This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

Friday, October 29, 2010

Cowon JetAudio 8.0.9.1520 Plus XCV Full - Free Download

free Cowon JetAudioCowon JetAudio is a multimedia software like winamp. advantage of the jetaudio Not only play various music and video files, but also has other features such as CD burning, recording and conversion to other file formats. JetAudio program supports a huge number of formats, including WAV,MP3, MP4, 3GP, OGG, WMA, MPG, AVI, WMV, MIDI, RM , etc..

In addition to these features, with Cowon JetAudio 8.0.9.1520 Plus you have the ability to create your own Internet broadcasting by using JetCast provided the Jet Audio.


Other JetAudio features:
-Support all popular audio and video formats
-Recording music on CD
-The use of different audio effects
-Speed Control Playback
-Built-in equalizer
-Convert files between formats
-Built-in plugins visualization
-ID3 tag editor for MP3, OGG and WMA
-Synchronization of lyrics for karaoke functions
-You can watch DVD movies
-Ability to change skin interface

Features Plus VX:
"Convert video files into different formats
"Functions coding MP3/MP3Pro files
"For more audio effects (BBE and BBE ViVA)
"Advanced audio features (32-bit, DRC and Dynamic Limiter)
"Enhanced recording (Silence Detector, EQ, Low / High / Band Pass Filters)
"Additional special tools (Audio Trimmer, Audio Mixing Recorder)

Download Jet Audio 8.0.4 PLUS VX - Full Version

Free color picker download - webmaster tools

For all of you webmasters or bloggers, Memorized many HTML color codes certainly is not easy right? , You can use my online web tool on : http://webdesigncode.themes7.net , and here I would share with you 2 useful tools , Just Color Picker and Webmaster's Toolkit

1- Just Color Picker - Freeware


This is really an unique and simple HTML color tool, I love it, Just Color Picker is a utility that captures the color value of any screen pixel and displays its value in a variety of formats such as HTML, RGB, HEX, HSB/HSV, and HSL.

How to Use It

To get the color value of a pixel, point the mouse cursor at the necessary pixel and press the hotkey to hold the code of this color. The default hotkey is Alt+X . (I use f7 on my keyboard)

Click the Copy Value Button to copy the color value to the clipboard. You also can mark a part of the displayed color value with the mouse cursor before. In this case it will only copy that part to the clipboard. The button right of the Copy Value Button (up / down arrow) expands the program window and opens the RGB mixer and harmonious color finder.

The mixer contains the latest picked color, which you can modify. Move an RGB slider to modify this color. At the same time you will see six harmonious colors (contrast or light) that may be useful for your artwork or web-site.


2 - Webmaster's Toolkit 2.07 - Shareware



web html color toolkit
Webmaster's Toolkit - this is a software utility that allows to quickly measure the size of objects on the screen, determine the color of any pixel and alter or produce your own colors with the Photoshop-style Color Picker.

- measuring the distance with perfect accuracy up to a pixel
- choice of any color with a color picker in the PhotoShop style
- determining color by means of an eyedropper for any objects on the screen
- adjusting the color.

Tuesday, October 26, 2010

iTunes 10 download released

iTunes 10 download for windowsiTunes is Apple's media player application which was originally released for the Mac OS but the latter are also available from iTunes for Windows OS. ITunes 10 now was released, it is clear that nothing has changed in Cupertino. Apple still give iTunes their customers a setup program that didn't monolithic with the option to pick and choose based on your specific needs.

What's new in the iTunes 10 ?, Which obviously Apple do a little update from the iTunes logo, and replace the logo of a CD with musical notes that the previous logo appeared on the old version of itunes.

Interestingly, in this version there is a new feature named Ping, this is a social networking application that integrates with iTunes 10 and can be used to follow-on favorite celebrities and information about them but can also be used to share music files with friends.

With the presence of the iTunes Ping service, this will be a competitor to Facebook, considering that currently there are a lot of iTunes users around the world and iTunes Ping will be a serious competitor to Facebook.

Visit the Apple site to get the latest version of iTunes 10 , here : iTunes 10 download

Friday, October 22, 2010

SopCast Download - Latest News

A program that will allow you to watch video streams using Bittorrent technology, SopCast combining broadcast media channels and distribution media under one roof, the program to examine the video streaming coming from sources that are dubious. Try to download the lastest program here : SopCast Download

There are three main components of the latest SopCast programs. Live Channels will television channels to stream television from most of China, Japan, and Korea. VoD Channels are videos-on-demand, and MyServer which allows you to broadcast media from your computer to another SopCast users.

SopCast is a simple, free way to broadcast video and audio or watch video and listen to radio on the Internet. Adopting P2P (Peer-to-Peer) technology is very efficient and easy to use.

The SopCast Let people be broadcaster without the costs of a server with large bandwidth. We can build your own TV station as compared to large commercial sites with minimal resources.

And you may embed all SopCast-channels to your site / blog (example here: online.free-7.net) , just copy-pasting the following code:

<iframe id="SopFrame" name="SopFrame"
frameborder="0" src="http://www.easetuner.com/
channel/getchlist.iframe.html" width="800"
height="350" scrolling="no">
The browder doesn't support iframe.</iframe>

Okay, Learn more and Download Latest SopCast program at www.sopcastSopCast .com

Sunday, October 17, 2010

Halalscape Browser - islamic-browser ,safe and sophisticated

Halalscape islamic browser safe
As with KidZui and I'm halal (search engine) that I have post before, Halalscape also one of safe browsers that allows you to protect your children from adult contents in the Internet world.

While many scattered adult sites, gambling and porn sites. Halalscape designed to provide peace of mind. Halalscape have Performance, Security, Privacy, Customization, Productivity, Tabs, Bookmarks, Universal Access is good and much more. Halalscape has it all. Halalscape mingle with popular search engines such as Google, Yahoo, Dogpile, Altavista, Lycos, and MSN. This means you are always protected, safe and has sophisticated features .

If you are a parent and worry about your kids browsing on a non-standard browser that is protected. The browser will protect you and your children and your entire family. and good thing it is completely FREE to use.

Well, please download directly to the site here: halalscape.com

Friday, October 15, 2010

Windows phone 7 launched

windows 7 phoneMicrosoft finally announced Windows Phone 7, in October 2010 in Europe. While in America this platform will follow in November.

The above is disclosed by Microsoft COO Kevin Turner. "As said before, for me this is true. In October and November we will return to play, and this game is not yet finished," he said.

According to Turner now there are 200 million smartphones sold in the market. "If you think what happened three or five years, there will be 400-450 million smartphones," he continued.


Turner is believed that on this occasion, Microsoft will make major changes go into competition with smart phone competition. Talking about Windows 7 phone that will be present, Turner also gives notes "When you see this phone and the user interface, it's not like Microsoft's mobile phones ever released before,"

Meanwhile, Samsung has introduced a new product that will use Windows phone named Samsung Cetus, While HTC is also rumored will release a product called HTC Mystery

Windows phone 7 , windows mobile 7, windows 7 phones

Thursday, October 14, 2010

Recover formatted harddisk drive with Stellar Phoenix FAT & NTFS

To recover lost data from Hard Drives , I recommend at least 3 kinds of free data recovery softwares these programs are :

1- Ontrack Easy Recovery - Download here
2- Recuve Data Recovery - Download here
2 - Stellar Phoenix FAT & NTFS

And now I'll talk about tellar Phoenix FAT - NTFS , the tool able to recovers and repairs deleted or formated files from your hard-disk drive on Windows computer .

You must know that, reformatting a disk doesn't erase the data on the disk, only the data on the address tables. So, don't be panic, however, if you accidentally reformat a disk that has useful data. A computer specialist should be able to recover most, if not all, of the information on the disk. You can also buy programs that enable you to recover a disk yourself, or try my recomended of free recovery softwares above

Portable version

Use multiple proxies - Proxy tutorial

A question ,Why we need to hide IP..? , One of many reasons, because many websites and software applications use your IP address to track and profile your online activity. When you connect to the Internet, your computer is assigned an IP address, which is your unique identification number on the Internet. This number may contain information about where you are located, who you are, and what programs are running on your computer.

Okay, here is a tutorial on chaining proxies for the use of becoming more anonymous while online. There aren’t enough tutorials online about this subject so I decided to make an attempt at writing one. Since it’s on the subject, I included a section on chaining wingates to become anonymous on telnet.
------------------------------------------------------------------------------------

I’m going to assume that most of you have already used a proxy before to hide your real IP address or domain or maybe just used one to surf anonymously online. If you didn’t, well hopefully you can keep up and possibly learn how to use a proxy. Its also best if you know what an IP address or Domain is first, before reading this tutorial. Hmm, I guess I have to show you where to find a proxy too, check out here : Free Web Proxy List

It will be up to you to figure out which ones work or not. I’m not going to do all the work for you icon_smile.gif. You can check and see if the proxy works by going to http://www.privacy.net to see if your IP address changed.

Proxy Servers
A proxy is a server that acts as a gateway between your computer and your destination (website, IRC chat, etc.). These proxies receive requests from users to view, for example, a web page. The proxy will then forward the request to the internet, find your requested page, then send the web page back to you, the user. Most proxies come with a cache (sounds like “cash”) feature that saves former websites that were visited on that proxy.
Think of cache as a proxy’s storage room. Each site that you make the proxy visit, it saves in its own storage area (cache). So if the user or someone else requests the same site again later on, the proxy will go back into its cache, find the web page and send it back to the user. This saves time because the proxy doesn’t have to go search the Internet for the web page. It just pulls the site out of its cache.

The use of proxies to stay anonymous is a favorite thing to do among people on the Internet who are either paranoid or just security conscious. The anonymity factor comes from the proxy’s ability to hide your true Internet address. For example, if I were to run a scan on your computer right now, I would get the Internet address that was given to you by your ISP (internet service provider), but if I were to scan you while you were using a proxy, then I would get the Internet address of the proxy server. Basically the whole proxy picture looks like this…

[User]>>>>>[Proxy]>>>>>[Web Pages]

Simple enough, right? Right. So now let’s get to the chaining part.

Proxy Chaining
Proxy chaining is merely connecting to more than one proxy and then to your intended destination. You can use as many proxy servers as you can or want. The more you have, the more anonymous you will be. Remember, it doesn’t matter how many proxies you chain together, you will never be 100% anonymous. Let’s look at an example…

[User]>>[Proxy1]>>[Proxy2]>>[Proxy3]>>[Proxy4]>>[Destination]

The example shows that for a proxy chain to be created, the user must first connect to Proxy1. Once the user is connected to Proxy1, from Proxy1, the user will connect to Proxy2, from Proxy2, the user will connect to Proxy3, from Proxy3, the user will connect to Proxy4, from Proxy4, the user will then connect to the intended destination (web page, Unix server, ftp server, etc.).

All together we have 4 proxies in this example. Each proxy is a link in the chain. If the user would be scanned while on the proxy chain in the example, the IP address or domain of Proxy4 would appear on the scan. Now the problem with proxies is they tend to “die out” in a few weeks or less. It all depends. So if Proxy2 were to cease functioning, the chain wouldn’t work.
You would need to get rid of Proxy2 and just use Proxy1, Proxy3, and Proxy4 or find another proxy to take Proxy2’s place. This is why proxy chaining can be a real pain if you are using them just to surf the net. If one dies, you have to figure out which one is the one not working, so you have to go through each one to check them or until you find the one that isn’t working.

Proxy chaining is a necessity if you plan on using proxies to execute a “hack”. If you are attempting to gain unauthorized remote access to any server, whether it is through telnet, ftp, or http, chaining is a must. As I said, you will never be 100% anonymous no matter what you do online so it is possible that you still can be tracked even if u chain proxies. Chaining just makes it a lot hard to track someone.

To make it even harder, its best to use foreign proxies because if someone wanted to trace you, they would need to get logs of your use of each proxy from each proxy administrator. This could take quite a while or even never at all if one of the proxy’s, or all for that matter, belong to an admin in a country that isn’t too fond of the country you are located in.
The longer it takes for the authorities to subpoena the logs of your usage of a single proxy from that proxy’s administrator, the more chance that the other proxies that you used in the chain will have their logs deleted by the time anyone gets to the server administrators of those proxies. So when attempting to do any kind of “hack”, it’s best to use at least five or six proxies in a chain.

HTTP Chaining
HTTP chaining is basically chaining a proxy server in your browser’s address bar. Example:

http://proxy.magusnet.com/-_-http://www.google.com

Notice how the above proxy and destination (yahoo) are seperated by a (-_-) If you wanted to make a chain out of this you would simply add another proxy ex. ( http://proxy.server1.com/-_-http://proxy.server2.com/-_-http://www.destination.com)

Another way to use proxys in your address bar is by adding the proxy IP or domain then the port number. Example…

http://anon.free.anonymizer.com:80/http://www.google.com

Notice how the above proxy and destination server are seperated this time by a (/) forward slash instead of a (-_-) dash, underscore, dash. To make a chain out of this you would again simply add another proxy ex. ( http://proxy1:80/http://proxy2:80/proxy3:80/http://www.yahoo.com)

Browser Chaining
To browser chain is fairly easy. I’ll use Internet Explorer as an example since I believe it is the browser that most people have and use. First you need to find the Internet Options. You can do this by either finding the Explorer icon on the desktop, right click on it, then press properties or if you have a browser window already opened if you are online then you can go to Tools (or sometimes its View) and press Internet Options.
Now that you have the Internet Options window up you can now go to the Connections tab, then go to the first Settings button (not LAN Settings, the one above it) and click it. Now you should be in the Settings box. Put a check in the box where it says to Use a proxy server.

Now if you wanted to surf using one proxy you would merely put the proxy in the Address: space and put the proxy’s port number in the Port: space. To use a chain here you would put in a proxy along with a “:” colon then the port number followed by a space separting the next proxy then a “:” colon then the port number then a space and so on. The last proxy you add should have its port number placed inside the Port: space. If you did it, then it should look like this exactly…

Address: 213.234.124.23:80 121.172.148.23:80 143.134.54.67 Port: 80

***Notice that each proxy:port is separated by a space and that the last proxy has its port number placed in the Port: space. Do not check the box marked “Bypass proxy server for local addresses”. Press OK when you see that everything is in working order***

Wingates
A wingate is a proxy server that someone installs onto his/her computer which allows for a single or multiple online connection to take place through port 23, the default telnet port. Depending on their security, some wingates will allow anyone online to connect to them and usually stay “alive” or “working” anywhere from a few days to even months. There are people out there that scan for these Wingates and post the computer’s IP number or domain on their website to give anyone online a free list of them to use. You can also scan them yourself by using programs like WinScan.

Chaining Wingates Using Telnet
I’m going to assume you already know what telnet is so I will just get right down to it. To chain using telnet, you would first bring up the DOS prompt and type in “telnet” then your wingate. (Since telnet’s default port is 23 and all wingates run on port 23, the port number is not necessary but I will add it just to show you how you should type any port number out on screen) Example…

C:\WINDOWS>telnet 61.133.119.130 23

So now you have “telnet”, a space, the wingate IP, a space, then the port number 23. Once you are connected to the wingate it should look like this…

Wingate>

Now you would type your next wingate and port number in, then press enter like so…

Wingate> 203.207.173.166 23

You can continue to do this until you connected to as many Wingates as you need. Once you are finished with your wingates you would connect to your destination. Example…

WinGate>arbornet.org

So now the entire picture would look something like this…

C:\Windows> telnet 61.133.119.130 23

Wingate>203.207.173.166 23

Wingate>135.245.18.167 23

Wingate>m-net.arbornet.org
Connecting to host arbornet.org...Connected

Welcome to the Once and Future M-Net
FreeBSD 4.3 (m-net.arbornet.org) (ttypv)

Enter newuser at the login prompt to create a new account
Enter upgrade at the login prompt to find out about increased access

login:

Tuesday, October 12, 2010

Getting x-box live for free

For you who think about getting xbox live but not have enough money to pay for the starter kit, You can now get it for free [that's if you have a free 2 month trial] . Ok , here is what you should do...

Follow these steps:

1- Go to http://www.xbconnect.com and download the current version of XBConnect

2- You must get a Ethernet cable and connect your X-BOX to your router (if you have, you MUST have one BTW)
3- install and open xbconnect. Create a new account .......

4- go on www.xbox.com/live and sign in your .NET passport and create a profile for xbox live

5- open your xbox with a xbox live supported game and follow the setup for xbox live ....

Done

Monday, October 11, 2010

Free Ascii Art Generator, Convert picture into text

ascii art generator
Ascii Art Generator is a tool able to convert picture files to ASCII-Art. The ASCII-Art can be use for E-Mail signature, Chatting, or anything else you want.





MMMMMMMMMMM. MMMMMMMMMMM , MMMMMMMMMMMM .MMMMMMMMMMMM MMMMMMMMMMMM
MMMMMMMMMMM.. MMMMMMMMMMMM. MMMMMMMMMMMM. MMMMMMMMMMMM..MMMMMMMMMMMM
MMMMMMMMMMM.. MMMMMMMMMMMMM MMMMMMMMMMMM. MMMMMMMMMMMM..MMMMMMMMMMMM
MMMMM. MMMM ,MMMMM MMMM . MMMMM .. MMMM.
MMMMM. MMMM MMMMM MMMM MMMMM MNMM
MMMMMMMMMM. MMMMMMMMMMMMM MMMMMMMMMMM MMMMMMMMMMM .MMMM
MMMMMMMMMM. MMMMMMMMMMM MMMMMMMMMMM MMMMMMMMMMM .MMMM
MMMMMMMMMM. MMMMMMMMMM , MMMMMMMMMMM MMMMMMMMMMM, MMMM
MMMMM. MMMM MMMMM. MMMM MMMMM MMM
MMMMM. MMMM MMMMM. MMMM MMMMM .MMMM.
MMMMM. MMMM MMMMM MMMMMMMMMMMM. MMMMMMMMMMMM MMMM
MMMMM. MMMM MMMMM: MMMMMMMMMMMM. MMMMMMMMMMMM MMMM.
MMMMM. MMMM MMMMM. MMMMMMMMMMMM. MMMMMMMMMMMM MMMN
... . .... .... . ........... ............ . ..



ASCII Art Generator is an amazing graphics art to text art solution, which allows you to convert digital pictures into full color text-based images easily and quickly. You can input any message you’d like, and let your picture say what you want it to read. It supports gif, jpg, bmp files, and generates four popular formats, including html, image, rtf & ASCII.

Make your pictures/photos eye-catching with a very cool texture composed of letters and digits. You can use the online tool for free...

So, check out here : www.glassgiant.com

Thursday, October 7, 2010

Tips to Overcome Viruses on Your Computer

Viruses,Trojans,Spywares,Worms they are a disturbance on a computer that is caused by external parties for different purposes such as to steal your data, damaging your hardware, delete files, eliminate certain functions, took over the controls on your computer ,etc. To be sure there are no viruses or spywares that brings profit-making on the infected computer.

If you've let your guard down,or even if you have not, it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.

Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam), aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

- An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
- A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an Infection

There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.

To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.

If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.

Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.

If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next

Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.

- If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's Symantec Security Check or Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
- If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
- If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.

A Microgram of Prevention

Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.

Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."

Here are a few more pointers for a virus-free life:

- Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.
- If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.
- Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.

My recommended antivirus:

Tuesday, October 5, 2010

Linux boot process

How Linux boot process
Did you know how Linux boots? For Linux users, probably most of us don't care about what happens when booting linux in progress. In fact, in the boot we can see about linux systems that used, change the password, backup and restore databases, etc. Therefore this short tutorial tries to explain what is happening in linux when booting the events took place.

As it turns out, there is not much to the boot process:

Hardware POST and initial hardware boot loader

The hardware is powered up, a POST (Power-On Self-Test) occurs, and the initial boot loader takes over:

- If on a PC, this is the rather limited BIOS which must determine the system MBR (Master Boot Record) and turn control over to it. The system MBR will be the MBR of the first populated media, examined in whatever order the BIOS examines them. The MBR of a piece of media is its first 512-byte sector.
- If on an Alpha or a SPARC, this is instead the far more capable SRM (Alpha) or Boot ROM (SPARC), which is a mini-OS of its own.

System MBR and Linux boot loader

The system MBR should contain the Linux boot loader:

- On a PC, this is GRUB, or perhaps LILO.
- On an Alpha, this is aboot.

That boot loader is loaded into RAM and started, and it takes control of the system. Both GRUB and aboot are able to understand the Linux file systems; LILO must do everything in terms of physical addresses.

1. A boot loader finds the kernel image on the disk, loads it into memory, and starts it.
2. The kernel initializes the devices and its drivers.
3. The kernel mounts the root filesystem.
4. The kernel starts a program called init.
5. init sets the rest of the processes in motion.
6. The last processes that init starts as part of the boot sequence allow you to log in.

Identifying each stage of the boot process is invaluable in fixing boot problems and understanding the system as a whole. To start, zero in on the boot loader, which is the initial screen or prompt you get after the computer does its power-on self-test, asking which operating system to run. After you make a choice, the boot loader runs the Linux kernel, handing control of the system to the kernel.

There is a detailed discussion of the kernel elsewhere in this book from which this article is excerpted. This article covers the kernel initialization stage, the stage when the kernel prints a bunch of messages about the hardware present on the system. The kernel starts init just after it displays a message proclaiming that the kernel has mounted the root filesystem:

VFS: Mounted root (ext2 filesystem) readonly.

Soon after, you will see a message about init starting, followed by system service startup messages, and finally you get a login prompt of some sort.

NOTE On Red Hat Linux, the init note is especially obvious, because it "welcomes" you to "Red Hat Linux." All messages thereafter show success or failure in brackets at the right-hand side of the screen.

Most of this chapter deals with init, because it is the part of the boot sequence where you have the most control.
init

There is nothing special about init. It is a program just like any other on the Linux system, and you'll find it in /sbin along with other system binaries. The main purpose of init is to start and stop other programs in a particular sequence. All you have to know is how this sequence works.

There are a few different variations, but most Linux distributions use the System V style discussed here. Some distributions use a simpler version that resembles the BSD init, but you are unlikely to encounter this.

Runlevels

At any given time on a Linux system, a certain base set of processes is running. This state of the machine is called its runlevel, and it is denoted with a number from 0 through 6. The system spends most of its time in a single runlevel. However, when you shut the machine down, init switches to a different runlevel in order to terminate the system services in an orderly fashion and to tell the kernel to stop. Yet another runlevel is for single-user mode, discussed later.

The easiest way to get a handle on runlevels is to examine the init configuration file, /etc/inittab. Look for a line like the following:
id:5:initdefault:

This line means that the default runlevel on the system is 5. All lines in the inittab file take this form, with four fields separated by colons occurring in the following order:
# A unique identifier (a short string, such as id in the preceding example)
# The applicable runlevel number(s)
# The action that init should take (in the preceding example, the action is to set the default runlevel to 5)
# A command to execute (optional)

There is no command to execute in the preceding initdefault example because a command doesn't make sense in the context of setting the default runlevel. Look a little further down in inittab, until you see a line like this:

l5:5:wait:/etc/rc.d/rc 5

This line triggers most of the system configuration and services through the rc*.d and init.d directories. You can see that init is set to execute a command called /etc/rc.d/rc 5 when in runlevel 5. The wait action tells when and how init runs the command: run rc 5 once when entering runlevel 5, and then wait for this command to finish before doing anything else.

There are several different actions in addition to initdefault and wait, especially pertaining to power management, and the inittab(5) manual page tells you all about them. The ones that you're most likely to encounter are explained in the following sections.

respawn

The respawn action causes init to run the command that follows, and if the command finishes executing, to run it again. You're likely to see something similar to this line in your inittab file:
1:2345:respawn:/sbin/mingetty tty1

The getty programs provide login prompts. The preceding line is for the first virtual console (/dev/tty1), the one you see when you press ALT-F1 or CONTROL-ALT-F1. The respawn action brings the login prompt back after you log out.

ctrlaltdel

The ctrlaltdel action controls what the system does when you press CONTROL-ALT-DELETE on a virtual console. On most systems, this is some sort of reboot command using the shutdown command.

sysinit

The sysinit action is the very first thing that init should run when it starts up, before entering any runlevels.

How processes in runlevels start

You are now ready to learn how init starts the system services, just before it lets you log in. Recall this inittab line from earlier:

l5:5:wait:/etc/rc.d/rc 5

This small line triggers many other programs. rc stands for run commands, and you will hear people refer to the commands as scripts, programs, or services. So, where are these commands, anyway?

For runlevel 5, in this example, the commands are probably either in /etc/rc.d/rc5.d or /etc/rc5.d. Runlevel 1 uses rc1.d, runlevel 2 uses rc2.d, and so on. You might find the following items in the rc5.d directory:

S10sysklogd S20ppp S99gpm
S12kerneld S25netstd_nfs S99httpd
S15netstd_init S30netstd_misc S99rmnologin
S18netbase S45pcmcia S99sshd
S20acct S89atd
S20logoutd S89cron

The rc 5 command starts programs in this runlevel directory by running the following commands:

S10sysklogd start
S12kerneld start
S15netstd_init start
S18netbase start
...
S99sshd start

Notice the start argument in each command. The S in a command name means that the command should run in start mode, and the number (00 through 99) determines where in the sequence rc starts the command.

The rc*.d commands are usually shell scripts that start programs in /sbin or /usr/sbin. Normally, you can figure out what one of the commands actually does by looking at the script with less or another pager program.

You can start one of these services by hand. For example, if you want to start the httpd Web server program manually, run S99httpd start. Similarly, if you ever need to kill one of the services when the machine is on, you can run the command in the rc*.d directory with the stop argument (S99httpd stop, for instance).

Some rc*.d directories contain commands that start with K (for "kill," or stop mode). In this case, rc runs the command with the stop argument instead of start. You are most likely to encounter K commands in runlevels that shut the system down.

Adding and removing services

If you want to add, delete, or modify services in the rc*.d directories, you need to take a closer look at the files inside. A long listing reveals a structure like this:

lrwxrwxrwx . . . S10sysklogd -> ../init.d/sysklogd
lrwxrwxrwx . . . S12kerneld -> ../init.d/kerneld
lrwxrwxrwx . . . S15netstd_init -> ../init.d/netstd_init
lrwxrwxrwx . . . S18netbase -> ../init.d/netbase
...

The commands in an rc*.d directory are actually symbolic links to files in an init.d directory, usually in /etc or /etc/rc.d. Linux distributions contain these links so that they can use the same startup scripts for all runlevels. This convention is by no means a requirement, but it often makes organization a little easier.

To prevent one of the commands in the init.d directory from running in a particular runlevel, you might think of removing the symbolic link in the appropriate rc*.d directory. This does work, but if you make a mistake and ever need to put the link back in place, you might have trouble remembering the exact name of the link. Therefore, you shouldn't remove links in the rc*.d directories, but rather, add an underscore (_) to the beginning of the link name like this:
mv S99httpd _S99httpd

At boot time, rc ignores _S99httpd because it doesn't start with S or K. Furthermore, the original name is still obvious, and you have quick access to the command if you're in a pinch and need to start it by hand.

To add a service, you must create a script like the others in the init.d directory and then make a symbolic link in the correct rc*.d directory. The easiest way to write a script is to examine the scripts already in init.d, make a copy of one that you understand, and modify the copy.

When adding a service, make sure that you choose an appropriate place in the boot sequence to start the service. If the service starts too soon, it may not work, due to a dependency on some other service. For non-essential services, most systems administrators prefer numbers in the 90s, after most of the services that came with the system.

Linux distributions usually come with a command to enable and disable services in the rc*.d directories. For example, in Debian, the command is update-rc.d, and in Red Hat Linux, the command is chkconfig. Graphical user interfaces are also available. Using these programs helps keep the startup directories consistent and helps with upgrades.

HINT: One of the most common Linux installation problems is an improperly configured XFree86 server that flicks on and off, making the system unusable on console. To stop this behavior, boot into single-user mode and alter your runlevel or runlevel services. Look for something containing xdm, gdm, or kdm in your rc*.d directories, or your /etc/inittab.

Controlling init

Occasionally, you need to give init a little kick to tell it to switch runlevels, to re-read the inittab file, or just to shut down the system. Because init is always the first process on a system, its process ID is always 1.

You can control init with telinit. For example, if you want to switch to runlevel 3, use this command:

telinit 3

When switching runlevels, init tries to kill off any processes that aren't in the inittab file for the new runlevel. Therefore, you should be careful about changing runlevels.

When you need to add or remove respawning jobs or make any other change to the inittab file, you must tell init about the change and cause it to re-read the file. Some people use kill -HUP 1 to tell init to do this. This traditional method works on most versions of Unix, as long as you type it correctly. However, you can also run this telinit command:

telinit q

You can also use telinit s to switch to single-user mode.

Shutting down

init also controls how the system shuts down and reboots. The proper way to shut down a Linux machine is to use the shutdown command.

There are two basic ways to use shutdown. If you halt the system, it shuts the machine down and keeps it down. To make the machine halt immediately, use this command:

shutdown -h now
On most modern machines with reasonably recent versions of Linux, a halt cuts the power to the machine. You can also reboot the machine. For a reboot, use -r instead of -h.

The shutdown process takes several seconds. You should never reset or power off a machine during thhs stage.

In the preceding example, now is the time to shut down. This argument is mandatory, but there are many ways of specifying it. If you want the machine to go down sometime in the future, one way is to use +n, where n is the number of minutes shutdown should wait before doing its work. For other options, look at the shutdown(8) manual page.

To make the system reboot in 10 minutes, run this command:
shutdown -r +10

On Linux, shutdown notifies anyone logged on that the machine is going down, but it does little real work. If you specify a time other than now, shutdown creates a file called /etc/nologin. When this file is present, the system prohibits logins by anyone except the superuser.

When system shutdown time finally arrives, shutdown tells init to switch to runlevel 0 for a halt and runlevel 6 for a reboot. When init enters runlevel 0 or 6, all of the following takes place, which you can verify by looking at the scripts inside rc0.d and rc6.d:

1. init kills every process that it can (as it would when switching to any other runlevel).

# The initial rc0.d/rc6.d commands run, locking system files into place and making other preparations for shutdown.
# The next rc0.d/rc6.d commands unmount all filesystems other than the root.
# Further rc0.d/rc6.d commands remount the root filesystem read-only.
# Still more rc0.d/rc6.d commands write all buffered data out to the filesystem with the sync program.
# The final rc0.d/rc6.d commands tell the kernel to reboot or stop with the reboot, halt, or poweroff program.

The reboot and halt programs behave differently for each runlevel, potentially causing confusion. By default, these programs call shutdown with the -r or -h options, but if the system is already at the halt or reboot runlevel, the programs tell the kernel to shut itself off immediately. If you really want to shut your machine down in a hurry (disregarding any possible damage from a disorderly shutdown), use the -f option.

Monday, October 4, 2010

Block Websties Without Software - In Windows OS

This summary is not available. Please click here to view the post.