Pages

Welcome...

Unlock Bsnl 3G Dongle TeraCom

In Windows XP goto run and type regedit,for Windows 7 goto start and type regedit .

In regedit Click on HKEY_LOCAL_MACHINE

In this section click on SOFTWARE and find the Linktop3G.

Than click on it(Linktop3G).

You will able to see Engineer so right click on it and modify the value from 1 to 0.

That's all. Now your Bsnl 3G capable with any network sim card.

NOTE : You have to set up new internet setting according to your service provider and make that setting as a default setting.

Hide and Lock your drives in Windows XP, Vista & 7

Hide and Lock your drives in Windows XP, Vista & 7

Doing some simple Registry editing, you can hide or lock your drive in My Computer.

Here is the trick:

1. Open RUN dialog box, type regedit and hit enter.

2. Navigate to the following key:

Code:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
3. Now right click in right side pane and create a new DWORD Value.

4. Rename it as "NoViewOnDrive" (for locking drive) or "NoDrives" (for Hiding drive), without quote.

5. Double click on it and put some numbers from the list below to lock or hide your desired Drive and click OK.

Code:
  • Drive Letter A : Decimal Value : 1
  • Drive Letter B : Decimal Value : 2
  • Drive Letter C : Decimal Value : 4
  • Drive Letter D : Decimal Value : 8
  • Drive Letter E : Decimal Value : 16
  • Drive Letter F : Decimal Value : 32
  • Drive Letter G : Decimal Value : 64
  • Drive Letter H : Decimal Value : 128
6. Finally restart or log-off the computer for changed to take effect.

7. Keep in mind that "0" is Default Value to Disable or remove this setting. Or simply delete the "NoViewOnDrive" or "NoDrives" key.

8. After locking the drive when you try to open it, you will see a message box like this:

"This operation has been canceled due to restrictions in effect on this computer. Please contact your system administrator".

Note:

1. You can hide or lock more than one drive. Just add the numbers given to lock or hide multiple drives. For example if you want to lock or hide drive D: and E: then the required value will be 8+16=24 and so on.

2. Do not hide or lock your system drive, usually C:

Write Protect USB drives , Creating a Read Only Pen Drive,

Write Protect USB drives , Creating a Read Only Pen Drive,


A common security issue at organizations is how to prevent their workers to write data onto USB drives using their PCs, because a user can easily move confidential data for other location.

If you have windows XP with SP2, then you can disable the writing option to USB drives.

Follow the given steps to disable the USB writing option:

To edit the computer registry, first you should log onto your computer with administrative rights.

1. First click on Start button and type "Regedit" in Run option.

2. Here locate the location to:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control

Here in right side panel, click right to create a key with the name "StorageDevicePolicies".

3.Now in left side panel, select "StorageDevicePolicies" key, again right click to create new DWORD value then label it "WriteProtect".

4.Set its value to "1". But again enable this option set its values "0".

Now close the registry editor and restart your computer after any changes to go into effect.

Tips To Increase Broadband Speed in Your FireFOx Browser

Here's some tips to increase broadband speed :

1.Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:

network.http.pipelining network.http.proxy.pipelining network.http.pipelining.maxrequests

Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.

2. Alter the entries as follows:

Set "network.http.pipelining" to "true"

Set "network.http.proxy.pipelining" to "true"

Set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.

3. Lastly right-click anywhere and select
New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it receives.

If you're using a broadband connection you'll load pages MUCH faster now!

BLOCK A WEBSITE FREELY WITHOUT USING ANY SOFTWARE

It is easy to block a website on a computer using any software or just by changing

the dns server and making few settings but if you don’t want to use any additional

software or service then too you can block websites on your Windows machine. All

you will require for this is :



1. A windows machine. 2. A text editor (notepad will do). 3. A web browser .




Just follow the steps given below to block a particular website.

1. Navigate to the C:\WINDOWS\system32\drivers\etc

2. Find the file named “HOSTS”

3. Open it using notepad.

4. Under “127.0.0.1 localhost” Add 127.0.0.2 www.orkut.com , and that site will no
longer be accessable.

5. Done!

example :

127.0.0.1 localhost
127.0.0.2 www.orkut.com

- www.orkut.com will not be accessible anymore.

If you want to add more sites then just increment the IP address by one and add it to the list.


i.e. 127.0.0.3 www.yahoo.com
127.0.0.4 www.msn.com
127.0.0.5 www.google.com

You can use this trick to block popup sites as well or any other advertising site or Like as an AD FILTER............

Steps to ensure better security in Facebook, Protect Face Book Account From Virus

I would like to give you all some small tips on how to ensure a better security in facebook. As we all know we share a lot of information in facebook and we try all the possible steps to protect it from hackers but we may be lacking some way or the another. May b because of the lack of knowledge in terms of online security. So I would like to share some of the knowledge with you all which may help you in the long run.

1) Password Security

while setting up a password make sure that you make the password longer than 8 characters and also do include a lot of characters as well as special characters and numbers in it. Do not make use of repeated characters or your birthday in it, such that it will be easier for you to remember. There is a possibility of phishing attack with that method.

2) Do not give any personal information to anyone in facebook. There are various unknown sources in facebook which asks for the personal information such as financial information or social security number. Just avoid them and don’t provide anything at all.

3) Clicking on a suspicious link

Make sure that you don’t click any links that are given to you online just because you feel like clicking it. sometimes it can happen that a person may not have been posted that link it can be a spam as well. If you any such doubts about the link just verify with the sender if he/she has sent it or not. Also watchout for the links that asks you to give the login information, don’t provide it at any cost.

4) Safe web browser

You should have a updated web browser and also it must be equipped with the anti-phishing protection. You can do that by going in the help section. The most recommended browsers are Firefox, Chrome and Safari.

5) Important to keep the machine clean

Ensure that your operating system is updated with the latest version. I hope you must be knowing how to update yourOS. Plus your system should have a good antivirus system, that includes all the security essentials such as anti-virus, anti-spyware, anti-phishing, and a firewall.

6) Account safeguarding tools

You can take the advantage of the security and privacy controls that is being offered by the facebook it will keep a track of all the activity and logins done by you. you do get the option of which information you want to share and which not. Go to the accounts section and select privacy. You will be getting all the options to share or not.

7) If you find some scam online then make sure that you don’t click it, instead there is a report link which you can click on and you can report that link automatically.

So hope so you had a good look at the same. I have tried and covered all the basic security essentials that are required for a safe facebooking. So follow them and stay protected!

TRICK TO SHOW YOUR NAME IN THE TASKBAR INSTEAD OF AM OR PM

TRICK TO SHOW YOUR NAME IN THE TASK BAR INSTEAD OF AM OR PM


Hi friends !

I am here to tell You a trick to add up Your name in place of AM and PM beside time and make Yourself to feel proud among Your group of friends.

Its very simple just follow the steps.Which are as follow:-

1.click on Start -> Go to Control Panel -> Then Select Regional and Language setting option
2.Then Select Customize (beside English US) in the Regional and language dialog Box. 3.Then Go to TIME tab
4.Change AM symbol and PM symbol from AM and PM to Your name
5.Apply Then Click OK.

Is it changed?

I think might be not changed.

Now go to time in taskbar.

Double Click it to open “Date and time property”.

Look place where time changes in digital form i.e. 02:47:52 AM ,

Click to arrow to Change the AM or PM by selecting and press arrow.

It will Show Your name or name that was entered by You.

Final Step Is to click on Apply Then OK.

I hope you like this post useful.......

How to create the batch file to lock a folder

1. Copy and paste the following codes in a notepad file.

cls
@ECHO OFF
title Folder Confidential
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Confidential goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Confidential "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter the Password to unlock folder
set/p "pass=>"
if NOT %pass%== Replace this red portion by Your password goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Confidential
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md confidential
echo Confidential created successfully
goto End
:End

2. Save the file as “Key.bat”. You are done. When you’ll double click on the Key.bat file for first time, a folder “Confidential” will be automatically created. You can move all your confidential data in that folder.
Now to lock the folder just double click on the file “Key”. You will get a confirmation message in Command Prompt. Type “y” to confirm. Now the folder “Confidential” will be locked and hidden.

If you want to access the contents of the folder then again double click on the batch file, you have created. Immediately you will be prompted to enter your password. After that you can access the folder “Confidential”.

By this process you can password protect the folder and no body can access the folder without the password. But still there is some risk. If some body is a computer savvy then he can easily retrieve the password from your batch file. He can easily find the password by choosing “Edit” option from the right-click context menu.
So, to prevent from that option you can make an executive file of the batch file. The facility of the executive file is that no body can’t see the source code of an exe file. Here I’ve described the process of converting the batch file to executive(.exe) file.


At first you need a compiler that compiles the batch file to an executive file.
1. Download Bat to Exe converter
2. Now run the application and put the source path of the batch file, then the target executive file name with location.

3. Click on “Compile” button.
That’s all. Delete the batch file “key.bat”. You can now protect or access the folder by using the exe file (key.exe). Your data is now fully protected.
The above method works in XP, Vista and Windows 7.
Update: After getting some feedback from the reader we modified the code and it should work properly. You can also get the code by clicking on the text version link.
While password protecting a folder ensures the security of important data, password protect images to make them private and inaccessible.

At Last ……

I suggest Do Not make The Exe Using The Exe maker Its optional….
But Put The “Key.bat” In Some Safe Location like of Ur Making the folder Password Protect In ur External Hdd …..Put key File in some hidden folder of ur Laptop or Desktop ….
Understand……………………….

Hide and Password Protect your Folders in Windows

cls
@ECHO OFF
title Folder My_Folder
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST My_Folder goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren My_Folder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK

echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==pwd123 HERE goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" My_Folder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md My_Folder
echo My_Folder created successfully
goto End
:End

Software Running anroid on pc

Software Running anroid on pc



now tryout all these cool apps and games for android in ur pc use

http://www.bluestacks.com/home.php

Microsoft releases Internet Explorer 10 Platform Preview 1 Beta Download

It only seems like five minutes since the release of Internet Explorer 9, but a preview of the next version of Microsoft’s web browser is already available. Internet Explorer 10 Platform Preview 1 gives an idea about what is to come in the future, but this is far from being a feature-complete version of the browser.

There’s currently no toolbars, for instance, no sidebar, not even an address bar (you’ll need to click Page, then Open to enter a new URL), so this isn’t something you’ll be using every day. Platform Preview 1 is really just a basic browsing window that allows you to see how Microsoft are progressing in their support for various web standards, including CSS3 Multi-column, CSS3 Flexbox, CSS3 Grid Alignment, CSS3 Gradients on background images and ECMAScript5 Strict Mode.

If you’re not a web designer then that may not mean very much, but fortunately Microsoft have provided several simple HTML5 demos that should help to make things clear, and simply opening Platform Preview 1 will take you immediately to the test drive site.

Here you can explore the Tweet Columns demo, for instance, which allows you to simulate an application that’s receiving new tweets (just keep clicking “Show a tweet”), then uses CSS3 multi-column layout to move your text around and keep everything looking neat.

There are also new CSS and SVG gradient creation tools. The same gradient technology has been added to the FishBowl Benchmark demo, which make it look better than ever. And just to show that there’s more to Platform Preview 1 than flashy visuals, Microsoft have also added early support for Strict Mode. This an appropriately-named version of JavaScript that restricts what developers can do, and highlights potential problems immediately; annoying if you’re used to sloppy code, but something that will help to improve site security in the future.

If any of this sounds interesting to you, then download your copy of Internet Explorer 10 Platform Preview 1 and go explore the new features. You will need to be running Windows 7, unfortunately (there’s no XP or Vista support here), however the good news is that it’ll run alongside IE8 and IE9, rather than replacing them. Although if you still have IE8, beware of running it and the Platform Preview at the same time: the Release Notes say IE8 may crash as a result (closing the Platform Preview will restore normal operations).

Take control of the latest Windows security technologies with Microsoft’s EMET

Windows has a Data Execution Prevention (DEP) interface, for instance, but it’s not exactly easy to spot. And Structured Exception Handler Overwrite Protection (SEHOP) or Address Space Layout Randomisation (ASLR) are handy at protecting key data structures from attack, but they’re normally only available if you know exactly where to look in the Registry.

Fortunately there is a simpler approach, though, in the shape of Microsoft’s clumsily-named Enhanced Mitigation Experience Toolkit (EMET). Launch the program and it’ll immediately display your current DEP, SEHOP and ASLR status; you can reconfigure any of these settings it just a few clicks; and the EMET adds a host of brand-new “pseudo-mitigations” which will help to protect you from a range of common attacks.

At a minimum, then, you should set DEP, SEHOP and ASLR to “Application Opt In”, if they’re not configured that way already (just click Configure System and choose the Recommend Settings profile).

But if you click the “Configure Apps” button, then you can also take advantage of some additional EMET technologies for specific applications. So, for instance, enabling Export Address Table Access Filtering blocks a technique often used by malware to find the location of Windows functions. And Heap Spray Allocation pre-allocates commonly abused memory addresses to prevent simple heap spraying attacks. (See this Windows blog post for more.)

You do need to be careful when you’re tweaking your security settings with the EMET. Some applications don’t play well with such low-level trickery, and you could find they become unstable, crash, or maybe bring your whole PC down with them. So if you change any individual setting, be sure you take the time to test your PC and confirm everything’s still working just fine before you get back to any serious work.

Still, if you’re interested in maximising your system’s security then the EMET is definitely worth a look. Especially as it’s now an officially supported Microsoft tool, with its own forum: if you have any difficulties then pay them a visit and ask for more advice.

Office Tab Free Edition 7.0.0 (32-bit)

If you’re the kind of person who finds themselves switching between multiple Word, Excel or PowerPoint documents, you’ll probably find the fact Office insists on opening every single document in its own window quite tiresome. Windows 7’s new Taskbar is a definite improvement on previous versions, but it’s still a fiddly process having to roll the mouse over a program icon, wait for the preview windows to appear and then locate the right one before clicking it.

It’s a problem that plagues most office applications – only Lotus Symphony has found a workable solution, opening all documents in their own tabs within a single program window.

Thankfully there’s a free add-on that can do something similar in Office, and this is it. Office Tabs, as the name suggests, basically adds a tab bar below the menu bar (Office 2003) or ribbon (Office 2007-2010) – once installed, all documents are opened within the same window, accessible through tabs, making it much easier to switch between them.

On its own this feature is enough to recommend Office Tabs, but it doesn’t stop there. The tabs themselves are customisable to the nth degree: choose where to place them (top, bottom, left or right), change their shape and appearance, enable drag-and-drop reordering, add keyboard shortcuts… You name it, it’s here.

There are some other useful features too, such as being able to create a new document simply by double-clicking the empty portion of the tab bar. Right-click a tab and you’ll see lots more potentially useful options too, but be warned: many of them are marked with an asterisk, and that’s because their functionality isn’t available in this Free Edition.
If you’d like to be able to rename a file simply by right-clicking its tab, or add the option to save and close all open documents with a single click, you’ll need to upgrade to the Professional edition for the princely sum of $25. You’ll also find there’s an Enterprise Edition available too for $10 more – this extends Office Tab’s functionality to Microsoft Project and Visio too.

CyberLink PowerDVD 11 Ultra

CyberLink's PowerDVD has long been many people's DVD and Blu-ray player of choice. But that's no longer enough for CyberLink, which boasts that PowerDVD 11 "is the world's leading universal media player for the PC", so powerful that it can "play any media format, from any source." Universal media player? Any media format? Big claims, then, but has CyberLink delivered? We took PowerDVD 11 for a spin in an effort to find out.

The interface hasn't changed too much, with simple tabs allowing you to play particular content types. And the core DVD and Blu-ray functionality is also similar to PowerDVD 10, though there are a few useful additions dotted throughout the package. The program doesn't only play DVDs, Blu-ray and Blu-ray 3D discs, for instance: it can now also handle recorded 3D TV.

Enhanced audio features include new support for HDMI 1.4, which should take much of the hassle out of getting multi-channel, high definition sound. There's also lossless pass-through for Dolby TrueHD and DTS-HD Master Audio, and 5.1 DTS support is now available even in the standard PowerDVD edition.

Cinema Mode (an alternative view optimized for remote control use, which integrates with Windows Media Center) has been enhanced with a 3D interface. Nothing too adventurous -- it's still essentially just buttons and text menus -- but it looks good and is fun to use.

TrueTheater 3D has seen a major upgrade since the last version, which means it does a much better job of converting your DVDs, video files and photos (though not 2D Blu-ray discs) to 3D. The results can still be poor sometimes, depending on your source material, but it's still a fun technology that can bring new life to your old movies.

Windows 8 versions

That's a question many customers may ask, if a report from Bloomberg proves to be right: There will be at least five Windows 8 editions -- four for ARM processors. Bloomberg quotes Intel's Renee James, from a presentation given earlier today. It's not exactly Intel's place to be revealing Microsoft Windows versioning plans, which is reason enough to question the claims. But, hey, the duopoly is called Wintel for a reason.
Microsoft has already announced that the next Windows version will support ARM processors. So it's unsurprising that Windows 8 might fork down separate ARM and x86 paths. For the purpose of this story, I'm calling it Windows 8. But Microsoft hasn't announced or seriously hinted at the nomenclature. You can take the name or leave it.

"The version designed for Intel chips will run older Windows programs," according to the story by Ian King and Dina Bass. "The ARM versions won't run older programs, [James] said. They will be tailored to mobile devices and tablet computers and there will also be a version for Intel chips to address that market."

Multiple versions is risky from a marketing perspective. Microsoft has been down this branding path before, moving from two XP editions to six for Windows Vista. Do you remember the confusing branding? They were: Home Basic, Home Premium, Ultimate, Business and Enterprise. Windows 7 drops the editions to four five: Starter, Home Premium, Professional, Ultimate and Enterprise (It's so confusing I left out Pro and added it after commenters complained). That's still at least two versions too many from a branding perspective. It's confusing to customers having so many choices for PCs that are essentially the same. (It's worse in Europe where trustbusters require Microsoft to carry additional "N" editions).

Microsoft's version/edition strategy attempts to create more differentiation, which the market struggles to do when there is a monopoly product. Microsoft seeks to generate more excitement around Windows and more differentiation among the kinds of computers sold to consumers or businesses. But that really hasn't happened after two Windows versions with multiple editions, because the feature differences are arbitrarily chosen by Microsoft rather than dynamically by the market.

Differentiation typically drives competition, hence the number of toothpaste varieties. But Windows isn't toothpaste, because one product essentially owns the x86-based PC market. You can't sell Windows the same way as toothpaste, by trying to artificially create differentiation where it doesn't organically exist.

That said, there is a case for Microsoft choosing a multi-edition strategy for Windows 8 -- as long as it's not carried too far. Three reasons stand out:

1. Microsoft will support another chip architecture. That changes everything. Windows will be available on more than PCs and in categories where the market already has created differentiation based on form factors. It makes more sense for separately branded Windows editions for these devices, than for today's PCs. Microsoft will need to educate buyers about Windows' benefits on more devices. That said, such approach still risks creating brand confusion and even conflict -- the device manufacturer's brand versus Microsoft's. A single "Windows Powered" brand would be easier to market.

2. Today, personal computing is as much about devices as PCs. Smartphones and tablets (despite Microsoft's earlier efforts) were nascent categories when Windows Vista launched for businesses in late 2006. Now smartphones and tablets are seemingly everywhere and gaining market share fast. Analyst estimates put smartphone sales around 100 million units this year, globally.

3. There is real competition in the device categories where Windows 8 will operate. The iPad has a huge early lead in the media tablet category -- 80 percent-plus share, by most analyst estimates -- with Android looking to take a bite out of Apple's share. Android smartphone sales surged 888.8 percent in 2010, according to Gartner; last week Google said there are now 400,000 Android activations a day. If there's a place for tech toothpaste-like differentiated Windows editions, ARM is it.

But Microsoft should still be careful not to overdo its Windows 8 editions strategy, from a branding perspective. Windows 8 Home Tablet Edition for ARM Processors and Windows 8 Home Edition for Intel Processors -- coupled with Ultimate or Business Editions -- is a way-wrong approach. Simple nomenclature and fewer named editions would be more sensible.

As for the accuracy of the Bloomberg report, I don't doubt what James said. I do question whether Microsoft has decided its branding and marketing plans -- unless Windows 8 is shipping sometime in the next couple of quarters.

Mac Defender malware is for real

That sure took long enough. After reports surfaced last week about Apple's denial, the company has come clean in a support document. Mac Defender is real malware targeting Mac OS X, and Apple will issue an update to plug the hole. Yes, but will it be little more than a finger in the dike?

The answer to that question has already generated fierce debate among Mac defenders -- not the malware, but Apple fans -- and PC stalwarts about whether Mac Defender is start of a troubling trend: Increased number of attacks against Mac OS X. The Mac defenders brush off Mac Defender, arguing there is no OS security problem but one of social engineering. It's a bogus argument, considering social engineering also is the main mechanism by which malware infects PCs. According to research released last week by Microsoft, 1 in 14 programs that are downloaded are later determined to be malware, and in most cases, the malicious software was installed by good old-fashioned social engineering.

battle of mobile apps, it's Apple's 500,000 to Microsoft's 18,000

Today, Andy Lees, president of Microsoft's Windows Phone division, boasted about 18,000 applications in 7 months. He can only wish for this kind of future: 500,000 applications approved to Apple's iOS app store in about three years. This isn't even a fair fight. The elephant in the room could squash the mouse just too easily.

But there is hope for Microsoft. Apple crossed the 10,000 apps threshold four months after App Store launched. The number of Windows Phone apps is about the same as iOS apps during similar timeframe from store launch. So maybe there's more to Lees' boasting, if Microsoft is using Apple's success as measure of one possible Windows Phone future.

Angry Birds is the best-selling all-time paid-for app, followed by The Moron Test and the Moto Chaser. Gulp, iFart Mobile is No. 12. Sixty-three percent of all apps are paid, with average price per app of $3.64.

The value of all apps currently live is $891,982.24. There are 244,720 paid apps and 174,966 free ones. It's a fun inforgraphic -- and, who knows, maybe Lees will be able to boast this kind of Windows Phone success in three years.

We can run Android apps in Windows, says newly-funded BlueStacks

After working for nearly three years on a solution for delivering Android applications on systems with x86-based processors, Silicon Valley company BlueStacks today has officially "opened for business" with $7.5 million of series A funding.

BlueStacks started simply enough. After playing with her father's Android phone, the child of one of BlueStacks' founding engineers asked if she could get those apps on her MSI netbook. And in short, that's what BlueStacks has done with virtualization and shared drivers. Android apps can run either as apps or as icons on the Windows desktop, or the whole system can switch from Windows to the Android OS. It is an ideal solution for convertible notebooks. In notebook mode, you can run Windows, and in tablet mode, you can run Android.

"From the naive user's point of view, these are all just apps," said BlueStacks President and CEO Rosen Sharma. "They don't care if it's webOS or Windows or Android or that it's virtualization. In the end, it's just an app."

The BlueStacks solution has impressed testers already, but more importantly, it has impressed manufacturers.

"We began talking to OEMs, and the reaction was violently positive," said Sharma, "I have no other way to describe it. We are an unknown entity, but every company we met with was tremendously interested, saying 'okay, we want it next week…why do we have to wait three weeks?'"

"At this point, I'm just looking at Apu [Shumar, SVP of Sales] and Apu is looking at me, and we're like 'what the hell is going on here?'" laughed Sharma. "I've been doing business for seventeen years, and it usually takes a year of meetings to get that kind of interest."

Hibernate 3.0, latest Open Source persistence technology at the heart of J2EE EJB 3.0

Hibernate 3.0, latest Open Source persistence technology at the heart of J2EE EJB 3.0


Introduction to Hibernate 3.0
Posted on: March 13, 2008 at 12:00 AM
Hibernate 3.0, the latest Open Source persistence technology at the heart of J2EE EJB 3.0 is available for download from Hibernet.org.The Hibernate 3.0 core is 68,549 lines of Java code together with 27,948 lines of unit tests, all freely available under
Introduction to Hibernate 3.0


What is Hibernate?
Hibernate 3.0, the latest Open Source persistence technology at the heart of J2EE EJB 3.0 is available for download from Hibernet.org.The Hibernate 3.0 core is 68,549 lines of Java code together with 27,948 lines of unit tests, all freely available under the LGPL, and has been in development for well over a year. Hibernate maps the Java classes to the database tables. It also provides the data query and retrieval facilities that significantly reduces the development time. Hibernate is not the best solutions for data centric applications that only uses the stored-procedures to implement the business logic in database. It is most useful with object-oriented domain modes and business logic in the Java-based middle-tier. Hibernate allows transparent persistence that enables the applications to switch any database. Hibernate can be used in Java Swing applications, Java Servlet-based applications, or J2EE applications using EJB session beans.

Remote Desktop for Administration on Windews 2008

You can use Terminal Services Configuration on a computer even if the Terminal Server role service is not installed on the computer. If the Terminal Server role service is not installed, Terminal Services Configuration will display that the computer is configured for Remote Desktop for Administration.

The following are limitations of Remote Desktop for Administration:

  • The default connection (RDP-Tcp) only allows a maximum of two simultaneous remote connections.

  • Licensing settings cannot be configured.

  • TS Session Broker settings cannot be configured.

  • User logon mode cannot be configured.

Windows Server 2008 Backup

The Windows Server Backup feature in Windows Server 2008 consists of a Microsoft Management Console (MMC) snap-in and command-line tools that provide a complete solution for your day-to-day backup and recovery needs. You can use four wizards to guide you through running backups and recoveries. You can use Windows Server Backup to back up a full server (all volumes), selected volumes, or the system state. You can recover volumes, folders, files, certain applications, and the system state. And, in case of disasters like hard disk failures, you can perform a system recovery, which will restore your complete system onto the new hard disk, by using a full server backup and the Windows Recovery Environment.

You can use Windows Server Backup to create and manage backups for the local computer or a remote computer. And, you can schedule backups to run automatically.

Windows Server Backup is intended for use by everyone who needs a basic backup solution—from small business owners to IT professionals in large enterprises. However, the design makes it especially well-suited for smaller organizations or individuals who are not IT professionals.

Considerations

You must be a member of the Administrators group or Backup Operators group to use Windows Server Backup.

In Windows Server 2008, the firewall has been enabled by default. If you are managing the backups of another computer using the Windows Server Backup snap-in, your connectivity to the remote computer may be affected and can be resolved by changes in the firewall rules. While working on the local computer, you are not affected.

Also, if you are a current user of the previous backup feature (Ntbackup.exe) that shipped in earlier versions of Windows, and plan to switch to the new Windows Server Backup, you might be affected by the following issues and changes:

  • Settings for creating backups will not be upgraded when you upgrade to Windows Server 2008. You will need to reconfigure settings.

  • You will need a separate, dedicated disk for running scheduled backups.

  • Only NTFS-formatted volumes on a locally-attached disk can be backed up.

  • You can no longer back up to tape. (However, support of tape storage drivers is still included in Windows Server 2008). Windows Server Backup supports backing up to external and internal disks, DVDs, and shared folders.

  • You cannot recover backups that you created with Ntbackup.exe by using Windows Server Backup. However, a version of Ntbackup.exe is available as a download to Windows Server 2008 for users who want to recover data from backups created using Ntbackup.exe. The downloadable version of Ntbackup.exe is only for recovering backups for older versions of Windows and cannot be used to create new backups in Windows Server 2008. To download Ntbackup.exe, see http://go.microsoft.com/fwlink/?LinkId=82917.

New functionality

Windows Server Backup includes the following improvements:

  • Faster backup technology. Windows Server Backup uses Volume Shadow Copy Service (VSS) and block-level backup technology to back up and recover your operating system, files and folders, and volumes. After the first full backup is created, you can configure Windows Server Backup to automatically run incremental backups by saving only the data that has changed since the last backup. Even if you choose to always perform full backups, your backup will take less time than it did in earlier versions of Windows.

  • Simplified restoration. You can restore items by choosing a backup and then selecting specific items from that backup to restore. You can recover specific files from a folder or all the contents of a folder. In addition, previously, you needed to manually restore from multiple backups if the item was stored on an incremental backup. But this is no longer true—you can now choose the date of the backup version for the item you want to restore.

  • Simplified recovery of your operating system. Windows Server Backup works with new Windows recovery tools to make it easier for you to recover your operating system. You can recover to the same server—or if the hardware fails, you can recover to a separate server with similar hardware that has no operating system.

  • Ability to recover applications. Windows Server Backup uses VSS functionality that is built into applications like Microsoft SQL Server™ to protect application data.

  • Improved scheduling. Windows Server Backup includes a wizard that guides you through the process of creating daily backups. System volumes are automatically included in all scheduled backups so that you are protected against disasters.

  • Offsite removal of backups for disaster protection. You can save backups to multiple disks in a rotation, which enables you to move disks from an offsite location. Add each disk as a scheduled backup location and, if the first disk is moved offsite, Windows Server Backup will automatically save backups to the next disk in the rotation.

  • Remote administration. Windows Server Backup uses an MMC snap-in to give you a familiar and consistent experience for managing your backups. After you install the snap-in, you can access this tool through Server Manager or by adding the snap-in to a new or existing MMC console. Then, you can manage backups on other servers by clicking the Action menu in the snap-in, and then clicking Connect to Another Computer.

  • Automatic disk usage management. After you configure a disk for a scheduled backup, Windows Server Backup automatically manages the disk usage—you do not need to be concerned about running out of disk space after repeated backups. Windows Server Backup will automatically reuse the space of older backups when creating new backups. The management tool displays the backups that are available and the disk usage information. This can help you plan for provisioning additional storage to meet your recovery time objectives.

  • Extensive command-line support. Windows Server Backup includes the Wbadmin command and documentation, which enable you to perform all of the same tasks at the command line that you can perform by using the snap-in. For more information, see the Command Reference (http://go.microsoft.com/fwlink/?LinkId=93131). You can also automate backup activities through scripting.

    In addition, Windows Server 2008 contains a collection of Windows PowerShell commands (cmdlets) for Windows Server Backup that you can use to write scripts to perform backups. For more information, see http://go.microsoft.com/fwlink/?LinkId=93317.

  • Support for optical media drives and removable media. You can manually back up volumes directly to optical media drives, such as DVD drives, and also to removable media. This offers a solution if you want to create backups that can easily be moved offsite on a one-time basis. This version of Windows Server Backup retains support for manual backups to shared folders and hard disks.

Supported operating systems

Windows Server Backup is available in all editions of Windows Server 2008 (both 32-bit and 64-bit versions). However, the Windows Server Backup snap-in is not available for the Server Core installation option of Windows Server 2008. To run backups for computers with a Server Core installation, you need to either use the command line or manage backups remotely from another computer. In addition, Windows PowerShell is not available for the Server Core installation option, so the cmdlets for Windows Server Backup are also not available on this type of installation.

Overview of Terminal Services Manager

You can use Terminal Services Manager to view information about and monitor users, sessions, and processes on terminal servers running Windows Server® 2008 or Windows Server® 2003. You can also perform certain administrative tasks; for example, you can disconnect or log off users from their Terminal Services sessions.

Terminal Services Manager is only available in Server Manager if the Terminal Services role is installed on the computer. In addition, when you use Terminal Services Manager in Server Manager, you can only monitor the terminal server on which you are running Server Manager; you cannot monitor additional terminal servers, and terminal server groups are not available.

To run Terminal Services Manager from the Start menu

Click Start, point to Administrative Tools, point to Terminal Services, and then click Terminal Services Manager.

Click Start, click Run, type tsadmin.msc, and then press ENTER.

To run Terminal Services Manager from Server Manager

Click Start, point to Administrative Tools, and then click Server Manager.

In the left pane, expand Roles.

Expand Terminal Services, and then click Terminal Services Manager.

To run Terminal Services Manager from the Microsoft Management Console

Click Start, click Run, type mmc, and then press ENTER.

On the File menu, click Add/Remove Snap-in.

Under Available snap-ins, click Terminal Services Manager, and then click Add.

In the Select Computer dialog box, select whether you want to connect to the local computer or to another computer. If you select Another Computer, either type in the name of the computer or use Browse to search for the computer.

Click OK.

In the Add or Remove Snap-ins dialog box, click OK.


Terminal Services Manager

You can use Terminal Services Manager to view information about and monitor users, sessions, and processes on terminal servers. You can also perform certain administrative tasks; for example, you can disconnect or log off users from their Terminal Services sessions.