Jump to content
xisto Community

longtimeago

Members
  • Content Count

    513
  • Joined

  • Last visited

Everything posted by longtimeago

  1. @ mahesh , thank pdf file is too good. I really appreicate the author of that Pdf document. There he has explained it soo clearly. He has explained it in simple steps and he has let that tutorial out. The motive of the author is let out in preface and i am really glad to learn from a tutorial written by such people. Hats off to Ted Jensen. I was surprised to look at where he began his profession and how come he has mastered Pointers.
  2. I am not sure whether you are in need of a SSL security, because you aim in asking your questions to bloggers. Anyway what i would like to convey is that if you have some online transactions of some sensitive data , let it be credit card informations, passowords etc. you can go for SSL certificates from a 3rd party and you can use it for secure transfer of data through the internet. So now dont keep bothering too much whether you have to pay for SSL certificates for your website, Yeah you have to pay to the service providers. As far as i know no one gives that for free, but anyway as of now ( 15 feb 2010 ) there is a SSL certificate issuing authority who gives 30 days free trial. It is Thawate. That is really good i guess. I says so because even Google has their SSL certifications issues by them. And the most important thing over there is that for that 30 days free trial they do not ask for any credit card information. so you need not worry much . Just can go and sign up and get your free 30 days SSL certificate and use for your site if you need one.Please note that for blogging and everything you need not have SSL Certificates i guess. This is mainly used in banking websites or sites which involves financial transaction. But however from this year 2010 Gmail runs by default using SSL
  3. What ever, the simple answer that i would say is , For it is Written in the Bible, Speaking in Tongues is of the Holy Spirit. One who is anointed by the spirit alone can do so. And i tell you and every one that do not ever criticize that. I have seen many people even my own friends criticizing that, it is really very harmful and dangerous if some one criticize another who speaks in tongues. For it is clearly written in the Bible that "He who speaketh a word against the Son of man it shall be forgiven for him, but He who speaketh a word against the Holy Ghost will not be forgiven not only in this world but also in the world to come". This is self explanatory that why one should not talk anything against some one who speaks in tongue, it simply means that the same is speaking against the Holy Ghost. And the Bible clearly records how bad the impact is . The Son is or Lord and Saviour Jesus Christ who died for us on the Cross , who shed his innocent blood for our sins, the Bible says if some one speaks against such a great person itself then it will be forgiven for him. But when Jesus left the earth, He said my Spirit i give it to you which is the Holy Spirit and just think How importance is given to the Holy Spirit saying that if some one speaks against the Spirit it shall not be forgiven forever. So take this as a caution and never ever even attempt to speak against the Holy Ghost and tell all your friends too. Have a Blessed Life.
  4. Yeah I totally agree to the above suggestion. Moreover please note that XISTO provides quality service for the domains which you purchase from them. This i dont tell just after reading their services offered from their website, I Tell it out of experience. The service and support offered from XISTO is really spectacular. I am not sure that is there any other provider that will even match up with their service. When you open a Ticket and all the issues are resolved in no time. And the support team will be helping you in all aspects. I remember once i had messed up with the .htaccess file in my web space and i totally had no idea about that and i was stranded. All i i needed to do was Just open a Ticket and tell the the situation, it is simple as that, the support team helped a lot. This is just a simple example which i am quoting. Till date i have not seen even one single complaint about Xisto or XISTO . Hats off. So without hesitating you can very well participate in these forums and get your mYCents and can purchase your domain name, hosting space etc. Here one thing that has to be noted is that, XISTO provides us all previlages. Its is unlike other host providers who with help most of the previlages from us. Here it is like you own everything. I guess i read some where in the rules or somewhere where opaque was telling that the previlages the admins have over out domin and the hosting are given to each user who uses the service. You can alter the DNS, and any details any time. Moreover they provide many packages from which we can choose.For a very long time i was searching for dedicated IP address and atlast i had got it from XISTO and i had it for few months to test some educational stuffs.So start hosting with XISTO and have a great time, take care !!!
  5. This is kind of a tricky question. Just one cannot say that Nokia is good and sony erricson is bad, or Nokia is bad and vice versa. For every one their opinion differs. He who has practiced and is well versed with a particular mobile will say that His company is too good. Personally i use Nokia for the last 10 years and it has been only Nokia. I have never gone for sony erricson, on the other hand i know few of my friends who say that sony erricson is too good and they use the same for nearly 10 years. so taking these statistics into consideration once cannot say that the other is bad. It all depends on the individuals perpesctive. So to conclude i would say that if some one is reading this thread or these type of questions just dont go with the blind answers which says this is good , oh no this is bad. Just get into the technical specification of the model of the phone and check whether that satisfies the requirements. Please remember that a model which sounds good for one may sound bad for the other. So just make a detailed analysis of any model before you buy let it be nokia, sony erricison or anything. Some may like stylish mobiles, some may not . So dont forget to have a view of the phone before you buy it ( this is say for those who purchase mobiles online ). It is good and advantageous to buy mobiles online. But on the other hand it is better to have a direct look at the mobile before you go for it no matter how many pics you would have seen on the net of that particular mobile which you buy.
  6. We all of us know well about the Domain Naming System. The Domain Naming System is the axis around which the whole internet revolves in todays world. Internet without the Domain Naming System is practically no possible in todays cyber era. To brief it up Domain Naming System is one in which the Domain Names are mapped to its corresponding IP address. So if you think that without the Domain Naming System will the internet work ? Yeah the internet as a whole will work perfectly without the domain naming system but on the other hand human beings will find it difficult to work on the internet if that system was not present. If our computer fore fathers had not introduced the Naming system then today every one would be forced to remember all the IP address of various websites inorder to access them. But is that really difficult ? I would personally say its possible though it is difficult. Dont we remember few of the phone numbers which we very often call ? Likewise we will be remembering the IP address of the websites if there was no Domain Naming System. But to make it in a crisp sentence, a world without the Domain Naming system is possible, but very difficult. So here I draw the attention to the importance of the domain naming system in todays cyber era. When such is the case just think about what if there is a very serious vulnerability in that system. If that Domain Naming System is vulnerable then it can cause some damages which no one can never ever imagine of .Let me quote an simple example about the same. Think that you are connected to a particular Domain Name server which provides you information about the host to IP address mapping that is the Domain Naming service . When you try to query for https://www.paypal.com/de/webapps/mpp/home,'>https://www.paypal.com/de/webapps/mpp/home, the responsibility of that server is to provide the IP address of paypal.com so that you may get connected to www,paypal.com. On the other hand think what if that Domain Namer server replies with a IP address of a web server in which a site is hosted which looks like paypal.com but actually it is not paypal.com. In such a case the user can be easily misled. This kind of attack which is imposed on the Domain Naming System is termed as Pharming. Here in pharming the DNS is poisoned with a fake IP address. The pathetic thing in this kind of attack is the user will not be able to recognize that the website is a fake one. This may look like phishing but this is not phishing. In phishing very often the user is tricked with some fake mails which claims to be from a particular company and the user is made to click a Link or something similar to that. In that kind of attack if the user is cautious enough to look at the URL bar of the web page he may get himself in a safe boat. Though phishing is a serious threat, it can be counter attacked to a certain extent with the help of users alert ness. On the other hand if you check out pharming , here where in as explained above the DNS is poisoned. So here in this case the user will open a normal browser window and will be typing the exact web page name. for example https://www.paypal.com/de/webapps/mpp/home.'>https://www.paypal.com/de/webapps/mpp/home. Unlike phishing , here in pharming the URL points towards the website which user intends to visit, by this I mean that the visual appearance in the URL bar is displayed as the genuine one. But on the other hand due to that DNS poisoning the user has been linked to some other server. Once the user sees the webpage loaded all he does is enter the sensitive information thinking that it is the orginal webage. In such case even if the user is alert enough to check out the URL bar he cannot escape. So this is all about pharming. So now let me take a look where in is that DNS poisoning really feasible in todays cyber era. Many people have been doing a lots of research in this topic to find out the available security exploits in the Domain Naming Server. Now I came across a major security vulnurablity where in the DNS is poisoned very easily and pharming takes place therby many people loose their sensitive data like passwords and other credit card information. So just think, in todays world if such a major security threat would exist will it be possible for organizations to run their DNS server successfully without getting poisoned. Let me put forth a simple DNS security vulnerability which many researchers had thought about and recently it was proved that such a vulnerability really do exist in todays cyber era. So to start with the vulnerability in the DNS let me tell that the below vulnerability was not invented by me. It was actually discovered in the summer of 2008 by Dan Kaminsky who worked with CISCO then. I am not very sure where he is now. Thanks to Dan Kaminsky. And also please note that the below thing which is explained is just for educational purpose and to bring out the security exploits available in todays cyber era. This shall not be used for hacking or breaching into any network. I do not hold any responsibility for the same. Now moving on, let me brush up quickly how this DNS works, How the Domain names are resolved to their IP addresses. First the user enters the website name in the URL bar of the browser, let me say http://forums.xisto.com/no_longer_exists/'>http://forums.xisto.com/no_longer_exists/ e the user makes a request for Xisto.com, and this request si routed to the nameserver provided by the user's ISP. It requests the information which represents an IP address. The ISP's nameserver knows that it's not authoritative for Xisto.com, so it can't look it up in its local zone database. This local Data base is maintained by the ISP for its customers where from the customers (users) can retrieve the IP address quickly. It also doesn't find the name it its cache of recently-seen data, so it knows it has to go out to the internet to find the IP address for Xisto.com and return to the user so that he may get connected to that server on which Xisto.com is hosted .There are 13 root servers for the Domain naming system which are preconfigured in the Recurssive server. And thanks to the Root servers for their IP address dont change very often. Here the query is sent to a particular root server, query in the sense the record is sent. The root server handles it. The thing which has to be noted here is that the root server doesent know any thing about http://forums.xisto.com/.'>http://forums.xisto.com/. It gives the way of the Global Top Level Domain (GTLD) servers responsible for the .com domains. Its some thing like the root servers replying to the request Hey I dont know where it is but this guy knows it and it points to the authoritative server.The root server actually gives a list of authoritative server and the name server chooses one in random. Now the Name server asks the authoritative server the same question like I was told to ask you where is http://forums.xisto.com/ .Like the root server this also gives us a reply which helps us to get closer to the target of achieving the IP address of Xisto.com. and so one it goes and in the third query following a chain of referrals it gets the name server of Xisto.com which is om1.computinghost.com om2.computinghost.com, om3.computinghost.com, om4.computinghost.com. Now after picking one server from this list. The buck is not transferred now else where . These server has the exact address, that is the information which we are looking for that is the IP address of Trap 17 which may be 208.87.242.120 ( I am not sure, because they might have used some router on a stick technique and they might have multiple logical interfaces in their router ). Finally now the client got the IP address and it gets connected to the server. This is the working of the domain name server. Now the thing that has to be noted here is that every time the query goes around the internet day in and day out as DNS packets. So let me give a quick glance about what is DNS Packet and what does it contains.The main constituents of a DNS packets are Source and Destination IP address,source and destination port numbers which is port 53/udp for queries from the outside world, the first packet of any exchange always includes 53 as the UDP destination port. The source port varies. Sometimes it is also port 53/udp, sometimes it is a fixed port chosen at random by the operating system.As far as DNS functionality is concerned, the source port is not a big deal.As long as the replies get is sent to it properly.Next comes the Query ID, This is a unique identifier created in the query packet that's left intact by the server sending the reply: it allows the server which makes the request to associate the answer with the question. Some thing like to reply to the one who asked the question. Now there is something known as the DNS Cache where some important data is stored.These data are nothing but the IP address for the corresponding domain names. For example above we have seen how Xistos IP address is being resolved and given back to the user who requested it. On the other hand just think if some other user requsest for the same domain namess IP address is it necessary to again go into the internet and search and come and then give it back to the user ? It consumes time and resources.By saying it consumes time what I mean is that when the DNS packets goes arount the internet and and it fetches the required record and it comes back. By mentioning "Resources are wasted " what i mean here is that when the query goes out into the internet, there is a consumption of bandwidth, though the DNS packet is going to be less in size still when million of DNS packets travel around the internet there is a considerable amount of bandwidth being consumed . Inorder to avoid this the DNS server goes for caching technique. Here i dont reffer to web caching where in the webpages are cached and kept in store. On the other hand this is DNS Caching where in the IP addresses which are already resolved are cached and stored in the DNS server for retrival . Which means if a user requests for some webpage , and if that webpage IP address is already stored in the DNS Cache , then the DNS returns it to the user who has requested it instead of going to the internet and finding it all again. So by this there is a conservation of bandwidth and time which can be used for something else. So the conclusion over here is that DNS Caching is good. So now is there any vulnerability in the DNS Caching or is it that the DNS caching technique is totally safe ? I would say there is definitely lots of vulnarablity in the DNS and only a few has been found till now. The pathetic situation in that is that the vulnarablities that has been found till date exists even today. One such vulnarablity is to exploit the sequential incrementation of the query ID . when the DNS request goes out to the internet to fetch the IP address, the DNS packet uses a query ID to map the request and get the response. So just imagine what if some one gets the query ID right ? If some one get s the query ID then easily they can create fake DNS packets and send it to the DNS, so that it accepts it and puts an entry in the cache which will be serverd to its users. So just Imagine if some one requests for https://www.paypal.com/de/webapps/mpp/home and if the requests goes outside into the internet and before the reply comes if the attacker sends a DNS packet to server with the same query ID and with the details that https://www.paypal.com/de/webapps/mpp/home has the IP of xxx.xx.xxx.xxx then the Domin name server will accept the packet which the attacker has sent. So lets examine why does the Domain name server accepts that packet which is fake . If you see to this the answer is simple the Domain Name Server will accept any reply provided the Query ID matches to the one which it has sent. So if you see this carefully the Domain Name Server accepts the reply which it has got first. Let it be the orginal reply for the DNS query or the Fake reply which it has got, the first reply which matches the query ID is accepted by the server. Taking this into advantage attackers send Fake DNS Packets to the Server, thereby poisoning the DNS Cache. So just imagine here if the Cache is poisoned, its just not the only user who requested the IP is getting affected , all those who try to vist the same domain name are affected because of this. So the attacker aims not at one user but on a whole network . So now the question is how is that the attacker gets the exact query ID of the DNS packet which has been sent to the internet which is searching for the IP address of the domain https://www.paypal.com/de/webapps/mpp/home.'>https://www.paypal.com/de/webapps/mpp/home. Here the attacker uses a simple trick like; the attacker himself hosts a Domain Name server outside the network and a web server. Let me call it http://www.attacker.com/ now in this situation if the attacker visits his website from some other network, the DNS query is raised by that network and finally the requests comes to his own doming name server where he can see the request DNS packet. Now that the attacker has full control over his own DNS server he can easily get the query ID for attacker.com DNS request packet. In such a case let me say the query ID he got for http://www.attacker.com/ is 1023, then 1024 is the query ID for the next DNS request which falls after http://www.attacker.com/ . So in this case if the attacker visits http://www.attacker.com/ and immediately if he visits https://www.paypal.com/de/webapps/mpp/home,'>https://www.paypal.com/de/webapps/mpp/home, and if paypal.com IP is not present in the DNS cache, then the Query ID for the DNS packet of paypal.com us going to be 1024, approximately it may be between 1024 to 1034. So now if the attacker floods DNS reply packets to the DNS server with those query ID and with that data which says the IP address of pay pal.com is xxx. Xxx.xxx.xx , the DNS server accepts it and stores it in its cache ( this remains in the cache till it is cleared or till TTL ) . Here there is a sad part, when theoriginall reply comes, the DNS server rejects that reply because already it has got a reply which has been matching the query ID. So in this case the DNS packet containing the original reply is discarded. This vulnerability is tested and it works perfectly . Now looking at this particular vulnerability Dan Kaminski suggested a simple solution, why to increment the query ID in the DNS packer sequentially. Instead some random incrementation of the query ID can be carried out which will help to over come this problem. But the sad thing is that , that solution is not implemented proplerly today and even today many DNS server goes for sequential incrementation of the query id in the DNS packet which is such a big vulnerability for the whole domain naming system.
  7. So in today's world every one gets to the kitchen and cook atleast once in a full moon day. If not a regular routine everyone must have given a try for the same. So is there any safety or security threats in the kitchen, yeah when this question is asked every one will say "The LPG" the gas used in the kitchen is a threat because if it is not handled properly it might ignite and when the gas ignites the result is going to be disasters. So for the gas safety there are many precautions available today. Now i got to know some other security threat in the kitchen which we often ignore and i want to bring it to light so that none gets caught in the same.So to introduce that security threat which we face in kitchen, i want every one to think do i use oil in cooking. If you say no, Yeah you are safe and you can just read the remaining things inorder to alert your friends who use oil for cooking. One fine day when i was in the Kitchen my Mom alerted me Oil is inflammable and it may get ignited. Then only it stroke me that yeah oil, yes, oil can catch fire. Then the next question which came to my mind is that will the cooking oil catch fire ? Then i thought about it and came to a conclusion, Yeah the cooking oil if it reaches its flammable temparature it is going to catch fire. Certainly this puzzled me . We ( i am not sure about every one ) use a pan and we pour oil in that and use. We heat up the required amount of oil in the pan and we cook vegetables, and everything. At this point i remembered for frying anything we heat up the oil like anything and we keep on frying. So now just think, what if that oil in that pan reaches its flammable temparature. Then i thought it is not possible. But again i pondered over it when my Mom told me it can happen yeah, if we heat the pan too much so that the oil gets heated extremly and catches fire. Then i was asking about this and came to know that in real life also this has already happened.So now that we have figured out a clear cut problem where in the kitchen when we use oil and cook in a pan there is a possiblity that the oil can catch fire and burn. So in this case just imagine one is in the kitchen and there is fire in the pan. oh my God i will get puzzled !! . Gas is already a highly inflammable thing and it is available right there near the stove and there is fire on the pan which is kept in the stove. So if some one gets himself to be panic and tries to take the pan and pour it away then there is certainly some calamity there because he or she is not pouring oil, but he or she burns up burning oil. So what happens ? it may pour on the body and can get burns, worse than this if this burning oil is poured on the tube which connects the gas and the stove ( please note that in western countries this tube is not made of rubber i guess where as in some countries a rubber tube is used ) and if that tube is ignited then the gas may burst. In short if one carries the burning pan and tries to dispose it off then there is calamity.Now what is the solution for the same, some one is cooking in the kitchen which involves a pan and oil in the pan. Now that the oil is ignited and it is burning, if it is gonna be removed from that place then too there is a chance of some calamity to take place. So a simple solution for all this is if you find the oil in the pan burning, just put off the gas. By this i mean close the regulater and stop the gas connection to the stove. Still the oil in the pan will be burning but, nothing is going to happen it will burn, yeah it will burn till when ?? till the oil in the pan gets over and it will be put off by itself. No need to Panic. Dont try to lift the pan. Dont try to pour the oil. Dont add water to the oil, as every one knows that the burning oil cannot be put off by water . So the simple solution is let it burn, close the gas connection, the fire will be there in the pan till the oil last. So be safe !! Be warned !! Know this and pass this message to all whom you know. Follow all other safety precautions in the kitchen while you cook, like please open some ventilation, do not keep the kitchen closed etc. and i hope other simple precautionary measures are well known.Be safe !! Happy Cooking
  8. Many a times in life, when faced with a tough situation we tend to think,Where did God disappear? Here is an instance to show how God deals with us in such situation. After Sep 11th 2001, one company invited the remaining members of other companies who had been decimated by the attack on Twin Towers to share their available office space. At a morning meeting, the head of security told stories of why these people were alive. And all the stories were just the LITTLE things. As you might know, the head of the company survived that day because his son started kintergarten. Another fellow was alive because it was his turn to bring donuts. One woman was late because her alarm clock didnt go off in time. One of them missed his bus. One spilled food on her clothes and had to take time to change. Ones car wouldnt start. One went back to answer the telephone. One had a child that dawdled and didnt get readysoon as he should have. One couldnt get a taxi. The one that struck everyone was the man who put on a new pair of shoes that morning, took the various means to get to work but before he got there, he devloped a blister on his foot. He stopped at a drug store to buy a Band-Aid. That is why he is alive today. Now when I am struck in traffic, miss an elevator, turn back to answer a ringing phone. All are little things that annoy me. I think to myself, this is exactly where God wants me to be at this very movrment. Next time your morning seems to be going wrong, the children are slow getting dressed, you cant seem to find the car keys, you hit every traffic light, dont get mad or frustrated. God is at work, watching over you.!!!! Gods waiting to build your life. He hasnt disappeared from your situation.We should always remember, when God brings you to it, He will stay beside you to take you through it provided you dont forget Him in the course of journey. Gods strength is sufficient for us, for His strength is made perfect in weaknessess. Never give up..!! God hasnt disappeared, He cares for you.!!!!
  9. Hello everybody and i am gonna pour out what i had learnt after using Skype, yeah the very famous Skype which claims to be the cheap among all VOIP calls, PC to phone calls etc. Yes i do agree skype is cheap, but it is cheap only for those who get to know all the Tricky steps followed Skype. First of all i do not have any complaints or negative comments on the quality which they provide. Yeah the voice clarity and everything which is provided by Skype is simply excellent. As long as you use the free services offered by Skype one wont know the exact Tricky steps which Skype follows. But unfortunately if you check out what is free in Skype, its nothing other than PC 2 PC calling and Instant Messaging. Of course all other messengers like Yahoo, AIM and every messenger that exists gives this particular service free of cost and there is nothing much to boast about that. May be for a better quality people may choose skype. On the other hand when you use Skype there might be some voice disturbances only once in a while, like when you use a wi fi connection and if there is some block between the wifi transmitter and the computer which is being used. In such a situation the sound clarity may get disturbed and yes i do agree that is unavoidable. So lets end this free service discussion with this since there is nothing to boast about that in skype because all other messenger too offer the same for free.So now next let me talk about the so called Trick which they play ( I feel so, may be some may agree with this ). So now when does Skype comes into full action, only when you need to make a call to a Normal phone, which means to a Land line or Mobile phone using the skype dialer ( messenger i mean ). So in this case you have to buy some thing known as Skype credit ( hope every on is aware of this ) .This skype credit is used for making calls from your skype account and its is obvious that one has to buy this Skype credit. In order to buy this skype credit one can use the given method in skype, how ever Skype recommends paypal ( which is yet another trick player, will discuss about that in the next para ) there are other modes of payment like credit cards, money bookers etc. Now the fact about this so called Skype credit is that you have to buy a minimum of 10$, this is where it made me think that why is it Skype forces us to buy a minimum of 10 $ . Skype claims that its call rates are so cheap that with 1 $ you can speak for a very long time ti selected countries, if that is the case, if some one wants to make a one time call to a foreign country, might be to get some support regarding a product they have bought or there may be various other reasons where one has to make just a single call. So in this case too he / she has to go and purchase 10$ for skype credit. Here some one may claim that skype credit wont expire so they can buy and keep, if that is the argument made by some one, just think about the interest and other things. 10$ might be a small amount for a single user, just imagine collectively for the whole world, how much interest do they make out of that money. So let me bring out the so called next trick which is being played by skype, SKYPE STORES YOUR PAYMENT INFORMATION AUTOMATICALLY, unless you delete it, it will remain there. While purchasing the skype credit there is a particular option which says :Enable auto recharge if credit falls below 2$ . Yes this may be useful for some, but not necessary for many. Here what happens is that this particular option is ENABLED BY DEFAULT. It is unlike the check box which is used for terms and condition where we read the terms and condition and then we check it, here in this case the check box is checked automatically which many will not notice. The most tricky part in this is, once you uncheck this check box and then if you go and change the payment method and come, this check box gets enabled automatically ( this is what i call it a trick to fool users thinking that they have unchecked it ). So what happens if this is enabled ? People may think that it is advantageous but it is not, let me tell you why. It is because if you have 10$ in your skype credit and if keep talking for 8$ + you will be automatically charged from the credit card or paypal or what ever you have chose for the previous payment. Here the user may be thinking that his balance is not yet over, so he is talking but on the other hand his credit card is being used after is balance had got over so he is talking. Yeah making uninterrupted calls is possible with this option where you give "auto recharge" but this should not be made as the default settings because users are misled. This can be a option which people can avail if needed. Now if skype checks this check box of auto recharge by default why not check the terms and condition check box too by default. They wanted people to read the terms and conditions else that may result in serious court cases if that is enabled by default. So by enabling this auto recharge by default skype tries to fool its users. Now i had quoted earlier what trick does paypal play. And not surprisingly skype recommends paypal. This is not my quote but just check out in the skype webpage, Skype recommends paypal. Why so ? Here i will make it clear. Paypal gives you a helping hand in many cases, Hats off to them. Cases such as if you do some online earnings and if you want to redeem that money, you can use pay pal and redeem that money. Yeah that is fine, fantastic. I also did the same. and i had some dollars in paypal. Thanks to pay pal for this serivce. But on the other hand pay pal had withe held my account and said some action is required from the account holder. I had the error which reads "Account Limited" So when i had contacted the help i came to know i have to submit proof, so i had scanned and sent to paypal my photo identity. Now that pay pal has relieved my account from limited account. Now that my account is not limited and i have some dollars in my paypal i tried to purchase something in skype with the paypal checkout. To my surprise i saw a webpage which reads , please enter credit card information to make this purchase, my God, i am sure that i had sufficient amount in paypal for the purchase i am making still i am asked for my credit card information. Pay Pal sees to that the account holder exposes the credit card information to them so that in their policy it is written if you make a purchase( unknowingly too ) which exceeds the amount in the pay pal automatically it will be taken from the credit card. And also in some small fonts ( this is what i call it as a trick ) they would have quoted in many places that if there is a mismatch in the name around 5$ will be taken from the credit card as return fee etc. Pay Pal advertises that hide and keep your credit card information, and do not expose it online. IF THEY SAY SO, WHY IS IT THAT THEY ASK FOR THAT INFORMATION ( WHAT DO YOU CALL THIS OTHER THAN A TRICK ). If i have the sufficient amount in pay pal too i am not able to purchase unless i enter the credit card information. They just take advantage of the ignorance of the user and frame these policies. And now lets hook pay pal and skype, Just think why is that Skype recommends paypal ? Simple indirectly they access your credit card. In Paypal for verification they dont even accept debit cards (visa enabled) only credit cards are accepted. Just to bore the money in your name. So lets come back, If you purchase Skype credit using paypal and if you have not disabled auto recharge ( because by default it is enabled ) then again your credit card might be used by you in your ignorance. Yo may think that the call is connected, but actually it is connected by making use of your credit card and not by the available balance in your skype credit. Moving on, let me expose the next trick which i sensed that skype plays on the user with their ignorance. In skype you not only make calls using skype credit but also there are subscriptions available. Do you think they would have offered this scheme with no tricks in it, definitely not. Subscriptions are cheap and thanks to Skype for that. In particular subscriptions to US and Canada calling are really cheap and i really thank Skype for providing that. But wait, let me tell you what is subscription. Subscription in skype is something where you can pay monthly, 3 months , and so on. This is not pay per call. So this is advantage for several reasons. But on the other hand when you purchase skype monthly subscription please read CAREFULLY WHAT IS WRITTEN THERE. For example let me tell you, if some one is in need of a subscription for just 1 month to call a particular place, yeah very well he / she can approach Skype and purchase one. While purchasing they have just kept radio buttons ( i really dont know whether they have kept it for user convenience or to take advantage of users ignorance) In the interface where you choose the validity of the subscription of which you purchase it reads as " Every month ** $ " and not as " Monthly ** $ " . This means by default they have enabled that subscription for you for Life ( Please not subscriptions are not free, your credit card will be bored for that ). So unless you go to your subscription accounts page and disable it, you will be charged for the recurring month even if you dont use it. Yes i agree this is useful for people who are lazy to login to make a purchase for the second month, if so why cant there be a option available like, please tick here if you want to make the same subscription every month without your action. Instead they enable it by default saying "Every month ** $". Please note the ** which i have used in this para refers to the amount of the relevant subscription which you are making in skype. So in the subscription scheme provided by skype too a trick is being played which in turn deals with your credit card. If the subscription is cheap and if the user learns by mistake he may digest that he lost it ( i mean the subscription being charged for the recurring month even if he didnt mean to activate it ) due to his ignorance. On the other hand just imagine where subscription goes beyond 50 $ and the user dont need that for the second month and due to ignorance he is charged.Here please note, one you have enabled that so called auto recharge ( by mistake also ). and if you call outside you subscription the call will get connected, please dont think that skype is so loving kind that it allows free calls outside subscription. In such a case the credit card is accessed directly and the skype account is recharged.So friends and all Skype Lovers (Including me ) the act of skype of enabling some money matters by default which can easily mislead the users, is it Cheat ? or is it fine ? and the act of paypal which makes users to enter credit card information to them ( they say hide credit card info online with paypal ) is it fair? Even if you redeem money using paypal, you are not able to use it unless you enter credit card information. ( possibly this is from jan 2010 i am not sure ) . I Dont know who frames these tricky marketing strategies behind the scene. These actions simply means that they are waiting for a chance where they can take the users ignorance into advantage by which they can make money. Moreover this pay pal is more prone to hacking and Phishing etc. where attackers try to steal passwords. Still why pay pal compels users to enter credit card information and link credit card ?? Isnt it enough if you have money in pay pal you can use it. Already they get interest for that which they dont share with the users. That itself makes a good profit for them, they why they aim in taking advantage of the ignorance of the users. Yeah it is good for people who make mass purchase with paypal, for them if they dont want the reply at their check out as " Insufficient balance " in paypal, they can use and link their credit card. On the other hand why make it mandatory. Now paypal may say that to keep track of the users they do so. For that why not a debit card is enough ? They know in debit card only the available money can be taken. What if the user is clever enough to maintain zero balance in the debit card which he had linked with paypal. In such a case pay pal cannot take advantage of the ignorance of the users. So they go for credit card. Very funny right ?? Isnt there some one or some organization to check these tricky strategies which is deployed by corporate giants like skype and paypal ?? what ever after reading this Please Vote
  10. The following describes how to cook sambar for a single person for a single meal. Before reading this i strongly advice you NOT TO go for these cooking business over there which is one of the most stupid thing which you can ever imagine of doing. Did you go to US to sit and cook or check out life over there ? If you have a craze for cooking you should have learnt it before you had gone there, after going there trying to cook is just for some show off which is not that commendable. Eat all those Cheesy and fleshy stuffs available there and enjoy life.Step 1:Take Dhal ( 50 Grams, a quarter of the normal tumbler you ) . To 50 Grams dhal add 3/4 tumbler of water. Peel 10 pieces of small onion and add to this. Then peel and add 5 pieces of garlic. Take Tamarind which is equivalent to half the size of lemon and dilute it in a little water and keep it for 10 minutes. This Liquid tamarind is used only at the last. Step 2:To the above mixture add 100 grams of any vegetable with which you want to make the sambar. ( Carrot, radish or anything).Step 3:Add 2 teaspoon of Sambar powder.Step 4:Keep all the above in a bowl and close the bowl with a lid. Keep it inside the cooker and fill the cooker with required water.Step 5: Lit the cooker ( Keep it in reduced flame ). Check for the steam through that nozzle and then close the nozzle with the weight of the cooker, insert the weight properly. Just dont keep the weight over the nozzle, insert it properly, in new cookers this is kinda tight. Let it boil for approx 10 mins. after the first whistle ( please note here, cooking inside a hotel with cooker is not advisable, the whistle may sound like an alarm and the neighboring room mate might call 911. I am not kidding, seriously.) Now after allowing it to boil for 10 mins after the 1st whistle, Just put off the flame.Step 6:After putting off the flame, DO NOT OPEN THE COOKER LID IMMEDIATELY, if done YOU MAY HAVE YOUR FACE CLEARLY BURNT UP WITH THE HOT STEAM. So leave some time till the steam goes off, for this slowly lift the cooker weight and check whether the steam has gone. After checking whether steam is present or not by lifting the weight of the cooker slowly and releasing it, then open the lid of the cooker.Step 7:Now that you have a bowl of cooked stuffs. Just masticate it with any utensil available. Now add, that liquid tamarind to this mixture and cuddle it. Just add some fried onions and curry leaves ( which is not be available in the US ) to the mixture and heat a little. The so called sambar is ready. Now please remember again, Sitting in the US and eating sambar is one of the thing which you may think is fun, but its really stupid in all sense. Sambar does not keep you away from the cold weather, where as the available non vegetarian stuffs and the cheesy ones does that. So just for self satisfaction do this for few times, then go for the so called US food available. Sitting there in US and if you still go for these foods then it simply means you are not adaptable. So Just leave all the worries when you are there, eat and try out all the food over there for a pleasant stay.
  11. So I am sure that every one is aware about the remote desktop feature available in Microsoft Windows. This is a very useful and a handy tool which i too acknowledge. After using the remote desktop feature in windows ( all the version, let it be xp or vista whatever ) one must have a password for the account which is logged in in order to access that computer as remote desktop. Simple, if some one has to access a computer via remote desktop and if that computer does not have a password in order to login then in such case there is an error thrown. Here in this scenario one may think, probably even Microsoft must have thought that this is a security feature and so the system itself is setup like this. But i had a different idea about using remote desktop, so that the concept as such can be used in a greater extent. So now as a whole i want everyone to imagine. What are the things which are needed to use remote desktop ? In general it can be said as two computers are needed. So now narrowing this down just let me say computer 1 and computer 2. From computer 2 , the computer 1 has to be taken as a remote desktop. For this computer 1 has to be switch on and has to be logged in. So in the case of remote desktop computer 1 must have a password. So if computer 1 has to be logged in then password has to be entered into computer 1 for logging in . This means that computer 1 has to posses an input device like key board mouse and at time a monitor too. Just the CPU alone in computer 1 wont help in working out remote desktop. On the other hand just think , if computer 2 wants to take computer 1 as remote desktop and computer 1 can have just the CPU alone without any input and output device. In such case the Remote Desktop concept can be into maximum utilization , what i mean is that with the help of remote desktop then one can have 2 CPU and only one input and output devices attached to one CPU and still can access the other CPU, all that has to be done is both the CPU has to be connected via a UTP cable.But according to today's scenario that is not possible because of the above explained drawback. If a computer has to be remotely accessed it has to be logged in first and for this input and output devices are needed. So is there any way out like , just have a CPU connected via UTP cable to another CPU which has input and output devices. By just switching on the power is there anyway to take remote desktop. People may argue saying that it is not secure, but on the other hand why cant it be like for the initial configuration alone both CPU has to posses input and output devices, but on the other hand after the initial configurations has been set up then let the computer 1 which has to be accessed via remote desktop neednt have any input or output devices connected ?By this many can be benefited, hope there is a way out , if not in windows is there any way out in some other way in which this problem can be addressed. To put it in a nut shell imagine that you have a Desktop CPU and a Laptop and the CPU is connected to the laptop with a UTP cable and now that CPU has to be accessed from the laptop via remote desktop. Please note that the CPU is not fitted with input and output devices.
  12. These are cool extensions but there are still more cool extensions which are not mentioned over here , like there is an extension which helps you to take a snap shot of the entire webpage which you are viewing and save it as a JPEG image. That was really of great help at times
  13. Hacking CPanel is not that easy and im sure that Xisto wont allow to discuss hacking stuffs.
  14. Here i would like to draw your attention to one of the major aspect which we are aware of that is Laptop Theft. So this is a common issue which is seen in todays world. The main purpose of laptop is mobility. When people travel they can carry it along with them just like they carry a briefcase. But the threatening factor here is that there are people all round the town trying to flick some one lap top and use it or either resell it. At this juncture i would like to draw your attention to one important aspect that is buying old or used laptops from others. Make sure that you have the accurate details of the person from whom you purchase the laptop. Else you can be a victim something which you would have never expected. Now in todays technological world we have some softwares which can be installed and which can be used in the Laptops. These softwares automatically sends email to the previously specified mail addresses periodically. So when the laptop is stolen and when it is brought to the light of the internet then automatically the owner of the laptop receives the mail . By acquiring the header information of the mail the owner can easily take the originating IP address to the local police and can go about the case in finding his laptop.The above mentioned is not that very practical, because just imagine , every one ( almost all ) of us use a password for the Operating system on login. So when the person who had flicked the laptop switches on it , he will be unable to login , which simple means that the one who stole the laptop is going to format the computer. In this case i am very sure that the application which had been installed earlier , the so called anti theft application will also be erased on the format of the operating system. So in an overall view it can be seen that the first step taken after stealing the laptop is the removal of the anti theft software. So the conclusion here is that the anti- theft software which are installed as normal applications in the operating system provides no security for the owner of the laptop.So in order to over come the above issue now days we have some hardware devices for anti theft. This includes Anti-Theft PC Cards which unique and they provide more security to the owners of laptops. They operate by detecting motion of the laptop to determine whether a threat exists. The main advantage over here is that they are independent of the computer operating system and operate whether the laptop is switched on or off. Now this is kind of much advantage than the older method where we just install an application and say that the laptop is secure. This is considered better because majority of the people who flick the laptop do not open and see for the hardware and then switch on the computer. So here even if they format the computer security is provided. But still if the person who flicks laptop reads this i am sure that form the next time he is gonna make a through check of the hardware installed in the computer and then use it. So can there be a permanent solution for this ?
  15. Nope, except for The Lord God Almighty no one on earth can destroy the internet !!
  16. Ya, i agree that Google does not charge for most of their services. But on the other hand they have a huge earning on Adsense and Adwords. Just imagine the amount of Google adv you see every day. When you just browse for something, let it be even a blog which has contents written about Microsoft, what do you find in that blog ? Hopefully Google adv in the side of that blog. So almost ever internet user, every surfer who browses the internet indirectly give Google a helping hand in mobilizing cash through adv sense and adv words. If you even do not click the adv which you see , they have the count of Page Impressions. So once you visit that page you leave a page impression on that webpage and that adv which you see pays Google, and from which a protion is paid to the web site owner. This money making strategy of Google is really widespread and is commendable which cannot be stopped, rather many subscribe for this and use this. More over here there are many more hidden strategies which are being followed. I have come across many cases where they have websites and they have subscribe Google Adsense which means they have Google advertisement in their webpage and they try to make money out of that . But the website owner gets a mail from Google that their Adsense accout has been terminated due to violation of Terms and Conditions which states that you are not supposed to click the advertisements in the website on your ownBut the fact is that Google does this inorder to protect their clients who advertise with Google. But the sad thing here is that even if the website owner had not clicked those adv by himself it gets banned at times. Just think practical, you make good cash using Google Adsense and a friend of yours is extremely jealous that you make cash with Google Adsense. All he needs to do is that just visit the website and give some contiguous fake clicks in the adv and the site is gonna be banned from Google Adsense. Now in this case the web site owner is helpless. So i would personnslly suggest that some hi tech artificial intellegence has to be used over here. Im quite sure that as of now that is being used but the above scenario is still there .Though Google offeres some option like if you suspect fake clicks you can report to them to avoid your account getting banned or so. But still before you sense those fake clicks if your account in Adsense gets banned then thats the end. What ever Tickets you raise to Google they wont ennable the Adsense account that easily. So now what happens. The pending cash with Google adsense you will not be able to redeem as everyone will be aware that you need a 100 dollar for a cash out in Google adsense.So my Conclusion here is that Google offers most of its services free of cost which is commendable, but on the other hand they have other excellent money making strategies.
  17. Google , ya they do things in a mysterious way but the end result is they keep rocking , Recent addition their list was Google wave. When i saw that it was open source i was not able to get what is that it is that Google is trying to do, as mentioned whatever they just keep rocking. Can you ever imagine of any other Internet Giant which got a good grip over technology in a short span ?? I was using Yahoo ! mail and i still remember 5 years ago my friend had send me a Gmail Invitation. Those days we were not able to open a Gmail account unless you have a invite. That time i thought that it is a strategy which Google follows just to create a hype about Google mail by creating an artificial demand, so that once users get their own account with much difficulty they wont leave the service, its just something will be ringing in their mind that with what difficulty they had got their own Gmail account so why to leave it . But once i started using Gmail, Till that day to today i have never thought of any other mail provider . It was mysterious when Google released it like you need an invite to open an account, but atlast their service really Rocks , almost there is No Spam found in my inbox. So what ever Google does mysterically will Rock anyway, lets wait and see what is that it is when that count down ticks 0 .
  18. So i am sure that the first thing that every one notes when you get an email is the subject of the email along with some other important information. That is the Time and the date when this mail was sent. Now days Gmail even offers another information in each mail which states how many hours before the mail was sent . . But how ever the information about the date and time in the header of the mail which we see is accurate and useful. Now it just makes me think what is that the mail servers use inorder to keep track of the exact date and time . Just take this scenario i create a Gmail from India and i move to USA and when i am in USA, my IP will record a US IP address. Now when some one sends me a mail from India to my Gmail and when i open it in USA hopefully i will see the time in US Timings and not in Indian timings. Now let me be more precise, if some one sends a mail to me from India in the evening 6 that is 6 PM and at the same time if i open my mail from USA, what time is to be displayed ?? i am sure that it will display the US timings. But if i use the Indian Proxy and open the mail will it show 6 PM ?Hope some one atleast get what i mean ? Im kind of sure that mail servers must be going for GMT and display the time and date. Ya that is fine. But how about the above scenario ?
  19. Thats why they call it Beta version , and may be you can take it in the other sense , why do you think that you work for free ? Think that you are participating in such a big development project by using and testing them. If you blame Microsoft for releasing Beta version then what will you call Google ? I guess everything is Beta over there in Google, right from the mail till them messenger. But every one will appreciate google for the company releases its products as open source inccluding the Google Wave . Whatever my comment on that statement is releasing Beta version cannot be considered as CONS. What ever till date i prefer Office 2003 rather than the 2007. But the Ribbon interface in office 2007 is commendable and many have a positive note on that.
  20. yup, i saw the video the news , but it also added that the Pope himself got up quickly managing the fall.
  21. at times microsoft windows confuses me , i have doubts am i crazy or is my computer crazy or the operating system which makes my system run is crazy . what ever , please is there any one who have installed Visual studio 2008 in Windows XP SP 3 , if so did you face any problems while installing or did you have a smooth install ?
  22. If you really wanna boost the internet connection, just check out all the running applications and the processes .This also includes the back running process.Now check which are all the running process which uses the internet connections and just see that whether that process is highly necessary else just disable that process. Be sure what is the process that you are disabling .Some thing like a messenger update you may disable. On the other hand you cannot afford to disable an antivirus update. On the other hand go reducing the image quality while browsing, use Adv killers , all these can be made using some external software .
  23. i guess this thing can be tried out taking some good risk , the thing which needs to be taken care is that there is proper sealing in the place where the power cable is plugged and that water dosent seep in. Still onething that confuses me in that pic is that where and how to drain the water . Keeping a Box in the ice cube size will be fine . Now my mind runs up to to some thing else . The design the cooling stuffs of a processor with so much care and effort. Why cant there be one like where you have a freezer box attached to your CPU in which the hard disk is kept and water has to be filled . Power supply can be given seperately to the freezer box alone. And by this im sure maximum cooling can be obtained though it sounds crazy. And if such a thing can be done hurry patenting it . If at all that can be done the fact is that the electricity bills will go high due to the use of that freezing equipment which will be fitted in the CPU. Still instead of keeping a computer in the Air Condition and paying the Electricty bills for the Air condition it can be spent on a Freezer if that works out successfully .
  24. Every one is aware that we are heading towards a generation where wi-fi is playing an important role in Wireless Technology. The wifi has evolved over many standards and the present one is said to be 802.11g , and i suppose the previous one was 802.11b. There may be many differenced between the latest standard in wi fi and the previous one but one main difference which i find is that in the bandwidth. The 802.11g supports 54 Mbps and the 802.11b is said to support only 11 Mbps . And the main thing that has to be noted here is that wi fi is half duplex . Half duplex is one where communication is possible only in one direction at a time , though communication in both direction is possible , simultaneous communication is not possible in half duplex which means wifi which we use today is of 54 Mbps and is of hald duplex.Whereas the LAN wired one, where we use UTP ( Unshielded Twisted Pair ) is of 100 Mbps and is Full duplex. Just having these statistics in mind what can we infer ? Is so simple to say that wired LAN is cool though it has some limitation that it needs a wire to be connected and it cannot be used freely like that of a wifi. Still if we see the technical aspect wired LAN rocks in particular for network gaming and so on.Will there be a day where wifi will witness a speed which can match that of the wired one and that too with a full duplex communication ??
  25. I do agree that Microsoft is one of the Huge Corporate Giant which has been releasing Operating systems which every body looks upon, even he who hates Microsoft windows and uses Linux will say what is that it is in your windows , the same thing can be made available in Linux too, which simply means he too have used or have had a look at windows . This simply proves that no one can ignore Microsoft Just like that. But what ever i too love Windows and windows XP was a well reputed operating system that no one will ever leave that , even after the release of Vista and windows 7 . As every one is familiar once the operating system is released, bugs are found and they are fixed in the form of Service Packs. Service packs enhances the Operating system and service pack varies , 1st they release Service pack 1 then 2 and it goes on. Here the thing that has to be noted is that when the successor service pack comes it is gonna provide functionality better than the previous one. And that is what it means by version 1 version 2 and so on.But i dont know why it is the other way in windows Service packs . At times the functionality found in the previous service packs is not to be found in the newer ones and the newer ones have some big drawbacks, and this has some adverse effects . Let be make it clear with a practical example, If you are trying to install Visual studio 2008 you would have come across this problem. You can install and use visual studio 2008 in a windows xp operating system which has service pack 2 running along with that, on the other hand if you try to install visual studio 2008 in an windows xp operating system which has service pack 3 then it will throw you some error . You cannot install Visual studio 2008 in windows XP Service pack 3 . I dont know why it is so :oOn the other hand i dont know how to remove that service pack 3 alone separately as it was'nt installed separately. It was installed along with the operating system. Now that i cannot even install windows XP service pack 2 since im sure it will throw me an error saying that you have an higher version of service pack running on your system . Now this simply means that should i go formatting and reinstalling my operating system if i had to use microsoft visual studio 2008 ? Is there any other solution for this .And i am really confused why Microsoft has kept like this. If this is the case is this what you call it a Bug ? or is this done for any particular reason ? If there is any reason let me know
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.