our site has been updated ...please check the latest version of this site http://www.labnium.org

Our site has been updated to http://www.labnium.org Please check out the newer version of this site
Latest Posts

Saturday, May 8, 2010

What would you outsource to your mobile operator



The mobile landscape is growing larger and more strategic to business. Users' phones are supporting a blend of personal and business use. Such an environment is complex to plan, build, manage and secure, so how would you feel about outsourcing it? How about outsourcing it to a mobile network operator?

Slowly but surely, the cellular carriers are likely to approach enterprises with managed wireless service packages. Such packages, for example, might include a mix of service usage plans plus the installation and management of in-building cellular equipment that possibly supports Wi-Fi services, as well.

Managed fixed-mobile convergence (FMC) CPE services to enable roaming between the two network types, indoors and out, might be still another option. FMC equipment maker Agito Networks, for example, last week said it has appointed a former AT&T sales exec as its vice president of strategic accounts.

"There is work in the carrier channel, we have signed deals, and this new executive is going to help sling shot that effort," an Agito spokesman told me by e-mail.

Emerging enterprise-grade femtocells and enterprise radio-access networks (E-RAN) will theoretically boost indoor cellular coverage at more affordable rates than distributed antenna systems (DAS). It's a natural fit to partner with one or more wireless carriers for any of these products, because as the license holders of cellular spectrum, carriers must be the ultimate signal source of the indoor equipment. Still, incumbent operators don't exactly have a reputation for flexibility and customer service.

Turning your Wi-Fi network over to your mobile carrier is an even murkier decision, particularly if you are already well into your Wi-Fi implementation.

Some DASs support Wi-Fi already, and new E-RANs (which use the existing Ethernet to distribute cellular signals) may support Wi-Fi, as well. How well Wi-Fi equipment from such companies competes with the mature enterprise-class vendors' products in large companies is at this point unclear.

read more...

Quick Launch Bar – One Click Application Launcher

So far what you do to run an application? Does every time when you what to run an application first you visit to start menu and then programs to look for the desired program?

If the answer is yes! then most probably you haven’t heard or ever used the Quick Launch Bar located in Windows task bar area. It automatically installs when we load or install windows. If you are not able to find it then may be it is disabled(hidden) by the installer to get it re-enabled, Right Click anywhere on the empty space of the Task Bar using Mouse button and from the popup menu choose toolbar and click on Quick Launch.


For the first time when it runs it contains the default item like Outlook Express, Show desktop, Internet explorer, media player etc but now the question arise how you can place an custom or your favourite applications there. Procedure is very simple Locate any porgram’s exe file and Click and hold the left button of you mouse and then drag it to the ” Quick Launch Bar Area “a shortcut of that program” will be automatically placed. Is it not vary simple to launch a program now?

This tool bar is also very customizable like you can adjust the width and the location means right or left. To do so look at the picture above and you can easily locate “Lock the Taskbar” button if it checked uncheck it now you can do whatever you want this small toolbar. Do you like my articles then subscribe, so that you can updated with new articles…

read more...

How to Secure your Private Folders

I know that its been very long since I have posted anything for you. So first of all I am really very sorry this delay but I assure you that from now on it won’t be like that. And to make up for this delay I am posting a nice tutorial which can help you secure your private stuff.




Do you have any private stuff that you would to hide from your friends and relatives? Would you want it to be Invisible so that it remains unnoticed by the normal users? But there are software which can display all the folders that are present on the Disk. So What if you can even password protect your folder? I guess having your private folder password protected as well as invisible should be secure enough. But you might think that you may need to have a software for that. Well here is a way to do that without using any additional software and you can show off in front of your friends by making their folders invisible as well as password protected. Here is is step by step procedure to create a password protected folder.

How to create a Password Protected Folder

1. Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.

2. Now in this folder place all the important files, documents or any folders that you want to password protect.

3. Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.

4. Now a new compressed zipped folder gets created next this folder (ABC) with the same name.

5. Double-click on this compressed zipped folder and you should see your original folder (ABC) here.

6. Now goto the File menu and select the option Add a password.
ie: File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.


How to make it Invisible
1. Now Right-click on this password protected folder and select Properties.

2. At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).

3. In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options

• Do not show hidden files and folders
• Show hidden files and folders

Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.

I hope you like this post. Pass your comments!! Cheers
read more...

12 Security Tips for Shopping Online

The internet is an exciting place to shop. From the comfort of your own armchair you can browse for literally anything, from a new camera, to a holiday or flight. You are not restricted to the stores in your local town, or even country and you can pick up deals at great prices on a whole range of products.



Shopping online isn’t just as safe as handing over your credit card in a store or restaurant. However, if you take care of few things it can be a safe deal. Following are the things you should take care of:

1. Never respond to an email request for credit card details. All reputable companies will conduct transactions with you over a secure website connection.
2. Remember to never respond to any email advertisement, and only visit sites you know or have book marked, and verify the address before browsing further.
3. Only buy from trusted brands and websites.
4. To ensure that you only do business with legitimate companies check to see if they have a contact number, an actual retail store and a printed catalogue to browse.
5. Check a website’s returns and privacy policy before going ahead with a purchase.
6. Check that you are entering your details through a secure payment connection. You should notice when you click through to the transaction page of a company’s website that the URL in the address bar begins https:// (instead of the normal http://). This is the standard encrypted communication mechanism on the internet and means that your credit card details are being sent securely.
7. Beware of deals that seem too good to be true.
8. Beware of the limitations of the internet. The internet may not the best place to buy clothes or other products you need to see, touch or try on.
9. All reputable websites use secure payment systems. These are either a company’s own system or a 3rd party system such as Worldpay or Paypal.
10. When conducting a transaction over the internet, look for the yellow padlock in the grey status bar at the bottom of your browser page. This is an indication that the transaction is being conducted over a secure connection.
11. As an extra precaution check to see if there’s a gold lock at the bottom of the right hand corner of the browser. If they don’t include any of these reliable indicators, you might want to think twice before handing over your credit card number.
12. To be on the safe side, and avoid Internet fraudsters, it’s also a good idea to install and use security software such as Kaspersky Internet Security. It can provide you with industry-leading security services that will provide you more protection against the latest threats.
read more...

Friday, May 7, 2010

Windows Phone 7, Microsoft's mobile strategy finally takes off

Microsoft today announced the new version of its phone operating system, Windows Phone 7. It’s a sweeping redesign, coupled with an aggressive new partnership with handset makers and mobile carriers. Initial reviews are not only positive but actually excited.



With the unveiling today of Microsoft’s next mobile phone platform, Windows Phone 7, it’s now official: the phone is not a PC. That statement became a mantra as Microsoft executives demonstrated a sweeping redesign of the company’s mobile operating system.
But technical details were sparse, and the official Windows Phone Website doesn’t add much. Microsoft didn’t reveal what changes, if any, it had made to the OS kernel, which in the past has been based on Windows CE. The company says the Windows Mobile 7 Web browser is “much more advanced” than any previous offering, but didn’t say from which version of desktop Internet Explorer it borrows the core components.

Microsoft says a brand new set of software development tools and resources, and presumably a software development kit, will be forthcoming but put off details until the company’s MIX10 Web developer conference next month in Las Vegas.

“We knew we needed and wanted to do things that were out of the box, that were clearly differentiated from our past and hopefully from other [offerings] in the market,” said Steve Balmer, Microsoft CEO, who hosted the press conference today at Mobile World Congress in Barcelona, Spain. “It’s a big step. I think we have a chance to have a major impact on the market.”

Balmer wasn’t kidding. Andrew Lees, senior vice president for Microsoft’s Mobile Communications Business talked at length about Microsoft’s mobile partnerships, an approach that’s been given a redesign almost as sweeping as the user interface. Over 1 billion phones are sold globally each year, vastly more than the current smartphone market, he noted. “We need partners to support Windows Phone on this scale,” he said.
Phones from an array of leading handset makers, and all major U.S. mobile operators will be available in time for the holiday shopping season in 2010. Microsoft officials were not more specific.
Using an unidentified prototype phone, Joe Belfiore, vice president of Windows Phone, showed off the new user interface. It’s a dramatic change from Microsoft’s original approach to the mobile market with the PocketPC: as the name implied, the idea was to translate the PC experience to mobile devices. That model is now extinct: “The phone is not a PC,” Belfiore said repeatedly.
With Windows Mobile 7, users start with three buttons at the bottom of the screen: start, search, and back. The initial lock screen gives way to a completely redesigned start screen. Microsoft has discarded the familiar grid-like display of application icons.
Instead, the UI offers a flexible, customizable display that combines elegantly clean, crisp text with intelligent icons, dubbed “live tiles” because they’re linked with online data sources such as Facebook or Flickr or email, grouped in “hubs” that bring together data from applications, corporate servers like Microsoft Exchange, and the Web. Text and tiles “overflow” the touch screen, but users pan quickly through arrangements that are visually consistent in each hub.
One hub is “productivity” which is built around the Microsoft Office suite, including the OneNote note-taking application, and Sharepoint Server. Other hubs organize and synchronize people and contacts, photos, music and video, games via the first mobile phone Xbox Live connection, and marketplace for buying and downloading applications and games.

These integrated user “experiences” represent a real advance in mobile design, according to some.

“This is one feature I expected in [Windows Phone 7] based on prior previews I had had with Microsoft, and this is going to be a huge strength,” says Alex Kac, president and founder of Web Information Systems, a Cedar Park, Texas software company specializing in mobile applications, including those for Microsoft platforms. “This is something Apple has done far better than Microsoft on the desktop, but not well at all on the iPhone and I'm excited to see that.”


The redesign is getting strong early reviews.

“The result is a feat no phone has performed before: Making the iPhone's interface feel staid,” says Gizmodo reviewer Matt Buchanan. “If you want to know what it feels like, the Zune HD [Microsoft’s digital music player] provides a taste: Interface elements that run off the screen; beautiful, oversized text and graphics; flipping, panning, scrolling, zooming from screen to screen….”

“The sheer minimalism of the interface is striking, and we're really impressed by how many risks Microsoft is taking here,” writes Joshua Topolsky, for Engadget. “It's hard to believe that just a year ago this company was showing off WM 6.5, which now looks ages behind what they've turned around with today. We're not sure if someone was just let off the leash or if we're seeing a newer, smarter, more agile Microsoft, but the 7 Series concept definitely shows that this company is learning from its mistakes.”
The Zune influence isn’t to everyone’s taste. Alex Kac admits that he’s not a fan of the Zune UI,though his objections are more aesthetic than functional. “I'm not a fan of the large typography and avant garde look,” he says. “I'm also not a fan of the blackness. The [Google] NexusOne [smartphone interface] is very black and I don't care for it.”
The new OS comes with Microsoft’s search engine, Bing, and Bing Maps, built-in, allowing a range of additional features to be exploited.

The revamped UI will be part of a new hardware platform that Microsoft has developed in an unprecedented partnership with hardware and software vendors, according to Microsoft’s Andy Lees. For the first time, Microsoft worked very closely with Qualcomm to optimize the phone’s silicon, presumably the advanced ARM-based Snapdragon processor, and the core OS software and drivers. Secondly, with its partners, Microsoft has developed a common hardware architecture for Windows Phone 7 devices, for example, defining how sensors such as accelerometers will work in all these handsets. Partners included Dell, HP, HTC, LG, Sony Ericsson, and Toshiba.

There was very little detail about the hardware architecture. Microsoft did reveal that the phones will offer a multi-touch screen experience “in the same way as” desktop Windows 7. And, Windows Phone 7 devices will combine a WVGA multi-touch screen with a display technique, part of Microsoft’s ClearType technology called “sub pixel positioning.” The combination results in text that’s very easy to read, according to Microsoft.

“Microsoft has wisely (finally) decided [that] all device vendors must meet minimum hardware and software resource requirements before their devices will be certified,” writes technology consultant Jack Gold, principle of J. Gold Associates, Northborough, Mass. “This should make for a greatly enhanced user experience, although it will prevent some vendors (e.g., HTC) from creating their own layered UI on top of the OS to make their devices unique.”

Finally, all the leading U.S. mobile carriers plan to introduce Windows Phone 7 devices later this year or early next year. Microsoft is working especially closely with AT&T, currently the sole U.S. operator for the Apple iPhone, and with Orange in Europe.

Lees promised new development tools and resources for Windows Phone application developers but wouldn’t go into details about them. Those details, including to whether or to what degree the phone’s hubs are open to developers, may be critical in getting enterprise developers to embrace the platform.
read more...

Why You Should Help Microsoft Thwart Windows 7 Piracy

Microsoft announced plans to improve efforts to combat piracy of its flagship desktop operating system. An update is coming soon to guard against activation exploits and defend Microsoft, and unwitting customers, against counterfeit copies of Windows 7.

Joe Williams, general manager of Microsoft's Genuine Windows group, stated in a Genuine Windows Blog post "In the coming days, we'll be deploying a new update for Windows Activation Technologies, the set of built-in activation and validation components built into Windows 7."



Williams goes on to explain "Called Windows Activation Technologies Update for Windows 7, this update will detect more than 70 known and potentially dangerous activation exploits. Activation exploits are sometimes called "hacks", and attempt to bypass or compromise Windows' activation technologies. This new update is further evidence of Microsoft's commitment to keeping customers and partners secure."

It is understandable that Microsoft would want to thwart piracy of Windows 7. Obviously, Microsoft has a vested interest in ensuring that every copy of Windows 7 is a legally licensed, and more importantly paid for, copy of Windows 7. Piracy doesn't do much for the bottom line.

The question is whether IT administrators should risk applying it. A user who has a known pirated copy of Windows 7 obviously won't bother applying the update. Many businesses might believe their software is legitimate, though, but be unwittingly running counterfeit versions of Windows 7.

Applying the update should detect that the Windows activation technologies have been circumvented, and place pirated versions of Windows 7 into an unactivated state. The functionality will not be restricted in any way, but the desktop background will change to black and the operating system will frequently display alerts and pop-ups as a reminder that the operating system is not Genuine Windows.

Then what? From a purely moral or ethical stance, those businesses that find they have been duped into purchasing pirated copies of Windows 7 should discard the counterfeit versions and buy new, legitimate copies of Windows 7 from Microsoft. But, that means paying twice for the same software even though the company had no intent to defraud Microsoft in the first place.

IT administrators have more reason than the ethical dilemma, though, to be concerned about counterfeit copies of Windows 7. Williams clarifies in the blog post "Searching for, downloading, or installing activation exploits or counterfeit software on the Internet is risky, because sites that advertise these pirated products often contain malware, viruses, and Trojans, which are found bundled with or directly built into the activation exploit or counterfeit software. A study by research firm IDC, The Risks of Obtaining and Using Pirated Software, shows that one in four Web sites offering counterfeit software attempted to install unwanted or malicious code upon downloading. And this rate is rising."

Williams continues "Media Surveillance, an anti-piracy solutions company based in Germany, recently downloaded more than five hundred pirated copies of Windows 7 (and Windows activation exploits) and found that 32% contained malicious code."
So, essentially, the bargain-priced copies of Windows 7 you acquired from that questionable source online have somewhere between a 25 and 32 percent chance of containing malware and potentially exposing your computer systems and network to further compromise or exploit.

The Windows Activation Technologies Update is signature based and will update its signatures from Microsoft every 90 days and check the operating system again. That part makes no sense at all. If my Windows 7 is legitimate today, how exactly would it become counterfeit 90 days from now?

I support Microsoft's efforts to prevent software piracy and protect customers from potentially malware-ridden counterfeit copies of Windows 7. I think Microsoft would be doing itself, and its customers a favor, though, if it also offered some sort of amnesty or discounted exchange program for small and medium businesses that have fallen prey to Windows 7 pirates.
read more...