---- Like this Blog? Use CTRL-D to Bookmark it! ----

Saturday, November 11, 2006

Ten Reasons to Buy Windows Vista

-PCWorld.com
Michael Desmond


Unless you've been living under a rock for the past few months, you probably know that the latest version of Windows--called Vista--is due to hit store shelves later this year (in time for the holidays, Microsoft tells us). The successor to Windows XP offers a little something for everyone, from eye-catching graphics and new bundled applications to more-rigorous security. In fact, there is so much in the new operating system that it can be tough to get a handle on it all.


I've been noodling around with a recent beta version of Windows Vista (Build 5270) and had a chance to make some observations. While the sleek new look and polished interface caught my eye, it's what's under the covers that impressed me most. Microsoft's done a great job of improving security across the board. Things like Windows and spyware library updates are streamlined, and I definitely appreciate the more robust Backup software.

So during my time with Windows Vista, I kept an eye out for the reasons I--and you--might ultimately want to lay my hands on the new OS when it's available. And frankly, if you buy a new Windows-based PC at the end of this year or any time in, say, the next five years, you'll probably end up with Vista by default.


Keep in mind, this is based solely on my experience with prerelease software (and a whole new beta could be out by the time you read this). Features get tweaked, they come and go, but from what we can tell, Vista is now starting to harden into the product that will be running many, many desktops for the foreseeable future. And by and large, that's a good thing.

Here's what to be excited about:

1. Security, security, security: Windows XP Service Pack 2 patched a lot of holes, but Vista takes security to the next level. There are literally too many changes to list here, from the bidirectional software firewall that monitors inbound and outbound traffic to Windows Services Hardening, which prevents obscure background processes from being hijacked and changing your system. There's also full-disk encryption, which prevents thieves from accessing your data, even if they steal the PC out from under your nose.

Perhaps most crucial (and least sexy) is the long-overdue User Account Protection, which invokes administrator privileges as needed, such as during driver updates or software installations. UAP makes it much more convenient for users to operate Vista with limited rights (meaning the system won't let them do certain things, like load software, without clearance from an administrator). This in turn limits the ability of malware to hose your system.


2. Internet Explorer 7: IE gets a much-needed, Firefox-inspired makeover, complete with tabbed pages and better privacy management. There's also the color-coded Address Bar that lets you know if a page is secured by a digital key, or, thanks to new antiphishing features, if it's a phony Web site just looking to steal information about you.

These features will all be available for Windows XP users who download IE7. But Vista users get an important extra level of protection: IE7 on Vista will run in what Microsoft calls "protected mode"--a limited-rights mode that prevents third-party code from reaching your system. It's about darn time.

3. Righteous eye candy: For the first time, Microsoft is building high-end graphics effects into Windows. The touted Aero Glass interface features visually engaging 3D rendering, animation, and transparencies. Translucent icons, program windows, and other elements not only look cool, they add depth and context to the interface. For example, hover your cursor over minimized programs that rest on the taskbar and you'll be able to see real-time previews of what's running in each window without opening them full-screen. Now you can see what's going on behind the scenes, albeit at a cost: You need powerful graphics hardware and a robust system to manage all the effects.

4. Desktop search: Microsoft has been getting its lunch handed to it by Google and Yahoo on the desktop, but Vista could change all that. The new OS tightly integrates instant desktop search, doing away with the glacially slow and inadequate search function in XP. Powerful indexing and user-assignable metadata make searching for all kinds of data--including files, e-mails, and Web content--a lot easier. And if you're running Vista on a Windows Longhorn network, you can perform searches across the network to other PCs.


5. Better updates: Vista does away with using Internet Explorer to access Windows Update, instead utilizing a new application to handle the chore of keeping your system patched and up-to-date. The result is quicker response and a more tightly streamlined process. The update-tracking mechanism, for instance, is much quicker to display information about your installation. And now key components, such as the Windows Defender antispyware module, get their updates through this central point. Like other housekeeping features, a better Windows Update isn't a gee-whiz upgrade, but it should make it easier--and more pleasant--to keep your PC secure.

6. More media: Over the years, one of the key reasons to upgrade versions of Windows has been the free stuff Gates and Company toss into the new OS, and Vista is no exception. Windows Media Player (perhaps my least favorite application of all time) gets a welcome update that turns the once-bloated player into an effective MP3 library. The Windows Photo Gallery finally adds competent photo-library-management functionality to Windows, so you can organize photos; apply metatags, titles, and ratings; and do things like light editing and printing. The DVD Maker application, which was still very rough when I looked at it, promises to add moviemaking capabilities--along the lines of Movie Maker--to the operating system. There are even some nice new games tucked into the bundle.

7. Parental controls: Families, schools, and libraries will appreciate the tuned-up parental controls, which let you limit access in a variety of ways. Web filtering can block specific sites, screen out objectionable content by selected type, and lock out file downloads. You can also restrict each account's access by time of day or day of the week. As a dad, I can tell you this will be great for keeping kids off the PC while you're at work, for instance. You can even block access to games based on their Entertainment Software Rating Board ratings.

8. Better backups: When Windows 95 first came out, the typical hard disk was, maybe, 300MB in size. Today, desktops routinely ship with 300GB or 400GB hard drives. And yet, the built-in data-backup software in Windows has changed little in the past decade. Windows Vista boasts a much-improved backup program that should help users avoid wholesale digital meltdowns. Microsoft also tweaked the useful System Restore feature--which takes snapshots of your system state so you can recover from a nasty infection or botched software installation.

9. Peer-to-peer collaboration: The Windows Collaboration module uses peer-to-peer technology to let Vista users work together in a shared workspace. You can form ad hoc workgroups and then jointly work on documents, present applications, and pass messages. You can even post "handouts" for others to review.

10. Quick setup: Beta code alert: There are some Vista features I hope dearly for even though they haven't been built yet. This is one of them. Jim Allchin, Microsoft's co-president, says that Windows Vista boasts a re-engineered install routine, which will slash setup times from about an hour to as little as 15 minutes. Hurray! The new code wasn't in the beta version of Vista that Microsoft sent to me--my aging rig took well over an hour to set up--so I'll believe it when I see it. Still, any improvement in this area is welcome.

Five Things That Will Give You Pause
All this is not to say that Vista is a slam-dunk and everyone should be running out to buy it as soon as Microsoft takes the wraps off. Heck, Windows XP has developed into a fairly stable, increasingly secure OS. Why mess with that?

Yes, during my time with Vista, I've found more than enough features to get excited about--features that will make a sizable chunk of Windows users want to upgrade. So why would anyone in their right mind stick with what they've got? Here are a few reasons:

Pay that piper: Vista is an operating system. It's the stuff your applications run on. But it'll cost $100 or more to make the switch. Unless you're buying a new PC and starting from scratch, you may be better off saving the money for something else.

Where's my antivirus?: For all the hype about security in Windows Vista, users may be disappointed to learn that antivirus software will not be part of the package. There's every indication that an online subscription service--possibly under the OneCare rubric--will offer antivirus protection to Vista users down the road. But for the time being, you'll need to turn to third-party companies like Symantec, McAfee, Grisoft, and others for virus protection.

Watch that hourglass: Vista is a power hog. Unless you have a top-end PC with high-end graphics hardware, for instance, you won't see one of the coolest parts of the new OS--the Aero Glass interface. Microsoft did the smart thing by offering Aero Basic and Windows Classic looks as well, which will let older and slower PCs run Vista. It just won't look as pretty.

Curse the learning curve: Microsoft has already ditched some aggressive ideas--such as the whole "virtual folders" thing--because the concepts proved too confusing for users. Even so, you'll find that the new Windows changes a lot of old tricks, and not always for the better. Heck, it took me almost five minutes to find the Run command, which used to show up right in the Start menu. And many users may struggle with the new power scheme, which defaults to putting the PC into hibernation rather than shutting down. I know it frustrated me the first time I wanted to power down the system to swap out a disk drive.

Meet the old boss, same as the new boss: Microsoft has added lots of new stuff to Vista, but some features are just warmed-over fare. Windows Mail is nothing more than a rebranded Outlook Express, and Windows Defender is simply an updated version of Microsoft AntiSpyware.

So keep your eyes peeled for future previews of Vista. It may not be perfect (what software is?), but in a lot of ways, it's a giant leap forward.

Michael Desmond writes about technology from his home in Colchester, Vermont.

Browsers challenge: GreenBrowser Joins

Feature:

- Surf by tabs
- Speed up
- Many options with tabs
- Block pop-up using smart filter & keyword filter
- Delete Private Data quickly
- Recovery state
- Integrate many search engines
- ...

After Opera, IE7, FireFox 2.0, a new member take part in the challenge.
Well, if you like enjoying a fresh breath, download and use it!

Detail & Download

Got a prize 500$ from Yahoo

If you got a mail like below:


You won $500! Yahoo!® Mail congratulates you!

CONGRATULATIONS!

YOU WON $500!

Yahoo! Mail gives members random cash prizes. Today, your account has been selected as the one of 12 top winners accounts who will get cash prizes from us. Please click the link below and follow instructions on our web site. Your money will be paid directly to your e-gold, PayPal, StormPay or MoneyBookers account.

Click here to get your prize:

http://rds.yahoo.com/member

Sincerely,
The Yahoo.com staff


This is SCAM completely!
Don't click any link in it because you will lose all your private important info.

Softwares for your Mobile and PDA

Need good stuffs for your tiny friend?
This site will satisfy your life:

Enter HERE

Take your domain for FREE

Website www.freedomain.co.nr allows you to register a domain like www.yourname.co.nr

No Pop-up, No ads banner.

Have fun! ^^

Opera 9.10 Build 8649


The most full-featured Internet power tool on the market,
Opera includes pop-up blocking, tabbed browsing, integrated searches, and advanced functions like Opera's groundbreaking E-mail program, RSS Newsfeeds and IRC chat.

And because we know that our users have different needs, you can customize the look and content of your Opera browser with a few clicks of the mouse.

LINK DOWNLOAD

Friday, November 10, 2006

Blind mice see again after retina cell transplants

By Patricia Reaney
Reuters


Nov 8, 2006 — LONDON (Reuters) - British and American scientists have restored vision in blind mice by transplanting light-sensitive cells into their eyes in a breakthrough that could lead to new treatments of human eye diseases.

The mice suffered from eye damage called photoreceptor loss which occurs in macular degeneration, the leading cause of sight loss in the elderly, and other eye disorders.

But instead of using stem cells, which could form into any cell type, the scientists transplanted cells that had reached a later stage of development toward becoming photoreceptor cells.

"We have shown for the first time that it is possible to transplant photoreceptors," said Dr Robert MacLaren, a scientist and eye surgeon at Moorfields Eye Hospital in London.

"These cells are lost in some of the more common causes of blindness" he added in an interview.

The scientists believe further research could lead to the first human retinal cell transplants for people with blinding diseases within a decade.

Photoreceptors are specialized light sensitive cells that line the back of the eye and are essential for sight. In eye diseases such as macular degeneration the cells are destroyed.

Previous studies that had used stem cells, master cells in the body that have the potential to become any type of cell in the body, had failed because the cells did not form into photoreceptors.

PROOF OF PRINCIPLE

Researchers had thought that the mature retina, the part of the eye that senses light and forms images, did not have the capacity for repair.

Full Detail

Update: Microsoft Vista Goes Gold

Microsoft has released its Windows Vista operating system to manufacturing, the company has announced.

Mark Hachman - PC Magazine

Nov. 8 Microsoft has released its Windows Vista operating system to manufacturing, the company said Wednesday.

Jim Allchin, Microsoft's Windows chief, hosted a conference call with reporters at 11 AM PDT to announce the release.

"This is a good day," Allchin said. "Less than hour ago, we officially signed off on Windows Vista. It's rock-solid and ready to ship."

Read PC Magazine's walkthrough of Windows Vista Ultimate.

Windows Vista, already several years in the making, will be released in two phases: business editions will be released on Nov. 30, while consumers will have to wait for their versions until January 30. The release to manufacturing means that volume licensees will have access to the software at the end of the month, and that the baton will be passed to hardware manufacturers, to ensure that their own driver software will be written for the new operating system.

Full Detail

Run Commands in Windows



More:
DOWNLOAD

FREE GMAIL ACCOUNT for YOU

You wanna receive invitation from Gmail to create one?

Comment this post and I will send to you an invitation from my Gmail account!
(I have ~100 invite left)

Remember to leave your email so that I can send to you ^^

News: Yahoo! Domains

Key Features


24-Hour Toll-Free Customer Service
Get answers anytime you need them from extensive online help sources and our 24-hour toll-free customer support.

Domain Management

Private Domain Registration

Starter Web Page
Publish basic information on a placeholder web page — until you're ready to upgrade to a full web site.
View a sample

Domain Locking

Domain Forwarding

Complete Domain (DNS) Control

Email Forwarding

Room to Grow

Full Detail

One half

Half of my soul
has departed.

The other half stands
staring bewilderedly
at grey drops of rain
in the sky.

My thoughts are like deep oceans,
wondering when they will be filled up,
or be emptied.

I raise my hand to stop
tears
from falling down

Falling inwards, let them be
outwards, please don’t!


Vô Vi

Sydney, July 2006

F.A.T.H.E.R

Fantastic dreams how wonderful you give!

Amazingly you have done well for me.

Talented father, you guide our family,

Huge shady tree you’re, I’m so happy.

Everlasting love, I was given too.

Really follow you, I promise to do.


Đỗ-Vũ Kim-Thi, created when she was 11 years old.

LOVE CONSTANT BEYOND DEATH

The final shadow that will close my eyes
will in its darkness take me from white day,
and instantly untie the soul from lies
and flattery of death, and find its way,

and yet my soul won't leave its memory
of love there on the shore where it has burned:
my flame can swim cold water
and has learned to lose respect for laws' severity.
My soul, whom a God made his prison of,
my veins, which a liquid humor fed to fire,
my marrows, which have gloriously flamed,
will leave their body, never their desire;
they will be ash but ash in feeling framed;
they will be dust but will be dust in love.


F. De Quevedo

Colored? : Nominated the best poem of 2005

When I born, I black. When I grow up, I black.

When I go in sun, I black. When I scared, I black.

When I sick, I black, & when I die, I still black.

And you white people. When u born, u pink.

When u grow up, u white. When u go in sun, u red.

When u cold, u blue. When u scared, u yellow.

When u sick, u green, & when u die, u gray...

And u calling me colored???

(This poem, written by an African child, was nominated the best poem of 2005)

Hiren's BootCD 8.6

Version: 8.6 File Size: 66763 kb
All in one Dos Bootable CD which has all these utilities.

ChangeLogs :
Ad-Aware SE Personal 1.06 (0811)
Award DMI Configuration Utility 2.43
CCleaner 1.34.407
F-Prot Antivirus 3.16f (0811)
McAfee Antivirus 4.40 (0811)
Navratil Software System Information 0.59.14
PCI 32 Sniffer 1.1 (0811)
PCI and AGP info Tool (0811)
Photorec 6.6b
Silent Runners 49
Spybot - Search & Destroy 1.4 (0811)
SpywareBlaster 3.5.1 (0811)
SATA Support Super Fdisk 1.0
TestDisk 6.6b
Universal TCPIP Network Bootdisk 5.9.2
Unknown Devices 1.2 (0811)

LINK DOWNLOAD
Mirror
UnRAR Password: www.9down.com

Diet Coke + Mentos! Suprise ...

Watch it: http://www.youtube.com/watch?v=hKoB0MHVBvM

Thursday, November 09, 2006

Google in difficult position over Kama Sutra mishap

By Robert McMillan, IDG News Service

Google accidentally sent out an email worm to about 50,000 members of its Google Video Blog, the company has admitted.


"On Tuesday evening, three posts were made to the Google Video Blog-group that should not have been posted," Google said in a statement. "Some of these posts may have contained a virus called W32/Kapser.A@mm - a mass mailing worm. If you think you havedownloaded this virus from the group or an email message, we recommend you run your anti-virus program to remove it."

W32/Kasper.A@mm is better known as the Kama Sutra worm. Discovered in January of this year, it deletes files and registry keys on affected systems. It is blocked by most anti-virus software.

Google uses its Video Blog group to let subscribers know when "interesting and fun" videos have been highlighted on the Google Video Blog. Email to the group's mailing list are posted by a handful of Google employees. This team was responsible for sending out the malicious email Tuesday night, said a Google spokesman.

Stricker did not have any more details but said that internal protocols are now in place to prevent this from happening again.

Google has seen a growing number of technical glitches lately, something observers are attributing to the company's breakneck growth over the past few years. One month ago, hackers found a way to publish a fake post on Google's official blog. The company also experienced service disruptions with its Blogger service recently that have left some users fuming.

Ten of the Biggest Blunders Ever in U.S. Economic Policy

-businessweek

A lot of well intentioned economic decisions have gone awry. Want proof? Consider some of the worst decisions in U.S. economic history

One wrongheaded decision contributed to the outbreak of the Civil War. Another deepened the Great Depression. In other words, these aren't your everyday slipups. BusinessWeek Economics Editor Peter Coy rummaged through the history books to assemble the worst decisions in U.S. economic policy. And while economic historians aren't unanimous, especially about recent events, many would put these in the Economics Hall of Shame.

See More in:
http://images.businessweek.com/ss/06/11/1109_economy/index_01.htm

Kiran's Typing Tutor



Kiran's Typing Tutor is packaged and written for Microsoft Windows operating system, which lets you to learn Touch Typing and improve typing skills and speed in a very easy way with in the shortest possible time

Benefits:

Increased Efficiency
It is more efficient because the typist uses all fingers instead of just a few fingers. As a result, typing speed will increase dramatically. Increased Effectiveness

It is more effective because the typist looks at the output on the screen, not the keyboard.

Less Mental Fatigue
It is less demanding on the brain because the brain does not need to cope with two issues, that of locating the keys and focusing on the output

Less Physical Fatigue
It is also less tiring because it distributes the total load over all fingers. Touch typing, because of its natural and flowing finger movements, results in less stress.

Less Wear and Tear
It reduces wear and tear on the few fingers that are constantly being used. The load is spread over many more fingers and thus the risk of Cumulative Trauma Disorder is reduced.

Detail: http://www.kiranreddys.com/products/typing.html

Don't wait for Vista. Start using Desktop Sidebar of it today!

New WinXP sidebar

Desktop Sidebar provides you with instant access to the information you most desire by grabbing data from your PC and the internet. The result is a dynamic visual display you configure and control.

LINK DOWNLOAD

XP Codec Pack

XP Codec Pack is one of the most complete codec pack which helps you to play all major audio and video formats. And... to complete your multimedia experience, instead of 3 or 4 different players you get one, simple integrated player that plays almost all audio and video files: Media Player Classic.

LINK DOWNLOAD

Maxthon 2.0.1 Build 460

(Formerly MyIE2) is a powerful web browser with a highly customizable interface. It can open multiple web pages within one browser window, and uses little system resources.

Maxthon has a greatly integrated & customizable interface which supports:
- Skins (Default, Turbo Qute, Mozilla_2, Safari, TCPort, X_Phoenity)
- Plug-Ins (AI Roboform, FlashSave, ViewSource, EnableRightClick, Up a Directory, Weather), IE Extensions, & specific toolbars (example: GOOGLE Toolbar).

It also incorporates 2 POPUP blockers (Auto POPUP blocker & a POPUP blocker list filter) and a Content Filter. Maxthon is based on the Internet Explorer engine (your most likely current web browser) which means that what works in IE, works the same in Maxthon but with many additional efficient features like:
- Tabbed Browsing Interface
- Mouse Gestures
- Super Drag&Drop
- Privacy Protection
- AD Hunter
- Google Bar Support
- External Utility Bar
- Skinning
- Plugins
- Compatibility & Low on Resources
- More...(There are even more features that Maxthon can provide you, such as, Page Zooming, Simple Collector, Web Services, Password protecting Tabs, URL Aliases and many others. All of them working efficiently while you surf the Internet with Maxthon)

"COMBO" version includes:
- Plugin: FlashSave, ViewSource, EnableRightClick, TextHighlighter, Up a Directory, Weather.
- Skin: Default, AquaFusion, Mozilla_2, Safari, TCPort, X_Phoenity.

LINK DOWNLOAD

ATI Tray Tools

A small utility that can be found in the windows tray which then allows instant access to options and settings. ATI Tray Tools is a Full Featured Radeon Tweaker that can be found in the windows tray which then allows instant access to options and settings. Quite handy and quite a small download. Just click the executable and you are good to go.

Software highlights:
- Support for ATI Control Center
- Support for TV Out and displays with profiles
- Options to change Theater mode together with TV Out
- Overclocking with templates including FAN Control
- Automatic Overclocking when application required 3D mode
- Temperature monitoring
- Artifact Tester with ability to find maximum stable clocks for GPU and Memory.
- Game profiles with desktop shortcut creation.
- Direct3D settings with templates, GUI form and tray popup menu
- OpenGL settings with templates, GUI form and tray popup menu
- Hardware low level color correction
- ...

Visit Homepage for detail -http://www.radeon2.ru/atitray/

Size: 944 KB

Download:
_http://mr-71159.v-mirror.spb.ru/atitray/attsetup.exe

Mozilla Thunderbird 1.0.5



Mozilla Thunderbird 1.0.5 is now available for download. This latest release is a minor update to the standalone mail and news program that fixes some security issues and improves stability. It is recommended for all 1.0.x users as an essential upgrade and can be downloaded from the Thunderbird product page or the 1.0.5 directory on ftp.mozilla.org.

The Thunderbird 1.0.5 Release Notes have more information, with the security fixes detailed in the Thunderbird 1.0.5 section of the known vulnerabilities page. Unofficial development weblog The Rumbling Edge has some further details about Thunderbird 1.0.5.

Despite being version 1.0.5, this is actually only the second post-1.0 update to Thunderbird, with the other one being 1.0.2. The Mozilla Foundation decided to skip some version numbers (specifically, 1.0.1, 1.0.3 and 1.0.4) to keep the Thunderbird numbering in line with Mozilla Firefox


LINK DOWNLOAD

Foxit PDF Reader 2.0

New Features

Foxit Reader 2.0 introduces many exciting new features listed below:
- Interactive form filler: Now you don't have to print out PDF forms first and then manually fill out paper forms. Instead, you can use PC to fill out interactive forms directly, and then print them out, save them, email them or export the form data into FDF file for further processing.
- Multi-language UI that can be dynamically switched: The user interface of Foxit Reader now can be switched to different languages dynamically, thanks to the generous help from our user community.
- On-demand download of add-on: With add-ons, the function of Foxit Reader can be extended unlimitedly. New function modules and seldom used modules are packed as add-on. Users only download them when needed. Foxit Reader highly respects the security and privacy of users and will never connect to Internet without users' permission. While Acrobat Reader often silently connect to the Internet in the background.
- Self-upgrade: In the past, when you want to upgrade Foxit Reader, you have to frequently visit Foxit website, check for new release, and then manually download the new version, uninstall the old version and re-install the new version. Now this whole process is simplified and you only need to click on the menu item "Check for update now".
- Javascript support: Advanced users are able to use Javascript to create complex logic for PDF forms, to validate user input and process data.
- Improved printing speed: Printing a PDF file with many images in it to a PostScript printer used to be slow. Version 2.0 has been optimized for such printing.
- Streamlined UI: Version 2.0 comes with a neat UI. Annotation tool buttons are grouped together, instead of being showed on several toolbars.

Free Reader

Foxit Reader 2.0 itself is free. For add-ons, the critical add-ons are free while advanced add-ons are non-free. For example, you can use the following functions for free:
- View or print PDF document
- Fill out PDF forms and save them
- Convert PDF document into text file
- Critical add-ons, such as UI language package, JPEG2000/JBIG decoder, CJK package, GDI+ for early Windows version, etc

The followings are several examples of non-free, advance add-ons:
- You can try out annotation tool for free. However when you save the annotated document, it will be stamped with an evaluation mark on the top-right corner of the annotated pages. If you purchase a Pro Pack add-on, then there will be no evaluation mark.
- Foxit Converter which allows you to convert non-PDF file into PDF file is non-free.
- Foxit Editor which allows you to modify contents of a PDF file is non-free.


LINK DOWNLOAD

Windows Vista On Its Way To Manufacturing

Microsoft confirms consumer release will be January 30.
Elizabeth Montalbano, IDG News Service

After several delays, the long-awaited update to the Windows client OS, Windows Vista, is expected to be on its way to manufacturers Wednesday.

"This is a good day," said Jim Allchin, co-president of Microsoft's Platform & Services Division, on a call to announce Vista's release to manufacturing (RTM). "Vista is rock solid and we're ready to ship."

Allchin also confirmed that Vista will be available to consumers on Jan. 30, which many suspected was the case after online retailer Amazon.com posted that date in August in pre-order listings for the OS.

The IDG News Service reported several weeks ago that the Vista's release to manufacturers (RTM) had been pushed from Oct. 25 to Nov. 8 because a last-minute bug in one of the last builds of Vista had to be repaired.

Full Detail

Tuesday, November 07, 2006

Theme: Black & Blue



LINK DOWNLOAD



LINK DOWNLOAD

Asian Beauty 2 Cute!!!

Guess! What's this!

Art of Fruit: Watermelon





Asian Beauty 1



So Beautiful!

How to secure remote desktop connections using TLS/SSL based authentication

Author: Martin Kiaer

We would like to welcome Martin Kiaer to our team of authors as he presents his first article to WindowSecurity.com readers. This article shows how to enable computer based authentication using TLS/SSL, when establishing a remote desktop connection to a server running Windows Server 2003.

Whether you enable Microsoft Windows Terminal Services for end-users or enable remote desktop connectivity on a Windows Server 2003 for administrative purposes, security issues may arise depending on how you have configured your server. However, with the introduction of Service Pack 1 for Windows Server 2003, you now have the opportunity to establish a secure Remote Desktop Protocol (RDP) connection to your server using TLS/SSL based authentication.

Common threats
Let us start by looking at some common threats.


If your password policy in your domain is configured to lock user accounts after a predefined number of logon tries, then your Terminal Services (RDP) enabled server becomes an entry point for a user based DoS (Denial of Service) attack against your domain. One could easily connect to the terminal server and attempt to log on with various usernames and passwords. Depending on the password policies, the username that has been tried may get locked, thus preventing the real user to log on.

In addition, if weak passwords are used, hacking tools such as TScrack 2.0 can be used to establish a dictionary based attack against servers that have the Windows Terminal Services enabled. This tool by the way, will also perform the before mentioned DoS attack.

The threat becomes even bigger, when the server running Microsoft Windows Terminal Services is accessible from the Internet through an RDP connection on port 3389, even though you have an advanced firewall such as ISA Server in front of it. A scenario that is common especially for Microsoft Small Business Server users.

The good news however, is that you can prevent these attacks. The solution is certificate based computer authentication. If the computer cannot authenticate itself by presenting a valid certificate to the terminal server it is trying to connect to, then the RDP connection will be dropped before the user has a chance to attempt to log on.

How to enable TLS/SSL based authentication
Before we get started, there are some prerequisites you should be aware of.

On the server side the following is required:

Ensure your terminal server is running Windows Server 2003 including SP1

You also need a TLS/SSL based certificate that should be installed with the following specifications:
The certificate should be computer based
The certificate's purpose should be server authentication
The certificate’s private key should be available
Since it is a computer based certificate, it should be stored in the computer account certificate store on the terminal server
On the client side the following is required:

The client computer must be running Microsoft Windows 2000, Windows XP, Windows Server 2003 or Windows Vista


For Windows 2000, XP and Windows Server 2003, the remote desktop client version 5.2 or newer should be used. This client can be found in the following folder on a Windows Server 2003 SP1 based server:

%systemroot%\system32\clients\tsclient\win32\msrdpcli.msi
The last important requirement is that the client has to trust the root Certification Authority (CA) that has issued the computer based certificate residing on the terminal server. This will ensure that a TLS/SSL connection can be established.
Now that you know what is needed, it is time to learn how to make it all happen.

See more:
Full Detail

Monday, November 06, 2006

Is Halloween the New Christmas?

-abcnews
Oct. 31, 2006 — Halloween is no longer just about costumes and candy.

It's now the second-biggest decorating holiday of the year — right behind Christmas.

For Tony Bianchi, that means October is by far the busiest month of the year.

The co-owner of Halloween Adventure, a chain of Halloween superstores, hired an additional 65 workers at his flagship store in downtown New York City to handle the increase in Halloween sales.

Why the growing popularity? Bianchi says for one, it's all about you.

"Mother's Day, you're giving gifts. Christmas, you're giving gifts. Here, you're giving gifts to yourself," he said.

His shoppers seem to agree.


One told ABC's David Muir, "I'm pretty intense when it comes to Halloween. … It's just my favorite holiday."

Bianchi's been in the Halloween business for 20 years, operating three permanent stores.

Every year, he also opens satellite stores — this year, 100 of them.


Ghoulish Trend Goes National

Major retailers are putting out their Halloween-related merchandise earlier than ever.

Wal-Mart rolled out its Halloween section, "Spooky Central," located in its garden centers, in mid-August.

Over Labor Day weekend, Target introduced its "Harvest Hollow," "Maple Manor" and "Creepy Cottage" collections, among others.

Even home-improvement retailers are getting in on the act, with Home Depot adding Halloween decorations to its stores for the first time this year.

The boom in Halloween business is a trend analysts are seeing across the country.

"Halloween spending is expected to grow to 5 billion this year. … That's up from about 3.3 billion last year," said Scott Krugman, spokesman for the National Retail Federation.

The average Halloween consumer will spend roughly $60 this year, as compared to $48 last year.


Full Detatil

150 StyleXP Themes




Download link:
http://member.shareallsoft.com/soft/System/150.StyleXP.Themes.part1(2).part1.rar
http://member.shareallsoft.com/soft/System/150.StyleXP.Themes.part1(2).part2.rar
or
http://depositfiles.com/files/228642/150.StyleXP.Themes.part1%282%29.pa.html
http://depositfiles.com/files/228719/150.StyleXP.Themes.part1%282%29.pa.html

Cute! Linux Theme for Windows




LINK DOWNLOAD

Change Your XP Look To XBOX 360



LINK DOWNLOAD

Wallpaper: KAGAYA Collection - Celestial Exploring




KAGAYA Collection 01 - Celestial Exploring
VERY HIGH QUALITY JPG | 57 pics | ~ 1600x1300 | ~ 80MB
A MUST HAVE COLLECTION

LINK DOWNLOAD

Wallpaper: Cars & Girls



LINK DOWNLOAD

Wallpaper: Dark Angel



LINK DOWNLOAD

CEO's 10 Rules for getting to the TOP

By D.A.Benton

1. Be Yourself, Unless You’re a Jerk

2. See Around Corners

3. Make Dust or Eat Dust

4. Make the Big Play

5. Keep Good Company

6. Be the Number One Fund Raiser and Protector

7. Act Like a CEO Even When You Don’t Feel Like It

8. Evangelize the World

9. Go Big or Go Home

10. Cut Through the Junk

Sunday, November 05, 2006

Prostate cancer

How many men die for it?

An estimated 28,900 American men will die from prostate cancer in 2003. After lung cancer, it is the second most common cause of cancer mortality in U.S. men, accounting for 11 percent of cancer deaths. About 90 percent of men with prostate cancer survive at least five years after diagnosis, and two-thirds live 10 years or more. Early detection and treatment boost survival.


What causes it?

Prostate cancer occurs when malignant cells form and spread through the prostate gland. The malignant cells develop when changes occur in DNA, the genetic material containing the "instructions" for all types of cells. When DNA is altered, normal cells can grow abnormally and form cancer. Exactly how DNA is altered in prostate cancer remains unclear. However, a number of factors have been implicated in prostate cancer development, including advancing age, African-American race, a family history of the disease and a high-fat diet.

Can it be prevented?

The uncertainty about the causes and controllable risk factors for prostate cancer complicates prevention. The best evidence available relates to dietary habits. Following a balanced diet that is low in fat and emphasizes fruits, vegetables and grain products may help reduce cancer risk.

Full Detail

Can ERP Meet Your eBusiness Needs?

Overview: ERP grew from its predecessors of MRP and MRP II, constantly expanding its solution footprint to address more and more of the needs of the enterprise. Yet ERP was not conceived to look beyond the "Four walls" of the enterprise, regardless of how expansive those walls became, simply because the concepts of MRP and ERP were born in a time when companies were run as independent enterprises with arm's length relationships with customers and suppliers.

Full Detail

How Technology Impacts the Cost of Business Process Outsourcing (BPO)

Overview: What is the impact of technology on the cost of a business process outsourcing (BPO) relationship, and why should you care? Those questions are addressed in this SAP white paper, which examines the specific ways that technology drives BPO costs and how you can better manage those costs. The paper explains why it's vital that you monitor all technology decisions not only from the standpoint of your in-house costs but also according to the effect they will have on the total cost of your BPO engagements.


Full Detail

Deploy Windows Firewall for Microsoft Windows XP SP2



Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2

Windows XP Service Pack 2 provides Windows Firewall, an enhanced firewall that is enabled by default. This white paper describes the methods used to deploy Windows Firewall settings in a managed environment

Overview
Windows XP Service Pack 2 (SP2) includes the Windows Firewall, a replacement for the Internet Connection Firewall (ICF) in previous versions of Windows XP. Windows Firewall is a stateful host-based firewall that discards unsolicited incoming traffic, providing a level of protection for computers against malicious users or programs. To provide better protection for computers connected to any kind of network (such as the Internet, a home network, or an organization network), Windows XP SP2 enables Windows Firewall on all network connections by default. This new behavior can impair some types of communications. This article describes how to deploy the appropriate configuration settings for Windows Firewall on an organization network so that it is enabled and providing protection, and so that communications are not impaired.

Full Detail


Using the Windows Firewall INF File in Microsoft Windows XP Service Pack 2

The Windows Firewall INF file allows you to customize the settings of the Windows Firewall either during or after installation.

Overview
Microsoft Windows XP Service Pack 2 (SP2) includes the Windows Firewall, a replacement for the Internet Connection Firewall component in previous versions of Windows XP. Windows Firewall is a stateful host firewall that discards unsolicited incoming traffic, providing a level of protection for computers against malicious users or programs. To provide better protection for computers connected to any kind of network (such as the Internet, a home network, or an organization network), Windows XP SP2 enables Windows Firewall on all network connections by default. Network administrators can use the Windows Firewall INF file (Netfw.inf) to modify default settings either before installation or after installation. This article describes the usage of the Windows Firewall INF file.

Full detail

Understanding User Account Control in Vista

Author: Derek Melber


In this article I will explain what User Account Control (UAC) is and what it is not.

If you have not looked at Microsoft Vista yet, there is still a great chance that you have heard something about User Account Control (UAC) at some point. UAC is being tagged as one of the most important features that Vista is providing to help ensure a more secure environment for both home users and corporations. UAC is designed to help with the issue where typical users are required to be “administrators” on their local computer to run applications, perform routine operating system tasks, etc. If you have users that run as “administrators” on their own computer solely to perform routine tasks, but you don’t like that configuration, UAC might be for you. Here, I will explain what UAC is and what it is not.

Full Detail

Needed: A National Cyber Security Law

By Paul Kurtz
Paul Kurtz, head of the Cyber Security Industry Alliance, says it's time for Congress to pass a law aimed at preventing security breaches

In less than two years, more than 93 million Americans have had their personal information lost, stolen, or otherwise compromised. That means more than 93 million people now have to figure out what degree of risk they face and how best to protect themselves from future incidents. Not a mild concern, considering that the average identity theft victim spends $834 and 77 hours just clearing his name.

These security breaches, affecting everything from medical records to Social Security numbers to bank accounts, are eroding public confidence in the security of private personal information. This growing trust-deficit is a serious threat to economic growth. Nearly every company's assumptions about growth rely on the continued acceptance of our digital networks, whether they operate online or not.

It is time for Congress to act. If the economic consequences of this waning consumer confidence aren't enough to spur action, then perhaps the preferences of voters will be. According to a recent Cyber Security Industry Alliance-sponsored survey, 70% of likely voters agree that Congress should pass a strong data-security law. And nearly half (46%) of likely voters who think Congress should pass such a law report that they would have serious doubts about a candidate who opposes swift action.

STATES OF CONFUSION. Congress must respond with a comprehensive national law that aims to both prevent further data breaches and to address leaks once they occur. To accomplish these goals, lawmakers should establish reasonable security measures, create a consistent and recognizable notification standard, encourage best practices such as encryption, and include effective enforcement capabilities.

While some argue that this should be addressed at a state level, pointing to the 33 states that have already passed data-security bills of their own, the truth is that these good intentions will likely result in an unnecessarily complex and cumbersome web of regulations for businesses and consumers alike, while doing little to actually prevent further security leaks.

Only a tiny handful of the regulations actually help prevent data breaches. The vast majority of these laws only address the problem after personal data has been compromised, mandating consumer notification when a breach occurs. Congress has the power to design a national law that addresses both notification and prevention. At the end of the day, wouldn't we all rather avoid having our privacy compromised in the first place?

GET IT TOGETHER. More than one bipartisan bill under consideration would provide a realistic and effective legal framework that organizations of all sizes could comply with—if party leaders, committee chairmen, and other members can set aside their differences and focus on protecting Americans' private, personal information.

The specific distinctions between the bills' provisions are important, but not enough to justify derailing the process altogether. Even the most finely crafted legislation is meaningless if it never makes it to the floor for a vote. And this one is long overdue.

Paul Kurtz is executive director of the Cyber Security Industry Alliance. He previously served as special assistant to President George W. Bush and senior director for critical infrastructure protection on the White House's Homeland Security Council, where he was responsible for both physical and cyber security.

Moniker Launches MarketPlace Pro Domain Transaction Platform

Washington, Disco legends the 'Bee Gees' have finally won their battle with a cybersquatter over the control of web domain 'beegee.com'.

Domainsource.com, the squatter, had reportedly bought the web address, and was trying to sell it back to two surviving members of the band, Robin and Berry Gibb, for 2,340 dollars.

According to Contactmusic, the Gibb brothers had offered to purchase the web address for 1,440 dollars, but domainsource.com rejected their offer.

"Sorry, not interested in selling price," domainsource wrote in an email to them.

But now trademark lawyers have ruled that the domain should be returned to 'Bee Gees' free of cost, as it was being used by Domainsource.com in bad faith.

Moniker Launches MarketPlace Pro Domain Transaction Platform

More Than Three Million Domain Names Already Available for Sale

Moniker.com, the first and only provider of Domain Asset Management(TM), today announced the availability of MarketPlace Pro, a full-service online domain transaction platform. MarketPlace Pro is the most comprehensive tool currently available for researching, finding, buying and selling domain names. More than three million domain names are available for sale now at marketplacepro.moniker.com.

"With the introduction of Marketplace Pro, Moniker offers the only 360- degree perspective that incorporates registration, buying, selling, live auctions, and monetization all in one online platform," said Monte Cahn, co- founder and chief executive officer of Moniker. "Marketplace Pro lets domainers and marketers, whether holding small or large portfolios, actively, find, buy, sell, and manage their online assets quickly, easily and safely."

Unmatched Search Functionality
Marketplace Pro's domain search interface covers both new registrations and aftermarket listings. The system returns all available options and allows the user to choose a domain based on specific needs. Users can search and sort results by price, industry, keyword, revenues and unique users as well as compare up to three domain properties side-by-side to determine the best one for them. No other online domain transaction platform offers this full range of services. Moniker Marketplace Pro makes listing domains and managing multiple negotiations effortless. A simple guide directs sellers through the necessary steps to sell a domain. Sellers can determine the preferred method to sell their domain: Buy Now, direct negotiation or auction.

The platform allows users to purchase a domain directly for the price listed or participate in an auction where the user will compete with other bidders, depending on the choice of the seller. Users will be able to complete their purchase using a variety of payment methods or loan type financing services provided by Moniker.

A Highlight of T.R.A.F.F.I.C.
Marketplace Pro comes online with the start of this year's highly anticipated Live Auction managed by Moniker, held October 27, 2006, during T.R.A.F.F.I.C. East, a domain industry conference being at the Westin Diplomat, Hollywood, Fla. The Live Auction has attracted hundreds of individuals and companies seeking domains that will add to the value of their domain asset portfolios or build, protect or extend their existing Web brands.

To take part in the live bidding, one must be a registered attendee of the T.R.A.F.F.I.C. EAST conference, which runs October 24-28, or you can qualify to be a proxy bidder. For more information on the conference, visit www.targetedtraffic.com

Domain Financing On Site and After
Moniker along with its partner Domain Capital, will offer domain financing to leverage domain purchases made at this event or for other transactions. Moniker and Domain Capital have been pioneering the same concept for virtual real-estate for years in a fashion similar to real estate mortgage financing. Fifty percent of the previous Live Auction's purchases were financed using this financing service. This service is also available to domain purchases made on Marketplace Pro.

About Moniker
Moniker is the first and only provider of Domain Asset Management(TM), a complete set of business services that provide companies a single-point-of- access to help manage and maximize the value of their domains. These services include name creation, registration, acquisition, portfolio management, appraisal and escrow services, traffic monetization and after-market sales -- all backed by unsurpassed customer service and security.

With more than a decade of experience, Moniker is a top 10 domain registrar, holds the industry's highest customer retention rate and pioneered the industry's first domain appraisal formula. It is considered the industry's premier marketplace to buy and sell domain names.

Customers include savvy investors, Web entrepreneurs and forward-thinking global companies, including Marchex, Nokia, AOL, Yahoo, the National Hockey League, Major League Baseball, Lions Gate Films, Bank of America, Microsoft, Jupitermedia, Geosigns, Mainstream Advertising and many others.

Moniker, with headquarters in Pompano Beach, Florida, is an operating unit of Seevast Corporation, a company of marketing services firms that drive sales, build brands and leverage core assets for their clients.

Source: Moniker

Windows Vista RC2: Near-final OS more refined, but it's not perfect

Microsoft continues to tweak its upcoming operating system

October 08, 2006 (Computerworld) -- Last Friday, Microsoft Corp. pushed Windows Vista Release Candidate 2 (RC2), Build 5744, out the door. There's no laundry list of new features and functions associated with this build of Vista, but there is something significant about it.

You can sum it up in one word: refinement.

The areas of installation, performance and bugginess associated with Media Center and the new Sleep power management mode have all been improved. Vista continues to be exceptionally stable. There's no question that this new Windows is more reliable than XP.





Windows Vista RC2's desktop (Larger view)


Setup certainty
I installed RC2 on three test machines, one Windows XP Pro upgrade and two clean installs. One upgrade installation screen notes that your "upgrade could take several hours" to complete. Mine didn't, although it did run a little over an hour and a quarter. The two dual-boot clean installations were swifter than with Release Candidate 1 and showed some minor visual changes.

The results of RC2's setup process were a tad cleaner. My three test machines were manufactured in different years -- 2003, 2005 and 2006. The two newer models are laptops that have proprietary software for controlling hardware. Although all three have hardware Vista was unable to provide drivers for, with just a couple of exceptions, the new operating system quickly accepted legacy drivers designed for XP.

Vista's driver pack support for recently released hardware continues to be a weak point. I had expected that with this release the driver pack would be better than it is. For example, Vista RC2 lacks a driver for the Linksys EG1032 Gigabit Peripheral Component Interconnect network interface card. It also wasn't able to locate a driver for SoundMax audio cards on my oldest and newest machines. SoundMax audio is widely distributed, and there's just no excuse for this. It was easy for me to find and feed Vista my reseller-provided XP drivers for these devices, however.

Not so easy to get around is the fact that Vista doesn't contain drivers for Lenovo's UltraNav built-in pointing devices (which have been shipping with ThinkPads for years). Nor was Vista able to run these XP drivers, even when I used some of Vista's compatibility tricks.

For Free: PDF 2 EXE

http://www.pdf2exe.com/
http://www.pdf2exe.com/pdf2exe.exe size 1,56 mb


PDF2EXE is a FREEWARE program to quickly convert PDF to EXE, making PDF readable on any computer without Adobe Reader or Adobe Acrobat software installed. The conversion from PDF to EXE preserves the look and feel of the original document.

Compress, encrypt PDF document
Set password for the converted EXE file
Disable conversion from PDF to TXT, EXE to TXT
Disable printing of PDF file
Launch slide show after initialization
Disable conversion from EXE to image formats
Disable document properties
Prevent generated EXE from modification

With PDF2EXE, you can distribute your Adobe PDF files to your customers, share PDF documents with your friends without worrying about whether they can read it or not. PDF2EXE users can have more control over PDF files.

Kungfu cats ^^


Hiren 's BootCD From USB Flash Drive

Step 1
Put the BootCD 7.2 in CD Drive

Step 2

Start Mini Windows 98

Step 3
Copy Files From A:\ (Floppy Drive) using Explorer to C:\USB and Restart Computer to normal Windows

OR
Note: if you can not see your hard drive from mini windows 98 then you will need a blank floppy disk.
click Start > Turn Off > Exit to Dos and type COPY A:\*.* B:\
Now remove floppy and Restart Computer to your normal Windows and insert your floppy disk
and copy all files from floppy disk to C:\USB

Step 4
Download USB Disk Storage Format (34KB)

Note: USB Disk Storage Format works on xp, for windows 98 Go to My computer and
Right click on the USB Drive and click on format. You will need a USB Flash Drive 64MB or more




Step 5
Copy All Files (but not JO.sys) From C:\USB to Your USB Flash Disk

Step 6
Copy \BOOTCD folder to Your USB Disk

Step 7
Test Your USB Disk



-From Pankaj's House

PCW: How-To"s Update

DIET & FITNESS

CANCER

!!! THIS IS KENDO !!!