Tuesday 28 February 2012

Shutdown remote system using batch file...



To make this
1. Open Notepad, 
2.Type Shutdown -s -m \\xxx.xxx.xxx.xxx (IP Address)
3. Save To Desktop As (Anything).bat (DONT FORGET THE .BAT) 
4.Double click on the icon and wait.


Pls note:
->One thing is we need to have the remote systems IP address.
->And other obvious thing is both systems must me connected 

Also read more interesting things on original contents on hadoop


FOLLOW ME for more such original stuffs on Hadoop



Friday 24 February 2012

How To Format An Unformatable Pen Drive Using Command Prompt


Hi to all guys . now i am going to share a very useful tips . as sometime we are unable in formatting a pen drives.as it may be affected by virus or any other problem . so we can not format .so today am going to share a very useful trick that how to fomat an unfromatable pern drives using dos command.

Follow The Given Below Steps for do this.

1. First insert your pen drive in any usb port.

2. Now go to run.

3.  Type this command format h: And the hit enter.

4.when you will hit enter then it will ask you that you want to format or not. Y or N !!! Hit Y and press enter

That's it..

Also read more interesting things on original contents on hadoop


FOLLOW ME for more such original stuffs on Hadoop


Friday 3 February 2012

Using WIFi share internet connection from PC to Android...........

Are you looking for how to share internet connection from PC to android phone? Yes then you have come to the right place. WiFi Ad-Hoc networking is a very popular and easy way to share internet connection between PC and laptop and between PC and smart phone with built in WiFi.   This method works very fine with windows based smart phones and unfortunately this method does not work with Android based smart phones. But still you can use this method with your android phones by changing some configuration file settings. But this method is not convenient as you need to have root access to change the system files. But do not worry. We have some alternative method for you that you can easily use to share your laptop or PC internet connection with your phone.   This method I am going to describe is a software based method and it works well for Windows 7 and I have not tested it on XP, but it should work fine for XP also. This software I am talking about is Virtual Router (It’s a free software). You just need to install the software on your PC or laptop and rest is very easy.





Steps to Follow:   STEP1: Download Virtual Router from the link.   

STEP2: Install the software on your PC/Laptop

 STEP3: Open Virtual Router program and fill the settings form and click start virtual router. Make sure that you have already switched on the WiFi on your system.   


That’s all, you have done the configuration for PC/Laptop.

What Should be done on the Android Phone? STEP1: On your phone go to Settings-> Wireless and networks->Wi-Fi settings.   STEP2: Enable Wi-Fi on the device   STEP3: Now phone will automatically scan for available Wi-Fi networks, if it does not scan automatically scan it manually. After scanning is completed you can see a list of available Wi-Fi networks, click on the network that you have created and give the password and click connect. That’s all now your Android phone is connected to your Wi-Fi network. You can now access the internet on your Android phone.


Also read more interesting things on original contents on hadoop


FOLLOW ME for more such original stuffs on Hadoop





The New Android Watch In The Google Store Isn’t What You Think



I really wish this whole post could be about Google taking a big step forward in the field of wearable tech with the introduction of a new Android-powered wrist device, but their new Android watch is simply a watch with Android logos on it.

So what if it can’t display text messages, connect to a phone via Bluetooth, or play Angry Birds on your wrist — it’s a completely serviceable timepiece and it’s a fraction of the price of an actual Android-powered watch. The watches themselves are from Modify, and sticking to their usual MO, they allow you to swap the actual clock itself into different wristbands.

Still, I don’t think there’s such thing as too much swag, and it already looks like a fair number of people are pledging their mobile OS allegiance with their wallets. The Google Store already out of the large watches, and there are only ten more meant for people with tiny wrists at time of writing. If the disappointment is too much to bear though (and you don’t feel like waiting for new stock to come in), you could always try and ease your pain by buying a Chrome watch instead.


Also read more interesting things on original contents on hadoop


FOLLOW ME for more such original stuffs on Hadoop


Google Adds A New Security Layer To The Android Market… A “Bouncer,”.


Android malware has been an issue over the past year. Granted, most of the numbers we see out of security software companies are inflated — including malicious apps from third-party sources and ignoring small download figures — but that’s not to say that we can just brush that dirt off our shoulders.
Google knows this, and has for a while. Despite the fact that downloads of malicious apps are down 40 percent between the first and second half of 2011, seeing that 14,00030,000, or even260,000 devices have been affected by this or that malicious app requires action. That said, Google is adding a new security layer to the Android Market: codenamed Bouncer.
Originally, the Android market implemented three different methods for ridding the market of malware: sandboxing, permissions, and malware removal. Sandboxing keeps one app from infiltrating another, with one very important exception: permissions. Google sees its permissions system as a layer of security in and of itself, but permissions can actually be seen as a vulnerability. In some cases, the reasons behind the permissions a developer asks for aren’t immediately obvious to the user, and it can be tough to check everything, especially to the novice user.
Past that, Google’s always been good about removing malware from the market as soon as the company becomes aware of it, and in some cases, has even remotely wiped affected devices of malicious apps. The tool is a useful one to say the least, but it’s not enough.
Bouncer adds another level of security to the platform, automatically scanning new and existing apps for known bits of malicious code. Google has actually been scanning apps whenever new malicious code is discovered, but Bouncer will automate the process, scanning for known spyware and trojans, too. Bouncer runs every new application on Google’s cloud infrastructure and simulates how it’ll run on a device. That way, Google can see straight away whether an app is misbehaving and flag it accordingly.
Another smart feature is that Bouncer isn’t 100 percent automated. Once something is flagged, there’s a manual process for confirming the app is indeed malicious, reducing the risk of false positives.
To be quite honest, the Android platform is way more secure than most people think. I spoke with Android VP of engineering Hiroshi Lockheimer, and he seems to feel the same way. “There’s this impression that Android is a huge target for malware, and I really don’t think that’s the case,” said Lockheimer. Google polices the Market, scans for known malicious code (though most instances of flagging in the past have been from users notifying Google), and is quick to act when an issue pops up. But where the platform has fallen short (in one respect), is the developer registration process.
Becoming an Android developer is as easy as pie. I actually did it myself just to see how easy it is, and it literally takes five minutes and $25. After clicking accept a few times, you’re good to go. In fact, developers can register under pseudonyms if they’d like.
From a certain perspective, this is amazing. It allows young entrepreneurs to offer a product to millions of users for a very low cost, lowering the bar for developers who can’t afford to jump through Apple’s hoops. At the same time, it makes it easy for malware writers to get the ball rolling.
With Bouncer, Google is recognizing this issue without making things difficult on developers. Devs will still be able to submit an app and see it in search results within minutes — Bouncer’s scanning process only takes seconds — and they’ll still be able to register for $25 and a few clicks on “Accept.”
But… now that Bouncer is in place, previous offenders will have a much more difficult time sneaking back on to the platform by registering under a new name. According to Google’s blog post, the search giant will be “analyzing new developer accounts to help prevent malicious and repeat-offending developers from coming back.”
This is what I believe will make the biggest difference when it comes to the threat of Android malware, and I’m more than thrilled that the company is making it a priority moving forward.

Tranform Linux to Win 7 look and feel.........


Now to transform the Linux System to Windows 7 System you need a package called “Win2-7 Pack” which is the official and most comprehensive package for Linux Transformation to Windows 7 Look and Feel. This package completely transform your Linux to Windows 7 look and feel.
Step1: Download the Win2-7 Pack Transformation Pack:
Follow the Link to Download the Win2-7 Pack Package.
Step2: Install The package.
Installation is very easy once you downloaded the file extract the .tar.bz File and run GUIInstall.sh by double clicking or by terminal. Your wish.
Step3: After Installation here is your cool windows 7 desktop:
Once you done with it and if you wanna uninstall it then it is very easy just open the downloaded package and run GUIUNINSTALL.SH. That all for now……enjoy the Package

Wednesday 1 February 2012

Kingston Technology Launches World's First 256GB USB Pen drive.....

Kingston Technology, one of the world's leading vendors of NAND Flash-based memory products, has just announced another addition to its line of DataTraveler USB flash-drives, expanding the storage capacity to a world's first 256GB. The new DataTraveler 300 comes just weeks after the company's previously announced DataTraveler 200, which was launched as the world's first 128GB USB drive. With the  


 launch of its new DataTraveler 300, Kingston doubles the storage capacity of the world's highest-capacity USB flash drive, providing high-end users with even more storage in the same convenient form factor.

“The DataTraveler 300 will enable users to carry huge volumes of data with them everywhere they go - up to 365 CDs for example. That's one album for every day of the year, and it demonstrates how far flash technology has developed,” said Kirsty Miller, product marketing manager, Consumer, Kingston Technology Europe. “Business users and consumers can also safeguard their data by initialising the Password Traveler software which will allow them to password protect their data in a privacy zone without the need of administrator rights.”

The drive features the same USB 2.0 interface that is available on the majority of USB flash drives and computer devices and measures in at 70.68 x 22.37 x 16.45 mm. It boasts a cap-less design with a sliding USB connector and comes with support for Microsoft's Windows ReadyBoost. As far as performance goes, the drive is said to be capable of providing users with speeds of up to 20MB/s for read and 10MB/s for write.

Additionally, Kingston has also included the Password Traveler security software and a five-year warranty for its high-capacity 256GB drive. As far as pricing goes, be ready to spend as much as $934.2, without VAT, which is rather high, even for an SSD price point.

Features/Specifications:

  • Capacity* – 256GB
  • Fast – data transfer rates of 25MB/sec. read and 12MB/sec. write1
  • Dimensions – 2.90″ x 0.87″ x 0.63″ (73.70mm� x 22.20mm x 16.10mm)
  • Operating Temperature – 32° to 140°F (0° to 60°C)
  • Storage Temperature – -4° to 185°F (-20° to 85°C)
  • Simple – just plug into a USB port
  • Convenient – does not require Administrator rights to access the Privacy Zone
  • Safeguarded – includes Password Traveler
  • Practical – loop supports most key rings
  • Guaranteed – five-year warranty
DT 310 will be compatible with Windows, Mac OS X 10.3

DT 310 comes with  5  year warranty and  a price about Rs. 48,400,


If you have forgotten your Samsung security code, there's a way to reset it!

Please use one of the below Samsung secret codes to format your phone: 

There are actually two codes that you can actually use to reset the password. Below are these codes. Please dial them up and have the problem solved.

  • 
    
    *2767*3855# 
    
    
  • *2767*2878#