=mail-format&type=normal

Posted by jai at 6:30 AM 1 comments

Friday, December 21, 2007
Some Usefull RSS:

Add these RSS feeds to your Web pages and keep them updated.
101 Cookbooks
http://www.101cookbooks.com/index.rdf
About Today
http://z.about.com/6/nl/rss/todaysl.xml
BusinessWeek Online
http://www.businessweek.com/rss/bwdaily.rss
CNN.com Recently Published/Updated -
http://rss.cnn.com/rss/cnn_latest.rss
Cricinfo cricket news
http://www.cricinfo.com/rss/index.rdf
CyberMedia India Online Limited - IT News
http://www.ciol.com/RSS/CIOL-ITNews.xml
Dictionary.com Word of the Day
http://dictionary.reference.com/wordoftheday/wotd.rss
Discovery News Top Stories : Discovery Channel http://dsc.discovery.com/news/topstories.xml
Engadget
http://www.engadget.com/rss.xml
ESPN.com
http://sports.espn.go.com/espn/rss/news
Expressindia
http://www.expressindia.com/syndications/ei.xml
Fodor's Travel Wire
http://www.fodors.com/blog/index.rdf
Fool.com: The Motley Fool
http://www.fool.com/About/headlines/rss_headlines.asp
Forbes.com: Most popular stories
http://www.forbes.com/feeds/popstories.xml
Funny Quote of the Day
http://www.brainyquote.com/link/quotefu.rss
Hilarious Jokes on Funtoosh.com
http://www.funtoosh.com/rss/latest_jokes.php
International Herald Tribune
http://www.iht.com/rss/frontpage.xml
Medindia Health News
http://www.medindia.net/rss2.0/rss.xml
News items on ZDNet
http://news.zdnet.com/2509-1_22-0-5.xml
News-Indiatimes Cricket
http://cricket.indiatimes.com/rssfeeds/864838.cms
Official Gmail Blog
http://gmailblog.blogspot.com/atom.xml
Official Google Blog
http://googleblog.blogspot.com/atom.xml
orkut Blog
http://en.blog.orkut.com/atom.xml
Quote of the Day
http://www.brainyquote.com/link/quotebr.rss
Reuters: Oddly Enough
http://www.reuters.com/rssFeed/oddlyEnoughNews?irpc=69
The Economic Times- News- Economy- Finance http://economictimes.indiatimes.com/rssfeeds/1286551815.cms
The Financial Express -
http://www.expressindia.com/syndications/fe.xml
Wired Top Stories
http://www.wired.com/news/feeds/rss2/0,2610,,00.xml
Yahoo! News: Entertainment News
http://rss.news.yahoo.com/rss/entertainment
AnandTech Article Channel
http://www.anandtech.com/rss/articlefeed.aspx
Add CNET
News.com http://news.com.com/2547-1_3-0-5.xml
Add Emergic
http://emergic.org/index.xml
Add Slashdot
http://slashdot.org/rss/slashdot.rss
Add SPACE.com
http://www.space.com/syn/space.xml
Add Wired Politics
http://www.wired.com/news/feeds/rss2/0,2610,4,00.xml
Add Wired Top Stories
http://www.wired.com/news/feeds/rss2/0,2610,,00.xml

List of Google Services!!!!!!!

Well These are the list of Services Provided by Google some are known but some are not , so here get them all!!!!
Google AdSense : https://www.google.com/adsense/
Google AdWords : https://adwords.google.com/select/
Google Analytics : http://google.com/analytics/
Google Answers : http://answers.google.com/
Google Base : http://base.google.com/
Google Blog Search : http://blogsearch.google.com/
Google Bookmarks : http://www.google.com/bookmarks/
Google Books Search : http://books.google.com/
Google Calendar : http://google.com/calendar/
Google Catalogs : http://catalogs.google.com/
Google Code : http://code.google.com/
Google Deskbar : http://deskbar.google.com/
Google Desktop : http://desktop.google.com/
Google Directory : http://www.google.com/dirhp
Google Earth : http://earth.google.com/
Google Finance : http://finance.google.com/
Google Groups: http://groups.google.com/
Google Images : http://images.google.com/
Google Labs : http://labs.google.com/
Google Local: http://local.google.com/
Google Maps : http://maps.google.com/
Google Mars : http://www.google.com/mars/
Google Mobile : http://mobile.google.com/
Google Moon : http://moon.google.com/
Google Movies : http://www.google.com/movies
Google Music: http://www.google.com/musicsearch
Google News : http://news.google.com/
Google Pack : http://pack.google.com/
Google Page Creator : http://pages.google.com/
Google Personalized Home… : http://www.google.com/ig
Google Personalized Search : http://labs.google.com/personalized
Google Reader : http://www.google.com/reader
Google Scholar : http://scholar.google.com/
Google Search History : http://www.google.com/searchhistory
Google SMS : http://www.google.com/sms/
Google Suggest : http://www.google.com/webhp?complete=1
Google Talk : http://talk.google.com/
Google Toolbar : http://toolbar.google.com/
Google Transit Trip Planner : http://www.google.com/transit
Google Translate : http://www.google.com/translate_t
Google Video : http://video.google.com/
Google Web Accelerator : http://webaccelerator.google.com/
Google Web API : http://www.google.com/apis/
Google Web Search : http://www.google.com

Keeping Your Networks Secure

Computer security is an ever present concern that evolves constantly. One reason why computers and the programs we use are so vulnerable is that they are incredibly complex. The more complex they become, the more likely they are to have security gaps.

On the other hand, the more they can store and do, the more we value them. With so much potential for doing things locked within every computer and program, it shouldn't be surprising that a clever computer hacker can manipulate or break codes to wreak havoc on the whole system. This is why we also need security systems. Unlike the programs that they protect, security systems are valuable because of how many things they make hard to do.

If your company uses a network of computers to store, transfer and process information, you can't afford to leave that system vulnerable to attacks. New viruses and worms come out every year and without the right protection, your computers could be among the millions that are knocked completely out of commission.

In addition to blocking harmful viruses, it is just as important to guard against invaders who want to access confidential information about your business and your clients. Hackers are among the most innovative group of computer geeks in the world. If there's a vulnerability anywhere in any of your systems, they can find it.

Ways to Keep Your Network Secure and Running

There are many ways to tighten security on computer networks. A few forms of protection include anti-virus software, firewalls, intrusion prevention systems (IPS), information encryption, and user authentication safe guards. Armed with these tools, your Dallas network security will be a discouraging target for predators.

One thing to keep in mind though when you start the task of securing your system is the need for network security in addition to individual computer security. You may have armed each computer with a couple different kinds of protection, but if even one computer becomes infected with a virus or a worm, the problem will quickly spread to all the computers within your network.

If you and your staff don't have the expertise to diagnose security weaknesses in your network and provide the necessary remedies, there are many professionals who can. If you want, they can also maintain the systems they service. Network security is vital to your businesses success. Be sure you don't go with amateurs.

What to Look for in a Network Security Specialty Firm

When it comes to network security, it's hard to argue with a strong record of success. Watch for a network security company that has a list of happy clients. The larger the client, the larger target they probably are for hackers, so big names are a good thing.

Security testing is another key factor. No network can be made 100% secure and still be usable. A good firm will employ computer specialists whose job it is to hack systems. Through these means, they'll find and weaknesses in a system and be able to work towards securing it.

Is Your Computer Safe Offline?

Probably one the biggest notions among computer users is that if they are not online, they are safe from identity theft. Their reasoning is that, if they are offline, they are not vulnerable to phishing, viruses, malware, hackers, etc. While, it is true that being offline would protect them from such things, to fall into the belief that they are safe is being somewhat blind to other possibilities for id theft.

Even people who are connected to the Internet fall into a false sense of security. How? Computer users think that once they install a firewall, get adware, malware, and virus protection. Throw into all that, phishing protection. They get lulled into that invulnerable feeling. They think they are safe.

But are they? Among the many ways to steal data from a computer is through the peripheral data ports. They can be hooked up to printers, external disk drives, etc. Still another way to steal data has been the use of cds or floppy disks. This is done by actually stealing the disks themselves or dumping data onto them. In most cases, this can be done without the computer's owner ever knowing.

Along the same ideas, hard drives can be stolen or broken into. This is alot easier than one might think. Here's how. Hard drives fail. There's nothing that can be done about that. We get them replaced, reload the software, and move on with our lives.

But what about that old hard drive? Even if it has crashed, data can still be harvested from it. In some cases, it is not easily done. There are softwares written to help map the crashed disk and retrieve information off of it. This software is used by legitimate, reputable companies as a means of data reclamation for their clients. It is also used by thieves to steal personal and company data.

Another way to break into a computer involves the thief using his or her own floppy disk or cd to boot your system. With this method, they can bypass your security features and gain direct access to your data.

Even more recently, with the advent of flash drives, it is easier to steal data and conceal it. These small devices are roughly the same size as a man's finger and are hard to detect when concealed. They can be stolen or lost very easily due to their small size.

When it comes to dealing with these issues, many businesses are removing the extra disk drives from computer work stations. They are also networking their printers, etc. to monitor information flow.

Hard drives can be rendered totally useless by drilling holes in the cases and drives. Still another way to do this is by burning the hard drive.

Certain types of flash drives are being built with security features in place to aid in preventing theft. By using a security system which encrypts the data, it adds a measure of protection not offered by Microsoft. This encryption feature is called Advanced Encryption Standard (AES) symmetric encryption. It is considered to be the best encryptions systems for flash drives. It should also be noted that it is not the only form of encryption available. Many versions of encryption are designed with the user in mind (I.E. ease of use).

The final problem deals with the users themselves. Often times, the user will be careless with with their user name and password information. They sometimes will paste it to their computer or somewhere close to it. In this case, it is always best to either commit this information to memory or store it in a very secure place.

How to Solve error 80048820


When you start MSN Messenger, you are unable to sign in, the following message is displayed after the sign in process is interrupted.


“Sorry, we were unable to sign you in to the MSN Messenger at this time. Please try again later.

To let us try and troubleshoot the problem, click the Troubleshoot button.”



Causes
1.The system clock may be set incorrectly.
2.The Dynamic Link Library (DLL) softpub.dll, may not be registered on the system.
3.Internet Explorer may be using an invalid proxy server.

Resolutions
Double click on the clock in the taskbar and make sure the system clock is set correctly.
Register softpub.dll using the regsvr32.exe tool.

Click Start, and then click Run.
In the Open box, type regsvr32 softpub.dll and then click OK.
Restart MSN Messenger.



Remove any Internet Explorer proxy server settings

In Internet Explorer, click Tools and then click Internet Options.
In the Internet Options dialog box, go to the Connections tab.
Click LAN Settings…
Untick the Use a proxy server for your LAN (These settings will not apply to dial-up or VPN connections) checkbox.
Click OK and OK again Internet Options

How to Search For Rapidshare Folders by Using Goolge !!

Just go to Google.com and paste this string there ..

site:rapidshare.com inurl:users "Anything you want to search for"

site:rapidshare.de inurl:users "cracking"

site:rapishare.com inurl:files "web hacking"

site:rapidshare.de inurl:files "tips and tricks"