Friday, December 28, 2007

DHTML

DHTML is an acronym for DYNAMIC HYPER TEXT MARK UP LANGUAGE , with the help of DHTML you can make your HTML pages dynamic.It is a combination of technologies used to create dynamic and interactive Web sites.Almost all popular website are dynamic for better results.

In order to use DHTML , you should have a basic understanding of the following:

  1. HTML
  2. CSS
  3. JavaScript

Following are the advantages of building DHTML Applications:

  • Lessened server load
  • Dynamic interaction
  • Fewer refreshes
  • Faster responses
  • Improved state management
  • Offline capability
  • Code security

For more such articles visit HOME PAGE : http://hydtechie.blogspot.com/

Wednesday, December 26, 2007

Nokia Phone Software Updater

Nokia N series , which has symbian in its phones , earlier had few problems like

  1. When we schedule security lock after a duration , gallery button does not work ( atleast that was the problem in my phone ).
  2. Even after assigning specific ringtone , default NOKIA tune used to ring occassionally.

These were issues were found in my N70 Nokia phone , not quite sure about other models like N70, N80, N95, N73, N72 , N82 etc . well if you found some other issues too , want to sort them out . It is really possible , in simple easy steps . Well before you start make sure you have the following


  1. High speed Uninterrupted Internet connection
  2. Data Cable
  3. 1GHz, or higher, Pentium compatible processor
  4. At least 256 MB of RAM (memory)
  5. Fully charged nokia phone battery
  6. Windows 2000 (SP4 or later), Windows XP (SP1 or SP2), or Windows Vista
  7. Administrator rights to install on your computer
  8. Uninterrupted power supply for your computer
  9. Latest Nokia PC suite software

Do not even think of updating your phone software , even if you dont have any one of the above listed.

So how update your phone ????? Follow the steps listed below

  1. Download NOKIA phone software updater, by following the link given below
    Click Here to Download NOKIA phone updater software
  2. Install NOKIA PC suite software on your computer
  3. Install NOKIA phone software updater on your computer
  4. Backup your data on computer ( all the data will be wiped out from your Nokia phone)using Nokia PC suite
  5. Disconnect the phone from data cable
  6. Launch the Nokia phone software updater
  7. Deativate auto keypad lock feature
  8. Follow the steps and connect the phone when asked for ( Around 40 MB will be downloaded to your phone)
  9. Once you get the message that you can use the phone , remove it from data cable and check out if its working fine . once it is working fine , restart your phone for better performance.
  10. Enjoy your updated phone.

Note : avoid updating your phone software too frequently if its working fine .

As on 25th December 2007 , the latest version is 5.0705.3.0.1

For more latest news , updates and tutorials about NOKIA PHONES , read my other articles too ( use the navigation links on the right hand corner ) or click the link below.

Latest Technology Updates

Found this article useful ????????? If yes, leave a word of appreciation

Tuesday, December 18, 2007

Compatible XML and XSLT Browsers

XML is the acronym for Extensible Markup Language and XSLT acronym for XML Style Language Transformations . So which browsers are XML and XSLT compatible , following is the list of compatible browsers.

Mozilla Firefox
Version 1.0.2 and above has support for XML and XSLT (and CSS).

Netscape Navigator
Version 8 and above has support for XML and XSLT , Netscape uses the Mozilla engine and has the same XML / XSLT support as Mozilla.

Opera
Version 9 of Opera has support for XML and XSLT (and CSS). Version 8 supports only XML + CSS.


Internet Explorer
Version 6 of Internet Explorer has supports for XML, Namespaces, CSS, XSLT, and XPath.
Version 5 is NOT compatible with the official W3C XSL Recommendation.

Sunday, December 16, 2007

Protect yourself from dangers of Control + C

You might read my previous article about the dangers of control+c, if not follow link below

Dangers of control +c

So how does it copy your data from your clipboard ??????

It very simple it uses java scripts for HACKING your data from the clipboard . the java script responsible for this is given below

"Script Language="JavaScript"> var content = clipboardData.getData("Text"); alert(content); "


Now important part how to protect yourself from this HACK

  • Avoid using INTERNET EXPLORER and switch to other browsers like FIREFOX or OPERA.
  • If you still want to use INTERNET EXPLORER , follow this steps
    • Go to Tools> Internet Options > Security , then select internet > Custom level and in the security settings, select disable under Allow paste operations via script.

Now your content is safe and secure from HACKERS .


found this information useful ? leave a word of appreciation
For more such useful informations visit
http://hydtechie.blogspot.com/

Dangers of Control + C

Whats the first thing that every one learns once he get system ?

The answer is how to copy text using control + c keys and then pasting it using control + v.


But there is lot of dangers associated with it , thinking what are dangers associated with it !!!!!!!!!!!!


Let me tell you .....when you press Ctrl+C while you are Online , it is stored in the clipboard of windows operating system .Well the danger associated with this that it can be retrieved by other websites which you visit . Just think if u have just copied your credit card number !!!!!!!!!!!!!! Scary right ?


Let me show u how it works

  1. Copy any text by Ctrl + C
  2. Click HERE TO SEE your COPIED TEXT
  3. You can see that your text is visible on the top.
So advice from me is avoid keeping sensitive informative like password , credit card number, phone number etc on the clipboard using ctrl+ c .

Forward this information to all your friends and relatives .

Wanna know how it works and how to safe gaurd yourself , read this article


Protect Yourself From Dangers of Control+C


Found this information useful ? if yes , leave a word of appreciation

http://hydtechie.blogspot.com/

Friday, December 14, 2007

N70 Specifications

I m using NOKIA N70 model since 15 months and very much satisfied with this phone after the recent online update I did for my phone , it fixed almost all the bugs it previously had .I got many request asking specifications of this model and its price in india.So people intrested in knowing about this model read this article . u can also visit http://www.nokia.co.in or check out my blog http://hydtechie.blogspot.com/


Network
UMTS / GSM 900 / GSM 1800 / GSM 1900
Announced in 2Q, 2005

Size
Dimensions
108.8 x 53 x 21.8 mm, 95.9 cc
Weight
126 g
Display Type
TFT, 256K colors
Size
176 x 208 pixels, 35 x 41 mm

- Five-way scroll key- Downloadable themes

Ringtones Type
Polyphonic (64 channels), Monophonic, MP3, True Tones
Vibration
Yes
Phonebook
Yes
Call records
Yes
Card slot
RS-DV-MMC, 64 MB card included, hotswap
- 35 MB shared memory for applications, SMS, MMS, ringtones
Data GPRS
Class 10 (4+1/3+2 slots), 32 - 48 kbps
HSCSD
No
EDGE
Class 10, 236.8 kbps
3G
Yes, 384 kbps
WLAN
No
Bluetooth
Yes, v2.0
Infrared port
No
USB
Yes, Pop-Port


Features
OS
Symbian OS 8.1a , Series 60 UI
Messaging
SMS, MMS, EMail, Instant Messaging
Browser
WAP 2.0/xHTML, HTML
Games
Yes + Java downloadable
Colors
Silver
FM Radio
yes


Camera
2 MP, 1600x1200 pixels, video, flash; secondary video call VGA camera

- Push to talk- Java MIDP 2.0- Video calling and download- MP3/AAC/MPEG4 player- FM Radio- T9- Voice command/memo- PIM including calendar, to-do list and printing- Integrated handsfree

Battery
Standard battery, Li-Ion (BL-5C) 970 mAh
Stand-by
Up to 265 h
Talk time
Up to 3 h 30 min

Price in hyderabad : 14,000 rupees ( price may vary check outlets for exact price )

Saturday, December 8, 2007

Wi Fi

Wi-Fi, the latest technology BUZZ word from the IT world, popularly known as an acronym for wireless fidelity , was originally a brand licensed by the Wi-Fi Alliance to describe the embedded technology of wireless local area networks (WLAN) based on the IEEE 802.11 specifications.

Wi-Fi is now increasingly used for more services, including Internet and VoIP phone access, gaming, and basic connectivity of consumer electronics such as televisions, DVD players, and digital cameras. More standards are in development that will allow Wi-Fi to be used by cars on highways in support of an Intelligent Transportation System to increase safety and enable mobile commerce (see IEEE 802.11p). Wi-Fi and the Wi-Fi CERTIFIED logo are registered trademarks of the Wi-Fi Alliance - the trade organization that tests and certifies equipment compliance with the 802.11x standards.


Please do leave your comments ............

Monday, December 3, 2007

N70 : Tips n Tricks

Quite useful tips and tricks for N70 and other Nokia phone models like N80, N95, N73, N82 ,N72, etc......

  1. To turn off the Nokia tune on switching on , press # key on keypad.
  2. Check your firmware version by pressing *#0000#
  3. Check the life timer of the phone by pressing *#92702689#
  4. Check the International Mobile Equipment Identity (IMEI Number) by pressing *#06#
  5. Check the unwanted tasks running at the background by holding MENU button for more than 2 seconds.
  6. Switching from any profile to SILENT profile can be done by holding # key for more than 2 seconds.

Keep looking at http://hydtechie.blogspot.com/ for more updates from the world of Mobile Phones.

Friday, November 30, 2007

Microsoft Bugs

BUG #1
An Indian discovered that nobody can create a FOLDER anywhere on the
Computer which can be named as "CON". This is something pretty
Cool...and
Unbelievable... At Microsoft the whole Team, couldn't answer why this
happened!
TRY IT NOW ,IT WILL NOT CREATE " CON " FOLDER


BUG #2

For those of you using Windows, do the following:

1.) Open an empty notepad file
2.) Type "Bush hid the facts" (without the quotes)
3.) Save it as whatever you want.
4.) Close it, and re-open it.

is it just a really weird bug? :-??


BUG #3


This is something pretty cool and neat...and unbelievable... At Microsoft .
The whole Team, including Bill Gates, couldn't answer why this happened!

It was discovered by a Brazilian. Try it out yourself...

Open Microsoft Word and type

=rand (200, 99)

And then press ENTER
Then see the magic...............................

Thursday, November 22, 2007

Sumatra : PDF Reader

Most of us might be using Adobe Acrobat Reader for reading PDF files but do you know it is hungry for resources of your system , specially the latest version .Well thats not the only PDF viewer available on internet.

Sumatra PDF is a slim, very fast, free, open-source , fairly young project aiming to create a small, simple and fast PDF viewer. It has a minimalistic design and simplicity has a higher priority than a lot of features.

It main features are showing PDFs and starting up really fast - and it does both just perfectly. Apart form the mentioned features Sumatra PDF is very portable since it has no external dependencies - it is just one file, so you can easily put on your USB stick and bring it with you. Sumatra PDF is based on the open source PDF rendering library poppler.


click below to download SUMATRA


Download Sumatra



Download Sumatra in zipped format

Wednesday, November 7, 2007

Blu Ray disc

Blu-ray, also known as Blu-ray Disc (BD), is the name of a next-generation optical disc format jointly developed by the Blu-ray Disc Association (BDA), a group of the world's leading consumer electronics, personal computer and media manufacturers . The format was developed to enable recording, rewriting and playback of high-definition video (HD), as well as storing large amounts of data. The format offers more than five times the storage capacity of traditional DVDs and can hold up to 25GB on a single-layer disc and 50GB on a dual-layer disc. This extra capacity combined with the use of advanced video and audio codecs will offer consumers an unprecedented HD experience.


While current optical disc technologies such as DVD, DVD±R, DVD±RW, and DVD-RAM rely on a red laser to read and write data, the new format uses a blue-violet laser instead, hence the name Blu-ray. Despite the different type of lasers used, Blu-ray products can easily be made backwards compatible with CDs and DVDs through the use of a BD/DVD/CD compatible optical pickup unit. The benefit of using a blue-violet laser is that it has a shorter wavelength than a red laser , which makes it possible to focus the laser spot with even greater precision. This allows data to be packed more tightly and stored in less space, so it's possible to fit more data on the disc even though it's the same size as a CD/DVD. This together with the change of numerical aperture to 0.85 is what enables Blu-ray Discs to hold 25GB/50GB.


Blu-ray is currently supported by more than 180 of the world's leading consumer electronics, personal computer, recording media, video game and music companies. The format also has broad support from the major movie studios as a successor to today's DVD format. In fact, seven of the eight major movie studios are supporting the Blu-ray format and five of them are releasing their movies exclusively in the Blu-ray format. Many studios have also announced that they will begin releasing new feature films on Blu-ray Disc day-and-date with DVD, as well as a continuous slate of catalog titles every month.

Sunday, November 4, 2007

Calculations Using DOS

The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers:

C:\>set /a 3+2
5
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/6
3
C:\>set /a "31>>2"
7

Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator.

For more information, type set /? at the command prompt.

Worms

What is a worm?
A worm is a virus that does not infect other programs. It makes copies of itself, and infects additional computers (typically by making use of network connections) but does not attach itself to additional programs; however a worm might alter, install, or destroy files and programs


http://hydtechie.blogspot.com/

Phishing

What is phishing?
'Phishing' refers to the practice of fraudsters 'fishing' for your details in order to find out and misuse sensitive personal and financial information. Criminals may, for instance, make identical copies of existing corporate websites, or send scam e-mails to elicit a response from you and trick you into divulging your personal information.
Example : Mellisa and Code red


http://hydtechie.blogspot.com/

Free LINUX OS CD's

wanna LINUX CD's shipped absolutely free of cost at your door step ?

WELL UBUNTU is the perfect flavor of Linux , which send you LINUX CD's right at your door step in most of the countries including INDIA absolutely free .

well before i tell you the procedure to get free cd's, lets see what is Ubuntu ?

Ubuntu ( LINUX operating system ) which is an African word meaning 'Humanity to others', or 'I am what I am because of who we all are'. The Ubuntu distribution brings the spirit of Ubuntu to the software world.
Ubuntu is a community developed, linux-based operating system that is perfect for laptops, desktops and servers. It contains all the applications you need - a web browser, presentation, document and spreadsheet software, instant messaging and much more.

Ubuntu is and always will be free of charge. You do not pay any licensing fees. You can download, use and share Ubuntu with your friends, family, school or business for absolutely nothing.

It issues a new desktop and server release every six months. That means you'll always have the the latest and greatest applications that the open source world has to offer.

LINK to get the free CD's of UBUNTU delivered at your doorstep


CLICK HERE TO GET FREE LINUX CD'S


Fill the required details , don't worry none of your personal details will be captured by them .

So go ahead and get your latest free cd's of Ubuntu ...............

http://hydtechie.blogspot.com/

Hey I got my CD's , and i have started using them too

GNU

What is GNU ?

The GNU Project, pronounced “guh-noo”, was launched in 1984 to develop a complete UNIX style operating system which is comprised of free softwares: the GNU system. Variants of the GNU operating system, which use the Linux kernel, are now widely used.

The GNU project is closely linked to the philosophy of free software, which is central to the projects that derive from it, such as Ubuntu.

Friday, November 2, 2007

NetBeans Free CD

The NetBeans IDE is a free, open-source Integrated Development Environment for software developers. The IDE runs on many platforms including Windows, Linux, Solaris, and the MacOS. It is easy to install and use straight out of the box. The NetBeans IDE provides developers with all the tools they need to create professional cross-platform desktop, enterprise, web and mobile applications.

http://hydtechie.blogspot.com/



Please complete and submit the form present in the link below to receive a free NetBeans free CD that includes the NetBeans IDE 5.5.1, NetBeans Mobility Pack 5.5.1, NetBeans Profiler 5.5.1 and Sun Java System Application Server 9.0update1 Platform Edition. In addition to the standard English distribution, localizations of the NetBeans IDE, Mobility Pack and Profiler are available in Simplified Chinese, Japanese and Brazilian Portuguese. CD will be sent to your doorstep absolutely free of cost .



Click here to get FREE NetBeans CD

Spoofing

What is spoofing ?

Website spoofing is the act of creating a website, as a hoax, with the intention of performing fraud. To make spoof sites seem legitimate, phishers use the names, logos, graphics and even code of the actual website. They can even fake the URL that appears in the address field at the top of your browser windows and the Padlock icon that appears at the bottom right corner.

More tech news visit
http://hydtechie.blogspot.com

Component Object Model (COM)

What is COM ?

COM stands for Component Object Model, which is binary specification for software code re-use. It has a standard that is imposed for the interfaces through which client talks to the component classes. The component’s IUnknown interface helps to maintain a reference count of the number of clients using the component. When this count falls below zero, the component is unloaded.

http://hydtechie.blogspot.com/


All components should implement the IUnknown interface. The reference count is maintained by the following methods
IUnknown::AddRef()
IUnknown::Release()
and interface discovery is handled through IUnknown::QueryInterface().

http://hydtechie.blogspot.com/

Skimming

Skimming is a method used by fraudsters to capture your personal or account information from your credit card. Your card is swiped through the skimmer and the information contained in the magnetic strip on the card is then read into and stored on the skimmer or an attached computer. Skimming is a tactic used predominantly to perpetrate credit-card fraud – but it is also a tactic that is gaining in popularity among identity thieves.


http://hydtechie.blogspot.com/

Wednesday, October 31, 2007

Firewall

Personal Firewall Choices


What is a firewall ?
A system designed to prevent unauthorized access to a private network or a system. Firewalls can be implemented in both software and hardware, or a combination of both.
lets see various firewalls :

Microsoft Windows Firewall -- The Vista and XP Service Pack 2 operating systems have personal firewalls built in that are turned on by default to block threats from the Internet. You should leave this feature turned on until you replace it with third-party software and/or hardware.

Two-Way Third-Party Personal Firewall Software -- These firewalls block both incoming and outgoing threats. A computer has outgoing threats when it becomes infected with a virus , trojan or spyware . Two common ways to address this are by vendors including a list of safe software for the firewall to check and/or by issuing a pop up alert to the user asking for advice on what to do.

Recommended products :

  • Zone ALarm Pro from CheckPoint [retail & free versions]
  • Sunbelt /Kerio [freeware & retail versions]
  • Comodo [freeware]

Internet Security Software Suites -- These products include two or more security features such as a personal firewall, anti-virus, anti-spyware and more. Recommended retail products with links to vendors:

  • Norton Internet Security 2007 or Norton 360 from Symantec include personal firewall and protection from viruses, worms, spyware, intrusion, phishing and root kits. Also includes behavioral monitoring features. The free online add-on pack includes anti-spam, parental control, confidential information blocking, and ad blocking. "Norton 360" adds automatic backup and restore with 2 GB of online storage, PC tune up and embedded support components.
  • Zone Alarm internet security suite from CheckPoint features include network, program and operating systems firewalls, antivirus, identity theft protection, anti-spyware, spy site blocking, auto-learn, privacy protection, IM protection, game mode, essential email security, wireless PC protection, parental control, and smart defense service.

Hardware Firewalls -- A hardware firewall is usually a small box that sits between a modem and a computer or network. The firewall is either based on "network address translation" (NAT) which hides your computer from the Internet or NAT plus "stateful packet inspection" (SPI) for more protection. There are three basic types of hardware devices that include firewalls for home users, routers and broadband gateways . They can be used in addition to a software firewall on each computer because they run on a separate box preventing most compatibility problems. Recommended broadband gateway retail product with link to vendor:

  • Zone Alarm Secure Wireless Router from CheckPoint with SPI firewall, gateway antivirus and additional features.

Important Tip -- Never use two personal firewall software products at the same time. Fully uninstall one before installing another to prevent compatibility problems.

http://hydtechie.blogspot.com/

Hyderabad Software Job Openings

Wanna get informed about the latest news about openings for freshers and experienced people in HYDERABAD .

Join our community in ORKUT :


CLICK HERE TO JOIN THE JOB COMMUNITY IN ORKUT


And get updated about openings from various companies like


  1. Cognizant
  2. Infosys
  3. Microsoft
  4. Oracle
  5. Wipro
  6. TCS
  7. Satyam
  8. Dell
  9. HSBC
  10. ADP
List of all MNC's that has presence in HYDERABAD is listed in this community.


More over u can get tips for freshers and experienced people to face interviews , previous placements papers , resume writing tips , etc


Do leave your comments
http://hydtechie.blogspot.com/

Beta Version

A "beta" is a pre-release version of a product that is available for public testing before the final version of the product is released. Through public testing, they can evaluate how the product performs in "real world" environments and collect valuable feedback from you.


Your valued opinions will make the products the best they can be and help them exceed the customers’ expectations.
So no harm in trying out BETA softwares .......... go ahead


http://hydtechie.blogspot.com/

JavaScript

Whats is JAVASCRIPT ?

Brief overview of JAVASCRIPT is given below .

It is a scripting language.

  • It is designed to make HTML pages interactive.
  • It consists of lines of executable code.
  • It is usually embedded directly into HTML pages.
  • It is an interpreted language.
  • It executes without preliminary compilation.

Feel free to add more stuff about it in the comments

http://hydtechie.blogspot.com/

Monday, October 29, 2007

10 Ways to Defend Against IM Threats

Consumers can protect themselves from viruses, worms, and Trojans delivered through IM. By following some basic rules, it’s easy to keep these threats from slowing you down.

  • Choose your screen name carefully. Don't use your real name, email address, or other personally identifiable information.
  • Only share your screen name with people you trust, and ask them to keep it private. Only communicate with people on your contact or buddy list. To prevent “spim” (IM spam), use settings to block messages from people you don’t know.
  • Don’t display your screen name or email address in public places such as Internet directories or personal profiles. Some IM services link your screen name to your email address when you register. Consider setting up a secondary email account if this is the case, since your address could be harvested for phishing attacks.
  • Never provide private information like account numbers or passwords in an IM conversation. Network sniffers can intercept unencrypted IM traffic. Anti-virus software and a firewall will protect you from Trojans and viruses, but cannot protect your information once it leaves your PC.
  • Fortify your computer with strong security software and keep it up to date. The security suite guarantees trusted PC protection from viruses, hackers and spyware. Its cutting-edge features include X-Ray for Windows®, which detects and kills rootkits and other malicious applications that hide from anti-virus programs. Its integrated anti-virus, anti-spyware, firewall, anti-spam, anti-phishing, and backup technologies work together to combat today’s sophisticated, multi-pronged attacks.
  • Configure your IM application correctly. Make sure it does not open automatically when you fire up your computer. Turn off your computer and disconnect the DSL or modem line when you’re not using it.
  • Enable automatic Windows updates, or download Microsoft® updates regularly, to keep your operating system patched against known vulnerabilities. Install patches from other software manufacturers as soon as they are distributed. A fully patched computer behind a firewall is the best defense against Trojan and spyware installation.
  • Configure your anti-virus software to automatically scan all email and IM attachments and downloaded files. Never open attachments from people you don’t know. If you know the sender, contact them to confirm the file is trustworthy. Beware of spam-based phishing schemes—don’t click on links in emails or instant messages.
  • Be careful when using P2P file sharing with IM. Trojans sit within file sharing programs waiting to be downloaded. Avoid files with the extensions .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd. Configure your file settings to limit the folders that other users can access.
  • Monitor and limit your children's use of IM. Put the computer in a high traffic family area and limit nighttime use. Parental controls in the firewalls or any security suites help parents control the information that their children receive and send.

http://hydengg.blogspot.com/

LINUX

The Linux kernel, pronounced 'linnuks' is the heart of the Ubuntu and many more other operating system. A kernel is an important part of any operating system, providing the communication bridge between hardware and software.


Linux was brought to life in 1991 by a Finnish student named Linus Torvalds. At the time, it would run only on i386 systems, and was essentially an independently created clone of the UNIX kernel, intended to take advantage of the then-new i386 architecture.

The Linux kernel has gained an ideological importance as well as a technical one. There is an entire community of people who believe in the ideals of free software and spend their time helping to make open source technology as good as it can be.People in this community gave rise to initiatives such as Ubuntu, standards committees that shape the development of the Internet, organizations like the Mozilla Foundation, responsible for creating Mozilla Firefox, and countless other software projects from which you've certainly benefited in the past.The spirit of open source, commonly attributed to Linux, is influencing software developers and users everywhere to drive communities with common goals.

Click here to read more about latest technologies

Also u can read about HYDERABAD at http://hydengg.blogspot.com/