Aspiring Entrepreneur

Archive for the ‘Computer’ Category

The Good :

* Easy to install
* 99% of my laptops drivers worked out the box
* Software is 100% easy to install/uninstall
* Lots of alternative software available.
* Compiz desktop effects
* No viruses and no software firewall needed (use hardware firewall at work and home)
* Does everything I need it to do
* It just works

The Bad :

* Not a lot of mainstream games are available for Linux (not that am a gamer)
* Still a small percentage of tasks, rely on using the command line
* Hardware support – this is getting better and the only thing for me was my HP built in webcam (though drivers are out there, but Ubuntu doesn’t include these)
* Compiz – This still is very heavy in resources and when this is enabled games like SecondLife etc dont run smooth or crash. A basic compiz should be built in to Gnome that doesn’t rely on super graphical resources. Even simple stuff like shadow effects etc.
* If you like to be on the bleeding edge with software, Ubuntu only updates the main software every 6 months (security updates etc are released on a regular basis)

Download Ubuntu here , Direct link download.
ubuntu-7.10-desktop-..> 696M

Marshall was to tend horses or to arrange things in preparation for a feast. In heraldry, marshalling is the arrangement of several coats of arms to form a single composition. In the military, marshalling is the gathering and ordering of military forces in preparation for battle.

In computer programming, marshalling is the process of gathering data from one or more applications or non-contiguous sources in computer storage, putting the data pieces into a message buffer, and organizing or converting the data into a format that is prescribed for a particular receiver or programming interface.

Marshalling is usually required when passing the output parameters of a program written in one language as input to a program written in another language.

Voip

Posted on: October 9, 2007

The latest service introduced by Finarea SA. Like VoipBuster it’s offered for access through a softphone, but can also be used with a standard SIP client, including Asterisk (this mode is undeclared and not officially supported). The domain name of the SIP proxy/registrar is sip.voipstunt.com , and resolves to the same set of IP addresses as sip1.sipdiscount.com. The server is not Asterisk-based, only supports G.711 and G.726 codecs (GSM announced as available soon), and does not speak IAX. Only dtmfmode=inband is supported.

The domain name connectionserver.voipstunt.com, used by the softphone client for Windows, resolves to a set of IP addresses larger than sip.voipstunt.com, and some of the hosts in that set only seem to support the undocumented protocol used by the softphone client, not the SIP protocol.

Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising. Spam costs the sender very little to send most of the costs are paid for by the recipient or the carriers rather than by the sender.

Email spam targets individual users with direct mail messages. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. Email spams typically cost users money out-of-pocket to receive. Many people – anyone with measured phone service – read or receive their mail while the meter is running, so to speak. Spam costs them additional money. On top of that, it costs money for ISPs and online services to transmit spam, and these costs are transmitted directly to subscribers.

There are two main types of spam, and they have different effects on Internet users. Cancellable Usenet spam is a single message sent to 20 or more Usenet newsgroups. (Through long experience, Usenet users have found that any message posted to so many newsgroups is often not relevant to most or all of them.) Usenet spam is aimed at “lurkers”, people who read newsgroups but rarely or never post and give their address away. Usenet spam robs users of the utility of the newsgroups by overwhelming them with a barrage of advertising or other irrelevant posts. Furthermore, Usenet spam subverts the ability of system administrators and owners to manage the topics they accept on their systems.

One particularly nasty variant of email spam is sending spam to mailing lists (public or private email discussion forums.) Because many mailing lists limit activity to their subscribers, spammers will use automated tools to subscribe to as many mailing lists as possible, so that they can grab the lists of addresses, or use the mailing list as a direct target for their attacks.

Virus

Posted on: September 6, 2007

?In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you’ve received is usually unaware that it contains a virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are benign or playful in intent and effect (”Happy Birthday, Ludwig!”) and some can be quite harmful, erasing data or causing your hard disk to require reformatting. A virus that replicates itself by resending itself as an e-mail attachment or as part of a network message is known as a worm.

The ILOVEYOU virus comes in an e-mail note with “I LOVE YOU” in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient’s Microsoft Outlook address book and, perhaps more seriously, the loss of every JPEG, MP3, and certain other files on the recipient’s hard disk. Because Microsoft Outlook is widely installed as the e-mail handler in corporate networks, the ILOVEYOU virus can spread rapidly from user to user within a corporation. On May 4, 2000, the virus spread so quickly that e-mail had to be shut down in a number of major enterprises such as the Ford Motor Company. The virus reached an estimated 45 million users in a single day.The attachment in the ILOVEYOU virus is a VBScript program that, when opened (for example, by double-clicking on it with your mouse), finds the recipient’s Outlook address book and re-sends the note to everyone in it. It then overwrites (and thus destroys) all files of the following file types: JPEG, MP3, VPOS, JS, JSE, CSS, WSH, SCT and HTA. Users who don’t have a backup copy will have lost these files. (In March 1999, a virus named Melissa virus ?also replicated itself by using Outlook address books, but was less harmful in destroying user files.) The ILOVEYOU virus also resets the recipient’s Internet Explorer start page in a way that may cause further trouble, resets certain Windows registry settings, and also acts to spread itself through Internet Relay Chat (Internet Relay Chat).

Attention. My orkut and google account was hacked by somebody and somehow i managed to get my account back. This is what happened. I was online as usual. My friend was online in Gtalk and started messaging me and i too was chatting with him. He told that he has crested a new webpage for him and asked me to check it “www.orkut.*fin*te*.net”(censored, cos few ppl may try checking it now and get into trouble). I followed that link which redirected to Orkut login page. He asked me to login first and view the site then and i did the same but I couldn’t view the site which he said and i could view only my home page. Suddenly my Gtalk got disconnected saying password doesn’t match. Wtf does it mean? While I’m working in my gmail and automatically it get disconnected and saying password doesn’t match. Yes, my password has been changed by somebody. When I tried to recover my password and I send recovery mail to secondary email, I couldn’t receive recovery page in my secondary mail also. It’s Strange. I thought my friend would’ve been playing and I called him(the one who I was chatting with). Shocking, he said he is not online and I told him the situation and he replied that he too have the same problem. Who the hell I was chatting with then? Why he want to do it to us? Fortunately I tried logging in again and I got logged in. Soon I wanted to change my password before hacker hacks it again and I changed my password. I was about to change the security question also and I noticed my secondary mail was changed to ‘hack_orkut@yahoo.com’. I was beaten and didn’t know what to do. When I tried to change my secondary mail, it told account information has not been changed. It means I can’t recover password anymore if I lost and the hacker can easily change my password when ever he wants. Thank god, I could change my secondary mail too then but I’m not sure whether the password recovery page would come to that. I could still see the guy who using my friends account to hack and was asking him why you are doing so, He/She/It replied ‘time pass‘. Wtf? When I entered Orkut, my caption was changed to “end of orkut soon” and unparliamentarily words were posted in some community in which I was a member and I was made joined in some other unwanted communities. By the time some of my friend started asking me ‘what made you to end orkut’ and I explained the situation to all. Now I think the situation is under control since I have recovered my password and changed the secondary mail too. But still I’m upset why this happened to me. I advice you all not to run any java scripts or unknown links and get into trouble like me. Who ever sends you be carefully before you access your mail which can be misused badly anytime, anywhere by anyone once when hacked. I thought of deleting orkut after this happened but I couldn’t do and that’s not because of hacker and but I would miss my friends contact.
I would also like to tell everyone that the scraps which comes to your scrapbook, which consists of ‘orkut tricks’, ’increase scrap, fans’, ’unlock albums’ ,etc. Just delete it and don’t have any intention in trying it. Hope my experience would be usefull to all and don’t happen to anybody. Beware of orkut , hackers , javascripts‘


About me

Hi i'm Hari, heart break guy. I live at 12o 57’ 41.19” N 80o 14’ 32.20” E. I love blogging.

Top Clicks

  • None

Flickr Photos

Blog Stats

  • 43,335 hits
Google PageRank 
		Checker - Page Rank Calculator
Add to Technorati Favorites
ss_blog_claim=9d6835a4d8e9e629708c3d9a7ff5c841