DOS Attack, whats that!

 U might be guessing what this type of attack if u r a home user but any of your kin or relatives is a administrator of some organization that he knows how much difficult it is to identify it & how to stop or prevent it.This type of attack is network based.....

Don't consider DOS which u have heard in windows.This is entirely different from it This DOS means Denial-of-service attack.This attack is generally carried out when the attacker is not able to gain access to the target system.Under this attack,it prevents all the legal users from  using system resources etc.For example,suppose there is  site which requires user name & password for login & it also monitor that any one can attempt to give wrong password for certain account only for certain number of times, after which that account will be locked for a some period of time.so, if cracker knows about this policy of site administrator than he could give wrong password for all user so that that site locks all the users account for a given amount of time.Here attacker motive is achieved & administrator might have to figure ut that this was a attack....

Now, u might be thinking that than all administrator should monitors all the IP address of each pc & check that all attempts r not from same pc.But,attackers/crackers r smarter than u.They use a modified & much advanced type of DOS attack where it becomes difficult for administrator to   identify who r legitimate user & who r not.This attack is called DDOS attack.......

Hey , DDOS means distributed denial-of-service attack.here, attacker firstly attack other pc & compromise these pcs from over the net & make them zombies.zombies means that those pc which have been compromised will launch the attack at particular time or on the commands of the attacker on the target system.now, in this case it ,attack would be from the around the world so it would be difficult it identify the main culprit & prosecute him....


Port Scanning

As the name suggest, these programs r used to scan certain ports or a range of ports before starting attack.This methods is used  to find which all services running  on the target system....Services include  finger,telnet or any other services.These r programmed in such a way that It could query these services to find which version of that software is running.As some software might have some bugs which could be exploited by the attacker to compromise the system.....

Both these tools r used for Auditing security in various organizations also.These tools help Administrators to find security loop holese within their networks & rectify it...

some of the popular port scanner which r available free of cost

Nesus
This program can be downloaded from www.nessus.org.It has database of bugs & their exploits.It can determine the host operating system.Hey,never use this to attack someone or u might land into jail & than don't call us to rescue u.This is for Educational purpose only.

Nmap
This tool can be used to find which all services r running on the target system including application names & their versions.This can be downloaded from www.insecure.org/nmap.This could even tell which all software r used for defense purposes at the target system.

Worms:spreads very fast

Worms r special types of programs which make copies of themselves on the host system.U might be thinking that than what harm it can pose to us.The problem with it is that they make as much copies of themselves till your pc doesn't crashes.Not only this,they forward themselves to other pc from your pc through remote execution commands.If u use outlook express than it will send its copy to all those people it finds out in your contact lists thereby infecting their pc's also.No u can imagine how much dangreous it is.There r several types of worms which r existing over internet....

Most of them have been explained t this site http://virusall.com/worms.shtm

http://www.2-spyware.com/worms-removal
This site list most of the worms oer internet & vatious tools which u can use if u get infected with any one of them.Even foe informational purpose this site is good for beginners.

Any comments,suggestions r welcome.

Network security threat/problem-II

sorry for not sticking to a particular topic.I was going over some books when my friend asked me the meaning of those 4 digits.so, let me change the topic for a while & write about RAM Latencies.but in this post, I am continuing network security problems.Apart from those type of attacks which i have discussed earlier, some more types of attack r also possible.Two of which I am discussing right now:

TRAP DOOR:
some of u might be knowing about this attack.This attack is generally caused by some secret way to the software which r left open intentionally by programmers.some common examples of this type attack can be heard in newspaper where a programmer left a hole in banking software & modified it a bit so that some percentage of money from each account gets transfered into his account.Checking for these back doors or trap doors  is very difficult as the the lines  of codes goes on increasing.There r usually more than thousand lines of code in big softwares.so,finding these trap door is very difficult.

LOGIC BOMB
These r not bombs in actually as the name suggest.foe explanation purpose,consider a program which becomes active after a particular event has occurred like at a particular time.what this program will do,it all depends upon the code.There was some virus which used this modus operandi to execute & harm your computer.if u r interested in learning about computer viruses than visit www.secunia.com.This site provides a lot of information regarding viruses & it releases warning from time to time for various softwares when ever any problem is detected by their team.

Any suggestion , question or comments r welcome.

RAM Latencies

Everybody who uses computer always complain about RAM.....  that they have less RAM because of which they r not able to play their favorite games.....But have u ponder about certain facts while purchasing your RAM. Most of the time, we always see its clock speed in MHz like 233/400/533/677 etc. These r just the clock speeds but their is something more which we must look for & that is,it's latency figures which r usually written somewhat in this way "3-3-2-8"

Before exploring the meaning of these numbers, first of all, we must know what is latency.Latency means how much late or how much clock cycles r needed before the works get done....

Now coming to theses 4 digits.

1st digit represent CAS (Column address strobe)It means the delay between registered read and data output.In our example,we have taken 3.This means that 3 clock cycles will be needed before data will be send.

2nd digit stands for RCD (Row-Columns Delay).Before writing anything into RAM, address needs to be generated & address will be generated in row-column manner.so this type of delay equals to total time spent defining space & performing read & write operation.

3rd digit stands for RP(Row Pre-charge time).when ever anything is written into RAM than data is written row-wise.until one row has not finished new row will not be initialized.so the time required to terminate one row & start another is called RP.

4th digit stands for RAS(Row Address strobe)This means the amount of cycle spent in accessing data on a particular row.

All these digit represent number of clock cycles to perform required operation.Lower the values,  higher the speed.

Security Problem/Threat

security is a major concern of  all the administrator sitting in their cabin.There r various ways through which network based threat or problem exist.Here I will discuss about some of them in short to give u some idea......

Man-in-the-middle-attack
In this,when a user (taking u as example ) communicate with any other user over the net than there is a possibility of someone listening/sniffing your  data packets which u r sending to your friends.This attacker will come in between u & your  friend.but u won't be able to identify this.whatever communication u do it will be with the attacker.

phishing attack
This sort of attack r generally performed by sending email on behalf of any organization generally from banks.the email appears to be legitimate to a normal user.This mail will most probably ask u  to send certain information normally your user name & password . & the reason for asking such detail may be like Some of our records have been deleted,sorry for inconvenience or it can be any other reason.if u ever get such mails,immediately contact your bank or go directly to your bank site & never open the link given in your mail to visit your bank site.

Free Installer program

those of u who r making any computer based project than its for sure that when u will finally complete your project, it will still be different from the professional looking software even though the features would be very similar.How about having a complete setup file or application setup which can be used to store all your program files.How about developing application which will install shortcuts icon on desktop & come up in the program menu.But, now u might be thinking that u would be required to purchase some installer....

This nice thing will be implemented using winRar. u read right...winRar.How?read on
go to start menu>programs>winRar.open it
Now select your main exe file.On general tab,check mark sfx option.than move advance tab.chose sfx option.here u give the default path where your installed software should be placed like in "C:\Program Files" etc....Below u will be given the option to give the path of the .exe which u want to execute.similarly,u can set uninstall option by clicking advance option tab on the same page.here u can give the path from where your folders/.exe files will be deleted during uninstall.check other tabs,there u will find the option to include your license option,icon for your applications....

try this & if u like it or expect something more do comment....

Winrar can be downloaded from here:

http://www.rarlab.com/download.htm



Installing Software virtually

Those of u who r new to virtualisation , for them virtualisation is a way through which u can install various applications not directly onto your Operating Systm which is generally u do by installing it in default location of
c:\program files

instead there is a software from altiris(now part of semantic) which help u install any software onto your Operating System.The main advantage of this is that this gets in between r Operating System & your application.whenever u install any software than some registry entries r created .This virtual software will store these registry entries in itself & when u require that software than those entries will become visible.if u r fond of installing large number of software than tis software helps in not overloading your registry & your Operating System will not crash easily.There r situation where when u install certain software which doesn't uninstall itself , for them if they have been installed over altiris than u need to just delete the layer of that software. & that software will not be shown by your Operating System.IF u want to try than its free for home use but paid for official use.

for more information regarding this topic,visit there site:

http://www.altiris.com/Products/SoftwareVirtualizationSolution.aspx

Best way to partition

Hi guys!
for those of u, who fear & pray that they should not face the problem of partitioning their drives because u might delete a drive which might contain your important data or even your OS setup.then,no need to worry now, Gparted is the way to go...

if anyone has heard of partition magic or used it than u will find that MUCH OF THE FUNCTIONALITY, LOOKS & FEEL of partition magic is same as with Gparted.Both these tools are very easy to use for novice also.whatever operation u want to perform like formating,resizing,or creating new partition etc.  is very easy & can be accomplished by using rectangular box which represent your hard disk along with all the partition.just take your mouse over it & change the size of the partition,even for windows partition also.If u want it free than Gparted is the way to go & it comes bundled with ubuntu live cd.just boot from this cd & make changes . But, if u r a hardcore windows user  & have no experience with Linux than u should go for partition magic.
Alternatively go for live cd of Gparted.

for more information related to Gparted, visit there site
http://gparted.sourceforge.net/download.php


Happy Partitioning!

very well said Yvonne Russell

For all those of u who r new to blogging, u might not know the exact meaning of blogging.some blog for money , some for fame , to learn more.But those whose primary aim is to learn something new & to make new friends for them,blogging is a very big platform.

Money is not everything in life.A life will be more meaningfull if u have less but trust worthy friends.money never stays with anyone.It keeps changing hands.I won't say that u should not place ads in ur blogs.Infact i will also not remove it.but,my point here is that friends & relations last for ever & that they are the ones which comes to rescue during hardships.

sorry for going little senti...
enjoy life & if u can bring some happy momemts for someone it will return to u also.
Have a visit here to get better meaning of blogging.
http://quasifictionalviews.blogspot.com/2007/07/grow-your-writing-business.html

Vi Editor

If u r planing to use Linux now than for editing / creating  or viewing ,the most common utility which u will be going to use is Vi editor.For windows user,u can consider it as a software like notepad which u will use in the command prompt of Linux which is called terminal....

  just as for opening command prompt u type cmd in run dialog box,same in Linux type terminal & u will b presented with terminal.This terminal has more power in terms of features as compared to command prompt of Linux.terminal has large number of utilities & commands along with several  parameters.To start vi,just type "vi abc".here,abc is the name of file which u r going to create.for editing type same command with its filename but without double quotes.after opening it,if u want to write any thing press i/a & then start typing from where u want to type.
after writing, to save file just as u press ctrl+s in windows here just press esc & then type

:wq or
:q or
:w
where w=write
q=quit.so when u type :wq than it means write everything to the file & quit/close the file.

for more informations regarding vi editor or its functionalities, check this out:-
   
    http://www.eng.hawaii.edu/Tutor/vi.html
    http://unixhelp.ed.ac.uk/vi/ref.html


stop error: c0000269

sorry for being absent tomorrow from my blog.I had being facing this stop error.
It had occurred when i installed updates for windows xp.after installation i restarted my pc, to the surprise i found Blue screen of death.I was startled,not again!...

Than using Linux i surfed net for its solution,many sites claimed that this occurs if u having amd processor than u will get it.but i am using P4.so after searching for 3 hrs, i didn't find the solution other than repair your installation of xp.so finally i had repair it only & losing all updates of windows.if u also get such error than try repairing windows before attempting fresh install.

This error generally comes from the bug in XP.

Ebooks on C , C++ and Java

Solid collection of Programming books on: 

C#-Programming:
Addison Wesley - From Java to C Sharp A Developers Guide.chm
Addison.Wesley-Building.Solutions.with.the.Microsoft.NET.Compact.Framework-2003.chm
Apress-Beginning.CSharp.Objects.From.Concepts.to.Code-2004.chm
CaliberRMSDK60.zip
CD og DVD Project.zip
Charles Petzold - Programming Microsoft Windows with C#.pdf
Chat.zip
CoolLayout.NET.zip
CopyRightJOD.Zip
CylinderTrackBar.zip
MSPress-Programming Microsoft Windows with C# -Charles Petzold.pdf

Directory \"MusicMakerRTM\":
O\'Reilly - NET framework essentials.pdf
O\'Reilly - Programming C# 2nd Edition.pdf
OReilly - Programming Web Services with Soap.pdf

Directory \"Oreilly.C.Sharp.In.A.Nutshell.2nd.Edition.eBook-LiB\":
Oreilly.C.Sharp.In.A.Nutshell.2nd.Edition.eBook-LiB.chm

Directory \"Petzold Programming Windows With C# Examples Cd\":
Prentice Hall - Thinking in Java, 3rd Ed (Bruce Eckel, Beta, 1182 pages) - 2003 - (By Laxxuss).rar
Prentice Hall 2001 - Advanced JavaServerPages.rar
Petzold Programming Windows With C# Examples Cd.rar
Sams - Managed DirectX 9 Kick Start - Graphics And Game Programming.chm
ShapedFormB2.zip
SharpChess_Source_v0790.zip
Syngress - C# for Java Programmers.pdf
Visual Studio .NET C# Study Guide.pdf
Web udvikling med Visual Studio.zip

C++-Programming:
Directory \C++\":
Addison Wesley - C++ by Dissection.pdf
Addison Wesley - C++ Standard Library, The A Tutorial and Reference.chm
Addison Wesley - C++ Templates, The Complete Guide.chm
Addison Wesley - Effcient C++ Programming Techniques Ebook - fly.pdf
Addison Wesley - Essential C++ Ebook-fly.pdf
Addison Wesley - How To Run Successfu .Projects III.chm
Addison Wesley - Leffingwell & Widrig - Managing Software Requirements, 1St Edition.pdf
Addison Wesley - Modern C++ Design, Generic Programming and Design Patterns Applied.chm
Addison Wesley - Refactoring - Improving the Design of Existing Code.pdf
Addison Wesley - The C++ Programming Language.pdf
AddisonWesley_CppStandardLibraryATutorialAndReference.chm
Addison[1].Wesley.C__.Standard_Library_The.A.Tutorial.and.Reference.chm
AW - Effective STL.pdf
C++ Complete Reference (3rd Ed.).pdf
C++ Unleashed (UML).pdf
C++Templates.chm
C___Programming_with_CORBA.pdf
Data structures and Program Design in C++.pdf
InsideCOM.pdf
O\'Reilly - Programming with Microsoft Visual C++ .NET 6th Edition.chm
Object-Oriented Programming in C++, 3rd Edition.chm
Programing - Learn Visual C++ 6.pdf
Teach Yourself Visual C++ 6 in 22 days (792 pag.).pdf
Testing_Series_60_App.pdf
Thinking In C++ - 2nd Ed. - Vol 1.pdf
Thinking in C++ Second Edition vol 2.pdf
Visual C++ .NET Developer`s Guide.pdf
visual c++ for dummies.pdf
C++ for Dummies - 5th Edition.pdf

C-Programming:
Directory \"C\":
0596004362.chm
C Primer Plus 5th Edition.chm
CAndDataStructures.chm
CbyExample.chm
O\'Reilly-Mastering.Algorithms.With.C-1999.chm

Java:
Directory \"java\":
Addison Wesley - A Programmer\'s Guide to Java Certification (2003) 2Ed.chm
Addison Wesley - Concurrent Programming In Java, Design Principles And Patterns, 2Nd Edition.chm
Addison Wesley - Design Patterns Java Workbook (2002).pdf
Addison Wesley - Effective Java Programming Language Guide.pdf
Addison Wesley - Inside Java 2 Platform Security 2Ed (2003).chm
Addison Wesley - Java Development on PDAs (2003).chm
Addison Wesley - Java Performance and Scalability Volume 1.chm
Addison Wesley - Java Tutorial (2000) 3Ed.chm
Addison Wesley - Java2 Platform, Enterprise Edition, Platform and Component Specifications.chm
Addison Wesley - Micro JAVA Game Development (2002).pdf
Addison Wesley - The Design Patterns Java Companion (1998).pdf
Addison Wesley - The Essence of Object-Oriented Programming with Java and UML - 2001 - (By Laxxus.pdf
Addison Wesley - XML and Java 2Ed (2002) Ru.chm
APress - Java Collections (2001).pdf
APress - Java Regular Expressions.chm
APress - wireless java developing with j2me (2003) 2ed.chm
ConcurrentRealTimeProgrammingJava.chm
Design Patterns Java Workbook.pdf
DesigningWebServicesWithJ2EE.chm
DesigPatternsExplainedNewPerspectiveObjectOrientedDesign.chm
DevelopingScalableSeries40ApplicationsAguideForJavaDevelopers.chm
EffectiveEnterpriseJava.chm
Generics in the Java Programming Language.pdf
Hungry Minds - java - Wireless Programming in J2ME.pdf
IDG - Java Game Programming for Dummies.pdf
Java - Core J2EE Patterns Best Practices and Design Strategies.pdf
Java - Data Structures And Algorithms With Object-oriented Design Patterns In Java.chm
Java Database Programming with JDBC.doc
Java Modeling in color with UML.iso
Java network programming, 2nd edition.pdf
Java Programming Unleashed.pdf
Language Features of Java Generics.pdf
Logging in Java.chm
Maning - Web Development with JSP, 2nd Edition.pdf
Manning%20%20-%20Java%203d%20Programming.pdf
McGrawHill Osborne - Java J2ME The Complete Reference.pdf
NEW[1].RIDERS.DEVELOPING.GAMES.IN.JAVA.EBOOK-LIB.CHM
O\'Reilly - 57 Bookshelf (Java,Perl,TCPIP,UNIX,Java Enterprise,Linux,Oracle,WWW).chm
O\'Reilly - Better Faster Lighter Java.chm
O\'Reilly - Eclipse, A Java Developer\'S Guide.chm
O\'Reilly - J2ME in a Nutshell.pdf
O\'Reilly - Java & XML, 2nd Edition.pdf
O\'Reilly - Java 1.5 Tiger A Developer\'s Notebook.chm
O\'Reilly - Java 3d Programming.pdf
O\'Reilly - Java Cookbook.PDF
O\'Reilly - Java Data Access JDBC, JNDI, and JAXP.pdf
O\'Reilly - Java Distributed Computing.pdf
O\'Reilly - Java Extreme Programming Cookbook.chm
O\'Reilly - Java Message Service.pdf
O\'Reilly - Java network programming_ 2nd edition.pdf
O\'Reilly - Java Reference Library.pdf
O\'Reilly - Java Security 2Ed.pdf
O\'Reilly - Java Servlet Programming.pdf
O\'Reilly - Java Swing.pdf
O\'Reilly - JavaScript The Definitive Guide.pdf
O\'Reilly - Learning Java.pdf
O\'Reilly - The Java Reference Library - 5 Books.pdf
OReilly - Java Extreme Programming Cookbook.pdf
OReilly - Java In A Nutshel.pdf
Prentice Hall - Applied Java Patterns 1st Edition 2001.pdf
Prentice Hall - Suns Core Java 2 - Volume I Fundamentals 5th Ed.pdf
Prentice Hall, Applying UML and Patterns, 2Ed.pdf
Sam\'s - Java Thread Programming.chm
Sam\'s,.Java.Thread.Programming.(1999).ShareConnector.chm
Sams - Building Web Services with Java - Making Sense of XML, SOAP, WSDL and UDDI - 2002 - (By La.pdf
sinkJava.zip
The Design Patterns Java Companion.pdf
Tutorial For Building j2Ee Applications Using Jboss And Eclipse.chm
Web Development with JSP, 2nd Edition.pdf
Wiley - Enterprise Java with UML.pdf
Wiley - J2EE Best Practices - Java Design Patterns, Automation and Performance - 2003 - (By Laxxu.pdf
Wiley - Java Database Programming Bible Ebook.pdf
Wiley - Java Enterprise Design Patterns - Patterns in Java V.3 - fly.pdf
Wiley - Java Enterprise Design Patterns - Patterns in Java, Vol 3 - 2002.pdf
Wiley - Java Security Solutions (2002).chm
Wiley - Java Security Solutions.chm
Wiley - Javascript Bible, 5Th Ed - 2004.pdf
Wiley - Patterns In Java - A Catalog Of Reusable Design Patterns Illustrated With Uml - Vol 1, 2E.chm
Wiley - Programming Java 2 Micro Edition for Symbian OS.pdf
Wireless Programming in J2ME - Hungry Minds.pdf
WJW.pdf
Wordware Publishing - Java 1.4 Game Programming.chm
Wrox - Professional Java Tools For Extreme Programming.chm

Directory \"Java In A Nutshell, 5th Edition\":
Directory \"Java In A Nutshell, 5th Edition\":
Oreilly.Java.In.A.Nutshell.5th.Edition.Mar.2005.eBook-LiB.chm

Directory \"Teach Yourself Internet Game Programming With Java In 21 Days\":

upgrading Fedora 5 to Fedora 7

with this new release of fedora, i thought much changes will be there.so,I started upgrading process i the evening.while it was checking the dependencies,it showed that it will install 1061 packages.I assumed that it would take 1 to 1-1/2 hr to complete but it took 2-1/2 hr.my ps config was not that poor.256 RAM,20GB for Linux,2.66ghz of processor..one thing i noticed while installation was being carried out as that this version has support for .net application.

 when booting FC7 &,it change my grub installer splash screen& when i selected FC7  to start than it presented with the same booting screen which we get in xp.Something good that i liked a lot as change over of Help & support section.It had the look & feel of the windows.This effort will beginners to feel at home who have migrated from windows.

Hats off to open source community!

Swapping partition in linux


Hello everyone!

Those of u who r new to Linux might be wondering about swapping partition...No
need to think more just go on reading it.U will get it.when u install any
windows OS than u create 2 or more partition from which 1 partition is for
windows file & other partition is used for storing ur movies,software or
files.but,in Linux,,whenever u install it (for dual boot Linux &
windows,see previous post) Linux,u need to create only 2 partition.1st will be
root partition where all ur software& movies will be stored & 2nd
partition will be used for swapping.

coming to swapping, this partition is used because at any given point,your
processor would be executing certain instructions & all instructions r
stored in queue.if some instructions is big than its execution time will also
be more so other process will take time.if any process has high priority than
it has to be executed firstly but when this process comes to cpu, at that time
ur processor might be executing.some other process, so in this case,currently
executing process will be saved in the swapped partition& high priority
process will executed firstly.

if u want to know to more on any topic,do give the topic.I will try my best to provide tutorial on it.





Guide to heatlhy Computing

Default

Hello Every one !!!

We all are almost on our Computers for quite a long Time .. I think to fully benefit yourself and Minimize your strain.. we should make some minor changes to our computing experience.. by setting up ourself and comp. system in a correct way.

Source : Microsoft healthy computing guide.


Position Yourself

Whether you are working or playing, it is important to avoid awkward postures and position your body comfortably. Not only can this improve your overall productivity, it may help you avoid MSDs. Keep in mind that changing your posture during extended tasks may also help you avoid discomfort and fatigue.

When working or playing at the computer, adapt your surroundings and arrange your computing equipment to promote a comfortable and relaxed body posture. Setting up your workstation to avoid discomfort depends on your unique body size and work environment. However, the following suggestions may help to provide you with a more comfortable environment.



To support your back, try the following:

  • Use a chair that supports your lower back (see detail 1).

  • Adjust your work surface and chair height to assume a comfortable and natural body posture (see detail 2).

To promote comfortable leg postures, try the following:
  • Clear away items from beneath your desk to allow comfortable leg positioning and movement.

  • Use a footrest if your feet do not rest comfortably on the floor.



To minimize reaching and to promote comfortable shoulder and arm postures, try the following:
  • Place your keyboard and mouse or trackball at the same height; these should be at about elbow level. Your upper arms should fall relaxed at your sides (see detail 3).

  • When typing, center your keyboard in front of you with your mouse or trackball located close to it (see detail 4).

  • Place frequently used items comfortably within arm's reach (see detail 5).


To promote proper wrist and finger postures, try the following:
  • Keep your wrists straight while typing and while using a mouse or trackball. Avoid bending your wrists up, down, or to the sides. If your keyboard has legs, extend them if this helps you maintain a comfortable and straight wrist position.

  • Type with your hands and wrists floating above the keyboard, so that you can use your whole arm to reach for distant keys instead of stretching your fingers.


To minimize eye strain, try the following:
  • Position your monitor about an arm's length away from you when seated comfortably in front of it.

  • Avoid glare by placing your monitor away from light sources that produce glare, or use window blinds to control light levels.

  • Remember to clean your screen. If you wear glasses, clean them also.

  • Adjust your monitor's brightness and contrast.

  • Adjust onscreen front sizes to make viewing more comfortable for you, if your computer program has this feature.
Go Lightly

Physical forces continuously interact with our bodies. We may think that only high-impact forces, such as car crashes, are likely to injure our bodies. However, low-impact forces may also result in injuries, discomfort, and fatigue if they are repeated or experienced over long periods of time.
Some types of low forces include:

Dynamic force: A force that you exert through movement, such as pressing the keys while typing or clicking the mouse buttons.

Static force: A force that you maintain for a period of time, such as holding your mouse or cradling the phone.

Contact force: A force that occurs when you rest on an edge or hard surface, such as resting your wrists on the edge of your desk.









To reduce the effects of low-impact forces on your body, try the following:
  • Type with a light touch, keeping your hands and fingers relaxed, because it takes little effort to activate keyboard keys.

  • Use a light touch when clicking a mouse button or when using a joystick or other gaming controller.

  • Hold the mouse with a relaxed hand and do not grip the mouse tightly.

  • Avoid resting your palms or wrists on any type of surface while typing (see detail 7). The palm rest, if provided, should only be used during breaks from typing.

  • Relax your arms and hands when you are not typing or using your mouse. Do not rest your arms and hands on edges, such as the edge of your desk.

  • Adjust your chair so the seat does not press into the back of your knees (see detail .
Take Breaks
Taking breaks can help your body recover from any activity and may help you avoid MSDs. The length and frequency of breaks that are right for you depend on the type of work you are doing. Stopping the activity and relaxing is one way to take a break, but there are other ways, also. For example, just changing tasks - perhaps from sitting while typing to standing while talking on the phone can help some muscles relax while others remain productive.

To vary your daily activities and to work productively, try the following:
  • Plan your work and play so that you are not doing the same thing for extended periods of time (such as performing the same activity or using the same part of your body).

  • Use different input devices, such as your mouse and keyboard, to accomplish the same task. For example, to perform a scrolling task, you can use the wheel on the mouse and the arrow keys on the keyboard.

  • Work more efficiently by using software and hardware features to reduce your effort and increase your productivity. For example, you can press the Windows logo key to open the Windows Start menu.

  • Learn about software and hardware features by reading the information that accompanied these products. For example, if you frequently highlight text, assign a mouse button to do ClickLock.
Be Healthy
A healthy lifestyle can help you perform and enjoy your everyday activities, including the time spent at your computer. Also, learning more about your health is an important step in staying comfortable and productive while using your computer.
To help maintain good health, try the following:
  • Eat a balanced diet and get adequate rest.

  • Exercise for overall fitness and to improve the strength and flexibility of your body. Consult a qualified health professional to help you choose the stretches and exercises that are right for you.

  • Learn to manage stress. One way to reduce stress at work is to plan your work area and schedule so that noise and distractions are kept to a minimum.

  • See a qualified health professional if you have questions about how your medical and physical conditions may be related to MSDs. While researchers are not yet able to answer many questions about MSDs, there is general agreement that many factors may be linked to their occurrence, including previous injuries, diabetes, hormonal changes (such as pregnancy), and rheumatoid arthritis.
Conclusion
Learning more about working comfortably and productively, as well as your overall health, are important ways to help you enjoy your computing experience.


i hope this guide could enhance the computing Experience for all us as we sit and compute for hours

__________
Just Applied all these to myself

Stop Error Code:0x0000008E

some of my friends faced this problems which i had faced earlier to them also.so, i know how much irritating this problem is.if u Google up this error code, u will find solution which will suggest that either your RAM is facing certain problem & hence u must change it.This error might even occur if certain files of your OS gets corrupted.

For this firstly try certain RAM checking softwares to check errors--------------.

during initial checking itself it will tell whether their is some problem with your RAM or not as same methods r used again & again.If everything is okay than try repairing your OS by boot through OS cd.Even after that if problem persist than reboot into safe mode by pressing f8 during boot up process...after this after u enter desktop immediately search for files or folders which have size of 200+MB.if it is there than just cut & paste in to certain drive.for example C:\ or in d:\ drive.

After this go to start>run>type "appwiz.cpl" & then enter without quotes.it will list all the software which r currently installed.from this list remove those software which u don't need at all
& try removing those software which r very big in size like MSDN ,Visual studio etc....
& now finally reboot .this time u should not face problem & your pc should be fine....

Best of luck!
 

securing windows OS -II

WINDOWS UPDATES
sorry guys that till now i have been telling u about various security tools/s/w which u must have but the biggest thing to better security is patch ur os.A lot of updates y available for different version of windows.
to update ur windows OS, go to start>settings>control panel>automatic update>wind update we site.

Along with this,get autopatcher if u frequently format or install ur os than downloading updates again & again is very tedious & if u have limited download like me than u must need it it.
u can download it from  www.autopatcher.com

FIREWALL
In continuation with windows security - I, I haven't mentioned about firewall.some folks thinks tat they don't have any confidential data but they miss out that the point that their pc can be made a bot which will other pcs over the net so,to prevent this ,u guys must have installed it.
Firewall can be considered as a software which implement security measures in following areas
       *scans incoming/outgoing packets traffic
       *prevent access to ur pc
       *hide ur pc from hacker over internet
       *block certain application which u don't need & which can be used to compromise ur pc             security.for e.g, telnet operates at port 23,finger works at 79 etc.


firewall can be considered as of following types:
        *software based
        *hardware based
        *mixed based

software based:it is completely installed ur pc as any other software.it sits over ur net connection & monitor all the traffic coming in/going out.advantage of this type is that it can be updated easily.

hardware based: it is completely installed as a separate component to which entire local network is connected.this type is basically used in offices.disadvantage with this type of firewall is that it can not be updated.only new model can be purchased.

mixed:as name suggest,it's combination of above two.this provides far more advance security than other type.it is very costly to install it at home.mostly used at places where high security is demanded.

Some  good firewall which can be used at ur place are:
1)Zone Alarm
       link:www.zonealarm.com
2)Comodo
       link:www.comodo.com

Hoping this small tutorial might hlp newbies & other to beefup the security of their pcs
the tutorials which i have posted will provide summary over a topics.

for reference:
*Computer Networks by tanenbaum
*http://www.interhack.net/pubs/fwfaq/

 

windows security part-I

Windows operating system has many bugs in it because

Of which it is an easy target for many hacker.

They could compromise your PC for various reasons. Some of tem can

Be following

*Steal data from your PC

*Monitor your browsing habit

*Installing spyware/adware

*Making your PC a bot machine

& Many more reasons...

So, In order to have secure your PC, various security measures

Must be taken.

ANTI-VIRUS

This is the core security software, which must be installed

on every PC.this helps in preventing Trojan viruses, spyware

& Other malicious program from being downloaded to your PC.

even if it is there in your PC it can be removed from your PC

By scanning for them by your anti-virus software. But you must

Update your software periodically.some of the best anti-viruses

r following

1)AVG

www.grisoft.com

2)MACFEE

www.macfee.com

3) NORTON

www.symantic.com

ANTI-SPYWARE/ANTI-ADWARE

Spyware are software, which will get installed without user's information

& Keeps itself running without being detected by any software.

These are intentionally designed to access information that can be

Used for someone's profit.

Adware comes bundled with some software that will keep displaying ads

On to the screen, whenever you use that software. This is to an extent okay

but some adware continues to display even if you are not using that software.

To remove them some of the best software available in the market are:

1)Ad-aware

www.lavasoftusa.com

2) Spybot search & destroy link

www.spybot.info/en


Dual-boot windows with Linux

Most of the user find it very difficult to install linux along with windows.
Reasons can be many. some wants to learn linux but don't know how to install it.
Learning linux being difficult for newbie but for fun-loving people its a great mentor also.
for our purpose,i suppose that u are running windows currently.Now please follow these steps
carefully for successfully installation of linux.
I have used fedora core 5 with windows XP

1)Go to My computer icon on desktop
right click on it & click manage option.there,double click Disk management.
on the right side all partition will be shown.

2)Don't select c: drive(if you have windows installed in this drive),instead select other drive
Note: A typical linux installation requires 4-5 GB of Hard disk only..sobefore partitioninga particular drive,make backup of that drive on some other drive or on external media.

3)After this make 3 partition with suitablesize.2 partion will be used by linux & 1 by windows

4)1st partition of linux will be our swap partition.its size should be 500 MB only.this acts as virtual memory which we have in windows.

5)2nd
partition size of Linux must be atleast 3 GB

6) leave 3rd partition,windows will automatically detect it.

7)Now,reboot your system & press del to enter bios setup.there under boot configuration select boot from CD-ROM drive.press f10 & enter.

8)now insert any Linux distro bootable cd into drive & ait for welcome screen.

9)at welcome screen,select install option.Installation is simple like windows.

10)during setup, it will ask to select boot loader.go for grub boot loader.LILO is also available.but grub is generally good.

11)it will ask for hard disk space where it will install itself.

12)Recall,we have created 500MB of partition,select this & then select option swap partition.

13)similarly,you created 3GB of
partition.her linux will get installed.select this partition carefully from the list of available partition.& then select option ext2/ext3 partition.ext2 is like fat/ntfs which we have in windows.

14)Now you will be presented with simple questions.for e.g choose the language from following etc.These configuration can be changed after installation also.

15)after complete installation.reboot your system & take your Linux cd out.when booting,u will be presented with grub interface where u can select which OS to boot & u will boot into that OS.

Best of Luck!
for any problem,do comment.


Welcome

Hi to everyone in the blog sphere.I will share whatever knowledge i have it with me and what ever i learn from other sites.
I would be providing tips & tricks, information related  to linux , windows & other softwares also like Maya, Photoshop.