This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

What To Do When Windows Wont Boot

When Windows fails to boot it is normally caused by you installing a program or device and it has caused a conflict with one or more other programs. This will no doubt give you plenty of heartaches if you're not certain which program caused Windows to not boot up.If you recently installed a program or application and know where it was installed, you may be in much better shape as for as correcting the error. Here are common ways to correct the problem of your computer not completely booting up or not booting up at all.

If your computer will not boot-up at all, hopefully you have made a good emergency boot disk. You can always make a windows startup disk by creating one from another computer running Windows 98 or Me. Perform the following if your computer won't Boot-Up At All.

FIRST......Put your boot floppy disk in the floppy drive and turn on the PC. On some computers, you may have to access the bios and select the Boot priority to your A: drive.Save any changes and select "Start Computer without CDROM support" and press Enter. Once you are at the A prompt, type dir c: and press enter.If your programs and other files are present, try restoring your system Registry by following the steps below. This may repair Windows, the Config. Sys and autoexec.bat files to where the PC may boot up normally. When the files are present, its a good indication of a good hard drive.

SECOND......To correct the problem of your computer not booting up,type in "fdisk /mbr" and press Enter to restore your master boot record.Type "Scandisk C:" to check the hard drive for errors that have occurred. You can also type "Sys C:" to hopefully restore files needed to boot up your computer.

THIRD......If the above procedures fail to repair your computer,you can repeat the first part of step one above and select "Start Computer With CDROM Support" re-install Windows.

Making A Windows XP Bootable Floppy

Windows XP users should create a boot disk now by placing a formatted blank diskette in the A: drive, open Windows Explorer to the C:,select Tools,Folder Options ,show Hidden files and and folders,then View Tab.

Now you uncheck "Hide Protected Operating System Files (recommended).You will see a warning and click Yes and click OK.Copy the files ntldr,ntdetect.com and boot.ini onto the disk.Remove the disk and label it the Windows XP Boot Disk.

After making your boot disk,recheck "Hide protected operating system files and folders (recommended)" in the Folder Options dialog box.To use the disk when Windows XP won't boot,place the disk in the drive,and then re-boot,the computer, Windows simply bypass the basic boot files on the hard drive and continue to boot up.

If The PC Won't Boot Pass Windows

FIRST......If your Operating System is Windows Millennium, turn on the computer and immediately press and hold down the CTRL key. Once the startup options appear, release the CTRL key. Select Safe Mode and press Enter. You are now in Windows limited version. If you know what caused your computer not to boot,you can now either change or delete that program.

SECOND....Repair your Registry by selecting Start,Run and typing "scanregw /fix" and press enter.This will fix any damage done to the Registry. You can also restore your registry which replaces your current registry with an earlier copy that was backed up by your computer.Click on Start,Run and type "scanregw /restore and press Enter.

To repair your Windows 98 Registry, hold down the CTRL key as you start the PC and select "Command Prompt Only". Type "scanreg /fix" and press Enter and "scanreg/restore" to restore a previousely saved copy of the Registry.

If you have Windows XP, press F8 after rebooting the PC should Windows freeze while booting up. You can select "Last Known Good Configuration" after rebooting to allow the computer to boot the last backed up files. And you can choose "Safe Mode" to remove any files you know caused the operating system to hang up.Be prepared when your operating system fail. It would be a great idea to go over this article a few times and print it. Make yourself s notebook and place this and all related articles there.

About The Author

Otis F. Cooper is solely dedicated to boosting the knowledge and confidence of every computer user that is serious about knowing computers.

Vodafone manual GPRS settings

Here follows manual settings of Vodafone GPRS:

For Karnataka & Andhra Pradesh: (This setting is tested by myself in Bangalore)

Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)

Access Point Settings:

Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401
Data Bearer: Packet Data

Bearer Settings:

Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)

For Tamil Nadu:

Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)

Access Point Settings:

Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9201
Data Bearer: Packet Data

Bearer Settings:

Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)

Using Gmail account to monitor and handle all your separate email accounts

I use Gmail account as one of my main accounts to handle most of my important and personal email . I use multiple Gmail accounts as well apart from using domain based accounts. So I use Gmail's feature of handling multiple accounts for "Send As" feature and mail forwarding feature.

So what do we need as solution?

A single mail account where all the mail from multiple email accounts are forwarded, in which mail messages can be filtered in separate labels and mail messages can be replied from the email address it was sent to

Solution:-

1. 1 Gmail account
2. Multiple Gmail or hosted domain accounts which can be forwarded to your mail Gmail account
3. Mail forwarding and "Accounts" feature within Gmail
4. Creating labels in Gmail based on "Email Account" that the message comes from

Using three simple steps you can manage all from email accounts from a single account and use the base account as a email backup account for the respective email addresses.

The exact steps are detailed on Google Tutor Post.

I have to tell that this has been functioning very well for me for quite some time now. I only wish that I can easily forward my Hotmail email messages to Gmail .

USB to Nokia Safe Charger


This simple project shows you how to make a USB powered Nokia cell phone charger. The advantage is that it weighs much less than the bulky AC adaptor, and can be used wherever you have a computer or a laptop. I use this thing all the time now!

What do I mean by “safe charger”? Honestly I’m not sure. I’m just going on what I was able to infer from what I read off my multimeter. What I found was that the voltage across the nokia charge pins was rapidly fluctuating from Vdd to about 4 volts above Vdd. It would not do to have ~9 volts injected into a 5 volt bus! Thankfully, all you need to do is stick a diode in there and that’s that. So the diode might not be needed, but it’s safe! Thus, “Safe Charger”.



So far, it charges my phone just fine, but slightly slower than the wall wart that came with it. I think so, anyway.

Step one: strip off the shielding and insulation on an inch or so of the usb cable. Clip the white and green cables to uneven lengths so they can’t conduct into each other or either of the power lines. Hopefully you should be left with a black wire and a red wire.

Step two: Clip off a length of the nokia chargers phone-side plug. You won’t be needing the wall wart part anymore. Strip off the insulation from the nokia plug wire. Hopefully you should have a red wire and a black one. the red wire should be connected to the inner barrel of the plug, and the black one should be connected to the outer barrel.

Step three: Attach a normal silicon diode (not a zener diode) with the line part towards the nokia plug. It should go between the red wires from both cables . Attach the black wires from each cable together.

I suggest staggering the lengths of the wires so that the solder joints have less chance of coming into contact.

Check all the wires with a multimeter to make sure they are really the right ones! The colors might not be standard...









Step four: cover that baby in hot glue! Yeah!




Step five: Cover that nogoodnick cable in electrical tape!

That’s it!

USB BackTrack Linux installation

BackTrack is a Live Linux distribution based on SLAX that is focused purely on penetration testing. Distributed by remote-exploit.org, BackTrack is the successor to Auditor. It comes prepackaged with security tools including network analyzers, password crackers, wireless tools and fuzzers. Although originally designed to Boot from a CD or DVD, BackTrack contains USB installation scripts that make portable installation to a USB device a snap. In the following tutorial, we cover the process of installing BackTrack to a USB flash drive from within a working Windows environment.

BackTrack running from USB Screenshot:

BackTrack in action running from USB

How to install BackTrack to a USB device:

1. Download the (Portable Backtrack) USB BackTrack version
2. Extract the Boot and BT3 folders to the root of your USB device
3. Navigate to the Boot folder on your "USB device" and click bootinst.bat (click continue if the following error appears)

BackTrack Error
4. Follow the onscreen instructions to make the device bootable
5. Once the USB install script has finished, reboot your computer and set your BIOS or Boot Menu to boot from the USB device

Enjoy!

UNLOCK PASSWORD PROTECTED MEMORY CARD

Well its quite simple but most of the people do not know it.

Please note the fact that it only works if the password to the MMC Card was set in ur own mobile,where u want it to be unlocked.

This method works well for nokia cells with symbian operating system.Never tried on other cells.use any software like FXplorer that can browse files in ur cell.

1. Open one of above software you have.
2. Browse through the directory, C:\system
3. Rename the file mmcstore to mmcstore.txt
4. Open the file - The file will open in Notes.
5. You will find your password in that file. That file would also contain much more data which you do not understand,so you need to go through the file to get the password!

When ur cell is connected to pc by means of data cable or bluetooth,u can see the password by simply opening the file mmcstore with notepad. Laughing

The Next Generation Of Online Fraud Protection

Today's online world is one fraught with danger. At every turn internet users are faced with phishers, hackers, fraud and the threat of identity theft. This creates an atmosphere where users are not comfortable purchasing things online and merchants are being taken advantage of on a regular basis.

The Cybersource 8th Annual Online Fraud Report estimates that over $3 billion in online revenues was lost due to online fraud. The Internet Crime Complaint Center or IC3, which is a partnership of the FBI and the National White Collar Crime Center, stated in its annual report that there was $198.44 million lost by consumers in the fraud cases that they referred to law enforcement agencies in 2006. The average loss per complaint was just over $2500.00. Both buyers and sellers lose when online businesses are vulnerable to ill intentioned web users.

There are generally 2 types of fraudulent orders that are placed online. First there is an order that is being placed merely to check the validity of the stolen credit card information. A criminal will go to a website where he knows that the credit card is going to be billed immediately for products and services. They will place an order for something that is usually about $100.00 or less. Once the order goes through and the credit card is successfully billed, they know the stolen information is valid. Then they are free to place the second kind of order where they are actually looking to receive the products that they purchase with the stolen credit card information.

Currently, some of the most popular online fraud protection solutions include address verification, card verification number (CVC2, CVV2, CID depending on the card issuer), and IP geolocation. The downside to these solutions is that the address and card verification number can both be stolen along with the credit card number and IP addresses can be masked. 81% of online merchants also use manual order verification. Besides the increased costs associated with the extra time and staff that it takes to manually review the orders, it also slows down the order process and extends delivery times.

Traditional solutions allow the fraudulent order to be placed and then attempt to weed them out afterwards. The next generation of automated online fraud protection solutions deter the perpetrator from placing the fraudulent order in the first place. Taking the crook completely out of the equation allows online merchants to focus resources on fulfilling genuine orders and servicing current customers.

One of these next generation fraud protection solutions that is gaining popularity among online merchants is televerification. Televerification works like this: When the customer goes to place an order, they are asked for their telephone number. An automated telephone call is then placed to the customer and they are given a unique security code, either through automated message or SMS. They then enter that unique code into the appropriate place on the web site in order to proceed with their business. The process is quick and easy, yet the protection it affords businesses and their customers is extremely effective.

Requiring the confirmation of a workable, traceable telephone number lessens the attractiveness of that particular online business to ill intentioned users. Criminals are leery about providing a legitimate phone number that can be traced back to them. The benefits that are inherent to implementing any automated fraud protection solution for online merchants still apply: reduced chargeback costs, reduced manual verification costs and increased user confidence. The difference with televerification is that instead of catching the fraudulent order after it has come in, it stops them at the door.

An additional benefit of televerification is the ease of which it can be integrated into an online merchant's existing website. All it takes is adding a few lines of code to an existing site that will allow it to interact with a televerification provider's server. Most applications can be up and running within hours, not days or weeks like some solutions.

With eCommerce growing 20% or more each year, fraud protection for merchants and customers becomes an ever increasingly vital issue for the entire online community. Billions of dollars are lost every year due to criminals taking advantage of the anonymity that the Internet offers. Previously, online merchants could only try to weed the fraudulent orders out from the good ones as they came in. The next generation of fraud protection allows online merchants the opportunity to stop the fraudulent orders from ever being placed.