The Top 3 Tech Trends Shaping 2011

Three overarching, interrelated trends -- cloud consumption, virtualization and mobility -- present themselves as key industry themes for 2011. All have been increasing in importance over several years, and this year, all will reach a tipping point for businesses and information security providers alike.

To prepare your organization for the cumulative impact of these trends, you will need to consider new and better solutions for next-generation firewalls, application control and visualization, bandwidth management, secure remote access, clean VPN and wireless, and data leakage prevention.

Trend 1: Cloud Consumption

Taking applications to the cloud remains one of the big trends in 2011. Organizations will spend 30 percent more on public IT cloud services, with 33 percent of midsize U.S. firms embracing cloud resources, according to IDC. However, at the same time, non-business-related websites now consume up to 15 percent of available corporate bandwidth, and that figure is rising sharply. As your organization relies more on the cloud to drive lower capital expenditures and improve efficiencies, you will need to deal with two potentially unforeseen impacts.

First, the on-premises bandwidth used to access the cloud from the WAN is limited. Therefore, you need to prioritize bandwidth for -- and user access to -- critical applications over lesser-prioritized traffic that is not paramount to the business. To accomplish this, your bandwidth management policy must be able to make increasingly sophisticated distinctions between mission critical cloud-based applications (e.g., (NYSE: CRM), Oracle (Nasdaq: ORCL), etc.), streaming and latency-sensitive applications (e.g., teleconferencing and VoIP), and business- and personal-use social media and peer-to-peer applications (e.g., Facebook, BitTorrent, etc.).

Next-generation firewalls with application intelligence, control and visualization capabilities can help you identify and control exactly what applications are in use and who uses them -- regardless of port or protocol. Moreover, to control network use properly, you can deploy advanced visualization solutions to view application traffic in real-time and adjust network policy based on critical observations.

Second, by putting critical applications in the cloud, your organization encourages employees to spend more time on the Internet. Unfortunately, they will likely access non-business sites as well as business-related sites, exposing your organization to lost productivity and more malware, botnets, and other forms of malicious attacks.

As your organization relies more on cloud-based applications for productivity and business success, you must be increasingly vigilant against Web-borne attacks. As sensitive data now migrates between corporate data centers and cloud data centers beyond your network perimeter, you can no longer think only in terms of network security, but instead must shift focus to information security: achieving security for all your corporate data and applications, regardless of where they are located.

Over the next year, firewall solutions will increasingly augment and enhance traditional on-box malware signature defenses with advanced cloud-based logic to provide comprehensive protection. Security technologies will continue to evolve, presenting tighter and more manageable security solutions for the borderless network. The scope, scale and performance demands of securing a borderless environment will spur the development of massively scalable security architecture solutions.

Trend 2: Virtualization

Virtualization has grown beyond its early hype and has seen much broader deployment. Businesses have consolidated multiple servers and appliances onto fewer physical machines, enhancing both cost-savings and inter-application performance. By next year, organizations will have virtualized nearly half of all server workloads. At least 14 percent of the infrastructure and operations architecture of Fortune 1000 companies will be managed and delivered internally in a virtualized environment.

Consolidating servers and appliances from physical to virtual environments often runs the risk of undermining implicit security and access barriers that previously existed between isolated applications. You can help preserve this legacy security by deploying next-generation firewalls using deep packet inspection and application control between virtualized server environments.

As your organization pursues on-premise virtualization of mission-critical applications, you will need to scan and secure higher volumes of inbound and outbound traffic at high-speed rates of 10 GB and more. To this end, businesses will require higher performance firewall technologies that feature real-time reassembly-free deep packet inspection, multicore processing platforms, and performance-optimized architecture.

Moreover, as with cloud-based resources, some application traffic will inherently have a greater business value. You can prioritize and control application and user traffic using application-intelligent Next-Generation Firewalls that allow implementation of a granular policy over bandwidth allocation based on application type.

Trend 3: Mobility

Smartphones and tablets such as Apple's (Nasdaq: AAPL) iPhone 4 and iPad, or the many devices running Google's (Nasdaq: GOOG) Android OS, have been widely adopted by employees as standard business tools. Much in the way that laptops eclipsed desktops in the workplace a decade ago, mobile devices are now the business tools of choice, and there is no going back. Shipments of mobile devices will outstrip PCs in the next year and a half, according to IDC. However, less than a third of enterprises have a multiplatform policy in place, according to the iPass Mobile Workforce Report. As the market for mobile devices will continue to evolve and shake out, you should take a platform-agnostic approach.

In scenarios where mobile devices are accessing corporate resources from outside the company's perimeter, you need platform-agnostic secure remote access to mission-critical resources. Web-based SSL VPN portals can provide platform-agnostic access from virtually any mobile endpoint, including laptops, PDAs and smartphones.

By filtering SSL VPN traffic through a high-performance next-generation firewall, you can establish a clean VPN to secure both VPN access and traffic. The multilayered protection of a clean VPN enables you to decrypt and decontaminate all authorized SSL VPN traffic before it enters your network environment. In addition, you effectively control data leakage by integrating deep packet inspection, email security, and application intelligence and control to identify sensitive data and prevent it from leaving your network.

Alternately, for scenarios where mobile devices are accessing the Internet from within your perimeter, users can deploy solutions that integrate a wireless switch directly into their next-generation firewall to subject all wireless traffic to clean VPN scanning and application intelligence, control and visualization, thereby maintaining both security and application usage efficiency.

It's clear that the year ahead will significantly transform the way you interact with -- and secure -- corporate information resources. Cloud computing, virtualization and mobility will become standard features of this year's business computing, and you will need to be prepared.

Turning Your PC into PS3 with Sony’s Move.ME

Sony Computer Entertainment America earlier this month has released a new software application helping hobbyist, academics, researchers, and students to turn their PCs in to PlayStation3 (PS3) with use of PlayStation Move motion controller as an input device on their own PCs. The new software application by the name of Move.ME could also help medical researchers to prototype, such applications as rehabilitation applications for patients undergoing physical therapy, as well as helping design students to develop new creative concepts in gaming within the areas of 3D modeling, motion capture as well as augmented reality.

The new software application is compatible with Windows or Linux based PCs. Other type of devices such as tablet PCs and smartphones can receive PlayStation Move’s tracking data if they can be connected to s PS3 system. The Move.Me will be available for download from PlayStation Network this spring.

UV Technology Leads to Wastewater Compliance

Under pressure to start disinfecting its wastewater, the Wilsonville Power Systems Development Facility (Wilsonville, AL) turned to Aquionics, a leader in UV disinfection technology, for help. Now the facility is in compliance with state regulations -- in four years of operation, contaminants have been kept within permit limits with minimal maintenance.

The Wilsonville Power Systems Development Facility (PSDF) is a research and development center that tests various processes, mainly coal-based technologies, before they are implemented at power supply facilities. In 2006, the growing plant employed 200 people and produced a wastewater flow of about 25 gpm. With its size expected to double in the near future, the facility was required by state and local regulators to start disinfecting its wastewater. Since the existing wastewater treatment facility in Wilsonville was too far away for the facility to connect, the PSDF decided to build its own wastewater treatment facility.

Finding the Right System

After evaluating competing products, Wilsonville PSDF decided that Aquionics’ OpenLine 30 UV disinfection system most closely met their specifications and budget requirements. The OpenLine open channel disinfection unit uses low-pressure, high-output UV lamps to destroy microorganisms’ reproductive abilities on a cellular level. The facility installed the OpenLine system in 2007 as the last item in the plant process, providing final treatment of the water before it is discharged into a local river.

The state-issued permit required that no single grab sample of water leaving the facility could have more than 200 fecal colonies per 100 ml. The OpenLine system has provided the necessary disinfection required to meet the site’s permit.

In addition, the system offers a compact footprint and requires virtually no maintenance. The OpenLine has operated for 21,000 hours since installation, meeting disinfection requirements without needing UV lamp replacement.

New Energy Saving Circuit Configuration Reducing Power Consumption in Mobile Equipment

Toshiba has unveiled its newly developed Flip-Flop circuit configuration using 40nm CMOS process which company claims would reduce power consumption in mobile equipment. For example, the measure data that has been recorder when the new configuration has been applied to wireless LAN verifies that the power dissipation of the new flip-flop is up to 77% less than conventional flip-flop, furthermore, it achieves a 24% reduction in overall power consumption. As an essential part a SoC design, a flip-flop is a circuit that temporarily stores one bit of data during arithmetic processing by a SoC which is incorporated within mobile equipment as well as other digital equipment. Normally, is responsible to incorporate a clock buffer to produce a clock inverted signal required for operation of circuit. The clock buffer consumes power when triggered by a signal from the clock, even when data is not changed. In order to reduce this power dissipation, a power saving technique by the name of clock gating is used in order to cut delivery of clock signal to unused blocks; however by applying this power saving technique, the flip-flop active rate is only 5-15%, leaving room for further power reduction. To further reducing the power consumption, Toshiba has changed the structure of the conventional flip-flop and has eliminated the clock buffer all together.

This approach, would normally, causes data collision between data writing circuitry and the state holding circuitry in the flip-flop, but Toshiba has overcome this issue through addition of adaptive coupling circuitry , combination of an nMOS and a pMOS transistors to the flip-flop, which results in weakening of state-retention coupling and prevents collisions. In spite of the addition of adaptive coupling circuitry, the transistor count has been reduced from 24 to 22, making the cell area smaller that of the conventional flip-flop.

High Performance ARM Based Microcontroller for Industrial Application by Fujitsu Semiconductor

Fujitsu Semiconductor Europe has released series of microcontrollers that are designed for industrial applications such as health care sector as well as medical technology. The newly developed FM3 microcontrollers are based on ARM® Cortex TM-M3 core with special peripheral functions. In addition to peripheral functions, the new FM3 series benefit from number of improvements in its peripheral macros such as dedicated encoder inputs for determining rotor position resulting in a reduced load on the CPU.

In addition to this, the FM3 series features three independent high precision and very fast 12-bit A/D converters with 16 input channels allowing accurate sampling, making them ideal for high-speed precision motors and other components in automation applications, resulting in controlling two motors independently. Furthermore, the new FM3 microcontrollers (MCU) have an integrated, high-speed NOR flash memory (up to 1 MB), which is designed for 100,000 write cycles and data storage for up to 20 years

HTTPS is strong secure

You wouldn't write your username and passwords on a postcard and mail it for the world to see, so why are you doing it online? Every time you log in to Twitter, Facebook or any other service that uses a plain HTTP connection that's essentially what you're doing.

There is a better way, the secure version of HTTP—HTTPS. That extra "S" in the URL means your connection is secure and it's much harder for anyone else to see what you're doing. But if HTTPS is more secure, why doesn't the entire Web use it? 

HTTPS has been around nearly as long as the Web, but it's primarily used by sites that handle money—your bank's website or shopping carts that capture credit card data. Even many sites that do use HTTPS only use it for the portions of their websites that need it—like shopping carts or account pages.

Web security got a shot in the arm last year when the FireSheep network sniffing tool made it easy for anyone to detect your login info over insecure networks—your local coffeeshop's hotspot or public WiFi at the library. That prompted a number of large sites to begin offering encrypted versions of their services via HTTPS connections. 

Lately even sites like Twitter, which has almost entirely public data anyway, is nevertheless offering HTTPS connections. You might not mind anyone sniffing and reading your Twitter messages en route to the server, but most people don't want someone also reading their username and password info. That's why Twitter recently announced a new option to force HTTPS connections (note that Twitter's HTTPS option only works with a desktop browser, not the mobile site, which still requires manually entering the https address).

Google has even announced it will adding HTTPS to many of the company's APIs. Firefox users can go a step further and use the HTTPS Everywhere add-on to force HTTPS connections to several dozen websites that all offer HTTPS, but don't use it by default.

Free Windows 7 Tools You Have to Try

The smartphone marketing phrase "there's an app for that" got me thinking -- isn't there an application for pretty much anything and everything I need on my PC? And aren't those apps typically free? Yes, pretty much.

Here are eight of my recent Windows tools discoveries. Let other readers know the ones you've found in the comments section below.

Windows 7 tool No. 1: Evernote
This tool is one that even Mac users will appreciate. I've been using Evernote for the past few weeks to take notes. I brought it to Microsoft's campus for the recent MVP Summit, for example, and CEO Steve Ballmer's keynote even included a reference to note-taking applications. OneNote is the main Microsoft app for that purpose, so it's funny that a Microsoft guy like me has taken up the Evernote flag.

I first discovered Evernote for my Android smartphone and found it let me easily add recorded sound, pictures, and videos to my notes, then sync them to my laptop back at the hotel and to my PC at home. In fact, you can capture pretty much anything you see or hear in the notes, then access the notes from nearly every computer, smartphone, and tablet on the market: Windows, Mac OS X, iOS, Android, and so on. And your notes are searchable. Great job!

Windows 7 tool No. 2: Easy Duplicate File Finder
How many copies of the same picture, file, or video do you have on your PC? In my case, I must have two or three copies of some items, but I have no idea where the extras are. I'm also afraid if delete it in one place, I'll later discover that was my only copy of that particular file -- so I keep adding copies. I also have copies on one external drive after another because I gotta have backups. Easy Duplicate File Finder helps locate all those duplicates quickly and lets you resolve them easily and safely.

Although it's not free, you might consider instead DataStor's $99 Professional Desktop Protection 2010, which both backs up and deduplicates those files on your desktop and any external connected drives.

Windows 7 tool No. 3: FastStone Photo Resizer
When I move pictures off my camera, I know I could (and should) rename them, but I don't do so a lot of the time. With FastStone Photo Resizer, I can rename and resize pictures. Plus, I can add watermarks and text, as well as crop, rotate, and change the color depth of my photos.
If you simply want to rename files, you might try File Renamer Basic instead.

Windows 7 tool No. 4: Desktops
Created by Microsoft engineers, Desktops lets you take better advantage of your monitors by providing as many as four virtual desktops to work with.
In addition, you might like some of the other tools that co-creator Mark Russinovich has developed, including ZoomIt (for an easy zoom teaching application) and BgInfo (to show details about the system right on the desktop with an overlay of text).

Windows 7 tool No. 5: TeamViewer
I stumbled upon TeamViewer at a download site. It's a screen-sharing and file-transfer application that provides remote access to a second computer so that you can help tech-challenged relatives. There are other tools like this on the market, but TeamViewer was easy to install and work with; plus, it's free.

Windows 7 tool No. 6: ClipTraining
This is my company's tool, but it's worthwhile. ClipTraining has 100 videos (five hours' worth) on Windows 7 task-based training, plus instructions for Office and other applications.

Windows 7 tool No. 7: AllMyApps
Here's a good idea: Take all the applications you normally need to download and install one by one, but instead, choose them all from one source, then download and install them in one group. AllMyApps has more than 1,600 apps available.

Windows 7 tool No. 8: Dropbox
The cloud-based Dropbox tool lets you access its included free 2GB of space (you can rent more if needed) to establish offsite backups and transfer data easily from one system to another. Dropbox is also a great collaboration tool; unlike with an FTP site, you can simply drop a file in the Dropbox folder on your system and have it sync with others to which you've granted access. It works in Windows, Mac OS X, iOS, Android, and other platforms.

There are, of course, many tools available for Windows users. My colleagues and I have covered some of them in other stories:

10 Free Chart Scripts

This week I’ve been working on a project that required data to be shown visually. I needed a Chart Script that was attractive yet gets the data across. The Charts scripts below are built using JavaScript, Flash, Silverlight, and Java.
  • Flot – Flot is a pure Javascript plotting library for jQuery. The focus is on easy usage , attractive plots and interactive features. With Flot you can interact with the data, look at specific data by zooming in, plot a time series, and other various options.

  • Open Flash Chart – Open Flash Chart is a Flash charting component. It is fairly easy to setup and has classes written in PHP, Perl, Python, Java, Ruby on Rails, and .Net to connect to the Chart. You can create some really nice looking Bar Charts, Pie Charts, Area Charts and etc…
  • AmCharts – AmCharts are animated interactive flash charts. The charts include Pie Charts, Line Charts, Scatter/Bubble Charts, Bar/Column Charts, and even a stock chart. AmCharts can extract data from simple CSV or XML files, or they can read dynamic data generated with PHP, .NET, Java, Ruby on Rails, Perl and ColdFusion. All the charts are free but they have a link to AmCharts on the upper left.
  • Emprise JavaScript Charts – Emprise JavaScript Charts is a 100% Pure JavaScript Charting Solution that requires no JavaScript frameworks. Emprise JavaScript Charts include Line, Area, Scatter, Pie, Bar charts with zooming, scaling and scrolling ability. Tested and works with all major browsers.
  • PlotKit – PlotKit is a Chart and Graph Plotting Library for Javascript. PlotKit works with MochiKit javascript library. It has support for HTML Canvas and also SVG via Adobe SVG Viewer and native browser support. PlotKit also has great documentation.
  • Flotr – Flotr is a javascript plotting library based on the Prototype Framework version Flotr lets you create graphs in modern browsers with features like legend support, negative value support, mouse tracking, selection support, zoom support, event hooks, CSS styling support and much more.
  • PHP/SWF Charts – PHP/SWF Charts is simple yet powerful tool to create attractive web charts and graphs from dynamic data. You use PHP to gather the data and put it into flash. It supports many charts types, Line, Column, Stacked column, Floating column, 3D column, Stacked 3D column, Parallel 3D column, Pie, 3D Pie, Bar, Stacked bar, Floating bar, Area, Stacked area, Candlestick, Scatter, Polar, Mixed, Composite and Joined. These Charts have some great features like Animated transitions, Printable charts, and more.
  • Visifire – Visifire (Powered by Silverlight) is a set of open source data visualization components. With Visifire you can create animated Silverlight Charts with ASP, ASP.Net, PHP, JSP, ColdFusion, Ruby on Rails or just simple HTML.
  • FusionCharts – FusionCharts is a cross-browser and cross-platform flash charting component that can be used with ASP.NET, ASP, PHP, JSP, ColdFusion, Ruby on Rails, simple HTML pages or even PowerPoint Presentations. All you need to know is the language you’re programming in.
  • JFreeChart – JFreeChart is an open source Java chart library that makes it easy for developers to display quality charts in their applications. The JFreeChart project was founded seven years ago, in February 2000, by David Gilbert and is used by approximately 40,000 to 50,000 developers. JFreeChart supports many different output types that includes JPEG, GIF, PDF, EPS and SVG. This is a great resource for Java developers.
If you know of any other Charting Scripts please post below.

8 Best Open Source Shopping Carts

Hey Everyone, On Sunday I was contacted by a client and they said the needed a shopping cart up by Monday. Since they needed this cart up so fast I went to the easiest solution I knew, Open Source Shopping Carts. I browsed through tons of shopping carts compatible with the best ecommerce hosting and put together a list of only the best carts.  The list is below.
  • is robust, professional grade e-Commerce shopping cart that you can download, install, and use for free. In the back end, you will use a full featured back end to manage your inventory, orders, shipping, and customers in real time. Your customer’s payments are sent directly to your commercial bank account using the latest security technology. You can even add your own modules to the shopping cart.

  • is an open source PHP based online shopping cart system. OpenCart is easy to use and is SEO optimized with a very nice interface. A great feature of OpenCart is that customers can write their own reviews of the products.

  • is a professional open-source e-Commerce solution offering unprecedented flexibility and control. Magento is awesome, I would never believe it is an open-source project. It features clean urls and SEO from the start. Everything is designed in a clean and simple way. Magento also features: Unlimited flexibility, Completely Scalable Architecture, Professional and Community Support, and Smooth Integration with 3rd party apps.

  • is very popular shopping cart. CubeCart V3 is free, with the exception that you leave their copyright notice in your footer. CubeCart has a large amount of payment gateways and shipping gateways. Their support forums are lively and many people contribute plugins to the cart. To use CubeCart V4 you must pay but it has many features that V3 doesn’t have.

  • is another very popular online shopping cart, written in Perl/MySQL. It features a css manager so you can edit the look of your cart online. AgoraCart also features unlimited product options, up to 4 different tax zones at the same time, tons of shipping and payment gateways/options. The setup options range from a simple template based store to the integration of a complex visual design and support for program modification.

  • is a free, user friendly, open source shopping cart. Zen Cart focuses on the merchants and shoppers instead of the developers. Zen Cart also supports multiple payment and shipping options, quantity discounts and coupons. Also Zen Cart is very easy to install.

  • is an online shopping cart that offers a wide range of features that allows online stores to be setup fairly quickly. osCommerce is backed by a great and active community. It also supports multiple currencies, allows customers to print invoices from the order screen, and has an easy database backup system.

  • is a powerful, free PHP/MySQL shopping cart system that is easy to install and customize.  The Cart is free but it does have copyright notices that you can pay to get rid of.  StoreSprite has many features including automatic tax calculation, automatic delivery cost calculations, customer ratings and reviews and featured products.

8 Popular Open Source Forums

This week I am working on a project for a client and they requested a forum on their website. Being that I didn’t want my client to have to pay for a forum software. I found quite a few popular Open Source Forum software alternatives. The list below is a collection of 8 popular Open Source Forum software  that can run on any good web hosting.

  • – phpBB is one of the most popular forum softwares. With phpBB you can customize with mods and you can stylize your forum. For a fully Modded phpBB forum with about 500 different mods that all have been fully tested click here.

  • – Vanilla is a lightweight open source forum that was developed by Mark O’Sullivan using PHP and MySQL. Vanilla comes loaded with extensions, and you can customize the forum with your own add-ons.

  • – YetAnotherForum.NET is a Open Source forum or bulletin board for web sites running ASP.NET. YetAnotherForum.NET is fully coded in C# ASP.Net and uses Microsoft SQL Server. It comes with all the standard forum features and even WYSIWYG editors.

  • – YaBB is an Open Source forum system (bulletin board, message board) written in Perl. This system is the first and most popular open-source perl forum software and it runs very fast.

  • – IceBB is an open-source forum solution powered by PHP and MySQL. IceBB is written with the prototype and scriptaculous frameworks and the code output is very clean. IceBB has mostly all the same features as some of the paid forums but it even has an RSS feed.

  • – WP-Forum is a simple discussion forum plugin for WordPress. It has three themes that you can choose from and is a simple solution if you have a WordPress powered site.

  • – miniBB is an open source message board script written in PHP. miniBB is a lightweight and compact alternative to phpBB. With miniBB you can customize the software with add-ons and it is Search Engine Optimized.

  • – SMF is a free professional grade forum software that actually isn’t open source. SMF has loads of features with a great community and tons of free modifications.
If you know of any more Open Source Forums then please comment below. Thanks!!!

Mobile WiMAX Will Outpace LTE in Next Few Years

According to a recent report by In-Stat, people are shifting focus from wireless 4G technology and ultra-mobile broadband (UMB) to LTE and WiMAX.

Both 4G technologies, meaning those technologies that are expected to meet the requirements of IMT-Advanced, are not even close to becoming available commercially In-Stat reports.

LTE Advanced and 802.16m WiMAX are being tailored to offer 100Mbps mobile throughput and 1Gbps stationary throughput. These extremely high throughput capabilities are predicted to be an important part of the ITU’s IMT-Advanced requirements.

"Mobile WiMAX effectively came on the scene in 2006 with South Korea’s WiBro; the earliest commercial LTE deployment will be in 2009," says Gemma Tedesco, In-Stat analyst. "Overall, In-Stat expects that mobile WiMAX will ultimately outpace LTE over the next few years due to timing of network roll-outs."

n-Stat research discovered that the success of the Sprint/Clearwire mobile WiMAX roll-out should largely affect whether or not large worldwide operators will launch mobile WiMAX.

The high-tech market research company also found that mobile WiMAX and LTE will represent only a small portion of total 2G/3G/4G cellular subscriptions in 2013, with GSM/EDGE/GPRS expected to make up more than 55 percent of the total 4.8 billion subscriptions.

In addition, HSPA may become 802.16e WiMAX’s true competitor, and also may setback LTE rollouts.

In-Stat’s research report, "The Road to 4G: LTE and WiMAX Lead the Way Worldwide," covers the worldwide market for 4G wireless technology. It provides predictions for global mobile WiMAX and LTE by product type. It also offers an analysis of the developing marketplace for these technologies, including deployment plans of mobile operators.

Technology vendors, service providers, technology professionals and market specialists, worldwide, rely on In-Stat’s experienced staff and in-depth research to support critical business, product and technology decisions. In-Stat’s insights are derived from both a deep technology understanding and comprehensive research, which examines each segment of the value chain for each market.

Reset Windows 7 Password With Ubuntu

Sometimes you forget your Windows password, or maybe your workmate leave and you replace him and you cannot access his ex-computer because it have a password. And you cannot guess his/her password to login. And you cannot reinstall the Windows because it have lot if important data and software that need to be installed and tweak. Then reinstall the Windows is not the answer.

If you had this problem then don’t worry, you still can reset Windows 7 password using Ubuntu. Whether boot it from USB or using Ubuntu live CD. To reset Windows 7 using Ubuntu you can use chntpw.

So to install chnptw on Ubuntu, follow the steps below:
1. Open your terminal and add universe repository, by editing sources.list:

vim /etc/apt/sources.list and add or enable this line:

deb lucid main restricted universe multiverse deb lucid-updates main restricted universe multiverse

2. Update your repository list:

apt-get update

3. Install chnptw:

apt-get chnptw

4. chnptw installed.

Note this chnptw only work in OS 32 bit version. for 64 bit version you need to download from debian source here and pick 64 bit version.

chnptw usage:
1. Get your hard drive label by using:

fdisk -l 2. Find where you install your Windows 7, then go to that hard drive and windows installation folder

cd /media//WINDOWS/system32/config/  

3. Use chnptw to reset password:

chntpw SAM  

4. It will show you User details and command to reset password:

Choose “1″ to clear the default user password and press “y” to confirm.

5. You are done. Back to boot to your Windows and there is no password anymore.

You can set the password from the Windows again if you want.


to reset password for user other than administrator or default user use this command:

ProXPN- Secure your internet connection instantly

ProXPN- Secure your internet connection instantly

Secures your internet with high-bit military-grade VPN encryption, for free

Works with all connections from DSL and cable to 3G

Gives you 100% private access to the internet

Never worry about being spied on again

Now nobody can see the websites you visit

intercept and read your email, IMs, or anything else

record your web history

run traces to find out where you live 


Installer: Link will be available after you signup and login at .

1. Install ProxPN in your PC.
2. Download my modified config file here.
3. Copy and overwrite modified ProXPN.ovpn to the install directory C:\Program Files\proXPN\config\
4. Open ProxPN and login using your free account.
5. Press connect.
6.Connect your Globe tattoo.(can connect even with zero balance)
7. Open your browser and surf!

Replacing the parent proxy:
1. Got to the install directory C:\Program Files\proXPN\config\
2. Right click ProXPN.ovpn => open with notepad/notepad++.
3. Replace the Http Proxy
4. Save and Close.
5. Connect your ProXPN again..

Preview of Proxpn.ovpn:

dev tun
proto tcp
remote 443
resolv-retry infinite
ca ssl/ca.crt
cert ssl/client.crt
key ssl/client.key
cipher BF-CBC
keysize 512
verb 4
mute 5
tun-mtu 1500
mssfix 1450
reneg-sec 0

# If you are connecting through an
# HTTP proxy to reach the actual OpenVPN
# server, put the proxy server/IP and
# port number here. See the man page
# if your proxy server requires
# authentication.
http-proxy-retry 99 retry on connection failures
http-proxy 80 

Parent proxy list

Technology Stack Drupal 7

Drupal’s design goals include both being able to run well on inexpensive web hosting accounts and being able to scale up to massive distributed sites. The former goal means using the most popular technology, and the latter means careful, tight coding. Drupal’s technology stack is illustrated in Figure 1-1.

Figure 1-1. Drupal’s technology stack
The operating system is at such a low level in the stack that Drupal does not care much about it.
Drupal runs successfully on any operating system that supports PHP.

The web server most widely used with Drupal is Apache, though other web servers (including Microsoft IIS) may be used. Because of Drupal’s long history with Apache, Drupal ships with .htaccess files that secure the Drupal installation. Clean URLs—that is, those devoid of question marks,ampersands, or other strange characters—are achieved using Apache’s mod_rewrite component. 

This is particularly important because when migrating from another content management system or from static files, the URLs of the content need not change, and unchanging URIs are cool, according to Tim Berners-Lee ( Clean URLs are available on other web servers by using the web server’s URL rewriting capabilities.

Drupal interfaces with the next layer of the stack (the database) through a lightweight database abstraction layer, which was totally rewritten in Drupal 7. The database interface provides an API based on PHP data object (or PDO) and allows Drupal to support any database that supports PHP.  The most popular databases include MySQL and PostgreSQL. In Drupal 7, SQLite is now also supported. 

Drupal is written in PHP. All core Drupal code adheres to strict coding standards ( and undergoes thorough review through the open source process. For Drupal, the easy learning curve of PHP means that there is a low barrier to entry for contributors who are just starting out, and the review process ensures this ease of access comes without sacrificing quality in the end product. And the feedback beginners receive from the community helps to improve their skills. For Drupal 7, the required version of PHP is 5.2.

Cloud Computing is Solution for Administration

The emerging field of cloud computing is an interesting one, and not just for businesses. The field of public administration benefits from the technology as well. Fraunhofer Institutes are developing solutions to create such systems efficiently and to implement security concepts

Researchers will be presenting these and other solutions on "Computing in the Cloud" at CeBIT in Hanover from March 1-5, 2011.
Cloud Computing is a tempting development for IT managers: with cloud computing, companies and organizations no longer have to acquire servers and software solutions themselves and instead rent the capacities they need for data, computing power and applications from professional providers. You only pay for what you use. In Germany, primarily companies are turning to cloud computing, transferring their data, applications and networks to server farms at Amazon, Google, IBM, Microsoft or other IT service providers. In the space of just a few years, cloud computing has emerged as a market worth billions, with a high level of importance for business-location policy in the German economy.

In autumn 2010, researchers from the Fraunhofer Institute for Open Communication System FOKUS in Berlin, together with their colleagues from the Hertie School of Governance, published a study, "Kooperatives eGovernment -- Cloud Computing für die Öffentliche Verwaltung" ["Cooperative eGovernment: Cloud Computing for Public Administration"]. The study had been commissioned by ISPRAT, an organization dedicated to conduct interdisciplinary studies in politics, law, administration and technology. The study addresses the aspect of security, identifies risks, and uses various implementation scenarios to describe the benefits and advantages of this new technology for public administrators, with a particular focus on federal requirements in Germany.

"There are considerable reservations about cloud computing in the public-administration area. First, because of the fundamental need to protect citizens' personal data entrusted to public administrators; but also the potential of outsourcing processes are frightening in the eyes of the authorities. Due to fear of the loss of expertise, for one, and for another because the law requires that core tasks remain in the hands of administrators." This is how study co-author Linda Strick of FOKUS summarizes the status quo.
The study points out that cloud-specific security risks do in fact exist, but that these can be completely understood and analyzed. "There is even reason to assume that cloud-based systems can actually fulfill higher security standards than classic solutions," Strick explains. To assist administrators with introduction of the new technology, FOKUS researchers in the eGovernment laboratory are developing application scenarios for a media-fragmentation-free and hence interoperable use of cloud-computing technologies.

A cockpit for security
To permit companies and public authorities to acquire practical experience with the new technology and test security concepts, experts from the Fraunhofer Institute for Secure Information Technology SIT in Munich have created a Cloud Computing Test Laboratory. Along with security concepts and technologies for cloud-computing providers, researchers there are also developing and studying strategies for secure integration of cloud services in existing IT infrastructures.

"In our test lab, function, reliability and interoperability tests, along with individual security analyses and penetration tests, can be carried out and all of the developmental phases considered, from the design of individual services to prototypes to the testing of fully functional comprehensive systems," notes Angelika Ruppel of SIT in Munich.

Working with the German federal office for information security [Bundesamt für Sicherheit in der Informationstechnik] BSI, her division has drafted minimum requirements for providers and has developed a Cloud Cockpit. With this solution, companies can securely transfer their data between different cloud systems while monitoring information relevant to security and data protection. Even the application of hybrid cloud infrastructures, with which companies can use both internal and external computing power, can be securely controlled using the Cloud Cockpit.

Saving Energy with Integrated Solutions

A wide range of technologies can be employed to provide customized, cost-efficient, and eco-friendly drive solutions. These include regenerative braking, automatic magnetization adjustment, copper rotors, 87 Hz operation, and intermediate circuit coupling. One company leading the way in this area is NORD, which develops, produces, and markets drive technologies and is an international supplier of all-in solutions. In addition to standard drives, NORD supplies application-specific concepts and solutions, addressing such special requirements as energy-saving drives and explosionproof systems.

Reusing Excess Energy
When machine motions must be slowed down repeatedly or regularly, the released braking energy is not utilized in conventional frequency inverter applications. Instead, it is consumed by resistors and emitted as heat. Drives that reuse excess energy via intermediate circuits or regenerative braking provide a more efficient and eco-friendly solution. While a regenerative braking unit can feed other components elsewhere in a larger installation, energy generated and retained in a dc intermediate circuit can be consumed by the connected components directly, without loss. In effect, less power is drawn from the mains.

Intelligent Control
Intelligent control is another way to save. Operating with asynchronous motors, frequency inverters generally maintain the level of magnetization required for yielding the full torque over the whole speed range, thus causing unnecessary loss during partial load operation. NORD SK 200E, SK 500E, and SK 700E series frequency inverters can save resources by automatically reducing magnetization when the motor is operated under partial load. Users can thus save up to 30% on energy.

Furthermore, compared to grid-powered constant-speed units, inverter-operated asynchronous motors can be run at higher output frequencies in order to increase efficiency. Motors with 230 V/400 V star-delta wiring, for example, can be operated at up to 87 Hz in delta connection using a 400 V inverter, thus enabling the motor to run at a higher speed (up to 87 Hz) while maintaining the nominal torque. Raising the frequency to up to approximately 100 Hz will increase motor efficiency by up to 5%.

Materials Play a Role
To improve motor efficiency, NORD has also developed new concepts around materials, such as using copper rather than aluminum for the rotor squirrel cage. Copper with its smaller ohmic resistance allows for more economic drives of a given size. Alternatively, the motor power can be increased, maintaining size and efficiency, making it easier to fit stronger motors into small installation spaces. An optimized synchronous motor with a high-quality permanent magnet on the rotor side can make for an even larger increase in performance, all along maintaining very high efficiency.

Wireless Keyboard and Mouse Review 2011

Some of the best wireless keyboard and mouse combos we've reviewed have stellar keyboards and mice in one package. This is an important characteristic because, although the freedom of a wireless keyboard and mouse combo means you aren't trapped at your desk, one of the downsides of purchasing a keyboard and mouse combo is that as a bundle you can't mix and match elements. You may like the keyboard in one but the mouse in another. Instead of worrying about mixing and matching, when searching for the perfect keyboard and mouse combo, look for key elements in both the keyboard and the mouse, and you won't be disappointed with either.

The most important feature in a cordless keyboard and mouse combo is the wireless range it offers. Don't settle for anything less than 30 feet during your search. The whole point of wireless technology is to allow the user to have a mobile office, so those keyboards that boast a range of 10 to 15 feet simply don't cut it. For the keyboard, look for customizable hot keys, a battery level indicator and one-touch access controls. For the mouse, look for an on/off switch to save battery power or a rechargeable base.

Combos with the best keyboards, like Logitech's Cordless Desktop MX 5500, have a tiny LED screen that tells you the date and time, can play music and allow you to access the calculator right on the keyboard. For the mouse, features like a snap-on receiver and laser technology should come standard.

Bulky, wired keyboards with accompanying wired mice are a thing of the past. Today, a keyboard with a thin, sleek exterior can add to your modern office décor. Spill resistance and soundless keys are also prevalent in the top keyboard and mouse combos. For those who work at a computer all day every day, an ergonomic design is crucial to maintain the health of your hands and wrists. Look for a wireless keyboard and mouse combo that has an adjustable keyboard with a palm rest and an ergonomic mouse with a comfortable fit. The best mice have a scroll wheel between the first and second buttons that allows for fast scrolling and click-to-click capabilities.

Help & Support
Plug-and-play functionality is a crucial feature to look for in a keyboard and mouse combo. Installing additional drivers or software is a step you don't have to deal with. The best keyboard and mouse combos don't require anything other than a usable USB port and an initial sync between the computer, keyboard and mouse. The top combos are also compatible with a range of operating systems, allowing the products to truly be portable from computer to computer.

Wireless technology means you can have a pristine computer setup with the least amount of cords possible. Gone are the days of being tethered to your computer by mouse and keyboard. Experience the freedom of wireless with one of the top wireless keyboard and mouse combos.

Popular Free SEO Tools

  1. SEOBook Keyword Suggestion Tool – Many professional search engine optimization firms use this powerful tool as part of their initial keyword research phase. Do yourself a favor and bookmark it now.
  2. Link Hub Finder Tool – If you are lucky enough to have a Google API key, this tool will help you determine link hub sites for virtually any niche.
  3. Quintura – Find out where YOU live in your “keyword neighborhood”. A great way to get a relative overview of where you stand and will help you develop your initial goals.
  4. HitTail – This sweet little code snipet reveals, in real time, the most promising but least utilized keywords that drive traffic to your site organically. Develop your own “longtail” SEM campaign and double your ROI.
  5. What the Buzz? – A keyword research tool that will tell you who’s talking about a certain keyword. Semi interesting but can be valuable nonetheless.
  6. SummitTOOLS Spider Simulator – We’ve all seen tools that tell you how a search engine spider might see your pages and what can be done to boost your visibility and subsequent search engine ranking (as well as the 500 million other variables Google uses to rank your site). Every list has one so now ours does too.
  7. Virante Keyword Theme & Link Relationship Tools – Submit a single keyword and it will serve up a list the keywords most often found in conjunction with your keyword in the content of all the sites on the World Wide Web.
  8. Microsoft AdCenter Labs Search Funnel – The Search Funnel tool is for those of you who are interested in visualizing how your average Joe uses a search engine.
  9. Google Webmaster Central – One-stop shop for from-the-source information about how Google crawls and indexes websites.
  10. Stephan Spencer’s Blog and RSS Feed Search SEO – Tips and tactics for optimizing your blogs and RSS feeds for SEO purposes.
  11. How Linkable? Tool – This tool lists all the factors that go into Phillip Lessen’s good-or-not-good filter producing a score and an explanation as to why or why not your blog posts are linkable.
  12. Mobile Search Marketing – If your into it, tips on the ellusive topic of mobile search engine optimization.

Improve Your Web Presence

Creating and publishing your website is the easy part of your work. The hard part is getting target audience.  This is a list of great ways to improve your online presence.
  • Use Technorati to promote your product (write a blog entry and promote that).
  • Write an introduction to your new application and submit it to share sites like Digg, Reddit and Now Public.
  • Make easy to be bookmarked on so you get into the popular page.
  • Submit your web application to Techcrunch.
  • Submit your web to StumbleUpon and get your friends to Stumble your site.
  • Submit your web application to search engines like DMoz.
  • Create a MySpace account and advertise your site.
  • Submit your site to free, search engine friendly directories (UK Small Business Directory, BT Tradespace, Biz-Dir,
  • Submit your web application to Read/WriteWeb.
  • Submit your RSS feeds to sites likeFeedBurner, Jordomedia, Squidoo, Feedboy
  • Write and submit articles.
  • Add a bookmark option to your website/blogs.
  • Write an article related to your site and submit it to article sites.
  • Send press releases using
  • Exchange widgets with other similar web applications in order to promote each other.
  • Publicize your site on related forums.
  • A forum or chatrooms will give your users a reason to come back to your site.
  • Add a link to your site in the signature of every forums you post on.
  • Find a quality blog and leave there a comment with a link back to your site.
  • Add photos to your blog with appropriate keywords.
  • Propose something for free. People like this.
  • Add a “Tell a Friend” function to your site, in this way you can be recommend easily to other people.
  • Sign up with an affiliate programme to sell your product.
  • Create a promotional video and upload it to YouTube and Google Video then encourage people to share it.
  • Be attentive to the spelling mistakes.
  • Offer as many ways as possible to contact you: MSN, Skype, Yahoo, emails, phone and a real address.
  • Write subjects on Wikipedia.
  • Put downloadable content on your site.
  • Response to your customer’s emails promptly.
  • Ask bloggers or other competent peoples to review your site or product.
  • Select carefully your desired keywords and use Google AdWords
  • Sponsor a Wordpress theme.
  • Share your banners on banner exchange sites.
  • Buy enough hosting to have a fast site.
  • Link to other sites, especially if they are relevant.
  • Include a Feedburner button on your site and people will subscribe easily to your feed.
  • Ask your friends to give you honest feedback on your site.
  • Elude technologies like Active X and Java.
  • Buy advertising from Stumble Upon
  • Advertise your site on Craigslist.
  • Write a rich descriptive title at the top of each of your pages. Users and search engines like this.
  • Submit photos and pictures to online photo albums like Flikr,, YahooPhotos.
  • Add a Bulletin to your MySpace account.
  • Upload your product feed to Froogle.
  • Search unanswered questions on Yahoo! Answers and add your site there.
  • Translate your websites/blogs, especially in Chinese.
  • Find domain names that get traffic, purchase them, and have them redirect to your website.
  • Review some related products on epinion.
  • Encourage readers to comment on your blogs.
  • Become friends with editors of an offline publication.

Remove False Isass Exe File and Get Rid of Sasser Worm

"Isass.exe", the Local Security Authentication Server, aims to help authenticating users log in their computer correctly. Recently, the file has generated lots of problems and made many users fail to log in their system. All are due to a worm called the Sasser Worm. If you get the Isass.exe not found or missing error message, your system is likely infected by the Sasser Worm. You need to remove the virus as soon as possible.

Usually, there are two situations. On the one hand, the worm can infect Isass.exe and force it to malfunction; on the other hand, the worm can delete or disable the legal exe file and display itself with the same name. Once the infected or false Isass.exe file is executed, the worm can spread over the system and cause other common virus infection problems, for example,

* Networking is disabled even in Safe Mode
* Malicious advertisements pop up if networking is available.
* Continuous exe error message pops up
* Windows fails to boot up

So how can you get rid of the fake exe file and remove the worm completely? What you really need is a specialized antivirus program. The solution is only suitable for those who can still log in their compromised computer. If you can not log in windows system even in Safe Mode, the only way for you is to call an expert.

How to remove false Isass.exe with your antivirus?

1. Enter Safe Mode. If your antivirus needs networking to scan your system, enter Safe Mode with Networking by pressing F8 during windows startup.
2. Remove temporary files in the Temp folder.
3. Open Task Manager and check whether a process named Isass.exe or in a similar name is running in the background. Kill it if you find one.
4. Run your antivirus program to scan the whole system.
5. Remove the virus.

Lots of security programs have been disabled by the powerful virus. If your current antivirus program can not effectively detect and remove the false Isass.exe file, you should quickly use another one. Among so many security programs that have been proved to be able to remove the virus, we recommended Spyware Cease as you can also use its local scan to remove infected Isass.exe even the worm disable networking in your system local scan of this powerful antivirus program doesn't require networking to delete.

Tips to Be a Good Programmer

One weblog subject that by no means seems to get outdated is what makes a superb programmer, or the way to be a superb programmer, or what you can do to be a better programmer. The identical activities are sometimes listed as being the path to successful codewriting, when actually it's just the method by which the true magic happens. With programming, like many issues, it isn't what you do, it's what you learn from it and the one key ingredient to being a superb programmer (in addition to practice) is publicity to programming. Exposure is available in many types, whether or not it's through hands-on apply or taking a look at somebody else code. Here's a few of typical examples given and how it exposes us to programming.

Work on initiatives outdoors of the workplace
Working by yourself projects outside of labor allows you to follow programming and exposes your self to your personal code. It additionally enables you to practice drawback fixing and offers you the opportunity to experiment with different solutions. Additionally, a lot of occasions I've gone again and re-read something I wrote and found higher methods of doing it. Nevertheless, it needs to be combined with exposure to outdoors code so that you don't just hold yourself in your own rut and writing the identical code with the same mistakes.

Works on Open Source tasks
Not only does this provide you with extra observe but in addition the ability to work on different individuals's supply and see how they code their means around certain problems. It also gives you publicity to the construct and testing processes which are instruments than that help improve your skills. Normally, in the case of libraries, you don't even need to work on the venture, you could be uncovered to a few of their ideas simply by utilizing the API.

Is aware of multiple languages
Working with a number of languages does give you exposure to completely different concepts and methods of doing issues, however in itself, doesn't make a greater programmer and can even be detrimental. A local English speaker may enhance their vocabulary and be exposed to totally different phrases by knowing French or German, but it surely doesn't make them a lot better English speaker or writer. Flip that round and a local French speaker goes to give a greater speech than an English speaker who picked up a bit of French. Equally, a hardcore Java/c/C++/Delphi man goes to be higher than someone who dabbles in it.

Other Components
It may very well be argued that it's apparent that getting more experience leads to being a greater programmer, but not so. Solitary follow and accumulation of non-public expertise may get you to date, even will get some people very far, but for many, external exposure is required to drive new experiences and studying whether or not it's writing code, drawing photos or enjoying the guitar.
Joel Spolsky wrote that good programmers are good and get issues performed which additionally occurs to be what makes good lawyers, doctors, accountants and applies to just about each other profession. Clearly being smart is an efficient thing, however that can solely take you to the point where you have to sit down and write some code.

Passion is commonly stated as a requirement for being an excellent programmer, however it is only a means to an end. In itself, it doesn't make a very good programmer however can be the gas that drives the activities that do improve your game. I've recognized various capable (not great) programmers who've little passion for it, they take pleasure in it, however it is purely a 9-5 job for them. The lack of ardour shows in that they're content material to simply use present expertise without spending any time studying new ones or exploring the technical ecosystem out there to them.