Firefox 3 beta 2 is out and about

Mozilla fans can now download Firefox 3 beta 2 for Windows, Mac OS, and Linux?

The new version sports a wide range of improvements over the first test version of the browser upgrade, most notably plugs for memory leaks, security fixes, and a download manager that includes improvements previously available only through plug-ins?

The security enhancements get fairly technical, but the Firefox developer’s Web page states that the new version offers “protection from cross-site JSON data leaks, tighter restrictions on site-specific content using effective TLD service, better presentation of Web site identity and security, malware protection, stricter SSL error pages, antivirus integration in the download manager, (and) version checking for insecure plug-ins?”

The updates to the download manager are pretty good, and they’re far easier to parse? The new manager lets you resume stopped downloads, and it has the aforementioned built-in virus checker.

You can also zoom in on parts of a Web page, and the integration between bookmarks, the location bar, and bookmark folders has become tighter? There’s now one-click bookmarking, smart folders for bookmarks, and the location bar checks against your bookmarks and history for page titles and URLs.

The Firefox developers also claim that Web site rendering is now faster than it was in FF3 beta 1, but empirically, I couldn’t detect any difference? Either way, it’s definitely faster than it is in FF2.

If you’re a bit nervous about accidentally damaging your current installation of Firefox 2, but you’d like to try out the Firefox 3 beta, I recommend installing the portable version? It doesn’t affect your old settings, though you can’t run both Firefox 2 and Firefox 3 beta portable simultaneously.

Be Sociable, Share!

World’s Toughest Cell Phone on World Tour


“The Sonim XP1 is designed with the demanding user in mind, and will fulfill the requirements of a large number of Russian users,” said Johan Bergstrom, Senior Director at Sonim Technologies. “As it will also work in very low temperatures, it will be the best choice in several Russian regions. The XP1 is also the only IP-52 classified water/dust-resistant GSM handset commercially available in Russia.”

I do have my doubts, considering the video of a car running over the XP1 didn’t seem particularly convincing. There are other videos of ‘stress’ tests, but till it comes in for a test at our lab, I shall continue to remain skeptical about the World’s Toughest Cell Phone.

There’s no word on the price, or when (should I say IF?) it’s going to be launched anywhere in our vicinity.

For those rugged, outdoorsy, always-dropping-their-mobile folks, here’s what could truly be a godsend. A US-based telecom company called Sonim Technologies has recently launched what it claims is the ‘world’s toughest’ GSM mobile phone.

The phone, called the XP1, is apparently engineered and certified to withstand shock, water, wind, dust, dirt and extreme temperatures. It sounds too good to be true, doesn’t it? To set such doubts at rest, the phone is currently on a world tour that began in Sweden.

Tests are being conducted by the company, which has invited journalists, bloggers etc. from around the world to show the versatility and endurance of the phone.

The company offers a three-year warranty on the phone and a lifetime warranty for the phone housing, with immediate in-store replacement if necessary. Apart from its apparent indestructibility, the XP1 is also equipped with Bluetooth and Push-To-Talk.

Be Sociable, Share!

Mozilla’s Prism to bring Web apps to desktop

Even the Mozilla Foundation, makers of the popular Firefox Web browser, thinks it’s time to break out of the browser.

On Thursday, developers from Mozilla announced a project called Prism that will, along with other “experiments,” make Web applications better resemble desktop programs.

The idea with Prism is that people can integrate their favorite Web applications with their desktop operating systems.

For example, a person could access Web-based programs Gmail or Facebook from the applications menu of Mac OS or Windows. Or they could create an icon for Facebook on their desktop that launches in its own window.

Prism is an open-source alternative to AIR, or Adobe Integrated Runtime, software for making desktop applications with Web technologies. AIR is set for a 1.0 release in the first half of next year; there are already a number of early applications that use AIR.

Mozilla Labs is trying to merge the worlds of Web applications with desktop operating systems because people are relying more on Web applications yet they are poorly integrated with desktop applications.

“While traditionally users have interacted mostly with desktop applications, more and more of them are using Web applications. But the latter often fit awkwardly into the document-centric interface of Web browsers,” according to the announcement on Mozilla Labs’ blog

Mozilla now has prototypes of Prism running on Windows with early versions on Mac and Linux under way.

Future versions include offline access to information with Firefox 3 and three-dimensional graphics

Be Sociable, Share!

Virus Problems?? Solve it YourSelf

Like its mythical namesake (dramatized in Lego), whatever crawls out of a digital Trojan horse will be a nasty surprise. A Trojan horse usually takes the form of an innocuous software program that unleashes a flood of malware or viruses after it’s installed and run. Since attacks and ease of removal vary–an ad generator is easier to remove than a stealth rootkit–there’s no one-size-fits-all solution. However, there are some common techniques for picking your way through the wreckage.

Reboot Windows in Safe Mode

What is Safe Mode? Safe Mode is a diet version of the Standard Mode of Windows that your computer ordinarily runs. Rebooting in Safe Mode loads minimal programs and disables most device drivers that manage hardware like CD drives and printers. The result is a more stable iteration of the Windows operating system that’s better suited for disabling malware while you perform a system scan.

How do you use it? If you can, follow the necessary steps for a safe shutdown process and then reboot. When you restart Windows, as the screen begins to load, press F8 repeatedly until the Windows booting options appear. Select “Boot in Safe Mode” from the menu of options. Once in Safe Mode, you should be able to run your installed antispyware software with less interference from the malicious software that the Trojan brought onto your system.

System Restore

What is System Restore?

System Restore strings out a safety net if everything goes kaput. Under default Window settings, System Restore saves a snapshot of your computer configuration once a day and on major upgrades that can be used to replace corrupted files. In the event of a Trojan attack, System Restore can revert Windows to a previous, uninfected state. It won’t restore everything, like changes to your user profile, but it does reinstate biggies like your Registry and DLL cache.

When do you use it?

When purging your computer of spyware, System Restore has an optimal time and place. You wouldn’t want your computer including corrupted files as the reference point of the day, so it’s important to disable System Restore before you start cleaning. You can reactivate it once your system is spick-and-span.

How do you use it?

The paths for accessing System Restore differ by operating system. In Windows XP, disable System Restore by right-clicking My Computer and selecting Properties. Under the Performance tab, select File System, then the Troubleshooting tab, and finally check Disable System Restore. You’ll be prompted to reboot. Follow these steps to uncheck the box before restoring your system.

To use System Restore after scrubbing your computer, choose Accessories from the program list in the Start menu. You’ll find System Restore under System Tools.

Scan with antivirus/antispyware apps

Downloading diagnostic and removal tools with an infected computer is a huge time sink–spyware can cripple your speed and Internet access. The Trojan’s payload could prevent EXE files from downloading or launching. Also, malware can affect the performance of installed security software on your PC. If you store your antivirus/antispyware programs on a CD or flash drive, however, those malware-busting apps can commence their swashbuckling unhindered.

Advanced users can save some time by creating a bootable DOS virus scanner that runs off a flash drive (tutorial from Ask the Geek).

Which antivirus software should you get?

Some of our favorite intrusion-repellants include Kaspersky Anti-Virus 6, which is worth the price (full review); Webroot SpySweeper and Spyware Doctor (the free versions identify but don’t remove malware); AdAware and SpyCatcher Express (free spyware removal); and HijackThis (aggressive diagnostic tool). While none of these are Vista-compatible yet, Kaspersky and Ad-Aware plan to release Vista-ready updates in 2007.

HijackThis is a powerful tool that monitors the critical areas of your computer for any significant changes. Many forums administrators will want to analyze your HijackThis log before recommending a removal plan. However, the program requires a bit of learning before you can use it effectively. You’ll want to read our HijackThis tutorial before getting started.

Disk reformatting

What is it?

Unlike a system restore, which rolls your operating system back to a previous configuration, disk reformatting requires you to reinstall Windows, plus all your data and applications, from scratch. This method is used to disable malware by overwriting corrupted files, replacing them with the default operating system.

How do you reformat your hard disk?

There are several ways to overwrite the operating system, some more complex than others. Start by backing up irreplaceable files; when they’re gone, they’re gone. The most traditional way to reformat the hard disk is by using a boot disk or boot CD to work around your troubled operating system and load into DOS. From there you can use a combination of command prompts (like C> format) and DOS formatting tools like Fdisk and DELpart to reinstate a clean operating system. Many of these tools will delete corrupted files from the hard disk, so they will no longer be recoverable. This useful thread on CNET’s forums explores some step-by-step reformatting options.

BootDisk.com provides free disk information for the gamut of Windows operating systems (“W2K” denotes Windows 2000.) Click on “DOS ? Windows 9X/NT4/2000/XP Excellent Bootdisks,” and then download the “custom” version of your operating system where possible. Apps like Nero and Roxio (free trials) are convenient for quickly setting up the requisite boot CD from the EXE boot file. You’ll want to make sure your BIOS is set to read off the CD drive before you begin reformatting. If you’ve never worked with BIOS and DOS before, we recommend that you get help from someone with advanced knowledge.

For a less thorough workaround, you can try reinstalling the operating system. It’s a simpler approach than reformatting with DOS, but it may not be able to disable fierce malware, such as a well-developed rootkit. Begin by feeding the original installation disk for your operating system into the CD-ROM. Choose to overwrite if you’re given the option, but don’t choose to make repairs.

Be Sociable, Share!

Wat web 2.0 Actually Is

I was surprised to find “I.T” people not knowing the meaning of web 2.0 when they were asked in a seminar. So I made up a plan to write few things about web 2.0 which will help them to understand how web 2.0 evolved and the importance. I would start with something that web 2.0 features are used by most of us these days and every day. All internet surfers uses it. So what is it? Well here are few of the examples :=

Web 1.0 Web 2.0
DoubleClick -> Google AdSense
Ofoto –> Flickr
Akamai –> BitTorrent
mp3.com –> Napster
Britannica Online –> Wikipedia
personal websites –> blogging
evite –> upcoming.org and EVDB
domain name speculation –> search engine optimization
page views –> cost per click
screen scraping –> web services
publishing –> participation
content management systems –> wikis
directories (taxonomy) –> tagging (“folksonomy”)
stickiness –> syndication

So now agreed that you are using it?? Ok then lets move further…

How actually it evolved :-

So as we all know that 2001 was a highly devastating year for the I.T industry and you all know the reason for it..Yes I am talking about the “dot-com bubble which marked a turning point for the web. Most of the companies were affected by this but there were few who survived..And thats where the web 2.0 concept began. New sites started getting launched more frequently than before. In the year and a half since, the term “Web 2.0” has clearly taken hold, with more than 9.5 million citations in Google. But there’s still a huge amount of disagreement about just what Web 2.0 means, with some people decrying it as a meaningless marketing buzzword, and others accepting it as the new conventional wisdom.

Here is the graphical format for web 2.0



Hope you get it cleared…if not or even if its clear its better you visit http://www.oreilly.com/pub/a/oreilly/tim/news/2005/09/30/
what-is-web-20.html for detailed information about the whole concept and get it cleared…I just tried to summarized the whole thing from the same source so that you understand it better and faster..

Be Sociable, Share!

Microsoft Excel Fails Math Test

Microsoft’s Excel 2007 spreadsheet program is going to have to relearn part of its multiplication table.

In a blog post, Microsoft employee David Gainer said that when computer users tried to get Excel 2007 to multiply some pairs of numbers and the result was 65,535, Excel would incorrectly display 100,000 as the answer.

Gainer said Excel makes mistakes multiplying 77.1 by 850, 10.2 by 6,425 and 20.4 by 3,212.5, but the program appears to be able to handle 16,383.75 times 4.

”Further testing showed a similar phenomenon with 65,536 as well,” Gainer wrote Tuesday.

He said Excel was actually performing the calculations correctly, but when it comes time to show the answer on the screen, it messes up.

Gainer said the bug is limited to six numbers from 65,534.99999999995 to 65,535, and six numbers from 65,535.99999999995 to 65,536, and that Microsoft is working hard to fix the problem.

Be Sociable, Share!
1 4 5 6 7 8 16