infinitytech new

31
1 October

Upload: shashwat-shriparv

Post on 17-May-2015

1.165 views

Category:

Technology


3 download

DESCRIPTION

Editor speak,Devil facts,Programmers Area ,Career Guide,Know your hard disk,Learn Linux,Software of the month,Hardware/Software Problem,Customizable Web Pages,Algorithms As A Technology,Timeline : 53 Years of Hard Drives,Desktop go to die,Nikesh Arora President, Global Sales Operations and Business Development in Google,hdparm -c3 /dev/hdX ,hdparm,alias md="mkdir" ,An unexpected error (768) occurred at line 5118 in \xpclient\base\boot\setup\setup .c Press any key to con- tinue,Error Message: “Fatal System Error: 0x000000a0 (0x00000002,0x00070124, 0x00000000,0x00000000),First Look software,http://groups.yahoo.com/group/,infinitytechmagazine,[email protected] ,http://www.orkut.co.in/Community.aspx?

TRANSCRIPT

1

October

2

Infinitytech Magazine Technically advance

Infinitytech.co.in Copyright@ 2009 infinitysoft.co.in All right reserve All text and context in this book solely owned by infinitysoft.co.in .Reproduction without permission in any form is illegal .

Get your own free personalized copy of this book from www.infinitysoft.co.in

3

Editor’s pen

As we all know that programming

industry is getting tougher rapidly and as a result of that the necessity

of freelance programmers and contract programmers is being

sensed vastly. In a professional software development firm, the

programmer’s expertise module wise. Some times it is viewed that, such programmers are unable to work at different module in same project. Hence the concept of freelance

p r o g r a m m i n g o r c o n t r a c t programming arises in recent p r o g r a m m i n g a r e n a . T h e s e

contract programmers are really very knowledgeable and have great

expertise in web programming as well as the software development i n d u s t r y . T h e s e f r e e l a n c e programmers can judge the task

easily through their years of expertise, and are in an faster able to

solve the problems manner. These freelance programmers may follow single programming language

like PHP, Dot Net, Java etc. but their skills reside in interface design, form processing, navigation main-

taining, error handling, database handling, HTML development and

also visual representation makes them famous in the software

development industry .

Advantages of contract programming in software development industry

Shashwat Shriparv [email protected]

4

Table of contents

Editor speak

Devil facts

Programmers Area

Career Guide

Learn Linux

Software of the month

Hardware/Software Problem

Know your hard disk

Help Line

5

Devil Fact

Cyber criminals Flock to the Internet and to a Computer in Your Home or Business…..

6

Organized crime seems too be extremely active in the scam

known as "phishing" in which they send emails under the guise of

being a financial institution or other legitimate organization. In the email they ask unsuspecting victims to verify personal informa-

tion such as account numbers and passwords. They will target home users who have become the weakest link and they target their vic-

tims much more closely than before, by tracking down full names and personal interests. They also skim social networking sites

and personal websites where most people have left a digital footprint that can be mined . Criminals are increasingly trying to trick citizens into giving them

their bank account details, according to a published survey which

showed such "phishing" attempts almost doubled in the first six months. Over 157,000 unique phishing messages were sent out

around the world in the first half of 2006, an increase of 81 percent compared with the six-month period to end-December 2005. Each

message can go to thousands or hundreds of thousands of consumers, according to the bi-annual Internet Security Threat Report from security software vendor Symantec. Another trend in the first half of the year is that phishes have

become more sophisticated, dodging spam filters and other defense mechanisms designed by provider sand software companies to keep out the criminals.

How much financial damage phishes have caused is unclear and usually at an individual level, which is why phishing does not get the

same media attention as "denial of service attacks" aimed to take

out a specific website, or email worms which can shut down millions of computers in a digital equivalent of a carpet bombing. The internet is still under fire from such attacks, taking about 6,110 different denial of service hits every a day, but unlike a few years ago they cause less damage.

A successful 'denial of server' attack or worm can have ramifications far beyond phishing. Worms have taken down electricity grids. That's

why critical infrastructure is now much more resilient. Information technology managers are better prepared and networks are more

robust," Whitehouse said.

Devil Fact

7

Increased focus on security, and a willingness from software compa-

nies to own up to their mistakes has dramatically cut down the time that computers are at risk, Symantec found. For example, Internet Ex-

plorer, the world's most popular browser from Microsoft, has cut the number of days in which hackers can exploit a security flaw to nine

days from 25 days six months earlier. Security holes in browsers from Opera and Mozilla Firefox are patched within two days and one day re-

spectively.

Because cyber predators and other cybercriminals are becoming

smarter and more sophisticated in their operations, they are real threats to your personal security and privacy. Your money, your com-

puter, your family, and your business are all at risk. These cybercrimi-nals leave you with three choices: 1. Do nothing and hope their attacks, risks, and threats don’t occur on your computer.

2. Do research and get training to protect yourself, your family, and your business.

3. Get professional help to lockdown your system from all their attacks,

risks, and threats.

Remember When you say "No!" to hackers and spyware, everyone

wins! When you don't, we all lose!

Ratnakar Mishra [email protected]

Space for ads

8

Programmers Area

By the programmers for the programmers…

9

“Customizable Web Pages” An universal approach to almost every webpage

I am mostly a man who wants to see the real implementation of things, I mean there practical and real world implementation, in Geek speaks ‘Encapsulation’ of the data. So most of my development are/

were based on the way a product or an application can ease the life of the basic users, because ultimately they are the people who pro-

nounce the success and failure of a product in market, the more ‘User friendly’ your product is, the more laymen usage of your product will

be.

Just a few weeks back I started off with a concept to be implemented and deciphered soon, I will come to that later on. Now that concept started off with an idea, rather say an “Psychological approach of con-structing a social platform’. I studied blogs,feeds,reviews and videos of people who actively are associated with this whole criticism of IT and Web 2.0 arena.(By the way some really good Tech Blogs and por-

tals which can keep you Up to Date with the latest Geek stuffs and

happenings in this Web World are: www.techcrunch.com www.webuser.co.uk www.networkcomputing.com www.webopedia.com www.internet.com

Now the outcome of this ‘Research’ was that I get to know that now a days people really want to get there things ‘Customized’ be it the skin

of their iPhone or having their Gmail theme and gadgets in place. But there is restriction, I mean this whole customization of your personal

stuff is offered by very limited web players, the Giant Google of course with there Gmail personalisation wherein a user can add gadgets from

Google Labs, customize the shortcut keys for saving drafts, adding a label or be it choosing the background for their Gmail or theme per seethe there is iGoogle,what more... up to a certain extent by Face-book just that it allows you to “Hide/Show” certain posts/updates. But still they have this “interface architecture” defined by them which

bounds you to the things which they want you to get displayed on your profile, not something completely on your own. Let our imagina-tion get wild, now think something like an ‘Compilation’ of web pages, rather Web applications....on a SINGLE webpage......now you might think I am suggesting you to create an web page of your own (By the way pick up the last addition of this magazine to learn how to “Make

your own website in just days”),no my friend that’s where the fun comes, you don’t need to make a page of your own, just imagine if you

10

can personalize each and every webpage that you see, be it some

news channel, some radio junction or any other social networking site (Even if they don’t provide you with the liberty of customising the way

the profile looks),even wilder, imagine if you can merge the Updates of your friends from Facebook,the latest Email notifications from

Gmail,recent RSS feeds from Sun’s website and the most watched video on you tube for the day. Isn't that fun, now you may ask me that

what about the privacy issues, why will these sole owners of the contents allow me to do so, the answer is Alias (Will get to that later).

It is maybe you can say, a wilder or a more creative form of iGoogle,

you can play around with things you want, shift the contents from one side to another and the fact is it is not dependent upon the service

provider, say the links at the top of iGoogle ‘Web Images News Groups Books Scholar Gmail’, but Google doesn’t allow you to change, modify

or move them around, do they no since that’s in there hand, what

services they want to provide to you. Alias what I was talking about previously is a mere web space where

you can put all you want, the changes you want to see in your own “Customizable webpage”. It can be achieved by using a proxy server.

Let me elaborate each aspect, tool and services and terms specifically which shall be used in for this purpose. What is a Proxy server: A proxy server has two purposes: • To keep machines behind it anonymous (mainly for security)

• To speed up access to a resource (via caching). It is commonly used

to cache web pages from a web server

Firewall reasons : The proxy server is an additional layer of defence and can protect against some OS and Web Server specific attacks.

However, it does not provide any protection to attacks against the web application or service itself, which is generally considered the larger

threat. A proxy server that passes requests and replies unmodified is usually

called a gateway or sometimes tunnelling proxy. So we will modify this aspect in which the proxy server DOES manipulate or modify the content that the user wants. That why it is better to call it as a ‘Content Proxy’ with customizable user content

1.This content proxy shall receive a request from the client (A client is a user which sends a request for a webpage), then it forwards this

request on the behalf of the user to a thing called Scaper which extracts the ‘DOM’ of a webpage by fetching a webpage from global server.

11

2.This fetched DOM is then sent to the content proxy to get

manipulated,the content proxy has its rules and configuration for manipulating the webpage.It may provide a GUI to the user so as to

what manipulation and addition user wants,this gives the scope of this application to diversify enormously, since there is no end to what sort

of customizations users wants to see in their webpage. 3 After the manipulations the webpage is then sent by the content

proxy to the user,as fully customized one,but specifically for a user in its own session. Now don’t get worried due to all those heavy and alien terms if you

happen to be unaware of them,read below,I shall explain them: What is a Scraper:

A web scaper is a application or a software which extracts useful information out of sites,at the back end and then it can form a totally

new Scraper site on which there is content gathered and compiled

onto it.Like those sites which are especially meant for advertising in which there is no original content,you may call a search engine as a

Scraping site using bots for scraping the www for data.In our case we use the scraper to extract and fetch the webpage from the www. What is DOM: A DOM typically elaborated as Document Object Model is the description of how a webpage is stored displayed/rendered as an HTML page. Objects under the DOM (also sometimes called

"Elements") may be specified and addressed according to the syntax and rules of the programming language used to manipulate them.

That's one of our purpose in the entire flow, to manipulate the DOM,it can be achieved easily by Javascript.

DOM process-ing, manipula-tions, rules,

Request.htm

Request*.htm (The

‘changed’ webpage as de-

The scraping engine,it shall take care of all the parsing and scraping to be

url

DOM

Content Proxy (Since it filters the request)

Amar Deep Gupta [email protected]

12

Algorithms As A Technology Think computer were infinitely fast and computer memory was

free. Would you have any reason to study algorithms? The answer is yes. Of course computers may be fast, they are not infinitely fast. And memory may be cheap, but it is not free. Computing time is

therefore a bounded resources and so is space in memory. These re-sources should be used wisely, and algorithms that are efficient in

terms of time or space will help do so. Total system performance depends on choosing efficient algorithms as much as on choosing

fast hardware. Just as rapid advances are being made in other com-puter technologies, they are being made in algorithms as well.

Analyzing an algorithm has come to mean pre-dicting the resources. Occasionally, resources such as memory, com-munication bandwidth, or computer hardware are of primary con-cern, but most often it is computational time that we want to meas-

ure. The number of steps an algorithm requires to solve a specific problem is denoted as the computational time or run-

ning time of the algorithm. The notion of a step refers to an underly-ing machine model. The machine must be able to execute a single

step in constant time. In general, the computational time depends on

the size of the problem and on the respective input. Example: The computational time of a sorting al-

gorithm grows if the length of the input sequence grows. If the input sequence is presorted, compared to an unsorted sequence possibly less steps are sufficient. In order to evaluate an algorithm independently

of the input, the notion of time complexity is introduced. The time complexity T(n) is a function of the problem size n. The value of T(n)

is the running time of the algorithm in the worst case, i.e. the maxi-

mum number of steps it requires with an arbitrary input. Sometimes the behavior on the average case is

considered, i.e. the mean number of steps required with a large num-ber of random inputs.

Example: The sorting algorithm insertion sort has a worst case time complexity of T(n) = n�(n-1)/2 comparison-exchange steps to sort a sequence of n data elements. Often, it is not necessary to know the exact value of T(n), but only an

upper bound can be estimated. Ashok kumar

MCA B7(ER&DCI-IT)

13

14

Timeline : 53 Years of Hard Drives Over the past five decades, hard drives have come a long way. Travel

through time with us as we chronicle 50 milestones in hard-drive de-

velopment--from product firsts to new technologies, and everything in

between.

1956 : IBM ships the first hard drive in the RAMAC 305

system. The drive holds 5MB of data at $10,000 a mega-byte. The system is as big as two refrigerators and

uses 50 24-inch platters.

1961: IBM invents heads for disk drives that "fly" on

a cushion of air or on "air bearings." The IBM 1301 Disk Storage Unit, with its larger capacity, flexibility

and speed, greatly expanded the operational capabil-ity of the IBM 7000 series of computers (7070, 7094,

7080 and 7090).

1973: IBM announces the 3340, the first modern

"Winchester" hard drive, which has a sealed assembly, lubricated spindles, and low-mass heads.

1979: IBM's 3370 use seven 14-inch platters to store

571MB, the first drive to use thin-film heads.

1979: Seagate introduces the ST-506 drive and interface,

which is then used in all early microcomputer imple-mentation

1991 : IBM introduces the 0663 Corsair, the first disk

drive with thin film magneto resistive (MR) Heads. It has eight 3.5-inch platters and stores 1GB. (The MR

head was first introduced on an IBM tape drive in 1984.)

1998: IBM announces its Micro drive, the smallest hard

drive to date. It fits 340MB on a single 1-inch platter.

15

2006 : Seagate releases the Barracuda 7200.10,

at 750GB the largest hard drive to date.

2009: Hitachi Global Storage

Technologies announcement of a 1-terabyte hard disk drive. The

drive ships in the first quarter of 2007. The drive, called the Desk

star 7K1000.

2009 : Hitachi Global Storage Technologies Inc.

launches the world's first 2TB(Tera Byte), 7200 RPM hard disk drive, the Deskstar 7K2000.The

By the end of the 20th century, internal drives

became the system of choice for computers run-ning Windows, while external hard drives re-

mained popular for much longer on the Apple Macintosh and other professional workstations

which offered external SCSI ports. Apple made such interfaces available by default from 1986

and 1998. The addition of USB and Firewire in-terfaces to standard personal computers led such drives to become commonplace in the PC market as well.

Rakesh Kumar (MCA B8 ER&DCI-IT)

Linux revolution

Visit

Infinitysoft.co.in

16

Changing Career - Things to Remember

Doing the 'right job' has become

very important these days. As a re-sult, people are observed making mid-career moves every now and

then. It is no longer considered ta-boo to shift jobs even if one may

have spent a decent amount of

time in a certain job. What is more important for an individual is to en-

joy what he does rather than spending an inordinate amount of

time in a job he does not like do-ing? As a result, changing career be-comes imperative for a large num-

ber of people every year. In the last few decades, it is true that the

choice of careers has expanded be-yond imagination. One is no longer

left with just a few conven-tional career choices of being a

doctor or a teacher or a banker. In-

up that offer the combination of good money as well as a satisfying

work profile. Before one embarks on a decision to change careers, it is essential to consider some points. 1. Decide Which Career To Opt For: There are a whole lot of resources

available on the internet or in books that talk about the various career choices in the job market. Before deciding on which career to opt for,

one should conduct adequate research about the new job. This would be important to ensure that once one changes his/her career to a new

field, it doesn't come across as an unpleasant experience. 2. Tailoring the Resume: Once one decides on a new career avenue, it is important to tailor the existing resume to match the skill sets that

the new career demands. One would also need to customize the cover-ing letter with regard to the specific company one applies.

17

3. Skill Enhancement: Although one's skills might be usable to a large

extent in the new career, there are times when changing careers re-quires certain skills to be enhanced as well. One might, for example,

shift from sales to marketing which would require familiarity with mar-keting concepts. In such cases, one should either sign up for a short

refresher course or take a brief sabbatical to get a specialized degree from a college before getting employment.

4. Employing Patience: It is important to note that the path for chang-

ing careers is strewn with rocks and stones, so patience is a virtue that needs to be adopted. It is easy to get frustrated when one fails to get a

positive response from potential employers. However, one should not lose patience but keep on applying till one gets the job of his/her choice.

In addition to the things listed above that discuss what one "should"

do; there are a number of things to beware of. A random list of 'don'ts' is: - Do not confuse changing jobs with changing careers. Changing ca-

reers is a major decision and should be taken only after sufficient re-search and thought has gone into it.

- Changing careers only for money is a bad idea. In most cases, people

fail to realize that there is a cost to pay for a higher compensation in the form of more travel or longer working hours.

- Changing careers to a new one without making a realistic assessment of one's skills and strengths might be disastrous.

Shailendra Kumar [email protected]

18

In this fast-changing technological world, sometimes

you are faced with some difficult choices. For instance,

your current computer has matured to the ripe old age of six months and has been deemed obsolete. Now it's

time to purchase a new computer and the question is, "Should I buy a laptop or a desktop?" so there laptop

has some advantage over desktop .

Desktop go to die…!

Mobility - Well, sure, it's the big one. If you need to work remotely, a

laptop is the way to go. Remember that a 3G card from your cell phone provider can give you high-speed internet access in most urban areas. Upgrades - Speaking of upgrades, it's more difficult to upgrade a lap-top. In some cases, it's impossible: Sure, you can pop in a new hard drive later, but adding a second hard drive means plugging in an exter-

nal disk that will be cumbersome to tote around with you.

Storage - One of the major places where lap-tops and desktops differ is in how much hard drive space they offer. Laptops use physically

smaller drives, which can only offer so much storage space. Though larger drives are avail-

able, 100GB is still common on a laptop, while 500GB desktop drives are seen all the time

(again, bigger drives can be had). This is a huge difference and it seems to be expanding,

not contracting. If you have very large storage needs, desktop is your best bet.

Price - Expect to pay $300 to $500 more for a comparably equipped laptop (though this varies widely). Peripherals - Remember that when you're in the office, you can always plug in an external mouse, keyboard, and monitor to your laptop.

19

I obviously can't make the buying

decision for you, but I'll reiterate my computer plan in case you haven't seen it before. I use both: a moderately-priced laptop is with

me on a daily basis, syncing up with an inexpensive desktop that

works as a print and file server. The desktop works as a machine

for my daily backups, has plenty of storage for stuff I don't need to

take with me on the road (or to other rooms of the house), has two printers hooked up to it, accepts incoming faxes, and

otherwise stands as a backup in case something fails on my laptop. My laptop, however, is where I do

most of my work.

Sure I could get by with just a notebook PC, but having both makes things so much easier.

Shivendra Kumar MCA B8 Er&Dci-IT

Infinitysoft.co.in Every thing is different

20

Nikesh Arora oversees all revenue and cus-

tomer operations, as well as marketing and partnerships. Since joining Google in 2004,

he has held several positions with the company. Most recently, he led Google's global direct sales operations. He also developed and managed the company's

operations in the European, Middle Eastern and African markets and was responsible

for creating and expanding strategic partnerships in those regions for the benefit

of Google's growing number of users and advertisers. This will make him the top-ranking (4th Position) Indian in Google.

Nikesh Arora President, Global Sales Operations and Business Development in Google

With a background as an analyst, Nikesh's main areas of focus

have been consulting, IT, marketing and finance. Prior to joining Google, he was chief marketing officer and a member of the man-agement board at T-Mobile. While there he spearheaded all prod-uct development, terminals, brand and marketing activities of T-

Mobile Europe. In 1999, he started working with Deutsche Tele-kom and founded T-Motion PLC, a mobile multimedia subsidiary of T-Mobile International. Prior to joining Deutsche Telekom, Nikesh held management positions at Putnam Investments and Fidelity

Investments in Boston. Nikesh holds a master's degree from Boston College and an MBA

from Northeastern University, both of which were awarded with distinction. He also holds the CFA designation. In 1989, Nikesh

graduated from the Institute of Technology in Varanasi, India with a bachelor's degree in electrical engineering.

Rajeev Ranjan [email protected]

21

I remember whenever I've had to Interview for a position in the past the bit I always looked least forward to was the stage where the Interviewer asks me questions. The majority of which were easy to

answer as its very clear what information the Interviewer was look-ing for, but there were always the odd tough Interview Questions

thrown in to throw me out. Those coupe of tough Interview questions were always difficult to answer as it was never clear what informa-

tion the Interviewer was looking for.

I've since been working in recruitment for some time and have been

the Interviewer asking those tough Interview questions on many occasions. Its clear that many candidates still don't know what I'm

looking to hear from them. So I thought I'd cover some of the tough

Interview Questions and ways to answer them. Interview Questions: What are your weaknesses? State a weakness but turn it into a positive: "At times I've been

considered too much of a perfectionist, I use to get irritated if I felt someone else’s work on the project was below company standard,

I've since learnt that I can't affect other peoples work so channel my energies into making my work as high a standard as possible"

Interview Questions: How have you managed to attend an Interview

in works time?

"I didn't want to deceive my current employers, so I asked them if I could take an unpaid day of leave to attend to a personal matter"

22

Interview Questions: How do you feel about carrying out repetitive or

mundane work? "I appreciate every position has an element of repetitiveness but I

take all aspects of my job seriously whether they are repetitive or not and always give 100%."

Interview Questions: How do you handle Criticism?

"At some point we all make mistakes, I'm always happy to take on

constructive criticism as this will help me perform better."

Interview Questions: How long would it be before you would expect to be promoted? "I couldn’t give a time scale, I would want to prove myself and demonstrate my value to the company, I appreciate that promotion is

a reward, not a right"

Interview Questions: What sort of people do you find it difficult to

work with?

"I am a very amiable person and very team orientated, If I were to find it difficult to work with someone, it would be someone whose

standards doesn't reach that of the team. Answering Tough Interview Questions well, will set you apart from other candidates

applying for the same position

Padmakar Mishra [email protected]

Wait for next issue

Infinitysoft.co.in

23

VIRUS Computer viruses are programs that have been pur-

posely designed to interfere with the regular operation of a computer. Depending on its nature and capabilities,

a virus may cause minor or major interruption to the smooth functioning of a computer. They may just slow

down your computer, or repeatedly cause meaningless message to appear on your monitor, freeze your

computer or bring up cascading windows on your screen, cause screen blinking, record data without a

commend from you, corrupt or delete data, revive deleted data, pick

up e-mail addresses from your address book and local files and start sending e-mails on its own, and even damage vital system files.

Computer viruses can be several types: Worms: worms are self-replicating computer programs, similar to computer viruses. Worms can spread rapidly from one computer to

another when documents are exchanged. A copy of the worm passes through the network to

another machine that has a specific security hole. it then copies itself to the new machine, and then start replicating from there.

Trojan horses: Trojan horses are programs that claim to perform a

particular function but which in fact do something different. For

example, they could infect your computer with a virus your files.

Macro viruses: Macro viruses use commends called macros

embedded in other software to infect and spread to other files viewed by that software. For example. Microsoft word and Excel have macros

viruses can spread by exploiting these commands.

Boot Sector Viruses: Boot sector viruses are an older type of virus

and are not so common today. They used to infect computers’ startup programs, so that the virus would become active as soon as the computer started up.

Backdoor Trojans: Backdoor Trojans are programs that allow other

computer users to remotely control your computer via a local area network or the internet.

Ravindra Bohra [email protected]

24

25

Speeding up your hard drive to get faster file transfer by using 32-bit

transfers on your hard drive: 1. Just add the line to a boot up script.

hdparm -c3 /dev/hdX

2. If you use SuSE or other distros based on SYS V.

/sbin/init.d/boot.local

should work for you.

3 This enables 32-bit transfer on your hard drive. On some systems it can improve

transfer performance by 75%.

To test your performance gain, type:

hdparm -t -T /dev/hdX

More DOS-like commands: Many people are moving to Linux these days because windows XP onwards OS needs very large scale amount of resources but they

are typing DOS commands on Linux that look fine but cause errors. The command "cd.." in DOS is perfectly valid, but in Linux, the valid

command is “cd ..” (any parameter for that command must be sepa-rated from the command by a space). The same goes for "cd/" and

"cd~". A quick fix is here.

1 Use your favorite text editor in your home directory to edit the file

".bashrc". The period is there on purpose, this hides the file from normal ls display. 2 Add the lines: alias cd/="cd /"

alias cd~="cd ~" alias cd..="cd .."

26

3 And I usually add these...

alias md="mkdir"

alias rd="rmdir -i"

alias rm="rm -i"

Here “alias” is a powerful tool, and can be used in the .bashrc script as well as from the command line. You can, if you want to spend the

time, create your own group of shell commands to suit how you

work. As long as you put them in your .bashrc file, they'll be there every time you log in. Note that if you frequently log in as root, you

might want to copy /home/username/.bashrc to /root/.bashrc to keep yourself same.

More swap with a swap file: You installed a new Linux system, but forgot to set enough

swap space for your needs. Do you need to repartition and reinstall? No, the swap utilities on Linux allow you to make a real file and use it

as swap space. The trick is to make a file and then tell the swapon program to use it. Here's how to create, for example, a 64 megs swap file on your root partition (of course make sure you have at least 64 megs free):

dd if=/dev/zero of=/swapfile bs=1024 count=65536 This will make a 64 megs (about 67 millions bytes) file on your hard drive. You now need to initialize it:

mkswap /swapfile 65536

sync

And you can then add it to your swap pool:

swapon /swapfile

With that you have 64 megs of swap added. Don't forget to add the swapon command to your startup files so the command will be re-

peated at each reboot.

VINEET PRATAP [email protected]

27

Fix-it

But how ...

28

The following error message can occur during the WinXP upgrade

process:

“An unexpected error (768) occurred at line 5118 in <drive let-ter>\xpclient\base\boot\setup\setup .c Press any key to con-

tinue.” When you press any key as instructed, the following error message

appears: “A problem has been detected and windows has been shutdown to prevent damage to your computer. PROC-

ESS1_INITIALIZATION_FAILED”Huh? Again, the Microsoft Knowl-edge Base comes to the rescue. The root cause triggering this er-

ror message is a software program (namely Roxio’s GoBack) that is incompatible with WinXP. To resolve the problem, disable GoBack when WinXP restarts by pressing the space bar at the GoBack boot menu, pressing d to disable and pressing y to confirm. Once Go-Back is disabled, cancel the WinXP setup process and uninstall Go-

Error Message: “Fatal System Error: 0x000000a0

(0x00000002,0x00070124, 0x00000000,0x00000000)” Translation: If you happen to own a Microsoft Sidewinder Game Pad Pro (not the joystick model), you may experience a unique problem.

If you just happen to be running WinXP (as opposed to any other operating system) and you decide to unplug the USB (Universal Se-

rial Bus) cable while WinXP is starting up, you will see the fatal system error and a blue screen, preventing you from accessing your

Desktop.

Solution: Microsoft is working on a fix for this error, but at press time it is still unresolved. Fortunately, the workaround is rather

simple. Just make sure you don’t unplug the Sidewinder cable when the system is starting .

WHICH PATH IS SUITABLE FOR YOU VISIT

Infinitysoft.co.in

Saket kumar [email protected]

29

First Look software Panda cloud antivirus

Panda has released a free

anti-Virus offering that resides mostly off the host system and

in the cloud. Using 'Collective Intelligence', along with

distributed computing and a global and community-based

platform, Panda has said this new offering is entirely

different from what it's created in the past. So, has it

succeeded?

Starting off

Light Panda Cloud Antivirus protects you while you browse, play or work and you won’t even notice it. It is extremely light as all the work

is done in the cloud.

Secure Panda Cloud Antivirus provides you with the fastest protec-tion against the newest viruses thanks to its cloud-scanning from

PandaLabs’ servers Easy Panda Cloud Antivirus is truly install and forget. Don’t worry

about updates, configuration or complicated decisions ever again. Anurag Shankar

[email protected]

30

Ask...

31

"If you have any questions, please

feel free to ask" or " We would be

happy to answer any questions you

have"

Send your query mails at:

[email protected] [email protected]

[email protected] [email protected]

Join our communities and group at: http://groups.yahoo.com/group/

infinitytechmagazine [email protected]

http://www.orkut.co.in/Community.aspx?

cmm=49916804

Join these groups to receive the magazine directly to your mail box.

infinitysoft.co.in