Wednesday, December 27, 2006

Restore Nokia N72 Infected by Commwarrior

Commwarrior.Q is a new variant of the Commwarrior worm that is based on Commwarrior.C.

It displays Message on phone IntroductionSurprise! Your phone infected by CommWarrior worm v3.0

My friend nikhil was just haveing this problem in his cell .

I suggested him to try Restore using same old 3230 trick as explained in my post

Make phone off
Press Green Dial Key + * Key + 3 Key at a time .
while holding these keys make phone on
It will become on & ask for city , date & time ..

Hurrey you phone is as good as new !!!..

Thursday, December 21, 2006

"Merry Christmas"

Jingle bells, jingle bells, it's Christmas once again ! It's time for Santa Claus, for mistletoe kisses and for togetherness. Share the joys of this merry occasion with your friends/ family/ acquaintances/ loved ones. Bring on their holiday smiles and spread lotsa Christmas cheer around with these beautiful wishes.

Wish you a "Merry Christmas"

Monday, December 18, 2006

Best Program to Recover Some Files From Wrecked CD/DVD

BadCopy Pro is a leading data recovery software for floppy disk, CD, DVD, memory card, ZIP disk, and other storage media. BadCopy Pro can effectively recover and rescue corrupted or lost data from damaged, unreadable, or defective disks. The software supports all kinds of damage situations and all file types.

Some Situations Where BadCopy Pro Can Help

* Damaged floppy disk repair and floppy data recovery.
* Damaged or defective CD-ROM, CD-R, CD-RW, DVD data recovery.
* Recovery of inaccessible data on floppy, CD and DVD disks.
* Rescuing lost files from a floppy disk, CD-R/RW or DVD.
* CD-R/W burning problems and data loss recovery.
* Recovery of corrupted or unreadable files.
* Retrieval of data from all sessions on multi-session CDs.
* Lost photos recovery for storages used in digital cameras.
* Recovery of files deleted on floppy disks, even quick formatted disks.
* Data recovery on UDF and packet-writing disks. Supports DirectCD and InCD.
* Recovery of data on Iomega ZIP, JAZ, or MO disks.

RAR Repair Tools

While trying to unrar archives file has a 'redundancy error"
We tried using winrar repair but it bogs down and becomes unresponsive trying to fix them.
Some toos to repair RAR Files

Advanced Rar Repair v1.2

Advanced RAR Repair (ARAR) is a powerful tool to repair corrupt or damaged RAR files. It uses advanced technologies to scan the corrupt or damaged archives and recover your files in them as much as possible, so to minimize the loss in file corruption.

* ( unless a rar file is compressed with a "recovery record" the chances are slim to repair the file. ) *

Sunday, December 17, 2006

Robotics programming using Microsoft Technology

Microsoft has released Microsoft Robotics Studio (1.0) . A friendly tool to program varity of robotics hardware .
Some features are
A scalable, extensible runtime architecture that can span a wide variety of hardware and devices. The programming interface can be used to create applications to drive robots using 8-bit or 16-bit processors (from a connected PC) as well as 32-bit systems with multi-core processors; and devices from simple touch sensors to laser distance finding devices.

A set of useful tools that make programming and debugging robot applications scenarios easier. These include a high resolution visual simulation environment that integrates software physics supplied by the Ageia Technologies PhysX engine.
While Microsoft Robotics Studio can be used with programming languages such as those included in Microsoft Visual Studio and Microsoft Visual Studio Express, also included is a new visual programming language that enables the creation of applications using a simple drag-and-drop interface.

A set of useful technology libraries services to help developers get started with writing robot applications, and tutorials which illustrate the basics of how to get started in a variety of programming languages

Read more details on

Monday, December 11, 2006

XNA Game Studio Express - A free tool for XBOX 360 Game Development

XNA Game Studio Express is a new game development solution targeted primarily at students, hobbyists, and independent game developers. XNA Game Studio Express is based on Visual C# Express 2005 and lets developers create games for both Windows and Xbox 360. XNA Game Studio Express contains the following:

The XNA Framework, a set of managed code development libraries that make it possible for game developers to be more productive when creating games for Windows and the Xbox 360.
The XNA Framework Content Pipeline, a set of tools that allow developers to more easily incorporate 3D content into their games
XNA Game Studio Express also contains a full set of documentation, how-tos, and starter kits that demonstrate how best to use the content pipeline and XNA Framework.
XNA Game Studio Express runs side-by-side with other versions of Visual Studio without interference
XNA Game Studio Express has now been released, and can be found here. It supports both Windows and Xbox 360 game development.

Have a Look at

Wednesday, November 29, 2006

AMUST Registry Cleaner

AMUST Registry Cleaner introduces a new approach to Windows registry maintenance that combines the latest technology and deep knowledge of the system registry to reach an unparalleled level of system performance and problem resolution, while being absolutely safe to use.
AMUST Registry Cleaner rapidly scans your registry for any problems and safely gets rid of them in minutes, keeping your registry clean.
AMUST Registry Cleaner's features:
error removal
windows registry fix
performance augmentation
AMUST Registry Cleaner engine is built on SmartScan(TM) technology that provides for analysis of every vital part of the registry to find problems and bottlenecks that interrupt normal system operation.SmartScan(TM) is based on a sophisticated algorithm that provides for error prone problem detection and resolution, making it an ideal instrument for registry repairs.
Intuitive Interface
Full support for Windows 64-bit edition
Detection and removal of non-removable, aka Embedded-null registry keys
SmartScan™ and IntelliCompact™
Registry Backup and Undo history
Scheduled Tasks - "Set & Forget"
Email Notifications
Online errors database
Intuitive Interface

Get a copy from

RarRepair Tool 3.0

Compressed archives have long become the most popular form of data storage and transmission. But there remains one problem - the integrity of the archive structure of such rar files that we easily copy to removable media or send over networks. Until recently, file damage, something we can not escape in the process of data transfer and storage, created a potential weakness of rar archives.
The new generation of rar repair tools, however, provides a way to fix your corrupted rar files by applying sophisticated recovery algorithms and powerful rar repair engines.

Many things can cause file damage. The noise, introduced into downloads by line overload can cause transfer errors and finally corrupt your rar file. Physical damage to removable media can bring disruption into archive integrity and as a result you will have a rar file in need for recovery. Ordinary rar applications fail to extract archives whose integrity was disrupted. In case of a rar file damage,
it is the cyclic redundancy check, or CRC, that prevents you from extracting its contents, even if their part is intact. Instead, a notification appears, saying "Cannot open file: it does not appear to be a valid archive". When damage prevents you from accessing archives, use Rar Repair Tool v3.0, the state-of-the-art software specifically developed to recover corrupted rar files from damage.
Its sophisticated algorithm helps repair rar archive structure and restore data within. The program handles rar repair in the automatic mode, relieving the user of the technical side of the process. Its user-friendly interface makes rar repair but a snap.

Get Trial Copy from

Sunday, November 26, 2006

Today My domain name gone live

I will try to put more & more useful stuff on it

Cheers !!

Tuesday, November 21, 2006

Dog Icon Exe with Random name in Temp Folder

Running window2000 server & Updated Trend Micro In Place

I noticed services having random names like AB4FR1.EXE in the taskbar.
In WINNT\Tmp I m having file names like ~DF1101.tmp along with the random filename AB4FR1.EXE

If I kill the services i can delete the AB4FR1.EXE and ~DF1101.tmp but obviously it recreates itself on next boot with another name..

The random.exe file has always a dog icon.

Looks like using Process Explorer, found that Trend Micro antivirus program created those files. Process Explorer can help you do that.

than called TrendMicro Guys.

They confirm that the random.exe files visible in c:\windosws\temp are created by their antiviruses watchdod. The reason of the dog icon.

problem is solved because there were no problems :)

Monday, November 20, 2006

Programming with Google Maps API

The Google Maps API lets you embed Google Maps in your own web pages with JavaScript. You can add overlays to the map (including markers and polylines) and display shadowed "info windows"

For Details Have a look ar

I have Added Pune Map On My website

Enjoy !!

How to Go Home

wikiwalki Community Trail Guide is a beautiful website to Track your travel trails

Get the local's perspective on what, where and how to spend your time. Even export and follow the trail on your GPS device!

A nice Site Have a look

Sunday, November 19, 2006

Prerelease versions will expire without proper activation

Prerelease versions will expire without proper activation, Microsoft says.
Robert Mullins, IDG News Service

Microsoft says supposedly pirated copies of its new Vista computer operating system "will be of limited value" to those who use them.

Microsoft responded to reports that some Web sites have been circulating pirated copies of Vista and the Microsoft Office 2007 applications suite.

The pirated Vista comes with a product key that users can enter to activate a version of the products on their computers without paying for them, according to a report on the Web site of The Sydney (Australia) Morning Herald newspaper. A product key is a unique serial number tied to each package of a software product.

A second download, called an "activation crack," can then be applied that bypasses the activation process intended to guarantee that the Vista version being downloaded is legitimate, the Herald reported. Pirated copies of Office 2007 can be downloaded just with the product key with no second activation code required.

Apps Will Expire

But Microsoft said in a prepared statement that those pirated copies of the OS won't work for long.

"The copies available for download are not final code and users should avoid unauthorized copies which could be incomplete or tampered. This unauthorized download relies on the use of pre-RTM [release-to-manufacturing] activation keys that will be blocked using Microsofta??s Software Protection Platform. Consequently, these downloads will be of limited value," the statement said.

Microsoft is still looking into reports of pirated versions of Office 2007 and declined further comment.

"Microsoft is happy that customers are eager to begin using Windows Vista," the company said.

Vista's Launch Schedule

Microsoft has been criticized for multiple delays in bringing Vista to market, but has said it wants to take care that the product is designed correctly to avoid security flaws, piracy problems, and other software glitches.

The company released Vista to computer manufacturers November 8 for them to build into new laptops and desktops available for retail sale in January 2007. Consumers can start buying individual copies of Vista January 30.

Microsoft also plans to have Vista in the hands of business customers by the end of November. It has scheduled a Vista launch event in New York City on November 30 when the new Office 2007 and Exchange Server 2007 will also be introduced.

Thursday, November 09, 2006

Format Nokia 3230

I formatted my 3230 in the mothod below

1. Make sure you have at least 3/4 charge of battery power left.

2. Backup your contacts list and personal files to MMC memory card.

3. Switch-off your 3230 phone.

4. Press and hold 3 keys; Green dial key, * Star key, no. 3 key on keypad and then press the power on/off to swtich on the 6600 phone.

Remember, do not let go the 3 press and hold keys until you see a formatting word screen show!

5. After a few minutes when the Full phone formatting completed, your 3230 will back to original system and factory settting.

Wednesday, November 08, 2006


Ajax is a free framework for quickly creating a new generation of more efficient, more interactive and highly-personalized Web experiences that work across all the most popular browsers.

This website gives video tutorials for Ajax Programming .

Beta 2 features the following improvements over the October Beta release, including:

UpdateProgress control. The UpdateProgress control is now part of the supported core.
Client-side localization. Client scripts can now automatically retrieve localized resources from the server, making it possible to create locale- and region-aware Web interfaces.
Simplified event binding API. Added functionality for binding and detaching multiple event handlers to a DOM element with a simple function call, which reduces the amount of script and helps prevent memory leaks.
Client control CSS-based style support. Added functionality for using script to add, remove, and toggle CSS class associations on client controls.
Performance and stability improvements
Control designers are now installed in a separate assembly for less server overhead at runtime.
The ScriptManager control has support for configuring a timeout and for detecting scripts that time out when loading.
Script components can now register for dispose semantics with the ScriptManager control to avoid memory leaks
Debugging and tracing improvements. Better support for identifying and diagnosing issues during development and deployment.

Tuesday, November 07, 2006

How to send email through a VB application ?

Article on freevbcode
vbSendMail.dll Version 3.65-- Easy E-mail Sending in VB, with Attachments

Sending an e-mail with this .dll is as simple as the following:

'Module Level Declaration (WithEvents optional but recommended)
Private WithEvents poSendMail as vbSendMail.clsSendMail
Private Sub cmdSend_Click()
'Assumes you have a form with text boxes named as below

set poSendMail = new vbSendMail.clsSendMail
poSendMail.SMTPHost = txtServer.Text
poSendMail.From = txtFrom.Text
poSendMail.FromDisplayName = txtFromName.Text
poSendMail.Recipient = txtTo.Text
poSendMail.RecipientDisplayName = txtToName.Text
poSendMail.ReplyToAddress = txtFrom.Text
poSendMail.Subject = txtSubject.Text
poSendMail.Attachment = txtFileName.text 'attached file name
poSendMail.Message = txtMsg.Text
set poSendMail = nothing
End Sub

For multiple file attachments, an example would be:

poSendMail.Attachment = txtFileName1.text & ";" & txtFileName2.text

Shutdown using a .BAT file

OS? for example
w2k use shutdown.exe from reskit, winxp contains it already. Properties. In the Target box, append the command line switch -l (to log off), -s (to shut down), or -r (to reboot). (-txx time delay)
(Win 9x)
The line should be as follows:

For RESTART Windows:
C:\WINDOWS\RUNDLL.EXE user.exe,exitwindowsexec

For SHUT DOWN Windows:
C:\WINDOWS\RUNDLL32.EXE user,exitwindows

for most OS:

DOS ECHO G=FFFF:0000 ¦ DEBUG Reboot Warm boot, sometimes cold boot.
May not work with "exotic" memory managers, like Quarterdeck's QEMM or DesqView; in that case, use RESET.COM instead.
Win31* ECHO G=FFFF:0000 ¦ DEBUG Task Manager popup And sometimes reboot
Win9* RUNDLL USER.EXE,ExitWindows Shutdown (2)
Win9* RUNDLL USER.EXE,ExitWindowsExec See Remarks Win95: various results, usualy fast shutdown (and lock PC), sometimes restart Windows, sometimes reboot.
Win98: Restart Windows, sometimes reboot.
Win9* RUNDLL SHELL.DLL,RestartDialog Restart dialog "System Settings Changed, Do you want to restart your computer now?" dialog
Win98 RUNDLL32 KRNL386.EXE,exitkernel Poweroff Poweroff for ATX boards only, otherwise normal shutdown (3)
Win98/ME RUNDLL32 SHELL32.DLL,SHExitWindowsEx n See Remarks n can be any combination (sum) of the following numbers: (4)
0 Logoff
1 Shutdown
2 Reboot
4 Force
8 Poweroff (if supported by the hardware)

Win98/ME RUNONCE.EXE -q Reboot (4)
NT4 See Reboot NT on my Solutions found in alt.msdos.batch page Reboot Reboot immediately
NT4 RUNDLL32 USER32.DLL,ExitWindowsEx
RUNDLL32 USER32.DLL,ExitWindowsEx Logoff Most systems require the command to be called twice before logging off
NT+RK (1) SHUTDOWN /L /R /T:0 /Y Reboot Immediate shutdown & reboot
NT+RK (1) SHUTDOWN /L /T:10 /Y /C Delayed shutdown Shutdown in 10 seconds, close without saving.
Can be stopped during those 10 seconds using SHUTDOWN /A
NT (1) PSSHUTDOWN \\mynt4srv -K -F -T 20 Delayed poweroff Poweroff \\mynt4srv after a 20 seconds delay
Can be aborted using PSSHUTDOWN \\mynt4srv -A
Uses PSSHUTDOWN.EXE from's PS Tools
NT (1) PSSHUTDOWN \\myw2ksrv -O -F -T 0 Logoff Immediately logoff console user on \\myw2ksrv
Uses PSSHUTDOWN.EXE from's PS Tools
2000 Click here and learn how to shutdown a remote Windows 2000 computer Shutdown GUI, no command line
XP SHUTDOWN -r -t 10 Delayed reboot Reboot after a 10 seconds delay.
Can be stopped during those 10 seconds using SHUTDOWN -a
XP SHUTDOWN -s -t 01 Delayed shutdown Shutdown after a 1 second delay, NO poweroff.
TS LOGOFF 16 /SERVER:termserv1 Logoff Logoff session 16 on Terminal Server TERMSERV1.
Use the QUERY USER command to find out which session ID belongs to whom.
More Terminal Server commands here.
TS TSSHUTDN 45 /SERVER:termserv1 /POWERDOWN /DELAY:20 /V Delayed poweroff Notify all users on Terminal Server TERMSERV1, logoff all Terminal Server sessions after 45 seconds, wait another 20 seconds, and then shut down Terminal Server TERMSERV1 and power off.
See my Terminal Server Commands page for the exact syntax.
Kix $RC = SHUTDOWN( "\\server", "Shutting down...", 10, 1, 0 ) Delayed shutdown Shutdown \\server in 10 seconds, with message, close without saving, no reboot
Kix $RC = SHUTDOWN( "\\server", "", 0, 1, 1 ) Reboot Immediate shutdown & reboot \\server, without a message
Kix $RC = LOGOFF( 1 ) Logoff Forcing applications to close.
Use 0 instead of 1 if you don't want to force applications to close
Perl InitiateSystemShutdown( $sComputer, $sMessage, $uTimeoutSecs, $bForce, $bReboot ) General syntax (ActivePerl for Windows only)
Perl InitiateSystemShutdown( "", "", 0, 1, 1 ) Reboot Immediate reboot without message, force applications to close without saving data
Perl InitiateSystemShutdown( "", "Going down...", 10, 0, 1 ) Delayed reboot Reboot after 10 seconds, with message and without forcing applications to close
Perl InitiateSystemShutdown( "", "Sorry", 5, 1, 0 ) Delayed shutdown Shutdown of remote computer after 5 seconds, with message and forced closing of applications
Regina Rexx RC = W32SysShutdown( how [,force] ) General syntax (Regina Rexx for Windows with W32Funcs only).
how can be either Reboot, Logoff, Poweroff or Shutdown.
force can be either Force or Noforce.
Regina Rexx RC = W32SysShutdown( "P", "F" ) Poweroff Immediate shutdown and poweroff, forced closing of application
Regina Rexx RC = W32SysShutdown( "L", "N" ) Logoff Logoff, prompt for saving unsaved data
WSH [1] Set OpSysSet = GetObject("winmgmts:{(Shutdown)}//./root/cimv2").ExecQuery("select * from Win32_OperatingSystem where Primary=true")
[3] for each OpSys in OpSysSet
[4] OpSys.Reboot()
[5] next Reboot Requires WMI.
Remove [line numbers].
Found in a forum posting by Alex K. Angelopoulos on
WSH Replace line 4 in the script above with this one:
[4] OpSys.Shutdown()
to shut down the PC instead of rebooting it. Shutdown But no poweroff.

See my WSH page for examples on how to reboot or shut down remote computers too.
WSH [1] Const EWX_LOGOFF = 0
[3] Set wmi = GetObject("winmgmts:{(Shutdown)}")
[4] Set objSet = wmi.InstancesOf("Win32_OperatingSystem")
[9] For Each obj in objSet
[6] Set os = obj
[7] Exit For
[8] Next
[10] os.Win32Shutdown EWX_LOGOFF Logoff Requires WMI.
Remove [line numbers].
Posted by Michael Harris on microsoft.public.scripting.vbscript.

My Logoff.vbs combines this code with that of the reboot and shutdown commands, and allows logoff of remote computers as well.
OS/2 START /PM SHUTDOWN && EXIT Shutdown Will still stop and ask for confirmation if a non-PM application is active
OS/2 SETBOOT /IBD:C: Reboot Unconditional shutdown & reboot
OS/2 SETBOOT /IBA:nonsense Shutdown Unconditional shutdown & failing reboot.
Needs Boot Manager installed.
Will reboot, no questions asked, and then stop if nonsense is an invalid Boot Manager menu entry (which, in this case, is exactly what we want).
OS/2 LOGOFF Logoff Both LAN Server client and Peer

Notes: 1 DOS MS-DOS or PC-DOS
Win31* Windows 3.1, 3.11 or 3.11 for Workgroups
Win9* Windows 95 or 98
Win98 Windows 98
Win98/ME Windows 98 or Windows Millennium Edition (ME)
NT4 Windows NT 4 (not Windows 2000)
NT Windows NT 4 or Windows 2000
NT+RK Windows NT 4 or Windows 2000 with the appropriate Resource Kit
2000 Windows 2000
XP Windows XP
TS Windows NT 4 Terminal Server Edition or Windows 2000 (Advanced) Server with Terminal Server installed
Kix Windows (any) with KiXtart
Perl Windows (any) with ActivePerl
Regina Rexx Windows (any) with Regina Rexx and W32Funcs
WSH Windows Script Host
OS/2 OS/2 Warp 3 and 4, LAN Server and Warp Server
2 Thanks for Bill James and Tom Lavedas, for the information on RUNDLL.
Find more RUNDLL examples I collected on my RUNDLL page.
3 Thanks for Sasha Predii for posting this information on
Find more RUNDLL examples I collected on my RUNDLL page.
4 See article Q234216 in the Microsoft Knowledge base for more information.
Thanks for Alec Soroudi for pointing out this information.
Windows NT also has a RUNONCE.EXE, but I am not sure what its purpose is -- RUNONCE.EXE -q does not shut down NT.

(Win 98/ME)


Where n is one of the following values, depending on the task you want to accomplish:

n=0 LOGOFF: Shuts down all running processes, logs the user off, then restarts the Windows shell. (Same as Logoff on the Start Menu.)
n=1 SHUTDOWN: Shuts down the system to a point at which it is safe to turn off the power. All file buffers have been flushed to disk, and all running processes have stopped.
n=2 REBOOT: Shuts down the system, then restarts it. (Same as Start Menu | Shutdown | Restart.)
n=4 FORCE: Forces all processes to terminate — in effect, shuts down all running programs. When this flag is set, Windows does not query running applications to inform them that Windows is shutting down. This can cause the applications to lose data, therefore, you should only use this flag in an emergency.
n=8 POWEROFF: Exits Windows, then turns off the computer’s power (provided the computer supports the power-off feature).
n=-1 RESTART EXPLORER: Quickly closes Explorer (i.e., the Windows desktop), then lets it restore itself.

Smarten Your Start Menu

Make your start menu more powerful by adding numbered shortcuts. Create a new shortcut, for example to MS Word. Rename it to “1 - Word” and drag it onto your start menu. Now, when you want to start Word, push the Windows Key, then 1. Add more frequently used applications as needed.

Regfix for Windows XP Num Lock Issue

Windows XP will switch off the Num Lock key when it boots. In some cases it's enough to make sure that the Num Lock key is enabled when you shut down; Windows will remember the status of Num Lock, and enable it on the next boot. In other cases this may not work, and Windows will always default to switching Num Lock off when booting. To fix this:
Start the Registry Editor.
Go to Start.
Select Run...
Type regedit.
Click OK.

Go to HKEY_CURRENT_USER \ Control Panel \ Keyboard.

Double-click the value InitialKeyboardIndicators, and enter 2 as it's Value data and then click OK.

Close the registry editor, and restart Windows for the changes to take effect.

Preserve your USB Flash drive

When connecting and disconnecting the USB drive plug from the USB socket, the danger is not wearing out the connectors. The weakest point is the solder connections between the stick and its plug. If you break the solder connections due to stress on the little thing, not only are you out your drive, there goes your data.

You might want to disconnect the drive from the computer to avoid the possibility of zapping the drive when the computer gets zapped.

So connect the flash drive semi-permanently to the short cable and use the cable to make and break the connection to the computer.

Thursday, November 02, 2006

Test Internet Explorer 7 Without Installing It

Google Operating System: Test Internet Explorer 7 Without Installing It

To run Internet Explorer 7, you need Windows XP SP2.

Step 1

Download Internet Explorer 7 (14.8 MB). You could also download IE7 from File Hippo.

Step 2

Download the IE7 Standalone archive created by Jon Galloway.

Step 3

Create a new folder IE7 in Program Files, copy the IE7 setup file and extract the files from the archive downloaded at Step 2.

Step 4

Run the file IE7 Standalone Setup.bat and click OK to install xmllitesetup.exe, an update necessary so that IE7 has tabs.

Step 5

Create a shortcut on the desktop to the file IE7.bat. Change the icon of the shortcut to one from IE7's iexplore.exe.

Now you have a standalone Internet Explorer 7 that runs along with Internet Explorer 6. You can launch IE7 from the shortcut you've created on the desktop. Note that not all the features will work well and this standalone installation is recommended only for developers that want to test IE7, but also need Internet Explorer 6.

XP's No-Reformat, Nondestructive Total-Rebuild Option

XP's No-Reformat, Nondestructive Total-Rebuild Option
IPB Image
Jun 19, 2006
Fred Langa shows you how to completely XP's No-Reformat, Nondestructive Total-Rebuild Option, and without having to reinstall user software, reformat, or otherwise destructively alter the setup.
It's one of those software design decisions that makes you scratch your head and wonder, "What were they thinking?"
The "it" in this case is XP's most powerful rebuild/repair option, and yet Microsoft chose to hide it behind seeming dead ends, red herrings, and a recycled interface that makes it hard to find and (at first) somewhat confusing to use.
But it's worth exploring because this option lets you completely and nondestructively rebuild, repair, or refresh an existing XP installation while leaving already-installed software alone (no reinstallation needed!). It also leaves user accounts, names, and passwords untouched and takes only a fraction of the time a full, from-scratch reinstall does. And unlike a traditional full reinstall, this option doesn't leave you with two copies of XP on your hard drive. Instead, you end up with just the original installation, but repaired, refreshed, and ready to go.

Here's a link to the actual page for the instructions:

How to Avoid Suspicious Web Sites

Learn to avoid online trouble before it's too late.
By Jessica Dolcourt for

No matter how you arrive at an unsafe Web site, much can go wrong when you do. Phishers will attempt to coerce you into disclosing sensitive information--such as your address and social security number--and adware engines may sprout pop-ups over your screen like a field of clover. Thankfully, you can learn to avoid trouble before it's too late. Here are nine telltale signs you're headed for dangerous waters, with tips to keep you firmly in the safety zone.
Nobody's perfect, and while these nine tips should help you avoid many dangerous sites, other online threats are more subtle. Two tools can assist in warning you about dangerous sites. McAfee SiteAdvisor assesses the hazards of sites you visit, and is available for SiteAdvisor-for-Firefoxor Internet Explorer. Online Armor scans sites in real time based on traceable patterns of malware behavior.
Also, our Security Starter Kitpresents an excellent set of tools to provide a solid foundation of defense against potential threats.

Sign 1: Pop-up city
You click a search result and are suddenly bombarded with no fewer than 10 porn pop-ups. Back out immediately by either clicking the X in the upper-right corners of the windows or by pressing Alt+F4 to close your browser. Then run a malware scanner and remover to assess and fix the damage. Many pop-up blockers are available for Internet Explorer, and both Firefox and Opera include blocking features.

Sign 2: Where's the EULA?
You're about to sign up for or purchase a service and aren't prompted to accept an end-user license agreement (EULA), nor are you offered a privacy policy to view. Shady site proprietors often disclose their intentions in the privacy policy or EULA, so you should always read carefully! The free tool EULAlyzeris a great help because it analyzes license agreements and notes any unusual or possibly dangerous language.

Sign 3: Excessive firewall alerts
Your firewall repeatedly alerts you to file extensions you don't recognize and other suspicious anomalies. Once you've set your firewall to allow your most common programs, any alert should be taken seriously, and a number of warnings should be a red light something is amiss. If you're not running a firewall, get one right now

Sign 4: E-mail links phish for information
You follow a link embedded in an e-mail and arrive at a site that asks you to provide security information for an "important update." Contact the company for verification before taking any action, and check the Federal Trade Commission's alert board

Sign 5: The site's URL and e-mail don't match
Any case in which a site's URL doesn't match the contact's e-mail address should raise an alarm. Most legitimate companies provide their employees with a corporate e-mail account. This doesn't mean, however, that you can automatically trust sites where the two align. Illegitimate companies can purchase domain names as easily as legitimate companies.

Sign 6: Are you secured?
If a site prompts you to enter personal information, such as a username, password, or credit card number, check the browser window. Unless the site is secure--that is, unless the address starts with https: and a closed padlock appears at the bottom of the window--your information is ripe for theft.

Sign 7: Check teh speling
Developers and engineers may have a bad reputation when it comes to grammar, and that's why most companies hire wordsmiths. Be wary of a site chock-full of grammatical and spelling errors. That includes the Web address--there's a world of difference between and

Sign 8: Nested links
Does the site forward you to a completely unrelated site when you land on it? If nested links progressively take you to other sites, the host may be trying to pull a fast one.

Sign 9: Ridiculously large gifts
If a free gift offer seems too good to be true, it probably is. You don't get a $500 gift certificate for doing nothing. Most often you'll have to provide personal information, download something compromising, engage your friends in a pyramid scheme, or all of the above. Even after you read the EULA, beware--the free iPod site that originally received positive press was recently sued in New Yorkfor violating its own stated privacy policy.

How to set up proxies in your browser

How to set up proxies in your browser, (!!!!be anonymous and make the passes last longer...!!!!!!
In Internet Explorer
Click "Tools", then "Internet Options", the in the "connections" Tab, click the "LAN Setup" Button in the bottom. There is a "Proxy Servers", tick the "Use a proxy....." and then enter the proxy in the bigger textbox and the port (the part that comes after the ":") in the smaller textbox. Hit okay, and then go to

to see if the proxy is now your IP.
Click "Files", then "Preferences", then "Network", then click the button "Proxy Servers", tick "HTTP", fill in with the proxy ort, click okay and that's it! Don't forget to check with

In Firefox
Tools -> Options
Then click the General Icon
Then the "Connection Settings..." button
Then click the "manually configure proxies" radio button, and enter the proxy address and port in the HTTP Proxy area.
Don't forget to check with

Check good Proxies on Sites below

To be clear: if I give you, that means is the proxy and 8080 is the port
To Optain Fresh and new proxies,u can alvays check Google...

Create an autorun CD

Create an autorun.inf by clicking Start / Run / type notepad
In notepad type:

open = setup.exe
icon = icon.ico

In the above paragraph where open is located if your CD has an executable which you would
like to run automatically you would need to type the name of the executable into this line.

EXAMPLE: open = winamp.exe

Next is the icon statement, if you would like to use an icon that you have created for the CD,
place the name of the icon file into this path.

EXAMPLE: icon = mypic.ico

Once the above three lines have been typed save the file as autorun.inf and exit.
You will know when you have made a .inf file, because it should look different from the notepad document.

Stop SQL Injection Attacks Before They Stop You

I found a interesting Article on SQL injection Attacks
whick covers following points

How SQL injection attacks work
Testing for vulnerabilities
Validating user input
Using .NET features to prevent attacks
Importance of handling exceptions

What is the XMLRPC?

XML-RPC is a technique by which one could execute remote procedure calls (RPC) to software written in different languages and running on different environments. XML-RPC uses the standard XML coding. Simply put, its nothing more than a set of specifications and implementations that allow software running on a variety operating systems, running in different environments to make procedure calls over the Internet. For calls and sends messages, the protocol used is the Hypertext Transfer Protocol (HTTP). Developers commonly use XML-RPC to develop Web services (e.g) blogging. A good feature of XML-RPC is that the libraries function in firewall or proxied environments as the transport is over a HTTP layer!

Just as you make standard local procedure calls in your local machine, the RPC is a very simple extension to the local procedure call idea! The RPC creates the connections between procedures that are running in different applications, or on different machines. Conceptually, there's no difference between a local procedure call and a remote one, but they are implemented differently, perform differently and are used for different things.

Remote calls are streamlined into a format that can be understood on the other side of the connection. As long as two machines agree on a format, they can talk to each other. That's why Windows machines can be networked with other Windows machines, and Macs can talk to Macs, etc. The value in a standardized cross-platform approach for RPC is that it allows Unix machines to talk to Windows machines and vice versa.

Tu summarize, XML RPC is a gluing element to different implementations on different machines via web service using the HTTP layer.

Monday, October 30, 2006

100 th Post in the Blog

This is the 100 th Post on This Blog .. I hope people are enjoying Technical Stuff & Fun .

I have created two more blogs

Find All Fun stuff

See My Photography


Internet Explorer 7

I just downloaded and installed IE7 from microsoft site below..
It is really cool , They include tabbed browsing, integrated RSS, better standards compliance, and advanced security.

Simple is good. A redesigned, streamlined interface gives you more of what you need and less of what you don't. The new look maximizes the area of the screen that displays the webpage.
The Internet Explorer 7 interface

Go get it from
Microsoft Site to Download IE 7

Thursday, October 26, 2006

What are Satellite Assemblies in .NET ?

Satellite assemblies are assembly files (.dll) that contain localized resources for an application. Each satellite assembly file contains the resources for one culture. An application can have many satellite assemblies, depending on how many cultures the application supports.

Web application projects use satellite assemblies to store the translated strings, graphics, and other culture-dependent aspects of an application’s user interface. To create the assemblies themselves, you use the Resource Manager. At run time, the Web application loads the translated strings into the Web form based on the current thread’s CurrentUICulture property

Enabling HTML Elements for Resources
Resources from satellite assemblies are loaded into Web form elements on the server side. Therefore, you need to make sure that all the elements on your Web form have id and runat attributes that make them available from server-side code. By default, ASP.NET server controls have these elements; however, HMTL elements do not.

Use the Request object’s UserLanguages array to detect the user’s culture.

Set the culture and uiCulture attributes of the globalization element in Web.config to create culture-specific Web applications.

The .NET Framework identifies cultures using the language and region codes listed in the “CultureInfo Class” online Help topic.

Set the culture used by the application for formatting dates, currencies, numbers, and determining sort order using the Thread class’s CurrentCulture property.

Use the Thread class’s CurrentUICulture to determine which satellite assembly is used to load localized resources.

Add id and runat attributes to HTML elements to be able to display localized strings from resource files in those elements at run time.

Elements within a resource file are case sensitive and must be uniquely named within the scope of the application, so use a naming convention such as

When creating Web forms that use non-ASCII characters, save the file using the UTF-8 character encoding with a signature. Including the signature allows ASP.NET to automatically detect the file’s encoding.

Running Stored Procedures with ASP.NET

Whenever we start working on any new platform we need some guidelines to perform simple tasks such as executing stored procedures. Stored procedures speedup the execution of database interaction. There are many reasons. Stored procedures are precompiled set of SQL statements to it skips time of Compiling SQL at runtime. Also it runs in process of database so data access is very fast.

Anyways I found this nice article to execute stored procedure from page

Go through this article

3 tier architecture with ASP.NET 2.0

This is a good article for all levels of Programmers.

it Covers

Tutorial 1: Creating a Data Access Layer

Tutorial 2: Creating a Business Logic Layer

Tutorial 3: Master Pages and Site Navigation

Monday, October 09, 2006

Goog Puzzle

Try out this puzzle & try to reach out to Page 8 (minimum), try to reach till page 23.

Hey !! I Solved it ..

Its Given

Very Simple


We know Roman

Reverse Five

Double Six

Seven Times Seven

Planet Neptune eight

Danish 9

10 th Month

I like playing cards

it was Simple

Simple Maths

Colors dont scare me , after all I am a programmer

I know little bit of spanish

the sixteenth President of the United States

seventeen in Latina

its binary eighteen . I am an Electronics Engineer

19 th Element in periodic table..

ojofuffo = nineteen
svdmsx = twenty

thats 21 degree

I got the Series


I am a great man

Wednesday, September 27, 2006

Open Very Large Text Files

Today I was trying to View Contents of a Large Text file of Size 3 GB . No Text Viewer Supported to open it . Notepad , textPad , Wordpad , Editplus All failed or ended up in Hanging system .

There are two ways use type command on DOS prompt in windows or use head command on *nix.

Monday, September 18, 2006


I was searching Linux based hosting for Applications .. I fell this Mono will satisfy my requirments

Mono - Project

What is Mono?
Mono provides the necessary software to develop and run .NET client and server applications on Linux, Solaris, Mac OS X, Windows, and Unix. Sponsored by Novell (, the Mono open source project has an active and enthusiastic contributing community and is positioned to become the leading choice for development of Linux applications

Read on

Thursday, September 14, 2006


Put about 100 bricks in some
particular order in a closed
room with an
open window.

Then send 2 or 3 candidates in
the room and close the door.

Leave them alone and come back
after 6 hours and then analyze
The situation.

If they are counting the
Put them in the accounts

If they are recounting them..
Put them in auditing.

If they have messed up the
whole place with the bricks.
Put them in engineering.

If they are arranging the
bricks in some strange order. Put them in planning.

If they are throwing the
bricks at each other.
Put them in operations.

If they are sleeping.
Put them in security.

If they have broken the bricks
into pieces.
Put them in information

If they are sitting idle.
Put them in human resources.

If they say they have tried
different combinations, yet
not a brick has
been moved. Put them in sales.

If they have already left for
the day.
Put them in marketing.

If they are staring out of the
Put them on strategic

And then last but not least.
If they are talking to each
other and not a single brick
has been

Congratulate them and put them
in top management.

Monday, September 11, 2006

Men always have better friends.....???????

>Friends of Women......

A wife was not at home for a whole night. So she tells her husband, the
very next morning, that she stayed at her (girl) friend's apartment
overnight. So the husband calls 10 of her best (girl) friends and none
of them confirm that she was with them . . .

>Friends of Men.......

A husband was not at home for a whole night. So he tells his wife the very
next morning, that he stayed at his friend's apartment over night. So
the wife calls 10 of his best friends and 5 of them confirm that he stayed
at their apartments that night and another 5 are claiming that he is still
with them . . .
This is called friendship………

Saturday, July 08, 2006

The Lizard Story

Okay, for anyone who has children, known children, or been a child, this is TOO funny... Lizard Birthing Story

If you have raised kids (or been one), and gone through the pet syndrome including toilet-flush burials for dead goldfish, the story below will have you laughing out LOUD!

Overview I had to take my son's lizard to the vet. Here's what happened

Just after dinner one night, my son came up to tell me there was "something wrong" with one of the two lizards he holds prisoner in his room. "He's just lying there looking sick," he told me. "I'm serious, Dad. Can you help?"

I put my best lizard-healer statement on my face and followed him into his bedroom. One of the little lizards was indeed lying on his back, looking stressed. I immediately knew what to do. "Honey," I called, "come look at the lizard!"

Oh my gosh," my wife diagnosed after a minute. "She's having babies."

"What?" my son demanded. "But their names are Bert and Ernie, Mom!" I was equally outraged. "Hey, how can that be? I thought we said we didn't want them to reproduce," I accused my wife.

"Well, what do you want me to do, post a sign in their cage?" she inquired. (I actually think she said this sarcastically!)

"No, but you were supposed to get two boys!" I reminded her, (in my most loving, calm, sweet voice, while gritting my teeth together).

"Yeah, Bert and Ernie!" my son agreed.

"Well, it's just a little hard to tell on some guys, you know," she informed me. (Again with the sarcasm, you think?)

By now the rest of the family had gathered to see what was going on. I shrugged, deciding to make the best of it. "Kids, this is going to be a wondrous experience, I announced. "We're about to witness the miracle of birth"

"OH, Gross!", they shrieked!

"Well, isn't THAT just Great! What are we going to do with a litter of tiny little lizard babies?" my wife wanted to know. (I really do think she was being snotty here, too, don't you?)

We peered at the patient. After much struggling, what looked like a tiny foot would appear briefly, vanishing a scant second later.

"We don't appear to be making much progress," I noted.

"It's breeched," my wife whispered, horrified. "Do something, Dad!" my son urged

"Okay, okay." Squeamishly, I reached in and grabbed the foot when it next appeared, giving it a gingerly tug. It disappeared. I tried several more times with the same results.

"Should I call 911?" my eldest daughter wanted to know. "Maybe they talk us through the trauma." (You see a pattern here with the females in my house?)

"Let's get Ernie to the vet," I said grimly. We drove to the vet with my son holding the cage in his lap. "Breathe, Ernie, breathe," he urged. "I don't think lizards do Lamaze," his mother noted to him. (Women can be so cruel to their own young. I mean what she does to me is one thing, but this boy is of her womb, for God's sake.)

The vet took Ernie back to the examining room and peered at the little animal through a magnifying glass. "What do you think, Doc, a C-section?" suggested scientifically.

Oh, very interesting," he murmured. "Mr. and Mrs. Cameron, may I speak to you privately for a moment?"

I gulped, nodding for my son to step outside. "Is Ernie going to be okay?" my wife asked.

"Oh, perfectly," the vet assured us. "This lizard is not in labor. In fact, it wont EVER happen... Ernie is a boy. You see, Ernie is a young male. And occasionally, as they come into maturity, like most male species, they um.... um....masturbate.

Just the way he did, lying on his back.

He blushed, glancing at my wife. "Well, you know what I'm saying, Mr. Cameron."

We were silent, absorbing this. "So Ernie's just...just... Excited," my wife offered.

Exactly," the vet replied, relieved that we understood.

More silence.

Then my viscous, cruel wife started to giggle and giggle. And then even laugh loudly. "What's so funny?" I demanded, knowing, but not that the woman I married would commit the upcoming affront to my flawless manliness.

Tears were now running down her face. "It's just...that... I'm picturing you pulling on its... its...teeny little..." she gasped for more air to bellow in laughter once more. "That's enough," I warned. We thanked the Veterinarian and hurriedly bundled the lizards and our son back into the car. He was glad everything was going to be okay.

"I know Ernie's really thankful for what you've done, Dad," he told me.

Oh, you have NO idea," my wife agreed, collapsing with laughter.

2 - lizards - $140..
1 - Cage - $50...
Trip to the Vet - $30...
Memory of your husband pulling on a lizard's winky - Priceless...



There are moments in life when you miss someone
so much that you just want to pick them from
your dreams and hug them for real!

When the door of happiness closes, another opens;
but often times we look so long at the
closed door that we don't see the one
which has been opened for us.

Don't go for looks; they can deceive.
Don't go for wealth; even that fades away.
Go for someone who makes you smile,
because it takes only a smile to
make a dark day seem bright.
Find the one that makes your heart smile.

Dream what you want to dream;
go where you want to go;
be what you want to be,
because you have only one life
and one chance to do all the things
you want to do.

May you have enough happiness to make you sweet,
enough trials to make you strong,
enough sorrow to keep you human, and
enough hope to make you happy.

The happiest of people don't necessarily
have the best of everything;
they just make the most of
everything that comes along their way.

The brightest future will always
be based on a forgotten past;
you can't go forward in life until
you let go of your past failures and heartaches.

When you were born, you were crying
and everyone around you was smiling.
Live your life so at the end,
you're the one who is smiling and everyone
around you is crying.

Please send this message to those people
who mean something to you ;
to those who have touched your life in one way or another;
to those who make you smile when you really need it;
to those who make you see the
brighter side of things when you are really down;
to those whose friendship you appreciate;
to those who are so meaningful in your life.

If you don't send it, don't worry,
nothing bad will happen to you;
you will just miss out on the opportunity
to brighten someone's day with this message!!!

Don't count the years--count the memories...........

Life is not measured by the number of breaths we take,
but by the moments that take our breath away!


Be understanding to your enemies.
Be loyal to your friends.

Be strong enough to face the world each day.
Be weak enough to know you cannot do everything alone.

Be generous to those who need your help.
Be frugal with that you need yourself.

Be wise enough to know that you do not know everything.
Be foolish enough to believe in miracles.

Be willing to share your joys.
Be willing to share the sorrows of others.

Be a leader when you see a path others have missed.
Be a follower when you are shrouded by the mists of uncertainty.

Be first to congratulate an opponent who succeeds.
Be last to criticize a colleague who fails.

Be sure where your next step will fall, so that you will not tumble.
Be sure of your final destination, in case you are going the wrong way.

Be loving to those who love you.
Be loving to those who do not love you; they may change.

Before You....

Before you think of saying an unkind word
Think of someone who can't speak

Before you complain about the taste of your food
Think of someone who has nothing to eat

Before you complain about your husband or wife
Think of someone who's crying out to God for a companion

Today before you complain about life
Think of someone who went too early to heaven

Before you complain about your children
Think of someone who desires children but they're barren

Before you argue about your dirty house; someone didn't clean or sweep
Think of the people who are living in the streets

Before whining about the distance you drive
Think of someone who walks the same distance with their feet

And when you are tired and complain about your job
Think of the unemployed, the disabled and those who wished they had your job

But before you think of pointing the finger or condemning another
Remember that not one of us are without sin and we all answer to one maker

And when depressing thoughts seem to get you down
Put a smile on your face and thank God you're alive and still around

Life is a gift
Live it...
Enjoy it...
Celebrate it...
And fulfill it.


Believe while others are doubting.

Plan while others are playing.

Study while others are sleeping.

Decide while others are delaying.

Prepare while others are daydreaming.

Begin while others are procrastinating.

Work while others are wishing.

Save while others are wasting.

Listen while others are talking.

Smile while others are frowning.

Commend while others are criticizing.

Persist while others are quitting.

Principles Of Life

* Winning isn't everything. But wanting to win is.

* You would achieve more, if you don't mind who gets
The credit.

* When everything else is lost, the future still

* Don't fight too much. Or the enemy would know your
Art of war.

* The only job you start at the top is when you dig a

* If you don't stand for something, you'll fall for

* If you do little things well, you'll do big ones

* Only thing that comes to you without effort is old

* You won't get a second chance to make the first

* Only those who do nothing do not make mistakes.

* Never take a problem to your boss unless you have a

* If you are not failing you're not taking enough

* Don't try to get rid of bad temper by losing it.

* If at first you don't succeed, skydiving is not for

* Those who don't make mistakes usually don't make

* There are two kinds of failures. Those who think and
Never do, and those who do and never think.

* Pick battles big enough to matter, small enough to

* All progress has resulted from unpopular decisions.

* Change your thoughts and you change your world.

* Understanding proves intelligence, not the speed of
The learning.

* There are two kinds of fools in this world. Those
Who give advise and those who don't take it.

* The best way to kill an idea is to take it to a

* Management is doing things right. Leadership is
Doing the right things.

* Friendship founded on business is always better than
Business founded on friendship.

Sunday, April 02, 2006

How to change the firewall settings.

How to change the firewall settings.

Windows XP

Log on as a user that is a member of the Administrators group.
Open the Network Connections folder, right click the desired connection, and then click Properties.
Click the Advanced tab, and remove the check from Protect my computer and network by limiting or preventing access to this computer from the Internet.
Click Yes to the dialog windows that asks you to confirm your decision to disable the firewall.

Norton Internet Security

Log on using an account with Adult or Supervisor rights. Open Norton Internet Security.
On the left side of the window, click Internet Status and then click Current Status.
In the Current Status window, click Disable.

Norton Personal Firewall

Open Norton Personal Fireall.
On the left side of the window, click Internet Status and then click Current Status.
In the Current Status window, click Disable.
You can also disable Norton Personal Firewall by right-clicking on the Norton Personal Firewall icon in the notification area of the taskbar and selecting disable.

McAfee Internet Security

Right-click the McAfee icon.
Point to Personal Firewall and then click Options.
Click the Security tab.
Set the Security Level by moving the slider to the desired level.
Set Access to Low.
Click OK to save changes.

McAfee Firewall

Click Stop McAfee Firewall to disable the software.
From the Welcome to McAfee Firewall screen, go to the Network Control Settings and select Allow All Traffic.

this is info for difriend firewalls

How to remove a dual boot……..

How to remove a dual boot……..

Is your machine now waits for a timeout durring bootup and waiting for you to select one of 2 available boot configurations. Both configs are the same. You only wanted one.. Here’s how to remove one of the configs so the timeout durring bootup will not happen?

1. Go to start, settings, control panel,
Select view all if you cant see everything there...
2. Double click (system)
click (advanced)
3. Go to (startup and recovery)
It should let you choose the default operating system you want to use,
and uncheck the 2 boxes under it as well...
save,close and reboot,it should boot to the one you choose.


Win xp Doal Boot

Rigth click my computer icon>
click properties>
CLICK ADVANCE> and in system start up and recovery click advace?
You can edit your start up option

Nice One

A Nice Marathi Joke I received on mail

Tweak your own PC!, Increase your DL 20%

Windows XP uses 20% of your bandwidth !

Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)

Here's how to get it back:

Click Start-->Run-->type "gpedit.msc" without the "

This opens the group policy editor. Then go to:

Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth

Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :

"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."

So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.
Works on XP Pro and 2000.

this gpedit.msc is another great way to tweak pc without having to use outside tools. But be careful and read the information bars before you make any changes.

Tuesday, March 14, 2006

Deleting Duplicate Records in SQL Server

This article explains a solution which can be used for deleting non-unique duplicate records from a table. In Oracle, every row in a table has a unique identifier so deleting duplicate records can be done as each record is unique based on its rowid (rowid is the mechanism which Oracle uses to physically locate the records in a table). But as SQL Server 7.0/2000 does not have the concept of row identifier it’s difficult to delete duplicate records from a table.

I have created a Script which I have found very useful when I am faced with such a problem. In the example below I have tried to explain how the script works. First let’s create a non indexed table using the script given below:

/* Script for Creation of Employee Table*/
CREATE TABLE [dbo].[Employee] (
[id] [int] NULL ,
[name] [Varchar] (50) COLLATE Latin1_General_CI_AS NULL ,
[salary] [Numeric](18, 2) NULL

Then add some records into the table using the script given below. Note that there are 5 similar records being inserted into the table

/* Script for Insertion of duplicate records to the Table */
Insert into employee values (1,'Ram', 1000.00)
Insert into employee values (1,'Ram', 1000.00)
Insert into employee values (2,'Joe', 2000.00)
Insert into employee values (2,'Joe', 1000.00)
Insert into employee values (3,'Mary', 1000.00)
Insert into employee values (4,'Julie', 5000.00)
Insert into employee values (2,'Joe', 1000.00)
Insert into employee values (1,'Ram', 1000.00)


The table below shows the data present in the ‘Employee’ table.

id Name Salary
1 Ram 1000

1 Ram 1000
2 Joe 2000
2 Joe 1000
3 Mary 1000
4 Julie 5000
2 Joe 1000
1 Ram 1000

The following script deletes the duplicates from ‘Employee’ table. If there are duplicate records then the script will get a count of the duplicate records and will then delete the records till the count is 1.

/* Script for deletion of Duplicate record from the Employee Table */
Declare @id int,
@name varchar (50),
@cnt int,
@salary numeric

Declare getallrecords cursor local static For
Select count (1), id, name, salary
from employee (nolock)
group by id, name,salary having count(1)>1

Open getallrecords

Fetch next from getallrecords into @cnt,@id,@name,@salary
--Cursor to check with all other records
While @@fetch_status=0
Set @cnt= @cnt-1
Set rowcount @cnt

-- Deleting the duplicate records. Observe that all fields are mentioned at the where condition
Delete from employee where id=@id and name=@name
and salary=@salary

Set rowcount 0

Fetch next from getallrecords into @cnt,@id,@name,@salary

Close getallrecords
Deallocate getallrecords


The logic of the script is pretty simple; the select query retrieves all the records that are duplicates i.e. having Count greater than one. The result set is retrieved by opening a local cursor which fetches one row at a time.

Note here that the Count column is a part of the select query; this is used to identify the no of duplicate rows in the result set.

The row count has been set to (Value obtained from the Count Column – 1). SQL Server uses rowcount to stop processing the query after the specified numbers of rows are returned. The delete statement is executed only to delete the rows set by the Set rowcount command. Once the records have been deleted, the rowcount of SQL server is reset to the default value of 0.

... Original Article on sqlserver central

Wednesday, February 22, 2006

Rahul Bagal

This is my last day in Arya Omnitalk , Pune .
From tomorrow I will be working in IBM Global Services, Pune

Its really painful to detach from closely bound ones
But some time in life one has to take such bitter decisions

Anyways this is life..Looking forword for new challenges & changes ..we have to go on

Thursday, February 09, 2006

How to earn money using IT Skills

if you can develop software , you must read this.

Use your IT kowledge & skills, do projects , Sell them
be an Self Employed Professional or earn extra in your free time

this is something with which you earn money as well as
update your skills & enrich the experience.

Many companies get overseas projects from this site.
This is a good site to Freelance & out sourced project

Sign up from link

cheers !!

Thursday, January 19, 2006

Puneri Traffic

Pune traffic is the worst I have ever seen in India.

To teach them discipline here are some rules
Read the Marathi Article: " Marathi article ( No offence Punekar's ) "

Wednesday, January 18, 2006

SQL Server Transactions and Error Handling - The Code Project - Database

SQL Server Transactions and Error Handling - The Code Project - Database: "Transactions
Transactions group a set of tasks into a single execution unit. Each transaction begins with a specific task and ends when all the tasks in the group successfully complete. If any of the tasks fails, the transaction fails. Therefore, a transaction has only two results: success or failure. Incomplete steps result in the failure of the transaction.
Users can group two or more Transact-SQL statements into a single transaction using the following statements:

Begin Transaction
Rollback Transaction
Commit Transaction
If anything goes wrong with any of the grouped statements, all changes need to be aborted. The process of reversing changes is called rollback in SQL Server terminology. If everything is in order with all statements within a single transaction, all changes are recorded together in the database. In SQL Server terminology, we say that these changes are committed to the database."

A very nice Article on SQL Server Error Handeling & Transactions with handy examples

Friday, January 13, 2006


Wishing you all a very happy and prosparus MAKAR SANKRANTI !

Makar Sankranti marks the commencement of the sun's journey to the Northern Hemisphere

Makar Sankranti is perhaps the only Indian festival whose date always falls on the same day every year i.e. the 14th of January.

On this day women wear a special black saree called chandrakala which is embossed with crescent moons .There is scientific reason behind wearing black clothes as Black color absorbs maximum heat. .

Every region celebrates the festival in different way.

In Bengal, it is known as "GangaSagar Mela", on this day.

In Gujarat, the Kite Festival is celebrated as brightly colored kites dot the skies.

In Punjab, huge bonfires are lit on the eve of Sankranti and which is celebrated as "Lohri".

In Assam, the festival is celebrated as "Bhogali Bihu"

In South India, Sankrant is known by the name of "Pongal".

In Maharashtra, people exchange sweets called Tilache ladoo made from sesame seeds, sugar and jaggery and greet each other saying - " til-gul ghya, god god bola " meaning "accept these tilguls and speak sweet words".

Wednesday, January 04, 2006

Some unknown Laws

Variation Law:
If you change queues, the one you have left will start to move faster
than the one you are in now.

Law of the Telephone:
When you dial a wrong number, you never get an engaged one.

Law of Mechanical Repair:
After your hands become coated with grease, your nose will begin to

Law of the Workshop:
Any tool, when dropped, will roll to the least accessible corner.

Law of the Alibi:
If you tell the boss you were late for work because you had a flat
the next morning you will have a flat tyre.

When the body is immersed in water, the telephone rings.

The probability of meeting someone you know increases when you are with
someone you don't want to be seen with.

LAW of the RESULT:
When you try to prove to someone that a machine won't work, it will.

The severity of the itch is inversely proportional to the reach.

At any event, the people whose seats are furthest from the aisle arrive

As soon as you sit down to a cup of hot coffee, your boss will ask you
to do something which will last until the coffee is cold

Its Fun !!! isn't it ?

Monday, January 02, 2006

The World of DOS - Creating Batch Files

Batch Files
What are batch files? Batch files are not programs, pre se, they are lists of command line instructions that are batched together in one file. For the most part, you could manually type in the lines of a batch file and get the same results, but batch files make this work easy. Batch files do not contain "compiled" code like C++ so they can be opened, copied and edited. They are usually used for simple routines and low-level machine instruction, but they can be very powerful. If you look in your C:\, C:\WINDOWS, or C:\WINNT folder you will see a multitude of .BAT, .SYS, .CFG, .INF and other types. These are all kinds of batch files. This may shock you, but while most applications are writen in Basic or C++ they sit on a mountain of batch files. Batch files are the backbone of the Windows operating system, delete them and you've effectively disabled the OS. There is a reason for this. The system batch files on each computer are unique the that computer and change each time a program is loaded. The operating system must have access to these files and be able to add and delete instructions from them.

Nice Article .. Read on ..

Digg it !