Infinity Tech New

Embed Size (px)

Citation preview

  • 8/14/2019 Infinity Tech New

    1/31

    1

    October

  • 8/14/2019 Infinity Tech New

    2/31

    2

    Infinitytech MagazineTechnically advance

    Infinitytech.co.in

    Copyright@ 2009 infinitysoft.co.inAll right reserve

    All text and context in this book solely owned by infinitysoft.co.in .Reproduction without permission in any form is illegal .

    Get your own free personalized copy of this book from

    www.infinitysoft.co.in

  • 8/14/2019 Infinity Tech New

    3/31

    3

    Editors pen

    As we all know that programmingindustry is getting tougher rapidlyand as a result of that the necessityof freelance programmers andcontract programmers is beingsensed vastly. In a professionalsoftware development firm, theprogrammers expertise modulewise. Some times it is viewed that,such programmers are unable to

    work at different module in sameproject.

    Hence the concept of freelancep r o g r a m m i n g o r c o n t r a c tprogramming arises in recentp r o g r a m m i n g a r e n a . T h e s econtract programmers are really veryknowledgeable and have greatexpertise in web programming aswell as the software developmenti n d u s t r y . T h e s e f r e e l a n c eprogrammers can judge the taskeasily through their years ofexpertise, and are in an faster able tosolve the problems manner.

    These freelance programmers mayfollow single programming languagelike PHP, Dot Net, Java etc. buttheir skills reside in interface design,

    form processing, navigation main-taining, error handling, databasehandling, HTML development andalso visual representation makesthem famous in the softwaredevelopment industry .

    Advantages of contractprogramming in softwaredevelopment industry

    Shashwat [email protected]

  • 8/14/2019 Infinity Tech New

    4/31

    4

    Table of contents

    Editor speak

    Devil facts

    Programmers Area

    Career Guide

    Learn Linux

    Software of the month

    Hardware/Software Problem

    Know your hard disk

    Help Line

  • 8/14/2019 Infinity Tech New

    5/31

    5

    Devil Fact

    Cyber criminals Flock to the Internet

    and to a Computer in Your Home or

    Business..

  • 8/14/2019 Infinity Tech New

    6/31

    6

    Organized crime seems too be extremely active in the scamknown as "phishing" in which they send emails under the guise of

    being a financial institution or other legitimate organization. Inthe email they ask unsuspecting victims to verify personal informa-tion such as account numbers and passwords. They will target homeusers who have become the weakest link and they target their vic-tims much more closely than before, by tracking down full namesand personal interests. They also skim social networking sitesand personal websites where most people have left a digitalfootprint that can be mined .

    Criminals are increasingly trying to trick citizens into giving themtheir bank account details, according to a published survey which

    showed such "phishing" attempts almost doubled in the first sixmonths. Over 157,000 unique phishing messages were sent outaround the world in the first half of 2006, an increase of 81 percentcompared with the six-month period to end-December 2005. Eachmessage can go to thousands or hundreds of thousands ofconsumers, according to the bi-annual Internet Security ThreatReport from security software vendor Symantec.

    Another trend in the first half of the year is that phishes havebecome more sophisticated, dodging spam filters and other defensemechanisms designed by provider sand software companies to keepout the criminals.

    How much financial damage phishes have caused is unclear andusually at an individual level, which is why phishing does not get thesame media attention as "denial of service attacks" aimed to takeout a specific website, or email worms which can shut down millionsof computers in a digital equivalent of a carpet bombing. Theinternet is still under fire from such attacks, taking about 6,110different denial of service hits every a day, but unlike a few yearsago they cause less damage.

    A successful 'denial of server' attack or worm can have ramificationsfar beyond phishing. Worms have taken down electricity grids. That'swhy critical infrastructure is now much more resilient. Informationtechnology managers are better prepared and networks are morerobust," Whitehouse said.

    Devil Fact

  • 8/14/2019 Infinity Tech New

    7/31

    7

    Increased focus on security, and a willingness from software compa-nies to own up to their mistakes has dramatically cut down the timethat computers are at risk, Symantec found. For example, Internet Ex-plorer, the world's most popular browser from Microsoft, has cut thenumber of days in which hackers can exploit a security flaw to nine

    days from 25 days six months earlier. Security holes in browsers fromOpera and Mozilla Firefox are patched within two days and one day re-spectively.

    Because cyber predators and other cybercriminals are becomingsmarter and more sophisticated in their operations, they are realthreats to your personal security and privacy. Your money, your com-puter, your family, and your business are all at risk. These cybercrimi-nals leave you with three choices:

    1. Do nothing and hope their attacks, risks, and threats dont occur onyour computer.

    2. Do research and get training to protect yourself, your family, andyour business.

    3. Get professional help to lockdown your system from all their attacks,risks, and threats.

    Remember When you say "No!" to hackers and spyware, everyonewins! When you don't, we all lose!

    Ratnakar [email protected]

    Space for ads

  • 8/14/2019 Infinity Tech New

    8/31

    8

    Programmers AreaBy the programmers for the programmers

  • 8/14/2019 Infinity Tech New

    9/31

    9

    Customizable Web PagesAn universal approach to almost every webpage

    I am mostly a man who wants to see the real implementation ofthings, I mean there practical and real world implementation, in Geek

    speaks Encapsulation of the data. So most of my development are/were based on the way a product or an application can ease the life ofthe basic users, because ultimately they are the people who pro-nounce the success and failure of a product in market, the more Userfriendly your product is, the more laymen usage of your product willbe.

    Just a few weeks back I started off with a concept to be implementedand deciphered soon, I will come to that later on. Now that conceptstarted off with an idea, rather say an Psychological approach of con-

    structing a social platform. I studied blogs,feeds,reviews and videosof people who actively are associated with this whole criticism of ITand Web 2.0 arena.(By the way some really good Tech Blogs and por-tals which can keep you Up to Date with the latest Geek stuffs andhappenings in this Web World are: www.techcrunch.comwww.webuser.co.ukwww.networkcomputing.comwww.webopedia.com www.internet.com

    Now the outcome of this Research was that I get to know that now adays people really want to get there things Customized be it the skinof their iPhone or having their Gmail theme and gadgets in place. But

    there is restriction, I mean this whole customization of your personalstuff is offered by very limited web players, the Giant Google of coursewith there Gmail personalisation wherein a user can add gadgets fromGoogle Labs, customize the shortcut keys for saving drafts, adding alabel or be it choosing the background for their Gmail or theme perseethe there is iGoogle,what more... up to a certain extent by Face-book just that it allows you to Hide/Show certain posts/updates.But still they have this interface architecture defined by them whichbounds you to the things which they want you to get displayed onyour profile, not something completely on your own. Let our imagina-

    tion get wild, now think something like an Compilation of web pages,rather Web applications....on a SINGLE webpage......now you mightthink I am suggesting you to create an web page of your own (By theway pick up the last addition of this magazine to learn how to Makeyour own website in just days),no my friend thats where the funcomes, you dont need to make a page of your own, just imagine ifyou

  • 8/14/2019 Infinity Tech New

    10/31

    10

    can personalize each and every webpage that you see, be it somenews channel, some radio junction or any other social networking site(Even if they dont provide you with the liberty of customising the waythe profile looks),even wilder, imagine if you can merge the Updatesof your friends from Facebook,the latest Email notifications from

    Gmail,recent RSS feeds from Suns website and the most watchedvideo on you tube for the day. Isn't that fun, now you may ask me thatwhat about the privacy issues, why will these sole owners of thecontents allow me to do so, the answer is Alias (Will get to that later).

    It is maybe you can say, a wilder or a more creative form of iGoogle,you can play around with things you want, shift the contents from oneside to another and the fact is it is not dependent upon the serviceprovider, say the links at the top of iGoogle Web Images News GroupsBooks Scholar Gmail, but Google doesnt allow you to change, modifyor move them around, do they no since thats in there hand, whatservices they want to provide to you.Alias what I was talking about previously is a mere web space whereyou can put all you want, the changes you want to see in your ownCustomizable webpage. It can be achieved by using a proxy server.Let me elaborate each aspect, tool and services and terms specificallywhich shall be used in for this purpose.What is a Proxy server: A proxy server has two purposes: To keep machines behind it anonymous (mainly for security)

    To speed up access to a resource (via caching). It is commonly usedto cache web pages from a web server

    Firewall reasons : The proxy server is an additional layer of defenceand can protect against some OS and Web Server specific attacks.However, it does not provide any protection to attacks against the webapplication or service itself, which is generally considered the largerthreat.

    A proxy server that passes requests and replies unmodified is usuallycalled a gateway or sometimes tunnelling proxy. So we will modifythis aspect in which the proxy server DOES manipulate or modify thecontent that the user wants. That why it is better to call it as aContent Proxy with customizable user content1.This content proxy shall receive a request from the client (A client isa user which sends a request for a webpage), then it forwards thisrequest on the behalf of the user to a thing called Scaper whichextracts the DOM of a webpage by fetching a webpage from globalserver.

  • 8/14/2019 Infinity Tech New

    11/31

    11

    2.This fetched DOM is then sent to the content proxy to getmanipulated,the content proxy has its rules and configuration formanipulating the webpage.It may provide a GUI to the user so as towhat manipulation and addition user wants,this gives the scope of thisapplication to diversify enormously, since there is no end to what sort

    of customizations users wants to see in their webpage.3 After the manipulations the webpage is then sent by the contentproxy to the user,as fully customized one,but specifically for a user inits own session.

    Nowdont get worried due to all those heavy and alien terms if youhappen to be unaware of them,read below,I shall explain them:What is a Scraper:A web scaper is a application or a software which extracts usefulinformation out of sites,at the back end and then it can form a totallynew Scraper site on which there is content gathered and compiled

    onto it.Like those sites which are especially meant for advertising inwhich there is no original content,you may call a search engine as aScraping site using bots for scraping the www for data.In our case weuse the scraper to extract and fetch the webpage from the www.What is DOM:A DOM typically elaborated as Document Object Model is thedescription of how a webpage is stored displayed/rendered as anHTML page. Objects under the DOM (also sometimes called"Elements") may be specified and addressed according to the syntaxand rules of the programming language used to manipulate them.

    That's one of our purpose in the entire flow, to manipulate the DOM,itcan be achieved easily by Javascript.

    DOM process-

    ing, manipula-

    tions, rules,

    Request.htm

    Request*.htm(Thechanged webpage as de-

    The scraping

    engine,it shall

    take care of all

    the parsing and

    scraping to be

    url

    DOM

    Content Proxy

    (Since it filters the request)

    Amar Deep [email protected]

  • 8/14/2019 Infinity Tech New

    12/31

    12

    Algorithms As A TechnologyThink computer were infinitely fast and computer memory wasfree. Would you have any reason to study algorithms? The answer isyes. Of course computers may be fast, they are not infinitely fast.

    And memory may be cheap, but it is not free. Computing time istherefore a bounded resources and so is space in memory. These re-sources should be used wisely, and algorithms that are efficient interms of time or space will help do so. Total system performancedepends on choosing efficient algorithms as much as on choosingfast hardware. Just as rapid advances are being made in other com-puter technologies, they are being made in algorithms as well.

    Analyzing an algorithm has come to mean pre-dicting the resources. Occasionally, resources such as memory, com-munication bandwidth, or computer hardware are of primary con-cern, but most often it is computational time that we want to meas-ure.

    The number of steps an algorithm requires tosolve a specific problem is denoted as the computational time or run-ning time of the algorithm. The notion of a step refers to an underly-ing machine model. The machine must be able to execute a singlestep in constant time.

    In general, the computational time depends onthe size of the problem and on the respective input.

    Example: The computational time of a sorting al-gorithm grows if the length of the input sequence grows. If the input

    sequence is presorted, compared to an unsorted sequence possiblyless steps are sufficient.

    In order to evaluate an algorithm independentlyof the input, the notion of time complexity is introduced. The timecomplexity T(n) is a function of the problem size n. The value of T(n)is the running time of the algorithm in the worst case, i.e. the maxi-mum number of steps it requires with an arbitrary input.

    Sometimes the behavior on the average case isconsidered, i.e. the mean number of steps required with a large num-ber of random inputs.

    Example: The sorting algorithm insertion sorthas a worst case time complexity of T(n) = n(n-1)/2 comparison-exchange steps to sort a sequence of n data elements.Often, it is not necessary to know the exact value of T(n), but only anupper bound can be estimated.

    Ashok kumarMCA B7(ER&DCI-IT)

  • 8/14/2019 Infinity Tech New

    13/31

    13

  • 8/14/2019 Infinity Tech New

    14/31

    14

    Timeline : 53 Years of Hard DrivesOver the past five decades, hard drives have come a long way. Travelthrough time with us as we chronicle 50 milestones in hard-drive de-

    velopment--fromproduct firsts to new technologies, and everything inbetween.1956 : IBM ships the first hard drive in the RAMAC 305system. The drive holds 5MB of data at $10,000 a mega-byte. The system is as big as two refrigerators anduses 50 24-inch platters.

    1961:IBM invents heads for disk drives that "fly" ona cushion of air or on "air bearings." The IBM 1301Disk Storage Unit, with its larger capacity, flexibility

    and speed, greatly expanded the operational capabil-ity of the IBM 7000 series of computers (7070, 7094,7080 and 7090).

    1973:IBM announces the 3340, the first modern"Winchester" hard drive, which has a sealed assembly,lubricated spindles, and low-mass heads.

    1979:IBM's 3370 use seven 14-inch platters to store571MB, the first drive to use thin-film heads.

    1979: Seagate introduces the ST-506 drive and interface,which is then used in all early microcomputer imple-mentation

    1991 :IBM introduces the 0663 Corsair, the first diskdrive with thin film magneto resistive (MR) Heads. Ithas eight 3.5-inch platters and stores 1GB. (The MRhead was first introduced on an IBM tape drive in1984.)

    1998: IBM announces its Micro drive, the smallest harddrive to date. It fits 340MB on a single 1-inch platter.

  • 8/14/2019 Infinity Tech New

    15/31

    15

    2006 : Seagate releases the Barracuda 7200.10,at 750GB the largest hard drive to date.

    2009: Hitachi Global StorageTechnologies announcement of a1-terabyte hard disk drive. Thedrive ships in the first quarter of2007. The drive, called the Deskstar 7K1000.

    2009 : Hitachi Global Storage Technologies Inc.launches the world's first 2TB(Tera Byte), 7200RPM hard disk drive, the Deskstar 7K2000.The

    By the end of the 20th century, internal drivesbecame the system of choice for computers run-ning Windows, while external hard drives re-mained popular for much longer on the AppleMacintosh and other professional workstationswhich offered external SCSI ports. Apple madesuch interfaces available by default from 1986and 1998. The addition of USB and Firewire in-terfaces to standard personal computers ledsuch drives to become commonplace in the PCmarket as well.

    Rakesh Kumar(MCA B8 ER&DCI-IT)

    Linux revolution

    Visit

    Infinitysoft.co.in

  • 8/14/2019 Infinity Tech New

    16/31

    16

    Changing Career - Things to Remember

    Doing the 'right job' has becomevery important these days. As a re-sult, people are observed makingmid-career moves every now andthen. It is no longer considered ta-boo to shift jobs even if one mayhave spent a decent amount oftime in a certain job. What is moreimportant for an individual is to en-joy what he does rather thanspending an inordinate amount oftime in a job he does not like do-ing?

    As a result, changing career be-comes imperative for a large num-ber of people every year. In thelast few decades, it is true that thechoice of careers has expanded be-yond imagination. One is no longerleft with just a few conven-tional career choices of being adoctor or a teacher or a banker. In-

    up that offer the combination of good money as well as a satisfyingwork profile. Before one embarks on a decision to change careers, it isessential to consider some points.

    1. Decide Which Career To Opt For: There are a whole lot of resourcesavailable on the internet or in books that talk about the various careerchoices in the job market. Before deciding on which career to opt for,one should conduct adequate research about the new job. This wouldbe important to ensure that once one changes his/her career to a newfield, it doesn't come across as an unpleasant experience.

    2. Tailoring the Resume: Once one decides on a new career avenue, itis important to tailor the existing resume to match the skill sets thatthe new career demands. One would also need to customize the cover-ing letter with regard to the specific company one applies.

  • 8/14/2019 Infinity Tech New

    17/31

    17

    3. Skill Enhancement: Although one's skills might be usable to a largeextent in the new career, there are times when changing careers re-quires certain skills to be enhanced as well. One might, for example,shift from sales to marketing which would require familiarity with mar-keting concepts. In such cases, one should either sign up for a short

    refresher course or take a brief sabbatical to get a specialized degreefrom a college before getting employment.

    4. Employing Patience: It is important to note that the path for chang-ing careers is strewn with rocks and stones, so patience is a virtue thatneeds to be adopted. It is easy to get frustrated when one fails to get apositive response from potential employers. However, one should notlose patience but keep on applying till one gets the job of his/her choice.

    In addition to the things listed above that discuss what one "should"do; there are a number of things to beware of. A random list of 'don'ts'

    is:

    - Do not confuse changing jobs with changing careers. Changing ca-reers is a major decision and should be taken only after sufficient re-search and thought has gone into it.

    - Changing careers only for money is a bad idea. In most cases, peoplefail to realize that there is a cost to pay for a higher compensation inthe form of more travel or longer working hours.

    - Changing careers to a new one without making a realistic assessmentof one's skills and strengths might be disastrous.

    Shailendra [email protected]

  • 8/14/2019 Infinity Tech New

    18/31

    18

    In this fast-changing technological world, sometimesyou are faced with some difficult choices. For instance,

    your current computer has matured to the ripe old ageof six months and has been deemed obsolete. Now it'stime to purchase a new computer and the question is,"Should I buy a laptop or a desktop?" so there laptophas some advantage over desktop .

    Desktop go to die!

    Mobility- Well, sure, it's the big one. If you need to work remotely, alaptop is the way to go. Remember that a 3G card from your cell phoneprovider can give you high-speed internet access in most urban areas.

    Upgrades -Speaking of upgrades, it's more difficult to upgrade a lap-top. In some cases, it's impossible: Sure, you can pop in a new harddrive later, but adding a second hard drive means plugging in an exter-nal disk that will be cumbersome to tote around with you.

    Storage- One of the major places where lap-tops and desktops differ is in how much harddrive space they offer. Laptops use physicallysmaller drives, which can only offer so muchstorage space. Though larger drives are avail-able, 100GB is still common on a laptop, while

    500GB desktop drives are seen all the time(again, bigger drives can be had). This is ahuge difference and it seems to be expanding,not contracting. If you have very large storageneeds, desktop is your best bet.

    Price - Expect to pay $300 to $500 more for a comparably equippedlaptop (though this varies widely).

    Peripherals -Remember that when you're in the office, you can alwaysplug in an external mouse, keyboard, and monitor to your laptop.

  • 8/14/2019 Infinity Tech New

    19/31

    19

    I obviously can't make the buyingdecision for you, but I'll reiteratemy computer plan in case youhaven't seen it before. I use both:a moderately-priced laptop is withme on a daily basis, syncing upwith an inexpensive desktop thatworks as a print and file server.The desktop works as a machinefor my daily backups, has plenty ofstorage for stuff I don't need totake with me on the road (or toother rooms of the house), hastwo printers hooked up to it,accepts incoming faxes, and

    otherwise stands as a backup incase something fails on my laptop.My laptop, however, is where I domost of my work.

    Sure I could get by with just a notebook PC, but having both makesthings so much easier.

    Shivendra KumarMCA B8 Er&Dci-IT

    Infinitysoft.co.in

    Every thing is different

  • 8/14/2019 Infinity Tech New

    20/31

    20

    Nikesh Arora oversees all revenue and cus-tomer operations, as well as marketing andpartnerships. Since joining Google in 2004,he has held several positions with thecompany. Most recently, he led Google'sglobal direct sales operations. He alsodeveloped and managed the company's

    operations in the European, Middle Easternand African markets and was responsiblefor creating and expanding strategicpartnerships in those regions for the benefitof Google's growing number of users andadvertisers. This will make him thetop-ranking (4th Position) Indian in Google.

    Nikesh AroraPresident, Global Sales Operations and Business Development in Google

    With a background as an analyst, Nikesh's main areas of focushave been consulting, IT, marketing and finance. Prior to joiningGoogle, he was chief marketing officer and a member of the man-

    agement board at T-Mobile. While there he spearheaded all prod-uct development, terminals, brand and marketing activities of T-Mobile Europe. In 1999, he started working with Deutsche Tele-kom and founded T-Motion PLC, a mobile multimedia subsidiary ofT-Mobile International. Prior to joining Deutsche Telekom, Nikeshheld management positions at Putnam Investments and FidelityInvestments in Boston.Nikesh holds a master's degree from Boston College and an MBAfrom Northeastern University, both of which were awarded withdistinction. He also holds the CFA designation. In 1989, Nikesh

    graduated from the Institute of Technology in Varanasi, India witha bachelor's degree in electrical engineering.

    Rajeev [email protected]

  • 8/14/2019 Infinity Tech New

    21/31

    21

    I remember whenever I've had to Interview for a position in the pastthe bit I always looked least forward to was the stage where theInterviewer asks me questions. The majority of which were easy toanswer as its very clear what information the Interviewer was look-ing for, but there were always the odd tough Interview Questionsthrown in to throw me out. Those coupe of tough Interview questionswere always difficult to answer as it was never clear what informa-tion the Interviewer was looking for.

    I've since beenworking in recruitment for some time and have beenthe Interviewer asking those tough Interview questions on many

    occasions. Its clear that many candidates still don't know what I'mlooking to hear from them. So I thought I'd cover some of the toughInterview Questions and ways to answer them.

    Interview Questions: What are your weaknesses?State a weakness but turn it into a positive: "At times I've beenconsidered too much of a perfectionist, I use to get irritated if I feltsomeone elses work on the project was below company standard,I've since learnt that I can't affect other peoples work so channel myenergies into making my work as high a standard as possible"

    Interview Questions: How have you managed to attend an Interviewin works time?

    "I didn't want to deceive my current employers, so I asked them if Icould take an unpaid day of leave to attend to a personal matter"

  • 8/14/2019 Infinity Tech New

    22/31

    22

    Interview Questions: How do you feel about carrying out repetitive ormundane work?

    "I appreciate every position has an element of repetitiveness but I

    take all aspects of my job seriously whether they are repetitive or notand always give 100%."

    Interview Questions: How do you handle Criticism?

    "At some point we all make mistakes, I'm always happy to take onconstructive criticism as this will help me perform better."

    Interview Questions: How long would it be before you would expect tobe promoted?

    "I couldnt give a time scale, I would want to prove myself anddemonstrate my value to the company, I appreciate that promotion isa reward, not a right"

    Interview Questions: What sort of people do you find it difficult towork with?

    "I am a very amiable person and very team orientated, If I were tofind it difficult to work with someone, it would be someone whosestandards doesn't reach that of the team.

    Answering Tough Interview Questions well, will set you apart fromother candidatesapplying for the sameposition

    Padmakar [email protected]

    Wait for next issue

    Infinitysoft.co.in

  • 8/14/2019 Infinity Tech New

    23/31

    23

    VIRUSComputer viruses are programs that have been pur-posely designed to interfere with the regular operationof a computer. Depending on its nature and capabilities,

    a virus may cause minor or major interruption to thesmooth functioning of a computer. They may just slowdown your computer, or repeatedly cause meaninglessmessage to appear on your monitor, freeze yourcomputer or bring up cascading windows on yourscreen, cause screen blinking, record data without a

    commend from you, corrupt or delete data, revive deleted data, pickup e-mail addresses from your address book and local files and startsending e-mails on its own, and even damage vital system files.

    Computer viruses can be several types:Worms: worms are self-replicating computer programs, similar tocomputer viruses. Worms can spread rapidly from one computer toanother when documents are exchanged.

    A copy of the worm passes through the network toanother machine that has a specific security hole. it then copies itselfto the new machine, and then start replicating from there.

    Trojan horses: Trojan horses are programs that claim to perform aparticular function but which in fact do something different. Forexample, they could infect your computer with a virus your files.

    Macro viruses: Macro viruses use commends called macrosembedded in other software to infect and spread to other files viewedby that software. For example. Microsoft word and Excel have macrosviruses can spread by exploiting these commands.

    Boot Sector Viruses:Boot sector viruses are an older type of virusand are not so common today. They used to infect computers startupprograms, so that the virus would become active as soon as thecomputer started up.

    Backdoor Trojans: Backdoor Trojans are programs that allow othercomputer users to remotely control your computer via a local areanetwork or the internet.

    Ravindra [email protected]

  • 8/14/2019 Infinity Tech New

    24/31

    24

  • 8/14/2019 Infinity Tech New

    25/31

    25

    Speeding up your hard drive to get faster file transfer by using 32-bittransfers on your hard drive:

    1. Just add the line to a boot up script.

    hdparm -c3 /dev/hdX

    2. If you use SuSE or other distros based on SYS V.

    /sbin/init.d/boot.local

    should work for you.3 This enables 32-bit transfer on your hard drive. On some systems

    it can improvetransfer performance by 75%.

    To test your performance gain, type:

    hdparm -t -T /dev/hdX

    More DOS-like commands:

    Many people are moving to Linux these days because windowsXP onwards OS needs very large scale amount of resources but theyare typing DOS commands on Linux that look fine but cause errors.The command "cd.." in DOS is perfectly valid, but in Linux, the valid

    command is cd ..(any parameter for that command must be sepa-rated from the command by a space). The same goes for "cd/" and"cd~". A quick fix is here.

    1 Use your favorite text editor in your home directory to edit the file".bashrc".

    The period is there on purpose, this hides the file from normal lsdisplay.

    2 Add the lines:

    alias cd/="cd /"

    alias cd~="cd ~"alias cd..="cd .."

  • 8/14/2019 Infinity Tech New

    26/31

    26

    3 And I usually add these...

    alias md="mkdir"

    alias rd="rmdir -i"

    alias rm="rm -i"

    Here alias is a powerful tool, and can be used in the .bashrc scriptas well as from the command line. You can, if you want to spend thetime, create your own group of shell commands to suit how youwork. As long as you put them in your .bashrc file, they'll be thereevery time you log in. Note that if you frequently log in as root, youmight want to copy /home/username/.bashrc to /root/.bashrc tokeep yourself same.

    More swap with a swap file:You installed a new Linux system, but forgot to set enoughswap space for your needs. Do you need to repartition and reinstall?No, the swap utilities on Linux allow you to make a real file and use itas swap space.The trick is to make a file and then tell the swapon program to use it.Here's how to create, for example, a 64 megs swap file on your rootpartition (of course make sure you have at least 64 megs free):

    dd if=/dev/zero of=/swapfile bs=1024 count=65536

    This will make a 64 megs (about 67 millions bytes) file on your harddrive. You now need to initialize it:

    mkswap /swapfile 65536

    syncAnd you can then add it to your swap pool:

    swapon /swapfile

    With that you have 64 megs of swap added. Don't forget to add theswapon command to your startup files so the command will be re-peated at each reboot.

    VINEET [email protected]

  • 8/14/2019 Infinity Tech New

    27/31

    27

    Fix-it

    But how ...

  • 8/14/2019 Infinity Tech New

    28/31

    28

    Thefollowing error message can occur during the WinXP upgradeprocess:

    An unexpected error (768) occurred at line 5118 in \xpclient\base\boot\setup\setup .c Press any key to con-tinue.

    When you press any key as instructed, the following error messageappears: A problem has been detected and windows has beenshutdown to prevent damage to your computer. PROC-ESS1_INITIALIZATION_FAILEDHuh? Again, the Microsoft Knowl-edge Base comes to the rescue. The root cause triggering this er-ror message is a software program (namely Roxios GoBack) that isincompatible with WinXP. To resolve the problem, disable GoBackwhen WinXP restarts by pressing the space bar at the GoBack boot

    menu, pressing d to disable and pressing y to confirm. Once Go-Back is disabled, cancel the WinXP setup process and uninstall Go-

    Error Message: Fatal System Error: 0x000000a0(0x00000002,0x00070124, 0x00000000,0x00000000)

    Translation: If you happen to own a Microsoft Sidewinder Game PadPro (not the joystick model), you may experience a unique problem.If you just happen to be running WinXP (as opposed to any otheroperating system) and you decide to unplug the USB (Universal Se-

    rial Bus) cable while WinXP is starting up, you will see the fatalsystem error and a blue screen, preventing you from accessing yourDesktop.

    Solution: Microsoft is working on a fix for this error, but at presstime it is still unresolved. Fortunately, the workaround is rathersimple. Just make sure you dont unplugthe Sidewinder cable when the system isstarting .

    WHICH PATH IS SUITABLE FOR YOU

    VISIT

    Infinitysoft.co.in

    Saket [email protected]

  • 8/14/2019 Infinity Tech New

    29/31

    29

    First Look softwarePanda cloud antivirus

    Panda has released a free

    anti-Virus offering that residesmostly off the host system andin the cloud. Using 'CollectiveIntelligence', along withdistributed computing and aglobal and community-basedplatform, Panda has said thisnew offering is entirelydifferent from what it's createdin the past. So, has it

    succeeded?

    Starting offLight Panda Cloud Antivirus protects you while you browse, play orwork and you wont even notice it. It is extremely light as all the workis done in the cloud.

    Secure Panda Cloud Antivirus provides you with the fastest protec-tion against the newest viruses thanks to its cloud-scanning fromPandaLabs servers

    Easy Panda Cloud Antivirus is truly install and forget. Dont worryabout updates, configuration or complicated decisions ever again.

    Anurag [email protected]

  • 8/14/2019 Infinity Tech New

    30/31

    30

    Ask...

  • 8/14/2019 Infinity Tech New

    31/31

    31

    "If you have any questions, please

    feel free to ask" or " We would be

    happy to answer any questions youhave"

    Send your query mails at:

    [email protected]@gmail.com

    [email protected]@yahoomail.com

    Join our communities and group at:http://groups.yahoo.com/group/

    infinitytechmagazine

    [email protected]://www.orkut.co.in/Community.aspx?

    cmm=49916804

    Join these groups to receive the magazinedirectly to your mail box.

    infinitysoft.co.in