* *

Wednesday, June 17, 2009

Top 10 IT Health Risks And How To Combat Them

Everybody seems to understand that labourers (involved in physical work) can have serious back and neck problems from their strenuous work. But do you know that even the so-called sophisticated IT workforce can also face serious health risks??? Based on anecdotal evidence gathered in various workplaces, here are the top ailments people in a typical IT office may face…

1. When the only body part you move in your job is your “mouse finger”, you MUST take fitness into your own hands. Do you have to train for a marathon to lose some weight? Not at all, according to Dr. James Levine of the Mayo Clinic. He found that the time spent sitting was more likely to correlate with weight gain than the lack of vigorous exercise. You can keep slim, according to Levine, by walking slowly (about 0.7 mph) two to three hours a day. Although few of us can stroll around the neighborhood that long, several companies have developed workstations with treadmills attached so you can pseudo-walk while you check your e-mail or debug code.

2. A much more serious hazard of office work is not just weight gain but a more dangerous “seated immobility thromboembolism” (SIT). This problem occurs when blood-clots form in the legs (deep vein thrombosis) or lungs (pulmonary embolism) in people who spend a long time sitting. People may develop these clots while on a long trip, if they don't get out of the car or stroll around in the plane's cabin a bit. CNET noted the risk of deep vein thrombosis increasing back in this 2003 article. More recently, results of a New Zealand study suggested that a sedentary job may double the risk of developing clots in the legs or, even more dangerous, clots in the lungs.

3. From the flicker of fluorescent lights to the hunched-up debugging posture, the conditions of your cubicle conspire to cause headaches. Taking medicines like Tylenol or Ibuprofen several times a week can backfire by making your pain more tenacious. If you get in a pattern of frequent headaches, DON’T IGNORE IT. Instead, see a doctor as soon as possible to get out of the rut. You may have tension headaches, which can be treated with massage or stretches to help relax your muscles. Migraine is another possibility. Even if you don't have the visual disturbances (auras) that are the hallmarks of a "classic" migraine, you may have a common migraine. The good news is that there are many medications you can try to treat and prevent migraines. Migraines can affect your mood, your threshold of pain, and perhaps even your risk of stroke!

4. Do you nod off frequently at your desk and perhaps even have brief dreams? These episodes, called microsleeps, may indicate that you're sleep deprived. It's natural for the human body to crave for a short siesta after lunch, but excessive daytime sleepiness needs to be treated. Most adults need seven to eight hours of sleep a night, so simply going to bed earlier may be all you need to overcome this. If you're in the bed long enough but are still tired, consider your environment (a snoring spouse, a hot or cold room, etc.). Crying babies and mobiles can jar you out of sleep and seriously disrupt normal sleep cycles. Sleep apnea is a fairly common problem but sounds quite scary: People with the disorder briefly stop breathing, often hundreds of times a night, which disrupts normal sleep phases. Physical abnormalities that cause excessive snoring can also lead to poor sleep. So check with your doctor, who may refer you to an ear, nose, and throat specialist or sleep clinic to sort out your sleep problems.

5. Although your hands and wrists may be sore from intensive typing, there's not a whole lot of evidence to link keyboard use to carpal tunnel syndrome (CTS). A 2007 study of men who worked at video display terminals found an association of CTS with high body mass index (BMI) and job seniority - but not with specific tasks related to computer usage. Still, many conditions other than CTS can make your hands and wrists hurt, so it’s wise to check with your doctor to try to get some relief. Severe CTS is usually treated with surgery, but many other conditions that cause hand pain don't require such drastic treatment. Tendonitis, for example, is a fairly common cause of hand pain that may be treated with anti-inflammatory drugs (such as ibuprofen or naproxen) and splinting.

6. How is it that sitting on your chair and looking at a monitor can make your back, neck, and shoulder muscles feel like you've spent eight hours painting a ceiling? Your tense posture may be part of the problem. Improving the ergonomics of your work area may help take the stress off your upper body. Try not to transfer the tension in your mind to your muscles and take a break now and then to unclench.

7. The dry air of a typical office certainly doesn't help your immune systems ward off your coworkers' coughs, but hey, at least you're not sitting in a daycare center. There are hundreds of cold viruses, plus several influenza viruses each year. What can you do to stay healthy and help keep your coworkers healthy, too?
• Stay home for a change.
• Clean your keyboard, mouse and desk.
• Wash your hands.
• Keep hydrated.
• No replicable scientific studies have proven that vitamin C, Echinacea, or zinc will prevent or shorten colds, but many people swear by them.

As far as gastrointestinal illness goes, remember that the most common transmission route is fecal-oral. So, for God's sake, wash your hands after going to the restroom. Also, consider the effective, but possibly neurotic, act of opening the door with a paper towel when you leave.

8. Watching a backlit screen two feet away for four hours at a time isn’t really natural, is it? So it’s no surprise that people in IT complain about irritated eyes and declining visual acuity. Here are some suggestions that may help:
• Remember to blink. Yes, blinking is pretty much automatic, but some people really keep their eyes peeled when they’re engaged in work. Their eyes dry out, which is extra hard on people who wear contact lenses. A few drops of artificial tears can make your tired eyes much more comfortable.
• Change your focus. Look out the window or down the hallway -- anything to get away from your two-foot focus. There are even programs designed to remind you to give your eyes a break.
• Get an eye exam. Your doctor may have more tips to help you feel more comfortable as you work. And everyone needs to be screened for glaucoma and other eye diseases anyway.

9. If your job requires you to lift, lower, and/or carry equipment around, you might find yourself battling back pain. Maybe you spend your days installing workstations or inserting/removing computers from racks - and if you're used to the work and know the right way to protect yourself in the process, you might not have any problems at all. But if it's an occasional task, or if you don't follow some basic precautions, you could wind up with a painful injury or chronic back trouble. Despite the fact that best practices for lifting are largely common sense, people often ignore them - and often wish they hadn't. Here are some basic recommendations for protecting your back:
• Examine an object before you try to pick it up to determine how awkward and heavy it is. Tip it a little to test its weight and make sure you have a comfortable, secure way to grip it.
• If you think an object might be too heavy for you move, find an alternative: Get someone to help you, unpack or dismantle the object and move it in pieces, use a dolly, etc.
• Don't extend your arms when you pick up or lower a heavy object. That puts a big strain on your back.
• Watch your footing -- the last thing you want to do is stumble or trip while carrying something heavy.
• Lift correctly. Keep your straight back, kneel to pick up the object, and then lift using your leg strength, not your back.

10. If you work on a lot of systems, you're no stranger to dust. Even a well-maintained machine in a clean, ventilated area is going to pull in plenty of it. It could spell big-time allergy, respiratory, and sinus woes. Among the suggestions from veteran dust-sensitive IT pros: Put on a dust mask before opening a case (or crawling around under a grubby workstation). And if you plan to use compressed air to blow some of the dust out of the case, definitely mask up first. You might also want to consider vacuuming that dust out rather than blowing it around - but you should use an ESD (electrostatic discharge) safe vacuum designed for electronics.

Create your own Youtube-type site for free!

Hey everyone at AGeniusBlog.com

I was browsing the web for youtube scripts (to make my own youtube-like site)
Problem was that these scripts didn’t work on most hosts, because It needed this database installed into the server.
A month later (now) I found a great website which allows you to make this for free, no uploading scripts required! This is called Fliggo

Fliggo allows you to build your own video sharing website like Youtube.
Fliggo is extremely easy to use, comes with a host of features and most importantly is free.
You can use Fliggo to create video blogs, private video networks or a niche video site - the choice is yours.
The service is beautifully designed and Fliggo allows you to customize the look and feel of your video site so it can be beautiful too!

So go on and make your site now! It’s free, fun and easy to use!

AGeniusBlog.com

Getting 1 hour EXTRA sleep can save from heart attacks!

“We found that people who on average slept longer were at reduced risk of developing new coronary artery calcifications over five years,” said Diane Lauderdale of the University of Chicago Medical Center, whose study appears in the Journal of the American Medical Association. “It was surprisingly strong.” Calcium deposits in the coronary arteries are considered a precursor of future heart disease. Unlike other studies looking at the risks of getting too little sleep, which use people’s own estimates of their sleep patterns, Lauderdale’s team set out to measure actual sleep patterns.

They fitted 495 people aged 35 to 47 with sophisticated wrist bands that tracked subtle body movements. Information from these recorders was fed into a computer program that was able to detect actual sleep patterns. The team used special computed tomography scans (i.e. CT scans) to assess the buildup of calcium inside heart arteries, performing one scan at the start of the study and one five years later. After accounting for other differences such as age, gender, race, education, smoking and risk for sleep apnea, the team found sleep duration appeared to play a significant role in the development of coronary artery calcification. About 12% of the people in the study developed artery calcification during the five-year study period. Among those who had slept less than five hours a night, 27% had developed artery calcification. That dropped to 11% among those who slept five to seven hours, and to 6% among those who slept more than seven hours a night.

Lauderdale said it is not clear why this difference occurred in people who slept less, but they had some theories. Because blood pressure tends to fall off during sleep, it could be that people who slept longer had lower blood pressure over a 24-hour period. Or, it could be related to reduced exposure to the stress hormone cortisol, which is decreased during sleep.

Make Mozilla Firefox Look Like Google Chrome

Google’s new web browser Chrome provides a very clean theme and it is very simple to use. If you want the same theme and interface in Mozilla Firefox then follow the tutorial.

For those you are using Windows XP, follow this tutorial:-

1. Download these add-ons and install them:-

Chrome Package, Download Statusbar, autoHideStatusbar, Hide Menubar, Google Toolbar 5, Locationbar2, Prism

2. Close Firefox and goto “%AppData%\Mozilla\Firefox\Profiles\xxxxxxxx.default\extensions\{3112ca9c-de6d-4884-a869-9855de68056c}\chrome” (xxxxxxxx is a random string of characters. Just type “%appdata%” in the run dialog box and follow the path)

3. Now replace “google-toolbar.jar” with this file.

That’s it now your Mozilla Firefox will look exactly like Google Chrome.

For those who are using Windows Vista or 7, just download and install only this addon and it will install all the necessary add-ons. You will get the following screenshot after installation:

Top 10 security vulnerabilities of virtualization

There are some common areas where system administrators may be unknowingly undermining security of their computing architecture and thus causing vulnerabilities to possible future attacks. These issues range from improperly secured networks to trusting that technologies such as SSL and VLANs are fool-proof. Here are the top ten issues...

1. Virtualization administrators are not security administrators!
Virtualization administrators aren't security administrators, nor do they always consult or listen to their security administrators. This problem can be mitigated by educating security administrators about the realities of virtualization and also educating the virtualization administrators in the language the security administrators use.

2. The management appliances for virtualization servers are within improperly secured or unsecured networks.

3. Trust SSL.
SSL does not assure fool-prrof security. There is an attack against SSL that is easy to do and takes less than two seconds. Do not assume SSL is secure enough. Unless pre-shared certificates are in use, SSL is at risk. If you must use SSL-based management tools, use the Administrative network for this work where you can trust who is on the network. In addition, use good VPNs to access the administrative network from outside the network.

4. Virtual machines (VMs) are not considered a hostile environment.
VMs within a demilitarized zone (DMZ) or otherwise Internet-facing are a hostile environment, but all VMs are hostile when it comes to virtualization. An attack on one VM should never directly or indirectly lead to the virtualization host.

5. NFS and iSCSI storage networks are not segregated from all other networks.

6. VirtualCenter is placed on the outside of the administrative network.
While VMware ESX is firewalled, VirtualCenter is on the wrong side of the firewall. It should be as protected as the virtualization hosts.

7. Extra service console ports exist.
When attaching a NFS server to ESX, a service console (SC) port is also created. This is a mistake; iSCSI needs service console participation, not ESX. The service console should access the storage network through a router, gateway and preferably a firewall.

8. Service console is placed within the DMZ or hostile environment.

9. Trusting that VLANs will protect the network.
You need very good switching hardware to protect from most of the known VLAN attacks. Also, the use of VLANs introduces data co-mingling over the wire.

10. Not understanding security within the hypervisor.
If you do not understand the security within the hypervisor, you will be hard pressed to define how to secure your virtualization environment.

The bottom line: Security should never be an add-on; it should be part of the design, right from the beginning.

Hybrid solar plant: 24x7 power guaranteed

Israeli energy company AORA wants to prove it doesn’t have to be sunny all the time for a solar power plant to make electricity. To generate round-the-clock electricity, they are combining traditional fuel – such as biomass or diesel – with low-carbon solar power during daylight. AORA is constructing its first hybrid solar power station on a half-acre (0.2 hectare) plot in Israel’s Negev desert, in an attempt to tap into the multi-billion-dollar clean energy market.

The Negev plant, unveiled to the public this week at an energy conference in Israel’s Red Sea resort of Eilat, uses diesel for now. It will be online next month, producing 100 kilowatts – enough energy to power about 40 houses. The module comprises 30 large mirrors reflecting sunlight onto a generator on top of a 90-foot-high tower. It can shift seamlessly between using the sun as fuel and a conventional or another renewable fuel.

How it works?

One of the main hurdles in completing the hybrid power plant, however, was creating a generator that could handle concentrated sunlight that reaches nearly 1,000 degrees Celsius, said AORA’s operations manager, Yuval Susskind.

Aora, therefore, built a special receiver on a tower that’s capable of handling high temperatures. Using concentrated sunlight, air is heated in this receiver and then shot into a combustion chamber, where it expands and powers a turbine, producing electricity. A separate route can bypass the solar receiver and use a secondary fuel to power the turbine when necessary, allowing the power plant to produce non-stop electricity.

The process also creates a by-product of some 170kw of heat, which can be used to heat water for homes or factories. Because each of these units sits on just a half-acre, it can provide electricity in the most remote areas. You can build one outside a village, or have many together in a desert. A 100kw plant using traditional photovoltaic panels, which can have up to 15 per cent efficiency, would need twice the land, AORA said. Its hybrid-solar plant runs at 28 per cent solar efficiency.

10 Innovative Technologies You Need to Know for 2009

From picotech to compressed air energy storage, here are the big ideas that will make headlines next year. (Published by the Popular Mechanics; also in their December 2008 print edition)

1. T-Rays
Terahertz radiation, or T-rays, occur at a frequency of around a trillion hertz—between microwaves and infrared on the electromagnetic spectrum. Unlike X-rays, T-rays are nonionizing, so they don’t carry a cancer risk.

2. Hydrogel Tissue Engineering
The science of tissue engineering aims to build or grow replacement bones, vessels and organs. The field’s most promising new research has been with hydrogels—networks of super-absorbent polymer chains that function like scaffolding to support the growth of new tissue.

3. Picotechnology
The frontiers of science have recently progressed from microtechnology (a micrometer is a millionth of a meter) to nanotechnology (a nanometer is a billionth of a meter), but we now may be entering the age of picotech (one trillionth of a meter).

4. HALE (high-altitude long-endurance) UAVs
A recent HALE prototype, dubbed Zephyr, built by British company QinetiQ, flew for a record 82 hours last summer, powered by paper-thin solar panels on its wings that charged lithium-sulfur batteries to keep it aloft at night.

5. Secure Super Grids
Project Hydra (the code name for the Manhattan grid upgrade scheduled to start in 2010) will use American Superconductor’s liquid-nitrogen-cooled Secure Super Grid cables, which can transfer 10 times more power than conventional copper cable, with lower impedance.

6. Autostereoscopy
It’s 3D without the glasses (“spectacular without the spectacles,” as manufacturer Philips puts it).

7. Collaborative Search
People who work on group projects often duplicate each other’s Web-search efforts. Collaborative search lets groups of people combine forces and search more efficiently.

8. Low Rolling-Resistance Tires
Previously found mainly on hybrids, these tires have become standard equipment on many new cars to boost EPA fuel- economy ratings.

9. Energy Scavenging
According to a February report by the Department of Energy, newly discovered thermoelectric materials are 300 percent more efficient than first-generation versions.

10. Compressed-Air Energy Storage
To make wind power useful when the wind isn’t blowing, power companies need utility-scale energy storage—but batteries that big aren’t yet practical. One option is to use wind power to compress air for storage in tanks or caverns underground, then use the air to run a generator.

Top 10 Scientific Breakthroughs of 2008

1. Cellular Reprogramming: The top honours in this list has been given to a research that produced a "made-to-order" cell lines by reprogramming cells from ill patients - a method known as "Cellular Reprogramming." It opened a new field of biology almost overnight and holds out hope of life-saving medical advances.

2. Exoplanets: For the first time in 2008, astronomers directly observed planets orbiting other stars, using special telescope techniques to distinguish the planet's faint light from the star's bright glare.

3. Expanding the catalogue of cancer genes: By sequencing genes from various cancer cells, including pancreatic cancer & glioblastoma - two of the deadliest cancers, researchers turned up dozens of mutations that remove the brakes on cell division and send the cell down the path to cancer.

4. New mystery materials: Researchers created a stir in 2008 by discovering a whole second family of high-temperature superconductors consisting of iron compounds instead of copper-and-oxygen compounds.

5. Watching proteins at work: Biochemists encounters major surprises in 2008 as they watched proteins bind to their targets, switch a cell's metabolic state and contribute to a tissue's properties.

6. Renewable energy on demand: Researchers found a promising new tool for storing excess electricity, generated from part-time sources like wind & solar power, in the form of cobalt-phosphorus catalyst.

7. The video embryo: Researchers observed, in unprecedented details, the dance of cells in a developing embryo, recording and analyzing movies that trace the movements of roughly 16,000 cells that make up the zebrafish embryo by the end of its first day of development.

8. "Good" fat, illuminated: In a study that may offer new approaches to treating obesity, scientists discovered that they could morph "good" brown fat (which burns "bad" white fat to generate heat for the body) into muscle and vice versa.

9. Calculating weight of the world: Physicists now have the calculations handy to show that the standard model, which describes most of the visible universe's particles and their interactions, accurately predicts how much mass the protons and neutrons have.

10. Faster & cheaper genome sequencing: Researchers reported numorous genome sequences this year - from w0olly mammoths to human cancer patients - aided by a variety of sequencing technologies that are much speedier & cheaper than the ones used to sequence the first human genome.

Stop threats to network security by USB storage devices

The vast majority of security breaches are perpetrated even by "trusted" employees... Hence it is extremely important to take a hard look at internal security of your company's network. One of the single biggest internal threats to network security is the use of USB storage devices.

USB storage devices can be used to steal large quantities of data from your network. Anything a user has access to can be copied to a USB storage device. The risk of users copying data to removable storage devices has always been a problem, but USB devices present some unique challenges. For example, a few years ago, if a user wanted to steal data, his or her primary option for doing so was to use a floppy disk. Floppy disks are slow and have a very limited capacity, severely limiting the quantity of data a user could steal. In contrast, USB storage devices are much faster and can store vast quantities of data & are tiny in size. Even a simple USB flash drive (in the form of a keychain) can accommodate at least 4 GB of data. USB hard drives pose even more threat as they are pocket-sized and can store huge data. Furthermore, USB flash drives are cheap and easy to conceal.

Another problem with USB storage devices is they can also be used to upload applications. I have seen several instances in my work at Capgemini where a user has copied an installation disk to a USB flash drive and then used the drive to install the application on his or her PC at work. When a user installs an unauthorized application, it has the potential to cause all sorts of problems. It can also invite virus or malware. Likewise, the application may interfere with legitimate applications or with Windows' stability, resulting in unnecessary support calls.

One often-overlooked problem with unauthorized applications is companies are required by law to purchase software licenses for any application in use. If a user installs an unauthorized application, technically the company is required to have a license for that application - even if it did not know about the application!

Fortunately, there are a number of things you can do to combat the problems generated by USB storage devices. Though none of these solutions are fool-proof, but they act as a deterrent to using them and thus prove an effective measure to control their menace.

Method 1: Ghetto engineering

One of the oldest and most effective techniques for controlling the use of USB storage devices involves pumping the workstation's USB ports full of epoxy. This makes it physically impossible for a user to plug a USB device into his or her workstation.

Although this approach is extremely effective, there are a couple of problems with it. In many organizations, workstations are not equipped with CD or DVD drives. This helps to save costs, and reduces the chances of users installing unauthorized software. Often, though, help desk staff members may need to use a CD or DVD to reinstall operating system or fix a problem with an application. That being the case, it is common for the help desk staff to use a portable CD or DVD drive that connects to the machine's USB port. It the ports are plugged up, they simply can't use the drives and this may affect their services too.

Though the helpdesk staff still has the option of temporarily installing an IDE-based drive, it is quite time consuming, since it involves opening the PC's case. It is usually much more efficient to plug a portable drive into a USB port. One of the biggest arguments against plugging up a computer's USB ports with epoxy is that doing so usually voids the system's warranty.

Method 2: BIOS settings

Another common technique for preventing use of USB storage devices is to disable the workstation's USB ports at the BIOS level. This technique isn't nearly as drastic as pumping the ports full of epoxy, because a support technician has the option of re-enabling the ports should they be needed.

This technique works relatively well, but it has 2 major drawbacks. First, not all systems offer the option of disabling USB ports. Second, disabling USB ports is an all-or-nothing proposition. If you disable a system's USB ports, you will prevent unauthorized use of USB storage devices, but at the same time you will also prevent them from using legitimate USB-based keyboards, mice or printers.

GPS devices for everyone's needs

Everyone can use a little direction in life. That's why GPS receivers make such excellent gifts. Whether as a Father's Day gift or a treat for a recent graduate all roaring to roam around, GPS receivers can eliminate much of the guesswork and uncertainty in driving around unfamiliar areas. Their pinpoint accuracy ensures smooth, comfortable travels, and their vast databases of important milestones, landmarks, and worthwhile attractions can truly enhance the driving experience. But one needs to be careful while shopping for GPS devices. Purchasing a GPS receiver with confidence requires two things: careful attention to detail and an understanding that much of what differentiates one model from another is just window dressing.

The core functionality of most GPS receivers is essentially the same, regardless of brand. They utilize the same global positioning satellites to ascertain a user's location. From there, each brand has its own set of maps and navigational software. It can be difficult to discern what differences, if any, exist between the various manufacturers. Because of this, most GPS receiver models are distinguished by cosmetic features or bonus functionality that doesn't always play a direct role in navigation. Simply put, a GPS receiver from a reputable brand like Garmin, Magellan or TomTom will get a driver where they're going. The question is whether it will get them there cheaply, or in style with a premium.

High-end GPS receivers are packed with a lot of features intended to appeal to drivers and require more than just simple navigation. Typically outfitted with larger LCD displays and deeper reservoirs of information to draw from, high-end receivers can cost anywhere from $400 to $500. The TomTom GO 740 LIVE ($499) has a widescreen, 4.3-inch LCD display and an array of advanced options intended to make interacting with the device easier. Voice-address entry lets drivers speak their intended destinations, so they may eschew the touchscreen keyboard, keeping their eyes on the road and hands on the wheel. Bluetooth wireless capabilities, common on more expensive receivers, let the GPS act as a "hands-free" speakerphone with compatible cellphones. TomTom's LIVE subscription service ($9.95 a month) also gives access to real-time traffic and gas station fuel price updates, where available.

Garmin's nüvi 1490T ($499) features 5-inch LCD display. The "T" in the model name indicates that the receiver is equipped to handle real-time traffic updates, which are free for the lifetime of the device (instead of requiring a separate subscription service). It has also introduced a new navigational mode called "ecoRoutes," which calculates the most fuel-efficient route for saving gas, money and the environment.

The Garmin nüvi 1200 ($199) is an uncomplicated, affordable receiver with a 3.5-inch LCD display and "text-to-speech" functionality. This means that, instead of just announcing when to turn, the GPS can recite the specific names of streets from the map. Consumers probably consider such a feature to be standard on GPS receivers, but not all receivers are capable of reading street names aloud. If it's something you're interested in, be sure to check the fine print in the specifications. The TomTom ONE 140 ($175) does not utilize text-to-speech and costs about $25 less than the Garmin 1200. It also costs less than its companion model, the TomTom ONE 140-S ($199). The only difference between the two is that the "S" model has text-to-speech feature.

It's still possible to get some fancy features on the low end. The Magellan RoadMate 1340 ($179) is very affordable, thanks to its compact, 3.5-inch display. Nevertheless, it can do text-to-speech, and even includes information from AAA's TourBook, letting drivers check up on nearby restaurants and locate appealing attractions along their intended route.

Best Way to Uninstall

Windows Add/Remove Programs is fine, as far as it goes. Problem is, it doesn’t go far enough. It often leaves traces of uninstalled programs in various places on your hard drive, meaning you’ll accumulate a lot of junk over time.

This freeware utility does a better job of completely eliminating all traces of the software you want to uninstall. But it does even more:

* Analyze an installation so it can be completely uninstalled (also supports reboots of the computer as the process is split into two: Before and after the installation)
* Find and delete temporary files
* Delete entries from programs that are no longer installed
* Hide Windows Updates
* Hide entries from the list that you are never going to uninstall (drivers etc.) making the list smaller and therefore easier to manage.
* Show more information than available through add/remove
* Automatically find entries from programs that are most likely already uninstalled
* Automatically find entries that are considered “crap-ware”
* (Of course) search the list of installed software

Use mobile broadband for portability and reliability

Yesterday, when I was using my internet, I was suddenly disconnected from the internet connection. I checked for all the possible reasons and couldn’t find anything near me. So I called my service provider to know if there is any problem with them and they informed me that the internet cables are destroyed beneath the earth due to some reasons and it took 1 day for them to set right everything.

A few months back, the cables under the sea have been cut due to a ship and hence I couldn’t use my internet for a week and there are many fluctuations and frequent disconnection of my internet connection for 1 month due to that. These are a few instances that tell the problems that we face with the usage of internet connection with cable. I was searching to find some alternative to this solution and I found one, i.e., mobile broadband.


Unlike the big cable that runs all the way from your internet service provider to your home, mobile broadband does require only a USB port on your computer to use the internet. The internet service providers use a dongle for providing this service. The dongle receives signals from the nearby towers [the towers of your internet service provider like Vodafone, Orange etc] and provides internet service to you. This is a wireless internet connection with portability – you can take this from one place to another without any hassle. As long as there is a tower in range, you are able to go on the internet. This is a recent technology and hence there are some concerns with the speeds and coverage limits. GPRS, 3G, WIMAX, LTE, EV-DO are some of the methods of providing you this service. Of all 3G is the latest and widely used in present world.

There are two kinds of packages available for to use the wireless internet. You can either pay for 1 MB or you can pay for 1 month instantly and use it without counting your internet usage every time. There are different plans in them depending on the speeds, downloads etc. Dongles can be bought from direct service providers along with the service. Irish users have got more advantage than others as they have the opportunity to use three E160G services - a real alternative to fixed-line broadband, 3's USB modem offers speeds of up to 3.6MBs per second which means less yawning and table tapping - and more doing. This is one more example to show the advancement in the technology is helping to make the life easier and simple. In no time, these dongle will replace the traditional cables.

Computer Cleaning Tips

Below is a listing of general tips that should be taken when cleaning any of the components or peripherals of a computer as well as tips to help keep a computer clean.

1. Never spray or squirt any type of liquid onto any computer component. If a spray is needed, spray the liquid onto a cloth and then use that cloth to rub down the component.
2. Users can use a vacuum to suck up dirt, dust, or hair around their computer on the outside case and on their keyboards. However, do not use a vacuum for the inside of your computer as it generates a lot of static electricity that can damage the internal components of your computer. If you need to use a vacuum to clean the inside of your computer, use a portable battery powered vacuum designed to do this job.
3. When cleaning a component and/or the computer, turn it off before cleaning.
4. Never get any component inside the computer or any other circuit board damp or wet.
5. Be cautious when using any type of cleaning solvents; some individuals may have allergic reactions to chemicals in cleaning solvents and some solvents can even damage the case. Try to always use water or a highly diluted solvent.
6. When cleaning, be careful not to accidentally adjust any knobs or controls. In addition, when cleaning the back of the computer, if anything is plugged in, make sure not to disconnect any of the plugs.
7. When cleaning fans, especially the smaller fans within a portable computer or laptop it’s suggested that you either hold the fan or place something in-between the fan blades to prevent it from spinning. Spraying compressed air into a fan or cleaning a fan with a vacuum may cause damage to some fans.
8. Never eat or drink around the computer.
9. Limit smoking around the computer.

YouTube in Local Languages

Literally, it might be known as Voustube, Voitubo or Vocetubo, but the world’s most popular video-sharing site introduced local-language sites in nine countries on Tuesday that will all just go by YouTube.

Chad Hurley and Steve Chen, the co-founders of YouTube, which was acquired by Web search leader Google Inc. for $1.65 billion last year, told a news conference here that the nine country sites will eventually feature locally popular content.

YouTube unveiled national sites for Brazil (http://www.youtube.com.br), Britain (http://youtube.co.uk), France (youtube.fr), Ireland (youtube.ie), Italy (http://it.youtube.com), Japan (youtube.jp), the Netherlands (youtube.nl), Poland (youtube.pl) and Spain (youtube.es).

Integrate Google Talk With Firefox and Opera

Now you can use Google Talk in the panel / sidebar
while browsing with your favourite browser.

You dont need to have the GTalk client installed at all.

1. Go to Bookmarks —> Organize Bookmarks
2. Click New Bookmark.
3. Paste the following URL in the address (URL location) field.
http://talkgadget.google.com/talkgadget/client

4. Enter any name for the bookmark like GTalk.
5. Select the option for adding in sidebar or panel.
6. Click OK and you are done.

Google Talk talkgadget requires Adobe Flash Player 8 or above.

Works in both Opera & Firefox.

Restore Taskmanager, Regedit, Folder Options disabled by virus

Let’s face it. All of us have been infected by virus before. Even if you have anti-virus installed, you can still be infected by a new or custom virus that is not recognized by your anti-virus. Sometimes after removing the virus completely from our system, you’ll face new problems such as you can no longer bring up Windows Task Manager from CTRL+ALT+DEL. You get the error message saying “Task Manager has been disabled by your administrator”.
Task Manager has been disabled by your administrator

You think that it’s easy to fix this problem by going to Registry Editor but you can’t! You get the error message “Registry editing has been disabled by your administrator”.
Registry editing has been disabled by your administrator

Folder Options and even Show Hidden Files & Folder is disabled! How frustrating! Don’t worry, here’s how to restore your Windows Task Manager, Registry Editor, Folder Options and Show hidden files & folders.

This problem is most commonly caused by a virus called “Brontok”. Brontok virus will make some changes to the system restrictions in order to hide itself from easy detection and also from easy cleaning.

Here’s a free tool called Remove Restrictions Tool (RRT) which is able to re-enables all what the virus had previously disabled, and gives you back the control over your own computer.
Restore windows restrictions

Remove Restrictions Tool is able to re-enable:
- Registry Tools (regedit)
- Ctrl+Alt+Del
- Folder Options
- Show Hidden Files

Small and easy to use. Make sure you boot in to Safe Mode to use Remove Restrictions Tool (RRT). Just click on the buttons and it’ll do it’s job.