Google

Sunday, October 28, 2007

*****************************************************************************
A SHORT NOTE ABOUT SECURITY:-

Security:-

Many operating systems include some level of security. Security is based on the two ideas that:
The operating system provides access to a number of resources, directly or indirectly, such as files on a local disk, privileged system calls, personal information about users, and the services offered by the programs running on the system;
The operating system is capable of distinguishing between some requesters of these resources who are authorized (allowed) to access the resource, and others who are not authorized (forbidden). While some systems may simply distinguish between "privileged" and "non-privileged", systems commonly have a form of requester identity, such as a user name. Requesters, in turn, divide into two categories:

Internal security:-

an already running program. On some systems, a program once it is running has no limitations, but commonly the program has an identity which it keeps and is used to check all of its requests for resources.

External security:

a new request from outside the computer, such as a login at a connected console or some kind of network connection. To establish identity there may be a process of authentication. Often a username must be quoted, and each username may have a password. Other methods of authentication, such as magnetic cards or biometric data, might be used instead. In some cases, especially connections from the network, resources may be accessed with no authentication at all.
In addition to the allow/disallow model of security, a system with a high level of security will also offer auditing options. These would allow tracking of requests for access to resources (such as, "who has been reading this file?").
Security of operating systems has long been a concern because of highly sensitive data held on computers, both of a commercial and military nature. The United States Government Department of Defense (DoD) created the Trusted Computer System Evaluation Criteria (TCSEC) which is a standard that sets basic requirements for assessing the effectiveness of security. This became of vital importance to operating system makers, because the TCSEC was used to evaluate, classify and select computer systems being considered for the processing, storage and retrieval of sensitive or classified information.



SanDisk has begun shipping its 8GB microSDHC ......!!!!!!!!!!




SanDisk has begun shipping its 8GB microSDHC and M2 flash memory cards. The company hopes that they will find a market among users of memory-card-ready mobile phones. Available now for $140 and $150, respectively.
SanDisk Corporation (NASDAQ: SNDK), formerly SunDisk, is an American multinational corporation which designs and markets flash memory card products. SanDisk was founded in 1988 by Eli Harari and Sanjay Mehrotra, a non-volatile memory technology expert. SanDisk became a publicly traded company on NASDAQ in November 1995. SanDisk produces many different types of flash memory, including various memory cards and a series of USB removable drives. SanDisk markets to both the high and low-end quality flash memory.

For more click link--> [Electronista]

Windows Vista
(Part of the Microsoft Windows family

Thursday, October 25, 2007

Jobs 4 you..!!!!

Walk-In / Apply Online & Upload Resumes - Fresh & Experienced

IT Openings.................BPO Openings.................MBA Openings

Testing Openings........finance Jobs.....................Steel Jobs


Online JOB Tips..................Syntel - Fresh & Exp






windows new OS vienna




how to lock a folder...गूढ़ वन फॉर उ..!!!!

Intel® Core™ Duo Processors:-





The Intel® Core™ Duo processor breaks new ground. Its dual-core technology rewrites the rules of computing, delivering optimized power efficient computing and breakthrough dual-core performance with amazingly low power consumption. Intel Core Duo processor is available in Intel's premium laptop platform, Intel® Centrino® Duo mobile technology+. It can also be found in select Intel® Viiv™ technology-based systems

Features and benefits:-

Outstanding dual-core performance:-


With its two execution cores, the Intel Core Duo processor is optimized for multi-threaded applications and multitasking. You can simultaneously run multiple demanding applications such as graphics-intensive games or serious number-crunching programs - while downloading music or running virus-scanning security programs in the background.

Power efficiency:-

Demand for greater power efficiency in computing is on the rise from desktop to laptop PCs. With an Intel Core Duo processor, you get a balance of great dual-core computing capabilities and power savings. Its enhanced voltage efficiency supports cooler and quieter system designs as compared to traditional desktop and laptop PCs. And thanks to the innovative energy efficient technologies built-in, the Intel® Core™ Duo processor is able to transfer power only to those areas of the processor that need it, thereby enabling laptops to save power and desktops to have thinner, sleeker designs.

A vibrant media experience:-

The Intel Core Duo processor enables your Intel Viiv technology and Intel Centrino Duo mobile technology multimedia experience to be all the more vibrant. Featuring Intel® Digital Media Boost, the Intel® Core™ Duo processor enables accelerating technologies for applications such as CAD tools, 3D and 2D modeling, video editing, digital music, digital photography and gaming. This is one of the key ingredients that help Intel Viiv technology and Intel Centrino Duo mobile technology to give you a truly rich multimedia experience

A vibrant media experience:-

The Intel Core Duo processor enables your Intel Viiv technology and Intel Centrino Duo mobile technology multimedia experience to be all the more vibrant. Featuring Intel® Digital Media Boost, the Intel® Core™ Duo processor enables accelerating technologies for applications such as CAD tools, 3D and 2D modeling, video editing, digital music, digital photography and gaming. This is one of the key ingredients that help Intel Viiv technology and Intel Centrino Duo mobile technology to give you a truly rich multimedia experience.

Smarter, more efficient designs:-

The Intel Core Duo processor features Intel® Smart Cache which helps deliver a smarter and more efficient cache and bus design to enable enhanced dual-core performance, and power savings.
An essential ingredient in Intel® Centrino® Duo mobile technology
The Intel® Core™ Duo processor is Intel's first mobile dual-core processor and a key component of the new Intel Centrino Duo mobile technology platform.

Folder Lock without any S/W:-

Many people have been asking for an alternative way to lock folders without the use of any alternative software। So, here you go

1. Open Notepad and copy the below code 2. Change your password in the code it's shown the place where to type your password. 3. Save file as locker.bat . 4. Now double click on locker .bat 5. I t will create folder with Locker automatically for u. After creation of the Locker folder, place the contents u want to lock inside the Locker Folder and run locker.bat again .

******* ********* ********* ********* ********* ****
cls
@ECHO OFF
title Folder Lockerif EXIST "Control Panel।{21EC2020- 3AEA-1069- A2DD-08002B30309 D}" goto
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto lock
if %cho%==y goto lock
if %cho%==n goto END
if %cho%==N gotoEND
echo Invalid choice
goto CONFIRM
:lock
ren Locker "Control Panel।{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
attrib +h +s "Control Panel।{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
echo Folder locked
goto END
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%== type your password here goto FAIL
attrib -h -s "Control Panel।{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
ren "Control Panel।{21EC2020- 3AEA-1069- A2DD-08002B30309 D}" Locker
echo Folder Unlocked successfully
goto END
:FAIL
echo Invalid password
goto END
:MDLOCKER
md Locker
echo Locker created successfully
goto END
:END

Computer Peripherals

Computer Peripherals

Storage
Removable (Writes/reads portable media)

CD
CD-ROM
CD-RW
CD-R
DVD
DVD-ROM
DVD-RW
DVD-R
Blu-ray Disc
BD-ROM
BD-ROM
BD-RW
BD-R
BD/DVD-RW Combo
USB flash drive
Tape drive
Floppy disk
Punch card

Non-removable
Disk drive
Disk array controller


Input
Main article: Input device
Manual
Keyboard
Pointing devices
Mouse
Trackball
Joystick
Touch screen
Gamepad
Microphone
Brain-computer interface
Image scanner
Computer terminal
Computer speech recognition
Webcam
Digitizing tablet
Barcode reader


Output

(see also output device, display device, graphical output device, computer display)
Main article: output device


Printing
Plotter
Printer
Braille embosser
Sound
Computer speech synthesis
Sound card
Speakers
Visual
Digital Camera
Graphics card
Monitor
Refreshable Braille display
Networking
Modem
Network card
Expansion
docking station
except memory and processor

See also
Peripheral device
Expansion card
Computer hardware

policy setting using gpedit.msc to enable Anonymous access and permission settings!!!

MS has disabled Anonymous access in this version of Windows. Anonymous access was allowed in Windows NT and 2000. You need to set policy setting using gpedit.msc to enable thia access on server or domain controllers:
Go to gpedit.msc > Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options, In right pane edit the following policy setting:
Network access: Let Everyone permissions apply to anonymous users, and then click Properties.
On domain controllers you need to use *Domain Controllers Security Policy* snap-in to enable this access as long as Domain Controller computer account is in "Domain Controllers" OU.
Microsoft has modified share permissions in this version of Windows. The default permissions has been changed to give users only *Read* permission. If users are still unable to access share then modify permissions:
Allow Everyone : Full Control in Share permission.
then change NTFS permissions accordingly or add Everyone Group on Security tab for NTFS permissions.

Enable null session sharesWarning Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require that you reinstall your operating system. Microsoft cannot guarantee that these problems can be solved. Modify the registry at your own risk.
To enable null session access, you must modify the registry on every cluster node: 1. Start Registry Editor (Regedt32.exe). 2. Locate the following key in the registry:HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters\NullSessionSharesNOTE: NullSessionShares is a REG_MULTI_SZ value.
3. On a new line in the NullSessionShares key, type the name of the share that you want to access with a null session (for example, public). 4. If the program uses named pipes and requires null session support, locate the following key in the registry: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters\NullSessionPipes NOTE: NullSessionPipes is a REG_MULTI_SZ value.
On a new line in the NullSessionPipes key, type the name of the pipe that you want to access with a null session. 5. Locate and click the following key in the registry:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA 6. On the Edit menu, click Add Value, and then add the following registry value: Value Name: RestrictAnonymousData Type: REG_DWORDValue: 0 7. Quit Registry Editor. 8. Restart the server.
Klick Run->write compmgmt.msc enter->find Local Users and Groups->klik Users -> find Guest then double clik->select chek box on Account is disabled
Then go to Local securty settings->Securty option ->Account: Guest Account status : Disabled