Monday, October 12, 2009

TECH NEWS






Page copy protected against web site content infringement by Copyscape

Sunday, October 11, 2009

My Motivational Factors






Page copy protected against web site content infringement by Copyscape

Sunday, August 16, 2009

Religion in India

HINDU
click here to know more......

MUSLIM
click here to know more.....

SIKHISM
click here to know more.....

JAINISM
click here to know more.....





Page copy protected against web site content infringement by Copyscape

<

TECH COMPANIES

My dream roll company
check it.





Page copy protected against web site content infringement by Copyscape

<

Monday, July 20, 2009

Top 100 websites of India

This summary is not available. Please click here to view the post.

Sunday, July 19, 2009

C-DAC exposure

My C-DAC(N) experince has me lot in my initiatves becasue it taught me how business and real life works. It has helped me produce working examples in my focus areas. It also taught me how mangerial function and decesion are made. My approach has been to gauge h0wI can apply the analytical skills and tools that i have learnt at C-DAC (in all my current initiatives. And I am tried my best to get value out of the MCA programmefro that I keeping my focous a lot.
I never faced a lack of support from my peer and proffesors here at C-DAC. They encourage me in terms of giving me plateform to actually take my initiataves forward. I could participate in many of competition till now. The exposure has beenn tremendous.
I personally feels that C-DAC(N) culture is an add-on-experience to my comming 2 years.
I have to work hard, more than what i did at the undergrad level. But the best part is that is that i am here working with some of the great mind of the country. Beside, with the vibrant culture here at C-DAC(N) it is not all work and not to play.

I also engage in fun student activities well . It also given me opportunites to arrange many movements in my hostl as well.

According to me it is the tough of the programme that really one life in C-DAC(n) togeteher with the expirence of best learning.
I has found my calling and i am also i am very clear in my mind about how i can my MCA degree to follow my passion.

It is very important to have big dream of what is want to do in life and then pursue it.

Search where i passionate sometime is may not ur dream fulfilled but is should continue in ur pursuit.

I am a man for many season. If anything that distinguish myself from others is my fleeting interactin and my wit not to hurt anyone.

Beside this, i work pretty early on projects as soon as possible.

A bit of initiative, oppurtinity, luck landed me, till now is best in my programming part. Which Ipersonally feel i could on a much higher plane owing to my extrovert nature in C-DAC hostel.

In C-DAC I have structured plan at the back of my mind to took at every opportunity as soon that could strenghten my candidature fo my IT career.

Extracurricalars activities have always been part fo my pursuits and i belives that i am evolve holistacaly as a person owing to the diversity till which i lernt.
One of the great experice till to tackle the confliciting priorites and keenness to strtech is the best part of C-DAC(N).
At the end of first year this is my experience in C-DAC(N) Hostel and in college.

Tuesday, June 30, 2009

Michael Jackson"The end of and Era"

Top 13 Michael Jackson Songs of All Time

Michael Jackson is no more. He was an American biggest Pop Singer, entertainer and businessman. He was also known as the King of Pop. He made his debut onto the professional music scene at the age of 11 as a member of The Jackson 5 in 1969, and began a solo career in 1971 while still a member of the group. His 1982 album Thriller is the world’s best-selling record of all time and other albums are also among the world’s best-selling records: Off the Wall (1979), Bad (1987), Dangerous (1991) and HIStory (1995). Today in the memory of this great artist, I have compiled his all time Top 13 Songs.
1. Thriller — This song made him King of Pop.

2. “Black or White” is from Michael Jackson’s album Dangerous, released in October 1991. This song is a mix of hard rock, dance and rap. Written, composed, and arranged by Jackson with the rap lyricist Bill Bottrell. The aim of this song to promote racial unity.

3. “Beat It” won Jackson two Grammy Awards for Record of the Year and Best Male Rock Vocal Performance. It was also nominated for Song of the Year along with Jackson’s “Billie Jean”. Rolling Stone ranked it 337 on their list of the 500 Greatest Songs of All Time.

4. “Man in the Mirror” was a number 1 super hit for Michael Jackson when released in 1988. It is one of Jackson’s most critically acclaimed songs and it was nominated for Record of the Year at the Grammy Awards.

5. Billie Jean — A dance-pop R&B song by Michael Jackson.
6. “Don’t Stop ’til You Get Enough“, released in July 1979, is the debut single from Michael Jackson’s Off the Wall album. It was his first solo album.
7. We are the world — This song is title song of 1985 album “We Are the World”. It contains US superstars charity recording for famine relief efforts in Ethiopia.
8. “I Just Can’t Stop Loving You” is a popular ballad by singers Michael Jackson and Siedah Garrett. This song is also written and composed by Michael Jackson.
9. Bad — This song was the second of five Billboard Hot 100 number-one hit singles from the album Bad, and was his seventh number-one single overall.
10. ABC — One of the first songs by Michael Jackson with his brothers.
11. Say, say say with Paul McCartney
12. “The Girl is mine” with Paul McCartney
13. They don’t care about us — One of the most controversial pieces Michael Jackson ever composed
14. chill

Virus Removal for dummies

  1. VIRUS REMOVAL FOR DUMMIES
    Virus means “Virtual Information Resources Under Seize”. A computer virus is a
    computer program that can copy itself and infect a computer without permission or
    knowledge of the user. This is a simple Script or Batch program that will run each time
    when the infected media is accessed. A virus can only spread from one computer to another
    when its host is taken to the uninfected computer, for instance by a user sending it over a
    network or the Internet, or by carrying it on a removable medium such as a floppy disk,
    CD, or USB drive. Viruses may takes the extension of *.exe,*.com,*.bat. A worm can spread
    itself to other computers without needing to be transferred as part of a host, and a Trojan
    horse is a file that appears harmless until executed.
    Infections created by the Virus: - Normally whenever the virus is executed it modifies the
    Registry values of the system and changes the Policies defined for that particular user. The
    infections that generally viruses make are:-
  2. Restrict access to the Registry Editing Tools.

Disable the Run Command from
Start Menu.
Restrict access to MsConfig Tools.
Disable the Folder Option
Menu.
Disable Task Manager.
Disable Command Prompt.
Disable the
System Restore.
Effect of Virus on Personal/Professional Computers: - Some
viruses are programmed to
damage the computer by damaging programs, deleting
files, or reformatting the hard disk.
Others are not designed to do any
damage, but simply replicate themselves and perhaps
make their presence
known by presenting text, video, or audio messages.
v Virus restricts the
access to Registry Editing, Run Command and MsConfig so there
is no way left
to remove virus except Formatting. Most Antivirus programs don’t
work if
they are not properly updated.
v Windows XP provides the facility to kill
the process using Task Manager when
computer hangs but if this tool is
disabled then restart is only option to solve Hang
condition and any
Professional may loose there unsaved Important Data.
v If system crashes
then System Restore is the tool to restore the Last Known Good
Configuration
but if this is disabled then there is no way to restore system settings.
v
They typically take up computer memory used by legitimate programs. As a result,
they often cause erratic behavior and can result in system crashes and data
loss.
v Any Hidden data can not be shown if the Folder Option menu is
disabled.
Tools to remove Virus Infection: -
Registry Editor (Regedit):
-The Registry is a database used to store settings and options for
the 32
bit versions of Microsoft. It contains information and settings for all the
hardware,
software, users, and preferences of the PC. Whenever a user makes
changes to a Control
Panel settings, or File Associations, System Policies,
or installed software, the changes are
reflected and stored in the Registry.
The Registry has a hierarchal structure; although it looks complicated the
structure is
similar to the directory structure on your hard disk, with
Regedit being similar to Windows
Explorer.
Each main branch (denoted by
a folder icon in the
Registry Editor, see left) is called a Hive, and Hives
contains Keys. Each key can contain other keys
(sometimes referred to as
sub-keys), as well as
Values. The values contain the actual information
stored in the Registry. There are three types of
values; String, Binary,
and DWORD - the use of
these depends Use this feature with care, as
modifying the wrong key or value could cause
major problems within the
registry, so remember to
always make a backup first.
There are several
methods for starting the Registry Editor, the simplest is to click on the
Start button, then select Run, and in the Open box type "regedit", or use
“regedit.exe” from
windows directory, it should now open and look like the
image below.
Group Policy Editor (GPedit.msc): - The mechanism by which
desktop settings are
configured automatically, as defined by the
administrator is handled by group policy
editor. Type “gpedit.msc” in Run
window or use “gpedit.msc” from
“\windows\system32\” directory to open Group
Policy Editor.
Removing Infections using these tools: -
Enable Registry
Editing: -
If registry editing is disabled then navigate to following policy
in group policy editor: -
User Configuration > Administrative Templates
> System
Change the policy Prevent access to registry editing tools and
Disable it to Enable
Registry Editing.
Enable MsConfig Tool: -
Use
registry editor and then create new Text Document named “Restore.txt” and type
the
following: -
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows
NT\SystemRestore]
"DisableConfig"= -
Enable Folder Option: -
Append the following key to “Restore.txt”: -
[HKEY_ CURRENT_USER
\Software\Microsoft\Windows\Current Version\Policies\
Explorer]
"NoFolderOptions"= -
Enable TaskManager and Run: -
Append the
following key in same file: -
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Syste
m]
"DisableTaskMgr"= -
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
Explorer]
"NoRun"= -
Enable System Restore and Command prompt: -
Append the following key: -
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows
NT\SystemRestore]
"DisableSR"= -
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System]
"DisableCMD"= -
Change the Extension from *.txt to *.reg and then Right
Click on the file and click on Merge.
You can edit this file according to
infection but “Windows Registry Editor Version 5.00”
should be the first
line to access the registry.
Examples of common viruses and their removal: -
“NewFolder.exe”, “MicrosoftPowerpoint.exe”, “d.com”, “niedect.com”, ”u.bat”
are the
common viruses. These entire viruses create the “Autorun.inf” file
which is having the
following data: -
[AutoRun]
open= “Virus_Name”
;shell\open=Open(&O)
shell\open\Command=”Virus_Name”
shell\open\Default=1
;shell\explore=Manager(&X)
shell\explore\Command=”Virus_Name”
Here the “shell\open\Default=1” shows
that whatever method you use to open the Drive
either “OPEN” or “EXPLORE”
the virus will be executed. Both virus and autorun file is
copied in each
drive. This is the reason that if you format any one drive than your
computer still infected by this virus.
You can see that the folders in
Shared Documents have an exe extension If you have
unchecked Hide extensions
for known file types in Folder Options
Removal: - To remove the infection
use the registry editing tool as mentioned above since
these entire virus
have the same symptoms as described.
Now uncheck the Hide Protected
operating system files (Recommended) in Folder
Options and search the files
“ssvichosst.exe”, “scvhost.exe”, ”autorun.inf ”, “amvo.exe”,
“MicrosoftPowerpoint.exe”, “d.com”, “niedect.com”, “u.bat”, “killer.exe”,
“funny ust
scandal.avi.exe”, “blastclnnn.exe”, “hinhem.scr” and delete these
files if any file doesn’t
delete than open the Task Manager and under
Processes Tab search that file and End that
Process now retry removing that
file.
Now your Computer is free from these Viruses.
Presented By: -
Surinder Jaggi
C-DAC NOIDA