$1.99/mo Web Hosting
Save some Cold, Hard Cash! $7.49/yr domains

Wednesday, December 21, 2011

Google Let it Snow Trick : Hidden Holiday Surprise

Today I just got tweet that google has come with new hidden trick knows as "Easter Eggs" for Christmas.
  • Just go to http://google.com 
  • Type "Let It Snow" without quotes 
  • Search

Your screen will be filled with white snows with Deforest button.
When you click Deforest it will clear your screen.

Merry Christmas and Happy Holidays to all.. :-)

Wednesday, October 26, 2011

Nokia 500 is launched, 1GHz Symbian Anna Phone - faster, light and multicoloured

Nokia just launched a new generation low end touchscreen handset. Dubbed the Nokia 500 , it comes with the new generation 1Ghz class processors. Symbian Anna comes preloaded on the device.  The screen is a 3.2″ capacitive multi touch panel with nHD resolution. On the back , users can find a 5MP Autofocus EDoF/Fixed focus camera unit.

If you’re looking for a low-cost, full-function smartphone, then the Nokia 500 should meet your needs and more. As you can see from the pictures, this is a touch-screen phone.
Under the hood, there’s the 1GHz processor – allowing for plenty of oomph when you’re multitasking lots of apps or doing something extra-demanding. There’s 2GB of storage memory, plus the possibility of increasing this by a further 32GB using the micro-SD card slot. Like all our recent smartphones, it offers pentaband radio coverage so world travellers need never be out of touch, 3G data up to HSUPA speeds [that’s a whopping maximum speed of 5.8Mbps nowadays, by the way]. There’s also Bluetooth 2.1 and Wi-Fi b/g, as you’d expect. The phone measures 111.3 x 53.8 x 14.1mm and weighs in at 93g – lighter than any other Symbian^3 phone to date.

The Nokia 500 runs on a different (new) hardware family, compared to the earlier Symbian^3 devices. The Nokia 500's hardware family is lower cost, which, as you would expect, means some compromises have been made. The most important of these is in the processor specification. The Nokia 500 has a higher clock speed (1000 MHz ARM 11 versus 680 MHz ARM 11), but it does not have a 3D graphics co-processor.

In any case, the absence of a 3D graphic co-processor is the more noteworthy change. For example, it means the Nokia 500 cannot capture or play HD video and it may also limit the availability of some games for the device.

It’s also worth mentioning the battery, which despite the faster processor, still manages to pull off a very respectable performance. For us, that’s an absolute priority. The battery will see you through 5-7 hours talk time, 450+ hours in standby mode or up to 35 hours of music playback, if that’s your thing.

The Nokia 500 is available in black and white varieties, black first and then white before the end of the year. And there’s three different-coloured back covers in the box. More colours for these will become available soon – including purple, azure blue, pink, coral red, orange and dark silver.

Summarized Specs

  •     Symbian Anna with split screen keyboard
  •     1GHz Processor
  •     3G Data up to HUSPA speed
  •     111.3 x 53.8 x 14.1mm and weighs in at 93g – the lightest S^3 phone to date.
  •     450+ standby hours or 5-7 talk time hours.
  •     The back has 5MP.
  •     150EUR before taxes
  •     Available in Black and white fronts. It seems you have additional coloured back covers, green Blue as well as purple, pink, red, orange and dark silver. There’s also a hot pink. Not sure how that is different over pink.

Sunday, October 23, 2011

Fake Yahoo Greetings leading to Phishing Page

I just got a mail from the address "greetings@yahoo.com"
To Adress was "card-39452073507@yahoo.com"
I may be in BCC

Mail was like

To view your eCard, choose from the options below.

Click on the following link.



Copy and paste the above link into your web browser's "address" window.

Thanks for using Greeting Cards on Yahoo.com

I copied and paste link URL it didn't work.. so I thought it's something wrong.. I didn't click direclty.. copied href link from the given text..

it's like


so it's so confusing link.. not only confusing but also a good try to hide original URL by keeping yahoo.com. something something as sub domain..

I read yahoo official greeting site about alerts.. They are saying..

"Security Alert: Yahoo! Greetings will never ask you to reset your Yahoo! Greetings account password through an email. If you receive an email requesting you to reset your password, do not open it or click on any links contained within the email. "
For more : http://www.yahoo.americangreetings.com/emailprotection/index.pd

so do not click on such page or provide username and password other than official login link of yahoo..

you may loose your account and also related information too..

Take Care while surfing.

Thursday, October 20, 2011

What's new with Android 4 Ice Cream Sandwich?

As all were waiting Android 4 - Ice Cream Sandwich, just announced on 18th Oct, 2011 (Tuesday) night by Google and Samsung at a press gathering in Hong Kong.

Android 4.0 operating system (OS) is also called dubbed Ice Cream Sandwich (ICS). This was unveiled together with Samsung, who will have the first phone equipped with ICS, the Galaxy Nexus.
While there are a number of new features in Android 4.0 stated here.

Different Look
The user interface is already starting to look dated, and HTC and Samsung in particular are doing a better job of creating alternative skins to make Android look more attractive and useful.


"People need Android ... but people didn't love Android," said Matias Duarte (former designer of WebOS), director of the Android OS user experience, explaining why the world's most popular smartphone OS needed a full redesign.
To put it another way, by observing what really works on the iPhone and Windows Phone operating systems, and what wasn't working on Android, Google's mobile development team made massive improvements across the board, and focused on making the experience consistent no matter where you might be in the environment. It's no longer a hodgepodge of unclear commands and clumsy screens.

Improved Lock screen

The lock screens now let users do more without unlocking. From the slide lock screen, users can jump directly to the camera for a picture or pull down the notifications window to check for messages. When listening to music, users can even manage music tracks and see album art.

Face unlock

Ice Cream Sandwich knows what you look like, and Face recognition lets you unlock your phone with your face. though face Unlock was unsuccessfully demonstrated by Matias Duarte, senior director of Android user experience at Google. He introduced the facial recognition feature as a means of unlocking the Galaxy Nexus or future Android 4.0 phones without needing to type in a PIN. "Face Unlock uses state of the art facial recognition," he said. "Ice Cream Sandwich literally knows our face."

Control over network data
Mobile devices can make extensive use of network data for streaming content, synchronizing data, downloading apps, and more. To meet the needs of users with tiered or metered data plans, Android 4.0 adds new controls for managing network data usage.

Android already had a better notification system than anyone else — a pull-down tray that most likely inspired the one now found in iOS 5. But they made it better, letting you flick away notifications you don't care about, so you can save just the important ones for later. The latest version of Android provides a consistent and well thought out user experience, unifies the platform for both tablets and phones.

It's been killing phone reviewers that we can't share Android screenshots simply, the way we can on iOS devices. Well, now Android has the exact same screenshot capability, with a cute little Polaroid animation to highlight the action.

Improved Keypad and spell - checking

Minor improvements include better copy and paste, data logging and warnings and, at last, the opportunity to easily grab screenshots by holding down the power and the volume buttons.

The soft keyboard in Android 4.0 makes text input even faster and more accurate. Error correction and word suggestion are improved through a new set of default dictionaries and more accurate heuristics for handling cases such as double-typed characters, skipped letters, and omitted spaces. Word suggestion is also improved and the suggestion strip is simplified to show only three words at a time.

Voice typing
Android has had voice-recognition capabilities for some time now, allowing you to search by talking to the phone. This feature is now expanded so you can type by talking. If this works well, it will be a boon for those who have their hands full and need to send an email or text message urgently.

Android Beam for NFC-based sharing

Android Beam is an innovative, convenient feature for sharing across two NFC-enabled devices, It lets people instantly exchange favorite apps, contacts, music, videos — almost anything. It’s incredibly simple and convenient to use — there’s no menu to open, application to launch, or pairing needed. Just touch one Android-powered phone to another, then tap to send.

For sharing apps, Android Beam pushes a link to the app's details page in Android Market. On the other device, the Market app launches and loads the details page, for easy downloading of the app. Individual apps can build on Android Beam to add other types of interactions, such as passing game scores, initiating a multiplayer game or chat, and more.

Android's own Font
Android 4 sports a new type face called “Roboto” which was designed especially for high resolution screens like the one found on the Galaxy Nexus.

By putting a new emphasis on typography, Duarte is taking a page from Steve Jobs who credited a college calligraphy class he audited for the great looking text on the Mac and iPhone. Roboto is part of a magazine-like revamp to many of the redesigned Android apps, which now have “big bold pictures with giant headlines”.

Official Video by Google

Wednesday, October 12, 2011

Fonts not showing up in MS Word : solved issue

Today while working in one of my network system. I found that fonts were not showing in word, while it was showing in Excel or any other office components. It's Windows XP Operating System with office 2007 installed.

I have checked 2-3 times by restarting word, restarting computer.. nothing worked.. at last "Googled" :-)

Found two things to do for solution

1. You may have insatalled generic text service 

System has attached virtual printer to print document when default printer is not available and it was set as default print.When I set the regular printer as the default then the fonts show up. :-)

So first you go to Control Panel and check printer list in printers. if you have generic text service as default printer. Alter your default printer. Fonts will be shown.

2. corrupted normal.dot file

You have normal.dot file located in your Application Data folder.
In XP it's at : C:\Documents and settings\<user name>\Application Data\Microsoft\Templates
In Vista + it's at : C:\Users\<user name>\Application Data\Microsoft\Templates
It is responsible for word to locate few basic things. it may get corrupted.

To resolve such issue
  • Close All instances of word
  • Locate normal.dot file in your C: drive
  • Rename the file from normal.dot to normal.dot.old
  • Open new word document. It will create new normal.dot file :-)

All fonts will be shown up.

Good Luck..

Friday, October 7, 2011

Microsoft Releases Hotmail App for Android

Anyone out there still using Hotmail? No ? That's great..
lol.. I was just kidding.. There must be many who are still using Hotmail.
All must be glad to know that Microsoft officially launched Hotmail Apps for Android.

Key features include

  • With push email get messages on your phone without delay
  • Synced calendar and contacts
  • View your folders in Hotmail, including sub folders
  • Send pictures from your phone using Hotmail
  • Supports multiple Hotmail accounts
  • Send, receive and view attachments

App Screenshots

It is compatible with Android 2.1 Eclair through 2.3 Gingerbread, but it is not yet available for Android 3.0 Honeycomb-based tablets. You can download the Hotmail for Android app for free from the Android Market now.

There’s push email, calendar and contact syncing, attachment support (both sending and receiving), and it’ll even support multiple Hotmail accounts should your multiple personalities stuck in the 1990s need to have their communications fix.

You can read more about app from

Tuesday, September 13, 2011

Free Facebook T-Shirt Scam Spreading Virally

Few days I ago.. I logged in to my FB Account.. I found one of my friend posted on his wall that he got facebook tshirt.. I really liked it.. :-)

I clicked on that link too.. I was about to become another victim of that scam.. I show next page as below..

It's Facebook Birthday.. !! I wasn't knowing that.. there is not any official facebook link.. but I continue with next page.. To get Tshirt click here.. I clicked..

see the page carefully.. when does facebook start to put google ads? :-) lolz.. something weird.. something scam.. let's google it.. :-)

http://techpp.com  saying

"These Facebook scams hardly ever fail to amuse me. I say this for two major reasons. One, there are always enough gullible users, no matter how many scams have embarrassed them and two, Facebook hasn’t really found out a way to tackle these spammers. Tackling might be far fetched, I doubt if they even have an intent to keep off these spammers. Well, the biggest Facebook scam underway right now is about Free Facebook T-shirts and I’m seeing a lot of not-so-gullible users getting trapped this time around."

Another site saying there are two scams.. another pic with facebook tshirt..

Uffo.. this pic made 80% of facebook users to click on it.. nice way..

Hacker attacks targeting Facebook are endless. The most recent one proved that scammers have enough of imagination to create more and more scams with different subjects. You never knew that you have a secret mobile e-mail address? Well, you can now learn about it via the legitimate Facebook page or via a special video, created by hackers in order to make it easier to steal your data.

A Facebook T-shirt seemed like a big enough reason for users to visit an especially created by hackers web page, that claimed to be celebrating Facebook's 7th birthday. With the tricky comment "WOW!! Got a free Facebook T-SHIRT :)). Unpacking it now. Get it here : [link]", scammers have managed to attract the attention of Facebook lovers. To make it even more luring, they stated that there 1.9 million official Facebook T-shirts - enough for the fastest Facebook users.

The procedure of claiming a T-shirts is the following: users first have to verify they have got a Facebook account.

Then the reason for the attack becomes clear - you are prompted to visit Facebook Mobile and copy (then paste) your SECRET mobile e-mail address. This is where you should stop and think, because this address, if revealed to others, can be used to write status posts, upload photos and videos - all that on your own page and on your behalf!

That is the reason why scammers need your address - to abuse your account. To make things look even more legitimate, and to help you out giving them your secret data, hackers have been bold enough to create a YouTube video with instructions of where exactly your secret mobile e-mail address is and how to fill it in in their form.

In this scam, cyber criminals have been clever enough to take advantage of the fact that a lot of users do not know what the secret mobile e-mail address is, how to use it and why they need to keep it secret. If you have become a victim of the Facebook's 7th Birthday Celebration scam, please change your Facebook Mobile upload e-mail address by following these steps:

Now the main thing: Friends whose profile has now infected with "Free Facebook t-shirt" Scam,

Solution to get rid from this scam

To fix this, 

1. Go to http://www.facebook.com/mobile/?v=photos

2. click on "Send me my upload email" which will open one dialog.

3. In this dialog box click on the "refresh your upload email" link in the bottom.

Please note that you can refresh this email address only a limited number of times.

Also go to
and delete all unwanted applications. Keep safe :)

This threat might have not reached you, however, keep in mind that such threats appear constantly and the next bait might be luring enough for you to make you click. It stands to reason that should be extremely cautious when you are prompted to give away your account information - of all sorts.

Tuesday, September 6, 2011

Do try-catch really effect runtime performance in .Net application?

Recently, a friend told me that someone had told him that writing a try-catch block in C# resulted in a "huge penalty" in terms of performance compared to if you had not written it.
I was little worrying if that statement is true or not.. I have googled it and read many articles.. also made few small applications.. when no expection occurs and expection occurs.
That is, merely writing such a block actually hurt program performance, even if an exception was never thrown. He didn't believe this was true, and rightly so-it's completely wrong.

Inside a .Net Assembly

A .Net assembly, if we ignore various headers, consists of three things:
  • Bytecode: a sequence of low-level instructions that specify the body of a method
  • Metadata: a set of tables, a little bit like a database, describing higher level constructs such as classes, methods, signatures and so forth
  • Heaps: places where string constants and other such things are stored
That is, bytecode is what we actually execute and the rest is there to describe the extra details. To give you an example of the interplay between them, consider a method call. The bytecode stream contains the call instruction, followed by a method token, which is actually an index into the methods table. The methods table in turn allows us to find out where the bytecode for the method we're calling starts, so we can execute it.

(As an aside, these lookups wouldn't be all that expensive to do per call, though in reality they likely won't actually happen more than once per call site, unless it's done through reflection or a delegate. That's because when the CLR JIT-compiles the bytecode, it can compile the method call down to call instructions at the CPU level that refer directly to the method being called. You don't need to know this bit; it's just here for the curious.)

How Exception Handlers Are Stored

The .Net CLR has a concept known as a "protected region". A protected region is a sequence of instructions that has an associated handler. In C# or VB.NET, the instructions in a protected region correspond to code in a try block. There are various types of handlers, including typed ones (that catch only a certain type of exception) and finally ones. Note that a try...catch...finally will result in two protected regions at the CLR level, one for the catch and one for the finally. The protected regions will cover the exact same sequence of instructions, just have different handler addresses.

Each method that has protected regions comes with a table of them. For each protected region, it contains four entries:
  • The starting instruction in the bytecode for this protected region
  • The number of bytes worth of instructions from the starting point that are protected
  • The type of handler
  • The location in the bytecode of the handler
They are ordered with innermost handlers coming first.

What happens at runtime

Here is the important part when it comes to performance when an exception is not thrown. Since the protected regions are stored in a table and are not in the bytecode, and because the CLR does not need to worry about the exception handlers unless an exception is thrown, then there is no runtime penalty for having a try...catch block. For finally handlers it is a little different, because we do need to run those even when we don't have exceptions. However, since we can compute what we will need to run when statically, the JIT compiler can still emit code that jumps to the finally handler at the appropriate time, making the execution overhead of one of those most likely just a jump and a return.

So that's most of the answer to the question that was asked, but for interest let's take a look at what happens when an exception is thrown. Provided the current method has protected regions, you scan through the table to find if there are any that cover the instruction where the exception was thrown and that are capable of handling it (they are looking for an exception of the correct type, for example). If there are multiple nested handlers that could handle the exception, the ordering of innermost first means that we will find the correct handler.

If we find a handler, we execute it. If we don't find one, we move down to the next method in the call stack and check if it has a suitable handler, keeping going until we find one (or we discover that the exception is user-unhandled and terminate the program). This means that the cost of throwing and catching an exception is dependent on how far down the call stack you have to go to find a handler.

From this we can conclude that .Net is optimized for the case where you do not get exceptions. Since exceptions are intended to happen only in exceptional (that is, unexpected) circumstances, this is a sensible design decision. If you inclined to use exceptions for ordinary flow control, this should give you another reason not to.

And the cost of a try...catch block is...

So what can we conclude? The overall cost of a try...catch block that never handles an exception is a few bytes of memory - or at worst a few words - for the entry in the protected regions table. The only possible runtime penalty is the extra time to load those extra few bytes into memory. Since they are stored way away from the JITted bytecode stream, it's highly unlikely you're going to incur any additional cache-misses at runtime as a result of the handler too. Thus, the cost is essentially nothing.

The cost of not handling an exception that you should have may well be that your program crashes. This results in unhappy customers, a hit to your reputation and development time to go and do a bug-fix, which will almost certainly be much greater than if you had put it in there in the first place. Obviously, protecting code that can not throw an exception under any circumstances is a waste of your development time. But otherwise, it's best to be safe rather than sorry, safe in the knowledge that even if an exception never does occur in that bit of code, it's not really costing anything anyway.


Saturday, August 13, 2011

Ping and ICMP

First of all what is ICMP?

The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet Protocol Suite. It is chiefly used by the operating systems of networked computers to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. ICMP can also be used to relay query messages. It is assigned protocol number

ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems, nor is it regularly employed by end-user network applications (with the exception of some diagnostic tools like ping and traceroute).

You will come across following ICMP replies when you ping a particular IP.

When a PING is successful you get a reply back from the host showing its IP address and other information such as the time it took for the reply to go through.

TTL Expired in Transit
The TTL value determines the maximum amount of time an IP packet may live in the network without reaching its destination. It is effectively a bound on the number of routers an IP packet may pass through before being discarded. This message indicates that the TTL expired in transit. Number of required hops exceeds TTL. Increase TTL by using the ping -i switch.

Destination Host Unreachable
The host that you are trying to ping is down or is not operating on the network. A local or remote route does not exist for destination host. Modify the local route table or notify the router administrator.

Request Timed Out
The ping command timed out because there was no reply from the host. No Echo Reply messages were received due to network traffic, failure of the ARP request packet filtering, or router error. Increase the wait time using the ping -w switch.

Unknown Host
The IP Address or the Host Name does not exist in the network or the destination host name cannot be resolved. Verify name and availability of DNS servers.

This is just to explain different kind of ICMP replies I came across while reading about networking ping and tracert commands..

Friday, August 5, 2011

Send Data on a Right Click to Your Desired Folder

Whenever you attach a removable disk and want to send some items in it, you have option either you select the required files and do a CTRL + C, open the removable disk and do a CTRL + V
you select the required files right click on it and there you find “Send To” option. In “Send To” you find the name of removable disk and you simply send the items into it. 

Well, What if i get the name of my own desired folder there which I use frequently for keeping my stuff.

Now in this post I will be telling you how you can create your own folder with in any name in “Send To” option so that whenever you will copy any files or folders, you will simply send them to your folder instead of using CTRL + C and CTRL + V.

  • Firstly you have to access hidden files. So change your view settings to make all hidden files visible. Tools -> folder options -> view (tab) and select the show hidden files and folders also uncheck hide system files and folder (hide protected operating system file).

  • Go to My Computer  and locate Send To folder.(In Windows XP : C:\Documents and Settings\UserName\SendTo In Windows Vista and 7 C:\Users\UserName\AppData\Roaming\Microsoft\Windows\SendTo)
  • Now in Send To folder Right click -> create shortcut. Give the folder path you want to access for Send To purpose. Finish shortcut process.

  • Now your customized “Send To” option is ready to go.

Tuesday, August 2, 2011

Dragging the contents of a cell in MS Excel not working : Resolved

Today while working with Excel.. I was trying to drag and auto fill serial number. but it didn't work..

That plus sign wasn't coming when I select 2-3 cells so after searching on net I found following solution.

1. Click the Microsoft Office Button Button image, and then click Excel Options.
2. In the Advanced category, under Editing options, select or clear the Enable fill handle and cell drag-and-drop check box to turn drag-and-drop editing on or off.

Note To help prevent replacing existing data when you drag the fill handle, make sure that the Alert before overwriting cells check box is selected. If you do not want Excel to display a message about overwriting non-blank cells, you can clear this check box.

Hope it helps.

Friday, July 29, 2011

Share Files and Printers between Windows 7 and XP

Share Files and Printers between Windows 7 and XP

If you have a home network and are running Windows 7 and have XP on other PC(s) you might want to share files between them.  Today we will look at the steps to share files and hardware devices like a printer.

Sharing Files In Windows 7 and XP

Sharing folders between two Windows 7 machines with the new HomeGroup feature is an easy process, but the HomeGroup feature is not compatible with Vista or XP.

First make sure both machines are members of the same Workgroup which by default is named Workgroup.

On the Windows 7 machine go into Control Panel \ All Control Panel Items \ Network and Sharing Center then click on Change advanced sharing settings.

You will want to verify the following settings under Advanced Sharing Settings for the Home or Work and Public profile.

If you want any user to have access the public shares turn off password protection.  This is located in Advanced Sharing Settings toward the bottom of the list. 

If you want to keep it enabled make sure there is a log in account for the other XP machines and they have a password.

Now if you go into Network in Windows 7 you should see your XP machine and the Windows 7 as well

This should help you get started with sharing your files and other devices with your Windows 7 machine.  When I first started I was able to see the printer on XP right away because I had a HomeGroup set up, but once I deleted it I needed to share the printer like you would for a workgroup.  You might also have to do a couple restarts of the XP machine for it to see the shared resources on Windows 7.

Good Luck..

Monday, July 11, 2011

Blank screen when I boot from XP installation CD : Resolved issue

Today while working in company I got an issue.
I was trying to do a fresh installation for Windows XP. I inserted the bootable CD and started the computer. Select to ask me boot device and then selected CD/DVD. It asked "press any key to boot from cd" as usual. I pressed a key and "inspecting hardware configuration" appeared.

Unfortunately just a second after that screen turned blank and stayed so. I tried many times and waited a while also. I tried by setting BIOS settings as default and all but nothing helped..
so I googled for almost an hour and got the the issue and fixed it..

It was like..

I had Cent OS 5.6 installed on the hard disk and XP was not able to identify ext4 partition and that partition has MBR. so it was getting hanged or what so ever but it was showing only blank screen when I was trying to install new operating system.

I found that it was working fine with Windows server 2008 or Windows Vista or Windows 7 so what I did, I boot my system from Windows Vista DVD and delete the partition which was containing MBR. and also format the rest of the drives too as I only need to install windows system over linux.. and after deletion.. I just open DVD drive and removed Windows Vista DVD and insert XP CD again.. now when I tried it worked fine..

so it may be issue that XP is too old to identify ext4 partition or any other issue I don't know.. but it got resolved any how.. :-)

Good Luck if anyone is facing the same.. :-)

Wednesday, June 29, 2011

Google's Answer to FaceBook - Google Plus

Google's Answer to FaceBook; The Google Plus Project. In a monumental announcement rivaling Microsoft’s release of its Office 365 cloud computing service, Google has announced today the launch of its answer to Facebook, a social networking service called Google Plus.

Google took its biggest leap yet onto Facebook's turf Tuesday, introducing a social networking service called the Google(PLUS) project, which happens to look very much like Facebook.

Google is betting that its approach to privacy and extensive controls over who you share information with on the network will set Google Plus apart.

The service revolves around a concept of “circles” You can create as many circles as you like, for whatever categories you want: for example family, co-workers or biking friends. Above the circles are a slew of thumbnail images of friends and contacts which Google suggests you might want in your social network. To add a person to one of your groups, drag the name into a circle.

If you decide to remove someone from a circle, you simply drag their image out of the circle, at which point the image will explode into a cloud of smoke – one of several whimsical touches in Google+.

To use Google+ you need to create a Google profile. At the very minimum, Google requires that you use your real name and include a photo. Beyond that, you can furnish the profile with as much, or as little, detail about yourself as you want.

You can control how much of your profile is visible to other folks on the network: your name and occupation for some folks; relationship status for others.  Type a person’s name into a box, and you can see what your profile looks like through their eyes.

In a sense, Google+ combines the Facebook and Twitter models of social networking: You can have friends in your social network with whom you share information, and you can also simply follow certain people, say a movie critic who you don’ t know personally, a la Twitter.

You can take demo of Google Plus from it's official site :


Courtesy :

Friday, June 17, 2011

Windows could not start because the following file is missing or corrupt: \system32\hal.dll

Today I was facing a problem in one of our network system. when I was trying to boot the system error was

Windows could not start because the following file is missing or corrupt:
<Windows root>\system32\hal.dll.
Please re-install a copy of the above file.

This behavior can occur if any or some of the following conditions are true:
  • Actual dll file is missing from your hard disk.   
  • The Default value in the [Boot Loader] section of the Boot.ini file is missing or invalid.
  • Windows XP is not installed in the location specified in the Boot.ini file.
  • The partition path in the Boot.ini file is not set correctly.
  • General hardware failure.

Resolution steps :
  1. Use the Windows XP CD-ROM to start your computer.
  2. When you receive the message to press R to repair Windows by using the Recovery Console, press the R key.
  3. Select the Windows installation that you want, and then type the administrator password when prompted.
  4. go to your <CD DRIVE>:i386 path. 
  5. copy hal.dl_ to C:\windows\system32
  6. for example E:\i386\copy hal.dl_ C:\WINDOWS\SYSTEM32\   it will ask for confirmation to overwrite say it yes by pressing 'Y' and press Enter
  7. Now Type bootcfg /rebuild, and then press ENTER.
  8. When the Windows installation is located, the following instructions are displayed:
    Add installation to boot list? (Yes/No/All)
    [Type Y in response to this message.]

    Enter Load Identifier:
    [This is the name of the operating system. Type Windows XP Professional or Windows XP Home Edition.]

    Enter OS Load options:
    [Leave this field blank, and then press ENTER].
    After you perform the preceding steps, restart the computer, and then select the first item on the boot menu. This should allow Windows XP to start normally.

    After Windows XP has successfully loaded, the Boot.ini can be modified to remove the incorrect entry.

Wednesday, June 8, 2011

A new stable release of Chrome: Google Chrome 12

7th June, 2011.. new stable release of Chrome brings improvements in security, privacy, and graphics to Chrome’s users.

What else is new?

- Launch Apps by name from the Omnibox
- Integrated Sync into new settings pages
- New warning when hitting Command-Q on Mac
- Removal of Google Gears

However, improvements to the browser's graphics capabilities will be more noticeable to users. With added support for hardware-accelerated 3D CSS, Web applications using 3D effects will be "snazzier," Google says. So, what does that mean?


With 3D CSS, which is now available in Google Chrome, the browser has access to the computer's hardware to speed up the experience of viewing 3D effects. To see what this looks like in action, Google offers a link to a Chrome experiment called "Shaun of the Sheep." This cute cartoon (which works only in Chrome), demonstrates how 3D CSS lets you rotate a video, scale it up and down, turn the reflection on and off and activate a rotating carousel of videos.

In addition to 3D CSS Transforms, the experiment also takes advantage of hardware-accelerated HTML5 and the new audio-video format, WebM, open-sourced by Google last year.

More Security Tools

Also new in this release are enhancements to Google's Safe Browsing technology, which has now been improved to warn you before you download certain malicious files. Chrome has improved this detection process so that it can detected the malicious files without having ever seen what URL you visited. More details on that process are described here.

Bye-bye, Flash Cookies!

Google's close relationship with Adobe has allowed it to integrate Flash LSO (local shared objects) deletion right into the Web browser, so you can better manage your online privacy. These objects, often referred to as "Flash cookies" are similar to their "browser cookies" counterparts, in that they contain information used to customize your Web browsing experience, or hold data like your login info for a website. Unfortunately, Flash cookies are harder to delete than regular cookies - until now, Chrome users were only able to manage or delete cookies using this online tool. Now, you'll be able to delete the cookies from your browser Settings. Just click on the Wrench, go to Tools, Clear Browsing Data and select "Delete cookies and other site and plug-in data."

What's new in normal use?

One of the new features in Google Chrome 12 is called multi-tab select (Windows only). This feature allows you to select multiple tabs using the Ctrl button and perform actions on them like reloading all webpages or closing tabs among other things. I tried working with this feature but could not use it very well.

Another new feature available in this build is an experimental new tab page (through about:flags). The new experimental tab page adds a paged navigation for apps which will allow users to scroll through all the installed apps. It looks like it is more geared towards touch interfaces. However, this experimental new tab page is in its infancy stage and does not do much as of now.

Chrome 12 also has a new experimental feature called FPS counter which will display a page’s actual frame rate (FPS) when hardware acceleration is active. Other than that, the V8 engine has been updated to in all versions of the browser.

Google Chrome 12 also reverts back the new logo that was introduced earlier and switches back to the older one.

Experiment 3D CSS

If you would like to experience the excitement of the 3D CSS,  In Chrome 12, 3D CSS gets some love, and if you're running Windows Vista or Mac OS X 10.6 or above, there is a special Google Experiment titled "Shaun the Sheep", which allows you to rotate and scale the video as well as enable the reflection.


Tuesday, May 31, 2011

Different Ways to Lock Windows XP

  • via the keyboard
The easiest way to lock Windows XP is by simply pressing the Windows logo key and the letter L (for Lock) on a Microsoft Natural Keyboard or any other compatible keyboard that includes the Window key. Doing so will pop up the Unlock Computer Password box.

  • via a Shortcut.

If you don't have a keyboard with a Window key or simply don't like the keyboard method, then here's how you can make a desktop shortcut to lock your computer.

Right click an empty area of your desktop.
choose New/Shortcut
enter below line as the command line:

        rundll32.exe user32.dll, LockWorkStation

Click Next. Name the shortcut whatever you prefer and click Finish.
That's it.

  • via command line

Open the DOS Prompt or Command Prompt.
In Simple Way You can open can open it by Clicking on START –> RUN –> typing CMD.

 Type the Command line written below to lock your computer

      rundll32.exe User32.dll,LockWorkStation

  • via Batch file

Open Notepad

Copy and paste the Below Command line:

      rundll32.exe User32.dll,LockWorkStation

Then Save the file as "Lock.bat" (without quotes)

Wednesday, May 18, 2011

Top 10 Things Science Can't Explain

Science can’t explain all. But just because these things are yet to be explained, doesn’t mean science ‘cant’ explain them.

The WOW! signal
Wow, a secret message from outer space! Twenty years on and still no nearer an answer.

Pioneer’s Funky Voyage
The creators of these deviant probes are ripping their hair out trying to understand what went wrong.

Female Orgasms
After a whole lot of thinking, biology’s best minds are still confused.

Dark Energy
The universe is a dark, dark place, which makes it ruddy difficult to study.

The Speed of Light
Faster than a speeding photon: is it possible? Einstein stays no, but does everyone else?

The Placebo Effect
Take this pill and you’ll be cured, just as long as you believe me

Cold Fusion
Can atoms get together and let off some steam without the sauna?

Open your mouth and notice the shockingly fascinating mystery of the yawn.

Dark Matter
Just because you can’t see the WIMPs and MACHOs doesn’t mean they aren’t there.

What Came Before, What Will Come After
Wouldn’t it be really boring if it was just blackness. However, anyone’s guess is as good as ours.

Wednesday, May 11, 2011

Facebook Applications Accidentally Leaking Access to Third Parties : Symantec

 Facebook users' personal information could have been accidentally leaked to third parties, in particular advertisers, over the past few years, according to Symantec Corp's official web blog.

Third-parties would have had access to personal information such as profiles, photographs and chat, and could have had the ability to post messages, Symantec's web blog said.

According to Symantec official blog

"Facebook applications are Web applications that are integrated onto the Facebook platform. According to Facebook, 20 million Facebook applications are installed every day.
Symantec has discovered that in certain cases, Facebook IFRAME applications inadvertently leaked access tokens to third parties like advertisers or analytic platforms. We estimate that as of April 2011, close to 100,000 applications were enabling this leakage. We estimate that over the years, hundreds of thousands of applications may have inadvertently leaked millions of access tokens to third parties.
Access tokens are like ‘spare keys’ granted by you to the Facebook application. Applications can use these tokens or keys to perform certain actions on behalf of the user or to access the user’s profile. Each token or ‘spare key’ is associated with a select set of permissions, like reading your wall, accessing your friend’s profile, posting to your wall, etc."

The third-parties may not have realised their ability to access the information. The post also said they have already informed facebook about this leakage.

The blog also said Facebook, the world's largest social networking website, has taken steps to resolve the issue.

Facebook has recently announced an update to their Developer RoadMap. The details of this update can be found here: https://developers.facebook.com/blog/post/497 

You can read more about this from :

Wednesday, April 13, 2011

Internet Explorer 9 arrives, but not for XP - Microsoft Previews IE10 too

The final, consumer-ready Internet Explorer 9 is available for download at Microsoft’s official download site in 39 languages. With this set of browser releases, the best experience of the Web is on Windows.

The main issue with IE 9 is it runs on Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2.

XP is officially out of the mainstream support phase and is not eligible for updates like this. Plus, many of the features are specifically tied to Windows features found only in later versions.

"Building a new browser for a 10-year-old OS that came with IE6 didn't make sense to us because of the limitations of its graphics and architectures. Building for the future of the web does make sense.” said by Dean Hachamovitch.

You can get it from Microsoft’s official download site. Choose your language, specify which Windows version you’re running (32-bit or 64-bit), and click Download.

you can read pros and cons of IE 9 from :


Also with IE 9.. The first look at IE10, however, runs only on Windows 7.
you can preview it from http://ie.microsoft.com/testdrive/

Monday, April 11, 2011

Test your antivirus Auto Protection using EICAR test string

  • Open a text editor such as Notepad.
Do not use a word processor, such as Microsoft Word or WordPad, to create the file. Word processors add extra header information to the file, which will cause it to not be detected.

  • Copy the following text into your text editor.


  • Save the Notepad file say "test.txt"
  • Exit the Notepad

The first 68 characters is the known string. It may be optionally appended by any combination of whitespace characters with the total file length not exceeding 128 characters. The only whitespace characters allowed are the space character, tab, LF, CR, CTRL-Z. To keep things simple the file uses only upper case letters, digits and punctuation marks, and does not include spaces. The only thing to watch out for when typing in the test file is that the third character is the capital letter "O", not the digit zero. 

If your antivirus program warns you that it auto-protect your system by finding virus called "EICAR testing string virus", you will come to know that your antivirus software is installed correctly and working fine.. else you need to check your security settings. and also need not to worry much as EICAR string is most trust-able harmless virus (!!) :-)

To know more you can view :

Wednesday, April 6, 2011

Mozilla Firefox 4 - Just too quick launch by Mozilla..

It was a last month in the never-ending Internet browsers race. First, Firefox 4 was finally launched on 22nd March,2011  – last of the next generation browsers to hit the market,  trailing behind Chrome 10 and Internet Explorer 9.

I was using Firefox 3.6.16 and was prompted to upgrade to a newer version. I agreed to up-grade to 3.6.16 but when I went to download this I was fed Firefox 4. I have tried using 4 for for a weeks on my Sony VAIO laptop running 4GB of RAM and core 2 duo processor with OS Windows Vista x64..

It takes alot of memory in start up almost 240 MB.. which is a big amount to open just google.com.. also not supporting persona so well.. It seemed to be actually slower and didn't play well with the "persona" I wanted to use.. It also doesn't have "Save and Quit" option where you close multiple tabs..another issue is like open with new window and open with new tab are in different in the order.. I was used to click on second option and now it's too difficult to change my habit.. I had opened 6/10 links in new window while I was trying to open in new tab..

I have just uninstalled 4 and reinstalled 3.6.16. One can download 3.6.16 from FileHippo or similar source or you can directly go with official site

To make faster startup for firefox you need to disable add ons.. read more from

Hope to get some improvement from Mozilla.. I should say it's the worst firefox version till the date..

Tuesday, March 29, 2011

Hide a User from the Welcome Screen in Windows XP

 To hide a user's account from the welcome screen in Windows XP:

   1. Open Registry Editor.
   2. In Registry Editor, navigate to the following registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList

  • Create the following entry:
  • Username: REG_DWORD

(Where Username is the username of the user you want to hide from the Welcome Screen).

   1. Assign a value of 0.
   2. Close Registry Editor.
   3. Reboot.

This will prevent the user from showing up on the welcome screen.

Monday, March 28, 2011

How to get rid from too many advertise on website

Too many ad annoying you on any site? mostly websites are having ad banners which make you stuck in the web traffic.. specially when you connect your system with mobile and surfing the net.. ads take lots of time to load.. pop up blocker is the one way to block pop up window advertise but when you get advertises on the pages you have to do little work..

I personally don't like videos streaming automatically with page load.. which take huge amount of time.. to avoid such situation after few R & D on google.. I found few ways.

  1. First of all install Mozilla firefox.. (Firefox is well known for addon support.) 
  1. Install Adblock Plus ( which stops ad displaying from google, adhitz, chitika and many more providers)
  1. Install Flashblock add on (which doesn't allow flash to be loaded automatically)
  1. Install TubeStop add on (Restrict videos to auto stream with page load)
Now surf the websites which has lots of advertises on the page.. say way2sms, various blog sites. and check.. you won't find any ad display around.

Alternatively if you want to hide all the images or flash from all tabs.. you can do with image flash blocker...

Mostly for those who likes to download from the net, finds issue that many embarrassing photos or videos  pop up in front and sometimes it's hard to open such site in a social environment..
This is also helpful when you are running with limited bandwidth internet connection or low speed internet connection..
Hope this is useful..

    Wednesday, March 16, 2011

    Google's Self-Driving Car

    Google had announced in October, 2010 that it’s been building robotic cars that have been driving themselves around California.. — down curvy Lombard Street in San Francisco, across the Golden Gate Bridge, along the Pacific Coast Highway, around Lake Tahoe and from Google’s Mountain View headquarters to Santa Monica (a 350-mile trip).

    With Google Software Engineer Sebastian Thrun as the driving force behind the effort to develop autonomous cars, commuters can look forward to this science fiction dream soon becoming a reality. Thrun is working with a team of engineers who gained successful results in the Pentagon’s DARPA Challenges, a competition which sought to “leverage American ingenuity to accelerate the development of autonomous vehicle technologies that can be applied to military requirements,”


     "Our automated cars use video cameras, radar sensors and a laser range finder to “see” other traffic, as well as detailed maps (which we collect using manually driven vehicles) to navigate the road ahead. This is all made possible by Google’s data centers, which can process the enormous amounts of information gathered by our cars when mapping their terrain."

    "Our automated cars, manned by trained operators, just drove from our Mountain View campus to our Santa Monica office and on to Hollywood Boulevard. They’ve driven down Lombard Street, crossed the Golden Gate bridge, navigated the Pacific Coast Highway, and even made it all the way around Lake Tahoe."

    Google hasn’t really shown us much of what these cars are capable of on the road. Now, courtesy of Danny Sullivan at SearchEngineLand, we can see the system flexing its muscles, from both outside and inside a demo car. 

    Here are few videos on youtube related to Google self-driving car.

    You can read more from google official blog

    Other source :

    Tuesday, March 15, 2011

    Is your computer Male or Female ???

    Hi Friends. Well if you are wondering if there is any catch to the above line. I must say not. Basically every computer is given a gender along with other specifications. The inbuilt voice in the computer determines the gender of your computer.It is basically attributed with Microsoft Windows and I am not sure if you can find it out on other OS. So if you want to know what gender your computer is then here is a code for you...

    •   Open Notepad.
    •   Type or copy-paste: CreateObject("SAPI.SpVoice").Speak"I am Computer"
    •   Save as saycomputer.vbs
    •   Run the file.
    Guess what...???!!
    If you hear a male voice, you have a boy;
    If you hear a female voice, you have a girl


    it's really funny and new stuff.. 

    now apart from fun let's see Technical Reason behind it..

    it just use windows default speech to text converter voice. it's not about male or female..;-)
    you can get settings from
    Control Panel -> Speech
    see the following image..

    now one more interesting stuff..


    strMessage =Inputbox("Enter your message","Input Required")
    CreateObject("SAPI.SpVoice").Speak strMessage


    Save file as mycustommessage.vbs
    Double click it to run.
    when you run.. it ask for the input.. and will play according to input text of that message box.. 
    it's just VB-Script fun.. 
    Enjoy.. :-)

    Thursday, March 3, 2011

    pfSense 2.0-RC1 Now Available!

    Chris Buechler has announced the availability of the first release candidate for pfSense 2.0, a FreeBSD-based operating system for firewalls:

    For those who don't know about pfsense.. Some description for you..

    pfSense is a firewall/router distribution based on a fork of the m0n0wall (m0n0wall is an embedded firewall distribution of FreeBSD) project.

    pfSense includes most all the features in expensive commercial firewalls, and more in many cases.  All of these things are possible in the web interface, without touching anything at the command line.

    The official Announcement is :

    Years and many thousands of hours in the making, pfSense 2.0 Release Candidate 1 is now available! Most of the mirrors are synced up and have it available now, with the remaining couple syncing within the next few hours.

    This is considered a stable release suitable for production use, as we’ve already widely deployed it over the past several months in beta and upgraded numerous systems to RC1 over the weekend. This is the preferred version for new installations at this point.
    For existing 1.2.x users, upgrading will be a smooth process for most if not all scenarios. Some portions of the configuration are considerably different now than in 1.2.x releases, and we suspect there may be some configuration upgrade problems remaining, though we aren’t aware of any specific issues at this time and have tested a wide variety of configurations. If you encounter any upgrade issues, please post to the 2.0 board on the forum with information.
    Please report any problems, questions or comments to the 2.0 board on the forum.

    Here is the Download Link..

    New installs

    Friday, February 25, 2011

    How do I move a blog between accounts?

    The short answer is that you can do this by making the blog in question a team blog, with two members, then removing the original team member.
    In detail, the process goes like this:
    1. Sign in to Blogger with Account 1, which we'll assume is the account containing the blog.
    2. Go to the Settings | Permissions tab. 
    3. Click the Add Authors button and send an invitation to the owner of Account 2, the account to which you'd like to move the blog.  
    4. Wait for the owner of Account 2 to accept the invitation. If you're sharing a computer, you'll need to sign out of Account 1 first, or each use a different browser.
    5. Once Account 2 has joined the blog, Account 1 can log in again and go back to the Settings | Permissions tab.
    6. Click the grand admin privileges link next to Account 2. 
    • You'll still see any posts made on the blog by Account 1 with Account 1's display name. Account 2 can delete and repost these posts if they'd like to change the display name.
    • Account 1 cannot be removed until Account 2 has admin rights, since every blog must have at least one admin member at all times.
    • Photos uploaded with Account 1 will break if that account is deleted. If you want your old photos to display after adding Account 2, you'll have to leave Account 1 active.

    For more you can see from official blog support  :
     How do I move a blog between accounts?

    Thursday, February 24, 2011

    Microsoft Windows 7 Service Pack 1 released to public

    As of February 22, 2011, Finally Microsoft has released Service Pack 1 for Windows 7 to the public today.. Service Pack 1 for Windows 7 is available to the general public from the Microsoft Service Pack Center.

    Windows 7 SP1 includes previously released security, performance, and stability updates, plus some improvements to features and services.

    Microsoft suggests that individuals just let the normal Windows update system handle installation of the service pack. However, if you’d like to accelerate the process you can download the file and install it manually. The install will take around 30 minutes and you will have to reboot the PC during the process.
    Depending on what method is used to install the service pack, you will need anywhere from 750MB to 7400MB of available disk space storage to complete the installation procedure, so plan accordingly. If you have a pre-release version of SP1 installed, you will have to uninstall it before you install the latest version.
    Also note that some antivirus software will prevent SP1 from being installed properly, so you may want to temporarily turn off your antivirus while the installation takes place.

    Microsoft Releases Windows 7 Service Pack 1 To The Public Via Windows Update

    Those of you on the P2P bandwagon may already be running your PCs off Windows 7 Service Pack 1, but the rest of us have had to wait until today to grab the latest update from Redmond. The update is available to download now through Windows Update, although you can also download it manually from the Microsoft website.

    The size of the update will vary from machine to machine, which is why Microsoft recommends that you download it through Windows Update, so that you don’t grab any unnecessarily large files that you don’t need.

    Most people can expect to download roughly 1GB, so you may want to leave Windows to do its thing whilst you’re not using the internet if you have a slow connection speed.

    You won’t see any drastic changes to Windows 7 after downloading the update, just a number of security fixes and the usual service pack maintenance. Still, you’ll probably want to get the update as soon as possible.

    Microsoft says the standalone update package should weigh in at 527MB for x86 users, about 903MB for x64 users, and 511MB for users on Itanium chips. In Windows Update, the download sizes are much smaller.

    Are you planning to install Windows 7 Service Pack 1 immediately? Have you already installed SP1? Did you come across any problems; can you share any caveats with your peers about the installation process?

    Direct Download Links - Windows 7 SP1

    Download SP1 RTM ISO (32-bit & 64-bit)

    Courtesy :

    Monday, February 21, 2011

    ESPNcricinfo extension for Firefox and Google Chrome - Live Cricket Score

    Working from an office or for any other reason, and unable to watch the live telecast of Cricket matches on television or the live streaming of Cricket matches online?
    This time Worldcup 2011 you won't miss from office too.. just install addon in firefox or chrome and get live updated score without refreshing sites or clicking anywhere..

    The official ESPN Cricinfo Firefox and chrome extension. alerting you the moment anything happens in the world of cricket, along with live scores and wicket alerts.


    Friday, February 18, 2011

    Protection stpes from Conficker / Kido / Downadup Virus : Conficker Worm Attack Getting Worse

    Conficker is a most common virus now a days which hits your system. stop system and antivirus update by making DNS entry of own in local system and worst is it keeps download latest trojans and viruses in your system.


    First, it attacks a vulnerability in the Microsoft Server service. Computers without the October patch can be remotely attacked and taken over.

    Second, Conficker can attempt to guess or 'brute force' Administrator passwords used by local networks and spread through network shares.

    And third, the worm infects removable devices and network shares with an autorun file that executes as soon as a USB drive or other infected device is connected to a victim PC.

    Conficker and other worms are typically of most concern to businesses that don't regularly update the desktops and servers in their networks. Once one computer in a network is infected, it often has ready access to other vulnerable computers in that network and can spread rapidly.

    Home computers, on the other hand, are usually protected by a firewall and are less at risk. However, a home network can suffer as well. For example, a laptop might pick up the worm from a company network and launch attacks at home.

    Kido worm also known as Downadup, Downup and Conficker is continuing to spread more rapidly than ever, even though its already several months since it was first spotted. More than 9 million PC’s have been infected and Panda Security reporting infection rates of 6% in two million computers scanned via their website. China (the probable country of origin) is the most infected.

    Downadup or Kido is remarkable in it’s sophistication. It can infect computers even if Autoplay feature is disabled for USB devices, by pretending to be a folder. It spreads via network as well as usb devices (pen drives, mp3 players etc). It resets your system restore points, disables Windows update, Windows Defender, Windows Security Center and even manipulates certain TCP settings to block access to security websites. It is also known to change access permissions. New variants even disable Firewall and may interface with Antivirus scans.

    As soon as any removable drive is interted it creates a file called autorun.inf and a folder RECYCLED (commonly used by the system to store Recycle Bin files). It then goes on to create another file {SID<....>}RANDOM_NAME.vmx inside the RECYCLED folder. Most antivirus softwares would be able to detect this *.vmx file, but once a system is infected won’t be properly able to eliminate the worm (thus you would end up with new detection everytime you insert a USB device).

    Like most worms once Kido infects a machine it calls home and may download malicious files to the infected computer. What is really interesting is that, Kido uses a complicated algorithm to create a large list of new domain names everyday. The script to be downloaded may be hosted on any one of these domain names, thus making things even harder for the good guys. Kido also launches a brute force dictionary attack in order to guess the administrator password. Hence, it would be a good idea to change your administrator password to a non-dictionary word right now.

    Kido worm has been dubbed as an epidemic and is the biggest worm epidemic in recent years. And it’s still evolving. Kaspersky is reporting that new variants have been spotted which further enhance the original worm’s funtionality. The new variants generate as many as 50,000 domain names everyday (compared to 250 in the older variants) from which it can download updates.

    How to Check Your system is infected?

    Go to http://update.microsoft.com/microsoftupdate to verify your settings and check for updates.
    if you can't access try any antivirus site
    for example

    if you are not able to access above sites where your net is running smooth with yahoo and orkut then your system may be effected with Conficker Kido Virus..

    Technical Details of Conficker is :


    Upon execution, Downadup creates copies of itself in:

      • %System%\[Random].dll
      • %Program Files%\Internet Explorer\[Random].dll
      • %Program Files%\Movie Maker\[Random].dll
      • %All Users Application Data%\[Random].dll
      • %Temp%\[Random].dll
      • %System%\[Random].tmp
      • %Temp%\[Random].tmp

    * Note: [Random] represents a randomly generated name.

    Each file's timestamp is amended to match the timestamp of the %System%\kernel32.dll file. The worm then creates autorun entries in the registry, which ensure that a copy of the worm is executed at every system startup.

    The worm then attach itself to the following processes:

      • svchost.exe
      • explorer.exe
      • services.exe


    Conficker.C is designed to spread by exploiting a vulnerability in the Windows Server Service which allows remote code execution. It is the vulnerability MS08-067.

    Additionally, Conficker.C carries out the following actions:

        * It checks the system date in the following web addresses:
          and if the system date is after January 1, 2009, it will attempt to connect to a website in order to download a malicious executable file. The website to which it connects varies depending on the system date.
        * It disables the following services:
          - Windows update, disabling the Windows updates.
          - BITS (Background Intelligent Transfer Service), which is a service to transfer Windows files.
          - Error reporting service, which allows to send Microsoft information about errors occurring in the operating system, Windows components and programs.
        * It prevents the user and the computer from connecting to the websites that contain any of the following text strings:
          As they are security related websites, the antivirus programs could not be updated and the user could not access the information of these pages.
        * It modifies the security policies of the user accounts. In order to access the user accounts, it uses the following weak passwords:
          00000, 0000000, 00000000, 0987654321, 11111, 111111, 1111111, 11111111, 123123, 12321, 123321, 12345, 123456, 1234567, 12345678, 123456789, 1234567890, 1234abcd, 1234qwer, 123abc, 123asd, 123qwe, 1q2w3e, 22222, 222222, 2222222, 22222222, 33333, 333333, 3333333, 33333333, 44444, 444444, 4444444, 44444444, 54321, 55555, 555555, 5555555, 55555555, 654321, 66666, 666666, 6666666, 66666666, 7654321, 77777, 777777, 7777777, 77777777, 87654321, 88888, 888888, 8888888, 88888888, 987654321, 99999, 999999, 9999999, 99999999.
          a1b2c3, aaaaa, abc123, academia, access, account, Admin, admin, admin1, admin12, admin123, adminadmin, administrator, anything, asddsa, asdfgh, asdsa, asdzxc.

          backup, boss123, business.

          campus, changeme, cluster, codename, codeword, coffee, computer, controller, cookie, customer.

          database, default, desktop, domain.

          example, exchange, explorer.

          files, foobar, foofoo, forever, freedom.



          ihavenopass, Internet, internet, intranet.


          letitbe, letmein, Login, login, lotus, love123.

          manager, market, money, monitor, mypass, mypassword, mypc123.

          nimda, nobody, nopass, nopassword, nothing.

          office, oracle, owner.

          pass1, pass12, pass123, passwd, Password, password, password1, password12, password123, private, public, pw123.

          q1w2e3, qazwsx, qazwsxedc, qqqqq, qwe123, qweasd, qweasdzxc, qweewq, qwerty, qwewq.

          root123, rootroot.

          sample, secret, secure, security, server, shadow, share, student, super, superuser, supervisor, system.

          temp123, temporary, temptemp, test123, testtest.


          windows, work123.


          zxccxz, zxcvb, zxcvbn, zxcxz, zzzzz.

    Infection strategy

    Conficker.C creates a random DLL in the Windows system directory. This file is created with system, read-only and hidden attributes.

    It also creates a file with random name and VMX extension in the folder RECYCLER\%random name% of all the shared and removable drives of the computer. It is copied with system, read-only and hidden attributes. Additionally, it creates an AUTORUN.INF file in these drives. This way, it is run whenever any of them is accessed.

    On the other hand, it creates a scheduled task in the folder Tasks of the Windows directory in order to start its execution periodically.

    Conficker.C creates the following entries in the Windows Registry:

        * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
          %random name% = rundll32.exe %letra unidad%\RECYCLER\%random name%\%random filename.vmx
          By creating this entry, Conficker.C ensures that it is run whenever Windows is started.
        * HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
          TcpNumConnections = 0x00FFFFFE
        * HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
          Image Path = %sysdir%\svchost.exe -k netsvcs
        * HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
          ServiceDll = %name of the drive%\RECYCLER\%random name%\%random filename%.vmx
          By creating these two entries, it is registered as a service.

    Conficker.C modifies the following entries from the Windows Registry in order to make its detection more difficult:

        * HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\Advanced\Folder\Hidden\SHOWALL
          CheckedValue = 1
          It changes this entry to:
          CheckedValue = 0
        * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
          SuperHidden = 1
          It changes this entry to:
          SuperHidden = 0
        * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
          Hidden = 1
          It changes this entry to:
          Hidden = 0
          It hides the files and folders with hidden attribute.

    Means of transmission

    Conficker.C spreads by exploiting the vulnerability called MS08-067, which is a vulnerability in the Windows server service. In order to do so, it sends malformed RPC requests to other computers. If any of them is vulnerable, it will download a copy of the worm to the system.

    Additionally, Conficker.C also spreads through the system drives, both shared and removable, making copies of itself in them. It also creates an AUTORUN.INF file in order to be run whenever any of them is accessed.

    Here is Symantec, Panda and Mcafee Report

    Discovered:     November 21, 2008
    Updated:     July 9, 2010 9:15:40 AM
    Also Known As:     Win32/Conficker.A [Computer Associates], W32/Downadup.A [F-Secure], Conficker.A [Panda Software], Net-Worm.Win32.Kido.bt [Kaspersky], WORM_DOWNAD.AP [Trend], W32/Conficker [Norman]
    Type:    Worm
    Infection Length:    Varies
    Systems Affected:    Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Vista, Windows XP

    W32.Downadup, also known as Conficker by some news agencies and antivirus vendors, is an extremely interesting piece of malicious code and one of the most prolific worms in recent years. It has an extremely large infection base – estimated to be upwards of 3 million computers - that have the potential to do a lot of damage. This is largely attributed to the fact that it is capable of exploiting computers that are running unpatched Windows XP SP2 and Windows 2003 SP1 systems. Other worms released over the past few years have largely targeted older system versions, which have an ever decreasing distribution.


    W32.Downadup spreads primarily by exploiting the Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability, which was first discovered in late-October of 2008. It scans the network for vulnerable hosts, but instead of flooding it with traffic, it selectively queries various computers in an attempt to mask its traffic instead. It also takes advantage of Universal Plug and Play to pass through routers and gateways.

    It also attempts to spread to network shares by brute-forcing commonly used network passwords and by copying itself to removable drives.

    It has the ability to update itself or receive additional files for execution. It does this by generating a large number of new domains to connect to every day. The worm may also receive and execute files through a peer-to-peer mechanism by communicating with other compromised computers, which are seeded into the botnet by the malware author.

    The worm blocks access to predetermined security-related websites so that it appears that the network request timed out. Furthermore, it deletes registry entries to disable certain security-related software, prevent access to Safe Mode, and to disable Windows Security Alert notifications.

    PANDA Antivirus says :

    Common name:    Conficker.C
    Technical name:    W32/Conficker.C.worm
    Threat level:    High
    Alias:    W32.Downadup,Net-Worm.Win32.Kido.cn,WORM_DOWNAD.AD,
    Type:    Worm

    It exploits the vulnerability MS08-067 in the Windows Server Service in order to spread itself. It also spreads through shared and removable drives. It reduces considerably the protection level of the computer, modifies the security policies of the user accounts and attempts to download another type of malware to the affected computer.
    Affected platforms:    

    Windows 2003/XP/2000/NT/ME/98/95
    First detected on:    Dec. 31, 2008
    Detection updated on:    Dec. 22, 2010
    Statistics    Yes
    Proactive protection:    Yes, using TruPrevent Technologies


    The most critical and obvious protection is to make sure the Microsoft patch is applied. Network administrators can also use a blocklist provided by F-Secure to try and stop the worm's attempts to connect to Web sites.

    First and foremost thing is self care about the system

    Downadup copies itself to removable drives as a random file name and also copies an autorun.inf file to the drive so that it runs every time the drive is inserted into a computer. It also uses a social engineering technique to trick the user into running the file. The malware author makes the executable worm file look like an innocent folder. Unsuspecting users will then double click on the folder icon thinking that it indeed is a folder, rather than the executable file that it is.

    Most users just double click on the pop-up box that appears when they insert a removable drive into a computer without reading the pop-up box carefully. But even those that are savvy computer uses and read the pop-up box carefully may still be mislead into thinking that they are opening a folder instead of actually running a file.

    so be sure that you don't click on any autorun file. or better you disable autorun on your system for all drives. check out the link if you don't know how to do that..

    If your computer does not have an up-to-date antivirus solution, or does not have an antivirus solution at all, you can either use a special removal tool (which can be found here or follow the instructions below:

    Delete the following system registry key:
    Delete “%System%\.dll” from the system registry key value shown below:
    [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost]
    Reboot the computer.
    Delete the original worm file (the location will depend on how the program originally penetrated the victim machine).

    Delete copies of the worm:
    %Program Files%\Internet Explorer\.dll
    %Program Files%\Movie Maker\.dll
    %All Users Application Data%\.dll
    is a random string of symbols.

    Delete the files shown below from all removable storage media:

    To remove conficker with a conficker remover, check out the following urls to Download downadup/conficker remover tools:
    Symantec W32.Downadup Removal Tool 

    F-SECURE Malware Removal Tool: 

    Microsoft’s Malicious Software Removal tool: 

    Remover conficker applications may be regularly updated to make conflicker virus removal efficient in removing new variants of this worm. Make sure to check out the respective developers’ site of these virus conficker removal tools.

    Courtesy :
    Above information was collected from almost 100s of sites.. so can't type each link here..  Mostly information from microsoft, symantec, f-secure, mcafee, panda, experts-exchange.com. cnet, pcworld and also few blogs.