Wednesday, May 28, 2008

Task Manager disabled problem in windows xp

It is due to some kind of virus/ trojan activity which normally disables the task manager.Now due to this problem when ever the user press alt+ctrl+del to launch windows task manager it gives an error saying “Task Manager is being disabled by your administrator”.
To Enable the Disabled Task Manager on your system
1. Press window key+r to show run prompt
2. Follow the following steps
1. Enter gpedit.msc in the run prompt and click OK
2. In the Group Policy settings window
3. Select User Configuration
4. Select Administrative Templates
5. Select System
6. Select Ctrl+Alt+Delete options
7. Select Remove Task Manager
8. Double-click the Remove Task Manager option’.
9. Set the property of this item as disabled.
Updated on 12th FEB 2008
For Those who use Windows XP Home Edition can use the registry to enable Task Manager
1. open start >> run and type regedit
2. Navigate to the following path:
Hive: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
3. You will find a registry key with name DisableTaskMgr of type: REG_DWORD
4. Double click the key with and set the Value to 0
5. Exit the registry and restart to see the effect.

Tuesday, May 27, 2008

Some Tricks for MS Windows !!!

Just a little bit of easy bugs discoverd.............

Trick #1

An Indian discovered that nobody can create a FOLDER anywhere on the computer which can be named as "CON". This is something pretty cool...and unbelievable... why this happened!


Tricks #2

For those of you using Windows, do the following:
1.) Open an empty notepad file
2.) Type "Bush hid the facts" (without the quotes)
3.) Save it as whatever you want.
4.) Close it, and re-open it.

isn't it just a really weird bug? ??

Trick #3

Microsoft crazy facts
This is something pretty cool and neat...and unbelievable... It was discovered by a Brazilian. Try it out yourself...

Open Microsoft Word and type
=rand (200, 99)
And then press ENTER
then see the magic...............................

Friday, May 23, 2008

How To: Enable Compiz effects on Fedora Core 6 with an nVidia Card

I installed Fedora Core 6 in my system on Last week - ok yeah I know I need to get a better life. But, hey I was just mesmerized by reading the new features in Core 6 - named Zod that I had to try. Well, Zod is NO god!! After 3 reinstallations and reading through millions of articles on What the hell is the problem with Fedora Core 6, I finally managed to get everything up and working!!
Some basic instructions to the newbie planning to install Fedora Core 6.
Solving the i686 architecture with the i586 kernel and kernel-devel problem:
If you are planning to install FC6 on an i686 architecture - make note of this!! Anaconda screws up BIG TIME, and installs the i586 kernel and kernel-devel on ur i686 machine. Normally this is not a problem, however, CPU Frequency controller daemon will not work and it’ll be a pain in various parts of the anatomy if your driver / program requires a kernel-module to be installed along with it. The worst part - your architecture is still maintained as i686!! Just that anaconda installs the i586 kernel!!

  1. 1. Install yumex$ su -
    $ yum -y install yumex
  2. 2. Once the installation is over, get into yumex
  3. [Applications->System Tools-> Yum Extender]
  4. 3. Go to the Install View once it’s done updating everything
  5. 4. Install kernel-xen and kernel-devel-xen packages for the i686 architecture
  6. 5. Once installation is done, reboot into the xen kernel
  7. [which itself is not really worth having owing to tons of problems].
  8. 6. Go to yumex again and remove kernel and kernel-devel packages currently for the i586 architecture
  9. 7. Once it is done, Go to the Install View and add kernel and kernel-devel packages, but now for the i686 architecture
  10. 8. Once it is done, reboot into the non-xen kernel and remove kernel-xen and kernel- devel-xen packages
  11. 9. Boom you are done and you can get to installing the packages for nvidia/ati drivers, ntfs support etc.
I read there is a simpler way - aka the more adventurous way of getting ur kernel to the i686 architecture. It’s provided here!! Me, not being so adventurous, especially on breaking Linux 3 times after installation, I stuck to the safer bet :-D!
Solving the Desktop Effects cannot be enabled problem for nVidia cards
Another crazy thing I noticed - after reading so much about Compiz being installed by default with Fedora Core 6 and GNome 2.16 is that - try as I may - it never got enabled!! Aaarrgghhh!! Well, so I went to the Compiz requirements site - and checked that for it to work with nVidia cards, it required driver 1.0-9625 or higher..

Known Working

ATI: Radeon 7000 through X850 (r100 through r400 generations)
Intel: i830 through i945
nVidia: all cards supported by the driver 1.0-9625 or higher
And the latest stable driver in the Livna repo for Fedora Core 6 is 1.0-8776. Umm - what DO you do?
  1. 1. Enable livna-testing repo.
  2. 2. Go to the update view in Yum Extender
  3. 3. Select kmod-nvidia and the xorg-x11-drv packages which are 1.0-9626. Update your drivers people!! and Boom!! After a reboot - thou shall be able to enable Desktop Effects. Enjoy rotating the cube and all sortsa window wobbly effects.
Note: The Window Wobbly effects could get to you after some time, if you move around your Windows a lot :-D!!
Note to self: Need to post more links and screenshots of the same. Shall get to that in a day or two!

Doodle for Google winner

I told you about a contest where kids in grades Kindergarten to 12 were invited to create a logo for the Google home page. The theme for the contest was "What if...?" and the winning entry was promised the honor of seeing his or her design grace the Google home page on May 22. Well, today is the day and if you visit, you will see Grace Moon's lovely drawing entitled "Up in the Clouds."

Moon is a 6th grader at Canyon Middle School in Castro Valley, California. Her vision of "What if...?" is a beautiful world in the sky. Of her design, she writes: "This new world is clean and fresh, and people are social and enlightened. Every person here is treated as family no matter who they are. The bright sun heats this ideal place with warmth, love, and brightens everyone's day." It's a lovely drawing and an beautiful sentiment.

Grace Moon may have won the top spot, but I am sure the judges had a difficult time choosing from all these wonderful entries. Congratulations to Grace and all the kids who answered the question "What if...?" with their own unique visions.

How to beat spyware and viruses?

Here's my perennial "How to Beat Spyware".
Here's what to do if you suspect an infection on your Windows PC. (Please note these steps apply to both Windows XP and Vista.)

1) Are you sure it's spyware or a virus?

Windows pop-ups and alerts can often seem invasive enough to be viruses, especially with Vista. Try searching the web for the exact text you see on the screen to make sure you aren't dealing with an aggressive Windows message. (Many of these can be turned off, so try whatever instructions you find.) On the other hand, some viruses masquerade as Windows alerts, so tread lightly.
2) Boot in safe mode. If you have a virus, first step is to try booting in safe mode. You can get to safe mode (a simplified version of Windows that disables a lot of extra junk, possibly including some spyware apps) by restarting your PC and tapping F8 during boot. Soon you'll get a menu of options. Select "Safe Mode" (it's at the top of the menu) and wait for the machine to fully boot. The system will look funny (with a black background and larger icons, probably), but don't worry about it. This is only temporary. (Also note that many spyware applications can disable safe mode, so if you find this doesn't work, just boot normally.)
3) Run your antivirus application. This is of course assuming you have an antivirus application. You're in safe mode now, so run a full scan of your PC at maximum security levels (include the option to scan within compressed files, for example). This will probably take an hour or more, so be patient. Fix any problems the virus scan turns up. Then reboot into safe mode again using the procedure in step 2.
4) Run one or two anti-spyware applications. I used to recommend running multiple anti-spyware apps, but virtually all antivirus apps now do a pretty good job at getting rid of spyware too, so you don't need an army of additional applications just for spyware. Also, I now recommend starting with AdAware (which is free) and moving on to Spyware Doctor (free as part of the Google Pack) if you feel you need additional help. (Please note that recent versions of Spyware Doctor and Norton Antivirus have some trouble with each other.) You can try other apps too, but the once-recommended SpyBot Search & Destroy is no longer very effective, sadly. (Neither is Microsoft's own Windows Defender.) Of course, fix anything and everything these apps find.
5) Reboot normally. (Not in safe mode.) Now take stock. Still got spyware? It's time to move along to my more advanced techniques for removing the nasties.
6) Run HijackThis. HijackThis is a free software tool that scans your computer to find malware that other apps might miss. Scroll down to "Official downloads" to download the tool. Next, simply open the ZIP file you downloaded, extract the application, and run the tool (you don't need to install it). Click the "Do a system scan and save a logfile" button. You'll receive a large text file as well as a dialog box which gives you a list of active software processes, which you can then choose to delete. Unfortunately, this list includes both helpful and unhelpful software, so don't just start deleting items. Continue in step 7 to figure out how to fix your spyware infection.
7) Post your log file online. Visit this page, which offers a list of forums staffed by volunteers who can help you interpret your HijackThis log. The SWI Forums are especially busy, but most of the forums on the list are equally apt. Go to SWI and visit the "Malware Removal" forum which has over 50,000 topics listed: Those are all people like you who are seeking help getting rid of spyware. Register for an account, read the FAQ, then visit that Malware Removal forum, and post a new topic. Paste the content of the text file you created in step 5 into this topic and (politely) ask for help. You will get a response from a volunteer helper, typically within 3 days. You'll be given specific advice on what entries to remove with the HijackThis tool, and you might be pointed to additional software to run to help remove common spyware infections. Follow all the instructions and keep working with the forum helpers until either you or they give up. (And no, don't send your log file to me or post it here. I am not nearly the spyware removal expert that these guys are.)
7a) Alternately: Paste your log file into an automated tool. Don't have three days? Try simply pasting your HijackThis log file into this form. It does a pretty good job at auto-analyzing what's wrong with your machine, with no waiting. As well, if that doesn't work, you can search for the items you find in the HijackThis log by name to see what they are and how to remove them, if they're spyware. This can be quite time consuming, though.
8) Try System Restore. If that doesn't work, you might try running Windows System Restore to roll back your OS to a time before the infection happened. This isn't foolproof: You might not have System Restore turned on, or the spyware might have shut System Restore off, as well. But it's worth a shot. With either XP or Vista, System Restore can be found under Start > All Programs > Accessories > System Tools > System Restore.
9) Give up and wipe your hard drive. At this point, you've exhausted all the options I know of. You might try again at steps 6/7 to make sure you've done everything you can to salvage the PC. Forum helpers will often work with you for weeks to help fight a spyware infection, but there are tens of thousands of possible variants out there, with new ones cropping up every day. It's just not possible to clean them all, every time. Sometimes the only thing you can do is call it quits, reformat your hard drive, and reinstall your OS. Again, make sure you have your backups ready and verified. Once you're up and running, reinstall your antivirus and anti-spyware applications, and stay vigilant against infection. Good luck.

Thursday, May 22, 2008

The worst computer viruses of all time

If you haven't experienced a computer virus yet, just wait -- you probably will.
Fortunately, you missed the real heyday of computer viruses when anti-virus software wasn't very widely used, and virus attacks caused millions of dollars in damages overnight. Today's viruses can still be nightmarish, but for the average user, cleanup is considerably easier than it was just a few years ago, when the only solution in many cases was reformatting your hard drive and starting from scratch (and even that didn't do the trick sometimes).
So join me on a trip down memory lane as we revisit some of the worst viruses of all time and count our blessings that our computers are still up and running despite it all. (Though, please note, "worst" is a matter of considerable debate in the security industry, as the number of infected machines and amount of financial loss is always estimated. If you think another virus was worse than these, please post it in the comments to remind me!)
The worst viruses of all time
Brain, 1986
It all started here: Brain was the first "real" virus ever discovered, back in 1986. Brain didn't really hurt your PC, but it launched the malware industry with a bang and gave bad ideas to over 100,000 virus creators for the next 2 decades.
Michelangelo, 1991
The worst MS-DOS virus ever, Michelangelo attacked the boot sector of your hard drive and any floppy drive inserted into the computer, which caused the virus to spread rapidly. After spreading quietly for months, the virus "activated" on March 6, and promptly started destroying data on tens of thousands of computers.
Melissa, 1999
Technically a worm, Melissa (named after a stripper) collapsed entire email systems by causing computers to send mountains of messages to each other. The author of the virus was eventually caught and sentenced to 20 months in prison.
This was notable for being one of the first viruses to trick users into opening a file, which in this case claimed to be a love letter sent to the recipient. In reality, the file was a VBS script that sent mountains of junk mail and deleted thousands of files. The results were terribly devastating- one estimate holds that 10 percent of all computers were affected, to a cost of $5.5 billion. It remains perhaps the worst worm of all time.
Code Red, 2001
An early "blended threat" attack, Code Red targeted Web servers instead of user machines, defacing websites and later launching denial-of-service attacks on a host of IP addresses, including those of the White House.
Nimda, 2001
Built on Code Red's attack system of finding multiple avenues into machines (email, websites, network connections, and others), Nimda infected both Web servers and user machines. It found paths into computers so effectively that, 22 minutes after it was released, it became the Internet's most widespread virus at the time.
Klez, 2001
An email virus, Klez pioneered spoofing the "From" field in email messages it sent, making it impossible to tell if Bill Gates did or did not really send you that information about getting free money.
Slammer, 2003
Another fast spreader, this worm infected about 75,000 systems in just 10 minutes, slowing the Internet to a crawl (much like Code Red) and shutting down thousands of websites.
MyDoom, 2004
Notable as the fastest-spreading email virus of all time, MyDoom infected computers so they would, in turn, send even more junk mail. In a strange twist, MyDoom was also used to attack the website of SCO Group, a very unpopular company that was suing other companies over its code being used in Linux distributions.
Storm, 2007
The worst recent virus, Storm spread via email spam with a fake attachment and ultimately infected up to 10 million computers, causing them to join its zombie botnet.

Wednesday, May 21, 2008

A computer that can recognize attractiveness in women has been built.

The program measures facial symmetry, hair color and skin quality, among other attributes, and compares them to a database of human responses.

It can then make an "aesthetic judgment" about someone's hotness that is almost identical to opinions of real-life people.

This could definitely be useful. (Hooking up with Scarlett Johansson and Marion Cotillard, but only have one seat in the Jaguar? Consult the laptop...Cotillard wins!)

But who says what's attractive and what's not? Miss Surrey 2008 has recently shown us how beauty comes in many forms.

More important, robots are already stronger, more intelligent and more resilient than human males. If they start hitting on our women, too, we won't be able to compete! We need clear boundaries! Didn't humanity learn anything from Blade Runner?

Monday, May 19, 2008

Great Hackers

The 414s
The 414s were a gang of six teenagers named after their Milwaukee, Wisconsin area code, who broke into dozens of computer systems throughout the United States and Canada in 1983.Their exploits included Los Alamos National Laboratory, Sloan-Kettering Cancer Center and Security Pacific Bank.The incident appeared as the cover storyof Newsweek with the title Beware: Hackers at play,possibly the first mass-media use of the term hacker in the context of computersecurity. As a result, the U.S. House of Representatives held hearings on computer security and passed several laws.

Mark Abene
Mark Abene (also known as Phiber Optik) inspired thousands of teenagers around the country to "study" the internal workings of the United States phone system. One of the founders of the Masters of Deception group.

Dark Avenger

Dark Avenger is the pseudonym of a Bulgarian virus writer who invented polymorphic code in 1992 as a means to circumvent the type of pattern recognition used by Anti-virus software, and nowadays also intrusion detection systems.

John Draper

John Draper(also known as Captain Crunch) is widely credited with evangelizing the use of the 2600 hertz tone generated by whistles distributed in Captain Crunch cereal boxes in the 1970s, and sometimes inaccurately credited with discovering their use.Draper served time in prison for his work, and is believed to have introduced Steve Wozniak to phone phreaking through the 2600Hz tone. Draper now develops anti-spam and security software.

Farid Essebar
Farid Essebar (also known as Diabl0) is the creator of Zotob

Nahshon Even-Chaim

Nahshon Even-Chaim (also known as Phoenix) was a leading member of Australianhacking group The Realm. He targeted US defense and nuclear research computer systemsin late 1980s until his capture by Australian Federal Police in 1990. He and fellow Realm members Electron and Nom were the world's first computer intruders prosecuted based on evidence gathered from remote computer intercept.

Markus Hess

Markus Hess is a West German who hacked into United States Military sites and collected information for the KGB,he was eventually tracked down by Clifford Stoll.

Jonathan James
(convicted cybercriminal)
Jonathan James(also known as c0mrade) downloaded $1.7 million dollars worth of softwarewhich controlled the International Space Station's life sustaining elements, and intercepted thousands of electronic messages relating to U.S. nuclear activities from the Department of Defense. Sentenced at age 16, he was the youngest person ever incarcerated for cybercrime in the United States.

ne0h was reported to have been employed by a Pakistani terrorist with Al-Qaeda connections, in order to steal student information from a Chinese university(reportedly, one comparable to MIT[citation needed]), India's BhabhaAtomic Research Centre, and SIPRNet, the U.S. Department of Defense's Defense Data Network.

Adrian Lamo

Lamo surrendered to federal authorities in 2003 after a brief manhunt, and was charged with nontechnical but surprisingly successful intrusions into computer systems at Microsoft, The New York Times, Lexis-Nexis, MCI WorldCom, SBC, Yahoo!, and others. His methods were controversial, and his full-disclosure-by-media practices led some to assert that he was publicity-motivated.

Vladimir Levin

Vladimir Levin allegedly masterminded the Russian hacker gang that tricked Citibank's computers into spitting out $10 million. To this day, the method used, or even if Vladimirwas a mathematician, is unknown.

Kevin Mitnick

Kevin Mitnick was held in jail for four and a half years and released on January 21,2000. He was convicted of computer related crimes and possession of several forged identification documents. Once "the most wanted man in cyberspace", Mitnick went on to be a prolific public speaker, author, and media personality.

Robert Tappan Morris

Robert T. Morris, while a graduate student at Cornell University in 1988, created the first worm, Morris Worm, which used buffer overflows to propagate. He is the son of Robert Morris, the former chief scientist at the National Computer Security Center, a division of the National Security Agency (NSA). Morris was not exactly a hacker of the computer security hacker culture, but a user of the MIT-AI, the home machine of the early academic hacker culture. According to Steven Levy, he was a true hacker who blundered.

Jason Burks born October 2 1976, also referred to as "v00d00" is a former computer hacker, and malicious software writer. He is best known for writing the Juggernaut Hydra, and releasing it into the Progressive Insurance mainframe.

Craig Neidorf

In 1990, Neidorf (a co-founder of Phrack) was prosecuted for stealing the E911 documentfrom BellSouth and publicly distributing it online. BellSouth claimed that the document was worth $80,000; they dropped the charges after it was revealed that copies of the document could simply be ordered for a minuscule $13.

Brian Salcedo

Brian Salcedo was convicted in 2004 of conspiracy to commit wire and computer fraud for hacking the Lowe's home improvement chain's unsecured wireless LAN in an attempt to capture credit card numbers used during transactions. The FBI claimed that the crime could have caused more than $2.5 million in damages. He was sentenced to 9 years in federal prison. The government claims that at the time of its imposition, Brian Salcedo'ssentence was the longest federal prison sentence ever given for a computer related offense.

David L. Smith

In 1999, Smith launched the Melissa Worm, causing $80 million dollars worth of damageto businesses. Originally sentenced to 40 years, he eventually served only 20 monthswhen he agreed to work undercover for the FBI.

Wednesday, May 14, 2008

How you can speed up your Firefox?

Here is how you can speed up your Firefox to work faster....

1. Type “about:config” into the address bar and hit return. Scroll
down and look for the following entries:


Normally the browser will make one request to a web page at a time.
When you enable pipelining it will make several at once, which really
speeds up page loading.

2. Alter the entries as follows:

Set “network.http.pipelining” to “true”

Set “network.http.proxy.pipelining” to “true”

Set “network.http.pipelining.maxrequests” to some number like 30. This
means it will make 30 requests at once.

3. Lastly right-click anywhere and select New-> Integer.
Name it “nglayout.initialpaint.delay” and set its value to “0″.
This value is the amount of time the browser waits before it acts on information it recieves.

Here you go now pages will load 2-30 times faster .

Monday, May 5, 2008

Review: Mario Kart Wii Skids Way Off the Road

Oh, Mario Kart.
What have they done to you?

The Mario Kart series, in which Nintendo's famous mascot characters jump into go-karts and race each other on wacky tracks, has been one of my favorite series ever since the 16-bit days. Since Nintendo has only ever released one Mario Kart game for each of its consoles, the launch of each new version is always a big event, and hasn't ever been disappointing.

Until now. Mario Kart Wii looks great at first blush, adding motion controls and online multiplayer to the non-stop frantic racing action of the classic games. I can understand that the gameplay has been dumbed down a bit for the Wii audience, but in the process, they arbitrarily yanked out the series' best feature.

I am referring, here, to "Battle Mode." For my friends and I, the Mario Kart series has never been about racing around a track. Ever since the series' first installment, 1992's Super Mario Kart, the games have featured a fantastic gameplay mode that drops players into an open arena, then challenges them to defeat each other in mortal kart combat.

You drive around and pick up the goofy attack items for which the series is well-known: Green turtle shells that smash into opponents, mushrooms that give you speed bursts, lightning bolts that miniaturize the other players. And you attack other players, all the while attempting to drive away from and avoid their attempts on your life.

It is some of the best multiplayer gaming fun I have ever had, and it's been a staple of every entry in the Mario Kart series for the sixteen years that followed. Mario Kart Wii does in fact have a Battle Mode, but it's not what you remember. Tearing the game open, my friends and I quickly found that they'd utterly gimped it.

It's no longer a last-man-standing contest: Matches now last three minutes each, and if your kart takes too much damage, don't worry! You'll just respawn. Even worse, all battles are now played in teams of two. So while you can still have four human players, they can't all face off against each other -- and what's the point of that?

How could they do this? I can imagine why: Since the Battle Mode, like the kart races, can be played online, changing the rules in this way makes for a better online experience. If players drop out, it doesn't kill the whole match. And new players can be added in easily to existing matches. I get it. But there's absolutely no reason for them to cripple the offline rule set, too.

This is a game-killing issue for me, as it's just taken the potential fun that I will have with Mario Kart Wii from "months" to "hours." It's really too bad, as this is in all other respects a decent addition to the series. Mario Kart Wii ditches the two-riders-per-kart mechanic that didn't quite work in Double Dash on GameCube and adds more vehicles. Now, there are tons of different karts and, in a new twist, motorbikes that players can ride, adding a decent amount of depth to the proceedings.

Mario Kart Wii includes the Wii Wheel controller (right), a plastic shell that you insert the Wiimote into. Unlike last year's Wii Zapper gun controller, which was pretty much a useless piece of junk, the Wii Wheel does help your accuracy by stabilizing your hands and letting you turn the Wiimote just as if it were a steering wheel.

The Wii Wheel is a good idea insofar as the accessible design will help you wrangle your grandma into a race every now and then. But if you're a hard-core gamer, you don't want to use this thing.

The standard Wiimote/Nunchuk combo is the best Mario Kart Wii controller. You can use a GameCube pad, but it's a lot harder to pull off tricks. When you go off a jump and catch some air, you can waggle the controller to do a flashy aerial maneuver that will give you a speed boost when you land. If you're using a GameCube controller, you have to reach down and hit the D-pad to do a trick, which is as uncomfortable as it sounds.

As ever, Mario Kart racing is as much about navigating the crazy tracks (of which the Wii version has an astonishing 32) as it is about collecting the items that lay about the track and using them on your opponents to screw up their driving. Also as ever, if you are a skilled racer and sail into first place, you'll never get any good items -- just some measly shells and banana peels. Drivers who end up in the back will get all kinds of crazy stuff, allowing them to plow through other players and catch up to the pack.

This is another area in which Mario Kart Wii could have benefited from some customization options. You can turn items off entirely, or make it less likely that the unbalanced, powerful ones will appear. But you can't just go in and individually turn off the stupidest items. Why on Earth not? It would be a trivial thing to add, and like the Battle Mode disaster, would have made a huge difference to the gameplay.

The aforementioned online mode does work well, even though Nintendo still refuses to let people chat with their friends during a match, and still requires the input of sixteen-digit Friend Codes before you can add anyone to your friends list. But the gameplay is lag-free, and all kinds of races and battles are available to you.

With all these improvements, it's just too damn bad they had to have the best part of the Mario Kart series taken out back and shot.