Learn English Phonetics

Learn English Phonetics
Learn English Phonetics

How to prevent USB drives from spreading virus on your netbook

How to prevent USB drives from spreading virus on your netbook

USB drive, virus, smartbook, netbook, netbook, USB Flash drive, worm, Windows XpWhen I have limited connectivity on my notebook, I rely on my 4GB USB flash drive, which I always carry with me to transfer data back and forth from other PCs and notebooks. However, there is always a lurking danger of malicious viruses and worms, which might sneak into my clean notebook. I have found some useful tips to protect Windows-based netbooks against worms spreading from USB drives. Let’s check it out here.

Your operating system uses the ‘autorun.inf’ file to know what needs to be done when a storage device like a USB flash drive is inserted in your netbook.

USB drive, virus, smartbook, netbook, netbook, USB Flash drive, worm, Windows Xp
The ‘autorun.inf’ file in the root directory of the USB drive contains a reference to the programs and files, which run automatically as soon as a USB drive is inserted in the netbook.

USB drive, virus, smartbook, netbook, netbook, USB Flash drive, worm, Windows Xp

However, if you insert a malware infected USB drive in your netbook, the normally useful ‘autorun.inf’ file launches the malware and infects your netbook. You can disable the ‘autorun.inf’ file to prevent worms from USB drives. There are different ways to disable the ‘autorun.inf’ file on different version of Windows.
If you have Windows XP home installed on your netbook, follow the steps below to disable ‘autorun.inf’ feature.
  • Open your Windows Registry Editor (Start< Run< regedit).

    USB drive, virus, smartbook, netbook, netbook, USB Flash drive, worm, Windows Xp
  • Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer.

    USB drive, virus, smartbook, netbook, netbook, USB Flash drive, worm, Windows Xp
  • On the right hand pane, double-click NoDriveTypeAutoRun and set its value to Hexadecimal to FF.

    USB drive, virus, smartbook, netbook, netbook, USB Flash drive, worm, Windows Xp
If you are running a professional version of Windows on your netbook like Windows XP professional, you can follow the options mentioned below to disable the ‘autorun.inf’ file.
  • Open your Group Policy Editor (Start< Run<>).

    USB drive, virus, smartbook, netbook, netbook, USB Flash drive, worm, Windows Xp
  • Double-click Computer Configuration< Administrative Templates < System.

USB drive, virus, smartbook, netbook, netbook, USB Flash drive, worm, Windows Xp

  • Locate Turn off AutoPlay in the right-hand pane and double-click on it.

    USB drive, virus, smartbook, netbook, netbook, USB Flash drive, worm, Windows Xp

Apart from manually disabling the ‘autorun.inf’ file, you can download ClamWin on your USB drive and scan your netbook for additional protection.

After I have disabled the ‘autorun.inf’, I can plug in any USB drive without worrying about worms or viruses on my Samsung NC20.

Select Enabled from the drop down menu and set it for All drives.

  • USB drive, virus, smartbook, netbook, netbook, USB Flash drive, worm, Windows Xp

  • Watch this!!!!!!!!!!!

    How configure multiple skype


    Skype has added a new switch for supporting multiple users on a single PC. The following steps would show how to create a new shortcut for starting a new Skype instance with a different Skype user account.

    • Open Windows Explorer and go to "C:\Program Files\Skype\Phone."
    • Right click on the Skype icon and select "Create Shortcut."
    • Right click on the new shortcut and select "Properties."
    • Apply " /secondary" to "Target" to become '"C:\Program Files\Skype\Phone\Skype.exe" /secondary.'
    • Click OK to save the change.
    • Give the new shortcut a new name and move it to anywhere you desired.
    • When you click on this new shortcut, a new Skype window will appear and you can log on using another Skype account.

    Simple know!!! Hope it Helped

    ya Make a skype call, i am there -> jibinclt

    Internet Download Manager

    Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

    Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.

    Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.

    Version 5.18 adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Windows 7 and Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

    Try Internet Download Manager for free



    With the Rise in attacks on Information Networks, intelligence
    busy preparing new strategies to counter it,

    There is a new type of war being fought these days.It does not involve troops,guns,explotions,blood or bodies.Instead,its front line is made up of (mostly)young men and women hunched over computer keyboards,furiously typing out commands to disable the adversary's information networks even before anyone foemaly declares war.

    Welcome to the world of cyberwars.Silent and bloodless,but aseffective,sometimes even more,than the real thing.The weapons of this war are unlike anything that has been seen before.It consists of exotic,arcane mathematical modules called algorithms to cancel out the algorithms used by other side.You're unlikely to catch an officer shouting, "These algorithm will advance," but that is pretty much how this war is fought. The machismo is not about muscle--it's more mental,about igngenuity

    As a major rising power,India,too,is caught in the midst of a war on its information assets.launched,apparently,by another rising power.A recent Indian Computer Emergency Response Team teport says HACKERS breached indian information networks more than 61 times in April.The recent attack on the ministry of external Affairs website,in which chinese hackers are reported to have got away with useful data,highlights the need to be much better prepared for such snatch-and-grab raids.

    This should serve as an important wake-up call.Institute for deffence stadies and analyses (IDSA) resercher Ajey Lele says, "The recent attacks have forced organisations to look at the threat seriously." he goes on to add that security systems even for sensitive sites are far from tamper-proof.

    Lele also says users of these site don't realy know what security means in the context of the information war .If someone seds a Virus-laden e-mail,there is no program to filter or moniter it.So the user opens it innocently,not knowing the perils to which he is putting the site.The problem is thus two-fold

    Sources close to the hi-tech National Technical Reaearch Organisation,a branch of the Research & Analysis Wing,say that India is planing to protect its data online by developing indigenous expertise in Cryptography (a way of coding data to make it unintelligible to unauthorized persons) and cryptanalysis ( technique of breaking secret messages).

    "Separate encription algorithms (a sequence of instructions often used for calculation and data processing) or methods will be used to defend our information networks. They will be developed endogenously to safeguard our information networks," says one source.

    Sethu Madhavan, head of the Centre for Cyber Security in Amrita Vishwa Vidyapeetham, says a security analysis report on spear phishing by the Technology Information,Forecasting and Assessment Council's Centre of Relevance and Excellence (TIFAC -CORE) found that HACKERS embed a malicious software(malware) inside a specially created Word document and send it to the target network."When the file is opend, the malware allows unauthorised disclousure of information and disruption of service and gets control of the targeted work station

    "The evidence that the attacks orginated from China is based on the e-mail header analysis.As the authorities there control their cyberspaceeffectively, it can be said that these have the tacit blessings of the authorities,"Madhavan says.

    CERT-India director Gulshan Rai says,"Among all the different activities being undertaken by the HACKERS all over the world,China is focusing on creating malicious codes,largely for espionage and remote controlling information systems."
    A US report says China's high-tech information warfare capabilities will pose strategic and operational problems for India and the West.

    Intelligence agencies say China's People's Liberation Army has conducted several field exercises,including the one which 500 soldiers simulated cyberattacks on the telecommunications,electricity,finance and telivition sectors of india, Japan, Taiwan and South Korea. The report, quoiting Chines defence experts, claims the Chine's task force has prepared plans to cripple the civilian information infrastructure of india, Taiwan, the US, Japan and south Korea.

    However, Lete feels the threat from China is exaggerated.He says one can't blame a single country. "China does have a stategy as, like the US and most of the world, it realises the potencial of information technology and using cyberspace for stetegic maneouvres," he says,adding that India needs integrating the three forces, just like the US model

    "At present, the army doesn't face a threat from cyberspace as it uses the intranet as the mode of communication.However, one shouldn't be blined to others,"he says.

    The Indain army has decided to boost the security of its informationnetworks.Apart from creating cyberv-security organisation down to the division-level to guard against cyber warfare and data theft ,the army brass also underlined the need for "periodic cyber-security Establishment.

    IIT Chennai and seven other academic insitutions are working with the national Technical Research Organisation on a keyproject ,Directed Basic Research in smart and Secure Environment. "The goal is to create a distributed test-bed using which new ideas in Cyber defence can be developed", says professor Raghaven, "When an active element such as a router (specialised computers that send your messages and those of very other Internet user speeding to their destinations along thousands of pathways) is compromised, the adversary will attempt to reach other parts of a network through the router.

    "It does take some time. Also the attacker may try several active components connected to the compromised one,but succeed in compremising only a few of them.This is what we call Velocity of attack --- it has a direction and travel (spread) speed.

    "One of the goals is to come up with identification of compromised routers,for example,and through appropriate means(to be evolved as apart ot the SSE project) couter them," says Raghavan.
    However, it is not only india that is facing the heat from Chines Hackers. The hacking menace has resulted in a world-wide anti-China cyber war coalition.Raghavan says that India's joining of the coalition will enable exchange of information the individual teams are able to find throuh their networks.
    "Time zones sometimes can be of great help as one country can detect it early and help another in a separate zone to raise its defences," he says.

    The attacks on information networks have also raised concerns among several international organisations and the goverments.Professor James J F Forest,the director of the Terrorism studies and Associate professor at the Unaited state Military Academy,feels global networks are facing threats not not only from China but also from Russia,several countries in Eastern Europe and the former Soviet Union,as well asNorth Korea.
    The organisation for Economic cooperation and Developments says, "Over the last 20 years, malware has evolved from occasional "exploits" to a global multi-million-dollar criminal industry.... Cyber criminals are becoming wealther and,therefore,have more financial power to create larger engines of destruction."

    This has forced the international Telecommunications Union to work on a Global Cybersecurity Agenda that aims to put into place an international cooperative framework to fullfill the goals of Action Line C5--- cooperation among goverments,prevention,detection and response to cyber-srime, says Alexander Ntoko,head of the corporate strategy division of the ITU,However,Rai says,"The monitoring of the cyberspace is to be done at the country level and there cannot be a globalwatchdog. There are specialised areas and these areas are to be monitored by different agencies having the necessary expertise in those areas."

    Forest says,"A global wachdog is the stuff of Hollywood fiction.with all the open source communities and technological advances each year, i just can't see it ever becoming a reality"

    How to configure TeamViewer

    solution for desktop sharing

    TeamViewer is the fast, simple and friendly solution for remote access over the Internet - all applications in one single, very affordable module

    Remote access to PCs and servers via Internet
    Instantly take control over a computer anywhere on the Internet, even through firewalls. No installation required, just use it fast and secure
    Training, sales and teamwork

    TeamViewer can also be used to present your desktop to a partner on the Internet - great for team collaboration, trainings and sales presentations.

    File transfer, chat and more

    Share your files, chat, switch the direction during a teamwork session, and a lot more is included in TeamViewer

    click here and Download it

    Download Teamviewer.

    ->double click the setup file Click Run
    ->shows install or Run!! Install it

    ->choose Personal/ Non Commercial Use

    ->Check I agree tab & Next

    ->select Normal Installation & Next (you can
    use password,When we connect to the Remote Pc It asks Password)
    ->Select Full Access & Next

    Now it's Ready to use open Teamviewer


    while you are opening Teamviewer it Generates a U
    ser name(ID)& password if you want to connect your Friends or Home computer ask them the ID first(use Gtalk or yahoo as you like (in the wait for session) Then fill the ID (in the create session) mark Remote Support(depends if you have file transferring, you can change the option) ->click connect to partner

    then you can see a dialog box like this

    fill your partner password & Log on
    ya it's connected
    now you can control that pc as your Desktop
    you can take control your friends or office pc Anywhere in the World(with permition)

    hope you like it ..... GB

    My Photos

    1)This photo is from GOA

    2) from GOA

    3) Haroon & Me from GOA

    4) From Wayanad

    5) How is ARJU'S Bike

    6) With Friends,From Left -ARJU, SAMEER, MUNNA,(SAJIN) ALI & ME

    7) Ya it's ME

    My Video PlaylistS 580 = 360

    1) There is a lot of Meaning Behind this Song!!!!



    A powerful prayer ......


    Remember, Our Lady of La Salette,
    true Mother of Sorrows, the tears
    you shed for me on Calvary.
    Remember also the care you have
    always taken to keep me faithful
    to Christ, your Son, After having
    done so much for your child, you
    will not now abandon me. inspired
    by this consoling thought, I come
    to cast myself at your feet inspite
    of my infidelities and ingratitude.
    Do not reject my prayer, O merciful
    Virgin, but intercede for my
    conversion, obtain for me the grace
    to love Jesus above all things, to
    console you by a holy life, that i
    may one day see you in heaven

    I learned this prayer from La Salette Seminary @ Mysore...After my 10th grade i went for
    Priesthood!!! that time i learned this Prayer, but unfortunately i left Seminary..ya God has a plan for Every one...For me also God has a Big!!!! plan

    Ya i remember Fr.Johny, Fr.Andrews, Fr.Jojo
    Fr.Andrews was our Spiritual Teacher. when Fr.Andrews were taking Classes we use to sleep in the Class :) :) father is in USA i think...

    Fr. Andrews is a Good Singer,i remember Fr.Jojo's Birthday..that day early morning we all (brothers) moved to Jojo father's room with
    lighting candles , fr. Andrews Sung a beautiful B'day Song...wow!!!!! it was owsame.. ..it was a french or Spanish song ....in Holly Mass also Fr.Andrews has a different style,i always love to participate....
    i hope in future i can participate in his Holly Mass.


    La Salette Nikethan, Mysore

    Under The Greenwood Tree

    part 1

    Part 2

    Part 3

    Part 4

    Part 5

    Part 6

    Part 7

    Part 8

    Part 9

    Part 10


    Friends i think the First part is
    really Beautiful!! Have You Noticed

    GOA carnival

    photo Taken by me.........

    ya I love GOA

    Ya this Phone Also (Nokia E71)

    General 2G Network GSM 850 / 900 / 1800 / 1900
    3G Network HSDPA 900 / 2100
    HSDPA 850 / 1900 - American version
    Announced 2008, June
    Status Available. Released 2008, July

    Size Dimensions 114 x 57 x 10 mm, 66 cc
    Weight 127 g

    Display Type TFT, 16M colors
    Size 320 x 240 pixels, 2.36 inches
    - Full QWERTY keyboard
    - Five-way scroll key

    Sound Alert types Vibration; Downloadable polyphonic, monophonic, MP3 ringtones
    Speakerphone Yes
    - 2.5 mm audio jack

    Memory Phonebook Practically unlimited entries and fields, Photocall
    Call records Detailed, max 30 days
    Internal 110 MB storage, 128 MB RAM
    Card slot microSD (TransFlash), up to 8GB, hotswap, buy memory

    Data GPRS Class 32, 100 kbps
    HSCSD Yes
    EDGE Class 32, 296 kbps
    3G HSDPA, 3.6 Mbps
    WLAN Wi-Fi 802.11 b/g
    Bluetooth Yes, v2.0 with A2DP
    Infrared port Yes
    USB Yes, v2.0 microUSB

    Camera Primary 3.15 MP, 2048x1536 pixels, autofocus, LED flash
    Video Yes, QVGA@15fps
    Secondary Videocall camera

    Features OS Symbian OS 9.2, Series 60 v3.1 UI
    CPU ARM 11 369 MHz processor
    Messaging SMS, MMS, Email, Instant Messaging
    Browser WAP 2.0/xHTML, HTML
    Radio FM radio (E71 only); Visual radio
    Games Java downloadable
    Colors White Steel, Grey Steel, Black, Red
    GPS Yes, with A-GPS support; Nokia Maps
    Java Yes, MIDP 2.0
    - WMV/RV/MP4/3GP video player
    - MP3/WMA/WAV/RA/AAC/M4A music player
    - Document editor (Word, Excel, PowerPoint, PDF) incl. MS Office 2007 support via free update
    - Push to talk
    - Voice command/dial
    - Organizer
    - Printing

    Battery Standard battery, Li-Po 1500 mAh (BP-4L)
    Stand-by Up to 410 h (2G) / 480 h (3G)
    Talk time Up to 10 h 30 min (2G) / 4 h 30 min (3G)
    Music play Up to 18 h

    I simply Love this Phone

    General 2G Network GSM 850 / 900 / 1800 / 1900
    3G Network HSDPA 850 / 1900 / 2100
    Announced 2007, July
    Status Available

    Size Dimensions 112 x 59 x 19 mm
    Weight 190 g

    Display Type TFT resistive touchscreen, 65K colors
    Size 240 x 320 pixels, 2.8 inches
    - Handwriting recognition
    - QWERTY keyboard

    Sound Alert types Vibration; Downloadable polyphonic, MP3 ringtones
    Speakerphone Yes

    Memory Phonebook Practically unlimited entries and fields, Photocall
    Call records Practically unlimited
    Internal 128 MB RAM, 256 MB ROM
    Card slot microSD (TransFlash), buy memory

    Data GPRS Class 10 (4+1/3+2 slots), 32 - 48 kbps
    HSCSD No
    EDGE Class 10, 236.8 kbps
    3G HSDPA 3.6 Mbps
    WLAN Wi-Fi 802.11b/g
    Bluetooth Yes, v2.0
    Infrared port No
    USB Yes, v2.0

    Camera Primary 3.15 MP, 2048x1536 pixels, autofocus
    Video Yes
    Secondary VGA videocall camera

    Features OS Microsoft Windows Mobile 6.0 Professional
    CPU Qualcomm MSM7200 400 MHz
    Messaging SMS, MMS, Email, Instant Messaging
    Browser WAP 2.0/xHTML, HTML (PocketIE)
    Radio No
    Games Yes
    Colors Silver
    GPS Yes, with A-GPS support
    Java Yes, MIDP 2.0
    - Pocket Office (Word, Excel, PowerPoint, PDF viewer)
    - Voice memo
    - Media Player 10
    Battery Standard battery, Li-Po 1350 mAh
    Stand-by Up to 400 h
    Talk time Up to 6 h

    I love GOA


    dvs divix and by divx