Pages - Menu

Monday 30 May 2011

Internet Error codes and Meaning





Sometime you are browsing the internet and trying to open any website, your e-mail and any FTP sites , but you see different error codes there. You should be familiar with these error codes. You can solve these problems if you are well-known with the meaning of error codes.

400 = This is bad request error, First check you may be typing wrong URL name and server could not understand your request.

401 = You are trying to open any unauthorized access site or page. Check your username and password if you are trying to open any webpage.

402 = Payment Required Error

403 = You are trying to open any forbidden page and you are blocked by that domain.

404 = Here you are trying to open the webpage that was removed or re-named, also check the URL spelling.

408 = This is time out error. you should send the request with in time that the server set for you.

How to block unwanted emails?



Do you want to block emails from your enemies? Do you want to block those annoying offers and newsletters that reach your inbox? Well here is a way to block all those unwanted and annoying emails that you do not want to see or read! With this trick you can block individual email address or the whole domain from which you do not want the emails to come from. Here are the step-by-step instructions to do this.
For Gmail
1. Login to your account
2. At the top-right corner, click on Settings
3. Under Settings, click on Filters
4. You’ll now see an option “Create a new filter“, click on it
5. Now in the From field enter the email address from which you do not want to receive the emails
For ex. you may enter abc@gmail .com in the From field to block all incoming emails from this address. However if you want to block the whole domain then use the following syntax: *@xyz.com. Now all the incoming emails from the domain xyz.com will be blocked.
6. Click on Next Step, select the action you’d like to take on the blocked emails. You may select the option Delete it so that the blocked email is moved to trash. To unblock the email, all you need to do is just delete the filter that you’ve created.
For Yahoo
1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. In the left panel select the option Filters and click on create or edit filters
5. Now click on Add
6. In the next screen, give a name to your filter and in the From header field enter the email address that you want to block.
Fox ex. abc@gmail.com or if you want to block an entire domain then type @xyz.com. Select the option Move the message to: Trash and click on Save Changes.
For Hotmail
1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. Click on Safe and blocked senders link under Junk e-mail
5. Now click on Blocked senders
6. Type in the email address that you want to block under blocked e-mail address or domain field.
For ex. Enter abc@yahoo.com to block the individual email address or just enter xyz.com to block the entire domain.

How to Hide any Drive in Computer Using Group Policy In Windows



1) Click on Run and type gpedit.msc

2) Now go to in User Configuration

3) Click on Administrative Templete

4) Click on Windows Componant

5) Click on Windows Explorer

6) Click on Hide specified drive in My Computer

7) Clcik on Enable option button

8) Choose Which Drive you want to Hide Drive

9) Click on Apply and ok

Step by Step Guidance How to Create Jar File in Java...



Step :1 Create Any Java File

Step :2 Compile that java file. When you compile java source file it will be generate class file.

Step :3 Checkout that file by Executing it.

Step :4 Go to console and go to the full path where you create your java source file and class file

Step :5 Write a command "jar cvf jar_file _name *.class" on DOS prompt. jar_file_name will indicate the jar file name which you want to create.

Step :6 Write another command "jar xf jar_file name" without quote
When you performed this command at movement one folder will be create with named META-INF

Go to that Folder this folder contain one file called MANIFEST.MF

Open this file with notepad
write below statement in this file at 3d row
Main-Class: Main_class_name
where "Main_class_name” means your class name of your java source file. Save this file.

Step :7 copy MANIFEST.MF file and paste it where your java source file, java class file and jar file is located

Step:8 Go to the Console and set path of Jar file and Manifest is

Step:9 Write command like "jar cvfm jar_file_name MANIFEST.MF *.class"
jar_file_name means name of your jar file which is already created.


Note:
When you write Main-Class: main_class_name in MANIFEST.MF file at that time after the "Min-Class:" statement space is must be after that writedown your main class name

Creating Your Own Run Commands...



If you are like me, you will use a few programs very frequently. One way to make them start faster is to give them their own Run command:

1) Win+R to open the Run dialog

2) Enter %windir% to open the Windows directory
3) Alt+F W S to open the File menu, choose the New menu item, then the Shortcut nu item
4) Go through the wizard to create a shortcut to the desired program
5) The name you give the shortcut is what you type in the Run dialog to start the program

Disable Read Write Rights on Folder with Windows XP...



(1) Double Click on My Computer...

(2) Click on Tools and Click on Folder Option...

(3) Click on View...

(4) Remove Tick mark Use Simple File Sharing (Recommanded)

(5) Now Choose Folder which you want to Disable Rights

(6) Right click on that folder and Select Properties

(7) Select Security Tab..

(8)Now Check Option Permission for Administrators with teak mark allow option..

(9)Just Remove that teak mark and click on Deny option ...

(10)Click Apply and Ok...

That's it...


Sunday 29 May 2011

How To Remove Virus From Your Computer.......

  • Many people have frustrating experiences where their PC is infected with computer virus, and they need tools for virus removal. If they are technical, they might try to remove virus themselves only to make it worse. Otherwise they may buy and use antivirus software, only to find that the software can find but cannot remove virus (like the photo shows). So I am putting together this post to help people remove virus from computer. NOTE THIS IS STRICTLY FOR COMPUTERS THAT HAVE WINDOWS OPERATING SYSTEM ON THEM. I am no expert myself but with a computer science background and expertise in how computers work, I believe I'll cover the topic well. Also, I've helped my relatives remove computer virus that cannot be killed by antivirus software. It's truly FREE virus removal Learn it and you'll be able to remove virus or any trojan and spyware.

  • Before we jump into discussing how to remove virus from computer, Let's get some definitions straight first:

  • A COMPUTER VIRUS is simply a computer program that does bad things to your computer.

  • A VIRUS PROCESS is the running instance of a virus. If the purpose of the virus is to pop up ads, it will do that at some time intervals (e.g. every 5 minutes) or it is triggered by some action on your part (e.g. close a Internet browser). If the purpose of the virus is to delete everything on your C drive, then it will do that the first chance it gets, and you will need to reinstall your operating system. Talking about frustrations

  • A VIRUS FILE can be any file that contains the virus. Most commonly the file is a Windows executable (a file that ends in .exe) or a dynamic linked library (a file that ends in .dll). This is the file you want to delete to remove virus.

  • NOTE that the core system DLLs are stored in C:\windows\system\ and C:\windows\system32\. In general you shouldn't see any new DLLs being added to the folder, unless you install software. In general viruses lives in one or both of these folders.

  • Before you do anything, download PROCESS EXPLORER (Google it). It is informative about the processes that are currently running on your computer. All you have to do is double click the executable to run it. When you run it, you need at least the following columns: PID, Command Line. If you don't see any of them, right click on the column bar and choose "Select Columns..." Then check the columns you want and click OK.

  • If you run antivirus applications such as McAfee or Norton, you can run it and they probably can scan your computer for viruses and delete them. Or you may see a pop-up window saying a virus is found and what you want to do with it. The trouble is sometimes they say that the virus is found but they are unable to delete it That just adds insult to injury. This is most likely due to the fact that the virus process is already running, and therefore you cannot modify any file that the virus process depends on. Sorry, operating system rule..

Short Cut keys of the keyboard.........enjoy shortcut....


General keyboard shortcuts

  • CTRL+C (Copy)
  • CTRL+X (Cut)
  • CTRL+V (Paste)
  • CTRL+Z (Undo)
  • DELETE (Delete)
  • SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
  • CTRL while dragging an item (Copy the selected item)
  • CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
  • F2 key (Rename the selected item)
  • CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
  • CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
  • CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
  • CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
  • CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
  • SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
  • CTRL+A (Select all)
  • F3 key (Search for a file or a folder)
  • ALT+ENTER (View the properties for the selected item)
  • ALT+F4 (Close the active item, or quit the active program)
  • ALT+ENTER (Display the properties of the selected object)
  • ALT+SPACEBAR (Open the shortcut menu for the active window)
  • CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
  • ALT+TAB (Switch between the open items)
  • ALT+ESC (Cycle through items in the order that they had been opened)
  • F6 key (Cycle through the screen elements in a window or on the desktop)
  • F4 key (Display the Address bar list in My Computer or Windows Explorer)
  • SHIFT+F10 (Display the shortcut menu for the selected item)
  • ALT+SPACEBAR (Display the System menu for the active window)
  • CTRL+ESC (Display the Start menu)
  • ALT+Underlined letter in a menu name (Display the corresponding menu)
  • Underlined letter in a command name on an open menu (Perform the corresponding command)
  • F10 key (Activate the menu bar in the active program)
  • RIGHT ARROW (Open the next menu to the right, or open a submenu)
  • LEFT ARROW (Open the next menu to the left, or close a submenu)
  • F5 key (Update the active window)
  • BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
  • ESC (Cancel the current task)
  • SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
  • CTRL+SHIFT+ESC (Open Task Manager)

Dialog box keyboard shortcuts


If you press SHIFT+F8 in extended selection list boxes, you enable extended selection mode. In this mode, you can use an arrow key to move a cursor without changing the selection. You can press CTRL+SPACEBAR or SHIFT+SPACEBAR to adjust the selection. To cancel extended selection mode, press SHIFT+F8 again. Extended selection mode cancels itself when you move the focus to another control.
  • CTRL+TAB (Move forward through the tabs)
  • CTRL+SHIFT+TAB (Move backward through the tabs)
  • TAB (Move forward through the options)
  • SHIFT+TAB (Move backward through the options)
  • ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
  • ENTER (Perform the command for the active option or button)
  • SPACEBAR (Select or clear the check box if the active option is a check box)
  • Arrow keys (Select a button if the active option is a group of option buttons)
  • F1 key (Display Help)
  • F4 key (Display the items in the active list)
  • BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Opendialog box)

Microsoft natural keyboard shortcuts

  • Windows Logo (Display or hide the Start menu)
  • Windows Logo+BREAK (Display the System Properties dialog box)
  • Windows Logo+D (Display the desktop)
  • Windows Logo+M (Minimize all of the windows)
  • Windows Logo+SHIFT+M (Restore the minimized windows)
  • Windows Logo+E (Open My Computer)
  • Windows Logo+F (Search for a file or a folder)
  • CTRL+Windows Logo+F (Search for computers)
  • Windows Logo+F1 (Display Windows Help)
  • Windows Logo+ L (Lock the keyboard)
  • Windows Logo+R (Open the Run dialog box)
  • Windows Logo+U (Open Utility Manager)

Accessibility keyboard shortcuts

  • Right SHIFT for eight seconds (Switch FilterKeys either on or off)
  • Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
  • Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
  • SHIFT five times (Switch the StickyKeys either on or off)
  • NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
  • Windows Logo +U (Open Utility Manager)

Windows Explorer keyboard shortcuts

  • END (Display the bottom of the active window)
  • HOME (Display the top of the active window)
  • NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
  • NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
  • NUM LOCK+Minus sign (-) (Collapse the selected folder)
  • LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
  • RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

Shortcut keys for Character Map

After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
  • RIGHT ARROW (Move to the right or to the beginning of the next line)
  • LEFT ARROW (Move to the left or to the end of the previous line)
  • UP ARROW (Move up one row)
  • DOWN ARROW (Move down one row)
  • PAGE UP (Move up one screen at a time)
  • PAGE DOWN (Move down one screen at a time)
  • HOME (Move to the beginning of the line)
  • END (Move to the end of the line)
  • CTRL+HOME (Move to the first character)
  • CTRL+END (Move to the last character)
  • SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)

Microsoft Management Console (MMC) main window keyboard shortcuts

  • CTRL+O (Open a saved console)
  • CTRL+N (Open a new console)
  • CTRL+S (Save the open console)
  • CTRL+M (Add or remove a console item)
  • CTRL+W (Open a new window)
  • F5 key (Update the content of all console windows)
  • ALT+SPACEBAR (Display the MMC window menu)
  • ALT+F4 (Close the console)
  • ALT+A (Display the Action menu)
  • ALT+V (Display the View menu)
  • ALT+F (Display the File menu)
  • ALT+O (Display the Favorites menu)

MMC console window keyboard shortcuts

  • CTRL+P (Print the current page or active pane)
  • ALT+Minus sign (-) (Display the window menu for the active console window)
  • SHIFT+F10 (Display the Action shortcut menu for the selected item)
  • F1 key (Open the Help topic, if any, for the selected item)
  • F5 key (Update the content of all console windows)
  • CTRL+F10 (Maximize the active console window)
  • CTRL+F5 (Restore the active console window)
  • ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
  • F2 key (Rename the selected item)
  • CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Remote desktop connection navigation

  • CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
  • ALT+PAGE UP (Switch between programs from left to right)
  • ALT+PAGE DOWN (Switch between programs from right to left)
  • ALT+INSERT (Cycle through the programs in most recently used order)
  • ALT+HOME (Display the Start menu)
  • CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
  • ALT+DELETE (Display the Windows menu)
  • CTRL+ALT+Minus sign (-) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
  • CTRL+ALT+Plus sign (+) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)

Microsoft Internet Explorer navigation

  • CTRL+B (Open the Organize Favorites dialog box)
  • CTRL+E (Open the Search bar)
  • CTRL+F (Start the Find utility)
  • CTRL+H (Open the History bar)
  • CTRL+I (Open the Favorites bar)
  • CTRL+L (Open the Open dialog box)
  • CTRL+N (Start another instance of the browser with the same Web address)
  • CTRL+O (Open the Open dialog box, the same as CTRL+L)
  • CTRL+P (Open the Print dialog box)
  • CTRL+R (Update the current Web page)
  • CTRL+W (Close the current window)


Never Pospone a joy in your life..

Tuesday 24 May 2011

sorry

Hey frds it my exam time so i am not post new information....,,sorry to all and miss u lot

Saturday 14 May 2011

Infrequently Used Run Commands...



Programs
Character Map :- charmap
Check Disk Utility :- chkdsk
Clipboard Viewer :- clipbrd
Free Cell :- freecell
Hearts Card :- mshearts
Microsoft Chat :- winchat
Minesweeper :- winmine
On Screen Keyboard :- osk
Remote Desktop :- mstsc
Spider Solitare :- spider
Telnet Client :- telnet
Windows Magnifier :- magnify


Control Panels
Accessibility Controls :- access.cpl
Add Hardware Wizard :- hdwwiz.cpl
Add/Remove Programs :- appwiz.cpl

Administrative Tools control admintools
Automatic Updates :- wuaucpl.cpl
Date and Time :- timedate.cpl
Display Properties :- desk.cpl

Folders Properties control folders
Fonts control :- fonts
Fonts Folder :- fonts
Game Controllers :- joy.cpl
Internet Properties :- inetcpl.cpl
Keyboard Properties :- control keyboard
Mouse Properties :- control mouse
Network Connections :- control netconnections
Network Setup Wizard :- netsetup.cpl
ODBC Data Source Administrator :- odbccp32.cpl
Phone and Modem Options :- telephon.cpl
Power Configuration :- powercfg.cpl
Printers and Faxes control printers
Printers Folder printers
Regional Settings :- intl.cpl
Scanners and Cameras :- sticpl.cpl
Security Center :- wscui.cpl
Sounds and Audio :- mmsys.cpl
User Account Management :- nusrmgr.cpl
Windows Firewall :- firewall.cpl


Computer Administration Tools
Computer Management :- compmgmt.msc
Device Manager :- devmgmt.msc
Disk Cleanup Utility cleanmgr
Disk Defragment :- dfrg.msc
Disk Management :- diskmgmt.msc
Disk Partition Manager diskpart
Dr. Watson System Troubleshooting :- drwtsn32
Driver Verifier Utility verifier
Event Viewer :- eventvwr.msc
Group Policy Editor (XP Prof) :- gpedit.msc
Local Security Settings :- secpol.msc
Local Users and Groups :- lusrmgr.msc
Performance Monitor :- perfmon
Resultant Set of Policy :- rsop.msc
Scheduled Tasks control :- schedtasks
Services :- services.msc
Shared Folders :- fsmgmt.msc
System Configuration Editor sysedit
System Configuration Utility msconfig
Utility Manager utilman
Windows System Security Tool syskey


Computer Administration Tools
Application Data Folder :- %appdata%
Home Directory Drive :- %homedrive%
Home Directory :- %homepath%
Shared Home Directory :- %homeshare%
Temporary Folder :- %temp%
Windows Root Drive :- %systemdrive%
Windows Root Directory :- %windir%

Sunday 8 May 2011

u want to made a computer assemble??? its so easy...

I bought a new computer and its assemble so , i think that we also do it in at home for only 19 minutes....have u seen??? no ......ohhh...

just watch and try at your home........


New Microsoft Computers

microsoft put their computer with this technology in near future

Mother's Day - Wikipedia, the free encyclopedia

Mother's Day - Wikipedia, the free encyclopedia: "Mother's Day is celebrated on the second Sunday of May. It is quite famous in urban areas, where gift giving to mothers is observed"

Saturday 7 May 2011

Does Smoking Kills?????????????????????????????













its very injurious to health..
This habit has also effect in the childrens.
Youth and Old Persons have also the habit of smoking..
Some people thing that we will make smoking our hobby..
But it somtimes convert to their habit..
Some people start smoking by some mentally problems,
some tensions.

I will feel very happy, if someone after taking a overview of this photos
it they can quit smoking.....

"Cigarettes smoking is dangerous to our health" this are the words we usually ignore when we by a pack of cigarettes. If you ask a smoker what are the good things they get from smoking, i think no one can answer a very positive answer, but still many are addicted to it. but if you ask what are the bad things you could get from smoking here are the top 5:

Halitosis or Bad Breath: No one wants a bad breath

Emphysema and Chronic bronchitis: Symptoms are hard to breath, continuous coughing, and too much phlegm in our lungs.

3. Heart Disease: the smoke of a cigarette retrograde to the oxygen that we breath, then oxygen combine with the blood that circulate around our body system , and then blood will go back to our heart with the chemicals that we get from the smoke of the cigarette. This is the cause of heart disease.




Cancer in the mouth, throat and esophagus:because cigarettes contains nicotine, carbon monoxide, at tar this chemicals causes cancer















5 Cancer in lungs: This is the best disease that you could get in smoking cigarettes, and sometimes people who smoke don't even know and its too late after they know it that he has a lung cancer.

Still there are some bad things you could get from smoking cigarettes like teeth gets discolored, fingertips turns yellow, turns you into addict in smoking, smelly clothes, gets tired easily. and so much more.

Pregnant women who smokes can affects his unborn child because of chemicals that she inhale while smoking.

There are people that already stop from smoking but suddenly they keep coming back.
There are many ways to stop us from smoking, the only thing that we have to have is discipline and determination if we don't have this I'm sure we can not get away with our smoking problems even if its the best way or method on the market.
























          Smoking Kills












"dnt smoke in u r life"


Virus History - From the first virus to the latest viruses



==>     1981 – Elk Cloner The first virus was created and spread across Apple II floppy disks. The virus showed the following message on the screen. It will  get on all your disks. It will infiltrate your chips. Yes it's Cloner! It will stickto you like glue. It will modify ram too Send in the Cloner!

==>      1986 - Brain Brain was written by Basit aswell as Amjad, these two broothers had a computerstore in Pakistan. The reason that they wrote the virus was that they got tired of people making illegal copies of the programs that was sold in the computer store. The virus Brain was the first bootsector virus and spread from floppy disk to floppy disk.


==>      1987 - Christmas worm, File infectors aswell Lehigh. The first viruses started to spread and show around 1987. These viruses infected .coom files, there amongst command.com. The first virus that infekted command.com was Lehigh virus.
 

==>     1988 - Robert Morris masken, MacMag, Scores 1998 was proberbly the first year where there was a crisis on the Internet. The Morris worm was not written to spread in that fast pace. But due to bad coding the Morris worm continued to infect other systems. The Morris worm spread across through several vulnerabilities in UNIX, these vulnerabilities existed in sendmail, fingerd, rsh/rexec aswell as weak passwords.



==>    1989 - AIDS trojanen The Aids trojan was not a virus but a trojan. The Aids Trojan spread as a AIDS information program. When the file was executed the system encrypted the entire harddrive. In order to get your data back you had to pay the viruscreator money to get the key to unencrypt the harddrive.



==>    1991 - Tequila (Polymorphic virus) Tequila was the first Polymorphic virus, this means that the virus had the possibility to change it's "signature". That made the virus harder for the antivirus programs to find the virus.



==>   1992 - Michelangelo, DAME Michelangelo was one of the first viruses which got alot of publicity. DAME was the first automated toolkit to create viruses on the fly. DAME stands for "Dark Avenger Mutation Engine". This toolkit made it possible for newbies to create a virus.



==>   1995 - Concept First macro virus. This is the first Macro virus that was discovered. Concept infected word documents.



==>   1996 - Boza, Staog Boza was the first virus written to infect Windows 95 machines. Staog was the first virus to infect Linux machines.


==>   1998 - Strange Brew and Back Orifice Strange brew was the first Java virus. Back Orifice was the first known Remote Administration tool that got out in the open. Back Orifice was created by cDc, Cult of the Dead Cow.


==>   1999 - Melissa and Bubbleboy Melissa was a macro virus. Melissa spread in two ways. One of these ways was to spread to other documents. The other was was through the address book in Outlook/Outlook Express, where Melissa would send itself to other e-mail addresses in the Addressbook. Bubbleboy was the first "Automatic" virus. Bubbleboy spread across E-mail and spread without the user had to execute the virus/worm, this was done automatically if the user had the "Preview Pane" activated in Outlook/Outlook Express.


==>    2000 - Love Letter "I Love You" If we say that the Morris worm created mayham and put the Internet in crisis for the first time, then the Love Letter would be the second time. Love Letter spread as a "love letter" sent to the recipient with a Subject line stating "I Love You". If the recipient opened the mail, then a VBS script was activated and the ILOVEYOU virus sent it self to all persons within the addressbook, aswell as it created multiple files on the infected system. I got approx 20 "I Love You" Love Letters the first day. 


==>   2001 - Nimda, Badtrans, Code Red Nimda was one of the more sophisticated worms that got out in the open. Nimda spread across the Internet in a very rapid pace. Nimda spread through e-mails, Windows shares, Webpages. When Nimda struck a user, then Nimda try to do the following. Spread to more users through E-mail, Spread to the shares the user had, try to hack IIS 4/5 servers with a bunch of different vulnerabilities. And last but not least try to infiltrate IIS 4.0/5.0 system which was infected by CodeRed II.


==>   2002 - Klez, Yaha, Bugbear Klez was the biggest virus under 2002. According to Sophos this was infected on 25 % of the systems which was virusinfected during 2002. The 3 other largest viruses under 2002 was Klez, Bugbear aswell as Badtrans. 


==>   2003 - Blaster, Sobig-F, Slammer Blaster spread across a RPC DCOM vulnerability in Windows. It took approx 3 months after the vulnerability was patched by Windows before Blaster appeared on the Internet. Sobig-F also topped the lists over the most spread viruses during 2003. Slammer was another worm that spread automaticall through a vulnerability in MSSQL. 2004 - Netsky, Mydoom, Bagle And the rest is history.

  "NeVeR PoSpOnE A Joy In YoUr LiFe"

note about the father............

પિતાનું આપણાં જીવનમાં કેટલું મહત્વ?

માતા ઘરનું માંગલ્ય હોય છે, તો પિતા ઘર નું અસ્તિત્વ હોય છે. પણ ઘરના આ અસ્તિત્વને આપણે ક્યારેય
સમજવાનો પ્રયત્ન કર્યો છે ખરો ? પિતાનું મહત્વ હોવા છતાં પણ તેના વિષે વધુ લખવામાં નથી આવતું કે
નથી બોલવા માં આવતું.

કોઈપણ વ્યાખ્યાનકાર માતા વિષે બોલ્યા કરે છે, સંત મહાત્માઓ પણ માતાના મહત્વ વિશેજ વધારે કહે છે,
દેવ-દેવીઓએ પણ માતાના જ ગુણગાન ગયા છે. લેખકો-કવિઓ એ પણ માતાના ખુબ વખાણ કર્યાં છે. સારી
વસ્તુ ને માતાની જ ઉપમા આપવામાં આવે છે.

પણ ક્યાય પિતા વિષે બોલાતું નથી. કેટલાક લોકોએ પિતાની કલ્પના ને કલમની ભાષામાં મૂકી છે પણ તે ઉગ્ર, વ્યસની અને મારઝૂડ કરનારા જ હોયછે. આવા પિતાઓ સમાજમાં એકાદ-બે ટકા હશેજ પણ સારા પિતાઓ વિષે શું લખાયું છે ?

માતા પાસે આંસુનો દરિયો હોય છે પણ પિતા પાસે સંયમની દીવાલ હોય છે. માતા રડીને છૂટી થઇ જાય છે પણ સાંત્વન આપવાનું કામ તો પિતાએજ કરવું પડે છે. અને રડવા કરતા સાંત્વન આપવામાં વધુ મહેનત કરવી પડે છે કારણકે દીવા કરતા દીવી વધારે ગરમ હોય છેને ! પણ શ્રેય તો હમેશા દીવાનેજ મળે છે.

રોજ આપણને સગવડ કરી આપનારી માતા યાદ રહે છે. પણ જીવનની આજીવિકાની વ્યવસ્થા કરનારા
પિતાને આપણે કેટલી સહજતા થી ભૂલી જઈએ છીએ ?

બધાની સામે મોકળા મને માતા રડી શકે છે પણ રાત્રે તકીયામાં મોઢું છુપાવીને ડુસકા ભરે છે તે પિતા હોય છે. માતા રડે છે પણ પિતાને તો રડી પણ શકાતું નથી. પોતાના પિતા મૃત્યુ પામે છતાં આપણાં પિતા રડી શકતા નથી, કારણકે નાના ભાઈ બહેનો ને સાચવવાના હોયછે, પોતાની માતા મૃત્યુ પામેતોપણ પિતા રડી શકતા નથી.
કારણકે બહેન ને આધાર આપવાનો હોય છે. પત્ની અડધે રસ્તે સાથ છોડી ને જતી રહે તો બાળકોના આંસુ લૂછવાનું કામ પણ પિતા એજ કરવાનું હોય છે.

જીજાબાઇ એ શિવાજી ને ઘડ્યા એમ ચોક્કસ પણે કહેવું જોઈએ પણ તે સમયે શાહજી રાજાએ કરેલી મહેનત
ને પણ ધ્યાનમાં લેવી જોઈએ.

દેવકી-યશોદા ના કાર્યની પ્રશંશા અવશ્ય કરીએ પણ નદીના પુરમાંથી મધરાતે માથા ઉપર બાળકને સુરક્ષિત પણે
લઇ જનારા વાસુદેવને પણ મહત્વ આપીએ. રામ એ કૌશલ્યાના પુત્ર અવશ્ય છે પણ પુત્ર વિયોગથી તરફડીને મૃત્યુ પામ્યા તે પિતા દશરથ હતા.

પિતાના ઠેકઠેકાણે સંધાયેલા જોડા જોઈએ તો તેમનો પ્રેમ નજરે ચડે. તેમનું ફાટેલું ગંજી જોઈએ તો સમજાય કે
” આપણાંનસીબના કાણા તેના ગંજીમાં પડ્યા છે ”. તેમનો દાઢી વધેલો ચહેરો તેમની કરકસર દેખાડે છે. દીકરા દીકરી નેનવા જીન્સ લઇ આપશે પણ પોતે તો જુનો લેંઘોજ વાપરશે. સંતાનો ૧૦૦/૨૦૦ રૂપિયા પાર્લર કે સલુન માં જઈને બીલ કરશે પણ તેમનાજ ઘરના પિતા દાઢીનો સાબુ ખલાશ થઇ ગયો હશે તો ન્હાવાના સાબુથી દાઢી કરી લેશે. ઘણીવાર તો ખાલી પાણી લગાડી નેજ દાઢી કરી લેતાં હોય છે.

પિતા માંદા પડે ત્યારે તરતજ દવાખાને જતા નથી. તે માંદગીથી ડરતા નથી પણ જો ડોક્ટર એકાદ મહિનો આરામ કરવાનું કહી દેશે તો શું કરવું તેનો ડર લાગે છે. કારણકે દીકરીના લગ્ન અને દીકરાનું શિક્ષણ બાકી હોય છે. ઘરમાં આવકનું બીજું કોઈપણ સાધન હોતું નથી.

પહોચ હોય કે નહોય પણ દીકરાને એન્જીનીયરીંગ કે મેડીકલમાં પ્રવેશ અપાવે છે. ખેંચ ભોગવીને પણ બાળક
ને નિયમિત હોસ્ટેલમાં પૈસા મોકલેછે, પણ કેટલાક દીકરાઓ જે તારીખે પૈસા મળે તેજ તારીખે પરમીટરૂમ માં
પાર્ટીઓ આપે છે અને જે પિતાએ પૈસા મોકલ્યા હોય તેનીજ મજાક ઉડાડે છે.

પિતા ઘરનું અસ્તિત્વ હોય છે. જે ઘરમાં પિતા હોય છે,તે ઘર તરફ કોઈપણ ઉંચી આંખ કરીને જોઈ શકતું નથી. કારણકે ઘરના કર્તાહર્તા જીવંત છે. જો તેઓ કંઈપણ કરતા ન હોય તોપણ મહત્વના કર્તાહર્તા તરીકેના પદ ઉપર હોય છે. અને ઘરના કામ જુવે છે, સંભાળે છે.

માતા હોવી અથવા તો માતા હોવાના સત્યને પિતાને લીધેજ અર્થ મળે છે એટલેકે પિતા હોયતોજ માતાનું અસ્તિત્વ શક્ય હોય છે. કોઈપણ પરીક્ષા નું પરિણામ આવે ત્યારે માતાજ સહુથી નજીકની લાગે કારણકે બાજુમાં લે છે,
વખાણ કરે છે, આશિષ આપે છે, પણ ગુપચુપ જઈને પેંડા પડીકા લાવનારા પિતા કોઈના ધ્યાનમાં રહેતા નથી.

બાળક આવવાનું હોય તેવી સુવાવડી સ્ત્રીનું ખુબ મહત્વ હોય છે પણ હોસ્પીટલની લોબીમાં અસ્વસ્થ થઈને
આમ થી તેમ આંટા મારનારા એ આવનારા બાળકના પિતાની કોઈ નોંધ લેતું નથી.

દાઝી ગયા, ઠેશ લાગી કે માર વાગ્યો કે તરતજ “ઓં માં” આ શબ્દો મોઢા માંથી બ્હાર પડેછે પણ રસ્તો
ઓળંગતા એકાદ ટ્રક નજીક આવીને જોરથી બ્રેક મારેતો “બાપ રે” આજ શબ્દ બ્હાર પડે છે. નાના સંકટો
માટે ચાલે પણ મોટી સમસ્યાઓ ના વાદ્ળો ઘેરાય ત્યારે પિતાજ યાદ આવે.

કોઈપણ સારા પ્રસંગે ઘરની દરેક વ્યક્તિ જતી હોય છે,પણ મરણ ના પ્રસંગે પિતાએજ જવું પડે છે.

પિતા શ્રીમંત સાસરું ધરાવતી દીકરીને ત્યાં બહુ જશે નહિ પણ દીકરી ગરીબ ઘરમાં આપી હશે તો ભલે ઉભા ઉભા ખબર કાઢવા જવું પડે, તે ચોક્કસ દીકરીના ઘરના ચક્કર કાપશે.

યુવાન દીકરો ઘરે મોડો આવે ત્યારે પિતાજ તેની રાહ જોઇને મધરાત સુધી ઉજાગરો કરતા હોય છે.

દીકરા ની નોકરી માટે સાહેબ સામે લાચાર થનારા પિતા, દીકરીને પરણાવવા માટે ઠેક ઠેકાણે મુરતિયા જોવા ઉંબરા ઘસતા પિતા, ઘરના લોકો માટે પોતાની વ્યથા અને જરૂરતને કોરાણે મૂકી દેતા પિતા કેટલા ગ્રેટ હોય છે ખરુંને ?

પિતાનું મહત્વ કોને સમજાય છે ?

બાળપણમાંજ જો પિતા ગુજરી જાય તો અનેક જવાબદારીઓ ખુબ નાની ઉમરમાં સંભાળવી પડે છે. તેને એકએક વસ્તુ માટે તરસવું પડે છે. પિતાને ખરા અર્થમાં સમજી શકે તો તે છે ઘર ની દીકરી! સાસરે ગયેલી કે ઘરથી દુર રહેતી દીકરી પિતા સાથે ફોનમાં વાત કરે ત્યારે પિતાનો બદલાયેલો અવાજ એક ક્ષણમાં ઓળખી જાય છે. ......

know the ip address ....of E-mail sender.......


  • How to find the IP address of the email sender in Gmail, Yahoo mail, Hotmail, AOL, Outlook Express, etc.
  • share on facebook share on twitter
  • Home > Info Section > General
  • Tags: emailhowtoip addressgmailyahoohotmail,outlookaol
  • When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender.
  • Note that this will not work if the sender uses anonymous proxy servers.
  • Also, note that if you receive an email sent from a Gmail account through the web browser, you may not be able to find the real IP address because Google hides the real IP address of the sender. However, if someone sends you a mail from his/her Gmail account using a client like Thunderbird, Outlook or Apple Mail, you can find the originating IP address.
  • Lets begin this. First of all, the IP address is generally found in the headers enclosed beween square brackets, for instance, [129.130.1.1]
  • finding IP address in Gmail
  • finding IP address in Yahoo! Mail
  • finding IP address in Hotmail
  • finding IP address in AOL
  • finding IP address in Outlook/Outlook Express
  • Finding IP address in Gmail
  • Log into your Gmail account with your username and password.
  • Open the mail.
  • To display the email headers,
    • Click on the inverted triangle beside Reply. Select Show Orginal.
  • You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 5.
  • Look for Received: from followed by the IP address between square brackets [ ].
    Received: from [69.138.30.1] by web31804.mail.mud.yahoo.com
    
  • If you find more than one Received: from patterns, select the last one.
  • Track the IP address of the sender
  • Finding IP address in Yahoo! Mail
  • Log into your Yahoo! mail with your username and password.
  • Click on Inbox or whichever folder you have stored your mail.
  • Click on the Subject of the email you want to track and right-click. You should get a menu like this.
    Yahoo! headers
  • You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to the next step.
  • Look for Received: from followed by the IP address between square brackets [ ].
    That should most likely be the IP address of the sender.
    If there are many instances of Received: from with the IP address, select the IP address in thelast pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.
  • Track the IP address of the sender
  • Finding IP address in Hotmail
  • Hotmail has been integrated with Windows Live, or vice-versa. And the format has changed. Here is how you find the IP address of the sender.
  • Log into your Hotmail/Windows Live account with your username and password.
  • Click on the Inbox link on the left.
  • Under the column that says "Sort by", find the email that you want to track and right-click on it. You should get a menu that has something like Mark as readMark as unread, and so on. The last option in the menu should be View message source. Select it.
    headers hotmail
  • You should see the email headers now.
  • You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to step 6.
  • If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
  • If that doesn't work, look for Received: from followed by IP address within square brackets[].
  • * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
  • Track the IP address of the sender
  • Finding IP address in AOL
  • Log into your AOL Mail AIM account with your username and password.
  • Open the email that you want to track.
  • On the top row, click on Action and in the drop-down menu, select View Message Source
    headers aol
  • It opens a new page with the headers. Once you have the headers, look for the IP address that follows X-AOL-IP:. That should be the IP address of the sender.
  • Track that IP address of the sender
  • IP Address Detection Script
  • I wrote a Perl script to automate this task for you. All you have to do is select your email service and copy your email headers in the box below