Sunday, October 28, 2012

How to allow user to Run only specific Application in Windows 7

If you are a System Administrator of a Company and as your Company standard user can run only specified Application which is authorized, then your task is How to allow user to run Only Specified Application such as MS word , Internet Explorer , MS Excel and Notepad etc.

Please follow the following step to do this :


  • Open Group Policy Editor by typing "gpedit" in start menu's search bar as same as displaying in following image.
  • Following screen is appeared.

  • In the above screen select the option in following way..
    • Select User Configuration
    • Select Administrative Templates
    • Select System 
  • In System option select "Run only specified Windows Application" as shown in following screen.

  • Now in opened screen select "Enabled" Radio buttion and click on "Show" button as displaying in following image.



  • Now new screen is displayed in that write the list of application's .exe file that you want to access to the user.

  • Some list of exe file name associated with application is as follow :
    • MS Word                 -      winword.exe
    • MS Excel                 -      excel.exe
    • Notepad                  -      notepad.exe
    • Internet Explorer   -      iexplore.exe
    • Calculator               -       calc.exe
    • Visual Studio         -       devenv.exe
  • After specify the list of exe file in the above screen click on OK button and then Apply button and then OK button.
  • Now, If user is going to access other than specified application it will give error message as following.

Wednesday, October 3, 2012

Android Code for calling .NET web service

You need to declare 4 variable to call web service method
  • OPERATION_NAME - name of method to call
  • NAMESPACE - namespace
  • SOAP_ACTION - particular methdo of specified namespace
  • URL - URL of your web serivce

Declare above variable as below :
  • String OPERATION_NAME="HelloWorld";
  • String NAMESPACE="www.tempuri.org/";
  • String SOAP_ACTION=NAMESPACE+OPERATION_NAME;
  • String URL="http://your-ip-address/your-application-nm(in .net)/Service.asmx"; ***

Note ***:  in above statement instead your-ip-address you have to write your own local pc ip address. you can find it from command prompt to invoke the ipconfig command. and specify your-application-nm which you specify at the time of making .NET web service.

Code to call HellowWorld method. (Default Method)

try{
   
      SoapObject request = new SoapObject(NAMESPACE,OPERATION_NAME);

      //below statement passes argument to the web method specify in web service.
      request.addProperty("name", "How r u?");   **

      SoapSerializationEnvelope envelope = new SoapSerializationEnvelope(SoapEnvelope.VER11);
      envelope.dotNet=true;
      envelope.setOutputSoapObject(request);
      HttpTransportSE androidHttpTransport = new HttpTransportSE(URL);
      androidHttpTransport.call(SOAP_ACTION, envelope);
      Object result = (Object)envelope.getResponse();
      status=result.toString();
      Toast.makeText(getBaseContext(),status,Toast.LENGTH-LONG).show();
}
catch(Exception e)
{
      Toast.makeText(getBaseContext(), e.toString(), Toast.LENGTH_LONG).show();
}

NOTE ** : in this statement as first argument is as same as the name of the method argument you specified in .net and second argument the value of the argument.


Output :  HelloWorld How r u?
Explanation : HelloWorld from the method itself and second word which we pass from the ** statement.

Tutorial of Android Web Service Application with VB .Net

Hello Friends,

Today I am going to discuss with you that how to make web service in .NET and how to call it from android.

You need following tools to develop application.
  • Microsoft Visual Studio 2008 (to develop web methods)
  • Internet Infomation Service (IIS 6 for Windows XP and IIS 7.5 for Win7) (virtual server)
  • Android SDK (Min API Level-7) (to call web methods)
  • Eclipse HELIOS
  • KSOAP-android-2.5.2 jar file (it's a java class file which your have to include in your code.

Step 1 : You need  Microsoft Visual Studio 2008 to develop web-service method. You can download it from here.

Step 2: You can download IIS 7.5 from here.

Step 3: You can download android SDK from here.

Step 4: You can download Eclipse HELIOS from here.

Step 5: You can download KSOAP 2.5.2 jar file from this link

You have to explicitly add external libraries in your project by following step :

Right click on your project and select properties and click on Java Build Path -> Libries(Tab) -> Add External JARs.. (Button) and specify you KSOAP 2.5.2 file path.

Note : You need Dot Net Framework 3.5 to run IIServer on your local computer. You can externally download and install it from here.

Install all above softwares on your local computer and integrate your eclipse with android SDK.

You can show step to create web method from this link.

Step to call web service from android is mentioned in this link.

Monday, October 1, 2012

How to Create Web Service in Microsoft Visual Studio 2008 in Windows7

Here I am going to explain you how to develop web service in Microsoft Visual Studio 2008.

You need Internet Infomation Server (IIS) 7.5 as virtual server to run the web service.

You can download IIS 7.5 from here.
You need Dot Net Framework 3.5 to install IIS 7.5 You can download it from this link.

Now to configure IIS you have to go in control panel - > Programs and Features -> Turn Windows Features on or off.

Click on  Turn Windows Features on or off.

Now check 2 check box listed below :

  • Internet Information Service
  • Internet Information Service Hostable Web Core
Now Click on OK button and Restart your computer.

Now, You can check whether your web server works properly or not by following step :
  • Open your web browser and type localhost
  • If it successfully show you IIS 7 page then your web service will work properly otherwise something goes wrong.
Now Time to implement web method. To develop web method you need to open Microsoft Visual Studio 2008 in Administrative mode. You can right click on Microsoft Visual Studio 2008 and click on Run as Administrator. It will open IDE of Microsoft Visual Studio in Administrator mode.

Now to develop new web-service follow the following steps :

  1. You have to create new project so that go to File Menu -> New -> Website
  2. Select ASP.NET Web Service in Template.
  3. Now following window will be appear.

    3.  Now select HTTP in Location Option form Drop Down box because our method is resides on server and provide name of your web-service in following format : http://localhost/your-application-name.
    4.  Now select Visual Basic in Language Option because here I am going to explain code in VB,
    5.  Now click on Ok button.
    6.  By Default one method named HelloWorld will be created and it will return HelloWorld while one can invoke it.
    7. Define your own method and specify your logic.
    8. Do not forget write <WebMethod()> _  at every beginning of  method because it defines that this method is web method and called by application. If your not specify <WebMethod()> _  then that method will be used as private/local method.
    9. Now your web method will be define successfully.

You can manually run your web service from browser by written as follow :

http://localhost/your-application-name/Service.asmx


Android Code for calling web service method click on this link

Tuesday, September 25, 2012

How to Fix Write Protected Error...

What is Write Protected error and why it happens?

In the Write Protected error, we can not write or copy any data in to flash/USB drives and even can not format it.
There are many reasons that causes this problem. Here I give share the solution to fix that problem.

Solutions: 

  • Just download this helpful software from here and run it to execute a “low-level format” on the drive. This software is quite handy and may take few attempts to actually remove the error.
  • If that low level format tool does not work, try another one Link.
  • The problem can also be caused by some virus activity so just get it scanned by some updated good anti virus which may solve your problem.
  • BUT if none of the methods listed above solves your problem then your pen drive might have gone corrupted, so just get it replaced.
  • After the low level format, you may need to “Partition the drive“. Dont worry, partitioning a pen drive means allocating it its File System and Cluster Size that was lost after the Low Level Format.

Solution 1 :

  • Run diskmgmt.msc in Run.
  • In the disk management window, select the pen drive, right click on it and click on Format.

Solution 2:

  • Follow the steps in this post and just put the value 0 (zero) in step 5.

Hope any of the methods listed above solves your problem.

How to make your USB as Write Protected

Today when I got some data transferred in my friends pen drive at my rum that made me think that I need to remove Write Protect his pen drive. The drive has about 7 different types of viruses in Pen Drive. It is so irritating to always scan the drive to remove the viruses that also consumes our important time. So I got something to share with you guys “How you can Write Protect your Pen Drive” or “How you can prevent your pen drive from getting infected”.

Things to note before doing this :

  • As the trick will write protect your pen drive, you will not be able to transfer anymore data until you disable it again (works best if you only wish to copy or read something from the drive).
  • If you are not good at editing registry then backup yours registry file.
  • You need Admin rights to work upon the Registry Editor.

Steps to make your drive Write Protected :

  1. Open Registry Editor by typing regedit in Run dialog.
  2. Navigate to the key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
  3. Find a sub key inside it named “StorageDevicePolicies”. If it does not exist there then we need to make it. Right click on “Control” key -> New -> Key. same it “StorageDevicePolicies” without quotes.
  4. Now right click on this newly created key and then click New -> DWORD value and name it as “WriteProtect”.
    5.  Modify this key and give its value as 1.

     6. Click on OK and restart your computer.

Now no more data can be transferred to the drive but to start using the drive again just give the "WriteProtect" key a value of 0 instead of 1 and don't forget to restart the PC.

Tuesday, August 7, 2012

How to do ODBC Connection with C++ code

ODBC DSN Step with C++
 
 ODBC (Open Database Connectivity)

• A standard interface for connecting from C++ to relational databases
• It allows individual providers to implement and extend the standard with their own ODBC drivers

Here are procedures or rather steps used in the industry in C++ coding for connecting to a database

Steps of the ODBC

• Include Header Files
• Open a Connection to a Database
• Choose an ODBC Driver
• Query the Database
• Creating an ODBC Statement Object
• Executing a Query and Returning an ODBCResultSet Object
• Extracting Data from an ODBCResultSet
• Closing the ODBCResultSet and ODBCStatement
• Importance of closing the connection

Ok, this are actual steps how I connect to a database…definitely I used Oracle database, but I don’t want to further say what version it is.

1. Include the Header Files
# include statements at the beginning of your programs:
#include <sql.h>
#include<sqltypes.h>
#include<sqlext.h>

2. Open a Connection to a Database 

Set the environment handle:
SQLAllocHandle(SQL_HANDLE_ENV,
SQL_NULL_HANDLE, &hdlEnv);

Set ODBC Driver version:
SQLSetEnvAttr(hdlEnv,SQL_ATTR_ODBC_VERSION, (void*)SQL_OV_ODBC30);

Set the connection handle:
SQLAllocHandle(SQL_HANDLE_DBC,
hdlEnv, &hdlConn);

Connect to the database:
SQLConnect(hdlConn, (SQLCHAR*)dsnName,SQL_NTS,(SQL CHAR*) userID,SQL_NTS, (SQLCHAR*)passwd, SQL_NTS);

3. Choose Driver
•DSN – Data Source Name
•Open the GUI ODBC Administrator (ODBCConfig)
•Choose the appropriate ODBC driver
•Provide a meaningful name to the DSN
•Specify the server and the host string (host string is required if the server is running on a different machine)

4. Query the Database
Querying the database involves the following steps:

–Creating a Statement
SQLAllocHandle(SQL_HANDLE_STMT
, hdlDbc, &hdlStmt);
It allocates the memory for the statement handle. The database handle obtained during connection phase is passed as the second argument.

– Executing a Query
SQLExecDirect(hdlStmt, stmt, SQL_NTS);
It executes the query, which is passed in as SQLCHAR* in the second argument.

5. Extract the Data out of the Executed Query

SQLGetData(hStmt,colNum,type,retVal,buffLength,&cbData);
It extracts data from table as void* data and places it in retVal

colNum refers to the column number provided in the SELECT statement in SQLExecDirect()

Type is one of the standard ODBC data types
example: DT_STRING à for a string data type
DT_DOUBLE à for a double data type

buffLength is the estimated size of the expected data

cbData is the actual size of the data

6. Traverse Through the Results
SQLFetch(hStmt);
Fetches the next record

hStmt is the statement handle obtained using SQLAllocHandle
If a record is available, It returns SQL_SUCCEEDED

7. Close the Statement and the Connection
SQLFreeHandle(SQL_HANDLE_STMT,hdlStmt);
It closes and de-allocates the memory reserved for the statement handle

SQLFreeHandle(SQL_HANDLE_DBC, hdlConn);
It disconnects and de-allocates the memory reserved for the connection handle

SQLFreeHandle(SQL_HANDLE_ENV, hdlEnv);
It de-allocates the memory occupied by the environment handle

Wednesday, April 4, 2012

Why Dynamic Programming Languages Are Slow..??


In a statically typed language, the compiler knows the data-type of a variable and how to represent that.

In a dynamically-typed language, it has to keep flag describing the actual type of the value of the variable, and the program has to perform a data-dependent branch on that value each time it manipulates a variable.  It also has to look up all methods and operators on it.

The knock-on effect of this on branching and data locality is lethal to general purpose run time performance.

That’s why the dynamic language JIT benchmarks emphasise near-C speed on small inner loops but steer clear of large data-structures and data manipulation problems.

These slides by IBM researchers describe (page 3) the performance problems of dynamism:


  • Every variable can be dynamically-typed: Need type checks
  • Every statement can potentially throw exceptions due to type mismatch and so on: Need exception checks
  • Every field and symbol can be added, deleted, and changed at runtime: Need access checks 
  • The type of every object and its class hierarchy can be changed at runtime: Need class hierarchy checks
  • Properties mean assignments may in fact be setters: Need checks for existing values before assignment
  • Properties mean references may in fact be getters: Need checks on values when referencing


    To these I would add a couple of killers:

  • Properties mean assignments may in fact be setters: Need checks for existing values before assignment
  • Properties mean references may in fact be getters: Need checks on values when referencing

With modern dynamic language compilers there are buckets of neat tricks they can do to specialize the hot paths you use.  I’m glad that’s gathering speed as we rediscover or reapply old tricks and learn new ones and they all compose together.

But fundamentally, when its done that, these traces have to inter-operate with as yet not known code-paths.  So all escaped data has to keep its type within reach.  Its at this level where you are nearly at the speed of a classic statically compiled language that I am looking at the difference and pronouncing dynamic languages fundamentally slow:

I really want dynamically-typed languages like Python to be fast.  I’ve tried using Python for classic server programming - the domain of ‘systems languages’ - and really been bitten by lack-luster performance.  I’m contemplating a rewrite of one server in Java right now, sadly. 

Therefore, I spend time thinking about how to actually statically compile Python.  After all, that’d be my dream programming language!  But whenever I think through how to mix dynamic and dynamically-typed code with a statically compiled Python, I run into data representation slow-down problems:

In a dynamic language, typically all elements in an array (or other data structure) can be different types.  Therefore, these could have different representation values.  Therefore, these values must all be stored individually on the heap rather than in-line inside the array.  This means you are performing a data-dependent branch to non-adjacent memory, which puts pressure on cache-lines.

There are some clever tricks using special bits in a variable to pack some primitives like integers into a type that is otherwise a pointer, but that costs registers to track during manipulation so adds overhead.

There are some clever approaches like JITing of hot paths, but if you start putting your values in-line and not-type-taggged rather than as tagged types individually on the heap inter operability with non-JITed code becomes hard and you get a whole can of worms if some other code goes and changes the type of one value in the middle of the array…

I've been thinking a lot about what is and isn’t static in Python.  With SSTA and escape analysis you can determine that a surprising amount of a normal program is static.  Paul Biggar gives me confidence that my guess that 90% of my Python is static is about right.

What about that 10%?  Usually I can get all that static too, or imagine it being specialized for a restricted range of parameter types.  All except the standard pattern in Python web-servers to dispatch to web handlers based on HTTP method (calling the ‘get’ method if you receive a GET request).  That’d need the programmer to rephrase in terms of a switch statement (as in a long chain of elifs).

Robert Harper gave a great explanation of how a dynamic language is implemented in terms of a static language with a single type.  There is one quote I wish he’d expand upon:

Now I am fully aware that “the compiler can optimize this away”, at least in some cases

I believe the “some cases” he allows to are where you have non-escaping things.  You have to be able to determine the type of something that escapes when interacting with later-executing code.

Some dynamic calls are nonpolluting - a compiler can see from inspection that whilst some variable (or method) is dynamic, the dynamic code would not virally infer dynamic status on other variables.  Because the varying type of a variable or the presence/absence of a method/member is restricted to identifiable types (or null), specialism is possible.

But all too often the compiler can’t see that from code inspection.  And as soon as you lose track of where the execution may go, you stop knowing how that code might depend upon or change the value of other static variables.  So all bets are off, all variables have to be truly dynamic again.

I have struggled to find a way to deal with the monkey patching, set, setattr and such efficiently in mythical Python compiler.  Tagging types kills performance.

Fast data structures are very much about memory access patterns and cache locality and minimizing branches and tagging works against each of these.

Thank you for reading.

Thursday, February 16, 2012

Cloud Computing Concerns

Perhaps the biggest concerns about cloud computing are security and privacy. The idea of handing over important data to another company worries some people. Corporate executives might hesitate to take advantage of a cloud computing system because they can't keep their company's information underlock and key.
The counterargument to this position is that the companies offering cloud computing services live and die by their reputations. It benefits these companies to have reliable security measures in place. Otherwise, the service would lose all its clients. It's in their interest to employ the most advanced techniques to protect their clients' data.
Privacy is another matter. If a client can log in from any location to access data and applications, it's possible the client's privacy could be compromised. Cloud computing companies will need to find ways to protect client privacy. One way is to use authentication techniques such as user names and passwords. Another is to employ an authorization format -- each user can access only the data and applications relevant to his or her job.
Some questions regarding cloud computing are more philosophical. Does the user or company subscribing to the cloud computing service own the data? Does the cloud computing system, which provides the actual storage space, own it? Is it possible for a cloud computing company to deny a client access to that client's data? Several companies, law firms and universities are debating these and other questions about the nature of cloud computing.
How will cloud computing affect other industries? There's a growing concern in the IT industry about how cloud computing could impact the business of computer maintenance and repair. If companies switch to using streamlined computer systems, they'll have fewer IT needs. Some industry experts believe that the need for IT jobs will migrate to the back end of the cloud computing system.
Another area of research in the computer science community is autonomic computing. An autonomic computing system is self-managing, which means the system monitors itself and takes measures to prevent or repair problems. Currently, autonomic computing is mostly theoretical. But, if autonomic computing becomes a reality, it could eliminate the need for many IT maintenance jobs

Application of Cloud Computing

The applications of cloud computing are practically limitless. With the right middleware, a cloud computing system could execute all the programs a normal computer could run. Potentially, everything from generic word processing software to customized computer programs designed for a specific company could work on a cloud computing system.
Why would anyone want to rely on another computer system to run programs and store data? Here are just a few reasons:
  • Clients would be able to access their applications and data from anywhere at any time. They could access the cloud computing system using any computer linked to the Internet. Data wouldn't be confined to a hard drive on one user's computer or even a corporation's internal network.
  • It could bring hardware costs down. Cloud computing systems would reduce the need for advanced hardware on the client side. You wouldn't need to buy the fastest computer with the most memory, because the cloud system would take care of those needs for you. Instead, you could buy an inexpensive computer terminal. The terminal could include a monitor, input devices like a keyboard and mouse and just enough processing power to run the middleware necessary to connect to the cloud system. You wouldn't need a large hard drive because you'd store all your information on a remote computer.
  • Corporations that rely on computers have to make sure they have the right software in place to achieve goals. Cloud computing systems give these organizations company-wide access to computer applications. The companies don't have to buy a set of software or software licenses for every employee. Instead, the company could pay a metered fee to a cloud computing company.
  • Servers and digital storage devices take up space. Some companies rent physical space to store servers and databases because they don't have it available on site. Cloud computing gives these companies the option of storing data on someone else's hardware, removing the need for physical space on the front end.
  • Corporations might save money on IT support. Streamlined hardware would, in theory, have fewer problems than a network of heterogeneous machines and operating systems.
  • If the cloud computing system's back end is a grid computing system, then the client could take advantage of the entire network's processing power. Often, scientists and researchers work with calculations so complex that it would take years for individual computers to complete them. On a grid computing system, the client could send the calculation to the cloud for processing. The cloud system would tap into the processing power of all available computers on the back end, significantly speeding up the calculation.



Architecture of Cloud Computing

When talking about a cloud computing system, it's helpful to divide it into two sections: the front endand the back end. They connect to each other through a network, usually the Internet. The front end is the side the computer user, or client, sees. The back end is the "cloud" section of the system.

The front end includes the client's computer (or computer network) and the application required to access the cloud computing system. Not all cloud computing systems have the same user interface. Services like Web-based e-mail programs leverage existing Web browsers like Internet Explorer or Firefox. Other systems have unique applications that provide network access to clients.

On the back end of the system are the various computers, servers and data storage systems that create the "cloud" of computing services. In theory, a cloud computing system could include practically any computer program you can imagine, from data processing to video games. Usually, each application will have its own dedicated server.

A central server administers the system, monitoring traffic and client demands to ensure everything runs smoothly. It follows a set of rules called protocols and uses a special kind of software called middleware. Middleware allows networked computers to communicate with each other. Most of the time, servers don't run at full capacity. That means there's unused processing power going to waste. It's possible to fool a physical server into thinking it's actually multiple servers, each running with its own independent operating system. The technique is called server virtualization. By maximizing the output of individual servers, server virtualization reduces the need for more physical machines.

If a cloud computing company has a lot of clients, there's likely to be a high demand for a lot of storage space. Some companies require hundreds of digital storage devices. Cloud computing systems need at least twice the number of storage devices it requires to keep all its clients' information stored. That's because these devices, like all computers, occasionally break down. A cloud computing system must make a copy of all its clients' information and store it on other devices. The copies enable the central server to access backup machines to retrieve data that otherwise would be unreachable. Making copies of data as a backup is called redundancy.

Introduction to How Cloud Computing Works

Let's say you're an executive at a large corporation. Y may be an alternative for executives like you. Instead of installing a suite of software for each computer, you'd only have to load one application. That application would allow workers to log into a Web-based service which hosts all the programs the user would need for his or her job. Remote machines owned by another company would run everything from e-mail to word processing to complex data analysis programs. It's called cloud computing, and it could change the entire computer industry.
In a cloud computing system, there's a significant workload shift. Local computers no longer have to do all the heavy lifting when it comes to running applications. The network of computers that make up the cloud handles them instead. Hardware and software demands on the user's side decrease. The only thing the user's computer needs to be able to run is the cloud computing system's interface software, which can be as simple as a Web browser, and the cloud's network takes care of the rest.
There's a good chance you've already used some form of cloud computing. If you have an e-mail account with a Web-based e-mail service like Hotmail, Yahoo! Mail or Gmail, then you've had some experience with cloud computing. Instead of running an e-mail program on your computer, you log in to a Web e-mail account remotely. The software and storage for your account doesn't exist on your computer -- it's on the service's computer cloud.
What makes up a cloud computing system? Find out in the next sectionour particular responsibilities include making sure that all of your employees have the right hardware and software they need to do their jobs. Buying computers for everyone isn't enough -- you also have to purchase software or software licenses to give employees the tools they require. Whenever you have a new hire, you have to buy more software or make sure your current software license allows another user. It's so stressful that you find it difficult to go to sleep on your huge pile of money every night.

Thursday, February 9, 2012

How to Hide Application Icon in Windows 7 Taskbar

Microsoft Windows 7 comes with a taskbar that has never before been witnessed in its predecessors. The Windows 7 taskbar features a dock-type appearance and utility tools like launching a program or running an application. Undoubtedly, the Windows 7 taskbar helps the user to an extent more than what meets the eye.
Here, we unveil a new utilization feature of the Windows 7 taskbar. Often, some programs and shortcuts to various applications are pinned to the taskbar for easy accessibility. However, sometimes for reasons concerning privacy and confidentiality, the user may want to hide these icons so that other users logging into his computer do not have access to his private applications or programs. We’ll now plow on the process to achieve this useful tweak.

To start with, the icon that needs to be hidden should remain invisible at the taskbar with only the creator knowing its perfect location and the authority to view and access it. We, here, take Mozilla Firefox as an example to the program that requires to be hidden. On completing the following procedure, your taskbar will contain Mozilla Firefox as a launch up program while keeping it invisible to anyone who logs on to your computer.

Making a program icon invisible
To make a program icon invisible, you need to use software called “Resource Hacker”. Download this freeware to start the process. The downloaded file is a “.zip” file. No installation is required to use this software.
On extraction, locate the file “ResHacker.exe” in the extracted folder. Right click on this file and select to “Run as Administrator”. Confirm on request to open Resource Hacker.
1. After the software opens, go to “File” menu (or simply press Alt+F). Select “Open” and navigate to the location where the Mozilla Firefox execution file is present. (It should be in the folder “Mozilla Firefox” in the “Programs” folder of the directory where Mozilla is installed). Select the file “firefox.exe” file and click “Open”.
2. The Resource Hacker wizard opens up. Select “Icon” and then click on the “Action” tab on the menu-bar. Select “Replace Icon“.
3. The “Replace Icon in” window appears. Select “1″ in the right pane of the window under the tag “Select icon to replace” and then click to “Open file with new Icon…“.
4. Navigate to “C:\Windows\System32\” and click on “shell32.dll” to open it.
5. On clicking “Open” a list of icons appear under the tag “Select new icon“. Select the icon number 52. Then click to “Replace”.
You will be notified that the icon has been replaced.
To proceed, you have to replace a second set of icons. Select “Open” under “File” menu. On asking whether to save your work, select “NO“, as the task is not completed yet. Follow the steps 1 to 5 once again with the exception that in step 3, this time, Select “32512″ in the right pane of the window under the tag “Select icon to replace”. Follow the remaining steps as you have done previously.
Save the file you have just created by pressing Ctrl+S to the installed program folder of Mozilla Firefox (in the folder “Mozilla Firefox” in the “Programs” folder of the directory where Mozilla is installed).
Exit Resource Hacker.
The new file created “firefox.exe” can be visualized when you open the folder where Mozilla is installed. This file does not have an icon, or more technically, the icon of this file is invisible. The original Firefox execution file still remains within the folder with it being renamed to “firefox_original.exe”. Now, right click on the file “firefox.exe” and select “Pin to taskbar”.
To the right of the pinned programs on the taskbar, appears a section which, on hovering your mouse pointer over it, displays “firefox.exe – Shortcut”. You have just created a secret invisible icon in your Windows 7 taskbar. Drag this section to the extreme left of the taskbar to the right of the “Start” button.
Your taskbar remains just as it was before you created this invisible icon. None, but you know the exact location of this icon. Your privacy gets boosted up with an increased accessibility option.

Tuesday, February 7, 2012

Windows 8 To Feature A Lot More MinWin Technology


First off, what is MinWin? Basically it’s the very basis of Windows, you need to think of it as the core of Windows. MinWin contains pretty much everything that Windows needs to boot and run independently, such as the Windows NT Kernel, memory manager, networking and drivers etc…


So what’s the big deal about this MinWin technology? Well we first started seeing MinWin playing a prominent part in Windows 7, but now it appears that it’s going to be playing an even bigger role in Windows 8. Windows 8 appears to have in excess of 6,000 references to MinWin, which is 60 times more than the 100 references or so that can be found in Windows 7.


MinWin is Microsoft’s effort to create the smallest possible standalone, bootable, core of Windows. MinWin has no dependencies outside of itself or at least it didn’t in Windows 7 so I’d expect Windows 8 to be the same. Microsoft are probably going to continue relocating APIs inside the Windows 8 core, so as to have MinWin completely operated from the rest of the operating system.


Microsoft have probably also managed to lower the size of MinWin in Windows 8. While it isn’t a particularly large file in Windows 7 – 40 MB , it could be down to 30 MB or so in Windows 8.


So this all sounds very technical and complicated, but what does it mean for the end user of Windows 8?


To be honest not that much, but I’d expect it to help Windows 8 run on more hardware limited resources such as tablets and such. But probably the main role this will play is in client virtualization, particularly with Hyper-V.

Sunday, February 5, 2012

How To disable Coping/Writing To USB Drives in Windows XP


USB drives are extremely handy tools, but in some instances it might not be a good idea to allow users to write onto these devices from their PCs. This is especially true when working with highly confidential data or intellectual property at work. Users of Windows XP with service pack 2 installed can disable writing to USB devices.

To perform you have to pass from following steps :
  • Open the Registry Editor click by clicking on START button on task bar and then click on Run and type "regedit" and click on OK to start regedit utility.
  • Follow the following sequence HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Control.
  • From there right click and create a new key and name it “StorageDevicePolicies”.
  • In the window on the right then create a new DWORD value and label it WriteProtect, give it a value of “1″ and users can no longer write to USB drives.
  • To re-enable this option change the value to 0 and users are again allowed to write.
  • The modifications you made will be in effect after you reboot your PC.

Enable Windows 7's Hidden "God Mode"

Windows 7 has many features but some of that will be hidden. Today I am going to introduced one of them in front of you.
It's Name is "GOD MODE". This functionality is contains most of the OS task such as Default Program, Autoplay, Desktop Gadget, Admin Tools etc. are included in one folder.
It provides users with a centralized Control Panel for all of Windows' settings, from changing your desktop background to setting up a VPN or partitioning your hard drive. In all, there are nearly 50 categories and most have several entries.

Just Create a New Folder and rename it by following...
God Mode.{ED7BA470-8E54-465E-825C-99712043E01C}
"God Mode" is the name of folder which is desirable.
Automatically Folder Logo will becomes like following image.


Mobile Tracking – How To Track Any Mobile Phone

Are you looking for Mobile Phone Tracking options so you can easily monitor your partner’s, child’s or employee’s mobile phone activities?

If you do want to track a mobile phone, but you have no clue how to do this, then I will tell you exactly what you need to do in order to successfully do this without getting caught by the owner of the mobile phone.
How To Track Any Cell Phone Without Getting Caught By The Owner.

While many people think that tracking a mobile phone is simply spying on the phone manually, they’re wrong. You see, these days the technology has reached a level where you can now install a simple yet effective software program on to your computer, and track a mobile phone from there on.
 
This is a lot easier and safer since it’s undetectable unless you say that you’re tracking his or her phone. However, keep in mind that this sounds pretty good, and it is, but there are many of these programs around that are simply scams, fake and not working.
 
Therefore, if you want to make sure that you actually get yourself a working mobile phone tracking program, then you should keep an eye on 2 things. The program should have obtained a high reputation, and many great feedback.
  
What Software Program To Use When You Want To Start Tracking A Mobile Phone...
A great program which has received many great feedback, and which has obtained a high reputation is called Spybubble. With Spybubble you will be able to record mobile phone activities without the owner knowing that you’re tracking him or her.

This is what Spybubble will help you to do:
* Records mobile phone events.
* Spy on SMS text messages. (Spy on received and sent messages.)
* Spy on web browser activities.
* Call logs (inbound and outbound).
* Location tracking by GPS so you can see exactly where the owner is.
* Full phone book access.
* Works from all over the world.
* 100% undetectable and you can spy on unlimited mobile phones.
Why don’t you take a look at this undetectable mobile tracking program? Visit: Spybubble
So, in order to track a mobile phone without getting caught, you can only do 1 thing. You use an undetectable software program which has obtained a high reputation and which has received many great feedback.
A great program is called Spyubble, which is highly recommended to get since it’s working and easy to use.

What Is Spybubble
Spybubble is a software program which has been designed to help people to find out the truth about their child, employee, partner or anybody else by spying on all cell phone activities made.
This program works 100% automatically after the installation process, it’s undetectable and it’s 100% safe and legal to use either.
This Is What Spybubble Can Do For You:
  • Track Calls. You can view all incoming and outgoing calls, the mobile numbers, frequency, duration of each call and the conversation itself.
  • Track Messages. You’ll get to read all incoming and outgoing messages, even if the user deletes them. Find out who the text mates of your child are or if your employee is using the company phone for other matters.
  • Track Location. It’s amazing how you can also track the exact location of the mobile phone using Google Maps. That would definitely erase any doubts as to the whereabouts of your child or employee. Is your daughter really at her friend’s house? Is your employee really at home sick?
  • Access Phone Book. You will also be able to view all contacts stored in the mobile.
  • It’s Undetectable! You can do all these spying without being detected! There is no sound, icon or anything at all in the target phone that would tell the user that SpyBubble is installed.
  • Spy On Unlimited Phones. You can also follow multiple mobile phones at a time.
  • SpyBubble Is Compatible With: Blackberry, Android, Symbian S60, Nokia, Bluetooth,Windows Mobile And Iphones. it works with almost any smartphone.

How Does Spybubble Work?

SpyBubble makes use of state-of-the-art technology that records all the activities in the mobile phone, be it SMS or a phone call. It then sends the information to a remote server that stores the information for you to view from your own computer or mobile phone.
All you really need to do is create an account and log in.
    Once logged in, you´ll have to install Spybubble into the target mobile phone as follows:
  • Step 1: Complete registration on Spybubble´s website.. For this step, you will need the phone’s IMEI number, which you will easily find in the battery compartment.
  • Step 2: Go to the target phone’s Settings Menu >>> Choose Applications >>> Enable the “Unknown Sources” box
  • Step 3: Open the phone’s web browser and download the application on the mobile phone.
  • Step 4: Install the SpyBubble application by following the instructions.
  • Step 5: Reboot the phone.
  • Step 6: Log in to your account on spybubble.com and experience the magic!
You´ll also get a step by step installation guide with screenshots and photo´s so you can see exactly how to install and how to use the program.
So, once you´ve properly installed Spybubble on the targetted moible phone, then you´ll now be able to spy on the activities made on that mobile phone. On the screenshot below you´ll see where the activities made are visible.

Use Spybubble To Legally Find Out The Truth…

  • Records SMS phone events.
  • Spy on SMS text messages. (Spy on received and sent messages.)
  • Spy on web browser activities.
  • Call logs (inbound and outbound).
  • Location tracking by GPS so you can see exactly where the owner is.
  • Full phone book access.
  • Works from all over the world.
  • 100% undetectable and you can spy on unlimited SMS phones.
If you’re looking for a legal, safe and an undetectable way for you to spy on either your child’s, partner’s or employee’s mobile activities, then it’s highly recommended to start using Spybubble because it simply works like a train.