Wednesday, December 1, 2010

Samsung Galaxy 3 Issues

Problems encounter with Samsung Galaxy 3 mobile phone within 1 month usage:

1. Brows heavy web pages for some time and the 'Internet' browser crashes.
2. And after the problem 1 , phone restarts.
3. Battery suddenly drops from 40 % to 15%.
4. Voice Call quality is very poor in EAR phones.
5. When we replay the video in YouTube , it downloads again rather than using the cache.
6. Music Player : We cannot stop the song playing , we can only pause it. 

I have been using the Samsung Galaxy 3 mobile phone for past one month and above are the few issues i have encountered multiple times. Hoping Samsung takes up these issues and try to resolve them at earliest and please do not release phones unless regression testing is done on the phones. Quite dissappointed by Samsung phone :(

Thursday, January 7, 2010

Google's New Mobile Phone Nexus

Google has launched new mobile smart phone called the NEXUS , which expected to be sold as hot cakes across globe . But it hasn't been launched in all countires , that came as a dissappointment to many people across India including Hyderabad. This has got every thing which one wishes to have in this phone and is expected to capture considerable space of Apple's iphone in the coming days. The Internet giant Google anounced the touch-screen device on first Tuesday of January it is the culmination of collaboration with Taiwanese electronics titan HTC, a superphone that marked the next step in the evolution of its Android software across the globe. Nexus One handsets are no thicker than pencils and no heavier than keychain Swiss Army knives was claimed by Google's engineer Erick Tseng said while demonstrating one of the Google's smartphones.

Price of this Google Nexus One in India when launched is expected to be high in the intial days and will settle down after few months . Other mobile phone giant Nokia has to come up with some thing new and innovative that can give some strong competition to Nexus One. Currently Nexus one handsets are offered with collaboration of T Mobile Service in USA at a price tag of 179 dollars. Later in the coming days Nexus one will be sold in the Google's web stores at price tag of 529 dollars which will be unlocked version. If we have a people choice award ceremony for Smart phones and We are made the jury members we will give it straight away to Googles Nexus One.

This smart phone will be top on most desired smart phone for the year 2010 in India. I am personally a great fan of all Google products and I am eagerly waiting to get hands on this smart phone. Do leave your comments and feedback about Nexus One here.

Thursday, November 19, 2009

XML & Advantages

Extensible Markup Language often refferred as XML is gaining popularity with each passing day and most applicaitons are switching from traditional approaches to XML based approach and all new applications deals with XML .

Advantages of XML are as follows :

  1. It is Platform independent.
  2. It is easily manageable .
  3. It is in the form understandable by humans.
  4. Itis easy to create and alter , it can be done using a normal note pad.
  5. XML when viewed in browsers , shows a hierarchial structure and its node can be expanded as well as collapsed.
  6. XML when viewed in Microsoft Excel is displayed in a tabular form.
  7. XML is highly portable .
  8. We can create our own tags at any level in the XML file.
  9. Its very effective for faster network transmissions.
  10. XML has become the almost universally supported way of exchanging documents and data across applications and platforms.

List of applicaitons which can open a XML file:

  1. Notepad
  2. Wordpad
  3. Almost all browsers
  4. Microsoft Excel
  5. Almost all IDE's which are meant for coding

How to Open an XML file using Microsoft Excel :

  1. Right click a XML file
  2. Select the option "Open with " and choose Microsoft Excel
  3. Select the appropriate option , if not sure of the appropriate option select as a XML table.
  4. XML file will be in the tabular form.

Saturday, October 3, 2009

Tips: Increase Broadband Internet Speed

Here are few tricks and tips to increase / enhance your broadband internet speed across internet service providers (ISP) like BSNL , Tata , Hathway, reliance , airtel and others :

  1. Go to task manager and make sure your end unnecessary processes.
  2. Stop softwares and applications that continuously access severs without you requesting the same.
  3. Make sure your telephone or cable lines have lesser number of joins.
  4. Make sure your telephone or cable lines have lower noise.
  5. Have a good quality amplifier , if you require it.
  6. If you are using wireless connection or WiFi make it password protected , so that your neighbors don't utilize your bandwidth free of cost.
  7. Switch faster browsers like Google chrome.
  8. Make sure you increase your cache size , so that you need not frequently used images again and again.
  9. Always block pop up and do allow them to get loaded without your consent.
  10. Downloading shouldn't be scheduled for peak hours.

Feel free to share your tips and suggestions .

Thursday, August 13, 2009


Indian Space Research Organisation (ISRO) Bhuvan is the latest threat to google earth whose beta version will be launched today. The word Bhuvan is a sanskrit word meaning EARTH . It will be a web based tool much similar to Google earth which shows 3D imagary maps . Satellite images of any place around the world can be viewed on this tool. This tool will also be helpfull in measuring distance between two places.

Main Features of BHUVAN are as follows:

  1. Access, explore and visualise 2D and 3D image data along with rich thematic information on Soil, wasteland, water resources etc.
  2. Visualise multi-resolution, multi-sensor, multi-temporal image data.
  3. Superpose administrative boundaries of choice on images as required.
  4. Visualisation of AWS - Automatic Weather Stations data/information in a graphic view and use tabular weather data of user choice.
  5. Fly to locations , it flies from the current location directly to the selected location.
  6. Heads-Up Display ( HUD) naviation controls like Tilt slider, north indicator, opacity, compass ring, zoom slider.
  7. Navigation using the 3D view Pop-up menu like Fly-in, Fly out, jump in, jump around, view point.
  8. 3D view to fly to locations, objects in the terrain, and navigate freely using the mouse or keyboard.
  9. Drawing 2D objects like Text labels, polylines, polygons, rectangles, 2D arrows, circles, ellipse.
  10. Drawing 3D Objects and placing of expressive 3D models, 3D polygons, boxes.
  11. Snapshot creation , it copies the 3D view to a floating window and allows to save to a external file.
  12. Measurement tools which measures Horizontal distance, aerial distance, vertical distance, measure area.
  13. Shadow Analysis , it sets the sun position based on the given time creating shadows and effects the lighting on the terrain.
  14. Particular interest of ISRO/DOS would be to provide such functionalities to common man so that he/she adopts participatory approach with scientists to solve simple problems easily and interactively.

Indian Space Research Organisation (ISRO) has also successfully operationalised two major satellite systems namely Indian National Satellites (INSAT) for communication services and Indian Remote Sensing (IRS) satellites for management of natural resources; also, Polar Satellite Launch Vehicle (PSLV) for launching IRS type of satellites and Geostationary Satellite Launch Vehicle (GSLV) for launching INSAT type of satellites. The Space Commission formulates the policies and oversees the implementation of the Indian space programme to promote the development and application of space science and technology for the socio-economic benefit of the country. DOS implements these programmes through, mainly Indian Space Research Organisation (ISRO), National Remote Sensing Agency (NRSA), Physical Research Laboratory (PRL), National Atmospheric Research Laboratory (NARL), North Eastern-Space Applications Centre (NE-SAC) and Semi-Conductor Laboratory (SCL).

Watch this space for more updates from Bhuvan.

Saturday, September 20, 2008

BSNL Broadband - WiFi Disabling

Wifi is a great feature that is going to rule the future generations , WiFi gives us freedom from wires and cables making life easier . But as every thing has advantages and disadvantages even this technology has many disadvantges which can be misused like 

  1. Unauthorized acess to internet throught your account 
  2. Steal vital details from your system.
  3. System's can be hacked if left unprotected 
And many more problems are associated which i haven't listed . Well many people here in INDIA have broadband modem's which are Wi Fi enabled but hardly use them or they leave it open even when not in use .

Well I am using BSNL Broadband connection and recently disabled the WiFi (as currently i dont need it) after knowing its dangers .

Let me take you throught the procedure to disable WiFi connection .
  1. Go to administation site , BSNL administration site for you modem by default is  , well this may not work if you have choosen a dynamic IP address for your system .
  2. Go to Advanced Setup 
  3. Click the Wireless (WiFi ) section
  4. Un check the enable check box 
  5. Click the Save Button 
  6. Restart your computer
Well thats it your done , you have successfully disabled the WiFi connection . To make sure you have done so check whether the WLAN light doesn't glows any more .

Feel free to leave comments in case you face any problems ...................

Thursday, September 4, 2008

CHROME : Google's New Browser

Google Chrome has launched a new browser that is going to give tough competition to other browsers like Microsoft's Internet explorer , Mozilla Firefox , Opera , Safari and other browsers . This is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. Chrome is a open source browser which is going to over take all other browsers in no time . Chrome's browser window is streamlined , simple and too fast .Chrome is able to prevent one tab from crashing another tabs in the same window . It also provides improved protection from rogue sites. Google Chrome team also came up with a V8, a more powerful JavaScript engine, to power the next generation of web applications that aren't even possible in today's browsers.

Google Chrome contains many features that can be leveraged by webmasters to deliver a better end-user experience. Well this is just the beginning - Google Chrome is far from done , its still under BETA version. This beta version for Windows takes inputs and feedbacks from the user and comes up with new and improved version with each passing day .Google Chrome is working on building versions for Mac and Linux too, and they are expected to be even faster and more robust.

After knowing so much about Google's past track record and feedback from other chrome users , I decided to give it a try .Installation was simple and faster , in no time Googles Chrome was ready to be used. It has a clear and USER FRIENDLY interface with absence of cluttered buttons and bars on the top, thereby reducing the scrolling task.Other feature that fascinated me was home screen which itelligently stores most frequently visited websites and those sites open up just on a click. Most great news is its safe , secure and adware , malware free .

Well after using it for almost a week now , i would rate it as the best browser among all other browsers.

So go ahead and download you copy of GOOGLE'S CHROME browser.

Friday, August 1, 2008

Prevention from Session Hijacking

Session hijacking is a technique that involves intercepting a TCP session initiated between two machines in order to hijack it.The term session hijacking refers to the exploitation of a valid computer session .The Session's most important part is its session key . A exploiter or hacker usually exploits this session related data to gain unauthorized access to information or services in a computer system. This technique is used steal the cookies from a target system also called as a magic cookie , which is used to authenticate a user to a remote server. Sessions are of great importance to web developers, as the HTTP cookies used to maintain a session on most of the web sites . These cookies can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim's computer.

In this particular mode of hijacking the authentication check is performed only when the session is open, a hijacker who successfully launches this attack is able to take control of the connection throughout the duration of the session.If an attacker is able to steal the session cookie, he can pretend to be the same user, or hijack the session during its lifetime.

There are three primary techniques for hijacking sessions:

  • Brute Force - the attacker tries multiple IDs until successful.
  • Calculate - IDs are generated in a non-random manner and can be calculated.
  • Steal - using different types of techniques, the attacker can steal the Session ID.

Methods to prevent session hijacking: ( To be followed by Developers of Any Website)
  1. Regenerating the session id after a successful login. This prevents session fixation because the hacker/ attacker does not know the session id of the user after he has logged in.
  2. Use a long random number or string as the session key. This reduces the risk that an hacker/ attacker could guess a valid session key through trial and error or brute force attacks.
  3. Encryption of the data passed between the user and the web servers , specially the session key.
  4. A web server could check with each request made matches the IP address of the use from previous sessions.
  5. Can have services which change the value of the cookie with every request received.
  6. Prevent Eavesdropping within the network.
  7. Expire the session as soon as the use logs out .
  8. Reduce the life span of a session or a cookie.

Methods to prevent session hijacking: ( To be followed by USERS of Any Website)
  1. Do not click on the links forwarded to you through mails or IM's.
  2. Make sure you flush out cookies and session from your browser after every confidential and sensitive transactions.
  3. Do not simply close the browser , make sure that you click the log out button before closing the browser.
  4. Use Firewalls
  5. Restricts cookies to the maximum extend possible using the browser and firewall settings.
  6. Clear History and offline content for every few days.
  7. Prefer https rather than http for sensitive and confidential transactions.
  8. Make sure that the website is certified by the certifying authorities.

Feel free to write your comments and queries