Wednesday, November 29, 2006

AMUST Registry Cleaner

AMUST Registry Cleaner introduces a new approach to Windows registry maintenance that combines the latest technology and deep knowledge of the system registry to reach an unparalleled level of system performance and problem resolution, while being absolutely safe to use.
AMUST Registry Cleaner rapidly scans your registry for any problems and safely gets rid of them in minutes, keeping your registry clean.
AMUST Registry Cleaner's features:
error removal
windows registry fix
performance augmentation
AMUST Registry Cleaner engine is built on SmartScan(TM) technology that provides for analysis of every vital part of the registry to find problems and bottlenecks that interrupt normal system operation.SmartScan(TM) is based on a sophisticated algorithm that provides for error prone problem detection and resolution, making it an ideal instrument for registry repairs.
Intuitive Interface
Full support for Windows 64-bit edition
Detection and removal of non-removable, aka Embedded-null registry keys
SmartScan™ and IntelliCompact™
Registry Backup and Undo history
Scheduled Tasks - "Set & Forget"
Email Notifications
Online errors database
Intuitive Interface


Get a copy from http://www.amustsoft.com/RegistryCleaner/

RarRepair Tool 3.0

Compressed archives have long become the most popular form of data storage and transmission. But there remains one problem - the integrity of the archive structure of such rar files that we easily copy to removable media or send over networks. Until recently, file damage, something we can not escape in the process of data transfer and storage, created a potential weakness of rar archives.
The new generation of rar repair tools, however, provides a way to fix your corrupted rar files by applying sophisticated recovery algorithms and powerful rar repair engines.

Many things can cause file damage. The noise, introduced into downloads by line overload can cause transfer errors and finally corrupt your rar file. Physical damage to removable media can bring disruption into archive integrity and as a result you will have a rar file in need for recovery. Ordinary rar applications fail to extract archives whose integrity was disrupted. In case of a rar file damage,
it is the cyclic redundancy check, or CRC, that prevents you from extracting its contents, even if their part is intact. Instead, a notification appears, saying "Cannot open file: it does not appear to be a valid archive". When damage prevents you from accessing archives, use Rar Repair Tool v3.0, the state-of-the-art software specifically developed to recover corrupted rar files from damage.
Its sophisticated algorithm helps repair rar archive structure and restore data within. The program handles rar repair in the automatic mode, relieving the user of the technical side of the process. Its user-friendly interface makes rar repair but a snap.


Get Trial Copy from www.rar-repair-tool.com

Sunday, November 26, 2006

www.bagal.org

Today My domain name www.bagal.org gone live

I will try to put more & more useful stuff on it

Cheers !!

Tuesday, November 21, 2006

Dog Icon Exe with Random name in Temp Folder

Running window2000 server & Updated Trend Micro In Place

I noticed services having random names like AB4FR1.EXE in the taskbar.
In WINNT\Tmp I m having file names like ~DF1101.tmp along with the random filename AB4FR1.EXE

If I kill the services i can delete the AB4FR1.EXE and ~DF1101.tmp but obviously it recreates itself on next boot with another name..

The random.exe file has always a dog icon.

Looks like using Process Explorer, found that Trend Micro antivirus program created those files. Process Explorer can help you do that.

than called TrendMicro Guys.

They confirm that the random.exe files visible in c:\windosws\temp are created by their antiviruses watchdod. The reason of the dog icon.

problem is solved because there were no problems :)

Monday, November 20, 2006

Programming with Google Maps API

The Google Maps API lets you embed Google Maps in your own web pages with JavaScript. You can add overlays to the map (including markers and polylines) and display shadowed "info windows"

For Details Have a look ar http://www.google.com/apis/maps/

I have Added Pune Map On My website
http://rahulbagal.50webs.com/

Enjoy !!

How to Go Home

wikiwalki Community Trail Guide is a beautiful website to Track your travel trails

http://www.wikiwalki.com/courses/search?rid=287

Get the local's perspective on what, where and how to spend your time. Even export and follow the trail on your GPS device!

A nice Site Have a look

Sunday, November 19, 2006

Prerelease versions will expire without proper activation

Prerelease versions will expire without proper activation, Microsoft says.
Robert Mullins, IDG News Service


Microsoft says supposedly pirated copies of its new Vista computer operating system "will be of limited value" to those who use them.

Microsoft responded to reports that some Web sites have been circulating pirated copies of Vista and the Microsoft Office 2007 applications suite.

The pirated Vista comes with a product key that users can enter to activate a version of the products on their computers without paying for them, according to a report on the Web site of The Sydney (Australia) Morning Herald newspaper. A product key is a unique serial number tied to each package of a software product.

A second download, called an "activation crack," can then be applied that bypasses the activation process intended to guarantee that the Vista version being downloaded is legitimate, the Herald reported. Pirated copies of Office 2007 can be downloaded just with the product key with no second activation code required.


Apps Will Expire

But Microsoft said in a prepared statement that those pirated copies of the OS won't work for long.

"The copies available for download are not final code and users should avoid unauthorized copies which could be incomplete or tampered. This unauthorized download relies on the use of pre-RTM [release-to-manufacturing] activation keys that will be blocked using Microsofta??s Software Protection Platform. Consequently, these downloads will be of limited value," the statement said.

Microsoft is still looking into reports of pirated versions of Office 2007 and declined further comment.

"Microsoft is happy that customers are eager to begin using Windows Vista," the company said.


Vista's Launch Schedule

Microsoft has been criticized for multiple delays in bringing Vista to market, but has said it wants to take care that the product is designed correctly to avoid security flaws, piracy problems, and other software glitches.

The company released Vista to computer manufacturers November 8 for them to build into new laptops and desktops available for retail sale in January 2007. Consumers can start buying individual copies of Vista January 30.

Microsoft also plans to have Vista in the hands of business customers by the end of November. It has scheduled a Vista launch event in New York City on November 30 when the new Office 2007 and Exchange Server 2007 will also be introduced.

Thursday, November 09, 2006

Format Nokia 3230

I formatted my 3230 in the mothod below

1. Make sure you have at least 3/4 charge of battery power left.

2. Backup your contacts list and personal files to MMC memory card.

3. Switch-off your 3230 phone.

4. Press and hold 3 keys; Green dial key, * Star key, no. 3 key on keypad and then press the power on/off to swtich on the 6600 phone.

Remember, do not let go the 3 press and hold keys until you see a formatting word screen show!


5. After a few minutes when the Full phone formatting completed, your 3230 will back to original system and factory settting.

Wednesday, November 08, 2006

Ajax

Ajax is a free framework for quickly creating a new generation of more efficient, more interactive and highly-personalized Web experiences that work across all the most popular browsers.
http://ajax.asp.net/

This website gives video tutorials for Ajax Programming .

Beta 2 features the following improvements over the October Beta release, including:

UpdateProgress control. The UpdateProgress control is now part of the supported core.
Client-side localization. Client scripts can now automatically retrieve localized resources from the server, making it possible to create locale- and region-aware Web interfaces.
Simplified event binding API. Added functionality for binding and detaching multiple event handlers to a DOM element with a simple function call, which reduces the amount of script and helps prevent memory leaks.
Client control CSS-based style support. Added functionality for using script to add, remove, and toggle CSS class associations on client controls.
Performance and stability improvements
Control designers are now installed in a separate assembly for less server overhead at runtime.
The ScriptManager control has support for configuring a timeout and for detecting scripts that time out when loading.
Script components can now register for dispose semantics with the ScriptManager control to avoid memory leaks
Debugging and tracing improvements. Better support for identifying and diagnosing issues during development and deployment.

Tuesday, November 07, 2006

How to send email through a VB application ?

Article on freevbcode
vbSendMail.dll Version 3.65-- Easy E-mail Sending in VB, with Attachments

Sending an e-mail with this .dll is as simple as the following:

'Module Level Declaration (WithEvents optional but recommended)
Private WithEvents poSendMail as vbSendMail.clsSendMail
Private Sub cmdSend_Click()
'Assumes you have a form with text boxes named as below

set poSendMail = new vbSendMail.clsSendMail
poSendMail.SMTPHost = txtServer.Text
poSendMail.From = txtFrom.Text
poSendMail.FromDisplayName = txtFromName.Text
poSendMail.Recipient = txtTo.Text
poSendMail.RecipientDisplayName = txtToName.Text
poSendMail.ReplyToAddress = txtFrom.Text
poSendMail.Subject = txtSubject.Text
poSendMail.Attachment = txtFileName.text 'attached file name
poSendMail.Message = txtMsg.Text
poSendMail.Send
set poSendMail = nothing
End Sub

For multiple file attachments, an example would be:

poSendMail.Attachment = txtFileName1.text & ";" & txtFileName2.text

Shutdown using a .BAT file

OS? for example
w2k use shutdown.exe from reskit, winxp contains it already. Properties. In the Target box, append the command line switch -l (to log off), -s (to shut down), or -r (to reboot). (-txx time delay)
(Win 9x)
The line should be as follows:

For RESTART Windows:
C:\WINDOWS\RUNDLL.EXE user.exe,exitwindowsexec

For SHUT DOWN Windows:
C:\WINDOWS\RUNDLL32.EXE user,exitwindows

for most OS:

DOS ECHO G=FFFF:0000 ¦ DEBUG Reboot Warm boot, sometimes cold boot.
May not work with "exotic" memory managers, like Quarterdeck's QEMM or DesqView; in that case, use RESET.COM instead.
Win31* ECHO G=FFFF:0000 ¦ DEBUG Task Manager popup And sometimes reboot
Win9* RUNDLL USER.EXE,ExitWindows Shutdown (2)
Win9* RUNDLL USER.EXE,ExitWindowsExec See Remarks Win95: various results, usualy fast shutdown (and lock PC), sometimes restart Windows, sometimes reboot.
Win98: Restart Windows, sometimes reboot.
Win9* RUNDLL SHELL.DLL,RestartDialog Restart dialog "System Settings Changed, Do you want to restart your computer now?" dialog
Win98 RUNDLL32 KRNL386.EXE,exitkernel Poweroff Poweroff for ATX boards only, otherwise normal shutdown (3)
Win98/ME RUNDLL32 SHELL32.DLL,SHExitWindowsEx n See Remarks n can be any combination (sum) of the following numbers: (4)
0 Logoff
1 Shutdown
2 Reboot
4 Force
8 Poweroff (if supported by the hardware)

Win98/ME RUNONCE.EXE -q Reboot (4)
NT4 See Reboot NT on my Solutions found in alt.msdos.batch page Reboot Reboot immediately
NT4 RUNDLL32 USER32.DLL,ExitWindowsEx
RUNDLL32 USER32.DLL,ExitWindowsEx Logoff Most systems require the command to be called twice before logging off
NT+RK (1) SHUTDOWN /L /R /T:0 /Y Reboot Immediate shutdown & reboot
NT+RK (1) SHUTDOWN /L /T:10 /Y /C Delayed shutdown Shutdown in 10 seconds, close without saving.
Can be stopped during those 10 seconds using SHUTDOWN /A
NT (1) PSSHUTDOWN \\mynt4srv -K -F -T 20 Delayed poweroff Poweroff \\mynt4srv after a 20 seconds delay
Can be aborted using PSSHUTDOWN \\mynt4srv -A
Uses PSSHUTDOWN.EXE from SysInternal.com's PS Tools
NT (1) PSSHUTDOWN \\myw2ksrv -O -F -T 0 Logoff Immediately logoff console user on \\myw2ksrv
Uses PSSHUTDOWN.EXE from SysInternal.com's PS Tools
2000 Click here and learn how to shutdown a remote Windows 2000 computer Shutdown GUI, no command line
XP SHUTDOWN -r -t 10 Delayed reboot Reboot after a 10 seconds delay.
Can be stopped during those 10 seconds using SHUTDOWN -a
XP SHUTDOWN -s -t 01 Delayed shutdown Shutdown after a 1 second delay, NO poweroff.
TS LOGOFF 16 /SERVER:termserv1 Logoff Logoff session 16 on Terminal Server TERMSERV1.
Use the QUERY USER command to find out which session ID belongs to whom.
More Terminal Server commands here.
TS TSSHUTDN 45 /SERVER:termserv1 /POWERDOWN /DELAY:20 /V Delayed poweroff Notify all users on Terminal Server TERMSERV1, logoff all Terminal Server sessions after 45 seconds, wait another 20 seconds, and then shut down Terminal Server TERMSERV1 and power off.
See my Terminal Server Commands page for the exact syntax.
Kix $RC = SHUTDOWN( "\\server", "Shutting down...", 10, 1, 0 ) Delayed shutdown Shutdown \\server in 10 seconds, with message, close without saving, no reboot
Kix $RC = SHUTDOWN( "\\server", "", 0, 1, 1 ) Reboot Immediate shutdown & reboot \\server, without a message
Kix $RC = LOGOFF( 1 ) Logoff Forcing applications to close.
Use 0 instead of 1 if you don't want to force applications to close
Perl InitiateSystemShutdown( $sComputer, $sMessage, $uTimeoutSecs, $bForce, $bReboot ) General syntax (ActivePerl for Windows only)
Perl InitiateSystemShutdown( "", "", 0, 1, 1 ) Reboot Immediate reboot without message, force applications to close without saving data
Perl InitiateSystemShutdown( "", "Going down...", 10, 0, 1 ) Delayed reboot Reboot after 10 seconds, with message and without forcing applications to close
Perl InitiateSystemShutdown( "10.0.1.16", "Sorry", 5, 1, 0 ) Delayed shutdown Shutdown of remote computer after 5 seconds, with message and forced closing of applications
Regina Rexx RC = W32SysShutdown( how [,force] ) General syntax (Regina Rexx for Windows with W32Funcs only).
how can be either Reboot, Logoff, Poweroff or Shutdown.
force can be either Force or Noforce.
Regina Rexx RC = W32SysShutdown( "P", "F" ) Poweroff Immediate shutdown and poweroff, forced closing of application
Regina Rexx RC = W32SysShutdown( "L", "N" ) Logoff Logoff, prompt for saving unsaved data
WSH [1] Set OpSysSet = GetObject("winmgmts:{(Shutdown)}//./root/cimv2").ExecQuery("select * from Win32_OperatingSystem where Primary=true")
[2]
[3] for each OpSys in OpSysSet
[4] OpSys.Reboot()
[5] next Reboot Requires WMI.
Remove [line numbers].
Found in a forum posting by Alex K. Angelopoulos on www.developersdex.com.
WSH Replace line 4 in the script above with this one:
[4] OpSys.Shutdown()
to shut down the PC instead of rebooting it. Shutdown But no poweroff.

See my WSH page for examples on how to reboot or shut down remote computers too.
WSH [1] Const EWX_LOGOFF = 0
[2]
[3] Set wmi = GetObject("winmgmts:{(Shutdown)}")
[4] Set objSet = wmi.InstancesOf("Win32_OperatingSystem")
[5]
[9] For Each obj in objSet
[6] Set os = obj
[7] Exit For
[8] Next
[9]
[10] os.Win32Shutdown EWX_LOGOFF Logoff Requires WMI.
Remove [line numbers].
Posted by Michael Harris on microsoft.public.scripting.vbscript.

My Logoff.vbs combines this code with that of the reboot and shutdown commands, and allows logoff of remote computers as well.
OS/2 START /PM SHUTDOWN && EXIT Shutdown Will still stop and ask for confirmation if a non-PM application is active
OS/2 SETBOOT /IBD:C: Reboot Unconditional shutdown & reboot
OS/2 SETBOOT /IBA:nonsense Shutdown Unconditional shutdown & failing reboot.
Needs Boot Manager installed.
Will reboot, no questions asked, and then stop if nonsense is an invalid Boot Manager menu entry (which, in this case, is exactly what we want).
OS/2 LOGOFF Logoff Both LAN Server client and Peer




Notes: 1 DOS MS-DOS or PC-DOS
Win31* Windows 3.1, 3.11 or 3.11 for Workgroups
Win9* Windows 95 or 98
Win98 Windows 98
Win98/ME Windows 98 or Windows Millennium Edition (ME)
NT4 Windows NT 4 (not Windows 2000)
NT Windows NT 4 or Windows 2000
NT+RK Windows NT 4 or Windows 2000 with the appropriate Resource Kit
2000 Windows 2000
XP Windows XP
TS Windows NT 4 Terminal Server Edition or Windows 2000 (Advanced) Server with Terminal Server installed
Kix Windows (any) with KiXtart
Perl Windows (any) with ActivePerl
Regina Rexx Windows (any) with Regina Rexx and W32Funcs
WSH Windows Script Host
OS/2 OS/2 Warp 3 and 4, LAN Server and Warp Server
2 Thanks for Bill James and Tom Lavedas, for the information on RUNDLL.
Find more RUNDLL examples I collected on my RUNDLL page.
3 Thanks for Sasha Predii for posting this information on www.diskovod.ru.
Find more RUNDLL examples I collected on my RUNDLL page.
4 See article Q234216 in the Microsoft Knowledge base for more information.
Thanks for Alec Soroudi for pointing out this information.
Windows NT also has a RUNONCE.EXE, but I am not sure what its purpose is -- RUNONCE.EXE -q does not shut down NT.


(Win 98/ME)

C:\WINDOWS\RUNDLL32 SHELL32.DLL,SHExitWindowsEx n

Where n is one of the following values, depending on the task you want to accomplish:

n=0 LOGOFF: Shuts down all running processes, logs the user off, then restarts the Windows shell. (Same as Logoff on the Start Menu.)
n=1 SHUTDOWN: Shuts down the system to a point at which it is safe to turn off the power. All file buffers have been flushed to disk, and all running processes have stopped.
n=2 REBOOT: Shuts down the system, then restarts it. (Same as Start Menu | Shutdown | Restart.)
n=4 FORCE: Forces all processes to terminate — in effect, shuts down all running programs. When this flag is set, Windows does not query running applications to inform them that Windows is shutting down. This can cause the applications to lose data, therefore, you should only use this flag in an emergency.
n=8 POWEROFF: Exits Windows, then turns off the computer’s power (provided the computer supports the power-off feature).
n=-1 RESTART EXPLORER: Quickly closes Explorer (i.e., the Windows desktop), then lets it restore itself.

Smarten Your Start Menu

Make your start menu more powerful by adding numbered shortcuts. Create a new shortcut, for example to MS Word. Rename it to “1 - Word” and drag it onto your start menu. Now, when you want to start Word, push the Windows Key, then 1. Add more frequently used applications as needed.

Regfix for Windows XP Num Lock Issue

Windows XP will switch off the Num Lock key when it boots. In some cases it's enough to make sure that the Num Lock key is enabled when you shut down; Windows will remember the status of Num Lock, and enable it on the next boot. In other cases this may not work, and Windows will always default to switching Num Lock off when booting. To fix this:
Start the Registry Editor.
Go to Start.
Select Run...
Type regedit.
Click OK.


Go to HKEY_CURRENT_USER \ Control Panel \ Keyboard.


Double-click the value InitialKeyboardIndicators, and enter 2 as it's Value data and then click OK.


Close the registry editor, and restart Windows for the changes to take effect.

Preserve your USB Flash drive

When connecting and disconnecting the USB drive plug from the USB socket, the danger is not wearing out the connectors. The weakest point is the solder connections between the stick and its plug. If you break the solder connections due to stress on the little thing, not only are you out your drive, there goes your data.

You might want to disconnect the drive from the computer to avoid the possibility of zapping the drive when the computer gets zapped.

So connect the flash drive semi-permanently to the short cable and use the cable to make and break the connection to the computer.

Thursday, November 02, 2006

Test Internet Explorer 7 Without Installing It

Google Operating System: Test Internet Explorer 7 Without Installing It

To run Internet Explorer 7, you need Windows XP SP2.

Step 1

Download Internet Explorer 7 (14.8 MB). You could also download IE7 from File Hippo.

Step 2

Download the IE7 Standalone archive created by Jon Galloway.

Step 3

Create a new folder IE7 in Program Files, copy the IE7 setup file and extract the files from the archive downloaded at Step 2.

Step 4

Run the file IE7 Standalone Setup.bat and click OK to install xmllitesetup.exe, an update necessary so that IE7 has tabs.

Step 5

Create a shortcut on the desktop to the file IE7.bat. Change the icon of the shortcut to one from IE7's iexplore.exe.


Now you have a standalone Internet Explorer 7 that runs along with Internet Explorer 6. You can launch IE7 from the shortcut you've created on the desktop. Note that not all the features will work well and this standalone installation is recommended only for developers that want to test IE7, but also need Internet Explorer 6.

XP's No-Reformat, Nondestructive Total-Rebuild Option

XP's No-Reformat, Nondestructive Total-Rebuild Option
IPB Image
Jun 19, 2006
Fred Langa shows you how to completely XP's No-Reformat, Nondestructive Total-Rebuild Option, and without having to reinstall user software, reformat, or otherwise destructively alter the setup.
It's one of those software design decisions that makes you scratch your head and wonder, "What were they thinking?"
The "it" in this case is XP's most powerful rebuild/repair option, and yet Microsoft chose to hide it behind seeming dead ends, red herrings, and a recycled interface that makes it hard to find and (at first) somewhat confusing to use.
But it's worth exploring because this option lets you completely and nondestructively rebuild, repair, or refresh an existing XP installation while leaving already-installed software alone (no reinstallation needed!). It also leaves user accounts, names, and passwords untouched and takes only a fraction of the time a full, from-scratch reinstall does. And unlike a traditional full reinstall, this option doesn't leave you with two copies of XP on your hard drive. Instead, you end up with just the original installation, but repaired, refreshed, and ready to go.

Here's a link to the actual page for the instructions:
http://www.informationweek.com/windows/showArticle.jhtml?articleID=189400897&pgno=1&queryText

How to Avoid Suspicious Web Sites

Learn to avoid online trouble before it's too late.
By Jessica Dolcourt for Download.com



No matter how you arrive at an unsafe Web site, much can go wrong when you do. Phishers will attempt to coerce you into disclosing sensitive information--such as your address and social security number--and adware engines may sprout pop-ups over your screen like a field of clover. Thankfully, you can learn to avoid trouble before it's too late. Here are nine telltale signs you're headed for dangerous waters, with tips to keep you firmly in the safety zone.
Nobody's perfect, and while these nine tips should help you avoid many dangerous sites, other online threats are more subtle. Two tools can assist in warning you about dangerous sites. McAfee SiteAdvisor assesses the hazards of sites you visit, and is available for SiteAdvisor-for-Firefoxor Internet Explorer. Online Armor scans sites in real time based on traceable patterns of malware behavior.
Also, our Security Starter Kitpresents an excellent set of tools to provide a solid foundation of defense against potential threats.

Sign 1: Pop-up city
You click a search result and are suddenly bombarded with no fewer than 10 porn pop-ups. Back out immediately by either clicking the X in the upper-right corners of the windows or by pressing Alt+F4 to close your browser. Then run a malware scanner and remover to assess and fix the damage. Many pop-up blockers are available for Internet Explorer, and both Firefox and Opera include blocking features.

Sign 2: Where's the EULA?
You're about to sign up for or purchase a service and aren't prompted to accept an end-user license agreement (EULA), nor are you offered a privacy policy to view. Shady site proprietors often disclose their intentions in the privacy policy or EULA, so you should always read carefully! The free tool EULAlyzeris a great help because it analyzes license agreements and notes any unusual or possibly dangerous language.

Sign 3: Excessive firewall alerts
Your firewall repeatedly alerts you to file extensions you don't recognize and other suspicious anomalies. Once you've set your firewall to allow your most common programs, any alert should be taken seriously, and a number of warnings should be a red light something is amiss. If you're not running a firewall, get one right now

Sign 4: E-mail links phish for information
You follow a link embedded in an e-mail and arrive at a site that asks you to provide security information for an "important update." Contact the company for verification before taking any action, and check the Federal Trade Commission's alert board

Sign 5: The site's URL and e-mail don't match
Any case in which a site's URL doesn't match the contact's e-mail address should raise an alarm. Most legitimate companies provide their employees with a corporate e-mail account. This doesn't mean, however, that you can automatically trust sites where the two align. Illegitimate companies can purchase domain names as easily as legitimate companies.

Sign 6: Are you secured?
If a site prompts you to enter personal information, such as a username, password, or credit card number, check the browser window. Unless the site is secure--that is, unless the address starts with https: and a closed padlock appears at the bottom of the window--your information is ripe for theft.

Sign 7: Check teh speling
Developers and engineers may have a bad reputation when it comes to grammar, and that's why most companies hire wordsmiths. Be wary of a site chock-full of grammatical and spelling errors. That includes the Web address--there's a world of difference between http://www.yahoo.com and http://www.yhoo.com.

Sign 8: Nested links
Does the site forward you to a completely unrelated site when you land on it? If nested links progressively take you to other sites, the host may be trying to pull a fast one.

Sign 9: Ridiculously large gifts
If a free gift offer seems too good to be true, it probably is. You don't get a $500 gift certificate for doing nothing. Most often you'll have to provide personal information, download something compromising, engage your friends in a pyramid scheme, or all of the above. Even after you read the EULA, beware--the free iPod site that originally received positive press was recently sued in New Yorkfor violating its own stated privacy policy.

How to set up proxies in your browser

===================================
How to set up proxies in your browser, (!!!!be anonymous and make the passes last longer...!!!!!!
===================================
In Internet Explorer
===================================
Click "Tools", then "Internet Options", the in the "connections" Tab, click the "LAN Setup" Button in the bottom. There is a "Proxy Servers", tick the "Use a proxy....." and then enter the proxy in the bigger textbox and the port (the part that comes after the ":") in the smaller textbox. Hit okay, and then go to
www.whatismyip.com

to see if the proxy is now your IP.
===================================
In OPERA
===================================
Click "Files", then "Preferences", then "Network", then click the button "Proxy Servers", tick "HTTP", fill in with the proxy ort, click okay and that's it! Don't forget to check with
www.whatismyip.com

===================================
In Firefox
===================================
Tools -> Options
Then click the General Icon
Then the "Connection Settings..." button
Then click the "manually configure proxies" radio button, and enter the proxy address and port in the HTTP Proxy area.
Don't forget to check with
www.whatismyip.com

Check good Proxies on Sites below

http://www.proxy4free.com
http://www.safeproxy.org
http://www.megaproxy.com
http://www.guardster.com
http://www.silenter.com
http://www.anonymizer.com

To be clear: if I give you 255.255.255.255:8080, that means 255.255.255.255 is the proxy and 8080 is the port
To Optain Fresh and new proxies,u can alvays check Google...

Create an autorun CD

Create an autorun.inf by clicking Start / Run / type notepad
In notepad type:

[autorun]
open = setup.exe
icon = icon.ico

In the above paragraph where open is located if your CD has an executable which you would
like to run automatically you would need to type the name of the executable into this line.

EXAMPLE: open = winamp.exe

Next is the icon statement, if you would like to use an icon that you have created for the CD,
place the name of the icon file into this path.

EXAMPLE: icon = mypic.ico

Once the above three lines have been typed save the file as autorun.inf and exit.
You will know when you have made a .inf file, because it should look different from the notepad document.

Stop SQL Injection Attacks Before They Stop You

I found a interesting Article on SQL injection Attacks
whick covers following points

How SQL injection attacks work
Testing for vulnerabilities
Validating user input
Using .NET features to prevent attacks
Importance of handling exceptions

http://msdn.microsoft.com/msdnmag/issues/04/09/SQLInjection/

What is the XMLRPC?

XML-RPC is a technique by which one could execute remote procedure calls (RPC) to software written in different languages and running on different environments. XML-RPC uses the standard XML coding. Simply put, its nothing more than a set of specifications and implementations that allow software running on a variety operating systems, running in different environments to make procedure calls over the Internet. For calls and sends messages, the protocol used is the Hypertext Transfer Protocol (HTTP). Developers commonly use XML-RPC to develop Web services (e.g) blogging. A good feature of XML-RPC is that the libraries function in firewall or proxied environments as the transport is over a HTTP layer!

Just as you make standard local procedure calls in your local machine, the RPC is a very simple extension to the local procedure call idea! The RPC creates the connections between procedures that are running in different applications, or on different machines. Conceptually, there's no difference between a local procedure call and a remote one, but they are implemented differently, perform differently and are used for different things.

Remote calls are streamlined into a format that can be understood on the other side of the connection. As long as two machines agree on a format, they can talk to each other. That's why Windows machines can be networked with other Windows machines, and Macs can talk to Macs, etc. The value in a standardized cross-platform approach for RPC is that it allows Unix machines to talk to Windows machines and vice versa.

Tu summarize, XML RPC is a gluing element to different implementations on different machines via web service using the HTTP layer.

Digg it !