Sunday, January 31, 2010

New Gel-Covered Computer Mouse

A start-up company has launched a rather unusual kind of computer mouse: it is round, covered in a smooth, gel-like coating, looks more like a tennis ball than a mouse, and costs $35 a piece. Read on to find out what the attraction is, and where you can get one!

While the new mouse is grey over most of its body, its scrolling wheel and plastic bottom come in bright fluorescent colors to brighten up your desk. The gel material that covers most of the mouse is not thick enough to act as a stress-release ball, but it does bring a touch of tender loving care to your working day!

Currently available exclusively on Amazon, the gel-covered mouse comes in a small metal case, and is ready to plug into the USB port of a Windows, Mac or Linux computer

Thursday, January 28, 2010

One Hundred Things to Watch Out for in 2010

The 100 Things to Watch Out for in 2010 list reflects the broad shifts that JWTIntelligence has been following, around a variety of behaviors. From increasing sensitivity about health and the environment, to unbelievable developments in technology — it is all in here.

Changing times

The items on the list succeed in highlighting the fact that accelerating demographic, political, and economic power shifts are having an impact on our everyday lives. Another interesting conclusion thrown up by the list, is the way that industries are reinventing themselves to survive, by fully leveraging these shifts.

Among the usual items, are the alternative measures of prosperity, alternative metals used in jewelry, Asia’s widening income gap. Bio-based airplane fuel, electric cars and ethical fashion in brighter colors will be joining the eco landscape this year as well as LED bulbs, TV/web integration, composting, and hybrid boats. Mobile ticketing and virtual currencies, organic fast food, and recycling gray water are also new ideas.

Some of the more unusual entries on the list are augmented reality, bacon flavors in all kinds of food including ice-creams, the increasing popularity of coconut water, and contemporary Indian Art. Cordless power, customized pharmaceuticals, and electronic libraries are all set to gain ground this year, and energy dieting, local non-profit online newspapers, paid online content, and public bicycles will become more popular. How about retail as a third space, the return of the water fountain, or silent dance parties with headphones? Just what is Ski Cross, debuting at the Vancouver Winter Olympics? And how does a waterless washing machine work?

Read the list and find out. Which innovations are you most looking forward to in 2010?

How to run a PC without anti-virus

From within your operating system, there are tools you can use to help ward off evil software, too. All browsers today, for instance, provide some security tools, including anti-phishing filters or lists of Web sites that are known carriers of harmful software. Use these features -- they won't slow you down. Common sense is your biggest defense.

you should have some kind of antivirus protection on your PC, especially if you surf the Internet or trade files with anyone. There are plenty of people, though, who hate antivirus programs -- and with good reason. Most of them are resource hogs, slowing down your computer; many of them throw up more false positive warnings than legitimate ones, slowing down your work and annoying you in the process. These days, most are leased on a yearly basis, meaning you must pay up every year in order to keep your antivirus signatures current. All of that adds up to some pretty painful medicine to have to swallow to potentially rid your PC of some malicious software. Can you possibly just say "no" to antivirus software? The short answer is, "yes, you can." But to remain virus and spyware free, you'll need to adopt some precautions -- and stick with them.
Use clean software

An antivirus-free computer should start and stop with legitimate, clean software. That means eschewing copies of programs that can be downloaded through warez sites or on newsgroups, borrowed from friends through file sharing, or found on shareware and freeware sites.Remember that being without an antivirus program often means living without on-demand scanning, so a file you download online isn't as easy to check for viruses as it would be if you had an antivirus program installed. Still, plenty of people can and do assemble systems solely with commercial, off-the-shelf applications, and you can, too.

Scan your PC remotely

If you have more than one PC, you can install antivirus software on one while leaving the other machine without antivirus software. If the two machines can see each other over a network -- home or office -- then you should be able to map the drives of one computer onto the one with antivirus software installed and check individual files or entire drives through your network connection.

Or you could take advantage of free online virus and spyware scanning tools. Trend Micro's House Call (http://housecall.trendmicro.com) and Eset's Online Scan (http://www.eset.com/onlinescan) will perform a scan of your computer right from the Internet. Such scans might not remove any viruses or spyware found, but they will at least tell you how clean your computer is.

LinkShare  Referral  Prg

Use built-in protections

Antivirus protection might not yet be a built-in feature of Windows and other operating systems, but security has long been of concern to everyone who uses computers, and the result is that you'll find some malware protection already built in to the computer you're currently using.
Before your computer even loads your operating system, it launches the code found in your system's BIOS (basic input-output system), which initiates the hardware in your PC and enables your operating system to identify the components you have. Within the BIOS of most PCs -- accessible by pressing F2 or Del during bootup -- is an optional boot sector protection mechanism. Enable this, and you'll protect against boot sector viruses without ever installing a single antivirus tool.
From within your operating system, there are tools you can use to help ward off evil software, too. All browsers today, for instance, provide some security tools, including anti-phishing filters or lists of Web sites that are known carriers of harmful software. Use these features -- they won't slow you down.
Free Operating System tools

In addition, there are free tools available that are less obtrusive than most antivirus packages. Microsoft provides Windows Defender for free on Windows Vista, and it's available as a free download for Windows XP and Windows Server 2003.Windows Defender's focus is on spyware, which can be among the most dangerous types of malicious software, since its primary purpose is to track what you do and, in some cases, steal personal information.
Watch those websites

Common sense will go a long way toward keeping your computer safe if you don't use antivirus software. Stay away from sites that are frequent carriers of spyware. These include, ironically, many sites that purportedly sell anti-spyware software.
A list of such sites is at the Spyware Warrior Rogue/Suspect Web Sites page (http://www.spywarewarrior.com/rogue_anti-spyware.htm#sites). Porn and gaming sites are also to be approached warily if you have no spyware or antivirus protection.
Email with care

Delete any e-mail message from an unknown source if it contains an attachment. The majority of malware contracted through e-mail comes in the form of attachments that the sender tries to get the recipient to open.
Just say no. The large majority of viruses are contracted from unsolicited e-mail, so use an e-mail application with a built-in spam checker, if at all possible. Sometimes viruses are carried in Word documents from friends or colleagues who are not aware that the files are protected.In such cases, without an onboard antivirus tool, it makes sense to run the file through one of the free online scanners mentioned earlier. Do this before you open the file. The payoff for all of this caution should be well-known to anyone who has watched with chagrin as an otherwise speedy and trouble-free computer was made to feel like yesterday's technology after the latest bloated antivirus software was installed. Less really is more, if you can get away with it. And for those intrepid computer users with a survival plan, doing without antivirus protection can be a giant step in the right direction.

Wednesday, January 27, 2010

TRACK FEEDLESS SITES


Ever wanted to track or monitor changes that happen on your favorite websites but could not do it because the sites don’t have feeds? Now you can do that with Google Reader. It now lets you create custom feed for those sites which don’t available feeds.
The process is similar when your adding subscriptions to your Google Reader account for sites with feeds. You simply add the url of the site into Google Reader’s “Add a subscription” box and then Google Reader will periodically visit this site to monitor changes and updates and then publish those using the customized feed for the site.

Sunday, January 24, 2010

how to commit virtual sucide

How to Commit Virtual Suicide



Obsessive social networking is just like alcoholism-first,euphoria,then,bottomless shame and self-loathing.
If you want to sober up,try seppukoo.Inspired by the samurai tradition of self-skewering,the site allows you to get off Facebook and make you a nice memorial page and obituary.



Thursday, January 21, 2010

The Space Bar

The Space Bar is an aluminium keyboard cover that can slip right over keyboards that measure 18 inches wide and 1.5 inches deep;aside from covering things ip,it also provides six easily accessible USB 2.0 ports.

The Space Bar is a simple, elegantly designed desk accessory that functions to minimize clutter while also providing additional USB ports for your computer.

The product which appeal to cleanliness freaks is priced at $42 as of now.


Source: quirky

YouTube Makes Major Changes

YouTube has launched a complete redesign of its video pages and its video player, ensures simplicity and video discovery. And it removed the five-star video rating system. Currently the new design is opt-in,later it will be made default.

Many menu items and options have been removed.
The actual player has changed as well. No longer is there an “HD” button, but the option to choose your resolution, from 480p to 720p or 1080p HD.

- There is no longer a five-star rating system. There is now a “like” and a “don’t like” button, which YouTube says better reflects how users interact with their videos.

- Many of the options are now under the video. You can save items to playlists, share to your social networks and flag the video.

- If you click on the viewcount, YouTube video analytics will appear below. This was available before, but a lot more people should find this feature.

- Comments have been simplified and cleaned up.

- The “Broadcast Yourself” tagline has been removed from the logo, although the final decision on whether to remove it has yet to be made.

Tuesday, January 19, 2010

Hands-Controlled TV

Forget remote controls and buttons when you’ve got hands to change the channel and adjust the volume.
A flick of the wrist in the air to change channels. A wiggle of the fingers to turn the volume up or down. Softkinetic, a Brussels-based software company, has teamed up with another Belgian firm, Optrima, a maker of 3D cameras and sensors, and US computer chip giant Texas Instruments to make this vision of the future a reality.

Softkinetic creates software that can run on any 3-D camera to translate people’s movements into commands set-top boxes or television sets can understand. Softkinetic is primarily in the gesture-controlled video game space (think Wii without the Wiimotes), and is working with companies like France Telecom’s Orange to develop applications to control TVs. Softkinetic is similar to Gesturetek, which is the software that handles gesture control for upcoming Hitachi sets.


Source: newteevee

Sunday, January 17, 2010

Eco-Science: How Far Did We Get in 2009?

Light up your home with green energy: Philips’ LED bulb emits the same amount of light as its incandescent equivalent but uses less than 10 watts and lasts for 25,000 hours — or 25 times as long. Replacing regular sixty-watt by LED bulbs, the U.S. could save enough electricity per year to light 17.4 million households.
Control your game without a controller: Does your joystick, trackball, mouse or light gun come between you and your video game? These controllers will hamper you no longer – Microsoft’s Project Natal enables players to control games using only body movements and voice commands. Move your hand, and the on-screen character moves his too, and less gadgets means less consumption and pollution.

Modernize your farm: Stressed for space? No problem. Valcent, an El Paso-based company, has come up with a hydroponic-farming system. Seeds are planted in rotating rows, one on top of another, thus ensuring sufficient light and nutrients, and less use of water. The biggest advantage is increased food supplies in the same amount of land.

Create energy with your roof: The Dow Chemical Co. has developed a new roof shingle that doubles as a solar panel. These low-cost shingles are expected to cost 10 to 15 percent less than traditional solar panels, and will be quicker to install.

Feed your car while you race: England’s University of Warwick has developed the World’s First Formula 3 racing car with steering made of carrot fibers, side mirrors of potato starch, and brakes made of cashew-nut shells. Fuel the car with a biodiesel mix of chocolate and vegetable oil and you are all set to race. And it gets even greener - the radiator coating converts ozone emissions into oxygen.

Origami for speakers: Chicago-based OrigAudio takes recycling to the next stage with foldable, self-powered, 1-watt speakers made of heavy-duty recycled paper. These easy-to-assemble speakers can be folded into a flat sheet that fits into a laptop sleeve, then just hook them up to any audio device with a headphone jack and you are ready to roll.

Blooming benches: Finding a tree for shade in the summer can sometimes be difficult in our urban concrete jungles. South Korean designer BonSeop Ku’s Bench provides an innovative natural shade to the passersby. It blooms like a flower to provide shade during the day and produces green electricity to work as a streetlight in the dark.

Skoot to beat pollution: Pollution and parking are two major problems in cities all over the world. Designer Stuart Emmerson has popped up an electric scooter that provides safe and sustainable commute. The Skoota has an in-wheel brushless hub motor to provide an eco-drive for young riders. The lightweight (about 20 kg) vehicle runs on lithium batteries and solar power for an entirely sustainable ride, reducing the user’s carbon footprint.

Drive your luggage: Say no to aching muscles from pulling around heavy luggage with Samsonite’s new luggage bag which turns into a mini scooter, allowing you to scoot around with your luggage safely tucked away. The scooter itself folds up as a normal luggage carrier, helping you to get around under your own steam.

Get going on an all-terrain wheelchair: Argentina’s Francisco Lupin has come up with a functional all mountain wheelchair that integrates a suspension system to adapt to the weight of the user, together with a regulator of camber in the front wheels and an adjustable belt. The wheelchair is not only lightweight and comfortable to use even in uneven terrains, but also economical.

Saturday, January 16, 2010

How does hybrid engine work?

Hybrid engine use two or more power sources.They consist of a usual fuel engine,complemented by polution-free engine,an electric engine for example.The fuel engine and brakes are used to recharge the batteries for electric engine,eliminating the need to plug in while unused.When brakes are applied,some of the energy being used to stop the vehicle is collected by regenerative brakes of electric engine.Hence the electriccal engine takes control when cruising stopping or slow acclerating,reducing the use of fuel.

How to Fix Printer Error 40

Error code 40 Problem: " Data Transfer Error " error message

Possible Cause and Solutions:

•Make sure computer and printer are set to the same baud rates. Reset as needed.
•Is the computer powered off!
•Check the MIO card, remove, clean contacts, reinstall. Replace if defective
•An abnormal connection break may have occurred during data transfer - Press Continue or Go to clear this error message.
•Windows XP, click Start and then click Control Panel. Click Printers And Other Hardware and Printers And Faxes. In the Printers And Faxes window, from the File menu, click Server Properties, then click the Drivers tab. This shows the settings in your printer's driver. Compare the settings in this dialog box with the ideal settings in your printer's manual. If you see a discrepancy in these settings, the printer may simply need a new driver and delete old one. You can download printer drivers from the printer manufacturer's Web site.

Friday, January 15, 2010

New things in next-gen iPhone

Rumour mills are abuzz with Apple set to launch the next version of its iconic iPhone. Media reports suggest that Apple is in process to update its current iPhone model --iPhone 3GS.
New plastic casing
Speculations are rife that the next-generation iPhone will feature a touch-sensitive plastic back casing similar to the company's Magic Mouse released in October 2009. Apple Magic Mouse lacks any physical buttons on its solid acrylic surface. It allows multi-touch controls that are closer to that of a MacBook trackpad
OLED screen
iPhone 4 is said to sport an OLED touchscreen display. With major cellphone makers shifting to AMOLED displays in their latest devices, this seems to be a must from iPhone 4.0

iPhone 4G will have an OLED screen and support video chat, wrote Korea Times quoting a high-ranking official of KT, Apple's exclusive local partner in South Korea.

Google's Nexus One also sports an AMOLED touchscreen display. Apple's current iPhone 3G S features a 3.5 inches LCD display
Camera
Reports say that the next iPhone will have a higher megapixel camera vis-a-vis the current model. The upcoming model is likely to have a 5 megapixel camera which will bring it on par with its newest rival Google Nexus One. Gossip mill also says that Apple will introduce an LED flash in the new model.

Apple's current model iPhone 3G S ships with a 3 megapixel camera with video capturing, auto-focus mechanism and editing capabilities. In fact, Apple was widely criticised for retaining the same 2 megapixel in its 3G model released in June 2009.
New OS
Rumour mill is also abuzz with the news that the iPhone 4.0 will port the updated version of iPhone Operating System. Apple had announced version 3.0 of the iPhone OS for the iPhone 3G S released in June 2009.

A Korea Times report speculates that the fourth-generation iPhone would carry dual-core microprocessors and more powerful graphics.
Removable battery
Rumour mill also suggests that iPhone 4.0 will have removable batteries. However, this seems highly speculative considering that Apple 's all latest laptops also sport non-removable batteries. However, reports say that Apple plans to include a user-replaceable battery in its upcoming model.

Apple had earlier refused to use removable batteries in all three generations of iPhones reportedly saying that this will add bulk and weight to the device. However, almost all iPhone rivals come with user-replaceable batteries.




Video chat
Video chat feature too may finally debut in the new iPhone.

Currently iPhone 3G S does not have a front-facing camera for video conferencing. This means the device is not capable of sending videos across a Wi-Fi or cellular network in real-time
RFID reader
iPhone 4.0 may also carry a radio-frequency identification (RFID) reader. An RFID reader would scan RFID tags, which consist of a computer chip coupled with an antenna. Data stored on the chip transmits wirelessly through the antenna to an RFID reader operating on the same frequency as the antenna. Many retailers use RFID tags to track products in transit.

Source: indiatimes

Thursday, January 14, 2010

PDFs used to Hack Google and Adobe

The cyberattack that hit its corporate network earlier this month was connected to the large-scale attacks Google cited yesterday as one reason it might abandon China.
some researchers have hinted, and others have claimed, that the attacks against both Google and Adobe were based on malicious PDFs that exploited a just-patched vulnerability in Adobe's popular Reader software.

Adobe is the first company to step forward after Google announced yesterday that the attacks were aimed at accessing Gmail accounts of human rights activists .

"We are still in the process of conducting our investigation into the incident," said Wiebke Lips, Adobe's senior manager of corporate communications, in an e-mail reply to questions today. "[But] It appears that this incident and the one Google announced earlier are related."

Yesterday, Google and Adobe acknowledged that their company systems had been struck by what both firms characterized as "sophisticated" attacks. Google added that it believed the attacks against its network, which took place last month, originated in China.

Google claimed that some of its intellectual property was stolen in the attack, and added that another aim of the assault was to access the Gmail accounts of Chinese human-rights activists. The California-based search firm cited the latter, as well as ever-more-restrictive rules ordered by the Chinese government, in its decision to review its business in the country.

If the Chinese do not allow Google to run its Chinese search engine unfiltered, the company may pull out of the lucrative market.

Adobe also admitted yesterday that it had been targeted by attackers. "Adobe became aware on January 2, 2010 of a computer security incident involving a sophisticated, coordinated attack against corporate network systems managed by Adobe and other companies," the company said in a Tuesday statement posted on its company blog . "At this time, we have no evidence to indicate that any sensitive information -- including customer, financial, employee or any other sensitive data -- has been compromised."

Security researchers hinted earlier today that the attacks against Google, Adobe and dozens of other major firms were conducted using malicious PDFs that exploited one or more vulnerabilities in Adobe Reader. Analysts at Verisign's iDefense security group told Robert McMillan of IDGNews today that hackers had launched targeted attacks using a malicious document attached to e-mail messages.

While iDefense did not identify rogue PDFs as the malformed documents, its researchers claimed that the attachments exploited a "zero-day" -- a vulnerability that had not yet been patched -- in a "one of the major document types," a definition that certainly fits Adobe's PDF format.

Only yesterday did Adobe patch a zero-day in Reader. The bug had been publicly known since mid-December, and used surreptitiously by hackers for at least several weeks before that.

Adobe denied any link between the two events -- its patching of Reader and the announcement that it had been attacked. The security update had been on the schedule for months, said Lips, since Adobe now releases Reader patches quarterly.

Mikko Hypponen, the chief research officer of Helsinki-based F-Secure, disagreed. Although F-Secure has not been directly involved in investigating the attacks, Hypponen said he has talked with other researchers who were. "This was an attack launched via a convincing e-mail with an exploit-ridden PDF attachment," Hypponen said today in a telephone interview. He also said that those researchers, who he would not identify, told him that the PDF documents were exploiting the Reader zero-day patched on Tuesday.

"These kinds of targeted attacks using PDFs have been going on for quite a while," said Hypponen. "There's nothing new technically in any of these attacks, including the ones against Google and Adobe."

Hypponen was on the money in that regard. Adobe, for example, patched four Reader zero-day vulnerabilities last year, while some statistics show Adobe exploits are among the most prevalent on the Web.

Hypponen also took a stab at whether the Chinese government was directly responsible for the attacks, something that some have argued by reading between the lines of Google's announcement. "One theory is that the government, maybe the PLA (People's Liberation Army), is behind this. The other is that it's the usual idiots, local Chinese hackers who are encouraged and perhaps supported by authorities."

Hypponen laid his bet on the latter. "Indirect evidence supports the second theory," he said, citing the properties traits of malicious documents that typically show the creator's name as something like "shadowhunt" or "darkknight."

"Those are hacker names, not [the name of] a sergeant in the PLA," he said. "But we don't have a smoking gun."

Adobe denied that a Reader vulnerability was the basis of the attacks, or that malicious PDFs had been used to hack the company's own network. "In terms of the attack vector, this is still being determined as part of our ongoing investigation," Lips said. "At this time, we have no evidence to suggest that Adobe Reader was an attack vector."

Source: pcworld

Wednesday, January 13, 2010

Google Docs Adds Cloud Storage For Any File

Google on Tuesday introduced a service that will let you upload any type of file to Google Docs and access it from the cloud.

Google Apps users will soon be able to upload any file up to 250MB. The service will provide up to 1GB of free storage, with any additional files costing $0.25 per GB per year. Google will start rolling out the service in the coming weeks.


"Now accessing your work files doesn't require a connection to your internal office network," Anil Sabharwal with the Google Docs team, wrote in a blog post. "Nor do you need to e-mail files to yourself, carry around a thumbdrive, or use a company network drive – you can access your files using Google Docs from any web-enabled computer."

Combined with the shared folders option on Google Docs, users can upload files and give permission for friends or co-workers to edit those documents.

"For example, if you are in a club or PTA working on large graphic files for posters or a newsletter, you can upload them to a shared folder for collaborators to view, download, and print," Vijay Bangaru, product manager for Google Docs, wrote in a separate blog post.

Uploaded documents can be searched, and many common document files types can be viewed via Google Docs viewer.

Those with Google Apps Premier Edition can use the Google Documents List Data API to upload files in batch or purchase third-party apps that allow for migration and synching to Google Docs.

Source: pcmag



Tuesday, January 12, 2010

Facebook’s “Reply by E-mail” Feature Now Live

FaceBook has rolled out the ability for users to reply to comments through E-Mail.
The feature is straightforward. Anytime you get a notification e-mail about a comment on a status update, a photo or a wall post, you can simply reply via e-mail and the post will show up on FaceBook.The social network is able to filter out unrelated text like your e-mail signature.

Guidelines for Safe Online Shopping

Be careful before you select a store

Please do your homework before selecting a store. Go through the ratings and reviews given by previous customers of the website. Make sure you have one other way of contacting them; a phone number or a mailing address. Also, gather information about the website from the ‘About us’ section.Review their shipping methods and policies to determine what carriers they use, their shipping rates, and if they provide tracking and insurance. Also find out where they ship from -- goods are sometimes sent from international locations, which require customs and extra time.
Misspellings and grammatical errors are indicators that a website might be fraudulent. You can simply browse through the website to check if it is authenticated and protected. Trust marks such as the VeriSign Secured Seal, or a green address bar in Internet explorer.
Colour-coded address bars are a feature of Extended Validation Secure Sockets Layer (SSL) certificates, which provide added information about a website's authenticity.
The site should not ask for more than your name, shipping address, billing address, credit card type and number, or expiration date.





Choosing a payment service
Always be sure of your method of payment. If you have a choice, follow these tips to choose a more secure service: Read the privacy policy and make sure you agree with it. If you don't, go elsewhere.Check for a stamp of approval from the BBBOnline (the Better Business Bureau Online) or Verisign.
Find out what others say about the service: check with your colleagues and friends.

Avoid third-party payment
Never respond to email messages from third-party payment services asking you to confirm account details, such as passwords or other personally identifiable information. These email messages could be an identity theft scam, such as phishing.
Type the address of the payment service directly into your browser or use your personal bookmarks. If you need to update your account information or change your password, visit the website by using your personal bookmark or by typing the URL directly into your browser.Check if the seller has been a verified member of the payment service for a few months or more. Some sites also allow you to check the seller's rating -- although these ratings cannot be guaranteed, they can be helpful.Never use your account to transfer money for someone else that you don't know. This might be an advanced fee fraud.Be more careful when you purchase very expensive items, such as jewelry or computers, especially around the holidays and for items that are sold out in stores

Before you enter your credit card number
So, you've found the perfect item at the perfect price and you're ready the purchase
. Before you enter your credit card number, make sure the store you've chosen abides by the following rules.
The company should only require personal information that's necessary to complete the purchase: You will probably enter your credit card number, address, and telephone number. Be wary if they ask for other information such as your PAN card, bank account numbers, license numbers or your mother's maiden name.

The website should use secure technology
When you get to the screen where you enter your credit card number or other personal information, make sure that the Web address begins with https and check to see if a tiny locked padlock appears at the bottom right of the screen.-- In your internet explorer there is another layer of protection with sites that use Extended Validation (EV) SSL Certificates. The address bar should turn green to alert you that there is more information available about the website. The identity of the website owner is also displayed on the address bar. An EV SSL certificate not only helps ensures that the communication with a website is secure, but also includes information about the owner of the website, which has been identified by the Certification Authority (CA) issuing the SSL Certificate.

Update your Internet Explorer regularly
Internet Explorer includes improved security features that make it easier to see which sites provide more secure data exchange, so you can shop and bank online with confidence.
Hence, it is important to that it keep updating it regularly. You can download Internet Explorer 8 which also has a protection from malware and phishing. The anti-malware protection works by presenting you with a warning or blocking screen when you visit a malicious site or attempt to download a malicious programme.
It is also important to keep all the other software on your PC up to date -- use Microsoft Update to install all critical and optional updates, and make sure your browser add-ons and other applications are current. You should also install a current anti-virus product and keep its signatures up to date.
Pay attention to security warnings from your firewall and anti-virus software and make sure your firewall is on and up to date. And, finally, make sure that your Internet service provider has spam protection, so that less unwanted and fraudulent email reaches your inbox.


Source: timesofindia

Sunday, January 10, 2010

How To Access & Use Gmail Offline

Have you ever wanted to check your mail and found the connection failing you? Now you can say goodbye to this sort of frustration with a Google initiative that started almost a year ago. Offline Gmail was, until very recently, an experimental feature in Gmail Labs, but now you can find it under your Gmail settings. Talent finds out how Offline Gmail is all set to write off your connection woes.




To be able to access Gmail account offline, you’ll need to first download and install Google Gears. If you’re using Google’s Chrome browser, though, you can relax since Chrome comes with Gears installed by default.

Once Gears installed, just go to Settings->Labs and enable the Offline feature.


Gmail should now reload and you will see a new link titled “Offline” right next to the “Settings” link in the top right corner of the Gmail window.
Click on Offline and Google Gears will throw a warning at you that some website named http://mail.google.com is trying to access Gears. Since I was quite sure that it’d harmless, I let the website access Gears and you should probably do the same.


At this point, Gmail will begin downloading what it thinks are the most important emails to you. I’m saying “what it thinks” because the Gmail team has a pretty nifty algorithm to determine the emails that it downloads. For me that figure came to “about 3 years” worth of my emails and you might get a different figure, depending on the amount of email that you get.

At any rate, Gears will download about 10000 of your latest emails, not counting the Trash and Spam folder so this should be enough for most of us.


Gears will also offer to create a shortcut for Gmail on the desktop. With this shortcut, you can login Gmail in offline mode right from your desktop.

If you send any emails in this mode and you’re offline, Gmail will keep them in the outbox and send them as soon as you come back online, and you’ll never even come to know about your connection status. In my opinion, you should always keep this option checked. To enable the flaky connection mode, click on the Offline Gmail icon next to the Settings link.

Saturday, January 9, 2010

A list of Costly Twitter Mistakes

1. Twitter Spam: The biggest no no of them all=Spam. Spam is the abuse of electronic messaging by sending unsolicited messages indiscriminately.

2. Twitter User Abuse: A large number of people block the profile or write in with spam complaints.

3. Twitter Aggressive following: Using programs out there that claim to get you 1000’s of follow in just days could get you suspended. Just remember quality is better then quantity.

4. Twitter Updates consist of duplicate links: Sending out the same tweet over and over again can get you suspended. You can also lose many of your followers doing this.




5. Stealing: Updates poached from others’ twitter timelines, passed off as one’s own. Putting your own spin on a tweet will keep you safe.

6. Twitter Technical Abuse: Updates consist of links pointing to phishing sites, malware, or other harmful material.

7. Multiple Accounts: A large number of accounts is created in a short amount of time. You can have more then one account just don’t create several in a short time.

Source: twitterwatchdog

JBISoft's Latest Technology, jbiFusion, Designed to to Help in Identifying Terrorist Activity

JBISoft, Inc., a professional services, research and development company, announced today that its latest application of jbiFusion™ would have helped to connect all of the disparate information from the multiple intelligence sources to counter and isolate the Nigerian underwear bomber.



jbiFusion™ is a Java-based framework for the creation of intelligent agents and provides a virtual knowledge system for singular access to any and all data, information, and knowledge that can be monitored on a daily basis. Software agents are deployed to collect and normalize data from a variety of relevant sources. These sources can include RSS feeds, email servers, databases, outputs from special alerting systems, and even blogs such as Twitter, to name a few. Once information is aggregated and categorized from the multiple sources, correlated results can be visualized with built-in geo-mapping components and shared among users and external systems, presenting reliable and actionable information.

Source: pr.com

Friday, January 8, 2010

TalkSwitch For Small Business

TalkSwitch is a specially designed telephony system for TalkSwitch offices and other small businesses.

The Perfect Features
Voicemail, auto attendants, dial-by-name directory, ring groups. And much more. TalkSwitch comes complete with the kind of sophisticated features that users of big business PBX phone systems take for granted.

Optional VoIP
Need Voice over IP? Multi-location integration? No problem; small business VoIP is here. VoIP-enabled TalkSwitch models handle both VoIP and the traditional telephone network. With a TalkSwitch VoIP PBX, you connect the way you choose; VoIP (Voice over IP) and traditional telephone networks, IP phones or standard analog telephones. TalkSwitch PBX and IP PBX phone systems deliver the best of both worlds in one easy-to-use phone system.

Connect Anywhere
Your work doesn't stop at the walls of your office. Neither does TalkSwitch. With Connect Anywhere extensions, you can add your cell phones or any other telephones, anywhere, as extensions of your system. TalkSwitch uniquely connects your mobile and teleworkers.



Easy Set-up
Unlike other small business telephone systems, TalkSwitch is easy to install, saving you time and money; you can even do it yourself. And with its easily configured settings, moving employees or changing the way your phone system handles calls is a snap.

Flexible Growth
TalkSwitch has a modular architecture that lets you grow when you need to and add VoIP when you want to. Designed to maintain your investment as you grow, TalkSwitch covers from 1-64 users per location.

Sony’s Green Laptop

* W series “eco-friendly” Mini. The angle is that the green-tinted (we get the hint) plastic enclosure is made of 23 percent recycled CDs (from overstocked Sony artists?), and that the carrying case is made of recycled plastic bottles. The 10-inch screen is LED-lit, and it runs Windows 7 Starter edition.
* Z series lightweight. Called an ultra-portable by Sony, the aluminum-encased Z is about three pounds and ships exclusively with solid-state drives, up to a 512-gigabyte model. It starts at $1,900 and can go way up (a Blu-ray player is optional, as are Intel Core i7 and i5 processors ) from there.
* F series. The latest entry in the multimedia entertainment portable space, the F has a just-right-for-movies 16.4-inch screen and likes to stay at home on a desk.



* Y series. This is the semi-lightweight (four pounds) MacBook fighter that delivers up to seven hours of battery life and incorporates a 13-inch screen. Starts at about $800.
Sony showed off a slew of other new products beyond the new Vaios, including new Cyber-shot digital cameras and camcorders, home theater audio systems, and an intriguing touchscreen Internet viewer for the desk called the Dash.

Source: nytimes

Thursday, January 7, 2010

Internet Creeps Onto Car Dashboards




Technology giants like Intel and Google are turning their attention from the desktop to the dashboard, hoping to bring the power of the PC to the car.
The first wave of these “infotainment systems,” as the tech and car industries call them, will hit the market this year. While built-in navigation features were once costly options, the new systems are likely to be standard equipment in a wide range of cars before long

Source: nytimes



Wednesday, January 6, 2010

Google Brings Real Time Search Results

Google has made some changes to its search engine by "officially" adding support for real-time search results. This new addition comes in the wake of sites like Twitter and Facebook that are updated with posts and tweets, by the second.




The service will be introduced gradually to all Google users and over the next few days, you will be able to see "new" updates that have been posted seconds ago, in Google Search results. The search results will include items from recently updated blogs, news articles and of course tweets and status updates. This is a step up from Google's earlier option where news and articles from only "a few minutes" ago only appeared in search results by default. The new option will work in a way that is similar to Twitter's existing search feature - albeit on a larger and broader scale. Twitter and Facebook, both have confirmed that they have signed a deal with Google to make real time results a reality. Earlier, Twitter had also struck a separate deal with Microsoft to make live updates available in the Bing search engine.

Source: techtree


Top10 Predictions for Asian Mobile Industry 2010

Growing up: Regionally-focused growth
Smarter than ever: Mobile data use increases
Adding on: Mobile data plans as value-added services
All together now: More integrated mobile marketing campaigns
For your eyes only: Privacy becomes more important
Cash on the go: Mobile payment
Keeping in shape: Mobile healthcare
Give me a beat: Mobile music
Playtime isn't over: Mobile gaming






Read more at Techtree

Google enters mobile phone market

Google has also jumped on the phone bandwagon. It has now launched its own mobile phone, Nexus One.



This phone joins about 20 other mobile devices that already run on Android, the mobile operating system
that Google introduced in 2007 to make it easier to connect to its services
and other websites away from home or the office.

Google will handle all sales online and has no plans to let consumers check out the Nexus One in retail stores.

Read more at http://www.ndtv.com

Monday, January 4, 2010

Lets Blinds See with Tougues

Neuroscientists at Wicab, Inc. has developed the BrainPort Vision Device that allows the blinds to “see” using their tougues. The device includes a pair of sunglassess that has a tiny digital video camera for collecting visual data. Data collected are then transmitted to a handheld, cellphone-sized base unit that will convert digital signal into electrical pulses.


Converted signals will be sent to the tongue via a “lollipop”, an electrode array about nine square centimeters that sits directly on the tongue. It’s likely the BrainPort will be made to the market but it has to be approved by the FDA first. The expect price is about $10,000.

Read more at www.itechnews.net

Sunday, January 3, 2010

Consumer Electronics Show (CES) in Las Vegas -2010

The International Consumer Electronics Show (CES) is a non-public trade show held each January in Las Vegas, Nevada, and is sponsored by the Consumer Electronics Association. At the show, many previews of products are introduced, or new products are announced. The show is held at the Las Vegas Convention Center with additional venues used for certain specialties.





Read more at http://www.cesweb.org