VJ: 11/01/2007 - 12/01/2007
"I write for the same reason I breathe. If I didn't, I would die."
Sir Issac Assimov,



Tuesday, November 27, 2007

Football player wounded in shooting dies | Redskins' Taylor dies after shooting

0 comments
Digg it | Stumble it | Save to Del.ico.us |
The 24-year-old died in a Florida hospital where he underwent nearly seven hours of emergency surgery Monday to repair a severed femoral artery, the team confirmed in a website statement. "He never regained consciousness," Sharpstein told CNN. "He was unconscious when the fire rescue people arrived. It's a senseless tragic death." Redskins running back Clinton Portis, who played with Taylor in college, told reporters yesterday that Taylor changed after the birth of his daughter last year.

``It was like a new Sean,'' Portis said.

Taylor signed a seven-year, $18 million contract with the Redskins in 2004 after being selected an All-American and the Big East Conference's Defensive Player of the Year during his senior season at Miami. He played four seasons for the Hurricanes and in 2001 was one of just four freshmen to play for Miami during its national championship campaign.


Official Website: http://seantaylor.kcbsportsmarketing.com/
Big HitZ of Sean Taylor



MIAMI (AP) - Washington Redskins safety Sean Taylor has died in a Florida hospital, one day after being shot at his home.
Sharpstein calls Taylor's death a "tremendously sad and unnecessary event." He says the player was a "wonderful, humble, talented young man, and had a huge life in front of him."
Doctors had been encouraged last night when Taylor squeezed a nurse's hand. But Sharpstein said he was told Taylor never regained consciousness after being transported to the hospital.
Police are still investigating the shooting as a possible armed robbery.

Taylor's former lawyer, Richard Sharpstein, says he received the news this morning from Taylor's father. Taylor was recruited by the University of Miami and enrolled in 2001. That year, he was one of just four true freshmen to play for Miami in the 2001 national championship season, carving a niche for himself in Miami's secondary in nickel and dime coin packages. Taylor was named "Big East Special Teams Player" of the Week for his performance against the University of Pittsburgh.[5]
In 2002, Taylor was a second-team All-Big East selection by the league's head coaches in his first season as a starter. He finished third on the team in tackles with 85 (53 solos), broke up 15 passes, intercepted 4 passes, forced one fumbles, blocked one kick and returned a punt for a touchdown. He led all defensive backs in tackles, interceptions and passes broken up and had a career-high 11 tackles (2 solo) and intercepted 2 passes in the Fiesta Bowl loss to Ohio State University.
During his final year at Miami, Taylor produced a historic season that culminated with a plethora of honors and awards. He was a named a consensus first-team All-American, the "Big East Conference Defensive Player of the Year" and a finalist for the "Jim Thorpe Award" given to the nation's best defensive back. He led the Big East Conference and ranked first nationally in interceptions per game (0.98) with 10, tying the record for interceptions in a season with former Hurricane standout Bennie Blades. He finished first in total tackles with 77 (57 solos). He intercepted two passes in Miami's impressive 28-14 win over Pittsburgh, playing a key role as the Hurricanes limited All-American receiver Larry Fitzgerald to two receptions for 13 yards. He returned interceptions for an average of 18.4 yards, including a 67-yard touchdown return at Boston College, a 50-yard scoring runback at Florida State, and a 44-yard scoring runback against Rutgers. His three TD returns of interceptions is a Miami single-season record.
Read more...

Free Wifi | Google Free Wifi | Google TiSP | Installling Google Wifi (sanitary process )

0 comments
Digg it | Stumble it | Save to Del.ico.us |

For those who haven't seen the news yet Google TiSP (BETA) is a fully functional, end-to-end system that provides in-home wireless access by connecting your commode-based TiSP wireless router to one of thousands of TiSP Access Nodes via fiber-optic cable strung through your local municipal sewage lines.Solution for the last hundred yards. It's in BETA, and those wishing to participate must apply soon.

How can Google offer this service for free?
We believe that all users deserve free, fast and sanitary online access. To offset the cost of providing the TiSP service, we use information gathered by discreet DNA sequencing of your personal bodily output to display online ads that are contextually relevant to your culinary preferences, current health status and likelihood of developing particular medical conditions going forward. Google also offers premium levels of service for a monthly fee.
Read more...

Adobe AIR brings the desktop | Beta Air from Adobe

0 comments
Digg it | Stumble it | Save to Del.ico.us |

A new version of the Adobe AIR SDK download was posted on 10/1/2007.The Adobe Labs has released the Adobe Integrated Runtime (AIR), which provides this functionality.
Adobe describes AIR as a cross-operating system runtime that allows developers to leverage existing Web development skills to build and deploy rich Web applications to the desktop. It provides support for Flash, Flex, HTML, JavaScript, and AJAX.

Getting the software:
This download provides the beta 1 version of Adobe AIR. This runtime is no longer recommended for use, but may be required for applications that have not been updated to use beta 2. The Adobe AIR beta 1 was released on June 11, 2007 and contains a timeout that will cause it to stop working on December 11, 2007.
English
Download for Macintosh (DMG, 8 MB)
Download for Windows (EXE, 9 MB)

To get started with AIR development, you must install the AIR runtime on your computer. Once it is installed, you may download sample applications to see AIR in action and possibly take a peek under the covers at its code.



There are two downloads relevant to AIR development:
•Runtime provides the runtime environment for running AIR applications. Downloads are available for both Windows and Macintosh operating systems.
•Software Development Kit (SDK) provides everything necessary to build AIR applications. This includes templates, Adobe AIR APIs, and debugger and developer tools. The SDK is available for both Windows and Macintosh platforms. The command line debugger and developer tools require a Java installation (JRE or JDK version 1.4.2 or newer).

Additional downloads are available that allow you to build AIR applications within specific Web development tools:
•Adobe Flex Builder 3: Includes support for building Flex applications on Adobe AIR from within Flex Builder.
•Adobe Flex SDK: Allows you to build AIR applications via Flex.
•Adobe AIR Extension for Dreamweaver CS3: Adds support for building AIR applications within Dreamweaver CS3.
•Adobe AIR Extension for Flash CS3 Professional: Allows you to build AIR applications with Flash CS3 Professional.
In addition, a plug-in is available for the Aptana IDE. Once the runtime is installed, you can easily install and run AIR applications, and the SDK allows you to build AIR applications.

More Information:

http://blogs.techrepublic.com.com/programming-and-development/?p=559&tag=nl.e055
http://labs.adobe.com/technologies/air/
Read more...

Sniffers | Packet Sniffers | How to use Sniffers | How to Prevent from Sniffers

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Sniffers
A sniffer is a piece of software that grabs all of the traffic flowing into and out of a computer attached to a network.. A packet sniffer is a program that eavesdrops on the network traffic. Like a telephone wiretap allows one to listen in on other people's conversations, a "sniffing" program lets someone listen in on computer conversations. Sniffing is the act by a machine S of making copies of a network packet sent by machine A intended to be received by machine B. Once a copy is made, the sniffer program can do, time and resources permitting, an arbitrary computation on the copy such as displaying it nicely in a GUI window. A sniffer can be used for a good purpose: to audit your own network, and to demonstrate the insecurity of plaintext network protocols. A sniffer machine can be discovered by other network tools.
In this lecture, we are considering sniffers where the sniffer (program/ machine) S network-topologically sits between A and B. But, be aware that it is possible to route the messages between A and B to go past S when A and B are on different subnets.
Sniffer activity occurs widely within organizations. It is no longer a newsworthy item. So, we can find only the following. In 1994, a sniffer program was installed by unidentified individuals at PANIX (Public Access to UNIX in New York). Within days, thousands of user names and passwords were stolen. Shortly thereafter, a similar incursion was successfully accomplished at BarNet in California.

Examples of Sniffers
Below is a select list of example sniffers from the open source archives. Visit http://www.packetstormsecurity.org/ and search for "sniffers." Many of these work on both Linux and Windows.
1.tcpdump: The grand daddy of packet sniffers. Ships by default on many Linux distributions.
2.ethereal: Excellent GUI based sniffer. It can dissect many protocols.
3.hunt: A well written sniffer with some attack tools included.
4.Ettercap: Ettercap is a network sniffer for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. It can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection.
5.dsniff: As an article puts it, ``Dsniff is the Swiss army knife of privacy invasion''. The package ships with a handful of nasties: urlsnarf, msgsnarf, mailsnarf, webspy, dsniff etc.
6.sniffit: Clever little packet sniffer with good filtering. We will be using it in the experiment described below.

What Does Sniffed Data Look Like?
It is easy to grasp the concepts discussed above by watching a sniffer in action. The information in the following example was derived using tcpdump, a program that has been around for quite sometime and is available for many platforms. This particular snippet is an abbreviated exchange between a machine and the SecurityFocus Web server.
"CONTENT FROM HERE HAS BEEN REMOVED AS THE FEEDBURNER STOPPED THE SYNC PROCESS DUE TO THE INFORMATION LOCATED HERE " Only the subscribers will gte the complete information on this section
Prevention of Sniffing -Encryption
Encryption is the best protection against any form of traffic interception. It is reasonable to assume that at some point along a path, data can always be compromised. Therefore, your best defense is to ensure that traffic is essentially unreadable to everyone but the intended receiver. This isn’t difficult to do, since many organizations have deployed services that make use of Secure Socket Layers (SSL), Transport Layer Security (TLS) and other methods that provide secure messaging, web browsing and more. Use switches instead of hubs. However, many commercial switches can be "overwhelmed" into behaving as though they are hubs. Use Symantec pcAnywhere when you try to access any remote files or while transferring any contents. The encryption technology used in it will avoid any packet sniffing and also use Norton Internet Security to block any intrusion.

Sample Script:
http://blog.robbiefoust.com/2007/11/powershell-ip-packet-sniffer-script.html

This document is for educational purpose only.
Read more...

Monday, November 26, 2007

Free Music| MP3 free Download | Google Hack - Part II

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Every one like to listern to music. From heavy metal to hiphop anything is free here in the world of Google.

Check the following steps to enjoy free music

Step 1: Go To www.Google.com

Step 2: Tepe the follwoing the search bar
intitle:'index of' mp3

Booommmmmmm you can see lot of mp3 files , just download them . This information is for education purpose only.Remember that all the music files are copyrighted .
Read more...

Google Hacking | Hacking Exposed | Untimate Hacking Part - I

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Have you ever wondered if you password is seen by millions of people ? Yes its true, if you have the habit of saving the password in text then obviously anyone can have it. Check out the steps on how to Google Hack the password that are saved in text documents.

step 1: Go to www..Google.com

Step 2: Type this in the search

ext:log inurl:password

You can get all the passwords that are stored in the text documents.

This information is for educational purpose only. Ensure not to save any username or passwords in any text documents.
Read more...

Human Tetris | Angels play | Game

0 comments
Digg it | Stumble it | Save to Del.ico.us |
I was enjoying my weekends in my home and came up with this video which was sent from my friend from his blog. This was acually the most viewed video EVER....


Sexy Tetris Real Live - video powered by Metacafe



Hey this is just a game... No naughty feelings.............. :)
Read more...

Sunday, November 25, 2007

Camtasia for Free | this is not a crack | Full version of version 3 Camtasia | Limited offer

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Want to get the camtasia for free? This is a promotional offer by techsmith for limited period.

Here are some clearer instructions -

Step 1
Download the software from here -
(save the file to your desktop).

http://download.techsmith.com/camtasiastudio/enu/312/camtasiaf.exe

Step 2
Go to this page, complete your name, country and
e-mail address and Techsmith will send you a
software key to unlock the program.

http://www.techsmith.com/camtasia/pcpls.asp

Step 3
Install the software and then input the key to
unlock it and you will have the full working
version of Camtasia Studio 3.

Note: Unfortunately this offer is only for PC
users, sorry to the Mac people out there!

Courtesy : Yaro Starak , TechSmith
http://www.blogmastermind.com
Read more...

Friday, November 23, 2007

Black Night| Deep Purple | Guitar Master | mastertheguitar.co.uk - MTR13! | Smoke on the water

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Excellent teaching by this geek who plays this stuff. I was amazed to listern when he played. Simply amazing....he rocks/ I love the orginal version and hope you also love this music.

Johnny B Goode-Guitar Lesson | Excellent Teacher



Speed Kills - Guitar Lesson Introduction|No Boundaries by Michael Angelo Batio


Impossible Guitar | Divine Quality


Jason Becker - Guitar Clinic| Guitar Freak | The MASTER




Check out this video:Amazing Stuff


Kid teaching| Check this out | How to Play Smoke on the Water


Check this out | Improved Version | Smoke on the water


The Real Note | Smoke on the water



You wont miss this one | WHITESNAKE IN THE STILL OF THE NIGHT



Enjoy your weekend everybodyyyyyyyyyy :)
Read more...

Tuesday, November 20, 2007

Mind Control | Brain wave sensor | Future Gaming |Silicon Valley |

0 comments
Digg it | Stumble it | Save to Del.ico.us |
How would you feel if the music player play songs depending on your mood, how would u feel when you can lift an object by just using the brain wave ? Sounds interesting ?

NeuroSky is developing some consumer technology that might lead the way to some intense game control in the near future!

“NeuroSky has developed a cost effective bio sensor and signal processing system for the consumer market. Our wearable technology unlocks worlds of new applications such as consumer electronics, health, wellness, education and training.





The neurons that comprise the brain work on electrical impulses. The last century of neurological research has shown us that brainwaves of different wavelengths indicate different emotional states, like a focused awareness, a meditative state, or drowsiness. Brainwaves have been used in medical research and therapy for years. We’re bringing it to the consumer world. ”





Five companies, including a Bluetooth headset provider, game console maker and trucking company, are said to have signed up to market end-user products containing NeuroSky's chips. Its biggest customer thus far is Ziyitong Technology Co. Ltd. (China Mobile), which has more than 100 million cell phone subscribers, 13 million of whom have high-speed 3G service.

Reference:
http://www.eetimes.com/news/latest/showArticle.jhtml?articleID=163701653
Read more...

Free Wifi | Easy WifiRadar | Hacking Wifi | Norton Internet Security

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Some things in life are free. Easy WiFi Radar helps you find and connect to open wireless access points with a single mouseclick.






Steps to setup the wifiradar:
Step 1: Go to www.makayama.com/easywifiradar.html
Step 2: Click Download
Step 3: Unzip and click on the .exe file and install the product.
Step 4: Click the play button and let it scan for any nearby wifi connections. All red access points indicate that the wifi connections are "password encrypted" the green indicates that the connection is not protected.The green connections can be used to connect to the internet.

Four steps to protect Wi-Fi networks from hackers
1. Stop broadcasting to the world.
2. Change the password on your access point.
3. Use encryption.
4. Enable Media Access Control (MAC) filtering.
5. Use Norton Internet Security to protect the system from any intrusion.
Read more...

eBay Web attack using custom- built botnet | eBay users "ALERT"

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Seeding genuine web sites with malware is nothing new, but the practice has been gathering steam this year.The site was compromised by SQL injection vulnerabilities and then IFrame attack code is inserted.Yet another sophisticated Web-based attack against eBay and its users is being investigated by a Tel Aviv-based security vendor that discovered a similar attack two months ago involving a custom-made bot designed to steal accounts.Ofer Elzam, Aladdin Knowledge Systems’ director of product management, says his firm has determined in the last few days that at least two Web sites, one called Save Our Planet and another called Nova Radio, appear to have been compromised with malicious code that combines to launch an attack against a site visitor. Aladdin Knowledge Systems Ltd.(NASDAQ: ALDN) announced that the Aladdin eSafe Content Security Response Team (CSRT) has uncovered significant new details surrounding the eBay botnet attack it first discovered on September 6, 2007 .The attack, which is one of the first of its kind to employ extremely complex, multi-stage attack methods, performs a distributed and covert brute force attack on eBay accounts in an effort to obtain personal information and/or items sold/purchased via the eBay site. Two new details provided by the Aladdin eSafe CSRT were made available this afternoon:

The goal of the re-attack today is to combine code to break in through the browser to the victim’s desktop and install a Trojan to collect eBay user account information, if it’s found, and connect to eBay to use that account information to commit fraud. “There are a chain of sites that work together,” says Elzam. “One Web page uses a trick with JavaScript to open a size-zero window, which takes content from a third-party site.” Elzam says Aladdin hasn’t yet been able to reach the operators of the Save Our Planet and Nova Radio sites- and notes that forty more Web sites may be tied to this attack, which is very fluid and changing-- but it has been in touch with eBay.
Read more...

Thursday, November 15, 2007

Trojans can use your Affliate I-D | An Exclusive report -Takashi Katsuki

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Trojan is a general term for malicious software that is installed under false or deceptive pretenses or is installed without the user's full knowledge and consent. Most Trojans exhibit some form of malicious, hostile, or harmful functionality or behavior.Trojan.Farfli can download and execute additional threat on the infected computer. It can also modify the Internet Explorer Start Page and change many settings related to online transaction and one such example would be the Affliate ID to get more profits through the clicks.
Takashi Katsuk from Symantec is under an investigation of Trojan.Farfli. He Says" Trojan has daily tasks that are closely related to updating Trojan.Farfli. We have seen Trojan.Farfli updated three times a day on average and sometimes as much as seven times a day, and the total number of variants has reached more than 300 since July. In comparison, Trojans discovered around the same time have far fewer variants. For example, Trojan.Hachilem and Trojan.Srizbi have only 150 variants and 40 variants, respectively. Precisely speaking, because there are files dropped by this Trojan that are polymorphic there are hundred and hundred variants of this Trojan "

To read the complete report use the following link
http://www.symantec.com/enterprise/security_response/weblog/2007/11/trojan_writer_lusts_for_money.html


HOW TO REMOVE Trojan.Farfli:

1. Temporarily Disable System Restore (Windows Me/XP).
2. Update the virus definitions.
3. Reboot computer in SafeMode
4. Run a full system scan and clean/delete all infected file
5. Delete/Modify any values added to the registry. [Take extream caution when editing the registry- Use this only if you are tech savy]

Navigate to and delete the following entries:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_[random 1] HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_[random 2] HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\[random 1] HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\[random 2] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_[random 1] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_[random 2] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[random 1] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[random 2] HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IE4\"Main"= [random]

6. Exit registry editor.
7. Delete the Web sites added to the Internet Explorer Favorites menu.
a) Start Microsoft Internet Explorer
b) Click Favorites > Organize Favorites
c) Delete the Favorites added by the risk: http://www.6781.com/?001

8. Restore the default settings in Internet Explorer. [how to]
9. Restart the computer.

Ensure you have Norton Internet Security installed in your computer to be confident and safe in this connected world.
Read more...

“Storm Trojan” Illustrated | Security Response Lab | Cyber Cops from Symantec

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Cyber crime never sleeps — so the crime-busters have to work round-the-clock too. Which is why U.S.-based Net security leader Symantec, best known for the Norton anti-virus products, has just set up in Pune, its first "24 x 7" Security Response Lab. It is equipped to keep tabs on the world's Internet traffic, monitoring 40,000 of its own sensors buried in cyberspace, across 180 countries, tracking 150 million anti-virus systems — and sending two million dummy e-mails to test the Web's defences.

The lab work is done in four shifts by Indian security specialists or Cyber cops, backed by Symantec's 2000-strong India-based development muscle.

Why Pune? "Because of the strong security expertise and programming skills available in India," explains Anil Chakravarthy, vice-president for India Technical Operations. "We have groups here who are experts in anti-fraud operations," says Vincent Weafer, Symantec's U.S.-based Senior Director (Global Operations).

In fact, Pune engineers have filed four global patents in recent months in the area of Net security. And Vishal Dhupar, Symantec India's Managing Director, feels: "The India-based Security Response Lab is a major contributor to our global response to Net threats — and will also help us track the security landscape in the country from a global vantage point."

The Pune Centre will work in tandem with response labs in seven other locations spread across North America, Europe and the Far East as they try and neutralise viruses, spam (unsolicited mail), phishing (trying to steal sensitive information) and `bots' (robot-like invaders into unsuspecting computers)... often within minutes of the threats appearing.

The Pune lab is the only one that works 24 hours, 365 days of the year.
Symantec illustrates the "Strom Trojan findings in the following link
http://www.symantec.com/content/en/us/home_homeoffice/media/flash/peacomm.html

The threat searches for some particular hashes (searches are done by hash, not by specific filename) and eventually it receives a reply that includes some 'meta tag' information. The meta tag information is encrypted and contains information on where/what to download (e.g. Mixor.Q, Trojan.Abwiz.F).
Read more...

Eye Tracking | Usability Testing

0 comments
Digg it | Stumble it | Save to Del.ico.us |
What would you do if you get an oppurtunity to know where the user see on your website .First when I saw this technology from etre I got thrilled.

Eye tracking services allow you to climb inside the users' head and see your designs through their eyes.This can increase the internet sales for any Online Internet Marketing. Amazed seeing this video file , check this out its a must see video

DONT MISS IT

Read more...

Cyber Cops | Email Tracing | Symantec Antivirus |

0 comments
Digg it | Stumble it | Save to Del.ico.us |

Today we are going to see how to trace email for free. Would you like to know how to do email tracing for free ?. We would have seen many products in the internet which would help you to trace the emails . Before moving on to the topic on email tracking lets see why we need to do that? Is that legal ? To some extent yes. We would be very curious on how we get an unsolicited email. No wonder that we can download the products available in the market and trace the email however what can can do after that?

In this topic we would see on how to trace an email and also on what to do with the collected data.Depending on the response I would post a Video on the email tracing process. Forensic tracing of e-mail is similar to traditional gumshoe detective work. Checking involves looking at each point through which an e-mail passed, with the detective working step-by-step back to the originating computer, and, eventually, the perpetrator.To know this process we have to know how the emails work,but with a email tracing software we dont need to much about how email works.
http://www.iinfosearch.com/email-tracing-software.htm
http://www.msgtag.com/Email_Tracking_Software.html

We may see some of the tools like Neo Trace,emailtrackerpro etc are the few which you can buy to trace email . However there are may more free Free Email Tracing Software available in the market to download and some of the free softwares are listed below.

If you want to trace an email instantly and dont want to download any software, then use the link below for tracing
Email Tracing
Extracting Email Headers link will guide you on how to use this email tracer.In this help document youw would not see on how to trace the email from gmail. This can be done in a very simple way.

Email Tracing Tutorial

step 1: Click on to any email that yoou want to track in gmail
step 2: Click on the option next to reply as seen in the picture
step 3: Click Show Original form the option listed
Step 4: Copy all the contents in the window and paste in the online email tracer.
http://www.cyberforensics.in/OnlineEmailTracer/index.aspx
Step 5: Click "Start Tracing"
If you want to analyze the results the the best tutorial would be
http://www.visualware.com/resources/tutorials/email.html#emailtrackerpro


You would see a video soon on email tracing in my next blog,I would request you to subscribe my blog. We would also discuss on the Assembly language.

Use Symantec Software to secure your online transaction.
To get ASCL Certified Cyber Crime Investigator click the link below to know more
http://www.asianlaws.org/courses/cci/index.htm
Read more...

N360 -comprehensive consumer security solution

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Norton 360™ from Symantec™ is a comprehensive consumer security solution that offers a full circle of protection. Easy to use, it provides automatic and transparent protection from viruses and spyware, fraudulent Web sites, phishing scams, hackers, identity theft and more. With a renewable subscription, up to three PCs in your household are continuously protected, safeguarding your family when they play games, send email, download files, chat, or surf the Web. Transaction security features allow you to shop and bank online with confidence.

HighlightsDefends your PC against a broad range of threats
Transaction security safeguards you against online identity theft
Automatic backup and restore protects your important files from loss
Keeps your PC tuned up for peak performance
Provides a hassle-free user experience
Protects against the latest online threats


Norton 360™ also keeps your PCs tuned for peak performance and protects the data on them by making it easy to back up photos, music, financial documents, other files and restore them at any time. Flexible options allow you to back up your files to CD, DVD and USB devices. For even more convenience, you can also set up automatic backups to an attached hard drive or a secure online storage service to protect your important files in the event something happens to your PC. In addition to this, a smart background scheduler automatically schedules key Norton 360™ functions such as scans, backups, and tune-ups so that they don’t interfere with your PC activities.



BuyTV, Episode 071, Product Feature, Symantec, Norton 360.

Add to My Profile | More Videos
Read more...

Internet Security Threat Report

0 comments
Digg it | Stumble it | Save to Del.ico.us |
The goal of this podcast is to alert listeners to emerging threats and trends that Symantec has identified in the Symantec Internet Security Threat Report Volume XII.
Click here to know the complete report
themeid=threatreport

Read more...

iPhone Hype

0 comments
Digg it | Stumble it | Save to Del.ico.us |


An Exclusive Interview with the IPhone Freaks

Eric Schimdt Google CEO joined Apple's board few months ago and this is the first product to come out of the relationship between Apple and Google.Ipod Build Specifications:- So lets discuss about the iphone and the features that make everyone crazy over the Iphone. The dimensions of Iphone are 115 x 61 x 11.6 mm or 4.5 x 2.4 x 0.46 inches and it weights about 135 grams . The Front is almost occupied by a huge display with a small speaker on the top and a Home Button below it. It is not a flip Phone or even a slide Phone. There is no QWERTY keypad or even the Number pad in the Iphone. On the left hand side Iphone is having a speaker and a ring/Silent button. On the top a standard headset Jack, a Sim Card slot and a Sleep/wake Button.A dock is Provide for charging the Iphone and is compatible with Ipod. On the back it has a 2Mp Camera on the top Left Corner.The most promising feature of Iphone is Large touchscreen. Even the Nokia N95 is also not comparable with resolution and display size provided by Apple Iphone.Another Promising feature of Iphone is Multi-touch user interface. It can recognize you finger gestures and actions and has the ability to ignore unintended touches. Apple claims Iphone as a non Stylus needed touch sensitivity phone. Wit the Multi Touch feature Iphone can recognize your fingers whether you are using a single finger or Multiple fingers.So while browsing a web page for example you can click with a single finger to open a link at the same time use the second finger to scroll around. Even Iphone recognizes unintended touches (i.e) if you place all the fingers at a time and do something on the iphone, Iphone would not react to your actions and stays like a teddybear.The thrilling feel of the Multi-Touch interface is the Pinch and Zoom feature.
The typical iPhone buyer is a young man with a college degree and a higher than average annual household income, according to the group's online survey of buyers.
The iPhone, to cost between $500 and $600, will be available online and in Apple and AT&T stores।
Have You got one YET
Read more...

Monday, November 12, 2007

Brisk Walking Fight's Nicotine | Walking For Exercise

0 comments
Digg it | Stumble it | Save to Del.ico.us |

Do you walk everyday atleast for 30 min ? Can you ask this question to yourself ? Hey wait ...dont start to walk now...read this and make sure you walk for atleast 30 min a day. But don't sleep walk. :)

Studies show that walking can:

Reduce the risk of coronary heart disease and stroke
Lower the Nicotine content in the body
Lower blood pressure
Reduce high cholesterol and improve blood lipid profile
Reduce body fat
Enhance mental well being
Increase bone density, hence helping to prevent osteoporosis
Reduce the risk of cancer of the colon
Reduce the risk of non insulin dependant diabetes
Help to control body weight
Help osteoarthritis
Help flexibility and co-ordination hence reducing the risk of falls

Exercise is just downright good for you. If you name any random 10 medical conditions and diseases, I’m willing to bet money that some form of frequent exercise is a good treatment or preventative measure for at least 9 of them. Diet and exercise pop up as treatments and preventative measures in so many of the diseases that ail us today, and both of these areas are a good place to focus on if your concerned about your health. Even just some simple walking for exercise can go a long way to improving your health. Walking for exercise is fun, easy, and is a great stress reducer.

Walk Lyrics“Withdrawal symptoms related to smoking can be better handled with walking”, says a research finding. This was published in the medical// journal Addiction.

Dr. Adrian Taylor from University of Exeter who is the lead author of this study revealed that moderate exercise certainly had a better effect on people who are keen to quit smoking. He also added that if the same effect was found in a drug, it would have been immediately marketed as an effective tool to give up smoking.

Taylor and his team analyzed 12 different papers which discussed about the relationship between exercises and nicotine withdrawal. The emphasis was on exercises that could be done outside a gym like walking, isometric exercises, flexing and tensing muscles.

It was found that a minimum of five minute exercises was sufficient for smokers to keep their craving for a cigarette under control. According to Taylor, exercise produced dopamine responsible for mood enhancing which reduced the smoker’s craving for nicotine.

Dr. Robert West, professor from University College London felt that these exercises could come in handy for a shorter bout of craving. For a long time effect it will have to be combined with anti-smoking techniques

The great thing about walking for exercise is that you can do it anywhere. You have absoultuely no excuse for not getting up and walking around for at least 30 minutes a day. So it’s raining out? Take an umbrella! Seriously, just get out for a short walk around the block a couple times and you’ll thank yourself for it later. If its absolutely miserable out, just walking around your house or apartment a while is better than nothing.

Walking for exercise is extremely low impact, and so anyone of any age can do it safely and frequently without worrying about damaging themselves. Running and other more strenuous forms of exercise can cause all kinds of joint pain and soreness, and isn’t recommended unless you are in otherwise good shape.
Walking for exercise
A lot of recent studies into different forms of exercise are showing that walking is every bit as good for you as running or other more vigorous exercises, you just need to do it longer. If you are walking for exercise, go for at least 30 minutes or even an hour. The more the better, as you can’t hurt yourself by walking too much.

There are a lot of exercise programs that are beginning to realize the benefits of walking for exercise. As it is something virtually anyone that can walk can do, there is a huge target market for walking programs. I’d recommend any program that motivates you to walk frequently,a walk to remember. Even without one, there are hiking and walking clubs all over the place to join. Not only can walking for exercise be a way to maintain good health, but it can be a good way to meet new people and form new networks.

With so many benefits and virtually no cons, you can’t go wrong with walking for exercise. Its only drawback is that it takes time to do, but it is time well spent. What is the value of good health and longevity?
Read more...

Thursday, November 8, 2007

Symantec

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Symantec commissions have been increased to 15%! The base commission rate is now 15% for all Symantec products. In addition, you will continue to earn 25% on sales of our featured product, Norton 360. Contact your oneNetworkDirect Affiliate Manager today to find out how you can qualify to earn up to an 18% base rate.
http://affiliates.digitalriver.com/blog/index.php/category/onenetwork-news/symantec-affiliate-program/
Symantec
Read more...

Wednesday, November 7, 2007

0 comments
Digg it | Stumble it | Save to Del.ico.us |


Happy Diwali to all of you

'Come out into the universe of light.Everything in the universe is yours,
stretch out your arms and embrace it with love'

-Swami Vivekananda
Read more...

Thursday, November 1, 2007

All about my dreams.........

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Time Travel has been a fascination for many of us. When i first saw some movies on time travel during my childhood days i wondered how would I get that machine for myself.. bcoz i thought i can go to school at a click of the button. I used to travel by walk for about 5 or 8 km to school with a big bag in my back..... and I used to dream every day about the time travel machine that i can possess to get to play long hours in the school breaks and go to school in a second without any stress. As the time goes on……… my dreams also changed ,I was attracted to fly like a superman. I would get dreams like I fly to school... and save some of my friends from trouble..It seems to be so funny when i think of those past moments.
Then I got to dream about the " Alien space shuttle" the movie "Flight Of The Navigator" this was the best sci-fi movie of 80's , it also talked about time traveling. The movie is about a young boy who is somehow transported in time eight years into the future without aging.Then comes the fav of all the Star Trek....All these have one thing in common …. that is the " Time Travelling" though this is beyond imagination it’s seems to be theoritically possible now and should be possible practically in future…., If that happnes where would I be..... Any Guess? you know me very well..... I will leave it to your imagination now...... still dreaming............dreaming big... oh ye………. Bye everybody……leaving this dreaming world for a while and moving into the reality ……coz I got lot of work to do……………………..
Read more...
Online Reference
Dictionary, Encyclopedia & more
Word:
Look in: Dictionary & thesaurus
Medical Dictionary
Legal Dictionary
Financial Dictionary
Acronyms
Idioms
Encyclopedia
Wikipedia
Periodicals
Literature
by:
Word of the Day

Article of the Day

Today's Birthday

In the News

Quote of the Day

Spelling Bee
difficulty level:
score: -
please wait...
 
spell the word:

Match Up
Match each word in the left column with its synonym on the right. When finished, click Answer to see the results. Good luck!

 

Hangman