Posts

Showing posts from May, 2009

Concept behind Anonymity

Anonymity: I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer's ID name, your physical location and the name of your ISP along with less personal details such as the operating system you're using and your screen resolution. If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you wouldn't be too chuffed would you. Well the web is no different, it's still an invasion of privacy and a threat to security and you don't have to put up with it. Proxy: Every time you visit a web site, detailed information about your system is automatically provided to the webmaster. This information can

Auto End Tasks to Enable a Proper Shutdown

This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit. 1. Copy the following (everything in the box) into notepad. QUOTEWindows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]"ClearPageFileAtShutdown"=dword:00000001 [HKEY_USERS\.DEFAULT\Control Panel\Desktop]"AutoEndTasks"="1" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]"WaitToKillServiceTimeout"="1000" 2. Save the file as shutdown.reg3. Double click the file to import into your registry. NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

Anonymity of Proxy

The exchange of information in Internet is made by the "client - server" model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client. There are different variants of web-pages for different configurations of browsers. However, as long as web-pages do not usually depend on browsers, it makes sense to hide this information from the web-server. What your browser transmits to a web-server:a name and a version of an operating systema name and a version of a browserconfiguration of a browser (display resolution, color depth, java / javascript support, ...)IP-address of a clientOther information

mIRC Commands

/ Recalls the previous command entered in the current window. /! Recalls the last command typed in any window. /action {action text} Sends the specifed action to the active channel or query window. /add [-apuce] {filename.ini} Loads aliases, popups, users, commands, and events /ame {action text} Sends the specifed action to all channels which you are currently on. /amsg {text} Sends the specifed message to all channels which you are currently on. /auser {level} {nickaddress} Adds a user with the specified access level to the remote userslist. /auto [onoffnicknameaddress] Toggles auto-opping of a nick or address or sets it on or offtotally. /away {away message} Sets you away leave a message explaining that you are not currently payingattention to IRC. /away Sets you being back. /ban [#channel] {nickname} [type] Bans the specified nick from the curent or given channel. /beep {number} {delay} Locally beeps 'number' times with 'delay' in between the beeps. /channelPops up t

What is Spyware?

There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies. What is spy-ware? Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee. Known spywaresThere are thousands out there, new ones are added to the list everyday. But here are a few:Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext,

23 Tips to Speed Up your Windows XP Performance

Given below are the 23 tricks that will enhance the performance and reliability of your Windows XP OS. Best of all, most of them will cost you nothing. 1-To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer. 2- If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance. 3- Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press

Setting up a Project Office

1. Introduction A Project Office is a department responsible for improving project management within an organization. It's a permanent department within an organization, not a temporary function. It's there to coordinate projects and ensure they have the right tools, standards, methodologies and templates needed to boost their chances of success. 2. Types of Project Office There are 3 types of Project Offices namely The Supportive Project Office: This is the most common type of Project Office. Its purpose is to empower Project Managers and teams to deliver projects. It doesn't control or direct projects. Instead it supports projects by offering training, mentoring, administration and reporting. The Controlling Project Office: Supportive services may not be enough to put projects back on track. By offering controlling services (such as project reviews, audits and assessments), the Project Office can influence project delivery. It may also enforce project standards and proce