Windows Support Tools

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 27 November 2008

Indian politicians must mind their own business and not of Sri Lankan affairs

Posted on 23:57 by Unknown

Dr.Madhuri S.Balaji, India’s Consultant on Diabetes says that Sri Lankan government should end the terrorism menace once and for all and not provide any opportunity for its ugly head to rare again for ever. She said most of the Indian politicians are shedding crocodile tears on Sri Lankan Tamils but their aim is to grab more Tamil votes for political power.
"Most Indians have no idea about Sri Lankan conflict and sufferings of Tamil in Sri Lanka. At present government forces have already 90 percent of the land area and near to close the terrorist activities in Sri Lanka," she said.

Dr. Balaji who is based in Chennai said during in the past 23 years, no development has taken in the uncleared areas under the LTTE control in Sri Lanka. Most of the Tamils were harassed, hammered, threatened and intimidated by the LTTE and the entire world knows about them.

“Why President Bush took over Iraq and killed Sadamm Hussain ? He wanted to spread American power, she said.

Speaking to media in Chennai on Thursday, she said daughter of the late Rajiv Gandhi has visited to the prison and met Nalini Murugan, a hardcore LTTE operative. After the meeting sources commented that was a different peculiar political agenda.

Responding to media, she said Sri Lanka must end the terrorism and form a Singapore model state to cater the people of the country.
She said, "Singapore caters all segments of the ethnic groups. It is a country which has a multi cultural society.

She said at present, Sri Lankan government fully caters all minorities.

"Tamils are part of the government of Sri Lanka .Why Indian politicians and the government is worrying on Sri Lankan Tamils, she asked.

She said, "in fact Tamil Nadu politicians must cater their constituents, district, state and the country as a whole."

Most of them are looking about Sri Lankan Tamils while ignoring their own problems, she explained.
Read More
Posted in | No comments

HTC expecting to ship 1 million G1s by the end of 2008

Posted on 23:27 by Unknown

Revising their previous target of 600,000 HTC G1s shipped by the end of 2008, HTC CEO Peter Chou has disclosed that the company now expects to ship at least 1 million of the world’s first Android handset by year’s end.

Of course, these numbers may seem a bit low if you’re still going on the false idea that pre-orders alone reached 1.5 million, a count which blazed across the internet as a result of some faulty calculations in a Motley Fool story.

While it’s not quite as mind-boggling as the 1 million iPhone 3Gs Apple sold in just 3 days after launch, pushing one million handsets in 2 1/2 months is no small feat. According to a comment made by Steve Jobs in July, the original iPhone broke the 1 million mark in 74 days, which also works out to just about 2 1/2 months. By units shipped, the first Android phone is looking to be as much of a success as the first Apple phone.

So why might HTC be seeing an increase in orders? Traditional factors (like marketing) aside, I’d imagine that much of the success stems from worth-of-mouth triggered by Android Market applications. When a handset does something cool, owners show it off; the easier it is to add more cool stuff to the device, the more likely it is that people will be saying “Hey! Check this out.” As more intriguing applications make their way to the market, demand for Android handsets will go up as a result.
Read More
Posted in | No comments

Verizon Omnia announced, coming December 8th

Posted on 22:01 by Unknown

At long last, the Samsung Omnia has made its away across an ocean, through the torture labs of the FCC, and onto the delivery trucks en route to a Verizon store near you. VZW announced today that the Omnia will be hitting shelves in just under two weeks (December 8th), with orders starting now for $249.99 on a 2-year contract.

If Windows Mobile 6.1 Professional is your thing, it’s a pretty tough toss-up between the Omnia and the HTC Touch Pro. Both are solid pieces of hardware running custom interfaces on top of Windows Mobile; while I prefer HTC’s TouchFLO interface over Samsung’s TouchWiz, the Omnia has that big ol’ screen.

It’s really too bad it takes so long for phones to make it through the US vetting process; in the many months it took for the Omnia to make it stateside, they already blasted out a revised model with pumped up specs for Korea.
Read More
Posted in | No comments

Story or no story, the Verizon BlackBerry Storm OS has issues

Posted on 21:44 by Unknown

it’s time to move on. The bottom line is that everyone who snagged a Storm from Verizon ended up with v4.7.0.65. The indisputable caveat - v4.7.0.65 has issues. No firmware is perfect and no future firmware revision will ever be completely bug-free, but what we can tell you is that the folks at RIM and Verizon know v4.7.0.65 might be just a little sub-par. How do we know they know? Why else would they be issuing OS updates just a few weeks after releasing the handset? That’s right people, we got our hands on a preliminary internal communique detailing a series of updates coming soon to a Verizon Storm near you. The first in fact, will likely come next week - just a few short weeks after the launch. Basically, RIM and Verizon have targeted a variety of major issues and will address them through a series of OTA software updates. The list below is split up between issues that will definitely be resolved with the first update next week and issues that will be resolved in a second OTA update that will likely arrive later in December. Hit the jump for the break down and rest a bit easier knowing that whether or not the various issues with v4.7.0.65 are deal breakers for you, Verizon and RIM know there are problems are are working to fix them.

Note that the following is not a complete list of issues that will be covered in the upcoming OS updates. Instead, this is a list of issues being circulated internally at Verizon to ensure that employees do not authorize any Certified Like-new device exchanges for customers citing any of the following as their problems… The first is our favorite by far and no, the last one isn’t a joke - it’s really on there.

Issues to be resolved by the first OTA update (Maintenance Release 1) - December, week 1:

* If a customer receives a call while listen to music at low volume using a wired headset, the music volume may suddenly increase to the highest level (!). Interim recovery instructions: Lower the volume using the buttons on the side of the handset.
* When using voice-activated dialing, incoming audio may be muted. Interim recovery instructions: Enter the menu and select “Activate Handset or Speaker”.
* The handset may reset itself while sitting idle or while using multimedia applications. No interim recovery instructions provided.

Issues to be resolved by a subsequent Maintenance Release:

* Customers may intermittently lose email connectivity via CDMA and/or international roaming modes. Interim recovery instructions: Main menu -> Manage Connections -> Select mobile network -> Turn radio off, then Turn radio on. If this does not resolve the issue, pull the battery.
* When powering on the handset, the radio sometimes does not turn on. Interim recovery instructions: Main menu -> Manage Connections -> Select mobile network -> Turn radio on. If this does not resolve the issue, pull the battery.
* Pressing the send key while the device is in landscape mode will open the phone application in portrait mode, but the speed dial function may not work. Interim recovery instructions: Press escape until the home screen appears, then press the send key with the handset in portrait orientation.
* Sometimes entering characters on the virtual keyboard doesn’t work. Interim recovery instructions: Re-select the character.
Read More
Posted in | No comments

The BlackBerry Storm has issues - at least six of them, in fact

Posted on 21:32 by Unknown

With hype comes scrutiny. Build consumer interest in a device up to that which Verizon has built the BlackBerry Storm, and you’re bound to hear the complaints. The Storm has been on the shelves for less than a week, and forums around the web are already littered with word of reproach.

A list of the issues that RIM has recognized as software flaws has been passed out to Verizon employees to keep them from accepting them as reasons to exchange the customer’s device. Of course, this list made its way out almost immediately. According to the document, we can expect the first set of fixes to come in Week 1 of December.

Far more interesting than the problems themselves are the interim solutions. Key press not recognized? Solution: Press it again!

Issues to be resolved by the first OTA update (Maintenance Release 1) - December, week 1:

* If a customer receives a call while listen to music at low volume using a wired headset, the music volume may suddenly increase to the highest level (!). Interim recovery instructions: Lower the volume using the buttons on the side of the handset.
* When using voice-activated dialing, incoming audio may be muted. Interim recovery instructions: Enter the menu and select “Activate Handset or Speaker”.
* The handset may reset itself while sitting idle or while using multimedia applications. No interim recovery instructions provided.
Read More
Posted in | No comments

2007 Year-End Zeitgeist

Posted on 03:13 by Unknown

"Zeitgeist" means "the spirit of the times", and Google reveals this spirit through the aggregation of millions of search queries we receive every day. We have several tools that give insight into global, regional, past and present search trends. These tools are available for you to play with, explore, and learn from. Use them for everything from business research to trivia answers.

2007 Year-End Zeitgeist

We're bidding adieu to 2007 with a look back at the breaking news, the big events and the must-have gadgets that captivated us this year (give or take a few weeks; we compile this list by early December). To get a glimpse of what's been on our collective consciousness, we mined billions of search queries to discover what sorts of things rose to the top. We encourage you to check out our findings to see if you, too, reflect the zeitgeist — the spirit of the times.


Fastest Rising (global)

1. iphone
2. badoo
3. facebook
4. dailymotion
5. webkinz
6. youtube
7. ebuddy
8. second life
9. hi5
10. club penguin

Fastest Rising (U.S.)

1. iphone
2. webkinz
3. tmz
4. transformers
5. youtube
6. club penguin
7. myspace
8. heroes
9. facebook
10. anna nicole smith

Fastest Falling (global)

1. world cup*
2. mozart
3. fifa
4. rebelde*
5. kazaa
6. xanga
7. webdetente
8. sudoku
9. shakira
10. mp3

*featured in our 2006 fastest-rising list
Methodology


In compiling the 2007 Year-End Zeitgeist, we studied the aggregation of billions of search queries people conducted on Google. We should note that no individual searcher's information was made available to us. Except where noted, all of these search terms are most popular for Google.com in the U.S.
Read More
Posted in | No comments

Google Drops Truth Bomb over iPhone API

Posted on 02:13 by Unknown
It hasn’t been too long since Google launched its iPhone search app missile and struck targets deep inside my heart. Like most missiles, it blew a lot of weak, defenseless things into oblivion (I’m looking at you, Google search bar in Safari). But also like a lot of missiles, it came with its fair share of fall-out.

Apple yanked the app briefly, causing all sorts of firestorms. Then Daring Fireball played tattle-tale and told the world about how Google was exploiting the iPhone’s proximity sensor to activate the voice search, which breaches the iPhone’s API.

Yesterday, Google decided to send in the troops to put down the rebellion. Honesty, it seems, would be their weapon of choice. Not like they care what you think, but they totally did break the API, on purpose and everything. All is not lost, however, as the spokesman referred all questions and comments to the palm of his hand.

It’s not clear yet if Apple was down with this or not, but what is clear is that you developers out there likely shouldn’t try the same thing. After all, you don’t have your own CEO planes and cellphone platforms to fall back on.
Read More
Posted in | No comments

Amazon Fulfillment Web Service (Amazon FWS)

Posted on 01:46 by Unknown



Amazon Fulfillment Web Service (Amazon FWS) allows merchants to access Amazon.com’s world-class fulfillment capabilities through a simple web services interface. Merchants can programmatically send order information to Amazon with instructions to physically fulfill customer orders on their behalf.

Registered merchants already use Fulfillment by Amazon to send inventory to Amazon’s fulfillment centers, and when orders are placed (on Amazon.com or through other merchant sales channels), Amazon will pick, pack and ship the products to the merchant’s customers—anytime and to any place. FBA frees merchants from managing the order fulfillment process while still maintaining control over their inventory. Amazon FWS extends the benefits of FBA by allowing merchants to integrate FBA capabilities directly into their own web sites or other sales channels. This enables merchants to automatically store inventory in Amazon’s warehouses and ship orders to customers, creating a nearly virtual business. There is no charge for using Amazon FWS; only fees for the underlying FBA services apply.


Amazon Fulfillment Web Service Functionality

With Amazon FWS, merchants can directly integrate with the FBA system, allowing them to automatically process shipments to Amazon and then out to customers. This functionality is contained in two key APIs: the inbound service and the outbound service.

Inbound Service

The inbound service allows merchants to create and send inbound shipments of inventory to Amazon’s fulfillment centers.

* Create shipments of inventory to Amazon fulfillment centers
Our tools make it easy for merchants to ship inventory to Amazon with everything from label creation to packing slips. Merchants can also take advantage of Amazon’s highly discounted UPS shipping rates.

Outbound Service

The outbound service allows merchants to use Amazon’s fulfillment processing for orders sold on the merchant’s website or other non-Amazon channels.

* Submit fulfillment order/shipment requests
By integrating the outbound service API into merchant software, customer orders are processed in real time, informing Amazon what to ship and where to ship it.

* Track and manage shipment requests
After orders leave our fulfillment centers, merchants can track shipments and keep their customers aware of arrival times.

* Upload branding information
Merchants have the option of branding the packing slips on Amazon.com boxes so their customers always know who they are buying from.

Top
Service Highlights
Flexible

Amazon FWS allows you to manage all aspects of inbound and outbound fulfillment activity. The service provides a variety of inventory management tools and allows you to designate which orders Amazon should fulfill, giving you the flexibility to use as much or as little of the underlying Fulfillment by Amazon service as you want. Amazon FWS also supports multi-channel selling by enabling you to sell products simultaneously on your own sites as well as on Amazon.com – with Amazon fulfilling both channels.

Scalable

Amazon FWS can scale with your customer demand, allowing you to ship from a few items a week to millions of orders per year. By integrating Amazon FWS’ API directly into your shopping cart or order management system, there is no lag time while waiting to process or batch orders. Amazon will ship your products anywhere, at any time.

Reliable

Using Amazon FWS, your inventory receives the same care as Amazon.com inventory. Amazon.com processes millions of orders a year via sophisticated online order processing and fulfillment operations. From the advanced web-to-warehouse, high-speed picking and sorting system to complete shipping carrier integration, Amazon’s technology results in your customers getting what they ordered, when they ordered it.

Secure

Your inventory is securely stored and managed in Amazon’s climate-controlled fulfillment facilities and your customer orders are processed confidentially.

Easier to sell your products on Amazon.com

Registered merchants can streamline the process of selling on Amazon.com by having Amazon fulfill your orders so you don’t have to. Customer orders are processed seamlessly as Amazon picks, packs, and ships your products. Plus, products that are fulfilled by Amazon qualify for all of Amazon’s buyer shipping and customer promotions (such as free Super Saver shipping and Amazon Prime) and Amazon takes care of customer service and returns.
Read More
Posted in | No comments

Amazon Takes the Humans Out of Fulfillment With New API

Posted on 01:45 by Unknown

keeps adding to its Web services. Today, it is opening up an API for its Fulfillment by Amazon service, which allows online merchants to outsource their shipping to Amazon’s fulfillment centers. Up until now, the service still required a lot of manual steps on the parts of companies or entrepreneurs using it—they had to pre-label each box before sending it to Amazon and manage their inventory manually through software.

Now, with the new Amazon Fulfillment Web Service, an entrepreneur’s computers can talk directly to Amazon’s computers. Requesting orders to be shipped, tracking orders, and even printing branded labels at Amazon can now be done automatically. Frankly, I am surprised this was a manual process to begin with.

By tying directly into other companies’ inventory and ordering systems, which are in turn tied to their Websites, Amazon is in effect creating a Web version of EDI (electronic data interchange). EDI, which was the standard way for big manufacturers to gain visibility into their suppliers inventory, was expensive and only available to really big corporations. Web services like this one are bringing those information efficiencies across the entire economy to small and medium sized businesses as well. It is yet one more way that small companies loosely joined can enjoy the benefits that were once only available to large corporations. More Web services, please.
Read More
Posted in | No comments

How Telnic Will Revolutionize Dialing

Posted on 00:17 by Unknown

And because the data are in a standardized format easily downloadable, people will no longer need to enter and update their contact information on lots of different sites nor search painstakingly through a corporate Web site looking for a contact number.

This has lots of intriguing repercussions for businesses and individuals. Case in point: Instead of firing up, say, PizzaJoint.com on a PC to find the phone number and address of a local pizza parlor, customers will be able to go to PizzaJoint.tel and the contact details will pop into their phones. Telnic says that third-party applications are already being developed that will automatically import contact information from .tel into the Research in Motion (RIMM) BlackBerry and Apple (AAPL) iPhone. Contact details are represented as hot links, so clicking on a phone number will launch a call.
Easy and Cheap

New .tel addresses are also likely to spring up for categories of companies. A London hotel, for instance, might ensure that visitors can find it by registering with http://hotels.tel, which would then encourage users to call for reservations or click over to the hotel's Web site. One advantage for companies, Hayward says, is that information on .tel doesn't need to be managed by the IT department (unlike a Web site), so changes can be made easily and cheaply. "We built the technology so that all you have to do is fill in a form with contact information and press save," says Hayward.

Needless to say, one of the biggest concerns is privacy. Telnic says its battle-tested technology leaves control over the dispersal of contact information in the hands of the domain owner, who can set different levels of access. So, for example, friends and family could have full view of all of an individual's contact details, while other information is hidden from business contacts, unknown Web surfers, or search engines.

Like other domain names, .tel will be sold via designated registrars, which have to meet certain criteria and be approved by ICANN. On Oct. 22, Telnic announced that 100 registrars have already signed up to sell the .tel domain name in Europe, Asia, and the U.S. Among them are U.S.-based Network Solutions, which ranks third-largest in the world in number of domains under management, and new entrants such as Digitrad, a Paris-based voice-over-Internet communications software company.
"Multimedia Phone Number"

Digitrad says it opted to be a registrar for .tel because it sees the potential for its own clients. It plans to use .tel domains to channel different forms of communication into a single interface, says Micha Benoliel, the company's chief executive. For example, if a consumer agrees to include his location information, Digitrad will leverage the .tel information by providing a "multimedia phone number" that will ring wherever the person happens to be—at his desk, in the office, or on his mobile. A call can also be put through directly to a person's computer whenever or wherever they are connected.

For each purchase of a .tel domain by a business customer, Digitrad will provide a vanity phone number, a virtual switchboard, a unified voicemail system, click-to-call solutions, and voice-over-IP services. Benoliel says both .tel and Digitrad's own services will serve as a complement to existing Web sites, making it easier for clients to contact a business.

And, of course, Digitrad, like other registrars, will make money by selling the .tel address to individuals and businesses. Registration opens on Dec. 3 for businesses with registered trademarks. From Feb. 3 to Mar. 23, the so-called "land rush" period, businesses and individuals can sign up for an elevated fee that will differ from registrar to registrar. Digitrad, for example, plans to charge €300 ($397) for a one-year subscription. But after Mar. 23, Digitrad's price will drop to just €1 ($1.32) per month. The advantage to signing up early is that names are doled out on a first-come, first-serve basis. Other registrars may charge differently, but the range is expected to fall within $15 to $25 a year, says Telnic's Hayward.
Read More
Posted in | No comments

Wednesday, 26 November 2008

Dozens of People Killed in Mumbai Attacks

Posted on 23:09 by Unknown

At least 101 people were reported killed in blasts and gun attacks across south-central Mumbai late Wednesday evening, as unidentified terrorists took hostages in two of the area's most popular hotels for business travelers and tourists.

Police and gunmen were exchanging occasional gunfire at Taj Mahal and Oberoi hotels and an unknown number of people were held hostage, said A.N. Roy, a top police official. Officials said at least six militants had been killed since the overnight attacks began around 9:30 p.m. Pradeep Indulkar, a senior official at the Maharashtra state Home Ministry said 101 people were killed and 287 injured.

Thursday morning, police loudspeakers declared a curfew around Mumbai's landmark Taj Mahal hotel, and black-clad commandos ran into the building as fresh gunshots rang out from the area, apparently the beginning of an assault on gunmen who had taken hostages in the hotel. Ambulances were seen driving up to the entrance to the hotel and journalists were made to move even further back from the area.

A series of explosions had rocked the Taj Mahal just after midnight. Screams were heard and black smoke billowed from the century-old edifice on Mumbai's waterfront. Firefighters sprayed water at the blaze and plucked people from balconies with extension ladders. By dawn, the fire was still burning.

The attackers specifically targeted Britons and Americans at the hotels and restaurant, witnesses said.

An Indian media report said a previously unknown group calling itself the Deccan Mujahideen had claimed responsibility for the attacks in emails to several media outlets. There was no way to verify that claim.

The NDTV news channel showed several yellow and black rubber dinghies on a beach near the hotels, apparently used by the terrorists to reach the area.

Authorities had earlier believed seven to 15 foreigners were hostages at the Taj Mahal, said Anees Ahmed, a top state official. It was also unclear where the hostages were in the hotel, which is divided into an older wing, which was in flames, and a modern tower that was not on fire.

Indian Hotels Co. Thursday said it is monitoring the situation in and around its Taj Mahal Hotel. The company is cooperating with the police and the government "to ensure the safety and security of all our guests and staff," it said in a statement.

The fire broke out on the top floor of the Taj Mahal hotel, spreading along the side of the old part of the building. The lobby of the Oberoi was also reported to be in flames. Mr. Roy told NDTV television that at least seven incidents had taken place. He said police were treating those responsible as terrorists who had "opened fire indiscriminately."

Indian Home Affairs Minister Shivraj Patil said the attackers had kept explosives in vehicles and had been firing at people in the hotels.

Shots were also fired at the Leopold restaurant, one of the most popular with foreign visitors to the city. Other incidents were reported at a cinema, a hospital and at the main train terminus in the area.

Mr. Roy said police continued to battle the gunmen. "The terrorists have used automatic weapons, and in some places grenades have been lobbed. The encounters are still going on and we are trying to overpower them," Mr. Roy said, according to the AP. India's army has been requested to be on stand by to help civilian authorities.

Media reports said gunmen seized the Mumbai headquarters of the ultra-orthodox Jewish outreach group Chabad Lubavitch overnight, and that shots were heard coming from the building Thursday. Representatives of the New York-based group referred questions to their Web site, which said the Israeli consulate had earlier been in touch with the rabbi who lived in the house, "but the line was cut in middle of the conversation. No further contact has since been established."

One guest at the Taj said the first incident began at about 9:45 p.m. local time when flashing lights and bangs were visible and audible outside the hotel. Taxi drivers, who wait in droves in front of the hotel, roared off. About 10:20 p.m., there were two loud explosions right outside the hotel, the guest said. "My instant reaction was, "It's a bomb,'" he said. A hotel representative later phoned, advising guests to remain in their rooms with the lights off and not to open the door until told by security that it was safe to do so. At 12:45 a.m. local time Thursday, another big blast was reported by a guest at the Taj.

In Washington, State Department spokesman Robert Wood said the U.S. is unaware of any American casualties at this point. "We strongly condemn the terrorist attacks" and stand ready to support India, he said.

Indian television reports said a little-known outfit called Deccan Mujahideen had sent a letter claiming responsibility for the attacks but the reports could not be confirmed and no other information was immediately available. The Deccan Plateau is a plateau that covers a large part of southern India, including Maharashtra.

The attacks come after a series of blasts attributed to Islamist terrorists over the summer and autumn in other cities around India, including the capital, New Delhi. National security already was expected to be a major electoral issue when the nation goes to the polls early next year; elections must be held before May. The Congress Party, which leads coalition governments at the national level and in Maharashtra state, home to Mumbai, is already facing pressure to do more to staunch terrorism.

The attacks will put further pressure on the battered Indian rupee at a time when foreign fund inflows have dried up amid the escalating global financial crisis. The benchmark Sensex index on the Bombay Stock Exchange, which is in the area where the attacks took place, has fallen more than 50% from its peak foreign funds pulled out.

The 105-year-old Taj hotel is one of India's most iconic buildings, commissioned by the Tata family to counter the British colonists" exclusionary "whites only" policy at what was then the city's best hotel, Watson's Hotel. The hotel has been expanded to include a modern tower next to the old hotel. The hotel is owned by Taj Hotels, part of India's leading conglomerate, Tata Group.

Opened in 1903, the Taj Mahal Hotel overlooks the Arabian Sea. The hotel has 565 rooms and is home to some of the city's most exclusive, expensive restaurants as well as the popular Insomnia nightclub. Many dignitaries and celebrities visiting India stay there.

Mumbai is a frequent target of attacks. In March 1993, 13 explosions resulted in 257 deaths and over 700 injuries. The blasts were orchestrated by an organized crime syndicate. In March, 2003, a bomb attack on a commuter train in Mumbai killed 11 people. In August of that year, twin car bombings in Mumbai killed at least 52 people and injured 150. Indian officials blamed a Pakistan-based terror outfit for the crime. In July 2006, seven bomb blasts occurred at various places on the Mumbai Suburban Railway, killing 200 people.
Read More
Posted in | No comments

Exchange 2003 Message Tracking and Logging

Posted on 22:39 by Unknown

As an Exchange Aministrator you know the question from your Exchange users "where is my message which I sent to Mister X and Mister W". With enabled Exchange Message Tracking you can tell your users whether the e-mail has left your Exchange organization or not. OK, this feature is not helpful after the message has left your Exchange organization and there are many more hops where the message could be rejected or deleted, but it gives you the certainty that you are not responsible for delay.

Message Tracking can be enabled on the Exchange Server object in Exchange System Manager or with the help of System Policies for more than one Exchange Server. You can read more about Implementing Exchange System Policies here.

To enable Exchange Message Tracking, start the Exchange System Manager and navigate to the Server object on which you want to activate Message Tracking.

Now you can enable Message Tracking and Subject Logging. If you enable Subject logging and display, the subject of every message will be displayed in the Exchange Message Tracking Center.

Please note that enabling of Subject Logging can produce some processing overhead on highly used Exchange Servers and you must also ensure that your security policy allows the logging of e-mail subjects.

You must specify the number of days after old logfiles will be deleted.

The Default Logfile directory is c:\program files\ExchSrvr\Servername.LOG.

whitEpanda67
Read More
Posted in | No comments

How to enable message tracking in Exchange 2000 Server and in Exchange Server 2003

Posted on 21:46 by Unknown
The message tracking feature available in Microsoft Exchange Server 5.5 has been implemented in Microsoft Exchange 2000 Server with some differences. In Exchange Server 5.5, the message tracking was a per-component feature and had to be enabled at two separate locations (in the information store and in the message transfer agent [MTA]) for complete tracking to occur. In Exchange 2000, there is a single location for enabling message tracking.

To enable message tracking in Exchange 2000:

1. Start Exchange System Manager.
2. Locate the Servers container.

NOTE: The Servers container can be at the top level if no Administrative Groups are defined or displayed. If Administrative Groups are defined or displayed, the container can be found in the relevant Administrative Group container.
3. Expand the Servers container to see the list of servers.
4. Click the server on which you intend to enable tracking.
5. Right-click the server, and then click Properties.
6. On the General tab, click to select the Enable Message Tracking check box.
7. Ensure that the log file maintenance information suits the needs for logging.

NOTE: By default, log files older than seven days are deleted.

APPLIES TO

* Microsoft Exchange Server 2003 Standard Edition
* Microsoft Exchange 2000 Server Standard Edition
Read More
Posted in | No comments

Tuesday, 25 November 2008

A Free Social Utility for Your Time-Based Life

Posted on 22:43 by Unknown

Everybody's talking about timeXchange.net, the best way to manage and organize all your day-to-day time expense activities in one highly accessible yet secure online service. Here's just a sampling of what we hear everyday from members.
Read More
Posted in | No comments

Exchange Server Archiver Beta - available now

Posted on 22:16 by Unknown
This is a beta, you should not attempt to run this on your live Exchange servers.
Read More
Posted in | No comments

FlashLynx Video Download Software - Free

Posted on 22:15 by Unknown

FlashLynx is powerful, yet easy to use, online video downloader which allows you to select the domain (ie. YouTube.com), region and even category. You can then preview the video before choosing to download. The program saves the video on your hard drive as an .flv file but FlashLynx also allows you to convert the video file as you download to avi, wmv, mp4 and many other formats.

This free video file download tool also allows you to add your own specific URL to download videos from. If you have searched a specific topic on a domain you can add the url of the page displaying the results to FlashLynx which will then allow you to preview and download content

This video download software is completely free.
Read More
Posted in | No comments

53+ Great Web 2.0 Feeds

Posted on 22:00 by Unknown
43 Folders. A different look into the minds of freelancers.
http://www.43folders.com/rss.xml

A List Apart. Since 1998 they’ve been promoting the proper use of web design methods. Their ideas are original and they’ve set in motion many critical layout standards.
http://www.alistapart.com/feed/rss.xml

AfterDawn. Optical Media meets Web 2.0.
http://rss.afterdawn.com/afterdawn_news.xml

Apple Hot News Ticker. Get the good stuff directly from the source. The Apple blog will keep you up to date with Official Apple announcements and product releases.
http://wdirect.apple.com/home/2008/ticker.rss

AppleInsider. Looking for iPhone, iTunes, or just Apple Rumors in general, AppleInsider is one of the authority blogs covering this topic.
http://www.appleinsider.com/appleinsider.rss

Ars Technica. Ars Technica is looked up upon for creating original content in the Technology industry.
http://feeds.arstechnica.com/arstechnica/BAaf

BetaNews.
http://www.betanews.com/rss2

BoingBoing. Looking for something totally unique, BoingBoing publishes interesting tidbits found from around the web.
http://feeds.boingboing.net/boingboing/iBag

CenterNetworks.
http://www.centernetworks.com/rss.xml

CodeBetter.
http://codebetter.com/blogs/MainFeed.aspx


Coding Horror.
http://feeds.feedburner.com/codinghorror/

Consumerist. Consumerist has gained trust from many people by making Corporate wrongdoings public knowledge. Consumerist has also connected companies with their customers in an effort to solve a variety of different issues.
http://consumerist.com/index.xml

Copyblogger. “Copywriting Tips for Online Marketing Succes.” That’s their tagline, that’s what they’re all about.
http://feeds.copyblogger.com/Copyblogger

Daily Blog Tips.
http://feeds.feedburner.com/DailyBlogTips

EcoGeek.
http://feeds.feedburner.com/EcoGeek

Engadget.
http://www.engadget.com/rss.xml

Fast Company.
http://www.fastcompany.com/rss.xml

Freelance Folder.
http://freelancefolder.com/feed/

Freelance Switch.
http://freelanceswitch.com/feed/

GigaOM.
http://gigaom.com/feed/


InformationWeek.
http://www.informationweek.com/rss/all.xml

Joystiq.
http://www.joystiq.com/rss.xml

Lifehacker.
http://lifehacker.com/index.xml

MacRumors : Mac News and Rumors.
http://www.macrumors.com/macrumors.xml

Mashable!
http://feeds.feedburner.com/Mashable

Neowin.
http://www.neowin.net/fb.php?page=all

NewTeeVee.
http://newteevee.com/feed/

Official Google Blog.
http://googleblog.blogspot.com/feeds/posts/default

Official Google Webmaster Central Blog.
http://googlewebmastercentral.blogspot.com/feeds/posts/default


ProBlogger Blog Tips.
http://feeds.feedburner.com/ProbloggerHelpingBloggersEarnMoney

Read/WriteWeb.
http://readwriteweb.com/rss.xml

Scobleizer.
http://scobleizer.com/feed/

Search Engine Journal.
http://www.searchenginejournal.com/feed/

Seth’s Blog.
http://feeds.feedburner.com/typepad/sethsmainblog

SimpleBits.
http://simplebits.com/xml/rss.xml

TechCrunch.
http://feeds.feedburner.com/TechCrunch

Techdirt.
http://www.techdirt.com/techdirt_rss.xml

Techmeme.
http://www.techmeme.com/index.xml


Jason Calacanis Weblog.
http://www.calacanis.com/rss.xml

Mozilla Blog.
http://blog.mozilla.com/feed/

The Unofficial Apple Weblog.
http://www.tuaw.com/rss.xml

TorrentFreak.
http://feed.torrentfreak.com/Torrentfreak/

VentureBeat.
http://venturebeat.com/?feed=rss

Webware.
http://www.webware.com/8300-1_109-2-0.xml

Wired Culture.
http://www.wired.com/news/feeds/rss2/0,2610,2,00.xml

Wired Top Stories.
http://www.wired.com/news/feeds/rss2/0,2610,,00.xml

Woot! Fullfill your urge to buy cheap stuff that’s probably going to break real soon (b/c you’re not always blogging, are you?).
http://www.woot.com/Blog/Rss.aspx

Geek Condition You’re looking at it. If you’ve gotten this far chances are you think GC is
interesting. Why not add our feed and have nicely packaged articles show up
in your feed reader every day?
http://feedburner.com/xrrg1

Y Combinator Startup News. It’s like Digg but chock full of startup cheese.
http://news.ycombinator.com/rss

Yahoo! News: Apple/Macintosh News.
http://rss.news.yahoo.com/rss/applecomputer

Yahoo! News: Internet News.
http://rss.news.yahoo.com/rss/internet

YouTube :: Blog.
http://www.youtube.com/rss/global/our_blog.rss

AnyWired.
http://feeds.feedburner.com/Anywired

Your Feed Here.
Leave a comment and tell us why you should make the list.
Read More
Posted in | No comments

Google Health Has Arrived

Posted on 21:49 by Unknown

Organizing your medical history is extremely important and most people just assume that somewhere there’s a huge organized file with all their information. Unfortunately that’s not the case. Yes there is a ton of information but it isn’t held in any central location. Most medical records reside in the place at which you were treated or a main office located somewhere in another state. If you are involved in a medical emergency … there will be a scurry to obtain your medical records from the many different places you have received treatment. Organizing your medical data with Google will at least give you and your health professionals somewhere to start and then go and verify that data.
Read More
Posted in | No comments

Where does your time go?

Posted on 20:28 by Unknown
Time passes, quickly. It's a limited resource and the most precious and undervalued asset. As much as we hate to admit, we're prone to wasting it without the slightest awareness of it.

The way you use your time determines who you are. The way you feel, what others say about you when you're not there, how you create value for the people around you, your family, your friends, your boss, your colleagues, the world around you.

A survey by America Online and Salary.com shows the average worker wastes approximately 2.09 hours a day, not counting lunch. This is twice as much time as their employers expect.


Top time-wasting activities

Surfing Internet (personal use)
44.7%
Socializing with co-workers
23.4%
Conducting personal business 6.8%
Spacing out 3.9%
Running errands off-premises 3.1%
Making personal phone calls 2.3%
Applying for other jobs 1.3%
Planning personal events 1.0%
Arriving late / Leaving early 1.0%
Other
12.5%

Surfing the web is the primary time-wasting activity and the biggest distraction for 44.7% of more than 10,000 employees involved in the survey. In Serbia, Google is where people spend most of their time online, followed by YouTube, Yahoo and Windows Live.
Top time-wasting excuses

Don't have enough work to do 33.2%
Underpaid for amount of work 23.4%
Co-workers distract me 14.7%
Not enought after-work time 12.0%
Other 16.7%
Making personal phone calls 2.3%

They say there are a thousand excuses for every failure, but never a good reason. Nicely put for sure, but excuses aside, is it productive to work 8 hours a day non-stop, without expanding your horizons?
Time management at Inbox

Here at Inbox, employees are given complete control over their time. It's results that matter. Normally, we constantly work on our internal process and productivity. To monitor performance we use TimeTracker, our proprietary project and task management software rolled out years ago.

It runs on JAVA and MySQL and has been unimaginably important to us, making it easier to organize tasks around projects, both tiny and huge.
Why is it so cool?

The mega-cool thing about the software is not only the discipline and self-mastery it inspires, but also the statistics that it gives you about what your little empire builds on. These you can print or save in pdf or xls formats to view either attendance reports or reports by employee, activity, client, project and department. This way you get to monitor both time and results.

At the management level, a quick glance at these reports is all you need to know everything that's going on in your business. That simple. Take a test drive. You'll love it.
Conclusion

In his book Starting to manage, Gerard M. Blair says time management does not solve your problems. It reveals them, and provides a structure to implement and monitor solutions. It enables you to take control of your own time - how you use it is then up to you.

Some days are likely to spin out of control. But the truth is you have a choice and probably want to spend your time the right way.

We know we do! After all, it's only 24 hours a day. Wink
Read More
Posted in | No comments

Defend against web-based threats and block undesired content

Posted on 01:13 by Unknown

Google has acquired Postini, a global leader in on-demand communications security and compliance solutions.

"With the addition of Postini, our apps can streamline the complex information security mandates within organizations," Eric Schmidt, CEO of Google.


Google Apps security services, powered by Postini, provide your organization with spam and virus filtering, email content filtering, encryption, email archiving and web security. Together, these services help your organization be more secure, compliant, and productive using your existing email infrastructure. As a service, there is nothing to install or maintain, so you can focus on strategic activities that drive your business.
Read More
Posted in | No comments

Monday, 24 November 2008

FREE 1 Year BitDefender Antivirus 2009 Genuine License for EVERYONE

Posted on 02:40 by Unknown

As far as I know, BitDefender Antivirus is very sensitive and can detect a lot of viruses including those that are not really a virus (false positive). I once installed BitDefender on my computer and a lot of my non-virus files (cracks and keygens) were automatically deleted. Even the ZoneAlarm Pro 2009 keygenerator by SnD which I downloaded earlier was detected as trojan.generic.912879 and automatically deleted!

The first thing you should do after installing BitDefender is to configure the action should it take when detect a threat because automatically deleting a file by default without a user’s consent is a bad move. Believe it or not, I immediately uninstalled BitDefender Antivirus and never use it again. Don’t get me wrong. BitDefender is good but it’s not suitable for people like me who are constantly downloading and testing “stuff”. It is more suitable for basic computer user that just wants to keep the computer clean from viruses.

Looks like this week is full of freebies. ZoneAlarm Pro 2009, NOD32 Antivirus, and now free BitDefender Antivirus 2009 license that is valid for a year. The latest BitDefender Antivirus 2009 normally cost $24.95 for a year but it will be totally free if you follow the steps which I am about to show you.
Read More
Posted in | No comments

FREE ESET NOD32 Antivirus v2.7/3.0/4.0 Username and Password with 6 Months Subscription for EVERYONE

Posted on 02:37 by Unknown

ESET security products such as NOD32 Antivirus and Smart Security are like one of the easiest program to use for free without buying a license or cracking it. You can request for the free trial username & password and when it expires, you can request another one. Unlike Kaspersky, once the trial has been activated and expired, the trial can never be activated the second time unless you use the illegal Kaspersky Trial Reset tool. There are also websites that offers lists of NOD32 username and password for free but with very short subscription period.

Last week I’ve shared with you all on how to obtain a 3 months free ESET NOD32 Antivirus username and password. Guess what, today I’ll share with you on how to get a 6 months free NOD32 username and password. The process is a little long but I think it is worth it because I am sure you get to LEARN something and also how to get a 6 months NOD32 license for free. I’ve been researching on this for the past 4 days until late night to get it right, my eyes are so tired that they are twitching all the time but I am glad that I got the steps written down to share it with you all.

1. First, you need to find a working open China proxy and set it to your web browser. Roinstrument is a good proxy server list website that lists the well-known proxy. Look for those with “cn” beside the proxy which means it is a China proxy server. Here is how you set your web browser to use the open proxy.
Internet Explorer: Go to Tools > Internet Options > Connections tab > LAN settings > Check Use a proxy server for your LAN. Enter the proxy address and also the port.
Firefox: Go to Tools > Options > Advanced > Network tab > Click Settings button > Select Manual proxy configuration and enter the proxy and port.

Enter the 4 digit code shown at the image and click the button below. You will then get a 24 digit activation code. (By clearing your browser’s cookies and cache, you can get new 24 digit activation code. Otherwise it’ll keep on generating the same 24 digit serial number) Remember to remove the proxy from your web browser once you’ve got the 24 digit activation code. The 24 digit activation code has a 5 days shelf life. If you don’t activate it within 5 days, the activation code cannot be activated anymore.
Read More
Posted in | No comments

Microsoft to offer free security

Posted on 01:33 by Unknown

In a surprise move, Microsoft has announced it will offer a free anti-virus and security solution from the second half of next year.

It will stop selling OneCare, its all-in-one security and PC management service, from the end of June 2009.

The new software, code-named Morro, will be a no-frills program suited to smaller and less powerful computers.

The software will be free to download and will support Windows XP, Vista and Windows 7.

The move comes as sales of the OneCare subscription service are flagging - reportedly because the anti-virus marketplace is already flooded with big-name players such as Symantec and McAfee.

Since its launch in May 2006, OneCare has garnered less than 2% of the security software market share.

In a statement, Microsoft said that Morro would be designed specifically to be a small-footprint program that uses fewer system resources. This, it said, would be ideal for users with low-bandwidth connections or computers without much processing power.

That will be of particular interest to consumers buying comparatively low-powered "netbook" computers.

Amy Barzdukas, senior director of product management in the online services division at Microsoft, said: "This new, no-cost offering will give us the ability to protect an even greater number of consumers, especially in markets where the growth of new PC purchases is outpaced only by the growth of malware."
Read More
Posted in | No comments

Sunday, 23 November 2008

Posted on 23:35 by Unknown

Cheers were heard across the Internet earlier today when Google’s new SearchWiki search interface inexplicably vanished. Perhaps, just maybe, it was gone for good. Or at least when it returned it would have an opt out feature.

Nope. Neither. It’s back and it’s still impossible to get out of it short of logging out of Google entirely. Lovely comments like the one above now scar Google’s once pristine search results page.

Here’s how you can get rid of SearchWiki for good if you were unfortunate enough to accept it in the first place: use a Greasemonkey script created by Austrian developer Franz Enzenhofer and just click a button to turn it off. Instructions are here.

This should hold you over until Google adds an opt-out button.
Read More
Posted in | No comments

Microsoft To Rebrand Search. Will It Be Kumo?

Posted on 23:16 by Unknown

Microsoft will relaunch Windows Live Search under a new brand sometime early next year, says a source within the company. What we don’t know is what that new brand will be, although a few names have been thrown around. According to our source, a “final” decision has been made, but very few people inside of Microsoft are aware of it, and it could change.

Now LiveSide is saying there’s evidence the new search brand will be Kumo, which means “cloud” or “spider” in Japanese.

Why would Microsoft go through yet another rebranding effort? Live.com has a lot of different services under its umbrella (some server software, some client software) in addition to search. It’s also a burgeoning social network.

Over time, we’ve heard, Live.com will become a pure social network and personal productivity portal. You’ll go there to access email, calendar, photos, activity streams, etc. But search belongs somewhere else, and it definitely needs a fresh start.

Microsoft won’t comment on the name change, or even if there is a name change. But our sources caution us that nothing has been finalized, and the fate of Yahoo could swing this one way or another as well. So Kumo may very well be the name Microsoft is planning to use, but that decision may change.
Read More
Posted in | No comments

Gmail exploit may allow attackers to forward e-mail

Posted on 23:09 by Unknown

A Gmail security vulnerability may allow an attacker to set up filters on users' e-mail accounts without their knowledge, according to a proof of concept posted Sunday at GeekCondition.com.

In his post, Brandon writes that the vulnerability has caused some people to lose their domain names registered through GoDaddy.com.

Without posting the full exploit, here is the key as Brandon explains it relies on obtaining the variables that represent the user name and "at":

When you create a filter in your Gmail account, a request is sent to Google's servers to be processed. The request is made in the form of a url with many variables. For security reasons, your browser doesn't display all the variable contained within the url. Using FireFox and a plugin called Live HTTP Headers, you can see exactly what variables are sent from your browser to Google's servers.

After that, an attacker just needs to identify the variable that is the equivalent of the username.

"Obtaining this variable is tricky but possible," he writes. "I'm not going to tell you how to do it, if you search hard enough online you'll find out how."

The "at" variable can be obtained by visiting a malicious Web site, writes Brandon, who suggests that Google make the "at" variable expire after every request rather than after every session.

To avoid being a victim of the vulnerability, users should check their filters often, Brandon suggests. Firefox users can download an extension called NoScript that helps prevent these attacks, he said.

Of course, any Web site that uses cookies for authentication requests can be taken advantage of in the same way. To avoid becoming a victim to this type of exploit, Gmail users should logout of their accounts when they are not in use, and--of course--not visit Web sites that they don't trust.

Google representatives did not immediately return a request for comment
Read More
Posted in | No comments

Samsung launches 256GB solid-state drive

Posted on 23:04 by Unknown

Samsung on Wednesday night said it has begun mass-producing 256GB solid-state drives. This size tops the largest-capacity SSDs found in laptops today.

Samsung currently offers 64GB and 128GB SSDs for laptops.

The new 256GB drives are faster too, the company claims, more than doubling the performance rate of Samsung 64GB and 128GB SSDs.

The drives combine sequential read rates of 220 megabytes per second, with sequential write rates of 200MBps. "This sharply narrows the performance gap between read and write operations to only 10 percent, compared to a read-write speed difference of between 20 (percent) and 70 percent for other SSDs," the company said.

Samsung did not mention random write performance, however. Despite being generally faster than hard-disk drives (particularly at reading data), solid-state drives fall short of hard disks when they randomly write data. Random writes are generally considered to be the Achilles' heel of solid-state drives.

Getting this 256GB SSD in a notebook "is analogous to having a 15,000-(revolutions-per-minute) drive, without all of its size, noise, power, and heating drawbacks," Jim Elliott, vice president of memory marketing at Samsung Semiconductor, said in a statement.

The 256GB SSD boosts data transfer when large multimedia files are simultaneously read and stored. "It can store 25 high-definition movies in just 21 minutes, a significant advancement over a 7,200rpm hard disk drive (HDD), which takes about 70 minutes," the company said in a statement.

The drive's performance is derived from a new single-platform design consisting of a chip controller, NAND flash, and special drive firmware developed by Samsung. "This single platform is designed to easily adapt to Samsung's 40-(nanometer) class NAND flash memory," according to the company.

It consumes 1.1 watts of power, versus 2 or more watts for a comparable HDD. Similar in weight to a 128GB SSD, at 81 grams, the 2.5-inch multilevel cell 256GB SSD has the same 9.5-millimeter drive thickness.

Samsung's 256GB SSD is also available with optional proprietary encryption programming that provides full-disk encryption, a key feature for some corporate users.
Read More
Posted in | No comments

Chat everywhere! With our eBuddy Mobile Messenger and eBuddy Lite Messenger

Posted on 22:58 by Unknown


Welcome to eBuddy, your online messenger for MSN, Yahoo, Gtalk, ICQ, MySpace and AIM (AOL). Whether you're at home, school, work or traveling; with eBuddy you can chat online everywhere anytime. eBuddy is available as a web based and mobile version. eBuddy provides instant messaging on every computer, it even works when you are behind a firewall! eBuddy means no downloads, no installation of software or upgrades and no registration. Best of all it's free .. enjoy :-)

Features

* Rich interface
* Fast response
* Minimal data usage
* Easy to use
* Sound & Vibration
* Group-chat
Read More
Posted in | No comments

Visualizing Facebook from outer space

Posted on 22:43 by Unknown

The globe shows the activity of Facebook users across the planet at 4:37 a.m. PST. The East Coast of the U.S. is a beehive of social activity.

A group of Facebook engineers - Jack Lindamood, Kevin Der and Dan Weatherford - have created a small project called Palantir at a Facebook Hackathon event. The project is named after The palantír of Orthanc, a crystal ball-like object from The Lord Of The Rings (yep, they’re nerds).

Anyway, it’s a video of the earth showing Facebook activity visually and geographically. One view shows activity as dots of light that flow upward. Another view shows connections between people around the globe as it occurs. The images above show a little of it, but you really have to see the video to appreciate it. You can see it here.

Facebook says they are strongly considering productizing this, but for now it isn’t on the roadmap. If they do go forward with it, presumably you’ll be able to watch friend connections happening all over the world.
Read More
Posted in | No comments

Swedish carrier planning iPhone MMS app

Posted on 22:34 by Unknown

Swedish iPhone users may soon have a way to send each other pictures and video via text messaging.

Telia, Apple's carrier partner in Sweden, is going to develop its own MMS (multimedia messaging service) application for the iPhone, according to a report from MacWorld Sweden. The lack of MMS is perhaps one of the most common gripes about the missing features of the iPhone, second only to cut and paste.

But instead of adding that function itself, or allowing a third-party developer to build it for the App Store, Apple is apparently going to let Telia enable MMS on its own. And it doesn't sound like the rest of the world is going to get a crack at that application, based on the translation, which was verified as legit by a few Daring Fireball readers conversant in Sweden.

Telia will have the application up and running in two months, it told MacWorld Sweden. There were MMS options available to those who wished to jailbreak their iPhones, but this is apparently an officially sanctioned way to text pictures to your friends.
Read More
Posted in | No comments

Saturday, 15 November 2008

Punareen under LIONS control

Posted on 06:56 by Unknown


The Sri Lankan Government says its armed forces have entered a strategically important town in the north of the country.

Until now it has been under the control of Tamal Tiger rebels.

Troops entered Tamil Tiger-controlled Punareen this morning according to Sri Lanka's Ministry of Defence.

A statement said soldiers had crossed the marsh lain south of the town during the night and then marched into what was described as the rebels' last bastion on the western coast.

It added that the Tigers were putting up stiff resistance and pitched battles were still going on in the area.
Read More
Posted in | No comments

Friday, 7 November 2008

Featured Freeware: gMote

Posted on 01:05 by Unknown

gMote is one of the easiest to use mouse gesture tools around. gMote's dual-pane configuration interface makes it a snap to create and program mouse gestures, and takes extra steps to teach new users how it works via a prompt on first run to check out the built-in tutorial.

Press the create button, make your mouse gesture in the test window, and then use a pull-down to assign one of the 30-plus actions. The actions center on browser, media player, and word-processing commands. However, program execution, Web site selection, and hot-key combinations are also easily added actions.

To make sure normal mouse movements don't invoke gesture actions, you can chose a key combination, the center mouse button, or the right mouse button to hold as you make the gesture. The gesture draws a temporary line on the screen to help users make the correct movement. The app then helpfully displays the gesture in a pop-up box before invoking the action. Gestures are easily saved in sets and are as easily deleted when no longer needed. gMote warns users when new gestures are too similar to older ones, a sharp feature that's a must in this kind of program.
Read More
Posted in | No comments

Thursday, 6 November 2008

Featured Freeware: Stellarium

Posted on 23:34 by Unknown

Open-source and currently in use by planetarium projectors, cross-platform Stellarium brings astronomer-level features to stargazers of all levels of interest. It's not quite as robust as its competitors, but it's also a much faster program. It doesn't suck away your RAM into a black hole when loading or running. Be aware that it only runs in full-screen mode, making any other programs you're running inaccessible except for the ALT-Tab switcher.

The default catalog includes 600,000 stars, with upgrade modules that can push that up to 210 million stars. The constellations of 10 different cultures are included, as well as illustrations and asterisms to help you visualize what the ancients saw. There's a full Messier catalog of nebulae, too. The dawn, dusk and atmosphere backgrounds were good, but not great on our monitor. They probably look better on a planetarium dome, which is why it's useful that Stellarium also includes a fish-eye view for curved surfaces. Besides equatorial and azimuthal grids, users also get shooting stars when appropriate, eclipse simulation, and skinnable landscapes. Stellarium incorporates star-views from the moon.

The controls are a bit hard to find, but there is a nifty record feature to make your own planetarium shows. Some of the interface features could be revamped and improved, including the somewhat confusing options settings and the hard-to-see interface controls. Users who need something more academic and less distracting than Google or Microsoft's offerings, as well as those who have a need for an open-source planetarium, will be impressed with Stellarium. Fortunately, that could be any of us.
Read More
Posted in | No comments

5 Reasons Obama Is Good For Geeks

Posted on 20:18 by Unknown
Ron Paul seems to be the hands down favorite presidential candidate for many geeks, however Barack Obama sports many geek friendly features as well as strong plans for universal health care, Iraq, poverty, and improving education.

Net Neutrality
Unlike geeks, most regular citizens are unaware of the vital importance of Network Neutrality. Obama has a clear understanding of the implications and has supported bills protecting Net Neutrality in the Senate. While Ron Paul's amazing internet support would not be possible without Net Neutrality, he does not believe the government should prevent big corporations from ruining the internet.

Online Fireside Chats & Town hall meetings
Obama knows typical Americans have little involvement in government and is worried that "messages are filtered through the media, and many times the hard questions are not asked." That's why as president, Obama would hold interactive fireside chats as well as have his national security officials hold periodic national town hall meetings via Web cast to discuss foreign policy.

Online Government Transparency
Obama sponsored the "Google For Government" law which makes records of every dime the government spends available online. This allows the public to keep tabs on where federal tax dollars go and creates better checks and balances for government spending. Obama has also promised to make every bill needing his presidential approval available online for the public to better understand the issue and his presidential stance before he signs it.

Fighting the man
Unless the man is Steve Jobs, the geek community always has it out for the man. Obama believes strongly in fighting the big corporations and special interest groups that control Washington. He does not accept donations from lobbyists and believes that special interests are the biggest obstacles for change and why the government no longer represents the people.

Prove It
Geeks are notorious for the phrase "pics or it didn't happen". With expert fact checking skills, most geeks pride themselves on not being sheeple. While I hear Ron Paul's policies everyday, I have yet to see how he can prove they will be implemented or successful. How does Ron Paul plan on providing reliable public education to poor children with no Department of Education? A better question would be how does he plan to disassemble the government without support of the House and Senate? (Does Ron Paul understand the powers of the president?) Obama has introduced detailed plans for his proposed policies, and his ability to work well with both Democrats and Republicans gives hope that change is possible in Washington.
Read More
Posted in | No comments

Father of iPod Quits Apple, Replaced By Godfather Of PowerPC

Posted on 19:27 by Unknown

Tony Fadell, Apple’s senior Vice President of iPod division, who incidentally is also dubbed as the father of iPod is quitting the company for some personal reasons.

However, Mr. Fadell is resigning from the full time position only, and he will continue to serve the company as an advisor to CEO Steve Jobs.

Mark Papermaster, a former executive of IBM Corp., will be replacing Fadell to join as a new VP of Apple’s iPod division, sources said.

Furthermore, Mr. Fadell’s wife, senior VP for HR at Apple, Danielle Lambert, has also announced her departure at the end of this year; however, Apple says that the pair is leaving their positions to “devote more time to their young family.”

Apple’s CEO Steve Jobs have acknowledged the contributions made by the couple over the past eight years, and said in a statement, “We’re sorry to see Dani go, and are looking forward to working with Tony in his new capacity.”
Read More
Posted in | No comments

Wednesday, 5 November 2008

motorola good mobile launched in sri lanka with Ridgecrest Asia PLC

Posted on 02:52 by Unknown

Motorola's award-winning Good Mobile Messaging software and service helps make enterprise mobile email and application access more personalized and productive, while enhancing IT control.

Get Things Done More Easily. Mobile professionals receive so much email that it’s often difficult to find the information they’re looking for on their smartphone and complete tasks from start to finish. Good 5 introduces innovative email and PIM capabilities that help enable mobile users to easily find what they need when they need it and get work done. New features include:

Group and find by conversation and sender: sorts and groups emails by conversation thread and/or sender, helping users to easily pinpoint important messages and save time by filing and/or deleting an entire thread or group
Complete calendaring: helps invite participants to a meeting, provide real-time visibility into their free/busy status; and automatically suggests and reserves conference rooms based on past preferences and availability
Edit and send documents: securely accesses corporate intranets using Good Mobile Intranet (GMI); enables downloads of Microsoft Word, Excel, PowerPoint, and Adobe PDF documents directly to the smartphone; allows users to edit files and attach them to outbound emails
Dial without password: dials a contact from a password-protected phone without requiring users to enter the password--all while keeping email and contacts data secure
Third-party access to contacts: option to provide third-party applications, such as voice dialing and SMS, with access to Good contacts, helping to enhance device usability

Have a More Personal Experience. Being productive on a smartphone has been challenging in part because the phone doesn’t adapt to users’ specific preferences, needs or workflow the way they are accustomed with a desktop or laptop. Good 5 introduces a number of new customizable features that personalize the mobile experience:

Mobile RSS reader and subscription manager: helps keep users current with information from preferred sources—including business news and alerts. Subscribe to, manage, and preview feeds—all without having to leave the email inbox, launch a third-party application, or navigate a mobile Web browser
Priority mail: helps quickly identify messages that are important to individuals based on their unique preferences; defines and distinctly marks priority mail by sender, distribution list, who’s in the to: or cc: fields, and other user-selected criteria
Personalized notifications: assigns unique sounds and alerts to priority emails, so that users are less likely to miss the emails that matter most

More IT Control. Even with greater usability and personalization, IT doesn’t have to sacrifice control or security. In fact, Good 5 helps provide more control by giving IT professionals all of the advanced device and data protection capabilities previously available only through the Good Mobile Defense product, through a single-management console and complete over-the-air controls. Features include:

Mandatory applications: helps set and enforce the installation of mandatory applications like anti-virus checkers to ensure that users have what they need—both to do their jobs and to comply with corporate security policies Application lockdown: blacklists and prevents the launch of unapproved applications Device lockdown: locks down the camera, infra-red (IR), WiFi and/or Bluetooth wireless technology ports; enforces SD card encryption Advanced password management: enables administrators to set granular criteria for password characteristics, restrictions, and expirations Advanced encryption management: provides rules-based enforcement of SD card and database encryption policies Simplified load balancing: enables IT to move users across servers to facilitate load balancing—without the need to re-provision

“The holy grail of mobile email lies somewhere between complete IT control and unencumbered usability; products that try to close that gap often compromise the mobile experience,” said Rick Osterloh, Senior Director Product Management and Marketing, Motorola Good Technology Group. “With Good 5, we’ve successfully bridged the divide by giving end users the usability and personalization they want, while arming IT with even more manageability and security.”
Read More
Posted in | No comments

CISCO CCNA 4.0 Exploration and Discovery

Posted on 01:57 by Unknown

The Cisco CCNA® Exploration curriculum provides a comprehensive overview of networking.

from fundamentals to advanced applications and services. It is based on a top-down approach to networking that is popular in many colleges and universities. This course emphasizes theoretical concepts and practical application, while providing opportunities for students to gain the skills and hands-on experience needed to design, install, operate, and maintain networks in small-to-medium businesses, as well as enterprise and service provider environments.

CCNA Exploration offers in-depth theory, challenging labs, and a detailed overview of protocol operations. It is designed for students with advanced problem-solving and analytical skills, such as degree candidates in engineering, math, or science, or for working professionals who would like to advance their careers or gain certification. CCNA Exploration was designed to be integrated into technology curricula or continuing education programs at postsecondary institutions such as technical schools, colleges, and universities.

http://rapidshare.com/files/67132292/CISCO.CCNA.4.0.Exploration.And.Discovery.part1.rar
http://rapidshare.com/files/67148470/CISCO.CCNA.4.0.Exploration.And.Discovery.part2.rar

http://rapidshare.com/files/66973646/CCNA.Study.Guide.Exam.640-802.6th.Edition.Aug2007.rar
http://rapidshare.com/files/66973646/CCNA.Study.Guide.Exam.640-802.6th.Edition.Aug2007.rar
Read More
Posted in | No comments

SMS Free Sender 2.6.8

Posted on 01:20 by Unknown

Send SMS messages from your PC with free nice interface everywhere you want. Used gateway is the world's leading provider with coverage to 578 networks in 192 countries worldwide. Register now for free, get immediately 10 free credits. What will this great SMS Sender do for you. Cheap pricing per Message, easy and immediate integration, zero Up Front Cost, fast delivery and control of SMS delivery Enjoy new dimension of SMS sending.
Read More
Posted in | No comments

Tuesday, 4 November 2008

Posted on 23:29 by Unknown

VoxOx is an entirely new way to take complete control of your interconnected lifestyle. Never miss a call. Never miss a text, IM, e-mail or fax. Make a conference call or video chat with the click of a mouse. Call anywhere in the world for pennies... or even better, for free!
Read More
Posted in | No comments

Featured Freeware: Wrapper

Posted on 23:27 by Unknown

Easily combine executables, Registry changes, and commands into a single, tight, executable with this simple freeware. Wrapper's deceptively basic interface resembles nothing more than a generic spreadsheet app. As it doesn't need to be installed, the program is easy to add to a USB toolkit. This is a program for those comfortable with constructing potentially damaging executables.

Though it builds a flowchart of commands, operating Wrapper is not a linear process. Users choose to build projects, or lists of applications, commands, or Registry changes to invoke. The app uses simple press-a-button functionality to add a line to the list. Add File opens a small dialog with numerous check-box-set parameters to browse the executable, set the extract directory if needed, and choose from a short list of Extract parameters. The interface and process is similar to adding a command line process or modifying a Registry setting.

Wrapper doesn't have it all wrapped up, unfortunately. There is no method to force one item to wait until another has finished or to offer any sort of conditional playback. The app also doesn't include error checking, and the only help from the publisher is in Arabic. The interface is in English and some pages include small amounts of program information. Still, experienced users wishing to bind often-used applications into a single executable will find Wrapper easy to learn, simple to use, and a consistent performer.
Read More
Posted in | No comments

Documents To Go Premium now on BlackBerry

Posted on 22:49 by Unknown

BlackBerry users have been waiting for Documents To Go, an excellent document viewer that's been besting native viewers on mobile phones, for years. On Tuesday, Data Viz ended the impatient toe-tapping with Documents To Go Premium Edition 1.005 and its new companion PDF-viewer, PDF To Go.

The Premium Edition of Documents To Go ($49.99 for a yearly subscription or $69.99 for a lifetime license), builds on the Standard Edition that comes preloaded on the BlackBerry Bold (review), which also officially released in the U.S. today.

This pro version lets you read, fully edit, and create new word processing documents, spreadsheets, and slide shows that are compatible with Microsoft Word, Excel, and PowerPoint. In Word To Go, for instance, the spell-checking, track-changing, and copy/paste actions are all there. So is support for formatting with bullets, fonts, and form and table inserts, and support for password-protecting those sensitive documents.

Data Viz is also throwing in the new PDF viewer, PDF To Go, with the Premium Edition. Like most PDF viewers on any platform, PDF To Go supports zooming in and preserves formatting on the BlackBerry by wrapping words.

The standard version of Documents To Go is a bona fide perk for Bold owners, who would be otherwise stuck with the BlackBerry's traditionally rather stunted documents viewers. This premium version is certainly better, creating a seamless, intuitive, and feature-packed document handler. You can see a feature-by-feature comparison of the standard and premium versions here.

Documents To Go Premium Edition is undoubtedly a worthy investment for business folks and road warriors, but it also finds competition in eOffice 4.5, which is available for all BlackBerry operating systems (not just 4.5 and above), and which has most of the same features at a slightly lower price ($39.95). eOffice's additional support Google Docs and Spreadsheets, remote access to PC files, and the ability to fax or print documents from the BlackBerry gives Documents To Go Premium a hard run for your money.

You can try Documents To Go Premium for yourself as a free, thirty day trial. It's compatible with BlackBerry's Bold, Pearl Flip, and Storm smartphones.
Read More
Posted in | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • Receiving Error 'ORA-01041: internal error. hostdef extension doesn't exist.' on re-establishing a connection to Oracle.
    You can receive the error message 'Error ORA-01041: internal error. hostdef extension doesn't exist' when attempting to re-esta...
  • Google Sinks Cash into Undersea Cable
    Google has joined the Unity consortium, which will build a $300 million fiber optic cable linking the US and Japan. The 7.68 Tbps, 10,000 ki...
  • Troubleshooting the Microsoft Exchange Transport Service When It Fails to Start on an Exchange 2007 Hub Transport Server with Event ID 1032 or 1036
    Event ID: 1032 Socket Access Denied. Binding: 0.0.0.0:25. Event ID: 1036 Failed to open one or more bindings. The service will be stopped....
  • C Traps and Pitfalls (Addison Wesley, 1989, English)
    C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual beha...
  • SoftMaker Office 2008 Free Full Version Download With Genuine License Key
    SoftMaker Office 2008 is reliable office productivity software that is designed for beginners and professional users. SoftMaker Office Suite...
  • Amazon Takes the Humans Out of Fulfillment With New API
    keeps adding to its Web services. Today, it is opening up an API for its Fulfillment by Amazon service, which allows online merchants to out...
  • AP Microsoft backs Icahn's bid to oust Yahoo board
    SAN FRANCISCO - Microsoft Corp. threw its weight behind investor Carl Icahn's effort to dump Yahoo Inc.'s board, saying Monday that...
  • Suba Vesak Mangallayak Weewa !!!!
    Keep your heart free from hate your mind from worry, Live simply expect little, give much Fill your life with love forget self, think of ot...
  • How to Remove Dosearches.com homepage (Virus Removal Guide)
    Dosearches.com  is a browser hijacker, which is promoted via other free downloads, and once installed it will change your browser homepage t...
  • Alcohol 120% v5 Blu-ray Burner Free Download with Registration Unlock Code
    Alcohol 120% is a CD and DVD burning, copying, backup, recording, duplication, emulation and creation software for Windows. In addition to c...

Categories

  • ISA Firewall
  • ISA Server 2006
  • Quick Tips
  • Reports
  • Tips

Blog Archive

  • ►  2013 (7)
    • ►  October (6)
    • ►  February (1)
  • ►  2012 (10)
    • ►  September (3)
    • ►  August (3)
    • ►  July (3)
    • ►  June (1)
  • ►  2011 (16)
    • ►  August (2)
    • ►  July (4)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  March (4)
    • ►  January (1)
  • ►  2010 (12)
    • ►  December (3)
    • ►  October (4)
    • ►  March (1)
    • ►  January (4)
  • ►  2009 (67)
    • ►  August (2)
    • ►  July (18)
    • ►  June (23)
    • ►  April (3)
    • ►  March (6)
    • ►  February (7)
    • ►  January (8)
  • ▼  2008 (319)
    • ►  December (30)
    • ▼  November (43)
      • Indian politicians must mind their own business an...
      • HTC expecting to ship 1 million G1s by the end of ...
      • Verizon Omnia announced, coming December 8th
      • Story or no story, the Verizon BlackBerry Storm OS...
      • The BlackBerry Storm has issues - at least six of ...
      • 2007 Year-End Zeitgeist
      • Google Drops Truth Bomb over iPhone API
      • Amazon Fulfillment Web Service (Amazon FWS)
      • Amazon Takes the Humans Out of Fulfillment With Ne...
      • How Telnic Will Revolutionize Dialing
      • Dozens of People Killed in Mumbai Attacks
      • Exchange 2003 Message Tracking and Logging
      • How to enable message tracking in Exchange 2000 Se...
      • A Free Social Utility for Your Time-Based Life
      • Exchange Server Archiver Beta - available now
      • FlashLynx Video Download Software - Free
      • 53+ Great Web 2.0 Feeds
      • Google Health Has Arrived
      • Where does your time go?
      • Defend against web-based threats and block undesir...
      • FREE 1 Year BitDefender Antivirus 2009 Genuine Lic...
      • FREE ESET NOD32 Antivirus v2.7/3.0/4.0 Username an...
      • Microsoft to offer free security
      • Cheers were heard across the Internet earlier toda...
      • Microsoft To Rebrand Search. Will It Be Kumo?
      • Gmail exploit may allow attackers to forward e-mail
      • Samsung launches 256GB solid-state drive
      • Chat everywhere! With our eBuddy Mobile Messenger ...
      • Visualizing Facebook from outer space
      • Swedish carrier planning iPhone MMS app
      • Punareen under LIONS control
      • Featured Freeware: gMote
      • Featured Freeware: Stellarium
      • 5 Reasons Obama Is Good For Geeks
      • Father of iPod Quits Apple, Replaced By Godfather ...
      • motorola good mobile launched in sri lanka with Ri...
      • CISCO CCNA 4.0 Exploration and Discovery
      • SMS Free Sender 2.6.8
      • VoxOx is an entirely new way to take complete cont...
      • Featured Freeware: Wrapper
      • Documents To Go Premium now on BlackBerry
      • Trillian is a fully featured, stand-alone, skinnab...
      • Configuring ActiveSync on a Windows Mobile 5.0 Sma...
    • ►  October (45)
    • ►  September (12)
    • ►  August (18)
    • ►  July (27)
    • ►  June (15)
    • ►  May (7)
    • ►  April (55)
    • ►  March (65)
    • ►  January (2)
  • ►  2007 (10)
    • ►  December (2)
    • ►  November (8)
Powered by Blogger.

About Me

Unknown
View my complete profile