20 things you didn’t know about Windows XP

1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type ‘systeminfo’. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type ‘systeminfo > info.txt’. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run… and type ‘gpedit.msc’; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care — some may stop your computer behaving as you wish. (Professional Edition only).

3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter ‘rundll32.exe user32.dll,LockWorkStation’ in the location field. Give the shortcut a name you like. That’s it — just double click on it and your computer will be locked. And if that’s not easy enough, Windows key + L will do the same.

4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word ‘hide’ and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include ‘eventcreate’ and ‘eventtriggers’ for creating and watching system events, ‘typeperf’ for monitoring performance of various subsystems, and ‘schtasks’ for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options — they’re all far too baroque to go into here.

6. XP has IP version 6 support — the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type ‘ipv6 install’ into Run… (it’s OK, it won’t ruin your existing network setup) and then ‘ipv6 /?’ at the command line to find out more. If you don’t know what IPv6 is, don’t worry and don’t bother.

7. You can at last get rid of tasks on the computer from the command line by using ‘taskkill /pid’ and the task number, or just ‘tskill’ and the process number. Find that out by typing ‘tasklist’, which will also tell you a lot about what’s going on in your system.

8. XP will treat Zip files like folders, which is nice if you’ve got a fast machine. On slower machines, you can make XP leave zip files well alone by typing ‘regsvr32 /u zipfldr.dll’ at the command line. If you change your mind later, you can put things back as they were by typing ‘regsvr32 zipfldr.dll’.

9. XP has ClearType — Microsoft’s anti-aliasing font display technology — but doesn’t have it enabled by default. It’s well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.

10. You can use Remote Assistance to help a friend who’s using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum’s real IP address — they can find this out by going to www.whatismyip.com — and get them to make sure that they’ve got port 3389 open on their firewall and forwarded to the errant computer.

11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As… and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.

13. You can start up without needing to enter a user name or password. Select Run… from the start menu and type ‘control userpasswords2’, which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.

14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options… and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.

15. XP comes with a free Network Activity Light, just in case you can’t see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You’ll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.

16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By… Show In Groups.

18. Windows Media Player will display the cover art for albums as it plays the tracks — if it found the picture on the Internet when you copied the tracks from the CD. If it didn’t, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.

20. The next release of Windows XP, codenamed Longhorn, was out on early 2003 and wasn’t much to write home about. The next big release was codenamed Blackcomb and was out in 2003/2004, I don’t think either of these was a successful project.

Source: Collected from another website

Web Analytics – An important section of Web development

Now a days, most of the commercial institutions have their own website which are used in several ways. Some of the commercial websites perform the role of product featuring, order placement and share company information and other details with potential customers. On the other hand some companies run on commercial websites by providing different services to the customers through their websites (eg. yahoo, msn, bdjobs etc). Even personal sites can be a source of revenue earning for individuals ( implementation of google adsense, yahoo publishers, msn AdCenter). Therefore it is very important for any website publisher to understand the usability, visitor characteristics and effectiveness of different sections of their websites.

Web Analytics is the study of the usability or effectiveness of a website. It actually deals with the data collected from a website to determine which aspects of the website work towards the business objectives. Data collected almost always includes web traffic reports. It may also include e-mail response rates, direct mail campaign data, sales and lead information, user performance data such as click heat mapping, or other custom metrics as needed.

There are two main ways in which web analytics data can be collected:

  • Log file analysis
  • Page Tagging

Log File Analysis:

The web servers has some application software where information for the hosted websites are stored. For example, linux servers have cPanel and windows servers have Plesk control panels where there are tools for analyzing website traffic, bandwidth transfer, landing pages, referral pages, requested files and etc etc. This reports can be collected in daily basis or even monthly basis to analyze the visitors, most viewed sections/files/forlders/sub domains, emails, unique visitors, visitor’s IP addresses, geographical location of the visitors and even errors occurred during browsing.

Page Tagging:

This method uses JavaScript on each page to notify a third-party server when a page is rendered by a web server. Concerns about the accuracy of logfile analysis in the presence of caching, and the desire to be able to perform web analytics as an outsourced service, led to this data collection method. The web analytics service also manages the process of assigning a cookie to the user, which can uniquely identify them during their visit and in subsequent visits. With the increasing popularity of Ajax-based solutions, an alternative to the use of an invisible image, is to implement a call back to the server from the rendered page. In this case, when the page is rendered on the web browser, a piece of Ajax code would call back to the server and pass information about the client that can then be aggregated by a web analytics company. This is in some ways flawed by browser restrictions on the servers which can be contacted with XmlHttpRequest objects.

There are advantages and disadvantages of both the methods but both are equally important and are used in different web analytics processes depending upon necessity. Even there are some web analytics program which implements both the methods together as a hybrid method. There is another method which are not widely used now a days which integrates the web analytics program into the web server, and collecting data by sniffing the network traffic passing between the web server and the outside world.

Web Analytics are often necessary for internet advertising and promotion which involves Search Engine Marketing ( SEM ) and Search Engine Optimization ( SEO ). I hope to write more on the advantages and disadvantages of the Web Analytics methods and try to share something regarding SEO and SEM also.

This article is also available at : http://community.nsuers.com/showthread.php?p=102627#post102627

WiMax and 3G in Bangladesh

In a recent talk show, the chairman of BTRC ( Bangladesh Telecommunication Regulatory Commission) Major General Manjurul Alam (Rtd) has said that WiMax and 3g license will be issued in Bangladesh soon. The WiMax license will be issued within 3/4 months and in the mean time Ericsson and Huwei will be given a trial license(for 3 months period). 3G license will be issued at the end of this year. The BTRC chairman also said that the deployment of WiMax in Bangladesh will bring some revolutionary changes in the telecommunication sector although it will cost a high price to be deployed. The chairman also discussed on some technical advantages WiMax and 3G will provide. The revenue from this sector has increased a lot and he expects that with the current trend the scope is further high. Mr. Manjur also mentioned that the alternate Optical Fiber Link which is due to connect us to the SEA-WE-ME 4, will introduce competition with the current link ensuring drop in the connectivity price. Thus people will be able to get bandwidth with much cheaper price and ofcourse with higher data speed.

Search Engine Optimization ( SEO – Part2)

I remember I wrote an article in this blog on the same topic. I tried to illustrate the importance of Search Engine Optimization ( SEO ). The knowledge and information is spreading through Internet several times quicker than any other mean. And people are getting more and more dependent on information search using Internet. Internet is infact making a bridge between the information seeker and publishers. This is why it is equally important to know how to reach the information seeker as well as to know how to get desired information. If any one wants to draw more and more attention to his/her site he/she should provide the relevant information with adequacy and also make a proper plan to reach the right people. Therefore, I believe that the most important thing for a successful website is to be rich in terms of content or information. It really doesn’t matter that much if your site is on top of the search result, unless there are plenty of things which will attract people to get back to your site at a later time. The more the contents (the more the keywords) the more it is likely to be searched and viewed by the people. So I will conclude here saying that increase the amount with diversified information, the search engines are waiting to link those to the people.

BTTB will become a Govt. owned Public Limited Company- BTCL

Bangladesh’s council of advisors has agreed in principle to approve draft legislation to convert state-run national PTO Bangladesh Telegraph and Telephone Board into a public limited company, nearly four years after the process was initiated. The Ministry of Posts and Telecommunications must resubmit the proposal to the advisory council for final approval by 30 April after completing further formalities and vetting by the law ministry. Under the draft bill, the state-owned BTTB will become a government-owned public limited company named Bangladesh Telecom Company Ltd (BTCL). Its wholly owned mobile subsidiary, Teletalk Bangladesh Ltd, will remain a subordinate company under separate management. The proposed company will have a nine-member board with the telecoms secretary as its chairman and the company’s managing director as member-secretary.

In April 2004 former Prime Minister Khaleda Zia approved proposals to turn BTTB into a public limited company with financial autonomy under the Companies Act of 1994. In September 2005 the government appointed German firm DeTeCon International as consultant for restructuring BTTB, but the project remains unfinished. DeTeCon prepared marketing and business plans for the new company but was unable to complete the crucial task of evaluating its assets and liabilities.

Source : http://www.telegeog raphy.com/ cu/article. php?article_ id=22020&email=html

4 THINGS YOU PROBABLY NEVER KNEW YOUR MOBILE PHONE COULD DO

There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a life saver or an emergency tool for survival. Check out the things that you can do with it:

FIRST

Emergency

The Emergency Number worldwide for Mobile is 112. If you find yourself out of the coverage area of your mobile; network and there is an emergency, dial 112 and the mobile will search any existing network to establish the emergency number for you, and interestingly this number 112 can be dialed even if the keypad is locked. Try it out.

SECOND

Have you locked your keys in the car?
Does your car have remote keyless entry? This may come in handy someday. Good reason to own a cell phone: If you lock your keys in the car and the spare keys are at home, call someone at home on their mobile phone from your cell phone.

Hold your cell phone about a foot from your car door and have the person at your home press the unlock button, holding it near the mobile phone on their end. Your car will unlock. Saves someone from having to drive your keys to you. Distance is no object. You could be hundreds of miles away, and if you can reach someone who has the other “remote” for your car, you can unlock the doors (or the trunk).

Editor’s Note: It works fine! We tried it out and it unlocked our car over a mobile phone!”

THIRD

Hidden Battery Power (May not be applicable for new model handsets)

Imagine your mobile battery is very low. To activate, press the keys *3370# Your mobile will restart with this reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge your mobile next time.

FOURTH

How to disable a STOLEN mobile phone?

To check your Mobile phone’s serial number, key in the following digits on your phone: *#06#

A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. When your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won’t get your phone back, but at least you know that whoever stole it can’t use/sell it either. If everybody does this, there would be no point in people stealing mobile phones.

Problem with “Show Hidden Files & Folders” in windows Folder Option – WORM_AUTORUN.RW

I encountered a very tricky problem with hidden files and the option in the “Folder Option” menu in Windows. A virus spreaded from and external pen drive and ultimately slowed down the windows so much and at a certain point the windows wasn’t even starting and eventually I had to reinstall the Windows. But the problem wasn’t over even after reinstalling the windows. Another symptom was that when I double clicked on any of the Drives a new window opened everytime, and later on double clicking was’t working at all. I had to navigate through the browser. Later I had to follow a set of instruction to get rid of this problem:

PART: A (Removing the Virus/worm/trojan) 

1. Install AVG antivirus solution and update it.

2. I  had NC (Norton commander)a very old dos based explorer, . I opened NC from the command prompt, and through it I could browse through my drives and could see what damages the virus did. There was a file named u.bat  and also autorun.ini in all my drives. I deleted those. Then I made sure that the file named amvo.exe (C:\windows\system32\amvo.exe) was deleted (stop it from the taskbar if it is running in the process tree). Then I deleted almost all the files in the “system volume information” folder (restore point files). Remember, I used NC to do the above jobs as the files I mentioned above were in hidden format and wasn’t visible through normal explorer. But through NC you can browse and delete these.

The above method worked in my case, but cannot be guaranteed in all the cases.

PART: B (Fixing “Show Hidden Files & Folder” problem)

Go to the following registry key: (go to Start >> Run >> type “regedit” and then press “ok”)
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL

DELETE the value CheckedValue in the right window. (Its type should be REG_SZ and data should be 2.)

Now create a new DWORD value called CheckedValue (same as above, except that the type is REG_DWORD). Modify the value data to 1 (0x00000001).

This should let you change the “Show Hidden Files and Folders” option now.

Be safe, be careful, use protections, ensure prevention and avoid cure hassles. 😉 😉

 

Search Engine Optimization (SEO)

All the websites developed carries a common goal- to be viewed by more visitors and more frequently. When there’s a new product in the market, a very intelligent marketing or publicity is required to attract the desired and potential clients. Same goes with websites. People have to know that you have a nicely designed rich website. Fortunately, the publicity for the websites are not going to cost you anything if you are smart enough to know how to do it.

Search engines are the places where every and almost all the internet users are likely to go through to get the relevant information they are looking for. And the proof of this is the giant Google. The success of google reflects how much people are dependent on search engines. Google is not the only one- YAHOO, MSN, ALTA VISTA and many others are also operating to serve people. Now if you ask “why they are doing so and what’s their benefit” – that will require another article to describe, so lets get back to track. Just think again how much efforts I’m giving in writing this article, and if no one gets through it, it will be totally worthless. That’s the point, I want people to know that I have written something. I need to do something which will allow the search engines to keep the records of the things in my site, and when people will search for relevant info, they will be directed to my article. Search engine will have many results and you will always desire that your article/link should be there in the beginning if not the in the TOP. Its not that by studying more hours than any other students in the class you can score most, you have to apply some technics and also maintain some basic guidelines to get a good score in the exam. Getting in the top in the search engine results also don’t really require any website to be rich in resources. As I mentioned, some technics- some algorithms or some configuration, are required. Now let’s talk something technical !

Wait… I had to attend a final exam this evening, and I am completely exhausted, I’ll be back with the same topic and resume from where I am stopping… In the mean time please go through what google has to say about SEO…

http://www.google.com/support/webmasters/bin/answer.py?hl=en&answer=35291

Be Right Back …..

EDGE / GPRS / EVDO

In Bangladesh, the mobile phone companies emphasized mainly on voice service upto the end of 2005. Since then, the operators are introducing newer and modern technology to meet the data communication requirement of the clients. Other countries adopted those features long ago, specially the GPRS. GrameenPhone is the pioneer in introducing this type of data service to the people of Bangladesh. When GrameenPhone offered the service as a trial basis, Aktel announced the same sort of service… However, GP started staying a step ahead by offering EDGE where as Aktel started with GPRS. More over, after the trial period (to some selected users) GP’s service was available to both prepaid and postpaid customers. Aktel offered the service to both type of users recently prior to what the service was only available to the post paid users. Banglalink on the other hand offered GPRS to its postpaid Enterprise users from the beginning of 2007, depriving the prepaid and normal postpaid users. TeleTalk has offered reasonable packages for both prepaid and postpaid users. Infact teletalk is the only operator to offer unlimited usage package to the prepaid users also. Warid started its operation with the GPRS facilty, but yet to offer any unlimited usage package. Citycell, country’s only CDMA operator, has however started its data service after adopting CDMA 2000 1xRTT technology country wide. The data service technology by Citycell is known as EVDO (Evolution-Data Optimized). The service name is “My Citycell Zoom” and is only availble for the post paid users again depriving the prepaid users. Moreover, the package has flavor of both the time validation and data limit. This is not as cheap as the unlimited offers by the other operators nor as expensive as the Taka/MB offers.

Tariff plan for EDGE/GPRS/EVDO service:

General Packet Radio Services (GPRS) simply is an extension of the GSM standard to provide packet data services. It was introduced in late 2000. It can provide data rates from 56 to 114 Kbps and continuous connection to the Internet for mobile phone and computer users.

Enhanced Data rates for Global Evolution (EDGE) is a radio based high-speed mobile data standard. It allows data transmission speeds upto 384 kbps to be achieved when all eight timeslots are used. In fact, EDGE was formerly called GSM384. This means a maximum bit rate of 48 kbps per timeslot. Even higher speeds may be available in good radio conditions.

EVDO or Evolution Data Only/Evolution Data Optimized (often abbreviated as EVDO, EV-DO, EvDO, 1xEV-DO or 1xEvDO) provides fast wireless broadband (3G) internet service. EVDO is based on the 1xRTT standard, which is available in almost all cell phone coverage areas and provides Internet speeds of about 2-3 times that of dial-up (about 60K-100K).

A comparison between different Data Standards:

An advanced level article on this topic is available in the following link:

3g-mobile-communication-roadmap-and-a-problem 

Multiple IP addresses in a single NIC!!!

I hope you have idea how Internet sharing works in WINDOWS… You have to have two different Network Interface Card (LAN card), one to get connected to the internet and the second one to share the internet to other network. In this way a single pc can connect to X numbers of networks with X numbers of NIC. In this way a pc can act as a bridge between two different networks. This seems so complex a process and also there are many more limitations. Moreover the routing between two different network is simply not possible in windows. But in Linux things are way different and way ahead. Slowly but surely i am getting the facts why people prefer LINUX. Some of you might laugh at me but I am really amazed to know that multiple IP addresses can be assigned in a single NIC. Yes I am talking about the range-x thing. I can provide a range of IP assigned to a single NIC. eg. starting from IPs 192.168.1.1 to 192.168.1.20, doesn’t matter if my static IP was from another network( eg. 192.168.0.1). If my static IP and rangex IPs are from different networks, then by just changing the gateways of static eth0 card to the IP of any of the rangex IP and also changing the gateways of the rangex IP to the main eth0 IP address, I can configure a simple router (routing between 192.168.1.0 and 192.168.0.0 networks). VLAN can also be implemented using this method. This is probably how the web hosting companies provide a range of dedicated IP addresses to the Client. Well I couldn’t write more details and the codes or configurations required for this as it would take the whole night for me to explain the whole procedure. But this is very interesting indeed. You can get some details from the following link:

Bind Multiple IP Addresses to a Single Network Interface Card (NIC) – by Tony Bhimani