Tuesday, December 18, 2007

Googling oneself is more popular

Many Check The Internet To Find Out About Themselves & Others

More netizens are Googling themselves and many are checking out their friends, co-workers and romantic interests, too. In a report on Sunday, the Pew Internet and American Life Project said 47 percent of US adult Internet users have looked for information about themselves through Google or another search engine.
That is more than twice the 22 percent of users who did in 2002, but Pew senior research specialist Mary Madden was surprised the growth wasn’t higher. “Yes it’s doubled, but it’s still the case that there’s a big chunk of Internet users who have never done this simple act of plugging their name with search engines,” she said. “Certainly awareness has increased, but I don’t know it’s necessarily kept pace with the amount of content we post about ourselves or what others post about us.”
About 60 percent of Internet users said they aren’t worried about the extent of information about themselves online, despite increasing concern over how that data can be used. Americans under 50 and those with more education and income were more likely to self-Google in some cases because their jobs demand a certain online persona.
Meanwhile, Pew found that 53 percent of adult Internet users admit to looking up information about someone else, celebrities excluded.
Often, it’s to find someone they’ve lost touch with. But looking up information about friends, relatives, colleagues and neighbours also was common. Although men and women equally searched for online information about themselves, women were slightly more likely to look up information about someone they are dating. In many cases, the search is innocuous, done to find someone’s contact information.

But a third of those who have conducted searches on others have looked for public records, such as bankruptcies and divorce proceedings. A similar number have searched for someone else’s photo.
Few Internet users say they Google themselves regularly about three-quarters of self-searchers say they have done so only once or twice. And most who have done so consider what they find accurate. Only 4 percent of Internet users said embarrassing or inaccurate information online resulted in a bad experience.
Pew also found that teens were more likely than adults to restrict who can see their profiles at an online hangout like Facebook or News Corp.’s MySpace, contrary to conventional wisdom. “Teens are more comfortable with the applications in some ways, (but) I also think they have their parents and teachers telling them to be very careful about what they post and who they share it with,” Madden said. The telephone survey of 1,623 Internet users was conducted between Nov. 30 and Dec. 30 last year and has a margin of sampling error of plus or minus 3 percentage points.

Tuesday, September 18, 2007

Google Search Tips!!

Google can be your phone book: Type person's name, city, state directly into search box, and Google will deliver phone and address listings at the top of results. The feature works for business listings too.

Google can be your calculator: Type a math problem into the search box and Google will compute it. You can spell the equation in words (two plus two, hundred divided by three), use numbers and symbols (10+56) or type in a combination of both (one lakh*pi, 47% of 23).

Longer is better, but shorter is okay: Google is designed to return high quality results even for one or two word queries, so you can keep your searches short. But adding a few more words often yields better results.
Example: While gathering information on applying to colleges include admissions after the name of university you are searching to get more relevant results.

Use quotation marks when precision matters: Adding quotes around a query tells Google to look for occurrences of the exact phrase as it was typed .That makes quote marks especially helpful when searching for a song lyrics, people's names, or expressions such as "to be or not to be" that include very common words.

Google can be you dictionary: Type "define" followed by any English word into the search box and Google will return a quick definition at the top of search results.

Capitalization doesn't matter: Googling About Google and about Google yields the same results. So whether you type in upper case or in lower case Google treats them equally.

Forget pluralism: Google searches automatically searches for all the stems of a word, so you don't need to do searches for paint, paints, painting. Just type one of the words Google will take care of the rest, giving you results all in one list.

Get a picture: Looking for a photo of Sachin Tendulkar, or the Sachin tendulkars hotel? Click on the "images" link above the search box, type your query and Google will provide any photos or graphics in its database of over one billion images that match your terms, with a link to the page where they appear.
Bonus Tip: Image searches may lead you to helpful websites that you otherwise might not find in the regular search results.

Maps driving directions and satellite views are one click away: The fastest way to finding fastest way to your destination is to enter a city and state (or just pin code) into search box. Type Washington dc and Google will provide a direct link to its own map and directions service, maps.google.com.

Browse the world's bookshelves online: Search for a topic at print.google.com and you will see information from actual books that Google has scanned and indexed in its database.

Dial GOOGL when you're on the go: Get phone numbers. Directions movies times, stock quotes, and more delivered to your cell hones. Send text message with your query to the number 46645(GOOGL on most US phones) and the search engine will message you back with instant answers.

I’m feeling lucky: Enter a search term and click this button on the Google homepage to bypass a long list of results and go directly to the top = matching webpage for your term.

Google can be your news caster: Google news, reachable via the "News" link above search box at news.google.com, provides up-to-the-minute information on politics, business, technology entertainment, etc

Google can be your weatherman: Type weather followed by a zip code or the name of the city, and Google will give the current conditions and a four day forecast at the tip of the results page.

Take a magic ~ ride: The tilde character "~" in the corner of your keyboard is a handy tool in Google searches. Put it before a word, with no space between, to have Google look for pages with both that term and its synonyms.
Example: A search for ~auto will also turn up web pages that use terms cars, trucks, automobiles, and more.

Get instant quote: Type a stock ticker symbol into the search box to get a stock quote and chart on any public company listed on the New York stock Exchange, American stock exchange or NASDAQ.

Wednesday, August 29, 2007

Google 2 Charge

Google will take a fee of $20 per year from those who want additional storage in its Gmail and Picasa applications.

As of now , Google offers free storage space of 2.8GB for Gmail and 1GB for Picasa.By paying $20,users can have extra 6GB storage.

Yahoo,on the other hand offers unlimited storage in its mail service.

Microsoft has also refurbished its Windows Sky drive applications and now offers 500GB storage for free.You can put your files there and access them from anywhere in the world. All you need is a Hotmail ID.

Tuesday, August 14, 2007

How to fix 'Orkut is banned Virus' ??

This is a virus which mainly comes from pen drives.
Which you type www.orkut.com in address bar of browser gives the message!!

"Orkut is banned you fool, The administrators didnt write this program guess who did?? MUHAHAHA!!" with title ORKUT IS BANNED.

To Remove this virus follow these steps.

1. Press CTRL+ALT+DEL and go to the processes tab

2. Look for svchost.exe under the image name. There will be many but look for the ones which have your username under the username

3. Press DEL to kill these processes. It will give you a warning, Press Yes

4. Repeat for more svchost.exe files with your username and repeat. Do not kill svchost.exe with system, local service or network service!

5. Now open My Computer

6. In the address bar, type C:\heap41a and press enter. It is a hidden folder, and is not visible by default.

7. Delete all the files here

9. Now go to Start --> Run and type Regedit

10. Go to the menu Edit --> Find

11. Type "heap41a" here and press enter. You will get something like this "[winlogon] C:\heap41a\svchost.exe C:\heap(some number)\std.txt"

12. Select that and Press DEL. It will ask "Are you sure you wanna delete this value", click Yes

13. Now close the registry editor.

Now the virus is gone. But be sure to delete the autorun.inf file and any folder whose name ends with .exe in the pen drive.

Some reported that after this fix they were not able to see their Hidden folders and files if you have that issue try the folowing

1. Go to REGEDIT


3. set the DWORD "NoFolderOptions" to 0 or just delete it..

Other Posts

How to fix "Hacked by Godzilla " Virus.
Know more about Disk Defragmentation.
Speed up your internet Connection.
Speed up your computer

Sunday, July 29, 2007

Google to reduce history of personal searches.

Faced with critism from privacy activists and questions from the European Union,Google announced that it would cut back on how long it keeps the web search histories of users, to 18 months from 24.Search information will now be made anonymous after one year and half, the company said in a letter addressed to european union watchdog Group.

The information which gathered every time Google's Search engine is used, gives indications of searcher's tastes and interests.Google shares general information on search trends, but says that it does not release this personal information outside the company.

Analysis of log data is necessary for engineers to refine search quality to place the mopst popular results at the top and build new services the company said. One such service from Google is its spell checker, which automatically looks at a query to see if the searcher has employed the most common spelling of word

Tuesday, July 24, 2007

Take a "safari"!!

Apple has thrown its own browser into the PC arena,Safari the highly acclaimed internet browser that was previously available only for the MAC platform, had now been made available for windows.

The browser comes in two versions for Windows XP and Vista for the PC- onw with QuickTime bundled with it(28MB) and the other without(8MB). Both are available for free download from http://www.apple.com/safari.


Apple claims that the browser is the fastest in cyberspace when it comes to rendering HTML pages and JavaScript , and judging by my brief experience, it is no idle boast.Then there are inevitable little touches that are the hallmark of Apple design-a  scroll bar is visible only when you need it;the address bar acts as the progress bar too filling up with blue color to indicate how much of the site has been downloaded; and the smooth metallic look that makes Firefox and IE look downright dowdy.

It's still beta!!

The problem is that Safari is still in beta- a term that is used to hide a thousand vices. And the browser does its problems.It is prone to atleat one crash every three hour.Some websites also do not function completely within safari.I could not chat in GMail while using browser.

The windows version of safari is faster and sleeker than any thing in the browser bazaar today!!!

Manoranjan Reddy Mandadi

Wednesday, July 18, 2007

Eyeing the iPhone?

Eyeing the iPhone?

The much anticipated iPhone from Apple was finally launched in the US on June29.It will pack a phone,audio/video player,a 2 mega pixel camera,internet capabilities and intelligent touch screen operation onto a single device.It will cost approximately $599 for the 8GB version and $499 for the 4GB sibling.
While US consumers had already got their hands on iPhone this june,Europe will have to wait till the end of the year.As for the indian launch date on contacting Apple india,all we recieved was a silence.

If you are planning to buy an iPhone during your next trip to US or order it from there,there could be a problem.The phone feature might not work at all in india, as Apple plans to launch the product with specific service providers in mind.

iPhone has a 3.5 inch multi-touch screen, that lets you operate the device with just you fingers.The iphone also features a QWERTY touch key board,where you type by tapping at the screen with your fingers.


The battery has enough juice for five hours of talk,video or browsing. Apple promises uo to 16 hours of audio playback which is on par with the top MP3 players.Videos will look good, thanks to 320X480 screen resolution.It also supports IMAP,POP3 e-mail and Yahoo Push email. With POP3 you can download mail and contacts from server on to your device,while IMAP will allow you to access your email directly from the server without having to download.

For indian users the biggest limiting factor as of now is that the phone function will work only with the service provider Apple has tied up with.So hold on till the India launch--when ever that happens.

Saturday, July 14, 2007

Doctors to store info under your skin.

Doctors could soon be storing essential medical information under the skin of their patients, The American Medical Associations says.

Devices the size of grain of rice that are implanted with a needle could give emergency room doctors quick access to the records of chronically ill patients.

The Association adopted a policy stating that the devices can improve the "Safety and Efficiency of patient care" by helping to identify patients and enabling secure access to clinical information. These radio frequency identification tags are already used by Wal-Mart and other businesses to speed up their shipping systems by sending out small signals that can be scanned more easily than bar codes.

Implanting them in people can improve the continuity and coordination of care with resulting reductions in adverse drug events and other medical errors.

Wednesday, June 27, 2007

Learn Windows Vista

First the booting sequence of Vista.

The sequence of booting Windows Vista is slightly different to any previous version of windows .

First, when the computer is switched on, either the BIOS or the EFI is loaded. In the case of a BIOS system, the MBR of the boot disk, which can be a hard drive or external media, is accessed, followed by the boot sector of the drive or of relevant hard disk partition. This boot sector then loads the rest of the boot blocks.

For Windows Vista, the boot sector loads the Windows Boot Manager (Filename:Bootmgr.) which accesses the Boot Configuration Data store and uses the information to load the final stage

Windows Boot Manager

The Windows Boot Manager reads the Boot Configuration Data and "displays an operating system selection menu"


winload.exe is the operating system boot loader. It is invoked by the Windows Boot Manager in order to load the operating system kernel (ntoskrnl.exe) and (boot-class) device drivers and is in that respect functionally equivalent to (the operating system loader functionality of) NTLDR in prior versions of Windows NT.

Boot Configuration Data

Boot Configuration Data (BCD) is a database for boot-time configuration data. It replaces the boot.ini that was used by NTLDR, and is used by Microsoft's new Windows Boot Manager.

Boot Configuration Data may be altered using a command-line tool (bcdedit.exe)

Boot Configuration Data contain the menu entries that are presented by the Windows Boot Manager, just as boot.ini contained the menu entries that were presented by NTLDR.

These menu entries can include:

Options to boot Windows Vista by invoking winload.exe.
Options to resume Windows Vista from hibernation by invoking winresume.exe.
Options to boot a prior version of Windows NT by invoking its NTLDR.
Options to load and to execute a Volume Boot Record.

Lets see hardware requirements of Vista.

Minimum Requirements (Vista-Capable PCs):

* 800 MHz Intel-compatible processor
* 512MB of RAM
* DirectX 9.0-Capable Graphics Processor
* 20GB HD
Windows Vista recommended system requirements.

Home Basic

1 GHz 32-bit (x86) or 64-bit (x64) processor
512 MB of system memory
20 GB hard drive with at least 15 GB of available space
Support for Direct X 9 graphics and 32 MB of graphics memory
DVD-ROM drive

Home Premium / Business / Ultimate

1 GHz 32-bit (x86) or 64-bit (x64) processor
1 GB of system memory
40 GB hard drive with at least 15 GB of available space
Support for DirectX 9 graphics with:

* WDDM Driver
* 128 MB of graphics memory (minimum)
* Pixel Shader 2.0 in hardware
* 32 bits per pixel

DVD-ROM drive.

Sunday, June 24, 2007

Disk Defragmentation

When Microsoft Windows XP stores files on your hard disk it does not lay them down in one spot. Instead, it stores parts of your file in different places all over your hard disk. This 'scattering' of the parts of your file is called fragmentation.

Why Is Fragmentation Bad?

Your hard disk reads the information on your disk by moving a 'head' (like a cassette tape head, only smaller) across the disk surface. If the data that the drive head is looking for is in several places (fragmented) on the disk it has to physically move to every location that the data is stored in. This physical motion of the drive actuator arm that holds the head takes time, so the more fragmented your files are, the longer it takes to read them, thereby slowing down your computer!

Defragging Your Disk Does Not 'Fix' Anything

Many new computer users seem to think that defragmenting their hard drive will fix problems. I Don't know why so many people think this, but they are probably confusing Microsoft's Defrag program with Scandisk. Scandisk can check your disk for errors and fix many common problems. Click Here to read more about Microsoft Scandisk. Microsoft's Defrag can help speed-up your PC, but it will not actually fix anything.

How To Run Microsoft Defrag On Your PC??

To defragment your hard drive follow these steps:

* Find the My Computer icon and double click.
* Find the icon for the drive you want defragmented (usually C:) and click it with your right mouse button
* On the small menu that pops up, choose Properties
* On the Properties window that appears, click on the the Tools tab at the top
* On the Tools window, press the Defragment Now button located in the center of the window
* After the Disk Defragmenter Window appears, press the Defragment button
(note that you may also have a Defragment icon in your start menu, under Accessories)

Go Take A Break While Windows Defragments Your Hard Drive

A severly fragmented hard drive can take hours to fully defragment, so plan on doing your defragging when you don't need your PC.

Friday, June 22, 2007

OS Market Shares

Client OS Market Share for May,2007
Windows XP - 82.02%%
Windows 2000 - 4.31%
Mac OS - 3.95%
Windows Vista - 3.74%
MacIntel - 2.51%
Windows 98 - 1.24%
Linux - 0.70%
Windows NT- 0.69%
Windows Me- 0.62%
Other - 0.17%

Wednesday, June 20, 2007

Visa Cards

We all use credit cards and debit cards, we find "VISA" on those.
What is this VISA???
Is it an organisation??

In 1958, the Bank of America launched its pioneering BankAmericard credit card program in Fresno, California. The product idea was that of a bank branch manager, who stopped by a local store and observed clerks in a back room preparing customers' monthly bills. It struck him as inefficient to spend so much time (and money) to prepare and collect bills that were often for paltry amounts,and he wondered if the process could be efficiently centralized, with his bank's computer preparing the bills in off-hours.

In 1970, Bank of America gave up control of the BankAmericard program. The various BankAmericard issuer banks took control of the program, creating National BankAmericard Inc. (NBI), an independent non-stock corporation which would be in charge of managing, promoting and developing the BankAmericard system within the United States, although Bank of America continued to issue and support the international licenses themselves. By 1972, licenses had been granted in 15 countries.In 1974, IBANCO, a multinational member corporation, was founded in order to manage the international BankAmericard program.

In 1976, the directors of IBANCO determined that bringing the various international networks together into a single network with a single name internationally would be in the best interests of the corporation; however in many countries, there was still reluctance to issue a card associated with Bank of America, even though the association was entirely nominal in nature. For this reason, in 1977 BankAmericard, Chargex, Barclaycard, Carte Bleue, and all other licensees united under the new name, "Visa", which retained the distinctive blue, white and gold flag. NBI became Visa U.S.A., and IBANCO became Visa International.

Visa offers through its issuing members the following types of cards:
* Debit cards (pay from a checking / savings account)
* Credit cards (pay monthly payments with interest)
* Prepaid cards (pay from a cash account that has no checkwriting privileges)


Even though the service is offered by thousands of banks, the end result is standardized for consumers by the Visa International Association. Two protocols are used, depending upon the type of card marketed, often called "credit" and "debit."

The debit protocol involves using the card at a point of sale terminal (POS) or automated teller machine where the PLUS or Interlink logo is shown, with a Visa card that has the PLUS or Interlink logo on the back of the card. A PIN (personal identification number, known by its acronym) is used to identify the cardholder. The money is deducted from the attached checking account or prepaid account (which is similar with no paper check-writing capability) or, more commonly, from a current account.

Bank of America is pioneer in Credit cards Program...
And Bank of America is a end-to-end client of Infosys Technologies(INDIA).
Thats what infosys is.....

Sunday, June 17, 2007

Speed up Internet Connection

Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc

To get it back:

Click Start then Run and type "gpedit.msc" without quotes.This opens the group policy editor.
Then go to:
Local Computer Policy then Computer Configuration then Administrative Templates then Network then QOS Packet Scheduler and then to Limit Reservable Bandwidth.
Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab i.e."By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve

Friday, June 15, 2007

Push2Talk Services

Push-to-talk allows people to communicate using a walkie-talkie function. The user simply selects one or several contacts, presses and holds the talk button, speaks, then releases the talk-button. There is no dialing or waiting for the other parties to pickup.

If the recipient is not immediately available, the message is stored and delivered once the user signs onto fastchat. A fastchat user can also manage several push-to-talk conversations simultaneously.

Simultaneous group conversations
fastchat allows the user to push-to-talk in a 1-to-1 or in a group conversation. The user can participate in several push-to-talk conversations simultaneously without losing any messages.

No special hardware
fastchat uses the phone's native voice capturing and playback mechanisms. Users don't have to purchase any additional hardware.fastchat runs on today's GPRS networks. Operators don't have to purchase any additional GPRS infrastructure hardware. fastmobile can host the service, eliminating all of the operator's capital expenses.

Not limited to voice
fastchat users are never locked into a modality. They don't have to reply to a voice message with another voice message. A reply can be sent in text or picture format - whatever is suitable for the given situation and conversation.
Likewise, a user can reply to a text message using push-2-talk. The user simply selects the message to reply to from the message history, presses and holds the talk key, talks, and releases. The speech is sent back to all the recipients of the original text message.

Have it all fastchat spans networks and geographical boundaries and offers the user another instant communication dimension and a means to work around limited input devices.

Push-2-talk to offline friends
fastchat users can send push-2-talk messages to friends that are offline or simply out of coverage at the time. Messages are saved in the system while the recipient is unavailable; then delivered to the recipient once he or she is available again.

Key features of fastchat

* Allows both group and one-to-one conversations
* Single user interface for seamless integration of services
* Ability to reply to messages in alternative methods (text. voice or pictures)
* Does not require special hardware or infrastructure equipment.
* Works on today's 2.5/3G networks.
* Connects users across different operators and geographical boundaries.
* Users can mix subscribers, non-subscribers and legacy mobile phone users in a single or group conversation.

These services are not yet available in india.

Wednesday, June 13, 2007

Types of visas

A Visas (Official Visas)-
A-1: For Ambassadors, public ministers & consular officers
A-2: For immediate family members of A-1
A-3: Attendants & servants of A-1 and A-2 holders

B (Business/Visitor) Visa -

B-1 Temporary visitor for business
B-2 Temporary visitor for leisure

C & D Visa (For Aliens in transit) -

C-1,2: Alien in transit directly through US
C-3: Family of C-1,C-2 in transit
C-4: Transit without Visa(TWOV)
D-1: Sailors departing on vessel of arrival
D-2: Sailors departing by other means

E - Visa (For Traders/Investors) -
E-1 Treaty Trader, spouse and children  
E-2 Treaty Investor, spouse and children  

F Visa (Students) -

Want to study or research at a U.S. college? Then F is the visa for you -
F-1: Academic Student
F-2: Spouse or child of F-1

H (Temporary Worker) Visa -
H-1B: Persons in a specialty occupation
H-2B: Seasonal nonagricultural workers
H-3: Trainees other than medical/academic; also training of handicaps
H-4: Dependants of H visa holders

I Visa (Mediapersons) -

Are you a reporter, film person, Editor? Then you require an I-visa -
Essential docs: Your press ID, a letter from the editor.
J & Q Exchange Visitor Visa -
J-1 exchange visitors may be academics, scientists, businesspeople or students.
J-1: Visas for exchange visitors
J-2: Spouse or 'child' of J-1 under 21

Fiance(e) of US Citizen -

K-1 Fiance(e)
K-2 Minor child of K-1
K-3 Spouse of a U.S. Citizen (LIFE Act)
K-4 Child of K-3 (LIFE Act)
Docs: Marriage certificate & Photos, Intent of marrying within 90 days in US(for K1).

L Visa (Intracompany Transferees)-

L-1A Executive, managerial
L-1B Specialized knowledge
L-2 Spouse or child of L-1

Vocational and Language Students -

M-1 Vocational student or other non-academic student
M-2 Spouse or child of M-1

O -Visa (For Prodigies) -
O-1: For a Genius in Sciences, Arts, Education, Business, or Athletics.
O-2: Alien's (support) accompanying O-1
O-3: Spouse or child of O-1 or O-2

Athletes and Entertainers-
P-1: Athletes & Entertainment groups
P-2: Entertainers in exchange programs
P-3: Entertainers in cultural programs
P-4: Spouse or child of P-1, 2, or 3

R-Visa (Religious Workers)

R-1 Religious workers
R-2 Spouse or child of R-1

Impact of retail market

Hyderabadi people are experiencing a drastic change in retail market(in telugu chillara vyaparaam).There is a huge competetion in retail market.

Many IT,Telecom,Automobile,Diary gaints are entering retail market.

Some of famous retail markets at present in hyderabad.
1.Reliance Fresh
2.Fresh@ from Heritage Foods of our former C.M.Chandra Babu naidu
5.Bharti-walmart(Yet to be introduced)
6.Food Bazaar

The very fresh idea of Mukesh Ambani of RELIANCE INDUSTRIES is amazing. He took some thousands acres of land in punjab and other states and instructed farmers in order to yield a good crop.The farmers are given good ideas and to use technology to make better.

This is very good even for farmers as the risk is being moved from farmers to RETAIL MARKETS.

There is a huge comptetion in retail market.
You can observe
Former CM of AP Nara Chandra babu naidu going for "fresh@".
A tie-up between INDIA'S TELECOM GAINT(SUNIL MITTAL LEAD BHARATI AIRTEL) and worlds largest Retail stores WAL-MART.
BIRLA'S are about to enter retail business.
Magna,subhiksha are also giving tough comptetion for other corporate gaints.
You can observe these stores well decorated to lure customers.
And many more customer loyalty programs to bind the customer.

Once you step into these stores you are given a loyality card, when you shop for the second time you are given many more benefits.

And these stores are spread across the city no stuck upto main areas.

Friday, May 18, 2007

Speed up your computer



If your system is very slow(Windows) and is you need to improve your speed with out buying any hardware, here is an idea...

Check it out...


For a newer systems you might find a graphics processor generally know as Graphics card. Graphics need much CPU usage, which makes systems to run slow. Older systems don't have graphics cards, in which graphics processing in done by Micro Processor.

Here are some tips to make system fast.


1. Make sure that all the Drives on you HDD (Hard Disk) have at least 200MB of free space.

2. You can increase your virtual memory size, which increase you computing speed.

3. Remove all the graphics in Windows XP, so that burden on Micro Processor decreases.


Follow these steps to increase you Virtual Memory and disable Graphics in XP like Animation Windows when minimizing and maximizing, showing shadows for mouse pointer, etc...


1. Goto Control Panel Double click on System.

2. In that select Advanced tab.

3. Click settings in Performance.

4. In performance options, Visual Effects tab you can choose appearance and performance of Windows on this computer.

You can choose to

Adjust for best performance or

Adjust for best appearance or

If you are an advanced user you can customize you appearance and performance settings

5. In performance options, Advanced tab click on Change in Virtual Memory to change virtual memory settings. Generally Virtual Memory will be taken from only C:\( Windows Drive).

6. You can increase virtual memory by selecting a drive and give a custom size for that drive and click set.

7.Click OK OK Apply.


That's all you are done.

This will be sure increase your computer's speed.

Thursday, May 3, 2007

IPODS---Music on the run

IPods are the hottest things to have these days and everybody has one or wants to get one. It's an all in one gadget that seems to do wonders.

IPod mini was released complete with cool accessories like:

Apple remote - Universal Docks support this. We can connect it to a stereo or television, plug it in the Dock and control everything from there.

USB power adapter- Easily charge your iPod while you are surfing the internet.

AV connection kit- Play your favourite tunes, movies or photos on the television with a simple connection.

Radio remote- Changing radio stations is a breeze with the remote. It is a wired remote.

Universal dock - Basically this allows you to connect your iPod to the television or home entertainment system to view movies or display photos,etc.

USB cable- We need this to connect your iPod to your computer.

Camera connector- Tranfer your pretty pictures from your camera directly to your iPod

In-ear headphones- Makes listening to music even better with its good bas response and quality audio.

In the past, video was not an option. Thankfully, things have improved and now with the iPod Video, you can have data, music, photo and video...all in one model. Just fantastic!!!!!!!!!

How cool is that ? Very!

Wednesday, April 25, 2007

Hacked By Godzilla

How to fix "Hacked by Godzilla Virus"

Hacked By Godzilla is a new computer virus that widely infect from using Handy Drive or Floppy Disk


We can not Double Click to open any Drive on our computer. But we can Right Click to   Open or Explore.
   2. There is a text "Hacked By Godzilla" on Title Bar of Internet Explorer.

How to fix Godzilla

   1. Double Click on My Computer icon on Desktop and select Tools --> Folder Options
   2. When Folder Options click at View tab
         1. check at Show Hidden files and folders
         2. uncheck the Hide extension… and Hide protected operating system file
         3. click OK
   3. Press Ctrl+Alt+Delete. The Windows Task Manager will display. Click at Processes tab
         1. Click menu Image Name (to sort Files)
         2. Select wscript.exe (one by one)
         3. Click End Process button
   4. Open drive (By right click and select Explore. Must not Double Click !) Delete autorun.inf and MS32DLL.dll.vbs (Press Shift+Delete) in all drives include Handy Drive and Floppy disk.
   5. Open folder C:\WINDOWS to delete MS32DLL.dll.vbs inside (press Shift+Delete )
   6. Go to Start --> Run and enter regedit click OK. Registry Edit dialog will display.
   7. Select HKEY_LOCAL_MACHINE --> Software --> Microsoft --> Windows --> Current Version --> Run to delete MS32DLL (press Delete key on keyboard)
   8. Select HKEY_CURRENT_USER --> Software --> Microsoft --> Internet Explorer --> Main to delete Window Title "Hacked by Godzilla" (press Delete key on keyboard)
   9. Click Start --> Run and enter gpedit.msc click OK. Group Policy dialog will display.
  10. Select User Configuration --> Administrative Templates --> System --> Double Click on file Turn Off Auto play then Turn Off Auto play Properties will display
         1. Select Enabled
         2. Select All drives
         3. Click OK
      To prevent auto open when we insert CD or plug the Handy Drive that is the way virus infect.
  11. Click Start --> Run and enter msconfig Click OK. the System Configuration Utility dialog will display
         1. Click Start up tab
         2. Un-check MS32DLL
         3. Click Apply
         4. Clock OK (or Close)
      When the System Configuration dialog display select Exit Without Restart
  12. Double Click on icon My Computer on Desktop. Then select Tools --> Folder Options
  13. On Folder Options dialog select View tab
         1. Check at Hide extension… and Hide protected operating system file
         2. Click OK
  14. Right Click at Recycle bin. Then select Empty Recycle Bin to make sure the virus is deleted.

That's all over. You are done!!!!

Tuesday, April 24, 2007

Thanks to YOU...

I want to thank all my friends and other unknown people who have forwarded chain letters to me in 2003, 2004 & 2005 and 2006.

Because of your kindness:

I stopped drinking Coca-Cola after I found out that it's good only for removing toilet stains.

I stopped going to the movies for fear of sitting on a needle infected with AIDS.

I smell like a wet dog since I stopped using deodorants because they cause cancer.

I also stopped answering the phone for fear that they may ask me to dial a stupid number and then I get a phone bill from hell with calls to Uganda ,Singapore and Tokyo.

I also stopped drinking water outside for fear that I will get sick fromthe rat shit and urine.

When I go to parties, I don't look at any girl, no matter how hot she is, for fear that she will take me to a hotel, drug me, then take my kidneys and leave me taking a nap in a bathtub full of ice.

I also donated all my savings to the Amy Bruce account. A sick girlthat was about to die in the hospital about 7,000 times. (Poor girl! she's been 7 since1993...)

My free Nokia phone never arrived and neither did the free passes for a paid vacation to Disneyland.

Made some Hundred wishes before forwarding those Dalai Lama, Ganesh Vandana,

Tirupathi Balaji pics etc..

Now most of those "Wishes" are already married (to someone else)!

You can add your own notes based on your similar experience and send
them to
your friends.

If ORKUT deletes my account, it doesn't matter BUT PLEASE DON'T SEND me "Orkut is deleting accounts: Due to sudden rush..." Otherwise I'll delete my E-Mail account!

If you do not send this e-mail to at least 913760 people in the next 10
seconds,a bird will shit on your head today at 6:30 p.m.

Give me a break!!

Saturday, April 21, 2007

Virtual Reality

Ever wondered how a new trained pilot will take control of flight(air craft) for the first time or how a new cardiologist performs a surgery??
These people are trained in simulated environments...
This technology is known as virtual reality.This is mainly programmed using VRML(Virtual Reality Modeling Language).

virtual reality
A computer simulation of a real 3-dimensional world, often supplemented by sound effects. People often associate virtual reality with a body suit and head gear that inclues an internal screen. The suit measures your boby's movements and displays them on the screen. These computerized images can be simulated in any environment making you feel like you're realy there. This is one interface, a more common use for
VR is seen in many 3D computer games.

U.S. Navy personnel using a VR parachute trainer.

What is Virtual reality???
The word virtual means imagination and reality means real.How do these go hand in hand?Its nothing but immersion into reality that too virtually.This virtual reality is mainly used in scientific and technical purposes.
For eg: A newly trained pilot cannot be given a aircraft.Because he may not do well.Thats why a pilot will be trained in a environment in which he/she can really feel as if in a real world.

Hardware used in Virtual Reality.
Display devcies play a major role in Virtual Reality.
HMD-Head Mounted Displays
Data gloves
Surround Projectors
Panoramic Projectors
Workbench Projectors
Desktop Displays

Astronaut Training
Marine Simulation
Health care education
Real estate

Pakka Hyderabadi

You are a true Hyderabadi if:

1. Your address reads as 23-404-32/67A-43 (New MCH number 56-678/4A/B-22), while you actually live in the second house beside Zamzam cafe in lane behind Anand Theatre on SP Road .

2. You end up buying only a salwar kameez, whether it is a theatre workshop, food mela, consumer expo, designer jewellery show, science show or an automobile convention.

3. Your street has at least one roadside mobile hotel that serves Chinese delicacies such as "Vegetable soft needles", "Navrotten Kurma", "Chicken Manchewurea" or "American Chompsee".

4. Your answer is 'seedha chale jao' when somebody asks you for directions, whether it is to Malakpet, Masab Tank, Malkajgiri or Moosapet.

5. You come across tailors sporting the board: Immidiot delivery in two days onli.

6. Except Telugu,You can speak Hindi, Urdu, Hyderabadi Hinglish fluently.

7. You ask the waiter to get you some 'Mango pickle' even if you are sitting at a lavish continental banquet dinner with exotic Chinese, Mexican,Italian and Lebanese cuisines.

8. You order for a tea just after having had a Caramel custard.

9. You have at least one Srinivas,Prasad, Raju or Venkatesh within six square feet. OR you have at least one cousin, friend, colleague or acquaintance with these names.

10. You have at least one cousin, friend, colleague or acquaintance in the US in software.

11. Everytime somebody gives you a piece of good news, the first thing you ask them is 'Party kab hain?'

12. Refer to any past as 'parso', be it yesterday or long before three hundred years.

13. You call 11 AM as subah subah.

14. You label your boss as 'Dimakh Kharab'

15. You are 15 minutes late and you feel you are on time.

16. You look at the fixed price stand and still ask 'dene ka bolo'

My Additions:

17. You call everyone and anyone BOSS...except ur Boss in Office

18. If 3 friends go to an Irani cafe....u order "2 chai ek empty"......if 4 people go.."3 chai ek empty" and so on...

19. You call the waiter in that cafe as "Heroooo"

20. You make that hissing sound followed by the word Boss......to address a stranger

21. You have Chinese mobile hotels...which are named as "Mahalaxmi chinese food....Satya Sai chinese food"

You are secretly admitting to all these and thanking your luck to be a Citizen of the Greatest City of the World...We are Blue Blooded Man!!! HYDERABADIs ROCK!!!

Written by one of my close pals

Friday, April 20, 2007

First post

This is my first post for this blog.
I'm not an writer to create sensation.
I'll be writing in Hyderabadi language that is Hinglish.
This blog is all about hyderabd,Nothing else..
what ever that comes to my mind, i'll be posting,,

Thursday, April 19, 2007

Sending e-mail to mobile phone

Do you know that you can even send e-mail to mobile phones...

For eg:
Suppose you need to send e-mail to 9849098490(Andhra Pradesh -Airetl),
You need to send e-mail to 919849098490@airtelap.com

List of some Cellular Providers and their gateways
  •      Andhra Pradesh Airtel               - @airtelap.com
  •      Andhra Pradesh Idea Cellular     - @ ideacellular.net
  •      BPL mobile                              - @bplmobile.com
  •      Chennai Skycell / Airtel             - @ airtelchennai.com
  •      Chennai RPG Cellular              - @rpgmail.net
  •      Delhi Airtel                              - @airtelmail.com
  •      Delhi Hutch                             - @delhi.hutch.co.in
  •      Escotel                                  - @escotelmobile.com
  •      Goa BPLMobil                        - @bplmobile.com
  •      Gujarat Idea                           - @ideacellular.net
  •      Gujarat Airtel                          - @airtelmail.com
  •      Gujarat Celforce / Fascel         - @celforce.com
  •      Goa Airtel                              - @ airtelmail.com
  •      Goa BPLMobil                        - @bplmobile.com
  •      Goa Idea Cellular                    -@ ideacellular.net
  •      Haryana Airtel                       - @airtelmail.com
  •      Haryana Escotel                   - @escotelmobile.com
  •      Himachal Pradesh Airtel        - @airtelmail.com
  •      Idea Cellular                         - @ideacellular.net
  •      Karnataka Airtel                    - @airtelkk.com
  •      Kerala Airtel                         - @airtelmail.com
  •      Kerala Escotel                     - @ escotelmobile.com
  •      Kerala BPL Mobile                - @bplmobile.com
  •      Kolkata Airtel                       - @ airtelkol.com
  •      Madhya Pradesh Airtel          - @airtelmail.com
  •      Maharashtra Idea Cellular     - @ideacellular.net
  •      Maharashtra Airtel               -  @airtelmail.com
  •      Maharashtra BPL Mobile      - @bplmobile.com
  •      Mumbai Orange                   - @ orangemail.co.in
  •      Mumbai BPL Mobile            - @bplmobile.com
  •      Pondicherry BPL Mobile      - @ bplmobile.com
  •      Punjab Airtel                       - @airtelmail.com
  •      Tamil Nadu Aircel                - @airsms.com
  •      Tamil Nadu BPL Mobile       - @bplmobile.com
  •      Uttar Pradesh (West) Escotel - @escotelmobile.com

Tuesday, April 17, 2007

Grid Computing

Do you people think you are using the IT resources optimisely??
Have you ever saw the CPU usage in Task Manager(Press ALT+CTRL+DEL) of your computer?
You will be using utmost 10% only ,what about the remaining 90%??
Can't we make use of the remaining??
The answer is BIG YES.Yes we can make use of the remaining, the technology that makes possible is GRID COMPUTING.

What is Grid Computing??
Grid Computing is the one that makes possible to share disparate, loosely coupled IT resources across organizations and geographies. IT resources are freed from their physical boundaries and offered as services. They can potentially include almost any IT component -- computer cycles, storage spaces, databases, applications, files, sensors or scientific instruments.
In grid computing, resources can be dynamically provisioned to users or applications that need them. Resources can be shared within a workgroup, department or enterprise; among different organizations and geographies; and even with groups outside the enterprise in collaborative projects. Grids can be designed to support various business processes.

Why Grid??
With grid computing, your far-flung and disparate IT resources can act as a single “virtual datacenter.” Grid computing virtualizes heterogeneous IT resources so they are available when and where you need them. Grid allows you to provision applications and allocate capacity among business groups that are geographically and organizationally dispersed. You can:

* Enable secure, real-time collaboration among global teams,including partners and suppliers outside your company
* Rapidly deploy resources for new initiatives
* Accelerate new product development, improving time to market
* Reduce IT costs and improve return on investment
* More easily handle peaks and troughs in demand by provisioning resources where needed.

Technology benefits
Infrastructure optimization:
· consolidate workload management
· provide capacity for high-demand applications
· reduce cycle times
Increase access to data and collaboration:
· federate data and distribute it globally
· support large multi-disciplinary collaboration
· enable collaboration across organizations and among businesses
Resilient, highly available infrastructure:
· balance workloads
· foster business community
· enable recovery and failure

What industries are using grid computing now?
Some examples include: Automotive and aerospace, for collaborative design and data-intensive testing; financial services, for running long, complex scenarios and arriving at more accurate decisions; life sciences, for analyzing and decoding strings of biological and chemical information; government, for enabling seamless collaboration and agility in both civil and military departments and agencies; higher education for enabling advanced, data and compute intensive research.

Bringing grid to the enterprise
Grid technologies have long been used for scientific and technical work, where dispersed computers are linked to create virtual supercomputers that rapidly process vast amounts of information. Now, with the success of e-commerce and the Internet, the commercial enterprise is moving to an IT model based on Web services, in which software can be offered and consumed as services -- a service-oriented architecture.

Friday, April 13, 2007


What is a blog??

Short for Web log, a blog is a Web page that serves as a publicly accessible personal journal for an individual.If you've been surfing the web for the past year or five, you've undoubtedly heard of "blogs" or weblogs. These personal Internet journals have taken the Internet by storm. Frequently updated and written in a personal tone, a blog is a diary or journal where the writer or "blogger" will write his/her observations on the world or provide links to useful websites. Different bloggers write about different themes, sort of like a newspaper columnist but with no specialized training necessary.Typically updated daily,blogs often reflect the personality of the author.In simple terms, a blog is a web site, where you write stuff on an ongoing basis.New stuff shows up at the top,so your visitors can read what's new.

Who is blogger??

The one who publishes a blog is know as blogger.

Popularity for blogs..

Recently, through the mass popularity of sponsored post ventures such as PayPerPost a massive amount of personal blogs have started writing sponsored posts for advertisers wanting to boost buzz about new products and services. It has revolutionised the blogosphere almost in the same way that Google AdSense did.

How to Start a Blog??

1. Find a decent blogging provider that appeals to you.You can create blog from the following blogging providers
Most of these sites are pre-made with templates and push-button publishing that don't require much technical know-how.
2. Once you sign up, you'll have a gallery of ready-made templates to choose from. Select one and personalize it. Add your name, interests, images, etc.
3. Add blogging freebies like buttons, images, blog chalks, imoods, tagboards , guest maps, guestbooks,comment boxes for readers' input, etc.
4. Explore other blog sites that offer more features for a small fee, such as Typepad.com.
5. Decide on whether or not you want your blog to be private or personal: do you want any Internet visitor to be able to read your blog, or do you just want your friends and family to be able to read it? Most blog sites offer the ability to password-protect your published posts so only those who you approve of can view what you've written.
6. Decide on how you want your blog to look. You can pick a color scheme and layout. Most sites come with a set of predefined layouts and schemes that you can choose from, or you can edit your own.
7. After you've set up your blog, write a few posts to test it out, and make any adjustments to the layout or style that you see fit. At first, it will seem tough to figure out what to write, but once you get into a routine of daily blogging, you will find it addictive. Write about your day, your thoughts, events, ideas, fears, pleasures, the news, current affairs, art, or anything you are interested in!
8. Visit other blogs to build a blogging circle. When you leave comments, add your blogging address so they can visit you too.
9. If you want to make your blog look more attractive, there are some sites up that have many "skins" that might make it look better. One example is blogskins.com, which also comes with Photoshop and HTML tutorials.
10. Publish your blog by sending the URL to your friends or publish the URL on your website. Add the URL to posts you make on other blogs.

Earn from blogs....

You can even earn from blogging
There are many services offered to earn from blogs.
Google's Adsense
Yahoo's publisher
are a few to name

Out of which google's AdSense is famous

Do sending your comments............................ Manoranjan Reddy Mandadi

Tuesday, April 10, 2007

BlueTooth Technology

What is Bluetooth wireless technology?

Bluetooth is an industrial specification for wireless personal area networks (PANs).Bluetooth technology is how mobile phones, computers, and personal digital assistants (PDAs), not to mention a broad selection of other devices, can be easily interconnected using a short-range wireless connection. Using this technology, users can have all mobile and fixed computer devices be totally coordinated.


Bluetooth wireless technology is a short-range communications technology intended to replace the cables connecting portable and/or fixed devices while maintaining high levels of security. The key features of Bluetooth technology are robustness, low power, and low cost. The Bluetooth specification defines a uniform structure for a wide range of devices to connect and communicate with each other.

A fundamental Bluetooth wireless technology strength is the ability to simultaneously handle both data and voice transmissions. This enables users to enjoy variety of innovative solutions such as a hands-free headset for voice calls, printing and fax capabilities, and synchronizing PDA, laptop, and mobile phone applications to name a few.

System Requirements

Now a days we are having laptops and palmtops that are enabled with Bluetooth Technology.For desktops we need a device called Bluetooth Dongle to connect via bluetooth.We need to install drivers for it.Most computers require an external USB Bluetooth dongle to communicate with other Bluetooth devices (such as mobile phones, mice and keyboards).


Bluetooth technology operates in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHz, using a spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec. The 2.4 GHz ISM band is available and unlicensed in most countries.

Operating Range

The operating range depends on the device class:
Class 3 radios – have a range of up to 1 meter or 3 feet
Class 2 radios – most commonly found in mobile devices – have a range of 10 meters or 30 feet
Class 1 radios – used primarily in industrial use cases – have a range of 100 meters or 300 feet

Data Rate

1 Mbps for Version 1.2; Up to 3 Mbps supported for Version 2.0 + EDR


From the start, Bluetooth technology was designed with security needs in mind. Since it is globally available in the open 2.4 GHz ISM band, robustness was built in from the beginning.
Bluetooth technology has built-in security such as 128bit encryption and PIN code authentication. When Bluetooth products identify themselves, they use the PIN code the first time they connect. Once connected, always securely connected

Versions of Bluetooth

Bluetooth is also known as IEEE 802.15.1.
Bluetooth 1.0 and 1.0B
Bluetooth 1.1
Bluetooth 1.2
Bluetooth 2.0
Bluetooth 2.1

Health concerns

Bluetooth uses the microwave radio frequency spectrum in the 2.4 GHz to 2.4835 GHz range. Previous electromagnetic hazard studies dating from the 1950s to the 1980s, including more recent studies,concluded that low power signals with frequencies as high as 1.5 GHz to 2 GHz do cause irreversible damage to human tissue. The radiated output power of Bluetooth devices is high when compared to other widely used mobile devices, so it is assumed that the potential for health risks are also correspondingly higher.

Wednesday, April 4, 2007

Global Positioning Systems

We generally wish to locate a particular object at an ease.New technology takes us to great heights with which we can exactly locate an object on earth.This is only know as Global Positioning System.

An acronym for Global Positioning System.A worldwide radio-navigation system that was developed by the US. Department of Defense.In addition to military purposes it is widely used in marine, terrestrial navigation and location based services.


GPS has a variety of applications on land, at sea and in the air.GPS is also typically used for navigation by recreational boaters, commercial fishermen, and
professional mariners. Land-based applications are more diverse.Surveyors use GPS for an increasing portion of their work.GPS is now commonplace in automobiles as well. Some basic systems are in place and provide emergency roadside assistance at
the push of a button (by transmitting your current position to a dispatch center).


A constellation of 24 satellites orbiting the earth at a very high altitude. GPS satellites transmit signals that allow one to determine, with great accuracy, the locations of GPS receivers.The receivers can be fixed on the Earth, in moving vehicles, aircraft, or in low-Earth orbiting satellites. GPS is used in air, land and sea navigation, mapping, surveying and other applications where precise positioning is necessary.GPS receivers take this information and use
triangulation to calculate the user's exact location.


There are many sophisticated devices which are specially manufactured for navigation using GPS systems.Now a days we can get mobiles which are GPS enabled.We can even search for ATM in our location using GPS phones.These devices generally have a color display which shows the roads and places.All the ambulances are enabled with GPS
systems in order to serve in case of emergency.Figuring out how to fold maps is a
problem of the past. Compasses are passe. Portable GPS devices, fitting into the palm of your hand or built into automobile dashboards, now bring Space Age navigation to the masses


Today's GPS receivers are extremely accurate,thanks to their parallel multi-channel design.Newer GPS receivers with WAAS (Wide Area Augmentation System) capability can improve accuracy to less than three meters on average.Offcourse there is a chance of occuring signalling errors in GPS systems.We shall se those errors..


The 24 satellites that make up the GPS space segment are orbiting the earth about 12,000 miles above us. They are constantly moving, making two complete orbits in less than 24 hours. These satellites are travelling at speeds of roughly 7,000 miles an hour.


Here are some sources of GPS signalling errors..
- Ionosphere and troposphere delays
- Signal multipath
- Receiver clock errors

Tuesday, April 3, 2007

Safe Guarding Computer.

If connected to Internet the main problem we face is due to virus, pop ups, malicious scripts,threats,Adware and Spyware,etc

Malicious scripts and spyware gain access over the computer and passes data sensitive information like credit cards information, bank balances,etc to third parties.

You can get rid of them by using a latest Anti Virus Program.
There are countless number of Anti Virus Programs available.

As far as I'm considered think Norton Anti Virus(NAV),Norton Internet Security(NIS) from Symantec Corporation serves us the best. Previously it used to be a free. Now it should be licensed.

NAV 2004,2005 and above should be licensed.

Though we can get many cracks for those softwares, it is better to use a licensed version of software and respect Intellectual Property Rights.

You can get Norton Anti Virus 2002 for free and you can update at an ease and use it in order to combat virus.Unlike other Anti Virus Applications, we can easily get Norton updates for Norton Anti Virus and Norton Internet Security.

Norton Internet Security doesn't allow any program to contact DNS servers without our permission.It notifies us even if Yahoo Messenger tries to access Internet.It also displays the names of viruses from which you are not protected.

You can also get Norton Internet Security (NIS) for free in INTEL MOTHER BOARD CD ROM which comes along with INTEL MOTHER BOARD.

Symantec Corporation Provides free updates.
For free updates http://www.symantec.com/downloads/index.jsp

Generally you can update you Norton software by using Live Update which requires access to Internet,we can also download virus definitions(nearly 15Mb in size) file from the above site which is a executable.

Tuesday, March 27, 2007

GSM frequency bands, 3G and IMEI

GSM frequency bands used around the world are:
850 MHz (In America)
900 MHz (In Europe)
1800 MHz (In Europe and Asia)
1900 MHz (In America)


In mobile phones, dual band refers to functionality that allows a mobile phone to support two frequency bands out of the four major GSM bands. A cellphone with dual band 850/1800 MHz, for example, will work in both the United States (850 MHz) and India (1800 MHz).

Various countries use different frequency bands for their mobile networks, and a triband phone can be used on three of these bands.Generally these tri band mobile are manufactured to support two home countrys networks and one for roaming.

Triband phones are mobile phones that support the GSM 900/1800/1900 MHz bands (commonly sold in Europe, Asia, and Africa), or alternatively the 850/1800/1900 bands (commonly sold in the Americas).

Literally speaking quad band mobile phones means the phones which support all the GSM frequency bands. These are only known as world phones.

When gifting mobile phones..
Make sure that the mobile you are presenting is world phone.
When bringing mobiles to India(from abroad) make sure that their IMEI No starts with 3, so that its compatible with the networks Indian networks.


3G is short for third-generation technology. The services associated with 3G provide the ability to transfer simultaneously both voice data (a telephone call) and non-voice data (such as downloading information, exchanging email, and instant messaging). In marketing 3G services, video telephony has often been used as the killer application for 3G.
The first country which introduced 3G on a large commercial scale was Japan. In 2005, about 40% of subscribers used 3G networks only, with 2G being on the way out. It was expected that the transition from 2G to 3G would be largely completed during 2006, and upgrades to the next 3.5G stage with 3 Mbit/s data rates were under way.

Usage of 3G networks in India is yet to be approved by government.

International Mobile Equipment Identity

The International Mobile Equipment Identity is a number unique to every GSM. It is printed on the phone underneath the battery and can also be found by dialing the sequence *#06# into the phone. The IMEI (14 digits plus check digit) or IMEISV (16 digits) includes information on the origin, model, and serial number of the device.

The IMEI number is used by the GSM network to identify valid devices and therefore can be used to stop a stolen phone from accessing the network. For example, if a mobile phone is stolen, the owner can call his or her network provider and instruct them to "ban" the phone using its IMEI number. This renders the phone useless, regardless of whether the phone's SIM is changed.

Record the serial number (IMEI) of the handset in a safe place (enter *#06# on most GSM handsets to receive a 15 digit serial number).

IMEI information from a GSM
On many devices the IMEI number can be retrieved by entering *#06#.
Retrieving from nokia mobile phones by pressing *#92702689# (*#WAR0ANTY#), this opens the warranty menu in which the first item is the serial number (the IMEI).

IMEI numbers of cellular phones connected to a GSM network are stored in a database (EIR - Equipment Identity Register) containing all valid mobile phone equipment.
When a phone is reported stolen or is not type approved, the number is marked invalid.

Central Equipment Identity Register (CEIR)
If a mobile handset is lost or stolen, as the owner or operator of the device, you can contact the CEIR which will blacklist the device in all currently operating switches. This makes the lost or stolen handset unusable. The action of blacklisting stolen mobile handsets is seen as a deterrent to crime, however, it is possible to change an IMEI with special tools and there are certain mobile networks that do not automatically blacklist handsets registered with the CEIR. Current statistics state that about 10 % of current IMEI's in use today are not unique or have been reprogrammed (hacked).

International Mobile Equipment Identity Software Version (IMEISV)
For example the IMEI code 35-209900-176148-1 or IMEISV code 35-209900-176148-23 tells us the following:
TAC(Type Allocation Code): 352099 so it was issued by the BABT and has the allocation number 2099
FAC(Final Assembly Code): 00 so it was numbered during the transition phase from the old format to the new format (described below)
SNR: 176148 - uniquely identifying a unit of this model
CD: 1 so it is a GSM Phase 2 or higher
SVN: 23 - The 'software version number' identifying the revision of the software installed on the phone. 99 is reserved

"New IMEIs can be programmed into stolen handsets and 10% of IMEIs are not unique." According to a BT-Cellnet spokesman quoted by the BBC.

In many countries changing the IMEI or IMEISV is considered as a crime.

Comments and suggestions are welcome about the content!!

Manoranjan Reddy Mandadi

Friday, March 23, 2007

Google Inc,

The one that comes into our mind when one says Google is Google's search engine. There are many other products which are owned by Google Inc. Off course their claim to fame is Search Engine. Google maintains an estimated 450,000 servers. Google don’t reveal the hardware they use. Google was co-founded by Larry Page and Sergey Brin while they were students at Stanford University.

Google Search Engine
Google is a search engine owned by Google Inc, Whose mission statement is to "organize the world's information and make it universally accessible and useful".If we like to know about any thing, we just Google it. The largest search engine on the web. Microsoft, others suffer as Google's web search share grows.

Google Mail
Google mail known as Gmail for short is a free Web mail and POP3 e-mail service provided by Google. This service offers over 2.8 GB of file storage, a search-oriented interface and a unique 'conversation view'. Gmail is well-known for the use of Asynchronous Java Script And XML (AJAX) programming in its design. Instead of downloading or refreshing the whole page Gmail downloads in small parts, which makes it very fast compared to others. Gmail is integrated with Gtalk. GMail is the only service provider which offers POP3 e-mail service for free

Google orkut
Orkut is an Internet social network service run by Google. It claims to be designed to help users meet new friends and maintain existing relationships. Orkut goes a step further by permitting the creation of easy-to-setup simple forums (called "communities") of users.

Google Blogger
Blogger is a web log publishing system. Now a day’s blogs are very crazy as you all know. Google provides free blogging. A blog is a user-generated website where entries are made in journal style and displayed in a reverse chronological order.

Google Picasa Web Albums
Picasa is a computer application for organizing and editing digital photos. There is native support for Windows XP and Windows Vista, as well as a beta Linux version, available through Google Labs.

Google Talk
Google Talk is a computer application for Voice over IP and instant messaging, offered by Google. All messages are archived to the Chats mailbox in Gmail, unless 'Off the Record' is enabled in Google Talk. We can access contacts of orkut also in Gtalk .It also notifies us if a new mail arrives to our Gmail or a new scrap into our orkut account.

Google AlertsGoogle Alerts is a service offered by search engine company Google which notifies you (by email) about the latest web and news pages of your choice.

Google Docs and Spreadsheets
Google Docs & Spreadsheets, sometimes simply called Google Docs, is a Web-based word processor and spreadsheet application offered by Google. It allows users to create and edit documents and spreadsheets online while collaborating in real-time with other users.

Google Froogle Shopping List
Froogle is a price comparison service launched by Google Inc. It is currently in beta test stage. A user can type product queries to return lists of vendors selling a particular product, as well as pricing information.

Google Maps
Google Maps is a free web map server application and technology provided by Google that powers many map-based services including the Google Maps website. It offers street maps, a route planner, and an urban business locator for numerous countries around the world.

Google Base
Google Base is an online database provided by Google into which any user can add almost any type of content. If any body searches for a product, and if it’s in our Google base list, it will be displayed. Google will not be involving in any transactions of this kind.

Google AdSense
AdSense is an ad serving program run by Google. Google will publish their ads on our sites/blogs. These ads are administered by Google and generate revenue on either a per-click or per-thousand-impressions basis.If any body viewing our blog/site clicks an ad we will be paid for it.

Google Adwords
Google Adwords is a service run by Google, using which you can place you ads in web pages or displaying your ads when a search is made on keywords relating to that ad. Most of Google’s revenue is from Adwords.

Google Analytics
Google Analytics is a free service offered by Google that generates detailed statistics about the visitors to a website. Google Analytics is integrated with AdWords in order to use at an ease.

Google Webmaster Tools
Google Webmaster Tools is a service offered by Google to help website owners with indexing and ranking on Google search. Graphs and diagnostics are also given to let the user analyze Google traffic.

There are many other Google’s products.
These are a few to name.

Do sending your coments.
Manoranjan Reddy Mandadi

Wednesday, March 21, 2007

Thermal Cameras and Thermography

You people might be quite familiar with digital cameras and analog cameras.
Have you any time heard about thermal cameras.

These are the cameras which play a significant role in surveillance and security.

A thermographic camera, sometimes called a Forward Looking InfraRed(FLIR),is a device that forms an image using infrared radiation, similar to a common camera that forms an image using visible light.

All the living organisms as well as non living objects will emit infra-red energy and we exploit this using our longwave IR imaging systems with a view to identifying objects.These cameras are used in many R&D Departments like aviation,electronics,electricals,etc...

Thermography is now the leading non-intrusive, non-invasive and non-destructive tool used in an ever widening range of areas. All objects emit infra-red energy and we exploit this using our longwave IR imaging systems with a view to identifying previously unidentifiable faults which would often result in costly repercussions.

Infrared cameras, active and passive infrared camera systems can be used for security surveillance and nondestructive testing.

SARS (Avian Flu/Bird Flu) screening cameras have been installed in many airports around world.

The side by you see a domed camera.
These type of cameras are mainly used in banks,domestic purposes,etc.
These cameras are capable of
->Auto switching from daytime (color) to infrared sensitive nighttime (B&W).
->Indoor,weatherproof outdoor models for any application.
->Auto turn-over feature enables the dome to rotate 180 degrees and reposition itself for uninterrupted viewing of any subject that passes directly under the dome.
->23X Optical Zoom

Here you can see a picture of dog taken using an infrared camera.
Different colors in the picture implies temperatures that are different from area to area.

Thursday, March 15, 2007

POP e-mail

In computers POP stands for Post Office Protocol.

POP is an application layer protocol used to retrieve e-mail from a remote server over a TCP/IP connection.

By using POP service you can retrieve e-mails from remote server using Microsoft's OUTLOOK,Opera Mail, Netscape Mail,Eudora,etc.

These services use POP for incoming mail and Simple Mail Transfer Protocol (SMTP) for out going mails

The version which is being used now in POP3.
POP4 is now in R & D. Not yet officially standardized...

Gmail is the only mail service which offers POP e-mail for free.

You can configure your POP mail service settings(GMail) by visiting