sMobile ? "width=device-width,initial-scale=1.0,minimum-scale=1.0,maximum-scale=1.0" : "width=1100"' name='viewport'/> android xda: February 2014

Friday 28 February 2014

Google loses its appeal against taking down 'The Innocence of Islam' from YouTube

Google and pro-freedom of speech activists will remember this case for one reason and Islamists and peace advocates will remember this case for another.  The case in question is Garcia vs Google Inc et al, 9th US Circuit Court of Appeals, No 12-57302. The result, rejection of Google's appeal against earlier verdict to pull down the controversial 'Innocence of Islam' video from YouTube.

Google loses appeal to keep anti-Islamic film ‘Innocence of Muslims’ on YouTube #TECH BUZZ


On Friday, a US appeals court rejected Google’s request to put on hold an order which required Google to remove 'Innocence of Islam' from YouTube.  Google had appealed in the court for keeping the said video on YouTube till the final verdict was given. The original order which had given the verdict against YouTube and Google had asked Google to remove the video and the video would have “devastating effects” if allowed to stand.

A panel of the 9th US Circuit Court of Appeals voted 2-1 to reject Google’s assertion that the removal of the film 'Innocence of Muslims'  amounted to violation of Freedom of Speech guaranteed under the US constitution. Readers will remember that this particular video had  been the reason for a powerful backlash and protests across the Muslim world.  It sparked a torrent of anti-American unrest among Muslims in Egypt, Libya and other countries in 2012.

Earlier while filing for a review against removal of the video on Thursday, Google argued that the video shouldn't be taken down from YouTube till a a larger, 11-judge 9th Circuit panel can deliver a final verdict on the issue considering the Freedom of Speech guaranteed under the US Constitution.  However going against Google's view, the 9th Circuit on Friday rejected Google’s request in a brief order for stay of video on YouTube.    

WhatsApp will add voice calls later this year


WhatsApp will add voice calls later this year

Plenty have been wondering what's next for WhatsApp after the popular messaging service was purchased by Facebook for $16 billion last week, and now we have the answer: voice calls. According to TechCrunch, WhatsApp announced during a Mobile World Congress event today that it would be adding voice services to iOS and Android during the second quarter of the year. The feature will reportedly head to Nokia devices and BlackBerrys sometime after that.
=
WhatsApp also provided an update on its active user count: it now has 465 million monthly active users and 330 million daily users, according to TechCrunch. That's 15 million more monthly users than Facebook detailed just last week when reporting the purchase. WhatsApp has already risen to an impressive popularity on basic messaging features alone, and the addition of voice calls should only enhance that further when they begin to roll out later this year. 

The app has done well by offering inexpensive messaging services where messaging is traditionally quite expensive, and doing the same for phone calls would likely be a boon for growth. WhatsApp is reportedly optimizing the amount of data its voice calls use, which should help in keeping users' expenses down as well.

The Guardian reports that WhatsApp's voice calling features will be free, though it's possible that this may only be for a limited time. Messaging is initially free within the app, but eventually requires a $0.99 per year subscription. It's likely that voice services will fall under this too, while breaking it out as a second offering could even provide an additional revenue stream. Though WhatsApp has never appeared eager to bother users with added costs like that on the path to big profits, it'll be interesting to see if that changes as a public company underneath Facebook.

10 percent Dearness Allowance hiked for Government Employees from 1.1.2014 (January 2014) but no clear verdict about the 50 % Merger

The UPA II's perhaps second last Cabinet meet gave the Government Employees a lot to cheer.  Not only did the Cabinet approve the 10 percent hike in Dearness Allowances for Government Employees but it also gave its approval for the Terms of Reference for the 7th Pay Commission.

10 percent DA hiked for Central Government Employees from 1.1.2014 (Jan 2014) payable after 31.3.2014
The Dearness Allowance will now reach 100 percent of the Basic Pay + Grade Pay for all central government employees.  The Presser released by Press Information Bureau is given below :

10 percent DA hiked for Central Government Employees from 1.1.2014 (Jan 2014) payable after 31.3.2014
The wordings in the third line of the press release infer that the Government employees wont require a separate order for increase of DA and the Government organisations can draw the arrears as well as salary from 1.1.2014 after 31.3.2014.   However Finance Ministry is expected to issue a formal order regarding the same.  
in cash, but not before the disbursement of the salary for the month of March 2014
While there is mixed news of 50 percent merger with Basic Pay. Some websites and eminent personalities have given contrarian views , I hold firm belief that this has been approved and made a part of the Terms of Reference of the VIIth CPC.  The ToR is briefly given below :

 7th Central Pay Commission

 The Union Cabinet today gave its approval to the Terms of Reference of 7th Central Pay Commission (CPC) as follows:-

a)      To examine, review, evolve and recommend changes that are desirable and feasible regarding the principles that should govern the emoluments structure including pay, allowances and other facilities/benefits, in cash or kind, having regard to rationalization and simplification therein as well as the specialized needs of various Departments, agencies and services, in respect of the following categories of employees:-

i.  Central Government employees-industrial and non-industrial;
ii. Personnel belonging to the All India Services;
iii.Personnel of the Union Territories;
iv.Officers  and   employees   of  the   Indian  Audit  and   Accounts Department;
v.Members of regulatory bodies (excluding the Reserve Bank of India) set up under Acts of Parliament; and
vi.Officers and employees of the Supreme Court.

b) To examine, review, evolve and recommend changes that are desirable and feasible regarding principles that should govern the emoluments structure, concessions and facilities/benefits, in cash or kind, as well as retirement benefits of personnel belonging to the Defence Forces, having regard to historical and traditional parities, with due emphasis on aspects unique to these personnel.

c) To work out the framework for an emoluments structure linked with the need to attract the most suitable talent to Government service, promote efficiency, accountability and responsibility in the work culture, and foster excellence in the public governance system to respond to complex challenges of modern administration and rapid political, social, economic and technological changes, with due regard to expectations of stakeholders, and to recommend appropriate training and capacity building through a competency based framework.

d) To examine the existing schemes of payment of bonus, keeping in view, among other things, its bearing upon performance and productivity and make recommendations on the general principles, financial parameters and conditions for an appropriate incentive scheme to reward excellence in productivity, performance and integrity.

e) To review the variety of existing    allowances presently available to employees in addition to pay and suggest their rationalization and simplification, with a view to ensuring that the pay structure is so designed as to take these into account.

f) To examine the principles which should govern the structure of pension and other retirement benefits, including revision of pension in the case of employees who have retired prior to the date of effect of these recommendations, keeping in view that retirement benefits of all Central Government employees appointed on and after 01.01.2004 are covered by the New Pension Scheme (NPS).

g) To make recommendations on the above, keeping in view:
i.  the economic conditions in the country  and need for fiscal prudence;
ii. the need to ensure that adequate resources are available for developmental expenditures and welfare measures;
iii. the likely impact of the recommendations on the finances of the State Governments, which usually adopt the recommendations with some modifications;
iv.the prevailing emolument structure and retirement benefits available to employees of Central Public Sector Undertakings; and
v. the best global practices and their adaptability and relevance in Indian conditions.

h) To recommend the date of effect of its recommendations on all the above.
The Commission will make its recommendations within 18 months of the date of its constitution.  It may consider, if necessary, sending interim reports on any of the matters as and when the recommendations are finalised.

The decision will result in the benefit of improved pay and allowances as well as rationalization of the pay structure in case of Central Government employees and other employees included in the scope of the 7th Central Pay Commission.

My belief stems from the following line of the Terms of Reference
It may consider, if necessary, sending interim reports on any of the matters as and when the recommendations are finalised.
The emphasis of this line is that the 7th CPC may recommend any interim payment to the Central Government employees as it deems necessary.  This also means that all further orders regarding the pay and allowances will be issued by the 7th CPC.  This way the UPA would have circumvented the Model Code of Conduct for polls as the merger will now not be a policy decision but a decision made by a parliament/cabinet approved body.

However this is open to interpretations.  Today many news channels are also giving opposite view and the PIB/Government website dont reveal much so it is now left open to interpretations.

Thursday 27 February 2014

How to Change Your Name on Facebook



How to Change Your Name on Facebook

Open your account settings. Log in to Facebook and click the Gear icon in the top-right corner of the page. Select “Account Settings”.
  • To access this on the mobile app, click the menu button in the top-left corner and scroll down to Account Settings. Select General, and then tap Name.
Click on your name to open the name editor. You can enter a First, Middle, and Last name, as well as an Alternate name (such as a nickname or maiden name).
  • Your name can only be changed four times.
  • Facebook wants you to list your name as it appears on your credit card or ID.
  • You cannot use symbols, numbers, random capitalization, or punctuation.
  • Your middle name cannot be words or phrases.
  • Nicknames should be variations on your real name (rique or jhone..)
Enter your real name. Facebook does not allow you to impersonate someone else, or create a page for a fictional character. Accounts found in violation of this will be forced to change the name.
  • If you want to create an account for an organization, business, or a pet, you will need to create a Facebook Page
Enter your password. To change your name, you will need to enter your password into the box before you are allowed to save your changes.

Click Save Changes. Your new name will be saved, and the change will reflect on your Profile shortly. It can take up to 24 hours for a name change to be approved.

 Red more

How do I change my name on facebook?

Wednesday 26 February 2014

How do I change my name on facebook?

 
 
You can change your name or add an alternate name (ex: nickname or maiden name) to your account. To edit your name:
  1. Review our name standards
  2. Click in the upper-right corner of any Facebook page and select Settings
  3. Look for the Name setting and click Edit to the far right
  4. Type in your name and save your changes
Keep in mind:
  • To help make sure that everyone uses their real name, we limit the number of times you can change your name.
  • If you weren't able to change your name, we may be able to help.
You're reading the Desktop Help answer. Learn more in our other Help Centers.
 
Soure:  http://www.facebook.com/help/www/173909489329079

red more 

Transfer files between Android and Windows devices






Andrew Cheng asked for advice on the best ways to transfer files between his Android phone and his Windows PC.
The obvious way is to physically connect the phone to the PC, then drag and drop. But the obvious way isn't necessarily the best--or the most convenient. 


But let's start with that obvious way: Use a Micro USB cable, such as the one that almost certainly came with your Android device, to connect that device to your PC. The first time you do this, you may have to wait a bit while Windows sets up some drivers.
After that, the device will behave like an external drive. You can open it in Windows Explorer (File Explorer in Windows 8) and drag and drop files.
But as I said, there are more convenient ways, and they don't require a cable.
Cloud storage services such as Dropbox, Google Drive, and SkyDrive all support Android. You can send files, via each service's Android app, from the cloud to your device or from your device to the cloud. And everything you have stored in the cloud with one of these services automatically gets on your PC.
1226 dropbox
Let's consider Dropbox. In Android, Dropbox doesn't automatically sync all of the files in its appointed folder as it does in Windows. But you can download files from the Dropbox app to your phone or tablet's local storage. And you can upload files to Dropbox via an Upload here option on the app's pull-down menu.
Dropbox also provides an automatic way to send your photos to your PC. You can set this up in the Android Dropbox app:
  1. Tap the menu icon in the upper-right corner.
  2. Tap Settings.
  3. Tap Turn on Camera Upload.
  4. In order to avoid hitting your mobile data cap, you'll probably want to leave the Wi-Fi only option on.
Once this is set up, every time you snap a picture with your phone, it will automatically transfer to the Camera Upload folder inside your PC's Dropbox folder.
You can also transfer your local music collection without a cable, using your local Wi-Fi network. In other words, it only works when you're at home.
I recommend the free program doubleTwist. On your PC, it's a media sync tool that works with either a cable connection or Wi-Fi. The Android app is an excellent music player in its own right--as well as the other end of the syncing tool.
1226 doubletwist
With these tools, you'll seldom need the cable for anything but recharging.

Tags:

Android, Transfer files between Android and Windows devices, Android, android file transfer,

Monday 24 February 2014

Android and Linux



Android has always been Linux, but for years the Android project went its own way and its code wasn't merged back into the main Linux tree. Now, much sooner than Linus Torvalds, Linux's founder and lead developer, had expected, Android has officially merged back into Linux's mainline.
The fork between Android and Linux all began in the fall of 2010, "Google engineer Patrick Brady stated that Android is not Linux" That was never actually the case. Android has always been Linux at heart.

At the same time though Google did take Android in a direction that wasn't compatible with the mainstream Linux kernel. As Greg Kroah-Hartman, the maintainer of the stable Linux kernel for the Linux Foundation and head of the Linux Driver Project, wrote in Android and the Linux kernel community, "The Android kernel code is more than just the few weird drivers that were in the drivers/staging/androidsubdirectory in the kernel. In order to get a working Android system, you need the new lock type they have created, as well as hooks in the core system for their security model. In order to write a driver for hardware to work on Android, you need to properly integrate into this new lock, as well as sometimes the bizarre security model. Oh, and then there's the totally-different framebuffer driver infrastructure as well." That flew like a lead balloon in Android circles.

This disagreement sprang from several sources. One was that Google's Android developers had adopted their own way to address power issues with WakeLocks. The other cause, as Google open source engineering manager Chris DiBona pointed out, was that Android's programmers were so busy working on Android device specifics that they had done a poor job of co-coordinating with the Linux kernel developers.

The upshot was that developer circles have had many heated words over what's the right way of handling Android specific code in Linux. The upshot of the dispute was that Torvalds dropped the Android drivers from the main Linux kernel in late 2009.

Despite these disagreements, there was never any danger as one claim had it in March 2011, that Android was somehow in danger of being sued by Linux because of Gnu General Public License, version 2 (GPLv2) violations. As Linus himself said at the time, claims that the Android violated the GPL were "totally bogus. We've always made it very clear that the kernel system call interfaces do not in any way result in a derived work as per the GPL, and the kernel details are exported through the kernel headers to all the normal glibc interfaces too."

Over the last few months though, as Torvalds explained last fall, that while "there's still a lot of merger to be done … eventually Android and Linux would come back to a common kernel, but it will probably not be for four to five years." Kroah-Hartman added at the time that one problem is that "Google's Android team is very small and over-subscribed to so they're resource restrained It would be cheaper in the long run for them to work with us." Torvalds then added that "We're just going different directions for a while, but in the long run the sides will come together so I'm not worried."
In the event the re-merger of the two went much faster than expected. At the 2011 Kernel Summit in Prague in late October, the Linux kernel developers "agreed that the bulk of the Android kernel code should probably be merged into the mainline." To help this process along, the Android Mainlining Project was formed.

Things continued to go along much faster then anyone had foreseen. By December, Kroah-Hartman could write, "by the 3.3 kernel release, the majority of the Android code will be merged, but more work is still left to do to better integrate the kernel and userspace portions in ways that are more palatable to the rest of the kernel community. That will take longer, but I don't foresee any major issues involved." He was right.

Today, you can compile the Android code in Linux 3.3 and it will boot. Still, as Kroah-Hartman warned, WakeLocks, still aren't in the main kernel, but even that's getting worked on. For all essential purposes, Android and Linux are back together again.

Sunday 23 February 2014

android virtualbox on windows 7

Install Android 4.0 Using VirtualBox on Windows, Mac or Linux [How-To]
Here is a complete procedure to Install Android OS on PC or laptop. Its very common that almost all smartphones providers are now moving to android platform. This is because it has endless features, supports many applications and there are hundreds of new free and paid apps entering into the market everyday. Android OS is getting popular day by day. This being on one side, here is a short tutorial on how to install Android OS on your PC or Laptop.


Preparing VirtualBox : VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 2. See “About VirtualBox" for an introduction.
Presently, VirtualBox runs on Windows, Linux, Macintosh, and Solaris hosts and supports a large number of guest operating systems including but not limited to Windows (NT 4.0, 2000, XP, Server 2003, Vista, Windows 7), DOS/Windows 3.x, Linux (2.4 and 2.6), Solaris and OpenSolaris, OS/2, and OpenBSD.
You can download the setup file supported from the link. VirtualBox Download.

Preparing Android ISO File
Various Android ISO files are available over the internet. You can google search it easily. One of the providers I trust is Android-x86.org. Various versions of Android are available at it’s download page. For Android 4.0, scroll down the page to "Android-x86-4.0-RC1" and download the file supportive for you operating system. I recommend you to download android-x86-4.0-RC1-amd_brazos.iso”.

Installation Steps : 
1. After completing the download, install and run VirtualBox. You   would see a screen somewhat like this : 

 2. Click on New button at the top left of the VirtualBox window.

3. Click on Next and write the name as “Android OS 4.0” (You can provide any name, it completely depends on you). Select the Operating System as Linux and version as Other Linux. Then click on next.

4. Then select the memory for your device (RAM). 512MB is sufficient for an Android running on a VirtualBox. Click Next.

Note : Make sure the RAM you provide is always lesser than your computer or laptop  RAM, or hence your device would turn up slow and tend to hang.
5. After clicking Next the setup will ask you for a start-up hard disk. Select Create new hard disk. And Next.

6. On clicking Next you would see a virtual disk creation wizard. Select VDI(VirtualBox Disk Image) and Next.

7. Select Fixed size and click next, select the size to be 1GB. And proceed. Click on Create.

8. On the top left you would find a Settings button. Click on it. Go to Display and select video memory to 128MB. Check Enable 3D Acceleration . 
 

9. Go to Storage and in the storage tree select empty. And select the CD/DVD icon from the Attributes section. Now, select the path of you Android ISO file and select it.

10. No further changes in the Settings, click on OK.
11. Now click on the Start button. You would see a window somewhat like this.

You can run Android without installing it on your Virtual Hard Disk by pressing enter on to the first option.
NOTE : This would not save any setting on the Android. 


12. To Install, select the last option and press enter. Select Create/Modify Partition.

13. Select the [New], to create a new partition. 

14. Select the drive to be [Primary] and press enter. Don’t make any changes to the Size, just press enter. Click on [Bootable] and then [Write]. The setup would ask you to confirm your write. Type “Yes” and proceed.  
15. Now select [Quit].
16. You would now find your drive. Select it and press enter.

17.  Format it with ext3, then proceed. Select [Yes]. When setup ask for confirmation to install GRUB boot loader, select [Yes]. Next select [Yes] when it asks to install  system directory as read-write.
 18. Congratulations! You have installed Android OS on a virtual drive. Create a Fake SD card, if you want one. 
19. Before you start enjoying the fun, a main step has to go.  Reboot your device. Just before it get started, go to the devices menu on the top, select CD/DVD devices. Your ISO file will be the one selected there, choose the other option that is Host Drive ‘F’. Now Start the virtual machine.

20. After this go and run Android. You are done! 


Basic Information About Proxies




Don't you just love the Internet? I mean, there's just so much knowledge and information available on it at a moment's notice that it may feel staggering at times. Looking for cooking recipes? Do a search - get results. Looking for good books to read? Do a search - get results. Interested in weapon manufacturing techniques? Well, you can see where this is going. You can find any type of information online, sometimes even potentially dangerous information. The expression "from a needle to a steam train" really has weight behind it when considering what the Internet has to offer. There's also a strange side to it. Since you can find literally any type of information online, you can find information about how to do damage online. Hacking, phishing, spying; you can find information about all that without much effort. Doesn't sound very encouraging, doesn't it? Well, luckily, there are ways to counter such potential threats and make your surfing experience even safer.

What are proxies?

Depending on your technical knowledge, you probably know that every computer on the Internet has a unique designation assigned to it when it connects online. It is called an IP address and it's basically a series of numbers and decimals that signify which Internet provider company you use for Internet access, what country you're in and even what city you're located in. Why is it necessary to have such sensitive data on something so easily available? Well, it's just a basic precaution. If we could compare it to something, we would compare it to fingerprints. If someone commits a felony, they can often be tracked to the crime by fingerprints. An IP address is a virtual fingerprint that links a user account online to an actual existing individual. It's very handy, but it can also be potentially exploited. To prevent the risk of IP address misuse, proxies are available for everyone to use. A proxy basically makes sure that your IP address can't be so easily detected.

What do proxies do?

Proxies are basically used through proxy servers which have their own IP addresses. In short, whenever you use a proxy server, you use their IP address. You still retain your own unique IP, but your actual visible IP address is the one the proxy server uses. Since some information is contained in an IP address, this can produce some amusing results. For instance, you could be sitting behind your computer in the UK and appear as though you're in Croatia, if the proxy server uses an IP address for that country. A lot of services actually use proxy servers by default. For instance, if you've ever used a modern chat client, you first connect to their proxy server before connecting to any other user. This ensures that not just anyone can get your real IP address.

So proxies make me truly anonymous?

To be blunt, no, using proxies does not make you truly anonymous. Using a proxy server simply adds an additional security layer to increase your own security while surfing. It's not an excuse to feel like you're undetectable while online and attempts to exploit proxies will be punished eventually. A proxy provider keeps a log of IP addresses that used their services, so there's always residual information remaining that can link a person to a certain activity that way. Fortunately, this happens very, very rarely and using proxy servers is just simple enough to warrant their usage as an added security layer.
Visit http://thefreewebproxies.com to learn more about Proxy technology and get your daily fix of free web proxy lists.

Article Source: http://EzineArticles.com/6965699

Stop wars, spread happiness and cheer with a Cadbury 5 Star

This is a true story that happened last May.   You know how it at that time in the month of May, the temperature is hot, the air is dry, the climate is sultry and you wish you did get home at the earliest and start the ceiling fan or air conditioner and take deep breath to relieve all the heat you have faced. Well you are not the only one wishing to do the above, almost every Mumbaikar wishes the same in the month of May.

Stop wars, spread happiness and cheer with a Cadbury 5 Star

In my pursuit of understanding humans and their emotions, I reached to a ultimate conclusion the 'May Heat' as it is called in Mumbai is one the single biggest problems faced by Mumbaikars. Not only is the outside temperature hot and dry, even the Mumbaikars are pretty loose on tempers during this time of the year.  The climate plays a havoc on the frail nature of humans and we witness most fights between the citizens during the month of May.  Some of these fights may lead even to fist cuffs because neither party is willing to let go and both parties are really hot under the collar.  I may be given a Nobel for my ultimate thesis on life of Mumbaikars but that is not the point here.  I had to find a solution for this 'May Heat' only then would I be able to match the genius of Tesla, Einstein, Nobel and Freud and maybe visit Stockholm to receive the Nobel.

Stop wars, spread happiness and cheer with a Cadbury 5 Star


So ONE fine (sorry very very hot) day I started out with half a dozen bars of Cadbury 5 STAR in my pocket to search for a solution to the unseeming problem which Mumbai faces every May.  The climate that day was arid and the temperature was somewhere in late 30s. This was what I call a optimum temperature for conducting my research.  I decided to test my new found formulae on the hapless conductor of a BEST bus.

BEST as you all know is the lifeline of Mumbai.  It runs through heat and rain and cold.  In fact I have never seen a BEST not running on Mumbai streets save the time when their union boss decides to call a general strike.  Now this and every BEST bus has two human components working other than the Ashok Leyland engine.  One is called the Driver and he obviously drives the BEST bus, the other is called the Conductor and believe me, he really conducts the bus or whatever that means.  My test subject was this Conductor named Ganpatrao Sayajirao Shinde.

Stop wars, spread happiness and cheer with a Cadbury 5 Star

No I didn't know Ganpatrao, I had met him only today when I climbed aboard Route No.33 from to Goregoan Station.  As I said above, the temperature was hot and the bus was filled to seams.  Again a perfect setting for my little Nobel experiment.  I sat in the 5 row right in the middle and was hoping for some major fight to begin. The atmosphere in the bus was like a dormant volcano which would suddenly start erupting.  And I was waiting ! Now Mumbaikars are a very proud lot, they dont generally fight over non-issues like price rise, inflation, corruption or politics.  No they leave this fights to the TV anchors and political commentators, who by the way, do a superb job for them. They dont even fight over seats or rather politely offer them to the ladies and old persons.  But even the great Achilles had a weakness in his heel and Mumbaikars weakness is 'Change' or 'chutta' but they do fight over a petty thing 'Change' 

Mumbaikar may generally spend hundred or thousands of Rupees in a night on a party or on lunch or something but for his Rs.10.00 if the ticket is Rs.9.00 he wants his Rs.1.00 back.  He deems this as his constitutional right and believes that 'Change' is his fundamental right and he would die for it.  Now our Ganpatrao is a hapless Government servant working in the BEST and has to empty his purse everyday before the head cashier at the depot before leaving his duties for the day.  Any shortage in Ganpatrao's purse has to be met by his pocket.   And it will be stupid for any self righteous man to pay for the shortage from his own pocket and Ganpatrao is not stupid. So he deems it his right to take exact change from the bus traveller.  This is where the battle lines are drawn and a minor war could flourish. A la 'World War BEST'

Now this 'Change' or 'Chutta' becomes a paradigm shifting, cataclysmic object in a bus filled to seams in the month of May with temperatures hovering at 38 degrees.    The rush, the heat and over and above it the fundamental right to the 'Change' or 'Chutta' becomes a potent mixture which chemistry student would find hard to decipher.  The immediate cause for this 'WWB' is a person who nonchalantly hands over a Rs.10.00 note and asks ticket for next stop.  Ganpatrao, who is under control right up to this moment even more nonchalantly says Chutta de do (Give change).  Now the ticket for next stop is Rs.7.00 so either Ganpatrao has to give Rs.3.00 back or the rider had to give Rs.7.00 change.

Looks simple right, but both sides refuse to budge and soon the voice levels in the bus are crossing 110 dBs.  Like the WWII even this WWB has two sides, the Allies and the Axis.  The Allies are those who side with the traveller and demand Ganpatrao to give change and Axis are those who sympathise with Ganpatrao.  The war starts with minor swear words and starts to build on similar to a Aeroplane taxiing away.    Choicest swear words began to fly off from either side like the torpedoes and Messerschmitts  in the WWII.

Stop wars, spread happiness and cheer with a Cadbury 5 Star

The atmosphere is very volatile in the bust but thankfully it has not yet come to blows.  This is where I step in with my experiment of Mumbai May Heat and Cadbury 5 STAR.  In all the conundrum going on, I manage wriggle out two Cadbury 5 STARs out of my pocket and discretely pass it out to the traveller and Ganpatrao.  I have to be discrete because buying 5 stars for the full BEST bus would have been financially catastrophic for me.

I nudge, both the traveller and Ganpatrao with a 5 STAR each.  The moment I nudge it to them, the looks on their faces would have put a established bollywood actor to shame.  Both start giving out each and every frame of the 'Nava Rasas' or aesthetics. The features start with 'Raudram' or anger, turn to 'Adbhutam' or amazement and 'Bibhatsam' or disgust and finally turn to 'Hasyam' or comic relief with the other 5 rasas peppered in between.  The Hasyam or the laughter turns into a infectious one with all the parties joining in. Both the traveller and Ganpatrao deftly chew away at the Cadbury 5 STAR like there is no tomorrow and in the meantime, the other passengers manage to arrange for the 'Change' or 'Chutta' that was the cause of this 'WWB'

Now I am not interested in the Rasas or the Chutta but I get what I wanted.  A 5 STAR has truly and faithfully enforced peace and brought laughter to full BEST bus filled to seams in very very hot and dry Mumbai.  I stand proved that my theory is very very concrete and doable in rest of the world.  So world, here I come with my gamechanging solution for human emotions.

PS Sadly nobody has nominated me for Nobel Prize as of yet, but not to worry, I am waiting patiently for my number with plenty of CADBURY 5 STARS to keep me company.

This is a fun and humor article filed under #CONDITIONSERIOUSHAI and my attempt to cure Mumbai of some of its ills :P

Saturday 22 February 2014

CCNA 4 Chapter 1 v5.0 Exam Answers

CCNA 4 Chapter 1 v5.0 Exam Answers 2014

CCNA 4 Chapter 1

 

1.
What are two structured engineering principles necessary for successful implementation of a network design? (Choose two.)
quality of service
availability
security
resiliency
modularity

____________________________________________________________________
2
What is an important first consideration when starting to design a network?
access security
size of the network
protocols to be used
type of applications
____________________________________________________________________
3
Which two devices would commonly be found at the access layer of the hierarchical enterprise LAN design model? (Choose two.)
modular switch
access point
Layer 3 device
firewall
Layer 2 switch
____________________________________________________________________
4
A network engineer wants to redesign the wireless network and make use of wireless network controllers that manage the many deployed wireless access points. In which network design module of the campus network architecture would the centralized wireless network controllers be found?
enterprise edge
access-distribution
services
data center
____________________________________________________________________
5

Refer to the exhibit. Which type of Cisco hierarchical LAN design model is used at school site 1?
7 layer
three-tier
3 layer
two-tier collapsed core
____________________________________________________________________
6
In a hierarchical network design, which layers may be combined into a collapsed core for smaller networks?
core, distribution, and access
distribution and access
core and access
core and distribution
____________________________________________________________________
7
The network design for a college with users at five sites is being developed. Where in the campus network architecture would servers used by all users be located?
access-distribution
services
enterprise edge
data center
____________________________________________________________________
8
What is one advantage to designing networks in building block fashion for large companies?
redundancy
increased network access time
failure isolation
mobility
____________________________________________________________________
9
What is creating a new challenge for IT departments by changing the border of the enterprise network?
energy costs
company-owned desktops
access layer switching
tablets
____________________________________________________________________
10
Fill in the blank. Use the abbreviation.
Under the Cisco Enterprise Edge module, the submodule that provides remote access including authentication and IPS appliances is the and remote access submodule.
VPN
____________________________________________________________________
11
Which approach in networking allows for network changes, upgrades, or the introduction of new services in a controlled and staged fashion?
modular
borderless
static
network module
____________________________________________________________________
12
Refer to the exhibit. Which type of ISP connectivity to the service provider edge is being used by company A?
dual-homed
dual-multihomed
multihomed
single-homed
____________________________________________________________________
13
Which three network architectures have been introduced by Cisco to address the emerging technology challenges created by the evolving business models? (Choose three.)
Cisco Enterprise Campus
Cisco Enterprise Branch
Cisco Enterprise Edge
Cisco Borderless
Cisco Data Center
Cisco Collaboration
____________________________________________________________________
14
Which network module is the fundamental component of a campus design?
services module
access-distribution module
enterprise edge
data center

 

 

CCNA 4 Chapter 1,ccna

CCNA 4 

Friday 21 February 2014

How to Clean An Infected Computer


How to Clean An Infected Computer
The truth is that it's a lot easier to keep a computer malware free than it is to clean one that is already infected. However, with the advice given in this article you should be able to remove any type of malware from your computer and get it back to working order. The main problem with most malware removal guides is that you have no way of knowing if all of the infections were removed. However, with my approach you can easily tell if even just running a single scanner was able to entirely clean the infection. Thus, this can save you the hassle of having to run many different scanners and the uncertainty of whether your computer is really malware free.

Make sure you follow this article in order so as to clean the infections with as little work as possible. The idea is that most people won't have to go any further than the first approach in order to clean their computers of active malware. Thus, effectively this article is actually much shorter than it appears to be.

However, before attempting to remove any infected files you should first back up all important files. These may include documents, pictures, videos, etc... This way if anything goes wrong with the cleaning process, which is a very real possibility, your important documents will still be intact. However, do not include any program files as it is possible that these may be infected. Please note that if your computer cannot boot you should follow the advice on this page in order to back up all important files. Also, while cleaning the computer it's important to remember that all scanners can sometimes be guilty of false positive detections. Therefore, before removing any files which you believe could possibly be safe, you should check them using the methods I discuss in How to Tell if a File is Malicious.

Index

1. Make Sure Computer Is Actually Infected
2. How To Clean Your Computer And Make Sure It's Actually Clean
    ​A) Clean Computer With CCE and TDSSKiller
    BIf Still Not Clean Then Scan With HitmanPro, Malwarebytes, And Emsisoft Anti-Malware
    C) If Needed Try These More Time Consuming Methods
    D) If Necessary Make A Bootable Disk
3. What To Do If The Above Methods Are Unable To Clean Your Computer
4. What To Do After All Malware Is Confirmed To Be Removed

1. Make Sure Computer Is Actually Infected


Before attempting to clean any infections from your computer it's important to make sure that the computer is actually infected. To do this please follow the advice I give in How to Know If Your Computer Is Infected. If the results of this do in fact show that your computer is infected then continue to follow the steps in the next section. Make sure that you follow them in order.

2. How To Clean Your Computer And Make Sure It's Actually Clean


Please note that advanced users may just want to skip to the last part about how to Make A Bootable Disk and clean the computer that way. This approach is the one which is most powerful, but it is also one of the more time consuming approaches. That said, if you wish you can jump directly to that section and then come back to the beginning again if the infection is not entirely removed.

A) Clean Computer With CCE and TDSSKiller
Download Comodo Cleaning Essentials (CCE). Make sure to select the correct version for your operating system. If you're not sure if your computer is running a 32 or 64 bit operating system then please see this FAQ. Also, download Kaspersky TDSSKiller . Note that if neither will not download correctly, or your internet connection is not working, you should download them on another computer and transfer them to the infected one via a flash drive. Make sure there were no other files on the flash drive. Be careful with the flash drive as the malware may actually infect it when you plug it into the computer. Thus, don't plug it into any other computers after transferring these programs. Also, I would like to point out that both programs are portable. This means that once you're done using them no uninstall is required. Just delete their folders and they will be gone.

After downloading CCE unzip the file, open the folder for CCE, and double click on the file called CCE. This will open the main program for Comodo Cleaning Essentials. If it refuses to open then hold down the shift key and, while still holding it down, double click on the file called CCE. After CCE has successfully opened you can let go of the shift key. However, do not let go of it until the program has fully loaded. If you let go of it even during the UAC popup it may not be able to forcefully open correctly. Holding down shift should allow it to open, even on heavily infected computers. It does this by killing most of the unnecessary processes that could be interfering with its launch. If it still will not launch then download and run a program called RKill. This program will terminate known malicious processes. Thus, after running it CCE should be able to open fine.


Once it's opened perform a "Smart Scan" with CCE and quarantine anything it finds. This program also scans for system changes which may have been caused by malware. These will be shown with the results. I would advise letting it fix these as well. Restart your computer when prompted. After the computer restarts run Kaspersky TDSSKiller, perform a "Smart Scan", and quarantine anything it finds. If anything was quarantined restart your computer once more.

Also, if your internet connection was previously not working please check again to see if it is now working. If not then you should go to this section of my guide about How to Fix a Malware Infected Computer and follow the advice given to fix your internet connection. A working internet connection is required for the remaining steps of this section.

Once you have verified that your internet connection is working, again open CCE. Hopefully it will open up normally this time, but if not then open it while holding down shift. Then open up KillSwitch from the tools menu in CCE. In KillSwitch, select the option to "Hide Safe Processes" from the "View" menu. Then right click on all processes which are flagged as suspicious or dangerous and select the option to delete them. You should also right click on any unknown processes that remain and select the option to "Kill Process". Do not delete processes flagged as FLS.Unknown. Next, open up Comodo Autoruns from the tools menu in CCE, and select the option to "Hide Safe Entries" from the "View" menu. Then disable any entries belonging to files which are flagged as suspicious or dangerous. You can do this by making sure the check box next to the entries is unchecked. You should also disable any entries flagged as FLS.Unknown, but which you believe likely belong to malware. Do not delete any entries. 

Now restart your computer. After it reboots, again check your computer using the advice I give in How to Know If Your Computer Is Infected. If all is well then you can skip to the section about What To Do After All Malware Is Confirmed To Be Removed. Remember that a disabled registry entry is not a risk. Also, note that even if your computer is found to be clean of active infections there could still be pieces of malware on your computer. These are not dangerous, but don't be surprised if running another scanning program still detects malware on your computer. These are the inactive remnants of what you have just removed. If you are not comfortable having these remnants on your computer then you can remove the vast majority of them by scanning with the programs in the next section.

However, if your computer is not yet clean of active infections, but at least one of the programs was able to run, then go through the steps outlined in this section once more and see if that is able to remove the infections. However, if neither program was able to run please continue to the next section. In addition, if even following the advice in this section a second time is not enough to clean your computer you should continue to the next section.

B) If Still Not Clean Then Scan With HitmanPro, Malwarebytes, And Emsisoft Anti-Malware
If the above steps failed to fully remove the infections then you should download HitmanPro  Install the program and run a "Default Scan". Note that if it will not install please continue to the next paragraph and install Malwarebytes. During the installation of HitmanPro, when asked I would recommend you choose the option to only perform a one-time check of the computer. This should be suitable for most users. Also, if malware prevents it from loading correctly then open the program while holding down the CTRL key until the program is loaded. Quarantine any infections it finds. Please note that this program will only be able to remove infections for 30 days after it is installed. During removal you will be asked to activate the trial license.

Once all detected infections are removed by HitmanPro, or if Hitman Pro refused to install, you should download the free version of Malwarebytes  Note that it has chameleon technology which should allow it to even install on computers which are heavily infected. During installation I would advise that you uncheck the box to "Enable free trial of Malwarebytes Anti-malware Pro". Make sure that it is fully updated and then run a quick scan. Quarantine any infections that it finds. If asked by either program to restart your computer, make sure that you restart it.


Next download Emsisoft Emergency Kit . Once it's finished downloading, extract the contents from the zip file. Then double click on the file called "start" and open the "Emergency Kit Scanner". When prompted allow it to update the database. Once it's updated select the option to go "Back To Security Status". Then go to "Scan now" and select the option to perform a "Smart Scan". Once the scan is complete quarantine all detected items. Restart whenever required.

After scanning your computer with these programs you should restart your computer. Then once again check your computer using the advice I give in How to Know If Your Computer Is Infected. If all is well then you can skip to the section about What To Do After All Malware Is Confirmed To Be Removed. Remember that a disabled registry entry is not a risk. However, if your computer is not yet clean then go through the steps outlined in this section once more and see if that is able to remove the infections. If the programs in part A of this section were previously not able to run correctly you should go back and try and run them again. If none of the above programs were able to run correctly please boot into Safe Mode with Networking and try scanning from there. However, if they were able to run correctly, and threats still remain even after following the advice in this section a second time, then you should continue to the next section.

C) If Needed Try These More Time Consuming Methods
If the above steps were not able to completely remove the infection then you likely have some very inhospitable malware inhabiting your machine. Thus the methods discussed in this section are much more powerful, but will take much longer to complete. The first thing I would advise doing is to scan your computer with another anti-rootkit scanner called GMER. It can be downloaded from Remove anything shaded in red. Make sure you do click on the Scan button once the program has finished its quick analysis of the system. Also, if you're running a 32 bit operating system you should download a program to scan for and remove the ZeroAccess rootkit. Information about this rootkit, and a link to a program to remove it from 32 bit systems. The AntiZeroAccess tool can be downloaded from the link in the second paragraph.

After scanning with the above programs you should next open CCE, go to the options, and select the option to "Scan for suspicious MBR modification". Then select OK. Now perform a full scan with CCE. Restart where requested and quarantine anything it finds. Note that this option can be relatively dangerous as it could possibly identify problems where there are none. Use it carefully and make sure everything important is already backed up. Note that in rare cases scanning with these options may render your system unbootable. This rarely happens, but even if it does it should be fixable. If running this scan renders your computer unbootable please see this section of an article I wrote about How to Fix a Malware Infected Computer. It should be able to help make your computer bootable again.

Once CCE has completely finished, again open up CCE while holding down the SHIFT key. This will kill most unnecessary processes which may be interfering with your scans. Then open KillSwitch, go to "Tools", and choose the option to "Hide Safe Processes". Now, once again delete all dangerous processes. Then, you should also right click on any unknown processes that remain and select the option to "Kill Process". Do not delete them. You should follow the advice in this paragraph each time you restart your computer in order to make sure that the following scans are as effective as possible.


After killing all processes not verified to be safe you should open HitmanPro while holding down the CTRL key. Then perform a "Default Scan" and quarantine anything it finds. Then perform full scans with Malwarebytes and Emsisoft Emergency Kit. Quarantine anything they find. Then download the free version of SUPERAntiSpyware from this page. During installation be very careful as other programs come bundled with the installer. On the first page make sure to uncheck both options about adding Google Chrome. Then click on the option for "Custom Install". During the custom install you will once again have to uncheck two boxes about adding Google Chrome.

Other than that the program will install fine. When asked I would recommend that you decline the option to start a free trial. Once the program is fully loaded select the option to do a Complete Scan and click on the button to "Scan your Computer...". Then click on the button to "Start Complete Scan>". Remove all detected files and restart wherever required.

After following these steps you should restart your computer. Then once again check your computer using the advice I give in How to Know If Your Computer Is Infected. If all is well then you can skip to the section about What To Do After All Malware Is Confirmed To Be Removed. Remember that a disabled registry entry is not a risk. However, if your computer is still not clean then go through the steps outlined in this section once more and see if that is able to remove the infections. If it is not then you should continue to the next section.

D) If Necessary Make A Bootable Disk
If the above methods were not able to completely remove the infection, or you cannot even boot your computer, then you may need to use a bootable CD/Flash-Drive, also called a bootable disk, to clean your computer. I know this may sound complicated, but it's really not that bad. Just remember to create this disk on a computer that is not infected. Otherwise the files may be corrupted or even possibly infected.

Because this is a bootable disk no malware can hide from it, disable it, or interfere with it in any way. Thus scanning in this way, with multiple programs, should allow you to clean almost any machine, no matter how infected it may be. One exception to this is if the system files on the machine have themselves been infected. If this is the case then removing the infection may cripple the machine. It's largely for that reason that you backed up all important documents before starting the cleaning process. That said, sometimes it's possible to get around that by following the advice I give below.


To do this you should download the Shardana Antivirus Rescue Disk Utility (SARDU). This is an excellent program which will allow you to create a single rescue disk with multiple antivirus programs on it. It also has many other useful functions, which I will not be discussing in this article. A few very useful tutorials for SARDU can be found on this page. Be very careful about the added offers now included with the installer. Sadly, this program now tries to trick people into installing extra programs, which are largely unnecessary.

After downloading it extract the contents and open the SARDU folder. Then open the correct executable for your operating system, either sardu or sardu_x64. Under the Antivirus tab click on whichever antivirus applications you would like to add to your disk. You can add as many or as few as you wish. I would recommend that you scan your computer with at least Dr. Web, Avira AntiVir Rescue System, and Kaspersky Rescue System. One of the nice things about Dr. Web is that it sometimes has the option to replace an infected file with a clean version of it instead of just deleting it. This may allow you to clean some infected systems without crippling the computer. Thus I'd strongly recommend including Dr. Web in your bootable disk.

Clicking on the names of the various antivirus applications will often direct you to a page where you can download the ISO for that particular antivirus. Sometimes it will instead give you the option to download it directly through SARDU, which can be found under the Downloader tab. If given the choice always select the option to download the ISO. Also, after downloading the ISO you may need to move it to the ISO folder inside the main SARDU folder. Once you have moved all of the ISO's, for the antivirus products you would like to include, to the ISO folder, you are ready to create the rescue disk. To do this go to the Antivirus tab and make sure that all desired antiviruses have a check next to them. Then either click the button to make a USB or make an ISO. Either will work fine. It just depends on whether you want to run this off of a USB drive or a disk.

After creating your rescue disk you will likely need to change the bootup sequence in your BIOS settings to ensure that when you insert the bootable CD, or flash-drive, the computer will boot from it instead of from the normal operating system. Here is a useful article on How To Change the Boot Order in BIOS. For our purposes you should change the order so that the "CD/DVD Rom drive" is first if you want to boot from a CD or DVD, or that "Removable Devices" is first if you want to boot from a flash-drive. Once that's done just follow the advice given in this other article about How To Boot From a CD, DVD, or BD Disc in order to boot from the rescue disk.


After booting from the disk you can select whichever antivirus you want to first scan your computer with. As I previously mentioned, I would recommend starting with Dr. Web. Once it's finished, and you have repaired or deleted everything it finds, you should shut down the computer. Then make sure to again boot from the disk and then scan with another antivirus. Continue this process until you have scanned your computer with all of the antivirus programs you have put on the rescue disk.

After cleaning your computer with whichever programs you've put on the disk you should now try booting your system into Windows again. If it is able to boot into Windows then check your computer using the advice I give in How to Know If Your Computer Is Infected. If all is well then you can skip to the section about What To Do After All Malware Is Confirmed To Be Removed. Remember that a disabled registry entry is not a risk.

If your computer is not yet clean, but you are able to boot into Windows, then I would recommend trying to clean your computer from inside windows, starting from this section of this article and following the suggested methods. However, if your computer is still not able to boot into Windows then again try fixing it by following the advice in this section of an article I wrote about How to Fix a Malware Infected Computer. It should be able to help make your computer bootable again. If even that can't make your computer bootable then try adding even more antiviruses to the boot disk and then rescanning your computer. If doing that still does not work then please read the next section.

3. What To Do If The Above Methods Are Unable To Clean Your Computer


If you followed all of the above advice and were still not able to clean your computer, but you're convinced that the problems are due to malware, then there's not much more I can do to help. I'm actually hoping that nobody ever reaches this section. This article is meant to allow you to completely clean an infected computer. Thus I'd really appreciate it if you could leave a comment below that explains what you tried to do in order to clean the computer, and what symptoms remain that make you think that your computer is not yet clean. This is very important in order for me to improve the article.


You can also seek advice from a specialized malware removal forum. A forum which I have found to be very helpful is MalwareTips. However, if even after seeking help on a malware removal forum your computer is still not free of malware, it may be necessary to format your computer and start over. This means that you will lose anything on the computer which you did not back up. Make sure that if you do this you do a complete format of your computer before reinstalling Windows. This will be able to destroy almost any type of malware. Once Windows is freshly installed please follow the steps in the next section.

4. What To Do After All Malware Is Confirmed To Be Removed


After confirming that your computer is now clean you can now try to repair any damage that may have been caused. For this I have written an article about How to Fix a Malware Infected Computer. Please follow the advice in this article in order to fix any damage that was caused by the infection. If after doing this your computer is running fine, then you can also open Comodo Autoruns and select the option to delete those registry items you had previously only disabled. This way they will no longer be on your computer at all.


Once you have successfully cleaned all infections from your computer, and repaired any leftover damage, you should take steps to ensure that it does not happen again. For this reason I have written a guide about How to Stay Safe While Online. Please read through it and implement whichever methods you feel best fit your needs.

After securing your computer you can now restore any of the previously backed up files that were lost during the cleanup process. Hopefully this step is also not necessary. Also, before restoring them make sure that your computer is very well protected. If you don't lock the computer down strongly enough then you may inadvertently infect it and again have to clean the infections from the computer. In addition, if you used a USB drive to transfer any files to the infected computer you can now plug that back into the computer and make sure there is no malware on it. I would recommend doing this by deleting all files left on it.



 

If you have any problems, or are confused by my directions, please leave a comment below and I will try to help you. Trust me, if you are having a problem then so are many others. I need to know this so that I can improve the advice in this article. Also, I do realize that there are a plethora of programs that can be used to clean an infected computer. I have selected these particular programs, and arranged them in such a way as to emphasize their positive qualities while at the same time compensating for their weaknesses, in an attempt to simplify the malware removal process. Please let me know if you see any problems with the approach I have outlined.
In addition, please help by rating this article. If you believe this article deserves anything less than 5 stars, please leave a comment below explaining how you think it can be improved or where you find fault. This article is written by me but fueled by the community. Thus your opinions and advice are not only much appreciated, but actually necessary in order for this article to grow and improve.