Sunday, June 30, 2013

Shut Down from Your Desktop

XP Shutdown
If you're trying to eliminate every extraneous mouse click, you can shut down your computer with an icon on the desktop. Right-click on your desktop, click "New," and then click "Shortcut." In the "Type the location of the item" field, type "shutdown -s -t 00" to give you a way to shut down the computer immediately. (Change the -s to -r to create a reboot shortcut instead.

Tuesday, June 25, 2013

How to Create Folder "CON"

New Folder

Ever tried to create a folder "CON" or "AUX" or "NUL".

Tried now???  - not working :)

Here you go, a simple method to  stop your anxiety

Rename folder from the right click option........
Now press alt and press 255...
press 255 frm the right side of the key bords i.e, Num pad.
where only numbers are given.....
now write con and then press enter.....yayyy!!
you ll see a con folder in ur pc
and also you can delete it easily.

Saturday, June 22, 2013

Disclosing Security vulnerabilities in India

Security Researchers usually disclose vulnerabilities openly on the internet like full disclosure. But most often the researchers don't realize it is illegal and can be punished by law under IT act and other IPC section and it can have fatal consequences. When a researcher detects a vulnerability, he often reports to the company but most often the companies don't reply to his message. If the company is not interested to take action, the researcher feels this is in greater interest of national security/public security. He can send this vulnerability report again to the company and send a copy to CERT-In(central emergency response team). Most often CERT-In responds back to the hacker/researcher and they also contact the company and advise them to fix it. There is no proper format for reporting, it would be nice if government can come up with a frame work which can allow a proper disclosure of vulnerability policy. If the company does not fix, the researcher can wait for a months time before he can disclose it fully to the community through media also offer proofs that he has communicated enough to the company and to CERT-In before he has released it. However, does this protect the researcher from prosecution? If the victim company decides to go in legally, the researcher can be prosecuted for publishing this vulnerability. Some of incidents have seen where hackers work for some company and because of various problems they had with company, they get involved in revenge hacking. If any crime has pre-mediation or pre-planning the crime is considered serious according to any Law. Such actions are totally illegal. Many companies like FB, Google offer bounty to hackers. These bugs can be reported to these companies. however if the companies don't take these vulnerabilities they can be published to CERT-In and then publically. Law does not protect the reporter of the vulnerability. It becomes the responsibility of the hacker/researcher to prove that he did it for greater social good . If government does not come with proper frame work, it s going to drive hackers to report vulnerabilities anonymously fearing prosecution from police(with victim /company complaining). What happens to hackers who publish the vulnerability openly without going to CERT-In and companies. They do it of course to get fame or they really did not want to fix it. Most companies will view these hackers as some one who is not reliable due to their poor full disclosure practice and wont hire them for anything important. They lose opportunity. It is recommended proper reporting is followed first to the company who is victim, followed by reporting to CERT-In. giving them enough time to fix. Only if the vulnerability can affect public at large and no action was taken then other option of full disclosure should be considered.

Tuesday, June 18, 2013

Watch free online lectures and courses

Today, there are millions of free online lectures available in almost any conceivable topic. Below are a few of our favorite locations containing free online lectures and courses.
  • Lecturefox - Great site that lists hundreds of links to direct courses online for all the major Universities and is one of the best places we've found for finding Computer related courses.
  • Academic Earth - Subjects include Business, Computer Science, Mathematics, Engineering, Science, Humanities, Social Services, Art & Design, and test preparations.
  • KHANACADEMY - Well known for its math related lessons and now also includes Science, Finance and Economics, Humanities, and test preparations.

How to quickly rename multiple files in Windows

Rename multiple files in Microsoft Windows XP Explorer by following the below steps.
  1. Open Explorer.
  2. In Explorer select all the files you wish to rename.
  3. Once the files have been selected press F2 and type the new name for the files. For example, typing "test" will rename the files to test, test(1), test(2), test(3) etc. If you have show file extensions enabled, make sure to also type the name of the file extension you're renaming.

Monday, June 10, 2013

What Android Has That iOS Has Not (Yet)

Android is open and customizable. iOS is closed, designed for ease. But iPhone users are maturing, demanding more personalization, and Apple might give it to them at WWDC. At D11, Tim Cook said “I think you will see us open up more in the future, but not to the degree that we put the customer at risk of having a bad experience.” Here we’ll look at some Android options Apple could unlock for iOS.



I agree with John Gruber when he speaks of how the average smartphone user has matured. “The design of the iPhone software was entirely informed by the fact that this was a new experience. It needed training wheels. Look around you. We all get it now. iOS-style computing is no longer novel. The training wheels can now come off.” 2007 is very different from 2013 in terms of our mobile literacy, and it’s time iOS reflected that.
Apple’s concern is likely that novice users might download and install an interface-changing app and not know how to remove it — “a bad experience.” Apple would need to determine how to reconfirm configuration changes with users such that veterans don’t get annoyed but newbies don’t get stuck.
If it can strike the right balance, some new capabilities iOS users might gain include:

Sunday, June 9, 2013

6 Free Time Management Apps for Android Users

With all the talk about how technology makes life easier and simpler, many people forget that technology also provides a lot of distractions as well. With so much social activity and interaction on the Internet and so many time consuming distractions available on mobile devices today, it’s easy to get lose focus of your goals and tasks.

Thankfully, there are digital tools and aids that work to prevent you from losing track of your obligations. Here are six excellent and completely free applications that Android-based mobile device users can try in order to manage their time             more efficiently and increase general productivity.

PlanMyDay

This activity manager is very involved for being a free app. It not only allows you to manage your tasks according to when you need to do them, but it also allows you to note which tasks are most important and urgent.

Therefore, this app really lets you analyze your responsibilities and manage them, especially if you have several important projects to take care around the same time. Another great thing about PlanMyDay is that it is easily integrated with other services like Google Tasks and your mobile device’s calendar, so that you can easily import your activities and keep track of your plans.