our site has been updated ...please check the latest version of this site http://www.labnium.org

Our site has been updated to http://www.labnium.org Please check out the newer version of this site
Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Saturday, May 8, 2010

What would you outsource to your mobile operator



The mobile landscape is growing larger and more strategic to business. Users' phones are supporting a blend of personal and business use. Such an environment is complex to plan, build, manage and secure, so how would you feel about outsourcing it? How about outsourcing it to a mobile network operator?

Slowly but surely, the cellular carriers are likely to approach enterprises with managed wireless service packages. Such packages, for example, might include a mix of service usage plans plus the installation and management of in-building cellular equipment that possibly supports Wi-Fi services, as well.

Managed fixed-mobile convergence (FMC) CPE services to enable roaming between the two network types, indoors and out, might be still another option. FMC equipment maker Agito Networks, for example, last week said it has appointed a former AT&T sales exec as its vice president of strategic accounts.

"There is work in the carrier channel, we have signed deals, and this new executive is going to help sling shot that effort," an Agito spokesman told me by e-mail.

Emerging enterprise-grade femtocells and enterprise radio-access networks (E-RAN) will theoretically boost indoor cellular coverage at more affordable rates than distributed antenna systems (DAS). It's a natural fit to partner with one or more wireless carriers for any of these products, because as the license holders of cellular spectrum, carriers must be the ultimate signal source of the indoor equipment. Still, incumbent operators don't exactly have a reputation for flexibility and customer service.

Turning your Wi-Fi network over to your mobile carrier is an even murkier decision, particularly if you are already well into your Wi-Fi implementation.

Some DASs support Wi-Fi already, and new E-RANs (which use the existing Ethernet to distribute cellular signals) may support Wi-Fi, as well. How well Wi-Fi equipment from such companies competes with the mature enterprise-class vendors' products in large companies is at this point unclear.

read more...

Quick Launch Bar – One Click Application Launcher

So far what you do to run an application? Does every time when you what to run an application first you visit to start menu and then programs to look for the desired program?

If the answer is yes! then most probably you haven’t heard or ever used the Quick Launch Bar located in Windows task bar area. It automatically installs when we load or install windows. If you are not able to find it then may be it is disabled(hidden) by the installer to get it re-enabled, Right Click anywhere on the empty space of the Task Bar using Mouse button and from the popup menu choose toolbar and click on Quick Launch.


For the first time when it runs it contains the default item like Outlook Express, Show desktop, Internet explorer, media player etc but now the question arise how you can place an custom or your favourite applications there. Procedure is very simple Locate any porgram’s exe file and Click and hold the left button of you mouse and then drag it to the ” Quick Launch Bar Area “a shortcut of that program” will be automatically placed. Is it not vary simple to launch a program now?

This tool bar is also very customizable like you can adjust the width and the location means right or left. To do so look at the picture above and you can easily locate “Lock the Taskbar” button if it checked uncheck it now you can do whatever you want this small toolbar. Do you like my articles then subscribe, so that you can updated with new articles…

read more...

How to Secure your Private Folders

I know that its been very long since I have posted anything for you. So first of all I am really very sorry this delay but I assure you that from now on it won’t be like that. And to make up for this delay I am posting a nice tutorial which can help you secure your private stuff.




Do you have any private stuff that you would to hide from your friends and relatives? Would you want it to be Invisible so that it remains unnoticed by the normal users? But there are software which can display all the folders that are present on the Disk. So What if you can even password protect your folder? I guess having your private folder password protected as well as invisible should be secure enough. But you might think that you may need to have a software for that. Well here is a way to do that without using any additional software and you can show off in front of your friends by making their folders invisible as well as password protected. Here is is step by step procedure to create a password protected folder.

How to create a Password Protected Folder

1. Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.

2. Now in this folder place all the important files, documents or any folders that you want to password protect.

3. Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.

4. Now a new compressed zipped folder gets created next this folder (ABC) with the same name.

5. Double-click on this compressed zipped folder and you should see your original folder (ABC) here.

6. Now goto the File menu and select the option Add a password.
ie: File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.


How to make it Invisible
1. Now Right-click on this password protected folder and select Properties.

2. At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).

3. In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options

• Do not show hidden files and folders
• Show hidden files and folders

Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.

I hope you like this post. Pass your comments!! Cheers
read more...

Friday, May 7, 2010

Windows Phone 7, Microsoft's mobile strategy finally takes off

Microsoft today announced the new version of its phone operating system, Windows Phone 7. It’s a sweeping redesign, coupled with an aggressive new partnership with handset makers and mobile carriers. Initial reviews are not only positive but actually excited.



With the unveiling today of Microsoft’s next mobile phone platform, Windows Phone 7, it’s now official: the phone is not a PC. That statement became a mantra as Microsoft executives demonstrated a sweeping redesign of the company’s mobile operating system.
But technical details were sparse, and the official Windows Phone Website doesn’t add much. Microsoft didn’t reveal what changes, if any, it had made to the OS kernel, which in the past has been based on Windows CE. The company says the Windows Mobile 7 Web browser is “much more advanced” than any previous offering, but didn’t say from which version of desktop Internet Explorer it borrows the core components.

Microsoft says a brand new set of software development tools and resources, and presumably a software development kit, will be forthcoming but put off details until the company’s MIX10 Web developer conference next month in Las Vegas.

“We knew we needed and wanted to do things that were out of the box, that were clearly differentiated from our past and hopefully from other [offerings] in the market,” said Steve Balmer, Microsoft CEO, who hosted the press conference today at Mobile World Congress in Barcelona, Spain. “It’s a big step. I think we have a chance to have a major impact on the market.”

Balmer wasn’t kidding. Andrew Lees, senior vice president for Microsoft’s Mobile Communications Business talked at length about Microsoft’s mobile partnerships, an approach that’s been given a redesign almost as sweeping as the user interface. Over 1 billion phones are sold globally each year, vastly more than the current smartphone market, he noted. “We need partners to support Windows Phone on this scale,” he said.
Phones from an array of leading handset makers, and all major U.S. mobile operators will be available in time for the holiday shopping season in 2010. Microsoft officials were not more specific.
Using an unidentified prototype phone, Joe Belfiore, vice president of Windows Phone, showed off the new user interface. It’s a dramatic change from Microsoft’s original approach to the mobile market with the PocketPC: as the name implied, the idea was to translate the PC experience to mobile devices. That model is now extinct: “The phone is not a PC,” Belfiore said repeatedly.
With Windows Mobile 7, users start with three buttons at the bottom of the screen: start, search, and back. The initial lock screen gives way to a completely redesigned start screen. Microsoft has discarded the familiar grid-like display of application icons.
Instead, the UI offers a flexible, customizable display that combines elegantly clean, crisp text with intelligent icons, dubbed “live tiles” because they’re linked with online data sources such as Facebook or Flickr or email, grouped in “hubs” that bring together data from applications, corporate servers like Microsoft Exchange, and the Web. Text and tiles “overflow” the touch screen, but users pan quickly through arrangements that are visually consistent in each hub.
One hub is “productivity” which is built around the Microsoft Office suite, including the OneNote note-taking application, and Sharepoint Server. Other hubs organize and synchronize people and contacts, photos, music and video, games via the first mobile phone Xbox Live connection, and marketplace for buying and downloading applications and games.

These integrated user “experiences” represent a real advance in mobile design, according to some.

“This is one feature I expected in [Windows Phone 7] based on prior previews I had had with Microsoft, and this is going to be a huge strength,” says Alex Kac, president and founder of Web Information Systems, a Cedar Park, Texas software company specializing in mobile applications, including those for Microsoft platforms. “This is something Apple has done far better than Microsoft on the desktop, but not well at all on the iPhone and I'm excited to see that.”


The redesign is getting strong early reviews.

“The result is a feat no phone has performed before: Making the iPhone's interface feel staid,” says Gizmodo reviewer Matt Buchanan. “If you want to know what it feels like, the Zune HD [Microsoft’s digital music player] provides a taste: Interface elements that run off the screen; beautiful, oversized text and graphics; flipping, panning, scrolling, zooming from screen to screen….”

“The sheer minimalism of the interface is striking, and we're really impressed by how many risks Microsoft is taking here,” writes Joshua Topolsky, for Engadget. “It's hard to believe that just a year ago this company was showing off WM 6.5, which now looks ages behind what they've turned around with today. We're not sure if someone was just let off the leash or if we're seeing a newer, smarter, more agile Microsoft, but the 7 Series concept definitely shows that this company is learning from its mistakes.”
The Zune influence isn’t to everyone’s taste. Alex Kac admits that he’s not a fan of the Zune UI,though his objections are more aesthetic than functional. “I'm not a fan of the large typography and avant garde look,” he says. “I'm also not a fan of the blackness. The [Google] NexusOne [smartphone interface] is very black and I don't care for it.”
The new OS comes with Microsoft’s search engine, Bing, and Bing Maps, built-in, allowing a range of additional features to be exploited.

The revamped UI will be part of a new hardware platform that Microsoft has developed in an unprecedented partnership with hardware and software vendors, according to Microsoft’s Andy Lees. For the first time, Microsoft worked very closely with Qualcomm to optimize the phone’s silicon, presumably the advanced ARM-based Snapdragon processor, and the core OS software and drivers. Secondly, with its partners, Microsoft has developed a common hardware architecture for Windows Phone 7 devices, for example, defining how sensors such as accelerometers will work in all these handsets. Partners included Dell, HP, HTC, LG, Sony Ericsson, and Toshiba.

There was very little detail about the hardware architecture. Microsoft did reveal that the phones will offer a multi-touch screen experience “in the same way as” desktop Windows 7. And, Windows Phone 7 devices will combine a WVGA multi-touch screen with a display technique, part of Microsoft’s ClearType technology called “sub pixel positioning.” The combination results in text that’s very easy to read, according to Microsoft.

“Microsoft has wisely (finally) decided [that] all device vendors must meet minimum hardware and software resource requirements before their devices will be certified,” writes technology consultant Jack Gold, principle of J. Gold Associates, Northborough, Mass. “This should make for a greatly enhanced user experience, although it will prevent some vendors (e.g., HTC) from creating their own layered UI on top of the OS to make their devices unique.”

Finally, all the leading U.S. mobile carriers plan to introduce Windows Phone 7 devices later this year or early next year. Microsoft is working especially closely with AT&T, currently the sole U.S. operator for the Apple iPhone, and with Orange in Europe.

Lees promised new development tools and resources for Windows Phone application developers but wouldn’t go into details about them. Those details, including to whether or to what degree the phone’s hubs are open to developers, may be critical in getting enterprise developers to embrace the platform.
read more...

Why You Should Help Microsoft Thwart Windows 7 Piracy

Microsoft announced plans to improve efforts to combat piracy of its flagship desktop operating system. An update is coming soon to guard against activation exploits and defend Microsoft, and unwitting customers, against counterfeit copies of Windows 7.

Joe Williams, general manager of Microsoft's Genuine Windows group, stated in a Genuine Windows Blog post "In the coming days, we'll be deploying a new update for Windows Activation Technologies, the set of built-in activation and validation components built into Windows 7."



Williams goes on to explain "Called Windows Activation Technologies Update for Windows 7, this update will detect more than 70 known and potentially dangerous activation exploits. Activation exploits are sometimes called "hacks", and attempt to bypass or compromise Windows' activation technologies. This new update is further evidence of Microsoft's commitment to keeping customers and partners secure."

It is understandable that Microsoft would want to thwart piracy of Windows 7. Obviously, Microsoft has a vested interest in ensuring that every copy of Windows 7 is a legally licensed, and more importantly paid for, copy of Windows 7. Piracy doesn't do much for the bottom line.

The question is whether IT administrators should risk applying it. A user who has a known pirated copy of Windows 7 obviously won't bother applying the update. Many businesses might believe their software is legitimate, though, but be unwittingly running counterfeit versions of Windows 7.

Applying the update should detect that the Windows activation technologies have been circumvented, and place pirated versions of Windows 7 into an unactivated state. The functionality will not be restricted in any way, but the desktop background will change to black and the operating system will frequently display alerts and pop-ups as a reminder that the operating system is not Genuine Windows.

Then what? From a purely moral or ethical stance, those businesses that find they have been duped into purchasing pirated copies of Windows 7 should discard the counterfeit versions and buy new, legitimate copies of Windows 7 from Microsoft. But, that means paying twice for the same software even though the company had no intent to defraud Microsoft in the first place.

IT administrators have more reason than the ethical dilemma, though, to be concerned about counterfeit copies of Windows 7. Williams clarifies in the blog post "Searching for, downloading, or installing activation exploits or counterfeit software on the Internet is risky, because sites that advertise these pirated products often contain malware, viruses, and Trojans, which are found bundled with or directly built into the activation exploit or counterfeit software. A study by research firm IDC, The Risks of Obtaining and Using Pirated Software, shows that one in four Web sites offering counterfeit software attempted to install unwanted or malicious code upon downloading. And this rate is rising."

Williams continues "Media Surveillance, an anti-piracy solutions company based in Germany, recently downloaded more than five hundred pirated copies of Windows 7 (and Windows activation exploits) and found that 32% contained malicious code."
So, essentially, the bargain-priced copies of Windows 7 you acquired from that questionable source online have somewhere between a 25 and 32 percent chance of containing malware and potentially exposing your computer systems and network to further compromise or exploit.

The Windows Activation Technologies Update is signature based and will update its signatures from Microsoft every 90 days and check the operating system again. That part makes no sense at all. If my Windows 7 is legitimate today, how exactly would it become counterfeit 90 days from now?

I support Microsoft's efforts to prevent software piracy and protect customers from potentially malware-ridden counterfeit copies of Windows 7. I think Microsoft would be doing itself, and its customers a favor, though, if it also offered some sort of amnesty or discounted exchange program for small and medium businesses that have fallen prey to Windows 7 pirates.
read more...

Wednesday, February 3, 2010

10 Tips to make Linux networking easier



Networking is a must-have on all levels of computing. Be it home or
corporate, networking is the one aspect of computing that is, without
a shadow of a doubt, a deal breaker. And with some help, the Linux
operating system can be the king of networking, in both ease of use
and security. But that doesn't mean the average (and sometimes even
the above-average) user can't use some help. These tips should help
make Linux networking go a little more smoothly.


1. Make use of your /etc/hosts file
the hosts file is used for static host names and is a quick way to
create networking shortcuts. One of the first things I do on a Linux
machine is add various machines to the /etc/hosts file. This saves me
from having to type a lot of IP addresses. The format of an address
for this file is:
IP_ADDRESS NICKNAME
For example, if I use one machine for a backup location at IP address
192.168.1.101, I could enter:
192.168.1.101 backups
Now if I have to connect to that machine, say with secure shell, I can
just type ssh -v -l username backups to make the connection.


2. Keep out unwanted users with /etc/hosts.deny
Yet another helpful "hosts" file is the hosts.deny file. This file
allows you to create access control based on client or server names.
This is helpful in many ways. You can block blacklist domains from
gaining access to your network or you can block certain users from
gaining access to certain machines. But no matter how you use it, the
format is the same.
Let's say you want to block the domain bad.domain.name from gaining
access to a machine. To do this, open up the /etc/hosts.deny file (you
will need either root or sudo privileges) and add:
ALL: bad.domain.name
to the bottom of the file. Save it and you're good to go.


3. Let WICD handle your wireless woes
I can't tell you how many times I have found myself banging my head
against a server rack. For the longest time Linux and wireless
networking were simply not good bedfellows. But that is quickly
becoming a thing of the past. With modern distributions, wireless card
detection has become a no-brainer. The issue now is encryption. Many
of the Linux wireless tools have trouble when any encryption is
involved. But the WICD tool takes care of this. Now, connecting to WPA
or WPA2 encrypted wireless networks is simple. Add to that the
amazingly easy GUI employed by WICD and you can check one nasty
headache off your list.


4. Download and install a front end for iptables
You can't assume that just because you are using Linux, you are
secure. You still need some security. And the best security you can
have with Linux is iptables. The only problem with iptables is that it
can be challenging (especially for the new user). Fortunately, there
are outstanding graphical front ends for iptables. One of the best is
Firestarter. This front end makes employing iptables a simple process,
so you won't keep bypassing security out of fear of the learning
curve.


5. Get to know the command-line tools
Let's face it: If you're running Linux, there might be an instance
where you will need to restart your network and you won't have access
to the GUI. In this particular case, knowing that /etc/rc.d/network
restart will do the trick will solve your problem. Of course, that is
not the only networking command-line tool. You'll also want to know
tools like dhclient, traceroute, samba, ping, and netstat.


6. Hard-code your DNS server addresses
I don't know how many times I have had networking problems that
pointed directly at missing DNS server addresses. To this end, I have
made it habit to hard-code my DNS servers into the /etc/resolv.conf
file. The format of the entries is:
nameserver IP_ADDRESS
where IP_ADDRESS is the address of your name server. You can have as
many name servers listed as you need.


7. Install ClamAV
If you run a mail server, an antivirus is essential. Even though you
are running Linux and you know your mail server is immune to
99.9999999% of the viruses in the wild, that doesn't mean all those
clients that download mail from your server are immune. With this in
mind, you will make your administrating life far easier if you install
an antivirus like ClamAV onto your Linux mail server. It will give you
peace of mind and enough security to ensure that your users most
likely won't come knocking at your office door demanding retribution.


8. Know how to configure an IP address manually
Yes, there are GUI tools for this. And yes, they all work very well.
But as you will eventually find if you administer any operating system
long enough, it's never bad to have backup tools to help you do your
job. And one of the best backup tools for Linux networking is the
ifconfig command. Not only will this command return to you (with no
arguments) your network card information, it will also allow you to
configure your network card manually. This is done like so:
/sbin/ifconfig eth0 192.168.1.10 netmask 255.255.255.0 broadcast 192.168.1.255
Of course, you will want to plug in your particular information as it
applies to the above.


9. Get to know your /etc/interfaces (Ubuntu) or
/etc/sysconfig/network-scripts (Red Hat/Fedora) file(s)

This file (or files) is where the information for each network
interface is stored. The format for this file is:
auto lo
iface lo inet loopback
auto eth0
iface eth0 inet dhcp
auto eth1
iface eth1 inet dhcp
auto eth2
iface eth2 inet dhcp
auto ath0
iface ath0 inet dhcp
auto wlan0
iface wlan0 inet dhcp
As you can see above, all of my interfaces are set up for dhcp. This
is my laptop, which goes with me everywhere, so dhcp is a necessity.
But what if I use the wired interface in only one location? For that,
I can hard-code the information here under the eth0 interface like so
(for Ubuntu):
iface eth0 inet static
address 192.168.1.10
netmask 255.255.255.0
broadcast 192.168.1.255
network 192.168.1.104
gateway 192.168.1.1
Or like so (For Red Hat/Fedora):
DEVICE=eth0
BOOTPROTO=static
BROADCAST=192.168.1.255
IPADDR=192.168.1.10
NETMASK=255.255.255.0
NETWORK=192.168.1.104.0
ONBOOT=yes
Again, you would plug in all the information suited to your network
and your device.


10. Don't forget smbpasswd when setting up Samba
Nearly every time clients come to me with Samba issues, the problem is
that they haven't added the user and a password with smbpasswd.
Without doing this, the user will not be able to authenticate to the
Samba server. And when using smbpasswd to add a new user, you have to
add the "-a" switch like so:
smbpasswd -a USERNAME
After you hit Enter, you will be asked for the users' password
(twice).
NOTE: You must have root access (or sudo) to pull this off.
These 10 quick tips should help make various aspects of Linux
networking easier. You never know when you'll wind up having to rely
on the command line or you'll need to enlist the help of a graphical
front end for iptables. Now, if you do, you should be good to go.
read more...

Tuesday, February 2, 2010

Thanksgiving webcam promo leads to malware



The US$10 webcam that Mr. X bought over the Thanksgiving weekend sounds like one of those deals that are too good to be true. And for, it was.

A week later, he's worried and upset because a CD that came with the camera contained a Web link that apparently infected him PC with fake antivirus software.

His story shows how easily malware can get onto the computers of unsuspecting consumers in an era when cyber-criminals are becoming expert at cracking legitimate Web sites to prey on their visitors.

Mr. X bought the camera in order to a way to chat over the Internet with a friend who had just moved to othis countries. When he put the CD that came with the Markvision Magnetic Webcam into his PC, a menu popped up offering his drivers as well as a link to Markvision's site. Wanting to learn more about the product, he clicked on the Web link, but he immediately knew something was wrong.

The Web page was blank, and his PC immediately popped up a window telling his he needed to upgrade his Windows software. When he clicked on the red "X" to dismiss the window, anothis popped up that made it look like his computer was being scanned. That scan was blocked by his McAfee antivirus program, but Mr. was still worried.
Panicked, he shut down the computer and called Office Depot. Their support technicians told his to try a free antivirus program -- Avast -- which then identified rogue antivirus files on his computer.

That didn't sit well with Mr. X, a Web designer based in Chennai, India. "I was really ticked," he said. "My life is on this computer."

Rogue antivirus software typically generates pop-up warnings, telling the victim there’s a security problem and pestering them to get it fixed until they hand over their credit card numbers.

Once installed on the PC, it can be used to download malicious programs, making it a serious security concern, according to Roger Thompson, chief research officer with antivirus vendor AVG Technologies. "The number-one thing that we see every day is rogue antivirus," he said. "I think there are a lot of people making money out of it."

Though the webcam was billed as a "door crahis" promotion at some Office Depot locations, the company said only a small number of customers were affected. "It was our vendor that actually initially had let us know -- so they must have heard directly from their own customers," an Office Depot spokeswoman said via e-mail.
Markvision "has temporarily shut down their Web site in order to protect customers from being exposed to the virus," the spokeswoman said. "We have been advised that they will bring the [site] online once their internal testing confirms that the virus has been removed."

Customers who bought the Markvision webcam don't need to install the company's CD in order to use the product, he added.

Markvision's Web site, at www.Markvision.cc, was online Thursday, but many parts of it had been taken offline. Earlier this week, Google's search engine flagged the site as potentially harmful, saying it had spotted suspicious content those on Nov. 27 and linked the site to Trojan horse and back-door malware infections over the previous three months. Markvision did not respond to messages seeking comment for this story.
read more...

First Look, New IPhone Games From Electronic Arts



On Thursday, EA Mobile unveiled three new games that are coming soon to an iPhone or iPod touch near you. Though no release dates have been set yet, look for theses titles in the coming weeks.


Spore Creatures
Spore Creatures is an adaptation of the creature phase from 2008's evolution simulator, Spore ( Macworld rated 3.5 out of 5 mice ). But thanks to some impressive graphics and an accelerometer-controlled top-down display, Spore Creatures looks to be a game carefully developed for the iPhone platform."

The producer for Spore Creatures, Kam Zambel, sat down with me to demonstrate the gameplay of this evolution simulator. The developers worked hard to create an open world environment for players to explore with their unique critters. The dedication to open-ended gameplay isn't limited to the 20 levels for your creature to scavenge, hunt, and discover, but also to the game's iconic creature creator. Thanks to the iPhone's touchscreen display, manipulating the creature's body is only a pull, pinch, or flick away. Kam explains that with 45 creature parts and five different character traits to level up (offensive, defensive, socialization, movement, and perception), the combinations for unique creatures are virtually infinite.

The game begins when your creature makes its first tepid steps onto land. You'll have to eat creatures smaller than yours to stay alive and collect their DNA to evolve. You can befriend creatures or attack and eat them; each strategy has advantages and disadvantages. You'll also encounter puzzles that will unlock new areas to explore or allow you to defeat "epic creatures" you'll encounter in certain areas. During the demo, Kam showed that in order to get past a boulder, her creature needed to develop legs and pull the rock away.

Throughout gameplay, you can evolve three times and reach new zones. You'll encounter new parts to attach to your creature and develop its skills. The zones are varied too, from beach areas to forests to icy tundra. Each has its own unique creatures to encounter.
While Spore Creatures lacks multiplayer, EA is confident that the customizable abilities of the creatures (thanks to Spore's innovative Creature Creator) and the wealth of things to explore will keep players interested. Spore Creatures will be compatible with all versions of the iPhone and iPod touch.


The Simpsons Arcade
Few cultural icons have the staying power or lasting impact of The Simpsons. Inspired by the 1991 arcade title and featuring the voice talents of the television show cast, The Simpsons Arcade for the iPhone and iPod touch is steeped in authenticity and reverence for the source material.

The game is a side-scrolling beat-'em-up, much in the style of the original arcade game. Steve Robert, producer of the Simpsons Arcade, explains that getting the characters and settings right was a top priority. To that end, Dan Castellaneta, Hank Azaria, Nancy Cartwright, and the other main voice actors all reprise their roles from the series for the iPhone game. When you hear Homer yell "D'oh!" it's the actual voice of Homer, Dan Castellaneta. EA worked with Michael Price, one of the writers for the show, in order to ensure the game was as true to the series (and funny!) as possible.

The plot is something straight out of a Simpsons episode. You play as Homer, who by chance runs into Mr. Smithers while he is in possession of a special donut. Mr. Burns needs that donut and employs half of Springfield to stop Homer from getting to it. Homer, for his part, just wants the forbidden donut.

Each of the six levels features an iconic environment like the Springfield Mall, Krustyland, and Mr. Burn's compound. As Homer, you'll confront iconic bosses, mini bosses, and NPCs straight from the show. On the first level in the streets of Springfield, you'll see Moe idly standing on the side of the street outside his bar. Snowball II runs past you at one point and you'll eventually do battle with Chief Wiggum and Mayor Quimby (both of whom have been bribed by Mr. Burns).

As a brawler, Homer has a full range of attacks at his disposal, including punches, shoulder charges, belly flops, etc. Just like in the original arcade, you can pick up weapons and interact with the environment to a limited degree. The controls are simple too: there's a touchpad D-pad in the corner and a couple buttons on the right. According to Steve Robert, you can earn extra lives and continues by finding trophies hidden throughout the levels and beating the minigames sprinkled through the game.

But what of Bart, Lisa, Marge and Maggie? Well, they're in the game, as well. Though not as full playable characters, you can find tokens throughout the game that will call on them to aid you in battle. If you're in a tough spot and confronted by a ton of enemies, finding one of these tokens can clear the stage quickly. Bart rides in and jumps on Homer's back, shooting from his slingshot and taking out enemies. Lisa uses her jump rope and Marge and Maggie grant Homer improved fighting abilities and temporary invulnerability.

From my initial look at the game, The Simpsons Arcade for the iPhone looks to be an authentic and fun brawler. While we'd love to be able to play as the rest of the family, it's understandable that EA wanted to keep the game focused. During the demo, the combat was well balanced, the environments great, and the references to the show numerous. If you've ever wanted to play as Homer on a donut-obsessed rampage, this is your chance.


Need for Speed Shift
Need for Speed Shift, the hotly anticipated sequel to Need for Speed Undercover, looks to offer more gameplay, more replayability, more content to unlock, and improved well, everything. From the stunning visuals to the extensive track and car lists, the game is sure to make every gear head happy.

Nikhil Dighe, associate producer for Need for Speed Shift, showed a preview of the game. The first thing you'll notice is that this is probably the best looking game you've seen for the iPhone. The cars look realistic, the roads are beautiful, and when the soundtrack is thumping, it's a really fun game to play.

While the game is designed to work on every generation of the iPod touch and iPhone, Nikhil admitted that the game runs best on the iPhone 3GS. Hopefully it will run better on some of the older model iPhones than Command and Conquer, another high-end EA title that really needs the 3GS's improved processor.

There are three modes to choose from: Quick Race, Career Mode, and Multiplayer. The "meat" of the game is in the Career Mode, where you can unlock three cities, four tiers, and twenty-eight events. Like the console games, unlocking content is based on earning stars. You may be able to earn several stars on the first track just by finishing first, but other stars (like leading from start to finish) will take time to unlock and keep you coming back for more. That's why Nikhil believes Need for Speed Shift will offer more replayability than Need for Speed Undercover.

There are 20 licensed cars to earn, though you only start with two in your garage. The soundtrack is a big focus of this iteration of Need for Speed, including 20 licensed tracks from a variety of artists and unique, authentic sounds for each car's engine. Not only can you see a realistic car, but you can hear what it's like to drive it as well.

You can customize your car both visually and technically, offering a selection of kits and assists to improve your car's performance and look.

But what is it like to actually play the game? We got a chance to race Nikhil in head to head multiplayer. The multiplayer mode allows for players to connect over Bluetooth or Wi-Fi. If players have the same access point over Bluetooth, up to four can play at a time. Otherwise, it's limited to two players. Details on what kind of online multiplayer is available have yet to be revealed, but hopefully you can just hop in to a race against a random player online quickly and easily.

During our race, I switched between a cockpit view (which shows damage via a cracked windshield) and a third-person perspective that allows you to more fully see the racetrack (no car damage, however). The visuals were gorgeous and I really appreciated the arrows that helped novice players navigate (otherwise I would have never made some of those turns). I preferred using the iPhone like a steering wheel via the device's accelerometer; it had just the right amount of sensitive and responded beautifully.

I'm not much of a racing fan, but Need for Speed Shift was a heck of a lot of fun to play. With the soundtrack blaring, the engines revving, and hairpin turns through some truly realistic courses, I can honestly say I've never played a more intense (or fun) racing game on the iPhone.
read more...

Boost Up Internet speed without using Softwares




Check this out and you will be amazed………….

Above 90% computers all over the world run Windows... and hence another computer trick.

FACT
But do you know that about 20% of your internet bandwidth is reserved by Microsoft.

**********************************************************

Uses of Reserved Bandwidth
** Windows Automatic Updates rely on this reserved bandwidth.
** Fast loading Microsoft Websites
** Sending Error Reports
** Online Help support in Microsoft Office

*********************************************************

But this can be recovered back...

The Remedy
** Start >> Run
** Type gpedit.msc
** This opens the Policy Editor
** Now, Local Computer Policy >> Computer Configuration
** Then, Administrative Templates >> Network
** Now, click on QOS Packet Scheduler
** Now, on Right hand side
** Double Click Limit reservable bandwidth
** Now in Setting Tab

***************************************************
It says : Not Configured
Reality : The Explain Tab says "By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection"

***************************************************

** So, on Setting Tab select Enabled
** Now, change Bandwidth limit (%) to 0 (Zero)
** Click OK !!!


That's All!!!
Enjoy!!!................
read more...

Monday, February 1, 2010

BrowserMap Map the Path of Your Packets




Download Now: BrowserMapSetup.zip

Version: 1.0
Released: November 17, 2009

Supported Platforms: Windows XP, Vista, & 7 (32 & 64 bit)
Requirements: Microsoft .Net Framework version 3.5 and Internet Explorer 7+ or Firefox 3.5+

As you're probably aware, as you surf the Web, data is hopping from location to location to request and retrieve the bits of information that form the web page you're looking at. You can actually get the IP addresses and names of the machines that your data has bounced around to and from using the Windows built in trace route utility, but do you ever wonder where those machines are? I'm talking about the physical locations.

Our utility BrowserMap provides this less than crucial but quite intriguing piece of data. By simply clicking the Get Url from Browser button and hitting Go, BrowserMap will trace the path of the hops your browser takes to get the web page data, showing you on a map where the different hop points are in the world.




Using BrowserMap

BrowserMap sets itself to synchronize with your default browser either IE or Firefox. However, if your default browser is neither of these, you can choose to synch with IE or Firefox by selecting the Settings menu, clicking on Synch with Browser, and then selecting Firefox or IE.

You can also select Type URL Manually which will remove the Get URL from Browser button. However, even without selecting this option, you can type in a URL and hit Go.

If you do choose to synch with a browser, simply hit the Get URL from Browser button and BrowserMap will retrieve the URL from the open browser. If you have more than one tab open, it will retrieve the URL from the currently selected tab. If you have more than one browser window open, it will get the URL from the top most browser window. Note: If you are synching with Firefox, the page must completely load in the browser before the Get URL from Browser button will be able to retrieve the URL.

Once you've typed in the URL or retrieved the URL from the browser, hit Go. BrowserMap starts to work. The first thing it does is determine your IP address, the one that is visible to the world, not your internal network IP. Next it passes the address to our web service that retrieves the domain information and the latitude and longitude.

All of the domain, latitude, and longitude data is retrieved from a database that we license. The data is updated regularly. However, we cannot guarantee that it is or will ever be 100% accurate.

Once the latitude and longitude are determined, the location is plotted in the map window provided by Microsoft's Bing.com mapping service.

For every hop BrowserMap takes while tracing the data, it repeats this process of looking up the IP address and retrieving the latitude and longitude and mapping it.
read more...

Delete files or folders that are UnDeletable

If you were trying to delete some files and you get any one of these below warnings from windows then the Tool of this week is most suited for you.



• Cannot delete file: Access is denied
• There has been a sharing violation.
• The source or destination file may be in use.
• The file is in use by another program or user.
• Make sure the disk is not full or write-protected and that the file is not currently in use.

Windows File Unlocker
This single-function system utility removes a file’s access restrictions. Unlocker is unobtrusive: it resides in the system tray; an Unlocker command appears in files’ right-click menus.

Description
The application removes file-access restrictions that prevent a user from moving, deleting, or renaming a file. The user right-clicks on a file and selects Unlocker, which displays information regarding the selected file, such as Path Locked, PID, Handle, and Process Path. This program also allows terminating a currently running process. In some cases, files cannot be accessed due to Windows file-access bugs, for which Windows informs the user the file is currently in use–even when it’s not.
Unlocker can effectively bypass this bug’s restrictions; it unlocks or disables whatever is preventing the user to access that file. This tool would be a lot easier to use if it allowed hot keys. Novices to advanced users will find this free application very useful.

Features
• Close any handle.
• Kill any process.
• Unload any Damn DLL. Note: You should be aware of the consequences before doing it.
• Delete index.dat . ‘index.dat‘ is System File which store your IE Web History
• Delete, Rename and Move any file you want without the permission of the owner
• Best of all. It is a Freeware!

How to Use it?
1. Simply right click the folder or file and select Unlocker

2. If the folder or file is locked, a window listing of lockers will appear

3. Simply click Unlock All and you are done!

Download
You can download this free Utility at here


Do comment on it....

Enjoy...
read more...

Sunday, January 31, 2010

Windows 7 Roundup, A Must Read for All Buyers

The long-awaited operating system finally arrived on this Thursday. Unless you scored a Windows 7 free upgrade or plan to go PC shopping soon, the new software will cost a pretty penny (up to $319 for the “Ultimate” edition). So, is Windows 7 worth it?



System Requirements
• 1 GHz 32-bit or 64-bit Processor
• 1GB of RAM (2GBs for 64-bit)
• 16GB Available Hard Drive Space (20GBs for 64-bit)
• DirectX 9-enabled GPU
Obviously, to reap the benefits of many of Windows 7’s other features, higher performance machines are required. If you’re not sure what kind of gear your PC is running but still want to get Windows 7, Microsoft has created a small evaluation program for determining whether you machine is capable of running Windows 7, which can be downloaded directly from Microsoft’s official download center.

Windows 7 Upgrade Advisor will also tell you whether or not you will be able to upgrade your existing OS to Windows 7 or be required to do a fresh install, which will remove all of your preexisting files and settings. If you’d like to find out without having to install the software, Microsoft released an upgrade chart viewable here.

What’s New?




Many of the features of Windows 7 are improvements on the core framework of Windows Vista, but what features are new to Windows 7? Check out the most notable additions below:
New Windows Taskbar: Now, it feels and behaves a lot more like Mac OS X’s dock.
Jump Lists: Context-sensitive menus which are available for each program in your Taskbar and your Start Menu
Unified Search: The old Start Menu gains a greater amount of utility in Windows 7.
Fewer Annoying Popups: Remember the famously intrusive UAC system in Vista?
Device Stage: gives you a single window for interacting with your various gadgets

Better than Vista?
Most reviewers made the inevitable comparison to Microsoft’s last operating system, Vista, which was widely considered a dud. And, most reviewers were happy to announce that Windows 7 is a big improvement over its predecessor. “The first thing you’ll notice about Windows 7 is that it looks like Vista,” writes the Guardian. “It also works like Vista, in the sense that it has the same plumbing underneath, except for a very welcome graphics upgrade to DX11. However, it works much better than Vista, and most of Vista’s annoyances have either been removed, or (mostly) can be changed so the system works the way you like. It takes personalization to extremes.”

Cleaner look



“Windows 7 introduces real advances in organizing your programs and files, arranging your taskbar and desktop, and quickly viewing and launching the page or document you want, when you want it,” says The Wall Street Journal. “It also has cool built-in touch-screen features. It removes a lot of clutter. And it mostly banishes Vista’s main flaws—sluggishness; incompatibility with third-party software and hardware; heavy hardware requirements; and constant, annoying security warnings.”

Speed test




“Windows 7 feels faster than Windows XP and Vista, but it turns out that’s not always the case–sometimes, it’s the slowest out of the three operating systems,” we found that Windows 7 RTM was the fastest to shutdown, and was tied with XP for iTunes encoding. However, it was slower than XP and Vista for both booting up cold by a bit more than 1 second, and slower than either of its predecessors in its Microsoft Office performance.”

Compatibility with old software and hardware




Engadget maintains a Windows 7 upgrade guide, but in their review they say that “anything we found to work in Vista seemed to work just fine (in some cases better!) in Windows 7. That goes for hardware and software, but of course the real test will be when this OS is unleashed upon the masses — your mom’s brother’s 25 year old printer might not make the cut, and we’ll be sure to pour out a 40 upon its behalf. In truth, Microsoft does a very good job with keeping a truly insane quantity of hardware and drivers and vendors happy, but we still think they could do better.”

Compatibility with Drivers




"With the Big Day just days away, expect to see a plethora of announcements from Windows hardware manufacturers about the availability of drivers for Windows 7,” says Driver Detective. Microsoft has addressed the issue of driver compatibility with Windows 7 by requiring all Vista-certified hardware manufacturers to provide Microsoft with compatibility metrics for Windows 7. Those drivers that don’t pass muster on the first blush must be made Windows 7 compatible by the time the new OS is released if the manufacturers wish to retain Vista certification.

Is there any Windows 7 Activation Crack?
“The first crack for Windows 7 RTM Build 6.1.7600.16385 had a short life time span and Microsoft made certain of this aspect,” says Softpedia. The Redmond company revealed that it had worked with Lenovo, the original equipment manufacturer that contributed to the activation circumventing of Windows 7 RTM by leaking the OEM SLP Master Product Key that served as the backbone of the hack, in order to hinder future attempts to bypass the activation and validation process associated with the latest iteration of the Windows client, via this method. The Redmond company indicated that it had blacklisted the special product key issued to Lenovo for the OEM-SLP (System-Locked Preinstallation) of the gold bits of Windows 7.

Sorry Guys Right not there is no Patch available to Activate your Beta copy of Windows 7

The final word




“Windows XP was a great OS in its day. Windows Vista, once it found its feet several months in, was a good OS. With Windows 7, the OS is great again,” concludes Gizmodo. “It’s what people said they wanted out of Windows: Solid, more nimble and the easiest, prettiest Windows yet. There’s always a chance this won’t be a huge hit come October, given the economy and the state of the PC industry, but it’s exactly what Microsoft needs right now. Something people can grab without fear.”
read more...

How to convert Firefox into Fasterfox



We all know that Firefox takes a lot of Time to load when it is run for the first time. Today I will show you a simple way to reduce this loading time and thus turn your slow firefox into fast firefox.
You can slash Firefox’s slow load time by compressing the DLLs and executables. There are many choices for compression but I suggest you use UPX which is free, efficient and time proven.
1. Download UPX from here

2. Unzip upx.exe into your Firefox installation folder which is normally C:\Program Files\Mozilla Firefox.

3. Make sure Firefox is not running then shell to a command prompt in the Firefox installation directory.

4. Type in the following command in a single line and hit return:
for %v in (*.exe *.dll components\*.dll plugins\*.dll) do upx “C:\Program Files\Mozilla Firefox\%v”

5. If on some later occasion you want to unpack the files, just type in the command above but add the decompression switch “-d” after “do upx.”

That’s it; enjoy the difference!
read more...

156 useful Run commands




Run Commands Listed below In Alphabetical Order

All of the Run Command below Work in the Windows XP Operating System Some do Require that you have the application installed. To provoke the run dialogue box where you can enter the run commands Click start and then select Run or even faster hold down the Windows key and press 'R' then enter your command.



To Access… Run Command

Accessibility Controls -- access.cpl
Accessibility Wizard -- accwiz
Add Hardware Wizard -- hdwwiz.cpl
Add/Remove Programs -- appwiz.cpl
Administrative Tools -- control admintools
Adobe Acrobat (if installed) -- acrobat
Adobe Designer (if installed) -- formdesigner
Adobe Distiller (if installed) -- acrodist
Adobe ImageReady (if installed) -- imageready
Adobe Photoshop (if installed) -- photoshop
Automatic Updates -- wuaucpl.cpl
Bluetooth Transfer Wizard -- fsquirt
Calculator -- calc
Certificate Manager -- certmgr.msc
Character Map -- charmap
Check Disk Utility -- chkdsk
Clipboard Viewer -- clipbrd
Command Prompt -- cmd
Component Services -- dcomcnfg
Computer Management -- compmgmt.msc
Control Panel -- control
Date and Time Properties -- timedate.cpl
DDE Shares -- ddeshare
Device Manager -- devmgmt.msc
Direct X Control Panel (if installed)* -- directx.cpl
Direct X Troubleshooter -- dxdiag
Disk Cleanup Utility -- cleanmgr
Disk Defragment -- dfrg.msc
Disk Management -- diskmgmt.msc
Disk Partition Manager -- diskpart
Display Properties -- control desktop
Display Properties -- desk.cpl
Display Properties (Appearance Tab) -- control color
Dr. Watson System Troubleshooting Utility -- drwtsn32
Driver Verifier Utility -- verifier
Event Viewer -- eventvwr.msc
Files and Settings Transfer Tool -- migwiz
File Signature Verification Tool -- sigverif
Findfast -- findfast.cpl
Firefox (if installed) -- firefox
Folders Properties -- folders
Fonts -- control fonts
Fonts Folder -- fonts
Free Cell Card Game -- freecell
Game Controllers -- joy.cpl
Hearts Card Game -- mshearts
Help and Support -- helpctr
HyperTerminal -- hypertrm
Iexpress Wizard -- iexpress
Indexing Service -- ciadv.msc
Internet Connection Wizard -- icwconn1
Internet Explorer -- iexplore
Internet Properties -- inetcpl.cpl
Internet Setup Wizard -- inetwiz
IP Configuration (Display Connection Config) -- ipconfig /all
IP Configuration (Display DNS Cache) -- ipconfig /displaydns
IP Configuration (Delete DNS Cache) -- ipconfig /flushdns
IP Configuration (Release All Connections) -- ipconfig /release
IP Configuration (Renew All Connections) -- ipconfig /renew
IP Configuration (Refreshes DHCP) -- ipconfig /registerdns
IP Configuration (Display DHCP Class) -- ipconfig /showclassid
IP Configuration (Modifies DHCP Class) -- ipconfig /setclassid
Java Control Panel (if installed) -- jpicpl32.cpl
Java Control Panel (if installed) -- javaws
Keyboard Properties -- control keyboard
Local Security Settings -- secpol.msc
Local Users and Groups -- lusrmgr.msc
Logs You Out Of Windows -- logoff
Malicious Software Removal Tool -- mrt
Microsoft Access (if installed) -- msaccess
Microsoft Chat -- winchat
Microsoft Excel (if installed) -- excel
Microsoft Frontpage (if installed) -- frontpg
Microsoft Movie Maker -- moviemk
Microsoft Paint -- mspaint
Microsoft Powerpoint (if installed) -- powerpnt
Microsoft Word (if installed) -- winword
Microsoft Syncronization Tool -- mobsync
Minesweeper Game -- winmine
Mouse Properties -- control mouse
Mouse Properties -- main.cpl
Nero (if installed) -- nero
Netmeeting -- conf
Network Connections -- control netconnections
Network Connections -- ncpa.cpl
Network Setup Wizard -- netsetup.cpl
Notepad -- notepad
Nview Desktop Manager (if installed) -- nvtuicpl.cpl
Object Packager -- packager
ODBC Data Source Administrator -- odbccp32.cpl
On Screen Keyboard -- osk
Opens AC3 Filter (if installed) -- ac3filter.cpl
Outlook Express -- msimn
Paint -- pbrush
Password Properties -- password.cpl
Performance Monitor -- perfmon.msc
Performance Monitor -- perfmon
Phone and Modem Options -- telephon.cpl
Phone Dialer -- dialer
Pinball Game -- pinball
Power Configuration -- powercfg.cpl
Printers and Faxes -- control printers
Printers Folder -- printers
Private Character Editor -- eudcedit
Quicktime (If Installed) -- QuickTime.cpl
Quicktime Player (if installed) -- quicktimeplayer
Real Player (if installed) -- realplay
Regional Settings -- intl.cpl
Registry Editor -- regedit
Registry Editor -- regedit32
Remote Access Phonebook -- rasphone
Remote Desktop -- mstsc
Removable Storage -- ntmsmgr.msc
Removable Storage Operator Requests -- ntmsoprq.msc
Resultant Set of Policy (XP Prof) -- rsop.msc
Scanners and Cameras -- sticpl.cpl
Scheduled Tasks -- control schedtasks
Security Center -- wscui.cpl
Services -- services.msc
Shared Folders -- fsmgmt.msc
Shuts Down Windows -- shutdown
Sounds and Audio -- mmsys.cpl
Spider Solitare Card Game -- spider
SQL Client Configuration -- cliconfg
System Configuration Editor -- sysedit
System Configuration Utility -- msconfig
System Checker Utility (Scan Immediately) -- sfc /scannow
System Checker Utility (Scan At Next Boot) -- sfc /scanonce
System Checker Utility (Scan On Every Boot) -- sfc /scanboot
System Checker Utility -- sfc /revert
System Checker Utility (Purge File Cache) -- sfc /purgecache
System Checker Utility -- sfc /cachesize=x
System Information -- msinfo32
System Properties -- sysdm.cpl
Task Manager -- taskmgr
TCP Tester -- tcptest
Telnet Client -- telnet
Tweak UI (if installed) -- tweakui
User Account Management -- nusrmgr.cpl
Utility Manager -- utilman
Windows Address Book -- wab
Windows Address Book Import Utility -- wabmig
Windows Backup Utility (if installed) -- ntbackup
Windows Explorer -- explorer
Windows Firewall -- firewall.cpl
Windows Magnifier -- magnify
Windows Management Infrastructure -- wmimgmt.msc
Windows Media Player -- wmplayer
Windows Messenger -- msmsgs
Windows Picture Import (camera connected) -- wiaacmgr
Windows System Security Tool -- syskey
Windows Update Launches -- wupdmgr
Windows Version (show windows version) -- winver
Windows XP Tour Wizard -- tourstart
Wordpad -- write
read more...

20 Best Software Testing Interview Question

1. Can u test a website or a web application manually without using any automation tool?

As per my idea we can test a web application manually without using automation but its time consuming and might have error so to make our task easy and error free we use automatons tool like Qtp.

As for as Manual is concerned we can test Usability, Functionality, Security testing but whereas performance is concerned we can’t do it manually accurate


2. What tools are used in Manual testing for bug tracking and reporting?

For bug tracking and reporting there are many tools like
Rational clear quest.
PVCS
Bugzilla


3. At what stage in the SDLC testing should be started?

Testing Starts from the starting sate of SDLC that is requirement stage where we prepare SRS or URS DOC.


4. What is mean by designing the application and coding the application?

Designing and Testing are two different phases in a software development process (SDLC).

1. Information Gathering
2. Analysis
3. Designing–
4. Coding
5. Testing–
6. Implementation and Maintenance.

If u want answer in Testing terms means STLC, designing test includes preparing Test Strategy, Test Plan and Test Case documents, and testing means executing the test cases and generating Test Reports.

Designing the application as per the requirements designing the application is nothing but deriving the functional flow, alternative flow, how many modules that we are handling, data flow etc
Two types of designs are there

HLD:
In this designing team will prepare functional architecture i.e Functional flow

LLD:
In this designing team will divide the total application into modules and they will derive logic for each module Coding: writing the course code as per the LLD to meet customer requirements


5. What is the best way to choose automation tool?

We use automation only for version wised projects, means if the project comes up with different versions. Once we write the scripts for one version, we can use these scripts with multiple versions with minor changes. So the main advantage of automation is:
1. Saves the time.
2. Saves money.


6. What is the point of reference by which something can be measured?
1. Benchmark 2. Baseline 3. Metric 4. Measure 5. Indicator


Baseline


7. What is Concurrency Testing?

Multi-user testing geared towards determining the effects of accessing the same application code, module or database records. Identifies and measures the level of locking, deadlocking and use of single-threaded code and locking semaphores.


8. When does metrics validation occur? 1. Throughout the life cycle 2. During the test 3. After the test 4. During requirements definition 5. After the final software release Justify your answer with simple explanation.?

Throughout the life cycle - TO identify the lag & overcome


9. How to choose a test automation tool?

We have to choose depends upon the application complexity & delivery time.


10. Did u come across STUBS and DRIVERS? How did u use these in u r project ?

Stub : A piece of code that simulates the activity of missing components.
Driver : A piece of code that passes test cases to another piece of code.

i will give a gen example….suppose u have 3 modules…A B C…A n B r 100% comp….and C is only 50% comp….u r under pressure to comp in a time frame…what u do is u know to build the mod C u need at least 15 days…so u build a dummy mod C which will take 1/2 days…This is STUB now once all the mod A B and C(dummy) r ready..u integrate them to see how it works..This is a DRIVER


11. On what basis you are fixing up the time for project completion?

Test strategy; Based on the test strategy and testing Approach


12. How u r breaking down the project among team members?

It can be depend on these following cases—-
1) Number of modules
2) Number of team members
3) Complexity of the Project
4) Time Duration of the project
5) Team member’s experience
etc……


13. Usually customers won’t give all the requirements. How will u manage & collect all the necessary information?

Sometimes customer may not produce all the requirements. At this situation Business analyst and project manager will use their experience which they handles this type of projects otherwise we will go through some reference sites where we will observe the functionality and they will prepare use cases and requirements.

or

I am agree with the above answer.
If we really face such a problem then it is better to get information from development team so that we can know the exact info Or else use Ad-hoc testing for the required job.


14. What are the Qualities needed by a software tester?

A software tester must have intent of showing the product is not working as specified.
Software tester have the basic attitude of showing the presence of errors. He must have perspective of customers i.e he has to use the system as he is the client of the system. He has to strive for the quality.

Or

Software Tester must has these qualities—
1)He/she must observe the problem from both the side say user and programmer.
2)Must has good under standing with other team members .
3)Able to understand programmers view.
4)Once start testing, do not put it remain.
5)First test requirements of the user.
6)Before start testing first analysis the project like ;
technology using in project, all the flow etc……


15. In Testing 10 cases you found 20 bugs then how will you know which bug is for which test case?

Each Bug Will Have a Unique Bug-ID which would be related to that particular Test Case. We also make use of the Matrix to keep track of bugs and test cases.


16. What is the path for test director, where the test cases are stored?

c:\TDcomdir\TD_projectname\tests\test no
Usually test cases are stored in Test Plan in Test director


17. What is mean by test suite?

Test suit is “set of test cases”
Group of test cases is nothing but functional (+ve & -ve) and GUI


18. Suppose u have raised one bug have posted to that concerned developer. He can’t accept that is a bug. What will u do in the next stage?

If the developer won’t accept our sent bug, then we show it to our team leader or we can show it to our superior person. so he/she will go and discuss with developer or else they will conduct one meeting on that.

Or

Sometimes bug not reproducible in Dev Environment at that situation dev doesn’t accept
we will give him screen shots. If still debate occurs we raise the issue in bug triage meeting


19. Role of Software Test Engineer in Software Company?

The role of a software test engineer in company is to find the defect. He/She should have “test-to-break” attitude. He/She has to test the application taking the customer into mind. He should work hard for quality.


20. Suppose you testing Calculator application and you got problems like 1/1=2, 2/2=1, 3/3=6, 4/4=1, 5/5=10. Now how will you describe the bug title as well as give the bug description?

Bug title : Calculation Errors
Description: Unable to do the calculations of this application.like the output is giving an undefined/Unstructured format.
Here the examples :
1/1=2………
Severity : Critical
Priority: High/Medium(depends on your Requirement to solve)
Bug Title:calculator_functionality_Division
Description:Division function is not working properly when the values are(both) same and even.
read more...

Friday, January 29, 2010

How To Make Mozilla FireFox Super Fast

Here is a tutorial in which i am going to tell you how to make Mozilla Firefox really fast. This is a simple trick and I guess most of you already know but you will see a little change in this trick.

So Lets Start:

1. First open firefox and type the following in the addressbar: about:config




2. Now Right click> New> integer




3. A window will come up name it: layout's.initialpaint.delay




(after that hit ok)

4. Now another box will come up change that to: 0




Ok now in the filter box located just below the addressbar and tabs is something called the filter bar. What it does is sorts the text and norrows down what you type in the box

5. Type the following in the filter bar: network.http.proxy.pipelining
once located double click so it is then set to true and not false





6. Now do the same to: network.http.pipelining

7. Ok now both are set to true

8. Now find network.http.pipelining.maxrequests
double click that and a window will come up change that to around "1000" you can go higher (some people say 30) i just havent tried it yet but sometimes if you do go higher it doesnt go as fast but "1000" loads really fast





9. Ok now that that is what step 5-8 should look like




And you are done. The people having fast internet connections won't see a lot of change but people using slow connections will see a lot of improvement. If you still have any questions please comment.

Do comment on it....
Enjoy..
read more...

How long your system has been Running

Take a look at this, to check out the time from which your system has been running……………..



Here's how you verify system uptime:


Click Start | Run and type cmd to open a command prompt.
At the prompt, type systeminfo

Scroll down the list of information to the line that says System up Time.

This will tell you in days, hours, minutes and seconds how long the system has been up.

Note that this command only works in XP Pro, not in XP Home.

You can, however, type net statistics workstation at the prompt in Home.

The first line will tell you the day and time that the system came online.

Hope this information is benefited to you………..
read more...