Sunday, February 27, 2011

How does Worms work ?



People use e-mail more than any other application on the internet, but it can be a frustrating experience, with spam and especially e-mail worms filling our inboxes. Worms can spread rapidly over computer networks, the traffic they create bringing those networks to a crawl. And worms can cause other damage, such as allowing unauthorized access to a computer network, or deleting or copying files.
What’s a worm?
A worm is a computer virus designed to copy itself, usually in large numbers, by using e-mail or other form of software to spread itself over an internal network or through the internet.
How do they spread?

When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip. The attachment could claim to be anything from a Microsoft Word document to a picture of tennis star Anna Kournikova (such a worm spread quickly in February 2001).
If you click on the attachment to open it, you’ll activate the worm, but in some versions of Microsoft Outlook, you don’t even have to click on the attachment to activate it if you have the program preview pane activated. Microsoft has released security patches that correct this problem, but not everyone keeps their computer up to date with the latest patches.
After it’s activated, the worm will go searching for a new list of e-mail addresses to send itself to. It will go through files on your computer, such as your e-mail program’s address book and web pages you’ve recently looked at, to find them.
Once it has its list it will send e-mails to all the addresses it found, including a copy of the worm as an attachment, and the cycle starts again. Some worms will use your e-mail program to spread themselves through e-mail, but many worms include a mail server within their code, so your e-mail program doesn’t even have to be open for the worm to spread.
Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading.
What do they do?
Most of the damage that worms do is the result of the traffic they create when they’re spreading. They clog e-mail servers and can bring other internet applications to a crawl.
But worms will also do other damage to computer systems if they aren’t cleaned up right away. The damage they do, known as the payload, varies from one worm to the next.
The MyDoom worm was typical of recent worms. It opened a back door into the infected computer network that could allow unauthorized access to the system. It was also programmed to launch an attack against a specific website by sending thousands of requests to the site in an attempt to overwhelm it.
The target of the original version of MyDoom attack was the website of SCO Group Inc., a company that threatened to sue users of the Linux operating system, claiming that its authors used portions of SCO’s proprietary code. A second version of MyDoom targeted the website of software giant Microsoft.
The SirCam worm, which spread during the summer of 2001, disguised itself by copying its code into a Microsoft Word or Excel document and using it as the attachment. That meant that potentially private or sensitive documents were being sent over the internet.
How do I get rid of them?
The best way to avoid the effects of worms is to be careful when reading e-mail. If you use Microsoft Outlook, get the most recent security updates from the Microsoft website and turn off the preview pane, just to be safe.
Never open attachments you aren’t expecting to receive, even if they appear to be coming from a friend. Be especially cautious with attachments that end with .bat, .cmd, .exe, .pif, .scr, .vbs or .zip, or that have double endings. (The file attachment that spread the Anna Kournikova worm was AnnaKournikova.jpg.vbs.)
Also, install anti-virus software and keep it up to date with downloads from the software maker’s website. The updates are usually automatic.
Users also need to be wary of e-mails claiming to have cures for e-mail worms and viruses. Many of them are hoaxes that instruct you to delete important system files, and some carry worms and viruses themselves.
As well, some users should consider using a computer with an operating system other than Windows, the target of most e-mail worms. Most of the worms don’t affect computers that run Macintosh or Linux operating systems.

Awesome + Resourceful Web Portals


 
Check out the following Microsoft Web portals that caters to need of almost everyone. The Portal name is followed by a brief description.
1. Website Spark : It’s for small IT enterprises. Microsoft provides them the tools needed for Designing and development for FREE!.
There is no upfront cost for first 3 years. Terms and conditions do apply, but they seem to be obvious For eg : You need to deploy a website before 6 months, renew your subscription after few months, etc. Above all, it is for all budding webmasters!
2. Biz Spark : To me, bizspark.com is extension of websitespark.com. Fundamentally it is for Tech startup’s that need support and visibility. This one is meant for all techno-preneurs!
3. Dream Spark : FREE software’s ( like Visual Studio professional! ) for students. If you need a key you can write to me at paras@parasdoshi.in.
4. Microsoft Student to Business : To bridge the gap between Industry requirements and Student’s knowledge. The website has list of Job and Internship openings of various tech firms. it’s for all those who dream to be corporate czars!.

Wednesday, February 23, 2011

WordPress 3.0 – “Thelonius” Advantages


Todays second post I want to share with my users is advantages of new wordpress it is wordpress 3.0 . So lets check it. WordPress 3.0, the long-awaited major version update to the world’s most popular blogging platform. The software, codenamed “Thelonius” now running your millions of websites.
The last major version, WordPress 2.9 was downloaded more than ten million times, a measure of the software’s popularity.so with the latest version 3.0 wordpress is now ready as the best  Content Management System (CMS) that is available to support personal, business, academic, and corporate Web sites as well as blogs.As this is a major release there are new features including a brand new Default WordPress Theme called TwentyTen, the ability to Customize Post Types and an excellent new Menu Manager.
wordpress3 thumb 300x168 Wordpress 3.0   Thelonius Advantages
First we just look at the features through this video
So let’s have a look at WordPress 3.0 features or advantages.
1) MU or Multi-User option :

Multi-User option is one of the best features of WordPress 3.0 that will allow you to manage multiple blogs with different permissions  from a single admin panel. Alright, admit it  we all have at least a couple of blogs to work with, right? So MU is a very good  feature.

2) Post Types Customization :

Till WordPress 2.9, WordPress has always enabled you to publish two types of content within a blog. These we recognize as blog Posts and Pages. Now in WordPress 3.0 you are able to define your own extra content types and also give them their own attributes. So now users can create any kind of content they want

3) New “Twenty Ten” the Ultimate New Theme of WordPress 3.0 :

WordPress 3.0 having a new default design theme called Twenty ten. you can see the live demo of this design on official WordPress website. As you understand according to the new name of default theme every year WordPress got a new default theme in wordpress 3.0.
wordpress 3.0 thelonious twenty ten screenshot 300x212 Wordpress 3.0   Thelonius Advantages
4) New Custom Menu Management Feature :

Probably for users the most useful feature released with WordPress 3.0 is the brand new menu management system that has been included with the new version.New Custom Menu Management feature is also available in wordpress it  allows in creation of custom menus combining posts, pages, categories, tags, and links for use in theme menus or widgets.Menu management should be the most popular new function of WordPress3.0. It allows you to completely control the site’s navigation menu. Through easy drag and drop interface, users can freely create various combination of links: internal links, external links, categories, etc. And you can embed these custom menu themes anywhere and treat them as widgets.
WordPress3 menus 600x369 300x184 Wordpress 3.0   Thelonius Advantages

5) Multi-Site WordPress :

In addition a new Multi-Site feature has been incorporated due to the merging of WordPress with WPMU, so that you can now build several WordPress blogs with the same software installation. So now you can manage several different websites each with a different domain or subdomains all from within a single installation of WordPress. This facility is not enabled by default as it will not be required by most users.

6) Custom Background and Image support system :

This option will help you create new theme for your blog in a matter of minutes.

7) Specific author templates :

Now it is possible in WordPress 3.0  to use the specific author templates. So, you can easily mark your own post or entry with your signature.

8) Canonical Plugins:
Canonical plugins  available in WordPress 3.0. This means that from the moment it is launched you will be able to easily use your favorite plugins without being afraid that new release of WordPress will kill them

How To Use Gmail To Send Email From Joomla

Hi Friends, Some days ago I worked on Joomla Project in which I got one requirement that client want to use Gmail and Joomla together such that Joomla sends emails via Gmail. So I implemented it successfully, So I thought to share it here with my reader, So it can be helpful to any one.

Below are steps to use Gmail and Joomla together such that Joomla sends emails via Gmail :

1. Go to Global configuration > Server. Here you will have to change some setting in “mail settings”.
2. Set “Mailer” to SMTP Server.
3. “Mail From” will be username@gmail.com.
4. Set “From Name” to whatever you want. E.g. Your Company Name.
5. “Sendmail Path” – no changes.
6. Set “SMTP Authentication” Set it to yes.
7. “SMTP Username” – username@gmail.com.
8. “SMTP Password” will be your password of Gmail.
9. “SMTP Host” is gmail-smtp-in.l.google.com
Below is image of mail setting tab, So please set all things accordingly and then your Joomla will use Gmail to send email.
joomlagmail 300x106 How To Use Gmail To Send Email From Joomla

How To Add Cool Emoticons In Facebook Chat Conversations


In this post I’ll show you how to add cool set of emotions in your facebook chat conversations . All what you need to do is to install free facebook emotions and restart your web browser.
1) Download facebook emotions from this link
2) Restart your web browser





9 Best Twitter Desktop Apps for Mac


Hello Friends,
The popularity of Twitter has increased tremendously in past few years. As a result a lot of Twitter Desktop applications are available to the users for download these days. These applications allow you to receive and post Tweets from your desktop without visiting your Twitter.com page.
To reduce your burden of finding the appropriate app for you from such a big pool of apps, we have compiled a list of Best Twitter Desktop apps available in the market. Earlier I had compiled a list of 20 Best Twitter Desktop Apps for Windows. Today I give you 9 Best Twitter Apps for Mac.

1. EventBox

This just-for-Mac app is a favorite of many because it supports Twitter, Facebook, Flickr integration, feed reading with Google Reader and internet trend watching with Reddit and Digg . Keyboard shortcuts, hotkeys, Instapaper integration, and photo uploads to Flickr and Facebook make EventBox pretty nifty. It’s also got a very slick interface with a navigation menu on the left-hand side.

2. Mac Lounge

This app is incredibly appealing for its dead simple, single column interface and respectable feature set. We, of course, love the multiple account support, but also appreciate saved searches, quick access to view followers and following, and tweet options to link to tweet, copy tweet, or copy tweet URL. There’s also an accompanying iPhone app, which syncs with the desktop version and greatly improves the app’s relevance.

3. Nambu

This really sophisticated Mac app should be more than enough for any and all of your Twitter needs. You’ve got access to your followers and friends, custom groups, search (integrated with FriendFeed and One Riot), trends, tr.im and pic.im integration, multiple accounts, Ping .fm integration, filters, and three view options for a one or many column view of tweets.

4. Sideline:

Sideline is just a search and trending topic app from Yahoo, but it does a darn good job at satisfying those specific needs. You can view current Twitter trends, select to see the three latest tweets or pop out as its own saved search, and create custom search groups as tabs.
5. Skimmer:

It’s hard not to love this app. Not only is it beautiful to look at it, but it also tracks your favorite social sites. Skimmer’s certainly not an application for the social media beginner, but power users of Facebook, Flickr, YouTube, Blogger, and Twitter, will appreciate the aggregation of content, filtering options, view types, and enhanced content viewing experience.

6. Tweetie

A full-featured Twitter client which is available in free ad supported and ad-free versions.  This Desktop app lets you view not only the tweets but also the entire conversation history leading to that tweet. It provides you with an independent compose windows that stay out of your way until you need them. Tweetie for Mac also has search trends to let you find out the hottest trend in Twitter. Other features include threaded DMs, user details, torn off search, bookmarklet, and preferences.

7. Twibble Desktop

Twibble is a bit of a riddle. It’s not a bad app when it comes to feature set, but it’s also not the most intuitive. You can manage multiple accounts, but all tweets are merged together in one stream. You can reply, DM, fav, RT, and copy tweets, but you’ll have to hover over the tweet to even know those behaviors are possible. You can also use keyboard shortcuts, filter your tweets for keywords, or conduct searches that open up in new windows, but Twibble just doesn’t seem to flow as easily as we’d like it to.

8. Twitterific

Lets you both read and publish posts or “tweets”  using a clean and concise  user interface designed to take up a minimum of real estate on your Mac’s desktop. The app shows a scrolling list of  the latest tweets from your friends, or public feeds. Its features include multiple Twitter account support, auto refreshing, inline display of replies and DMs, shows no. of unread tweets, quickly delete tweets, auto show/hide new tweets, single click access to user pages and more.

9. TwitterPod:

This app isn’t known for its sophistication or advanced Twitter functionality. TwitterPod is a basic single column Twitter app with an inline browser and the ability to filter for just tweets with links. Its heyday has long since passed, but original fan boys and girls may still be using this for their twittering.

Sunday, February 20, 2011

Build Your Own Web Server At Free

When you browse across the web may be you think of making your own web site. Today I'm going to tell you how to create your own web server that can host your web site. 


What You Need 
  • A Computer.
  • Linux or window operating system.
  • A working Internet connection.
Now The Next Step
As you have all of the three content above you are ready to make your own web server

First install the operating system in your computer with at-least 10 GB of free space (In C drive if you have window and In Root if you have Linux ).

Now you need to install WAMP in windows and LAMP in Linux but The best solution is to install XAMPP (you can find how to install instructions on the XAMPP web site )

Once you install XAMPP check it by putting
http://localhost/ 
In your web browser. If your Installation is goes well It shows something like this
Now you are ready

Put your site under the htdoc folder of your XAMPP installation directory.

Now your web site can be open in your browser but it is local server.
And you need to make it a global server.

Now to do this find your IP address on following address

Now you can open your site by this address

http://your-ip-here/name of your site folder

And now your web server is ready

You can get free domain name for your web site which I'll tell you in my next post

Thursday, February 17, 2011

Memory vs Virus

http://api.ning.com/files/U-GvfKvlAzAzgJZrp-R6kxds6LvEpAdS1Xxpa7RMnTRluMyONqD4YBN0hriNdAOA*CVlJKDM6*7jQIqTaYXXojCXZqYhxRCM4iDnZJc2uBE_/Optimize_computer_speed.jpg 
Many users have noticed that their machines often slow down for no apparent reason. This may be virus related, or it may be a memory problem. Determining which one isn't very hard for the experienced user, but the inexperienced might have some difficulty. It's important to recognize the difference between malicious software, and lacking hardware.

While viruses can certainly make your computer run slow, there are usually other signs that accompany them. New icons on your desktop, odd behaviors, and programs telling you your machine is infected that you didn't install. These are all symptoms of a virus and can slow your machine down. However there is one other explanation for these slow downs that you need to consider.

I'm talking about your system memory, or RAM. RAM is an acronym that stands for Random Access Memory and is very important to your computer. Regardless of what operating system you use every machine uses RAM. When you save a document or project that you have been working on it is saved to the computers hard disk also known as a hard drive.

When your computer loads a program it is loaded into the systems RAM. Unlike a hard drive which is static memory, a RAM stick is volatile memory. When the power is turned off to your machine the information stored on the hard disk stays stored, whereas what's loaded into the RAM is erased. RAM is primarily used as a temporary storage medium on your machine to load and execute programs or commands.

Insufficient RAM can lead to your system slowing down, sometimes severely due to the requirements. For example, an older operating system may only need a minimum of 256 megabytes of RAM to function. This is the bare minimum without any noticeable slowdowns, you won't be doing much, but the machine will work. A newer operating system may require 1 gigabyte of RAM minimum, a gigabyte being 1024 megabytes.

Trying to install and run this operating system on a computer with 256 megabytes of RAM is not going to work well. The reason for this is that as operating systems advance there are a greater volume of programs that need to be loaded into the RAM. When you play a movie in a media player the movie is loaded into RAM for easy playback. Insufficient RAM leads to stuttering in movie playback, and requires you to pause until the system catches up.

When you don't have enough RAM the system uses what is known as virtual memory. This is a section of your hard drive that your operating system designates as temporary RAM. Nothing is kept permanently on this area, but it is much slower. It's generally a good idea to have double the amount of RAM your operating system requires to ensure the best performance.

Slowdowns from insufficient RAM or system memory can also affect web browsing, gaming, be the cause of errors, and other computer headaches. While it does resemble a virus in some aspects, it can be solved much easier. You simply buy a RAM stick, and plug it into an open slot. Or you buy a higher capacity RAM chip and replace your existing one.

Unable to Format Your Pen Drive?

If there is big virus in pen drive in that case pen drive is not format

1. Right click on my computer

2 Then click on manage

3 Disk Management

Here u see all u drives . right click on pen dirve an format






OR
To prevent a pendrive from infecting trojans or some kind of virus which uses autorun.inf file to execute, just create a blank folder in your pendrive and name it as autorun.inf make it hidden and read only. This trick is sometimes helpful to prevent those kind of viruses or trojans.

How to remove newfolder.exe or regsvr.exe or autorun.inf virus


I want to tell you a story, two days back i got affected by this virus very badly as it eat up all my empty hard disk space of around 700 MB .


I was surprised that my most reliable friend Avast, for the first time failed me in this war against viruses but then again avg and bitdiffender also failed against it. This virus is know popularly as regsvr.exe virus, or as new folder.exe virus
and most people identify this one by seeing autorun.inf file on their pen drives, But trend micro identified it as WORM_DELF.FKZ. It is spreading mostly using pen drives as the medium.Well, so here is the story of how i was able to kill the monster and reclaim my hard disk space.

Manual Process of removal


I prefer manual process simply because it gives me option to learn new things in the process.


So let’s start the process off reclaiming the turf that virus took over from us.


1. Cut The Supply Line


a. Search for autorun.inf file. It is a read only file so you will have to change it to normal by right clicking the file , selecting the properties and un-check the read only option

b. Open the file in notepad and delete everything and save the file.
c. Now change the file status back to read only mode so that the virus could not get access again.
d.
e. Click start->run and type msconfig and click ok
f. Go to startup tab look for regsvr and uncheck the option click OK.
g. Click on Exit without Restart, cause there are still few things we need to do before we can restart the PC.
h. Now go to control panel -> scheduled tasks, and delete the At1 task listed their.

2. Open The Gates Of Castle

a. Click on start -> run and type gpedit.msc and click Ok.
b.
c. If you are Windows XP Home Edition user you might not have gpedit.msc in that case download and install it from Windows XP Home Edition: gpedit.msc and then follow these steps.

d. Go to users configuration->Administrative templates->system

e. Find “prevent access to registry editing tools” and change the option to disable.
f.
g. Once you do this you have registry access back.
3. Launch The Attack At Heart Of Castle
a. Click on start->run and type regedit and click ok
b. Go to edit->find and start the search for regsvr.exe,
c.
d. Delete all the occurrence of regsvr.exe; remember to take a backup before deleting. KEEP IN MIND regsvr32.exe is not to be deleted. Delete regsvr.exe occurrences only.
e. At one ore two places you will find it after explorer.exe in theses cases only delete the regsvr.exe part and not the whole part. E.g. Shell = “Explorer.exe regsvr.exe” the just delete the regsvr.exe and leave the explorer.exe

4. Seek And Destroy the enemy soldiers, no one should be left behind

a. Click on start->search->for files and folders.
b. Their click all files and folders
c. Type “*.exe” as filename to search for
d. Click on ‘when was it modified ‘ option and select the specify date option
e. Type from date as 1/31/2008 and also type To date as 1/31/2008
f.
g. Now hit search and wait for all the exe’s to show up.
h. Once search is over select all the exe files and shift+delete the files, caution must be taken so that you don’t delete the legitimate exe file that you have installed on 31st January.
i. Also selecting lot of files together might make your computer unresponsive so delete them in small bunches.
j. Also find and delete regsvr.exe, svchost .exe( notice an extra space between the svchost and .exe)

5. Time For Celebrations

1. Now do a cold reboot (ie press the reboot button instead) and you are done.
I hope this information helps you win your own battle against this virus. Soon all anti virus programs will be able to automatically detect and clean this virus. Also i hope Avast finds a way to solve this issues.
As a side note i have found a little back dog( winpatrol ) that used to work perfectly on my old system. It was not their in my new PC, I have installed it again , as I want to stay ahead by forever closing the supply line of these virus. You can download it form Winpatrol website.

Please do reply if it works and u like my Post

Reset Windows Vista And Windows 7 Activation

NOTE:- please backup your registry. Read about backup registry here.
If all other possible ways to activate Windows has failed, you are left with only one which is to activate windows by phone. What if that also has failed somehow? Here is a nice registry (as well as a command line) trick to postpone Windows activation for 1 year or just to say, use Windows without activating it.

Reset Windows Vista And Windows 7 Activation for 120 days

1. Start Command Prompt. (Press Winkey+R to start Run, type cmd in it and hit enter).
2. Enter the command slmgr –rearm and hit enter.
use windows for 1 year without activation | command line trick
3. You will be prompted to restart Windows. After restarting, the trial period will be extended for 30 more days.
NOTE : If you are willing to take full advantage (i.e 120 days) perform this trick every 30 days after installation. This trick will work only three times. So, 30days(default) + extended 90(30X3) days makes the extension of 120 days or 4 months.

Reset Windows 7 or Vista Activation For almost 1 year(360 days)

As I mentioned earlier, the slmgr –rearm trick could be used only 3 times. But a registry trick will make it usable for 8 more times i.e (8X30=240days) of Windows use.
1. Open the registry editor in Windows 7 or Vista.(Press Winkey+R to start Run, and then type regedit in it and hit enter).
NOTE : Backup Windows Registry before making changes to it.
2. Go to the following directory using the left pane,
For Windows Vista
use windows without activation | registry trick vista
HKLM\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SL
For Windows 7
use windows without activation | registry trick
HKLM\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SoftwareProtectionPlatform
*HKLM stands for HKEY_LOCAL_MACHINE
3. Now in the right pane, you will find a DWORD entry named, SkipRearm. Right click on it and press “Modify”. Change the “Value Data” to 1.
4. Restart your computer to apply the changes. That’s all. Now you can perform the previously mentioned(slmgr -rearm) trick 8 more times.
Therefore the total count of the allowed slmgr –rearm trick is 11 which means an extra of 330 days in addition to the default 30 days. So, you get a 360 days of extension for using Windows 7 or Vista without activating it. You may also like to know how to disable or enable the Windows auto-activation feature.

Backup your registry and restore it

There are several tweaks or tricks that need editing registry values. But registry values being a key part in Windows operations needs careful handling. If you screw it up doing something else, it is really tedious to revert back to the older settings. So, we recommend all tweak-lovers and geeks (to recommend their readers) to follow these simple steps to create a backup your registry before making a any changes to it, so, that you have a way-out of an unintentional mess.

Backing Up Registry In Windows

STEP 1 :: Go to Run. (Windows Key + R).
STEP 2 :: Type regedit and hit enter. The Registry Editor Window opens.
backup-restore-registry-windows-xp-vista-7-open-run-type-regedit
STEP 3 :: Go to File > Export.
backup-restore-registry-windows-xp-vista-7-export-registry
STEP 4 :: Now select a location for the exported (backup) file. Name it and press Save.
backup-restore-registry-windows-xp-vista-7-save-registry
(also read – Start up Xp faster with a simple registry tweak)

Restoring Registry In Windows

STEP 1 :: Go to Run. (Windows Key + R).
STEP 2 :: Type regedit and hit enter. The Registry Editor Window opens.
STEP 3 :: STEP 3 :: Go to File > Import.
backup-restore-registry-windows-xp-vista-7-import-registry
STEP 4 :: Locate the (backed up) registry file and Press Enter.
backup-restore-registry-windows-xp-vista-7-restore-registry
That is all you have to do to backup or restore your registry. This way you are safe from any fatal crash your system may experience from any improper change in registry values.

Saturday, February 12, 2011

Cheat with linux


Cheat Sheets help you learn quickly making it faster and easier to complete your tasks. Here we have collected 26 very useful and handy Linux/Unix Cheat sheets, covering all kinds of Linux and Unix operating systems. This guide is to help you understand the OS better and learn faster with the help of these cheats. You can print them out and keep a hard copy at your desk when you work on your OS next time.



1. Linux Admin Cheat Sheet



2. The one page Linux Manual


3. UNIX / Linux Shell Cheat Sheet


4. Ubuntu refrence

5. Beginner's Linux Cheat Sheets

6. LINUX System Call Quick Reference

7. UNIX Command Cheat Sheets

8. UNIX C Shell Cheat Sheet

9. AWK Cheat sheet

10. OpenSSH Quick Reference

11. GDB QUICK REFERENCE

12. Red Hat Linux Getting Started Guide

13. Sed Command Summary

14. Linux Security Quick Reference

15. The humble Linux cheat sheet

16. Debian GNU/Linux Reference Card

17. Screen Terminal Emulator Cheat Sheet

18. Package Management Cheat sheet

19. Introduction to Linux

20. Red hat program manager

21. Vim Keyboard shortcuts

22. TCP port list

23. Rosetta stone for Unix

24. Linux shortcuts and commands

25. Linux Cheat Sheet for Mac and Windows Programmers

26. Bash emacs editing mode