Wednesday, April 25, 2007

Hacked By Godzilla

How to fix "Hacked by Godzilla Virus"

Hacked By Godzilla is a new computer virus that widely infect from using Handy Drive or Floppy Disk


We can not Double Click to open any Drive on our computer. But we can Right Click to   Open or Explore.
   2. There is a text "Hacked By Godzilla" on Title Bar of Internet Explorer.

How to fix Godzilla

   1. Double Click on My Computer icon on Desktop and select Tools --> Folder Options
   2. When Folder Options click at View tab
         1. check at Show Hidden files and folders
         2. uncheck the Hide extension… and Hide protected operating system file
         3. click OK
   3. Press Ctrl+Alt+Delete. The Windows Task Manager will display. Click at Processes tab
         1. Click menu Image Name (to sort Files)
         2. Select wscript.exe (one by one)
         3. Click End Process button
   4. Open drive (By right click and select Explore. Must not Double Click !) Delete autorun.inf and MS32DLL.dll.vbs (Press Shift+Delete) in all drives include Handy Drive and Floppy disk.
   5. Open folder C:\WINDOWS to delete MS32DLL.dll.vbs inside (press Shift+Delete )
   6. Go to Start --> Run and enter regedit click OK. Registry Edit dialog will display.
   7. Select HKEY_LOCAL_MACHINE --> Software --> Microsoft --> Windows --> Current Version --> Run to delete MS32DLL (press Delete key on keyboard)
   8. Select HKEY_CURRENT_USER --> Software --> Microsoft --> Internet Explorer --> Main to delete Window Title "Hacked by Godzilla" (press Delete key on keyboard)
   9. Click Start --> Run and enter gpedit.msc click OK. Group Policy dialog will display.
  10. Select User Configuration --> Administrative Templates --> System --> Double Click on file Turn Off Auto play then Turn Off Auto play Properties will display
         1. Select Enabled
         2. Select All drives
         3. Click OK
      To prevent auto open when we insert CD or plug the Handy Drive that is the way virus infect.
  11. Click Start --> Run and enter msconfig Click OK. the System Configuration Utility dialog will display
         1. Click Start up tab
         2. Un-check MS32DLL
         3. Click Apply
         4. Clock OK (or Close)
      When the System Configuration dialog display select Exit Without Restart
  12. Double Click on icon My Computer on Desktop. Then select Tools --> Folder Options
  13. On Folder Options dialog select View tab
         1. Check at Hide extension… and Hide protected operating system file
         2. Click OK
  14. Right Click at Recycle bin. Then select Empty Recycle Bin to make sure the virus is deleted.

That's all over. You are done!!!!

Tuesday, April 24, 2007

Thanks to YOU...

I want to thank all my friends and other unknown people who have forwarded chain letters to me in 2003, 2004 & 2005 and 2006.

Because of your kindness:

I stopped drinking Coca-Cola after I found out that it's good only for removing toilet stains.

I stopped going to the movies for fear of sitting on a needle infected with AIDS.

I smell like a wet dog since I stopped using deodorants because they cause cancer.

I also stopped answering the phone for fear that they may ask me to dial a stupid number and then I get a phone bill from hell with calls to Uganda ,Singapore and Tokyo.

I also stopped drinking water outside for fear that I will get sick fromthe rat shit and urine.

When I go to parties, I don't look at any girl, no matter how hot she is, for fear that she will take me to a hotel, drug me, then take my kidneys and leave me taking a nap in a bathtub full of ice.

I also donated all my savings to the Amy Bruce account. A sick girlthat was about to die in the hospital about 7,000 times. (Poor girl! she's been 7 since1993...)

My free Nokia phone never arrived and neither did the free passes for a paid vacation to Disneyland.

Made some Hundred wishes before forwarding those Dalai Lama, Ganesh Vandana,

Tirupathi Balaji pics etc..

Now most of those "Wishes" are already married (to someone else)!

You can add your own notes based on your similar experience and send
them to
your friends.

If ORKUT deletes my account, it doesn't matter BUT PLEASE DON'T SEND me "Orkut is deleting accounts: Due to sudden rush..." Otherwise I'll delete my E-Mail account!

If you do not send this e-mail to at least 913760 people in the next 10
seconds,a bird will shit on your head today at 6:30 p.m.

Give me a break!!

Saturday, April 21, 2007

Virtual Reality

Ever wondered how a new trained pilot will take control of flight(air craft) for the first time or how a new cardiologist performs a surgery??
These people are trained in simulated environments...
This technology is known as virtual reality.This is mainly programmed using VRML(Virtual Reality Modeling Language).

virtual reality
A computer simulation of a real 3-dimensional world, often supplemented by sound effects. People often associate virtual reality with a body suit and head gear that inclues an internal screen. The suit measures your boby's movements and displays them on the screen. These computerized images can be simulated in any environment making you feel like you're realy there. This is one interface, a more common use for
VR is seen in many 3D computer games.

U.S. Navy personnel using a VR parachute trainer.

What is Virtual reality???
The word virtual means imagination and reality means real.How do these go hand in hand?Its nothing but immersion into reality that too virtually.This virtual reality is mainly used in scientific and technical purposes.
For eg: A newly trained pilot cannot be given a aircraft.Because he may not do well.Thats why a pilot will be trained in a environment in which he/she can really feel as if in a real world.

Hardware used in Virtual Reality.
Display devcies play a major role in Virtual Reality.
HMD-Head Mounted Displays
Data gloves
Surround Projectors
Panoramic Projectors
Workbench Projectors
Desktop Displays

Astronaut Training
Marine Simulation
Health care education
Real estate

Pakka Hyderabadi

You are a true Hyderabadi if:

1. Your address reads as 23-404-32/67A-43 (New MCH number 56-678/4A/B-22), while you actually live in the second house beside Zamzam cafe in lane behind Anand Theatre on SP Road .

2. You end up buying only a salwar kameez, whether it is a theatre workshop, food mela, consumer expo, designer jewellery show, science show or an automobile convention.

3. Your street has at least one roadside mobile hotel that serves Chinese delicacies such as "Vegetable soft needles", "Navrotten Kurma", "Chicken Manchewurea" or "American Chompsee".

4. Your answer is 'seedha chale jao' when somebody asks you for directions, whether it is to Malakpet, Masab Tank, Malkajgiri or Moosapet.

5. You come across tailors sporting the board: Immidiot delivery in two days onli.

6. Except Telugu,You can speak Hindi, Urdu, Hyderabadi Hinglish fluently.

7. You ask the waiter to get you some 'Mango pickle' even if you are sitting at a lavish continental banquet dinner with exotic Chinese, Mexican,Italian and Lebanese cuisines.

8. You order for a tea just after having had a Caramel custard.

9. You have at least one Srinivas,Prasad, Raju or Venkatesh within six square feet. OR you have at least one cousin, friend, colleague or acquaintance with these names.

10. You have at least one cousin, friend, colleague or acquaintance in the US in software.

11. Everytime somebody gives you a piece of good news, the first thing you ask them is 'Party kab hain?'

12. Refer to any past as 'parso', be it yesterday or long before three hundred years.

13. You call 11 AM as subah subah.

14. You label your boss as 'Dimakh Kharab'

15. You are 15 minutes late and you feel you are on time.

16. You look at the fixed price stand and still ask 'dene ka bolo'

My Additions:

17. You call everyone and anyone BOSS...except ur Boss in Office

18. If 3 friends go to an Irani cafe....u order "2 chai ek empty"......if 4 people go.."3 chai ek empty" and so on...

19. You call the waiter in that cafe as "Heroooo"

20. You make that hissing sound followed by the word address a stranger

21. You have Chinese mobile hotels...which are named as "Mahalaxmi chinese food....Satya Sai chinese food"

You are secretly admitting to all these and thanking your luck to be a Citizen of the Greatest City of the World...We are Blue Blooded Man!!! HYDERABADIs ROCK!!!

Written by one of my close pals

Friday, April 20, 2007

First post

This is my first post for this blog.
I'm not an writer to create sensation.
I'll be writing in Hyderabadi language that is Hinglish.
This blog is all about hyderabd,Nothing else..
what ever that comes to my mind, i'll be posting,,

Thursday, April 19, 2007

Sending e-mail to mobile phone

Do you know that you can even send e-mail to mobile phones...

For eg:
Suppose you need to send e-mail to 9849098490(Andhra Pradesh -Airetl),
You need to send e-mail to

List of some Cellular Providers and their gateways
  •      Andhra Pradesh Airtel               -
  •      Andhra Pradesh Idea Cellular     - @
  •      BPL mobile                              -
  •      Chennai Skycell / Airtel             - @
  •      Chennai RPG Cellular              -
  •      Delhi Airtel                              -
  •      Delhi Hutch                             -
  •      Escotel                                  -
  •      Goa BPLMobil                        -
  •      Gujarat Idea                           -
  •      Gujarat Airtel                          -
  •      Gujarat Celforce / Fascel         -
  •      Goa Airtel                              - @
  •      Goa BPLMobil                        -
  •      Goa Idea Cellular                    -@
  •      Haryana Airtel                       -
  •      Haryana Escotel                   -
  •      Himachal Pradesh Airtel        -
  •      Idea Cellular                         -
  •      Karnataka Airtel                    -
  •      Kerala Airtel                         -
  •      Kerala Escotel                     - @
  •      Kerala BPL Mobile                -
  •      Kolkata Airtel                       - @
  •      Madhya Pradesh Airtel          -
  •      Maharashtra Idea Cellular     -
  •      Maharashtra Airtel               -
  •      Maharashtra BPL Mobile      -
  •      Mumbai Orange                   - @
  •      Mumbai BPL Mobile            -
  •      Pondicherry BPL Mobile      - @
  •      Punjab Airtel                       -
  •      Tamil Nadu Aircel                -
  •      Tamil Nadu BPL Mobile       -
  •      Uttar Pradesh (West) Escotel -

Tuesday, April 17, 2007

Grid Computing

Do you people think you are using the IT resources optimisely??
Have you ever saw the CPU usage in Task Manager(Press ALT+CTRL+DEL) of your computer?
You will be using utmost 10% only ,what about the remaining 90%??
Can't we make use of the remaining??
The answer is BIG YES.Yes we can make use of the remaining, the technology that makes possible is GRID COMPUTING.

What is Grid Computing??
Grid Computing is the one that makes possible to share disparate, loosely coupled IT resources across organizations and geographies. IT resources are freed from their physical boundaries and offered as services. They can potentially include almost any IT component -- computer cycles, storage spaces, databases, applications, files, sensors or scientific instruments.
In grid computing, resources can be dynamically provisioned to users or applications that need them. Resources can be shared within a workgroup, department or enterprise; among different organizations and geographies; and even with groups outside the enterprise in collaborative projects. Grids can be designed to support various business processes.

Why Grid??
With grid computing, your far-flung and disparate IT resources can act as a single “virtual datacenter.” Grid computing virtualizes heterogeneous IT resources so they are available when and where you need them. Grid allows you to provision applications and allocate capacity among business groups that are geographically and organizationally dispersed. You can:

* Enable secure, real-time collaboration among global teams,including partners and suppliers outside your company
* Rapidly deploy resources for new initiatives
* Accelerate new product development, improving time to market
* Reduce IT costs and improve return on investment
* More easily handle peaks and troughs in demand by provisioning resources where needed.

Technology benefits
Infrastructure optimization:
· consolidate workload management
· provide capacity for high-demand applications
· reduce cycle times
Increase access to data and collaboration:
· federate data and distribute it globally
· support large multi-disciplinary collaboration
· enable collaboration across organizations and among businesses
Resilient, highly available infrastructure:
· balance workloads
· foster business community
· enable recovery and failure

What industries are using grid computing now?
Some examples include: Automotive and aerospace, for collaborative design and data-intensive testing; financial services, for running long, complex scenarios and arriving at more accurate decisions; life sciences, for analyzing and decoding strings of biological and chemical information; government, for enabling seamless collaboration and agility in both civil and military departments and agencies; higher education for enabling advanced, data and compute intensive research.

Bringing grid to the enterprise
Grid technologies have long been used for scientific and technical work, where dispersed computers are linked to create virtual supercomputers that rapidly process vast amounts of information. Now, with the success of e-commerce and the Internet, the commercial enterprise is moving to an IT model based on Web services, in which software can be offered and consumed as services -- a service-oriented architecture.

Friday, April 13, 2007


What is a blog??

Short for Web log, a blog is a Web page that serves as a publicly accessible personal journal for an individual.If you've been surfing the web for the past year or five, you've undoubtedly heard of "blogs" or weblogs. These personal Internet journals have taken the Internet by storm. Frequently updated and written in a personal tone, a blog is a diary or journal where the writer or "blogger" will write his/her observations on the world or provide links to useful websites. Different bloggers write about different themes, sort of like a newspaper columnist but with no specialized training necessary.Typically updated daily,blogs often reflect the personality of the author.In simple terms, a blog is a web site, where you write stuff on an ongoing basis.New stuff shows up at the top,so your visitors can read what's new.

Who is blogger??

The one who publishes a blog is know as blogger.

Popularity for blogs..

Recently, through the mass popularity of sponsored post ventures such as PayPerPost a massive amount of personal blogs have started writing sponsored posts for advertisers wanting to boost buzz about new products and services. It has revolutionised the blogosphere almost in the same way that Google AdSense did.

How to Start a Blog??

1. Find a decent blogging provider that appeals to you.You can create blog from the following blogging providers
Most of these sites are pre-made with templates and push-button publishing that don't require much technical know-how.
2. Once you sign up, you'll have a gallery of ready-made templates to choose from. Select one and personalize it. Add your name, interests, images, etc.
3. Add blogging freebies like buttons, images, blog chalks, imoods, tagboards , guest maps, guestbooks,comment boxes for readers' input, etc.
4. Explore other blog sites that offer more features for a small fee, such as
5. Decide on whether or not you want your blog to be private or personal: do you want any Internet visitor to be able to read your blog, or do you just want your friends and family to be able to read it? Most blog sites offer the ability to password-protect your published posts so only those who you approve of can view what you've written.
6. Decide on how you want your blog to look. You can pick a color scheme and layout. Most sites come with a set of predefined layouts and schemes that you can choose from, or you can edit your own.
7. After you've set up your blog, write a few posts to test it out, and make any adjustments to the layout or style that you see fit. At first, it will seem tough to figure out what to write, but once you get into a routine of daily blogging, you will find it addictive. Write about your day, your thoughts, events, ideas, fears, pleasures, the news, current affairs, art, or anything you are interested in!
8. Visit other blogs to build a blogging circle. When you leave comments, add your blogging address so they can visit you too.
9. If you want to make your blog look more attractive, there are some sites up that have many "skins" that might make it look better. One example is, which also comes with Photoshop and HTML tutorials.
10. Publish your blog by sending the URL to your friends or publish the URL on your website. Add the URL to posts you make on other blogs.

Earn from blogs....

You can even earn from blogging
There are many services offered to earn from blogs.
Google's Adsense
Yahoo's publisher
are a few to name

Out of which google's AdSense is famous

Do sending your comments............................ Manoranjan Reddy Mandadi

Tuesday, April 10, 2007

BlueTooth Technology

What is Bluetooth wireless technology?

Bluetooth is an industrial specification for wireless personal area networks (PANs).Bluetooth technology is how mobile phones, computers, and personal digital assistants (PDAs), not to mention a broad selection of other devices, can be easily interconnected using a short-range wireless connection. Using this technology, users can have all mobile and fixed computer devices be totally coordinated.


Bluetooth wireless technology is a short-range communications technology intended to replace the cables connecting portable and/or fixed devices while maintaining high levels of security. The key features of Bluetooth technology are robustness, low power, and low cost. The Bluetooth specification defines a uniform structure for a wide range of devices to connect and communicate with each other.

A fundamental Bluetooth wireless technology strength is the ability to simultaneously handle both data and voice transmissions. This enables users to enjoy variety of innovative solutions such as a hands-free headset for voice calls, printing and fax capabilities, and synchronizing PDA, laptop, and mobile phone applications to name a few.

System Requirements

Now a days we are having laptops and palmtops that are enabled with Bluetooth Technology.For desktops we need a device called Bluetooth Dongle to connect via bluetooth.We need to install drivers for it.Most computers require an external USB Bluetooth dongle to communicate with other Bluetooth devices (such as mobile phones, mice and keyboards).


Bluetooth technology operates in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHz, using a spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec. The 2.4 GHz ISM band is available and unlicensed in most countries.

Operating Range

The operating range depends on the device class:
Class 3 radios – have a range of up to 1 meter or 3 feet
Class 2 radios – most commonly found in mobile devices – have a range of 10 meters or 30 feet
Class 1 radios – used primarily in industrial use cases – have a range of 100 meters or 300 feet

Data Rate

1 Mbps for Version 1.2; Up to 3 Mbps supported for Version 2.0 + EDR


From the start, Bluetooth technology was designed with security needs in mind. Since it is globally available in the open 2.4 GHz ISM band, robustness was built in from the beginning.
Bluetooth technology has built-in security such as 128bit encryption and PIN code authentication. When Bluetooth products identify themselves, they use the PIN code the first time they connect. Once connected, always securely connected

Versions of Bluetooth

Bluetooth is also known as IEEE 802.15.1.
Bluetooth 1.0 and 1.0B
Bluetooth 1.1
Bluetooth 1.2
Bluetooth 2.0
Bluetooth 2.1

Health concerns

Bluetooth uses the microwave radio frequency spectrum in the 2.4 GHz to 2.4835 GHz range. Previous electromagnetic hazard studies dating from the 1950s to the 1980s, including more recent studies,concluded that low power signals with frequencies as high as 1.5 GHz to 2 GHz do cause irreversible damage to human tissue. The radiated output power of Bluetooth devices is high when compared to other widely used mobile devices, so it is assumed that the potential for health risks are also correspondingly higher.

Wednesday, April 4, 2007

Global Positioning Systems

We generally wish to locate a particular object at an ease.New technology takes us to great heights with which we can exactly locate an object on earth.This is only know as Global Positioning System.

An acronym for Global Positioning System.A worldwide radio-navigation system that was developed by the US. Department of Defense.In addition to military purposes it is widely used in marine, terrestrial navigation and location based services.


GPS has a variety of applications on land, at sea and in the air.GPS is also typically used for navigation by recreational boaters, commercial fishermen, and
professional mariners. Land-based applications are more diverse.Surveyors use GPS for an increasing portion of their work.GPS is now commonplace in automobiles as well. Some basic systems are in place and provide emergency roadside assistance at
the push of a button (by transmitting your current position to a dispatch center).


A constellation of 24 satellites orbiting the earth at a very high altitude. GPS satellites transmit signals that allow one to determine, with great accuracy, the locations of GPS receivers.The receivers can be fixed on the Earth, in moving vehicles, aircraft, or in low-Earth orbiting satellites. GPS is used in air, land and sea navigation, mapping, surveying and other applications where precise positioning is necessary.GPS receivers take this information and use
triangulation to calculate the user's exact location.


There are many sophisticated devices which are specially manufactured for navigation using GPS systems.Now a days we can get mobiles which are GPS enabled.We can even search for ATM in our location using GPS phones.These devices generally have a color display which shows the roads and places.All the ambulances are enabled with GPS
systems in order to serve in case of emergency.Figuring out how to fold maps is a
problem of the past. Compasses are passe. Portable GPS devices, fitting into the palm of your hand or built into automobile dashboards, now bring Space Age navigation to the masses


Today's GPS receivers are extremely accurate,thanks to their parallel multi-channel design.Newer GPS receivers with WAAS (Wide Area Augmentation System) capability can improve accuracy to less than three meters on average.Offcourse there is a chance of occuring signalling errors in GPS systems.We shall se those errors..


The 24 satellites that make up the GPS space segment are orbiting the earth about 12,000 miles above us. They are constantly moving, making two complete orbits in less than 24 hours. These satellites are travelling at speeds of roughly 7,000 miles an hour.


Here are some sources of GPS signalling errors..
- Ionosphere and troposphere delays
- Signal multipath
- Receiver clock errors

Tuesday, April 3, 2007

Safe Guarding Computer.

If connected to Internet the main problem we face is due to virus, pop ups, malicious scripts,threats,Adware and Spyware,etc

Malicious scripts and spyware gain access over the computer and passes data sensitive information like credit cards information, bank balances,etc to third parties.

You can get rid of them by using a latest Anti Virus Program.
There are countless number of Anti Virus Programs available.

As far as I'm considered think Norton Anti Virus(NAV),Norton Internet Security(NIS) from Symantec Corporation serves us the best. Previously it used to be a free. Now it should be licensed.

NAV 2004,2005 and above should be licensed.

Though we can get many cracks for those softwares, it is better to use a licensed version of software and respect Intellectual Property Rights.

You can get Norton Anti Virus 2002 for free and you can update at an ease and use it in order to combat virus.Unlike other Anti Virus Applications, we can easily get Norton updates for Norton Anti Virus and Norton Internet Security.

Norton Internet Security doesn't allow any program to contact DNS servers without our permission.It notifies us even if Yahoo Messenger tries to access Internet.It also displays the names of viruses from which you are not protected.

You can also get Norton Internet Security (NIS) for free in INTEL MOTHER BOARD CD ROM which comes along with INTEL MOTHER BOARD.

Symantec Corporation Provides free updates.
For free updates

Generally you can update you Norton software by using Live Update which requires access to Internet,we can also download virus definitions(nearly 15Mb in size) file from the above site which is a executable.