Total Pageviews

Monday 30 July 2012

HOW TO DISABLE USB PORT???   



Hi everyone :) In this blog, i'm gonna let you know how to disable the USB port in your system.


Go to Start -> Run. Type regedit and hit enter. Registry Editor window appears.



Follow the path given below:
HKEY_LOCAL_MACHINE -> SYSTEM -> CurrentControlSet -> services -> USBSTOR




In the right pane, right click start and select modify.




Edit DWORD Dialog Box pops out. Make sure that the radio button is active for Hexadecimal.




To disable the USB port, just change the value data to 4.




Conversely, to enable, change the value data to 3.


Thats it!!! On restarting your system, this modification will be put to effect and your USB port will be disabled.


Hope this tip will be useful.... Thanks for reading my blog... :) comment on it.... Stay tuned for my next blog... :)

Sunday 29 July 2012

PROXY

This is not the one which we usually put for our mates in the college  :-) Proxy is a tool using which we can browse safely by hiding our ip. We can do lot more with it. 

this is how proxy works...
A proxy or proxy server is basically another computer which serves as a hub through which internet requests are processed. By using proxy, whatever u request in the browser will reach the proxy instead of directly contacting the server. The proxy server then processes our request, sends our request to the server and gives us the search result which is returned by the server. In this way it serves as an intermediary between your home machine and the rest of the computers on the internet.

Proxies are used for a number of reasons such as to filter web content, to go around restrictions such as parental blocks, to screen downloads and uploads and to provide anonymity when surfing the internet.

TYPES:
·         
   Anonymous Proxy - An anonymous proxy server is also known as web proxy. By connecting to the internet through this proxy, the home IP address of your machine will not be shown but rather the IP of the proxy server will be shown. By blocking direct access between two networks, proxy servers make it much more difficult for hackers to get internal addresses and details of a private network.
·    Distorting Proxy - This type of proxy server makes an incorrect original IP address available through the http headers.
Transparent Proxy - A transparent proxy does not provide privacy. It means that it does not add, delete or modify attributes or modify our request. It just forwards our request as it is to the server and return the result to our computer. Also it does not mask our ip. Our ip will be visible to the network. But these are generally used for their ability to cache websites. 

Some more proxies are available and we can chose it based on our requirement.

CACHING:

Proxies may also cache web pages. Each time the user requests an URL from their system, a temporary copy is stored locally in the proxy server. When user requests the same URL for the next time, the proxy can serve the local copy instead of retrieving the original across the network, improving performance.

USES:

Finally, the uses of the proxies are:
*To keep machines behind it anonymous(that is for hiding our ip address)
*To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.
*To access sites prohibited or filtered by your ISP or institution.
*To log / audit usage, i.e. to provide company employee Internet usage reporting.
*To bypass security controls.
* To scan transmitted content for malware before delivery.

CONS:

   The main problem with the proxy is that if you use untrusted proxies, then your informations like your ids and passwords can be accessed by proxy server. So use trusted and recognized proxy. Some proxies are free to use and there are proxies for which we've to pay(this type will be used in the organisations). But make sure that the proxy you use is genuine.




     SOME PROXY SITES:
       §  http://proxify.com
       §  https://www.vtunnel.com
       §  www.ninjacloak.com


   Do googling for more proxies and before you use, check for its genuinity. So try using proxies for accessing information which you think others should not see. 

   It is a safe way to restrict hackers provided the proxy is from trustworthy environment.

  Thanks for reading :) comment about my blog... :) Stay tuned for my next blog... :)



Saturday 21 July 2012


FLEXIBLE DISPLAYS


Samsung OLED display
The near future technology will be the Flexible display which will be in the market by 2014. One of the reason for the advent of flexible screen is to make the gadgets lighter and portable. With flexible display gadgets, we can simply fold it and carry it in our pocket.
          
Flexible displays are still under R & D (Research and Development). Samsung is the leading company which is keen in unveiling flexible smart phones in the market. Flexible display uses FOLED (Flexible Organic Light Emitting Diode) which is a type of OLED (Organic Light Emitting Diode). Kodak is the inventor of OLED. FOLED is made by depositing electro luminescent organic semiconductor over flexible plastic OLED. This enables the device to be bent or rolled even when it is operating. Since OLED contains organic chemical compound, it emits light when electric current flows through it.

PROS:

OLED screens are slimmer and eye smoothening. These screens provide better viewing experience.

OLED can provide brighter, crisper displays on electronic devices.

OLED create their own light as opposed to LCDs which require a separate light source (backlight)  and hence they use 20% less power than the conventional LEDs and LCDs used today.

Since they can be rolled, it provides good portability.

OLEDs can be refreshed in microseconds in contrast with LEDs which takes few milliseconds, it provides flicker free display in near-eye applications resulting in smooth display with high dynamic motion video.

CONS:

These displays last only for shorter lifespan. The display may lose efficiency and brightness because of the stress developed during bending.

They’re prone to sunlight effect. That is, the display can’t be seen clearly in direct sunlight.

They’re prone to water as it can’t even withstand small water droplet.

OLED are costly nowadays. But as the popularity and advancement increases, the price may fall rapidly in future.


Thanks for reading... :) comment about my blog and stay tuned for my next blog :)

Wednesday 18 July 2012

MISSING .DLL FILE


A dynamic link library (DLL) is a collection of small programs, which can be called upon when needed by the executable program (EXE) that is running. The DLL lets the executable communicate with a specific device such as a printer or may contain source code to do particular functions.

The advantage of DLL files is that, because they do not get loaded into random access memory (RAM) together with the main program, space is saved in RAM. When and if a DLL file is called, then it is loaded. For example, you are editing a Microsoft Word document, the printer DLL file does not need to be loaded into RAM. If you decide to print the document, then the printer DLL file is loaded and a call is made to print.


All in all, a DLL is an executable file that cannot  run on its own, it can only run from inside an executable file. This would be like having a car without an engine, where as an executable has an engine.

Let me come to the point now. J Sometimes your computer may miss .dll file of some software. When you try to open those softwares, due to inavailability of the required .dll file, the application may not run. There is one good reason for .dll files to disappear from the computer. It is not that one .dll file will be used by only one .exe file. Several .exe files can use a single .dll file. So in such situation, when you uninstall a software which used a .dll file say for eg. xxx.dll , then xxx.dll might have been deleted. So when we try to open a software which uses the same xxx.dll file will not find that file and it will report an error in a dialog box.

In such a case never panic. Its very easy to tackle such situations. There are various sites which provides .dll files which u can download and continue using the software free of error!!! J Some of them are below…
you can google and find more sites if u didn’t get .dll file in one site.

Thanks for reading... Comment your suggestions about this blog :) 

Monday 16 July 2012

FLAME - MALWARE








FLAME




Flame is the most complex malware ever found. Researchers named the malware as “Flame” after the name of one of its module. It also known as Flamer and skywiper. It is a computer malware discovered in 2012 which attacks computers running the Microsoft Windows OS. It is being used to monitor Cyber Espionage in Middle Eastern countries. Its discovery was announced on 28 May 2012 by Maher Centre of  Iranina National Computer Emergency Response Team (CERT), Kaspersky lab and CrySyS lab of the Budapest University of Technology and Economics.

Flame can spread to other systems over a local network (LAN) or via USB stick. It can record audio, screenshots, keyboard activity and network traffic. The program also records Skype conversations and can turn infected computers into Bluetooth beacons which attempt to download contact information from nearby Bluetooth-enabled devices. This data, along with locally stored documents, is sent on to one of several command and control servers that are scattered around the world. The program then awaits further instructions from these servers.

Flame had initially infected approximately 1000 machines with victims including Govt. organizations, educational institutions and pvt. Individuals. Infections happened in Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia and Egypt with major target in Iran. Flame supports a "kill" command which wipes all traces of the malware from the computer. The initial infections of Flame stopped operating after its public exposure, and the "kill" command was sent.

Researchers guess that Flame is related with Stuxnet(another computer worm) These two worms have different usage of codes and must be developed by different group of hackers. But researchers are sure that these two worms share atleast one module of code and there is a strong relationship between Flame and Stuxnet.


Thanks for reading... :) Do comment on my blog for further improvement... my next blog will be released shortly... :)

Saturday 14 July 2012


ACCESS HOME SYSTEM FROM ANYWHERE:

LogMeIn is an application which allows to access, manage and monitor our computer from anywhere with the requirement of internet connection. We can sit in front of any computer, anywhere in the world, and control the host computer no matter where it is located. The remote computer screen appears on the local computer, and this is all done through the magic of the web browser.

Each computer that we wish to control remotely must have the local LogMeIn utility installed, to handle the secure login and connection. Once installed, computer is ready to be accessed. We can access the computer from anywhere and it gives us an illusion like we’re working with our system lively. We can access files, transfer files, watch movies in our remote system and do all the jobs which we wish…

PROS:

Assume you’ve a laptop with less configuration and a desktop in your home with powerful configuration and good resolution. Using Log me in, Even though you’ve laptop with bad configuration, we get an experience of working in a powerful system which actually resides in the home.

LogMeIn handles switching the host resolution (desktop in this example) to that of the notebook used to access it. It does this automatically and importantly it switches it back when you log out. That means the desktop screen switches back to a nice hi-res setting, without any user interaction.

working with system through mobile
Suppose if we are in a situation to teach someone who are not familiar with computer operations and if for eg. they wanna install a software, instead of explaining them how to install for an hour via mobile, we can simply connect to the remote system and give them a demo which will be very efficient and easier to understand for the new user.

Even our mobile phone is enough to work with the remote system. (mobile in the sense, its not with nokia 1100 kind of mobiles :-D what I mean is smart phones…J)


CONS:

Since log me in requires internet connection for accesing remote computer, it requires good internet connection. Bad connection may lead to lagging of viewing our remote system.

We require someone in our home to switch on the system and connect to the internet.

Hope this blog is bit useful for some readers.... Do comment on my blog so that it can help me improve my next blog... Thankz for spending time for my blog... :-)