Skip to main content

Posts

Showing posts from 2009

Merry X-mas

"வாழும் போது கெட்டவனாக வாழ்பவன் சாகும்போது நல்லவனாக நினைப்பதை விட வாழும் போதுதே நல்லவனாதல் சிறந்தது."

விழித்திரு மனிதனே

நாட்களை எண்ணிக் கொண்டிருந்தால்  செல்லும் பாதை மறைந்து போகும்  மறைந்து போன பாதையைத் தேடி கொண்டிருந்தால்  புதிய பாதையை உருவாக்க முடியாது.

Email accounts security

User Side Solutions: 1. Log in the Email account what ever you use only by typing the appropriate website in the address bar or from your bookmarks.  Eg. www.gmail.com or http://mail.google.com/mail, www.hotmail.com, www.mail.yahoo.com,etc. You may see the log in forms in many other websites. When you are logging in that fake forms, the information will be stored so that your entire email account will be in the fakers' hand.  2. Do not respond to any emails that ask for your password. 3. Do not click on the links from untrusted emails. Server Side Solutions: Preventing the email account from malwares and automated programs. 1. Two password method may be used to log in.  2. One password and a word verification may be done while logging in. 3. Previous log in sessions & their IP addresses may be shown so that the user is aware of any hacking took place. 4. Wrong passwords may be accounted and sent through email to secondary email account of the user.

Invention of Bar code

Source: www.wikipedia.org A  barcode  is an optical  machine-readable  representation of data. Originally, bar codes represented data in the widths (lines) and the spacings of parallel lines, and may be referred to as linear or 1D (1 dimensional) barcodes or symbologies. They also come in patterns of squares, dots, hexagons and other geometric patterns within images termed 2D (2 dimensional) matrix codes or symbologies. Although 2D systems use symbols other than bars, they are generally referred to as barcodes as well. The first use of barcodes was to label railroad cars, but they were not commercially successful until they were used to automate  supermarket   checkout  systems, a task in which they have become almost universal. Their use has spread to many other roles as well, tasks that are generically referred to as  Auto ID Data Capture  (AIDC). Other systems are attempting to make inroads in the AIDC market, but the simplicity, uni...

List of useful Run commands - 156

Source:  http://www.fixmyxp.com/index.php?option=com_content&task=view&id=20 All these commands can be accessed by opening Run dialog box by pressing Win+R hotkey or in Start menu. These commands can be found in system32 folder. To Access…. Run Command Accessibility Controls   access.cpl   Accessibility Wizard   accwiz   Add Hardware Wizard hdwwiz.cpl  Add/Remove Programs  appwiz.cpl  Administrative Tools control admintools  Adobe Acrobat (if installed)   acrobat   Adobe Designer (if installed)   acrodist   Adobe Distiller (if installed)   acrodist   Adobe ImageReady (if installed)   imageready   Adobe Photoshop (if installed)   photoshop   Automatic Updates wuaucpl.cpl Bluetooth Transfer Wizard fsquirt Calculator calc Certificate Manager certmgr.msc Charact...