Friday, 17 June 2011

what is Trojan horse ??

Trojan horse (computing)
A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system.[1] The term is derived from the Trojan Horse story in Greek mythology.
[edit]Purpose and uses
[edit]Adware
A horse may modify the user's computer to display advertisements in undesirable places, such as the desktop or in uncontrollable pop-ups, or it may be less notorious, such as installing a toolbar on to the user's Web browser without prior notice. This can create revenue for the author of the Trojan, despite it being against the Terms of Service of most major Internet advertising networks, such as Google AdSense.[2]
[edit]Security
Trojan horses may allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, a hacker may have access to the computer remotely and perform various operations, limited by user privileges on the target computer system and the design of the Trojan horse.
Operations that could be performed by a hacker on a target computer system include:
  • §  Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks)
  • §  Data theft (e.g. retrieving passwords or credit card information)
  • §  Installation of software, including third-party malware
  • §  Downloading or uploading of files on the user's computer
  • §  Modification or deletion of files
  • §  Keystroke logging
  • §  Watching the user's screen
  • §  Crashing the computer

Trojan horses in this way require interaction with a hacker to fulfill their purpose, though the hacker need not be the individual responsible for distributing the Trojan horse. It is possible for individual hackers to scan computers on a network using a port scanner in the hope of finding one with a malicious Trojan horse installed, which the hacker can then use to control the target computer.[3]
As mentioned earlier on, the term "Trojan horse" was taken from a clever Greek plan described by Homer in the Iliad. After seemingly abandoning the siege of Troy, the Greeks placed armed men inside a huge wooden horse. The horse was welcomed into the city by the Trojans, who believed it was a symbol of peace; they slept while the Greeks exited the horse and opened the gates allowing the Greek army into Troy, conquering the city.
[edit]Current use
Due to the popularity of botnets among hackers and the availability of advertising services that permit authors to violate their users' privacy, Trojan horses are becoming more common. According to a survey conducted by BitDefender from January to June 2009, "Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world". This virus has a relationship with worms as it spreads with the help given by worms and travel across the internet with them. [4]
[edit]See also
  • §  Cyber spying
  • §  Dancing pigs
  • §  Exploit (computer security)
  • §  Industrial espionage
  • §  Malware
  • §  Principle of least privilege
  • §  Privacy-invasive software
  • §  Reverse connection
  • §  Rogue security software
  • §  Secure computing
  • §  Social engineering (security)
  • §  Spam
  • §  Spyware
  • §  Timeline of computer viruses and worms

[edit]Notes
[edit]References
1.    ^ What Is the Difference: Viruses, Worms, Trojans, and Bots? - Cisco Systems
2.    ^ "AdSense Terms and Conditions". Retrieved October 5, 2010.
3.    ^ Jamie Crapanzano (2003): "Deconstructing SubSeven, the Trojan Horse of Choice", SANS Institute, Retrieved on 2009-06-11
4.    ^ BitDefender.com Malware and Spam Survey
§  Carnegie Mellon University (1999): "CERT Advisory CA-1999-02 Trojan Horses", Retrieved on 2009-06-10.
§  Trojan Horses at the Open Directory Project
Infectious malware
Computer virus · Macro virus · List of computer viruses · Computer worm · List of computer worms · Timeline of notable computer viruses and worms


Concealment
Trojan horse · Rootkit · Backdoor


Malware for profit
Privacy-invasive software · Spyware · Botnet · Keystroke logging · Web threats · Fraudulent dialer · Malbot


By operating system
Linux malware · Palm OS viruses · Mobile virus


Protection
Antivirus software · Defensive computing · Firewall · Intrusion detection system · Data loss prevention software


Law enforcement
Computer surveillance · Operation: Bot Roast



How to burn and play PS2 games ?


Welcome!  Thank you for ordering the “How to burn and play PS2 (Playstaton 2) games”.  In this guide, you will learn the very easy method of making copies of your PS2 and normal Playstation games so that they are playable on the PS2.  This guide will provide you with all the information you need to burn PS2 games.
You will need the following things to burn PS2 games:
-a computer with a cdburner
-a blank cd-r (don’t use the re-recordable type a.k.a. cd-rw)
-CDRWIN –  The version in this guide is 3.8D
-FireBurner –
-PS2 patcher –
-GameShark 2 for PS2
            -the GameShark 2 is available at most stores that sell video games,
             a few examples would be Best Buy, Circuit City, or Target.  You
             want version 1.0 of the GameShark 2.  I have heard that all other
             versions work, but I have only tested version 1.0.  GameShark2
             costs about 29.95.  Believe me, its worth it!!!                      
-and a PS2 to play the games.

Burning the PS2
            The process of burning ps2 games is easy.  It is really only a 3 step process.(read
                        the game, patch the game, and burn the game.)
1)      insert game into cd drive.
2)      Open up CDRWIN and click on the extract disk/tracks/sectors button.
3)      Your settings should be as follows:
For “extract mode”     select   disk image/ cue sheet
For “read options”      select “raw”
For “error recovery”   select “abort”
For “jitter correction” select “auto”
For “subcode analysis” select “auto”
Data Speed and Audio Speed should be the same
For “read retry count” type 0
For “subcode threshold” type 300
                        Make sure you selected the drive that your PS2 game is in
                        Make sure you typed in the file name (just type the name of the game) and
                        Check the directory that you’re putting your file in.
            Then just press “start”



            If you get an error in the middle of reading the disk that says something like “can’t read sections xxxx-xxxxx of disk”, it is becase the disk is scratched and CDRWIN can’t read it.  Try to clean the disk, if that doesn’t work you just have to use a different game (a different copy of the same game)


4)  Once CDRWIN is done, click ok and then exit CDRWIN.  Open up the
      PS2 patcher, select the game file you just created and patch it (make    
      sure you select the “RAW” option.
4)      Close the PS2 patcher, next open up Fireburner.  Click on the visual
      cue burner button.  When you created your .bin file (the game file) in
      CDRWIN, a .cue file should have automaticly been created.  In that
      case, drag and drop the .cue file into the Fireburner window.  If the
      .cue file was not created, just drag and drop the .bin file into the
      Fireburner window.  After you have done that, right click (click with
      the right side button on your mouse) on your file in the Fireburner
      window, and select “Burn/Test burn”.
5)      In the options window that appears, select your cdwriter, select your
write speed(doesn’t really matter), and make sure you select “Track at
once (TOA) for the recording method.  As for the options on the right side of the options window, make sure only the following are checked:
“eject cd” and “close session”. When you have selected the options, click ok and your PS2 game will burn.  That’s all you have to do to burn a game.



Burning a Playstion (PSone) game

1)      If you want, you can spend 5 minutes using the same method as above
to burn your playstation game, but its not necessary.  For a playstation game (not PS2) all you need to do is use a program that lets you make an “exact copy” or a  “backup disk (CDRWIN)”  You don’t need any selected options, you just need to start the game on the PS2 the same way you would a PS2 game.




Starting the game on you PS2

1)      Now for the fun part (and challenging part the first couple of times)
This may sound a little complicated at first, but after you do it 3 or 4
times, it’s supper easy.  First things first, you must remove the front of your game drive on your PS2(not a big deal, it can snap on and off).
2)      Now insert your gameshark 2 cd(make sure the gameshark memory
card is in one of the 2 slots, doesn’t matter which one.)
3)      In the gameshark options, choose “start game”, then “without”.  Your screen should read “Please insert game disk then press X to continue.”
4)      Now this part can be trickey for beginners, so I will provide pictures
-the main purpose of this starting method is to open up the PS2 and
  swap the gameshark disk with your burned game without the PS2
  knowing you did it.  DO NOT press the eject button on the PS2!!!
-with the PS2 cd tray cover removed, you will be able to look in and see a while tab inside the PS2.  With a credit card (or something like it) gently slide the white tab all the way over to the right, if you did it correctly, this should allow you to manually pull open the PS2 cd tray.
5)  Next, take the gameshark disk out of the PS2 and put in your burned
     game.
5)      Gently push the PS2 cd tray fully back into the PS2 (Don’t press the
eject button).
6)      Now you need to slide that white tab all the way back to the left (its
origional position).  To do this you get a strong papper clip(needs to be a strong one)  stick it into the PS2 on the right side of the white tab and push the tab back to the left.
7)      If you pushed the tab all the way back to the left and did every thing
else right, you are ready to play your game.  Just press X on your PS2 controler and watch as your burned game loads.  ( It may load slower than an original game, depending on the cd-r you are using,  I use Verbatim cd-r’s and have no problems.)

Create a Google Profile??


Create a Google Profile
Thought of creating a Google profile? With a Google profile page you can:
·         Share your content on the web.
·         Links to your blogs.
·         Online photos from Picasa and Flickr.
·         Links to your other online profiles like Facebook and LinkedIn.
·         Create a bio about yourself on your About tab.
·         Provide contact information and enable send me a messge.
Create a Google Profile
1.    You will need a Google account first.
2.    Go to Create Your Profile at Google.
3.    Over on the right is a button Create my profile, click it.
Switches to Google account login box
4.    Log into your Google account.
Next screen asks you to update your password recovery information. Update it then click Save and continue button at the bottom of the page.
You now are taken to your profile page.
5.    In the top right, beside your login name there is a Edit my Profile link, click it.
You are taken to the Edit your profile page. On your Edit your profile page the About tab is activated.
About Tab Google Profile
1.    On the About tab the first part is where you:
o    Fill in your first and last name.
o    Upload a picture of yourself.
o    Fill in your nickname.
o    Other names.
o    What sex you are. There is the option to not to say if you prefer to keep this confidential.
To the right of your name section you have the following choices:
o    To display your full name so you can be found in searches.
o    Allow people to contact you without knowing your email address.
o    To display those who you follow and the people who are following you.
2.    The second part of your About tab is where you can enter more personal stuff about you:
o    Where you grew up.
o    Where you live now and where you have lived.
o    What your profession is, current employer, past employers and schools you are currently attending or have attended.
3.    There is a box a bit lower down on the About tab where you can add a short bio.
An HTML editor is available to format your text and add links.
4.    Below the bio section is where you can add links.
This is where you can add links to your other online profiles and website.
5.    Check your information over. Google shows you your profile link to share.
6.    Scroll down to the bottom of the page can click Save changes.
That’s it! You have now completed the About tab of your Google profile.
Photos Tab Google Profile
The photos tab is where you add a photo strip at the top of your profile.
1.    Click the Photos link beside the About link at the top of the screen.
Switches to the photo editing screen.
2.    Picasa is selected by default.
If you do not have a Picasa account yet or if you photos are not public, Google will let you know it can not find one for you using this user name/Google account.
Click add photos if you have a Picasa account under this user account.
3.    The next option is Flickr.
Click the circle (radio button) beside Flickr if you want to add photos from your Flickr account.
Enter your Flickr username, ID, or email address the click the Check button to the right.
Click the Add photos button below to add photos from your Flickr account.
4.    The third option is where you can add another photo service you use.
Click the circle (radio button) beside Other photo service.
Fill in the url or feed of your photo service you wish to add then click the Find feed button to the right.
Click the Add photos below to add photos from your other photo service.
You are now finished adding photos to your Google profile.
Next thing to fill out is your contact information.
Contact Info Tab Google Profile
There is a note on the this screen that the information you enter on this page is not public unless you decide to make it public.
1.    Click the Contact Info link beside the Photo links at the top of the screen.
Switches to the Contact Info screen.
2.    On the Contact Info screen you can add:
o    Email addresses
o    Addresses
o    Phone numbers including your mobile
o    Instant messenging user name
o    Your birthday (just month and day)
3.    Next select who can see this contact information.
o    Your contacts group
o    Your friends group
o    Your family group
o    Your co-workers group
4.    When you are all done, scroll down to the bottom and click Save changes.
With your Google profile now complete, you can start sharing your profile link with friends, family, co-workers and anyone else you wish.
Be sure to keep your Google profile up to date. It is yet another way for people to find you on the net!
Site Ownership Verification Yahoo! Site Explorer
Yahoo! Site Explorer gives you detailed information about your website or blog once registered and site ownership has been verified.
To verify ownership of your sites at Yahoo! you need to log into your Yahoo! account first. If you do not have a Yahoo! Id yet, see Create Yahoo! ID Account first to sign up.
Sign into Your Yahoo! Id
1.    Go to the Yahoo! Site Explorer page page and sign in via the link at the top right.
Once logged in, you will be taken to your account’s Site Explorer My Sites page.
Add Your Site
1.    Enter the url of the website you wish to verify ownership of.
2.    Click the Add My Site button to the right.
You will be taken to the authentication page in a moment or two.
Authentication
With Yahoo! Site Explorer you can authenticate ownership of the site submitted using one of two methods:
·         a file uploaded to your web space
·         a meta tag
Of the two methods available we prefer the verification by file upload method. Using the file upload method you just have to remove one file if you decide to withdraw from Yahoo! Site Explorer.
With the verification via meta tag method, you may have to just add the meta tag to the home page file. This can be a problem if you are using a content management system or ecommerce software as these usually use the same head section for all the pages through their template system.
Site Authentication Using a File
1.    Click the link “By uploading a verification file to my site”.
Instructions appear below the link.
2.    Click the Download button and save the file to the folder with your website/blog files in it on your computer.
3.    Log into your web space using your FTP client or web hosting control panel.
4.    Transfer (upload) the file Yahoo! just gave you to the root of your website/blog.
This is the folder where your home page is. This is the same spot as you uploaded yourGoogle site verification file if you have already verified your site for Google Webmaster Tools.
5.    Click the Ready to Authenticate button.
The page will refresh. Over on the left in the navigation column you will see your site listed. The page will refresh again and take you to the Site Explorer My Sites page. Your site should be listed in that screen now.
Site Authentication Using a Meta Tag
1.    Click the link “By meta tag”.
Instructions appear below the link.
2.    Yahoo! composes a special meta tag for you to insert into the head section of your home page.
The head section of your page is surrounded by an opening head tag and a closing head tag.
<head>
</head>
You are to paste your custom meta tag just before the closing head tag of your home page.
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" / >
<title>Title of the document</title>
<meta name="Description" content="Your description" />
<meta name="Keywords" content="first, second, third" / >
<meta name="Copyright" content="Copyright Statement" / >
<link rel="stylesheet" type="text/css" href="styles/stylesht.css">
Put meta tag here
</head>
The example above is for a site using XHTML DOCTYPE declaration. The tags between the opening and closing heads for your site template might be a bit different.
3.    Upload the updated home page to your web space.
You can do this using a FTP client.
4.    Click the Ready to Authenticate button.
The page will refresh. Over on the left in the navigation column you will see your site listed. The page will refresh again and take you to the Site Explorer My Sites page. Your site should be listed in that screen now.
Add Your Site Feed
While you are in Site Explorer you may as well add any feeds you have for the site too.
1.    Click the 0 under the Feeds column beside the url of the site you just added.
You are taken to the Feeds page.
2.    The url of your site is already filled in. Add the feed name to the box beside your url.
3.    Select the type of feed you are submitting.
To the right of the box where you just put the feed file name is a selection box with the type of feed you are submitting.
o    Website feed
o    Mobile feed – XHTML
o    Mobile feed – WML
o    Structured data feed
Select the type of feed you are submitting.
4.    Click the Add Feed button to the right.
Screen refreshes with your feed added.
Once your feed is submitted you will notice there is a note “pending submission to Microsoft”. This is good! Now you don’t have to submit the feed to Bing.
With your site submitted and site ownership verified within Yahoo! Site Explorer after a few days you will see all the stats covered in our Yahoo! Site Explorer Overview article.
This post was created as part of the 30 Day Blogging Challenge
Create Yahoo! ID Account
To use some of the services provided by Yahoo! you need a Yahoo! id. This id is used for things like your Yahoo! profile, Yahoo! Messenger, a Yahoo! email address and Yahoo! Site Explorer to name a few.
Sign Up for a Yahoo! Id
1.   Yahoo! Account Registration Page
Go to the Yahoo! registration page.
2.   Personal Information
The top section of the registration covers:
o    Your name
o    Gender
o    Birthday
o    Country you are from.
o    Your postal code/zip code.
3.   Select an ID and Password
o    First is you Yahoo! id and email address.
The id portion is to have 4 to 32 characters. Your id must start with a letter and can contain numbers, letters, underscores (not hyphens) and a dot.
Once you have filled in your chosen name (id) click the check link to the right of the email address line to verify it is formatted correctly and available.
If not available or done incorrectly, the page will show you it is incorrect or not available. If everything is ok, the password box will appear below the email address line.
o    Enter your password.
o    Re enter your password to confirm
4.   Alternate Email Address
Enter an alternative email address. One that you check and will be keeping like an email address at your website.
This email address will be used if you should need to recover your password
5.   Secret Questions
These secret questions are used to confirm your identity when recovering your password or id.
Select a secret question and type in the answer below.
Select a second secret question and type in the answer below.
6.   Fill in the Captcha and Submit
Fill in the Captcha, and you are done once you click the Create My Account button below it.
You are returned to the Yahoo! home page if it did now work. If it did work, you will be presented with the Yahoo! Registration Confirmation page.
Once you log into Yahoo! as you move around different sections of the site you maybe asked to login again. This is a security procaution.
Now that you have a Yahoo! id you can customize things like your Yahoo! home page, create your Yahoo! profile and other services Yahoo! provides.
Verify Site Ownership Google Webmaster Tools
To start using Google Webmaster Tools you first have to add your site to your Webmaster Tools account then verify site ownership. We will be covering the two easier ways to verify site ownership for the average website/blog owner.
Verifying ownership for Google Webmaster Tools seems to be a problem for some people. Not sure what they do wrong but if you follow the instructions below carefully you should not have any problem.
Add Site to Google Webmaster Tools
1.    You need a Google Account if you don’t already have one.
2.    Go to Google Webmaster Tools and login using your Google Account.
You are taken to the Home page of your Webmaster Tools account.
3.    There is a button called Add a Site on your Home page, click it.
A small screen pops up under the Add a Site button with a spot for the url of the site.
4.    Type in your website address.
e.g. www.mydomainname.com
Click the Continue button to complete.
Refreshes to the Verify Ownership Screen.
There are 4 ways to verify site ownership available.
Options for Site Ownership Verification
·         Using a meta tag in the head of your home page.
·         Using a file uploaded to your web server.
·         Adding a DNS record to your domain’s configuration
·         Link to an existing Google Analytics account.
Using a meta tag or using a file uploaded to your web server are the two easier ones for the average website/blog owner so we will be covering those.
Instructions for verifying by DNS record are available at Verification: DNS TXT record.
Instructions for verifying by an existing Google Analytics account are available atVerification: Google Analytics tracking code
Site Ownership Verfication Using Meta Tag
With the verification using meta tag method, you will be given a specific meta tag to put in home page. This might be used where you do not have access to the root of your site (a hosted ecommerce solution or hosted blogging solution for example). You can use this method for any site but it does require you editing head section of your home page. If you have a site using a content management system try to make sure this tag gets added to the head section of the home page.
The problem with this method is that you need a separate head section just for the home page. When using includes or a DWT (Dynamic Web Template) this is extra work. We prefer the HTML method.
1.    Click the radio button (circle) beside Add a meta tag to your site’s home page.
You custom meta tag appears at the bottom of the screen.
2.    Copy the meta tag shown into a plain text editor (Notepad for example) and save for safe keeping.
3.    You now have to paste this custom meta tag into the head section of your home page. The idea is that you keep Google Webmaster Tools open while you do this.
The head section of your page is surrounded by an opening head tag and a closing head tag.
<head>
</head>
You are to paste your custom meta tag just before the closing head tag of your home page.
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" / >
<title>Title of the document</title>
<meta name="Description" content="Your description" />
<meta name="Keywords" content="first, second, third" / >
<meta name="Copyright" content="Copyright Statement" / >
<link rel="stylesheet" type="text/css" href="styles/stylesht.css">
Put meta tag here
</head>
The example above is for a site using XHTML DOCTYPE declaration. The tags between the opening and closing heads for your site template might be a bit different.
4.    Upload the updated home page to your web space. You can do this using a FTP client.
5.    Go back to your browser with Google Webmaster Tools open and click the Verify button at the bottom of the screen.
If Google has problems verifying the meta tag they will give you information on what is the problem.
Once the site ownership has been verified you should see a Add or remove owners note beside your website listing on your Webmaster Tools Home page.
Site Ownership Verification Using HTML File
Using the HTML file verification method to verify site ownership requires downloading the file provided by Google, uploading it to your web hosting account and then verifying with Google.
If you can upload the file either by using a FTP client or through the control panel at your web hosting this is our method of choice.
1.    On the Verify ownership screen click the radio button (circle) beside Upload an HTML file to your server
The instructions appear at the bottom of the screen
2.    The first instruction says to download the file provided.
Click the link and you will get a screen asking you where you want to save it.
Save this file in the folder that contains the files for your website. You do have a backup copy of your website, right? It goes in the root of your website files. This is where your index/default page file is (your home page).
You can proceed to the next step without closing Google Webmaster Tools, minimize the browser if you are using the FTP client method to upload or open a new window/tab if you are going to use the web hosting control panel to upload.
3.    Start up your FTP client or log into your web hosting account’s control then to the file manager.
When using the web hosting file manager, make sure you navigate to folder that contains the root of the site, where your home page is.
Likewise for when you are using a FTP client. Make sure you have navigated to the root folder of the website before starting to upload.
4.    Upload the file you just got from Google to the root of your website.
Once the file has been uploaded, you can close the program or web hosting control panel, which ever you used to upload.
5.    Maximize the browser/go back to the tab with Google Webmaster Tools in it.
6.    There is a link in the Verify ownership screen to click which will verify you have uploade the file to the right spot.
A new tab/window will open. You will see a web page with just google-site-verification: the name of the file you just uploaded. This verifies you uploaded the file to the right spot and you can close this window/tab now.
If you don’t see this, then you uploaded the file to the wrong spot.
7.    The next step is verification.
Click the Verify button at the bottom of the screen.
Screen refreshes and takes you to the Dashboard screen. There is not going to be any data here yet because Google hasn’t had time to produce any for you yet.
8.    That is it. You can click the Back to Home link at the top right to go back to the home page.
Once the site ownership has been verified you should see a Add or remove owners note beside your website listing on your Webmaster Tools Home page.
You have now verified site ownership with Google Webmaster Tools. Log back in in a couple of days to see if there are any stats yet as described in our Google Webmaster Tools Overview article.

Change The Title Of Internet Explorer


Customize ur Internet Explorer

1. Open Registry Editor

2. Move to the following key.

3. HKEY_CURRENT_USER\Software\Microsoft\Internet. Explorer\Main.

4. In the Right Panel look for the string "Window Title" and change its value as u wish. If the String value is not there create a New String value and assign the value as your wish.

High Definition Audio:::::::::::::::::


Intel®
High Definition Audio
Integrated Audio for Today
and Tomorrow
Audio on the desktop PC has come a long way
from the warning beeps of the original PC. Most
systems today offer 44-kHz/16-bit stereo CD
quality, and many even add multiple channels to
provide a Dolby* Digital or DTS*-type surroundsound experience.
Integrated audio solutions such as AC’97 are costeffective and offer a good end-user experience in both stereo and multi-channel formats.
However, the current integrated audio capabilities fall short in meeting the requirements of the
next generation of PCs designed for digital entertainment.
Intel has worked with the industry to develop a new specification for integrated audio that is capable
of delivering the features and high-end performance of an add-in audio card. Intel®
High Definition
Audio (Intel®
HD Audio) is capable of playing back more channels at higher quality than previous
integrated audio formats. In addition, Intel®
HD Audio has the technology needed to support the latest and greatest audio content. By enabling enhanced usage models, Intel HD Audio, when combined with the Intel®
915G, 915P and 925X Express chipsets will also change how computer users
interact with sound.
The Challenge to Find Better Audio
When AC’97 was initially developed users were typically listening to only music and movies with
stereo sound. With the success of DVD movies encoded with Dolby Digital and DTS multi-channel
audio formats, users have become accustomed to listening in full surround sound with anywhere
from six to eight speakers.
While AC’97 technology has struggled to keep pace with all these advancements, Intel HD
Audio is designed specifically for the high-quality multi-channel audio experiences of today and
tomorrow. Newer audio and video encoding/decoding algorithms also enable a higher-quality
listening experience.
Sales BriefWith the explosion of digital content, more and more consumers
are moving their computers into the living room or family room
so they can enjoy digital music or movies throughout the house
on state-of-the-art multi-channel stereo systems or big screen
TVs. With better speakers connected to their computers, the
limitations of current computer sound subsystems, whether
integrated or add-in, can ruin the digital experience.
Many consumers are also starting to ask for the ability to play two
different audio streams through their PC at the same time—perhaps classical music in the study and a movie in the living room.
These demands cannot be met with current audio solutions.
An Outstanding Audio Experience
Intel HD Audio delivers significant improvements over previous
generation integrated audio and sound cards. Designed to
support the convergence of digital entertainment, the Intel HD
Audio specification delivers the features needed for an
improved audio experience.
Intel HD Audio is capable of delivering the support and sound
quality for up to eight channels at 192 kHz/32-bit quality, while
the AC’97 specification can only support six channels at
48 kHz/20-bit. In addition, Intel HD Audio is architected to
prevent the occasional glitches or pops that other audio
solutions can have by providing dedicated system bandwidth
for critical audio functions.
Innovative Uses for the Digital Home
Dolby Laboratories* selected Intel HD Audio to bring Dolbyquality surround sound technologies to the PC, as part of
their recently announced PC Logo Program. The combination of these technologies marks an important milestone in
delivering quality digital audio to consumers. Intel HD Audio
will be able to support all the Dolby technologies, including
the latest Dolby Pro Logic* IIx, which makes it possible to
enjoy older stereo content in 7.1 channel surround sound.
Another consumer need is for the ability to play back two
different audio tracks, such as a CD and a DVD simultaneously, which can’t be done using current audio solutions. Intel
HD Audio features multi-streaming capabilities that give users
the ability to send two or more different audio streams to
different places at the same time, from the same PC. Here
are examples of how this can be used:
Surround
CD
Dolby Digital
DTS
DVD Video
Left
Center
Subwoofer
Right
Surround
Game Audio
Dolby
Digital
Chat Audio
Figure 1: You can play a game online and chat with the other players
by sending the game sound to 5.1 speakers while the Internet
chatting audio is sent through your headset.
Figure 2: A DVD movie with 5.1 audio can be sent to a surround sound system in the living room, while you listen to digital music and surf the
Web on the PC.Intel HD Audio handles these and other applications with ease,
which is attractive to users as multiple, simultaneous applications become more commonplace in the digital home.
Microsoft* has chosen Intel HD Audio as the main architecture for
their new Unified Audio Architecture* (UAA), which provides one
driver that will support all Intel HD Audio controllers and codecs.
While the Microsoft driver is expected to support basic Intel HD
Audio functions, codec vendors are expected to differentiate
their solutions by offering enhanced Intel HD audio solutions.
The result is high-quality PC based audio that delivers a
seamless convergence of digital entertainment between the
PC and consumer electronic devices.
Enhanced Features
Intel HD Audio also enables enhanced voice capture through
the use of array microphones, giving users more accurate
speech input. While other audio implementations have limited
support for simple array microphones, Intel HD Audio supports larger array microphones. By increasing the size of the
array microphone, users get incredibly clean input through
better noise cancellation and beam forming. This produces
higher-quality input to voice recognition, Voice over IP (VoIP),
and other voice-driven activities.
Intel HD Audio also provides improvements that support better
jack retasking. The computer can sense when a device is
plugged into an audio jack, determine what kind of device it is,
and change the port function if the device has been plugged
into the wrong port. For example, if a microphone is plugged
into a speaker jack, the computer will recognize the error and
can change the jack to function as a microphone jack. This is
an important step in getting audio to a point where it ‘just
works’—users won’t need to worry about getting the right
device plugged into the right audio jack.
The Solution for the Future
Intel HD Audio helps audio reach new levels with digital
quality audio and compelling new usage models for digital
home/office applications. Designed for “glitch-free” audio
playback, multi-streaming, jack retasking, and UAA support,
Intel HD Audio offers an audio solution for years to come.
As one of the many new technologies introduced with the
Intel®
925X and 915 Express chipset family, Intel HD Audio
enhances the end-user experience and enables the convergence of digital entertainment for both PCs and Consumer
Electronics (CE) products.INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL®
PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL
OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND
CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED
WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A
PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel
products are not intended for use in medical, life-saving, life-sustaining applications. Intel may make changes to specifications and product descriptions at
any time, without notice

What is a FTP Client?

What is a FTP Client? As a website or blog owner, knowing how to use a FTP client (FTP software) is a useful skill. Instead of relying on your WYSWYG (What you see what you get) software or the interface of your blogging software to upload files, images and other content to your webspace you can use a FTP client and be in full control. What Does FTP Stand For? FTP is the acronym for the File Transfer Protocol, a protocol for transfering files. What is FTP Software Used For? FTP software (or FTP client) is used to copy files from one computer to another over the Internet. Your FTP software connects to another computer connected to the Internet using a file host name, user name and password when we are talking about using it to upload (or download) files and content for your website or blog. FTP Security Regular FTP transfers are not secure. The data sent over the Internet is not encrypted therefore the file, user name, password and commands sent can be read/seen by a packet sniffer (capture) piece of software surfing the net to find such information. For better security use a FTPS connection. Using a FTP Client First of all, you have to download a FTP program. FTP clients can either be free or a paid version. Comparison of FTP Client Software at Wikipedia has a list sorted by free, freeware,freeware and payware, payware and operating system. You will need the FTP information from your web hosting firm. Try and get the secure FTP information. Once you have installed the FTP client on your computer you need to set it up for the site you wish to FTP the files to. Start the FTP client and enter: 1. A profile name. The profile name can be anything you want. Make it something that will make sense to you later if you will be using the FTP software for more than one site. 2. The host name. The host name will be given to you by your web hosting compay. It can be an IP address (123.123.123.123) or your domain name with ftp in front (ftp.mydomain.com). 3. Your FTP user name. Depending on how your web hosting handles FTP, you could have been automatically assigned a FTP user name or you may have to create a FTP account yourself. 4. Your FTP password. For security reasons, this should be different from your web hosting account login password. If your web hosting company has setup the FTP account with the same password as your main login, change it to something else. Use PCTools Secure Password Generator to create a secure password. Make sure you record it somewhere for safekeeping! Also for security reasons, do not save the password to the software. If you do, anyone that gains access to your computer can upload/download or otherwise mess up your site. Don’t worry, you will soon remember the password to enter each time you use the FTP client. 5. Location of files on your computer. To make things easier each time you use the FTP client, enter the path on your computer to the folder that contains your website or blog’s files. 6. Location of the folder on the web server. Like the location of the files on your computer, if you enter the path to the correct location on the web server for your site you won’t have to navigate the path next time you use the FTP client. Using a FTP client to transfer your website or blog files is a skill each site owner should learn. You can also use your FTP client software to backup your site. You have a backup, right? More Information on FTP File Transfer Protocol – technical information about the FTP Protocol. FTPS – information on the FTPS Protocol How an FTP Site Works This post was created as part of the 30 Day Blogging Challenge at:

Change Startbutton text


Hacking the Start button
This works on XP Pro Build 2600 (The final verison),
and it should work on all other versions as well.

ALWAYS BACKUP EVERYTHING YOU EDIT OR DELETE.
I'M NOT RESPONSIBLE IF YOU MESS YOUR COMPUTER
UP BY DOING THIS HACK. DO IT AT YOUR OWN RISK.

First off, you need to download a program called
Resource Hacker. It's kinda like a hex editor,
it allows you to change bitmaps, text, ect.
in program files.
Windows XP has a feature called Windows File Protection.
This feature stops you from changing important system files,
that could leave your operating system, non-fuctional.
The file that we need to edit, Explorer.exe,
is protected by Windows File Protection. What we need to do,
is make Explorer.exe not part of Windows File Protection.
Once we do that, we will be able to edit
Explorer.exe when we want, and as much as we want.

Click on your start button -> then Run and type in
"%systemroot%system32Restore" without the quotes.
Now you should see the file filelist.xml.
What? You don't see it? We can fix that.
In windows explorer click Tools->Folder Options->
View and scroll down where it says Hide protected
operating system files (recommend) and un-check it.
Also click where it says Show hidden files and folders,
and uncheck Hide extensions for unknown file types. Lastly, hit Ok.
Now, you should see filelist.xml listed. Right click on filelist.xml
and click properties. Uncheck where it says Read Only and then click OK.
Good, now we can edit filelist.xml. Right click filelist.xml again,
and click Open with then on Notepad.
The file should now be opened in notepad.
This is where Windows File Protection looks to see if it needs to
protect a file or not. Where it says:

%windir%system.ini

add this a line above it:

%sytemroot%explorer.exe

Now, click file -> Save. (NOT Save as)

Next click on your start menu-> run and type in
"%systemroot%system32dllcache" without the quotes.
In this DIR, find and delete Explorer.exe.
This is a backup copy of Explorer.exe and windows might
try and replace this copy with your hacked copy if it isn't deleted.
After you delete it, windows will popup a message, just hit cancel then yes.

We should now be able to edit Explorer.exe as we wish. Run Resource Hacker
(The file you downloaded earlier). In ResHacker click File->
Open and open Explorer.exe. Mine is located in C:winntexplorer.exe
yours maybe located in C:windowsexplorer.exe. Once you have it open you should see something like this:




To change the "Start" text on the start button go to:
String Table -> 37 -> 1033. To the right, you should see the words "start".
You can change this to anything you want. I changed mine to LinuXProX.
Next, hit the Compile Script button above.
Now, go to String Table -> 38 -> 1033. Again, to the right you should see "Start".
Change this to the same thing you changed the other one to, mine says LinuXProX. Next,
hit the Compile Script button above. Now, if you just wanted to change the start button text,
you can skip down to "Saving".

Don't you hate the little icon (image) on the start button? Well,
we change it, and it's very easy to do.
In ResHacker, go to Bitmap -> 143 -> 1033.
You should see the window that is on the start button to the right.
To change it, you Action -> Replace bitmap -> Open with new bitmap.
Now you can make your own image, If you want to make your own,
it has to be 25x20 and 16 million colors. Once you found the bitmap you want to use,
just click open then click Replace.


Lastly, to change the Start Menu border, go to Bitmap -> 167 -> 1033.
(This is Windows XP Pro. If you have Home Editon It's Bitmap->166->1033) Click Action ->
Replace bitmap -> and where it says Select bitmap to replace:
scroll down to 167 or 166 if you have XP Home Editon.
Now, click Open file with new bitmap and find the image you want to replace it with,
click open, then on Replace.
It's best to make your own image on this one,
I just edited the default bitmap since I'm not that great with graphics.
 Maybe someone will make me a cool one, and send to me. *Hint* *Hint* :)
If you want to edit the default image, or use it as a template,
just right click on the Windows XP Pro/Home image and click copy.
Now, open up your favorite graphics program, I have Jasc Paint Shop Pro,
and hit CTRL-V. That should paste the image from your clipboard to your graphics program.
If you want to make your own, it has to be 21x233 16 million colors. Once your down editing,
just save it as a .bmp somewhere on your drive. I saved mine to C: est.bmp :).


Additional Comments:

-Saving

There are alot of bitmaps in Explorer.exe along with Text Strings, that you can change,
just hack around in it and see what you can find. If you try and save Explorer.exe it wont save.
Why? Because Explorer.exe is currently running on your computer and it can't save it
while the program is running. So how am I suppose to save it? Well, there are a few ways to do that.
One, you could save your hacked version to floppy, boot to dos and copy it.
Two, if you dual boot you could save it from within another operating system.
Or three, the easiest and fastest way, save it without rebooting, and here is how:

Hit CTRL-ALT-DEL and Windows Task Manager should popup.
Click on the processes tab and find Explorer.exe, and click it once.
Now, hit the end process button at the bottom (Make sure you don't have any other programs open).
Your taskbar at the bottom of the screen should disappear.
Hold ALT then click tab while holding ALT, then let off the ALT.
Keep doing this until Resource Hacker comes in to view.
We can now save Explorer.exe because it is not running. Click File-> Save as->
and find Explorer.exe again, mine is located in C:winnt.
It will ask you if you want to overwrite, just click yes.
Now, ALT-TAB back to Windows Task Manager and click on File -> New Task ->
in the black type in Explorer.exe, or type in the full path to explorer like:
C:winntexplorer.exe. If you did everything correctly,
you should see your new image and name on the start button, along with the start menu border.

How to UTP Cabling??


UTP, stands for “unshielded twisted pair”. Called unshielded because less resistant to electromagnetic interference. And called twisted pair as it includes couples who are prepared spiral cable berlilitan alias each other. There are 5 categories of UTP cable. From category 1 to category 5. For the famous computer network is a category 3 and category 5.
Category 3 can be used for data transmission up to 10 mbps, while category 5 to 100 mbps. If only create such a network in your office or campus computer or internet cafe, yes the most efficient use of the category 3. That was more than enough.
As far as the writer there are many brands on the market, it’s just that stubborn and relatively cheap famous brand is Belden – Made in USA. If you want a cheaper and use a lot, then just buy one box, approximately 150 meters in length. Do not forget to buy the connectors. Shaped like a telephone socket connector only bigger.
Another very important, you must have a special pliers for installing the connector to the UTP cable, fancy term is “the crimp tool.” This tool is useful to ‘turn off’ or ‘planting’ connector to the UTP cable. So once already in the ‘tang’, then it can not be removed again connectors. And if you want a more OK, I’ll not bear the same buy a LAN tester. You can buy a brand from Taiwan just so much cheaper. Shaped like a box and there are LED lights his eight pairs and can-blink-resistant.
OK now you ready tools, the authors start. In general, the UTP cabling are of two types, namely straight and cross type. Type is called straight because each cable corresponding numbers were 1-1 8, directly. While called a cross because there are crosses on the composition of the cord. Confused?
OK! For the straight type is used to connect the cable from the client to the hub. While for the type of cross is to the client directly connected to the client (cpu to cpu) or also from hub to hub.

We first discuss the types of straight 
This type is most easily made. Why? Because the direct correspondence 1-1. Standard sequence like this: 2 orange – green 1 – 2 blue – green 1 – 2 brown. 2 orange here meaning the same pair of young orange dark orange and so on. But do not come standard staining was also really no problem. The important sequence of the cord. For example the first end of the first order of pins young orange, the other end of the first order of the pins must also be young orange, so between the end connect to each other. Actually, not all pins are used.
The important thing is the pin numbers 1,2,3 and 6. So for example which are connected only pins 1,2,3 and 6 while the other pins are not installed, no problem. For more details, please see the picture below is the author of a book of photographs.
Who left the order for the type of correspondence straight, the right of the cross
Time will install it, then cut the tip of the cord, then stacking the cord then flattened with a knife cutting at the crimp tool available. Andak not have to bother to let go at the end of the cable insulation, because when you insert the cable into the connector then pressed (pressed) using a crimp tool, when it was actually there at the connector pins that penetrate down to the wire. Consider, for emphasis (pressing) a hard, hard sometimes because if you do not pin it does not penetrate into the cable insulation. If you have then you test using the LAN tester. Insert the tip ends of the wires to the device, then turn it on, if the LED lights on the LAN tester that lights up everything, from number 1 to 8 means that you have been successful. If there’s one that does not work means the possibility of the pin numbers are no problem. The easiest way is that you press (press), again using the pliers. Possibility of the pin has not been transparent. If you press but still does not connect, then try to check the correspondence between pins 1-1 or have not already. If it was true and still fail, then indeed you are not lucky. Repeat again until it works.






What is Networking Hardware?????

Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-processing and communications within the network. CLICK on the terms below to learn more about those pieces of networking hardware.
This section provides information on the following components: 
  • File Servers
  • Workstations
  • Network Interface Cards
  • Switches
  • Repeaters
  • Bridges
  • Routers



File Servers
A file server stands at the heart of most networks. It is a very fast computer with a large amount of RAM and storage space, along with a fast network interface card. The network operating system software resides on this computer, along with any software applications and data files that need to be shared.
The file server controls the communication of information between the nodes on a network. For example, it may be asked to send a word processor program to one workstation, receive a database file from another workstation, and store an e-mail message during the same time period. This requires a computer that can store a lot of information and share it very quickly. File servers should have at least the following characteristics:

  • 800 megahertz or faster microprocessor (Pentium 3 or 4, G4 or G5) 
  • A fast hard drive with at least 120 gigabytes of storage 
  • A RAID (Redundant Array of Inexpensive Disks) to preserve data after a disk casualty 
  • A tape back-up unit (i.e. DAT, JAZ, Zip, or CD-RW drive)
  • Numerous expansion slots 
  • Fast network interface card 
  • At least of 512 MB of RAM

Workstations
All of the user computers connected to a network are called workstations. A typical workstation is a computer that is configured with a network interface card, networking software, and the appropriate cables. Workstations do not necessarily need floppy disk drives because files can be saved on the file server. Almost any computer can serve as a network workstation.
Network Interface Cards
The network interface card (NIC) provides the physical connection between the network and the computer workstation. Most NICs are internal, with the card fitting into an expansion slot inside the computer. Some computers, such as Mac Classics, use external boxes which are attached to a serial port or a SCSI port. Laptop computers can now be purchased with a network interface card built-in or with network cards that slip into a PCMCIA slot.
Network interface cards are a major factor in determining the speed and performance of a network. It is a good idea to use the fastest network card available for the type of workstation you are using.
The three most common network interface connections are Ethernet cards, LocalTalk connectors, and Token Ring cards. According to a International Data Corporation study, Ethernet is the most popular, followed by Token Ring and LocalTalk (Sant'Angelo, R. (1995). NetWare Unleashed, Indianapolis, IN: Sams Publishing).
Ethernet Cards
Ethernet cards are usually purchased separately from a computer, although many computers (such as the Macintosh) now include an option for a pre-installed Ethernet card. Ethernet cards contain connections for either coaxial or twisted pair cables (or both) (See fig. 1). If it is designed for coaxial cable, the connection will be BNC. If it is designed for twisted pair, it will have a RJ-45 connection. Some Ethernet cards also contain an AUI connector. This can be used to attach coaxial, twisted pair, or fiber optics cable to an Ethernet card. When this method is used there is always an external transceiver attached to the workstation. (See the Cabling section for more information on connectors.)

Fig. 1. Ethernet card.
From top to bottom:
RJ-45, AUI, and BNC connectors
LocalTalk Connectors
LocalTalk is Apple's built-in solution for networking Macintosh computers. It utilizes a special adapter box and a cable that plugs into the printer port of a Macintosh (See fig. 2). A major disadvantage of LocalTalk is that it is slow in comparison to Ethernet. Most Ethernet connections operate at 10 Mbps (Megabits per second). In contrast, LocalTalk operates at only 230 Kbps (or .23 Mbps).

Fig.2. LocalTalk connectors
                            Ethernet Cards vs. LocalTalk Connections
Ethernet                                                              LocalTalk
Fast data transfer (10 to 100 Mbps)              Slow data transfer (.23 Mbps)
Expensive - purchased separately                Built into Macintosh computers
Requires computer slot                                    No computer slot necessary
Available for most computers                      Works only on Macintosh computers




Requires computer slot
No computer slot necessary
Available for most computers
Works only on Macintosh computers



Token Ring Cards
Token Ring network cards look similar to Ethernet cards. One visible difference is the type of connector on the back end of the card. Token Ring cards generally have a nine pin DIN type connector to attach the card to the network cable.
Switch
A concentrator is a device that provides a central connection point for cables from workstations, servers, and peripherals. In a star topology, twisted-pair wire is run from each workstation to a central switch/hub. Most switches are active, that is they electrically amplify the signal as it moves from one device to another. Switches no longer broadcast network packets as hubs did in the past, they memorize addressing of computers and send the information to the correct location directly. Switches are:

  • Usually configured with 8, 12, or 24 RJ-45 ports 
  • Often used in a star or star-wired ring topology 
  • Sold with specialized software for port management 
  • Also called hubs 
  • Usually installed in a standardized metal rack that also may store netmodems, bridges, or routers

Repeaters
Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with a device called a repeater. The repeater electrically amplifies the signal it receives and rebroadcasts it. Repeaters can be separate devices or they can be incorporated into a concentrator. They are used when the total length of your network cable exceeds the standards set for the type of cable being used.
A good example of the use of repeaters would be in a local area network using a star topology with unshielded twisted-pair cabling. The length limit for unshielded twisted-pair cable is 100 meters. The most common configuration is for each workstation to be connected by twisted-pair cable to a multi-port active concentrator. The concentrator amplifies all the signals that pass through it allowing for the total length of cable on the network to exceed the 100 meter limit.
Bridges
A bridge is a device that allows you to segment a large network into two smaller, more efficient networks. If you are adding to an older wiring scheme and want the new network to be up-to-date, a bridge can connect the two.
A bridge monitors the information traffic on both sides of the network so that it can pass packets of information to the correct location. Most bridges can "listen" to the network and automatically figure out the address of each computer on both sides of the bridge. The bridge can inspect each message and, if necessary, broadcast it on the other side of the network.
The bridge manages the traffic to maintain optimum performance on both sides of the network. You might say that the bridge is like a traffic cop at a busy intersection during rush hour. It keeps information flowing on both sides of the network, but it does not allow unnecessary traffic through. Bridges can be used to connect different types of cabling, or physical topologies. They must, however, be used between networks with the same protocol.

Routers
A router translates information from one network to another; it is similar to a superintelligent bridge. Routers select the best path to route a message, based on the destination address and origin. The router can direct traffic to prevent head-on collisions, and is smart enough to know when to direct traffic along back roads and shortcuts.
While bridges know the addresses of all computers on each side of the network, routers know the addresses of computers, bridges, and other routers on the network. Routers can even "listen" to the entire network to determine which sections are busiest -- they can then redirect data around those sections until they clear up.
If you have a school LAN that you want to connect to the Internet, you will need to purchase a router. In this case, the router serves as the translator between the information on your LAN and the Internet. It also determines the best route to send the data over the Internet. Routers can:

  • Direct signal traffic efficiently 
  • Route messages between any two protocols 
  • Route messages between linear bus, star, and star-wired ring topologies 
  • Route messages across fiber optic, coaxial, and twisted-pair cabling