Sunday, December 7, 2008

Zawgyi

Problem Description:
There are 2 users in Windows Vista, 1st user is OK with Zawgyi at IE and FireFox, but 2nd user is OK only at FireFox, but not at IE.
Install ZawGyi i386 Driver, no progress.

Solution
Remove Zawyi from both 2 users .
Restart computer.
Install Zawgyi for GTALLK then OK at 2 users places.

Read More...

Saturday, November 29, 2008

Q-Dir

Q-Dir is a free file management / explorer replacement program with a light footprint and a nice set of features. It integrates very well with Windows’ desktop environment and employs an innovative interface that makes it very easy to work with multiple file panes. Can be run portably from USB
http://www.freewaregenius.com/2008/11/21/q-dir-the-portable-file-management-program-that-could/

Here are my top EIGHT favorite features that Q-Dir provides:
1- Manage your files across multiple panes: all programs of this type offer this, but Q-Dir gets the prize for most intuitive implementation whereby it allows you to select the arrangement of panes that you want by clicking on small icons in the toolbar. The Q Dir people deserve credit for this interface which works extremely well.

2- Access frequently used folders (quicklinks): you can have instant access to your favorite folders and organize them within a folder structure. Note that this is different from saving ’favorites’ (see next point).

3- Save “Favorites”: as in, save a view comprising multiple folders across a particular distribution of panes. So let’s say that for a project you like to work with the “deskop” folder in the left hand pane and two panes on the right hand side showing “Folder A” on top and “Folder B” on the bottom; Q Dir allows you to save this entire configuration as a favorite. You can also save this as an object on the desktop, whereby double clicking this file will immediately open all of these folders in the configuration they were saved.

4- Filter box: you can access a filter box in the lower right hand corner of each pane in order to hone in on a file or group of files that you want to work with. The version I reviewed recently implemented an “always wildcard” option whereby anything you type is wildcarded (i.e. type in .mp3 and the program assumes *.mp3*) - very cool.

5- Installs an “open with QDir” shell extension: optional (see screenshot). From the “Extras” menu go to “System” then check “Add Q-Dir to the shell context menu”.

6- Works very well as a direct replacement to Explorer: I am now using Q-Dir in place of the default Windows Explorer and am extremely happy with it. Like Windows Explorer you can set Q-Dir to open to a single pane by default and to list the folder name in the title bar. One thing to consider, though, is that Q-Dir takes up approx 10-12 megs in memory, and opening multiple windows will launch multiple instances of the program whose overall memory use can add up. If you want to use Q-Dir as a replacement to Explorer do the following: add Q-Dir to the context menu (see point#5 above) then open any folder normally in Windows Explorer; next go to Tools, Folder Options, ’File Types’ tab then scroll down to “Folder” in the list. Once highlighted click advanced, select “*Q-Dir” and then click on “Set Default”. Q-Dir will now be the default program used to open any folder. Note: to revert back to Explorer, go through the same process and re-select “open” as default.

7- Uses the default Explorer context menu and column views: I like this as I am pretty invested in what I install in my PCs right click context menu and am sometimes dismayed when a “file manager” type apps takes over with it’s own context menu. I also like that it will use the columns enabled in explorer, which means that it will work with some Explorer extensions such as Folder Size and HobComment that customize column views.

8- Portable: either run the installer then check “portable-install” or simply rename Q-Dir_Installer.exe to Q-Dir.exe if you want a portable version.
Other features:

  • Color filters: you can optionally define a standard font color for each displayed file type or for folders (e.g. list all .zip files in red, .mp3 files in blue, etc.). Q-Dir comes with a pre-defined color scheme that you can change at will, or switch off color coding altogether (which is my preference).
  • Media file previews: Q-Dir supports (optional) previews for media files (including video, audio, and images) and PDF. Two caveats here (1) you will need to have the appropriate codec installed to see video, and (2) you apparently need Adobe Reader installed to preview PDF (I have PDF-Exchange Viewer and PDF previews do not display).
  • Zip files: Q-Dir provides the ability to browse and perform file operations on zip folders seamless just as you would a normal folder.
  • Export: files and directory structure to XLS, CSV, TXT, and HTML.Other features: keyboard shortcuts for most functions, quick online searches for selected files or objects, an on-screen magnifier, and others.

Wish list (or how this program can be even better):

  • Calculating folder sizes: for all folders by default or for selected folders (in the absence of this you could use the Folder Size extension in conjunction with Q-Dir to get this.
  • The ability to “swap” visible folders between panes: this is a mainstay of most programs like this one, strangely absent here.

The verdict: this is definitely one of my favorite file management/explorer replacement programs. I have been using Q-Dir to replace Windows explorer for about a week now and am very happy with the functionality that it provides as well as it’s speed and responsiveness. Previously I had been using the excellent UltraExplorer, and while you cannot compare the two programs directly (UltraExplorer is much more feature rich and a more complex program overall), I found Q-Dir more suitable as a direct replacement for windows explorer because it was in fact much more responsive. Overall I can say that Q-Dir manages to strike a perfect balance between providing a host of excellent features and functions while maintaining a very good interface design and a good user experience.

Read More...

Saturday, November 22, 2008

WordPress 2.6

WordPress 2.6 Stable Version ထြက္ရွိလာပါၿပီ။ ဒီတစ္ေခါက္ WordPress 2.6 ကို Philadelphia က အေမရိကန္ လူမည္း Jazz ေတးဂီတ ပညာရွင္ တစ္ဦးျဖစ္သူ McCoy Tyner ကို ဂုဏ္ျပဳလ်က္ Code Name ကို “Tyner” ဟု ေပးထားေၾကာင္း သိရပါတယ္။

WordPress 2.6 ၏ အဓိက ျပဳျပင္ေျပာင္းလဲ ထားမႈမ်ား
၁။ အဘိဓာန္ (Wiki) ပံုစံ ပို႔စ္ မ်ားကို တည္းျဖတ္ျခင္း - ဒီ Feature အသစ္ကို အသံုးျပဳၿပီး WordPress Blog တစ္ခုမွာ ပါ၀င္ေရးသား ေနၾကသူမ်ား အေနနဲ႔ ယခင္တစ္ေယာက္ ေရးၿပီးသား ပို႔စ္ကို၊ ေနာက္တစ္ဦးမွ ျပင္ဆင္ တည္းျဖတ္ျခင္းမ်ား လုပ္တဲ့ အခါ ဘာေတြ၊ ျပင္သြားတယ္၊ ဘယ္စကားလံုး ေတြကို ေတာ့ ထပ္ထည့္သြားတယ္ စသျဖင့္ သိရွိ ႏိုင္ပါမယ္။ (ကၽြန္ေတာ္တို႔ ယခင္က စာပံုႏွိပ္တိုက္ေတြမွာ စာစီဆရာ၊ စာျပင္သမား၊ ပရုဖတ္သူ၊ အယ္ဒီတာ၊ အယ္ဒီတာခ်ဳပ္. စသျဖင့္ စာတစ္ပုဒ္ကို အဆင့္ဆင့္ အမွားရွာၿပီး အေကာင္းဆံုး ကို ရယူ ျပဳျပင္ႏိုင္ပံုမ်ိဳး နဲ႔ အလားသ႑ာန္တူ ပါတယ္။) အကယ္၍ ေနာက္ဆံုး ျပင္ဆင္ တည္းျဖတ္သူမွ ပထမဆံုး ေရးသားသူရဲ့ မူရင္း ေဆာင္းပါးကို ျပန္လည္သိုမွီးမႈ (Restore) လုပ္ခ်င္တယ္ ဆိုရင္လည္း လုပ္ႏိုင္တဲ့ အခြင့္အေရး ေတြကို ပါ Wikipedia မွာကဲ့ သို႔ တစ္ပါတည္း ရရွိေစပါမယ္။
Press This! - ၀ဘ္ဘေရာက္ဇာ၏ မည္သည့္ေနရာမွ မဆို မိမိဘေလာ့ဂ္ သို႔ ပို႔စ္ တင္ႏိုင္ျခင္း - ဒီ Feature ေလးရဲ့ သေဘာ သဘာ၀ကို Tumblr, Facebook ႏွင့္ Delicious စတဲ့ Mini Blogging လို႔ ေခၚႏိုင္တဲ့ Web 2.0 စတိုင္လ္ Sharing ဆိုဒ္ ေတြကို အသံုးျပဳေနတဲ့ သူေတြ အေနနဲ႔ စိမ္းမွာ မဟုတ္ပါဘူး။ အလြယ္ကူဆံုး ဥပမာေပးရမယ္ ဆိုရင္ ျမန္မာေတြနဲ႔ အေတာ္မ်ားမ်ား အကၽြမ္းတ၀င္ ရွိတဲ့ Delicious နဲ႔ ဥပမာ ေပးရပါလိမ့္မယ္။ ကၽြန္ေတာ္တို႔ Delicious ကို အသံုးျပဳတဲ့ အခါ ကိုယ္ ႀကိဳက္တဲ့ Web Page ေတြ ေတြ႔ရင္ ကိုယ့္ ဘေရာက္ဇာကေန တစ္ခါတည္း Delicious Website မွာ Bookmark လုပ္ႏိုင္ဖို႔ အတြက္ Browser ထဲ ထည့္သြင္း ထားလို႔ ရတဲ့ Delicious Plugin ေလးရွိပါတယ္။ အဲဒီ Plugin ေလးကို Install လုပ္ၿပီးသကာလမွာ မိမိ ဘယ္၀ဘ္ဆိုဒ္ကိုပဲ ေရာက္ေရာက္ ဘေရာက္ဇာရဲ့ Address Bar ေဘးမွာ ေပၚေနတဲ့ Delicious Button ေလးကို ႏွိပ္လိုက္တယ္ ဆိုရင္ပဲ အဲဒီ ဆိုဒ္ကို မိမိႀကိဳက္ ႏွစ္သက္ရာ မွတ္ခ်က္တစ္ခုခုႏွင့္ ေရးသားမွတ္သားၿပီး Delicious Website ထဲသို႔ မိမိႀကိဳက္ရာ က႑မွာ ခြဲျခား မွတ္သား သိမ္းဆည္း ထား ႏိုင္ပါၿပီ။

အခု WordPress 2.6 မွာလည္း Press This! ရဲ့ သေဘာ သဘာ၀က အထက္ပါ အတိုင္းပါပဲ။ Admin Panel ရဲ့ Writing Page ေအာက္ဆံုးမွာ ရွိတဲ့ Press This! Button ေလးကို မိမိရဲ့ ဘေရာက္ဇာ Bookmark Bar သို႔မဟုတ္ Address Bar ရဲ့ လြတ္တဲ့ ေနရာ တစ္ခုခုမွာ Drag & Drop လုပ္ၿပီး ဆြဲထည့္ထားလိုက္တာနဲ႔ မိမိဘယ္ေနရာပဲ၊ ဘယ္၀ဘ္ဆိုဒ္ ကိုပဲ ေရာက္ေနပါေစ. ဘေရာက္ဇာ မွာရွိတဲ့ Press This! Button ေလးကို ႏွိပ္လိုက္ရံုနဲ႔ ပို႔စ္ အသစ္တင္ႏိုင္တဲ့ Admin Panel Wirting Interface ကို မိမိ ေနာက္ဆံုးေရာက္ရွိခဲ့ တဲ့ Web စာမ်က္ႏွာက သတင္းအခ်က္အလက္ ေတြပါ ယူေဆာင္လ်က္ တစ္ပါတည္း ေရာက္ရွိသြားမွာ ျဖစ္ပါတယ္။

၃။ ေရႊ႕ေျပာင္း ဂီယာျဖင့္ သင့္ WP Blog အား ျမန္ႏႈန္းျမွင့္ျခင္း - ဒါကေတာ့ ယခင္တစ္ေလာက ပဲ WordPress.Com အမွန္ေတာ့ Turbo Gear ဆိုတာ Google က ကမကထ လုပ္ၿပီး တည္ေထာင္ထားတဲ့ Browser Extension Opensource Project တစ္ခုျဖစ္ပါတယ္။

သူ႔ရဲ႕ အၾကမ္းဖ်င္း သေဘာ သဘာ၀ ကေတာ့ အင္တာနက္ ႏွင့္ ဘေရာက္ဇာ အသံုးျပဳၿပီး Webpage မ်ားကို ၾကည့္ရႈ ေနသူတိုင္း အတြက္ လိုအပ္တဲ့ Data ေတြ၊ ရုပ္သံ ဖိုင္ေတြကို အဲဒီ Webpage ကို ဖြင့္တိုင္း မိမိၾကည့္ရႈတဲ့ Web Server ကေနတဆင့္ ေဒါင္းလုဒ္ လုပ္လုပ္ေနရတဲ့ ဒုကၡက ကင္းေ၀း ေစဖို႔၊ မိမိစက္အတြင္းမွာ Local Server တစ္ခု တည္ေဆာက္ေပးၿပီး Data တစ္ခုကို Webpage တစ္ခု ဖြင့္တိုင္း ထပ္ခါတစ္လဲလဲ ေဒါင္းလုဒ္ လုပ္ရျခင္းမွ ကင္းေ၀းေစကာ User အတြက္ မလိုအပ္တဲ့ Traffic ျပန္းတီးမႈ မွသက္သာေစၿပီး Webserver မ်ားကိုလည္း Bandwidth ျပဳန္းတီးမႈ မွသက္သာ ေစဖို႔ ျဖစ္ပါတယ္။

ယခု WordPress 2.6 မွာ Gear Support လုပ္လိုက္ၿပီ ျဖစ္တဲ့ အတြက္ WP Blog ပိုင္ရွင္ေတြ အေနနဲ႔ မိမိရဲ့ စာရႈသူေတြကိုေရာ၊ မိမိကိုယ္တိုင္ပါ Google Gear ကို မိမိရဲ့ ၀ဘ္ဘေရာက္ဇာအတြင္း အင္စေတာလ္ လုပ္ထားျခင္း ျဖင့္ ဘေလာ့ဂ္ တစ္ခုအတြက္ ဘံုအသံုးျပဳေနၾက ျဖစ္တဲ့ CSS file, Java Script File မ်ားကဲ့သို႔ေသာ Common Data မ်ားကို မိမိရဲ့ Local Server အတြင္း ထည့္သြင္း သိမ္းဆည္းထားၿပီး သကာလ ေရးသူေရာ၊ ဖတ္သူ အတြက္ပါ WordPress Blog မ်ားရဲ့ အျမန္ႏႈန္း တိုးတက္လာမွာ ျဖစ္ေၾကာင္း သိေစအပ္ပါတယ္ခင္ဗ်ာ။

၄။ မိမိအသံုးျပဳလိုတဲ့ Theme ကို ႀကိဳတင္ၾကည့္ရႈႏိုင္ျခင္း - ယခင္ ကၽြန္ေတာ္တို႔ WordPress Blog ေတြမွာ Install လုပ္ထားတဲ့ Theme ေတြကို ၂-လက္မ ပတ္လည္ Thumbnail ပံုေလးေလာက္ပဲ ျမင္ေတြ႔ၾကည့္ရႈႏိုင္ၿပီး အသံုးျပဳဖို႔ သင့္မသင့္ ဆံုးျဖတ္ခဲ့ၾကရတာပါ။ အခုေတာ့ ခင္ဗ်ားရဲ့ WP Admin Panel ထဲ Install လုပ္ထားတဲ့ ဘယ္ Theme မဆိုကို စာမ်က္ႏွာ ျပည့္ Preview ၊ ရွင္းလင္းစြာ ၾကည့္ရႈ လို႔ ခင္ဗ်ား ႀကိဳက္မႀကိဳက္ တိက်စြာ ဆံုးျဖတ္ႏိုင္ပါၿပီ။

အထက္ပါ ေဖာ္ျပခ်က္ေတြကေတာ့ WordPress 2.6 ရဲ့ အဓိက ျပဳျပင္ ေျပာင္းလဲထားမႈ မ်ားျဖစ္ၿပီး ေအာက္ပါ တို႔ကေတာ့ Wordpress 2.6 ရဲ့ က်န္တဲ့ Smaller New Features ေတြ ျဖစ္ၾကပါတယ္တဲ့။

* Word count! Never guess how many words are in your post anymore.
* Image captions, so you can add sweet captions like Political Ticker does under your images.
* Bulk management of plugins.
* A completely revamped image control to allow for easier inserting, floating, and resizing. It’s now fully integrated with the WYSIWYG.
* Drag-and-drop reordering of Galleries.
* Plugin update notification bubble.
* Customizable default avatars.
* You can now upload media when in full-screen mode.
* Remote publishing via XML-RPC and APP is now secure (off) by default, but you can turn it on easily through the options screen.
* Full SSL support in the core, and the ability to force SSL for security.
* You can now have many thousands of pages or categories with no interface issues.
* Ability to move your wp-config file and wp-content directories to a custom location, for “clean” SVN checkouts.
* Select a range of checkboxes with “shift-click.”
* You can toggle between the Flash uploader and the classic one.
* A number of proactive security enhancements, including cookies and database interactions.
* Stronger better faster versions of TinyMCE, jQuery, and jQuery UI.

WordPress.Org အေနနဲ႔ ကေတာ့ WP 2.5 အသံုးျပဳသူေတြ ကို အဓိကျပဳျပင္ ေျပာင္းလဲမႈေတြ မ်ားစြာ ျပဳလုပ္ထားတဲ့ ဒီ ဗားရွင္း အသစ္ WordPress 2.6 ကို Upgrade လုပ္ၾကဖို႔ကို အေလးအနက္ တိုက္တြန္းထားပါတယ္။

ေနာက္ၿပီး WordPress 2.5 ကေန WordPress 2.6 ကို Upgrade လုပ္မယ္ ဆိုရင္ လုိအပ္တဲ့ သတင္းအခ်က္အလက္ေတြ ရယူႏိုင္ဖို႔ ေအာက္ပါေနရာေတြမွာ အဆင္သင့္ရွိၿပီး သားျဖစ္ပါတယ္။
Standard 3- steps Upgrade Instructions
Upgrading WordPress Extended
ကိုသႀကၤန္ရဲ့ WP Upgrading ျမန္မာ ဗားရွင္း
အကယ္၍ လြယ္လြယ္ကူကူ သက္သက္သာသာပဲ Plugin အကူအညီနဲ႔ WordPress 2.6 ကို Upgrade လုပ္လိုတယ္ ဆိုရင္ေတာ့ ေအာက္ပါ WordPress Plugin က အသံုးျပဳဖို႔ အသင့္ေတာ္ဆံုး ႏွင့္ အေကာင္းဆံုးပါပဲ။ (Updated!)
Download WordPress Automatic Upgrade Plugin

WordPress 2.6 ကို Upgrade လုပ္မယ္ ဆိုရင္ ဒီအခ်က္အလက္ေတြကို ႀကိဳတင္စဥ္းစား ေဆာင္ရြက္ထားပါ

၁။ သတင္းစုေဆာင္း - ဘာေတြ လိုအပ္သလဲ၊ ဘယ္လို လုပ္မလဲ

၂။ ရည္မွန္းခ်က္ကို အတိအက်ခ်ထား - ရည္မွန္းခ်က္ကေတာ့ WP 2.6 ကို ေအာင္ျမင္စြာ Upgrade လုပ္ႏိုင္ေရးေပါ့ဗ်ာ. :)

၃။ လုပ္နည္း လုပ္ဟန္ကို ႀကိဳတင္စဥ္းစား - သူမ်ားက ဒါၿပီးမွ ဟိုဟာ လုပ္ပါ ေျပာေပမယ့္ ကိုယ့္မွာ ဟိုဟာၿပီးမွ ဒါ လုပ္ရတာ လည္း ျဖစ္ခ်င္ျဖစ္ေန လိမ့္မယ္

၄။ အုပ္ခ်ဳပ္မႈအတြက္ လိုအပ္တာေတြျပင္ဆင္ - မိမိ Blog ကို ျပင္တုန္းဆင္တုန္း ကြန္နက္ရွင္ ျပတ္လို႔ မရဘူးေလ :D

၅။ ဆက္သြယ္ မႈအတြက္ အကြက္ခ်ထား - လုပ္ရင္းကိုင္ရင္း အခက္အခဲ ႀကံဳခဲ့ရင္ အကူအညီေတာင္း လို႔ ရမည့္ သူရွိေအာင္ :D

အထက္ပါ အခ်က္ အလက္ေတြကို အပီအျပင္ ႀကိဳတင္ ျပင္ဆင္ၿပီး သကာလ အားလံုးပဲ WordPress 2.6 ႏွင့္ ေပ်ာ္ရြင္ ေအာင္ျမင္၊ ျမန္ဆန္ သြက္လက္ ဘေလာ့ဂင္း ႏိုင္ၾကသည္ ျဖစ္ေစေသာ္၀္! :D

ရည္ညြန္းကိုးကား

WordPress.Org Blog
WordPress Gear
WordPress Codex

Read More...

WordPress version upgrade

WordPress ကို ပိုျမင့္တဲ့ version upgrade လုပ္မယ္ဆိုရင္

လက္ရွိအသံုးျပဳေနတဲ့ WordPress ကို ပိုျမင့္တဲ့ version upgrade လုပ္မယ္ဆိုရင္ ပထမဆံုး backup ကို ေသခ်ာ လုပ္ထားရပါမယ္။ Dashboard / Manage / Export ကေန xml format နဲ႕ backup တစ္ခု မရွိမျဖစ္ လုပ္ထားရပါမယ္။ http://wordpress.org/download က upgrade လုပ္ခ်င္တဲ့ wordpress ေနာက္ဆံုးဗားရွင္း ကို ေဒါင္းလုပ္ခ်ပါ။ မိမိအသံုးျပဳေနတဲ့ hosting က file manager နဲ႕ ျဖစ္ျဖစ္၊ zip ေျဖၿပီး ftp software နဲ႕ျဖစ္ျဖစ္ wordpress install လုပ္ထားတဲ့ folder ထဲကို upload တင္ပါ။ ဥပမာ။ ။ byethost မွာတင္ထားတဲ့ wordpress ဆိုရင္ urblogname/htdocs ေအာက္ကိုေပါ့။ plugins ေတြ themes ေတြ တင္တဲ့ ပံုစံမ်ိဳး အတိုင္းပါပဲ။ အရင္ရွိၿပီးသား ဗားရွင္းအေဟာင္းက ဖိုင္ေတြကို over wirte လုပ္မလားလို႕ ေမးခဲ့ရင္ yes ေပးလိုက္ပါ။ အားလံုးၿပီးရင္ web browser နဲ႕ http://urblogname/wp-admin/upgrade.php ကိုဖြင့္လိုက္ပါ။ urblogname ေနရာက မိမိ blog နာမည္ျဖစ္ပါတယ္။ ဥပမာ ကၽြန္ေတာ္တို႕၏စပ္မိစပ္ရာ ဘေလာ့ဂ္ဆိုရင္ http://smsy.iblogger.org/wp-admin/upgrade.php ေပါ့ဗ်ာ။ ဖြင့္လို႕ရၿပီဆိုရင္ ပံုစံ ၂ ျဖစ္ႏိုင္ပါတယ္။ database upgrade လုပ္စရာ မလိုတဲ့ အဆင္ျမင့္တာမ်ိဳး ဆိုရင္ No Upgrade Required ဆိုၿပီး တတ္လာမွာျဖစ္ပါတယ္ Continue ႏွိပ္ေပးယံုပါပဲ။ database upgrade လုပ္ဖို႕လိုတယ္ ဆိုရင္ေတာ့ Upgrade WordPress ဆိုၿပီး ေပၚလာပါမယ္ သူေပးထားတဲ့ အတိုင္း click လုပ္ေပးၿပီးရင္ upgrade လုပ္တာ ေအာင္ျမင္ပါၿပီ။
Source: http://mmwordpress.com/upgrade-wordpress/

Read More...

Thursday, November 20, 2008

Google Talk Multiple Instances

Google Talk: Run Multiple Instances or Login as Multiple Users
Run google talk with the following switch: /nomutex

If you installed google talk to the default location, you can easily create a shortcut to this setting.
1. Right-click on the desktop
2. Select New
3. Select Shortcut
4. Paste this into the text box:"c:\program files\google\google talk\googletalk.exe" /nomutex

Read More...

Saturday, November 15, 2008

About Attacks to your Computer

About Attacks to your Computer
  • What is spyware?
  • What is adware?
  • What is malware?
  • What is parasiteware?
  • What is a page hijacker?
  • What is a dialer?
  • What is a browser plugin?
  • What is a commercial keylogger?
  • What is a commercial network management tool?
  • What is a data miner?
  • What is a loyaltyware?
  • What is a remote administration tool?
  • What is a worm?
  • How can I tell that I have spyware on my computer?
  • How does spyware get on my computer?
  • What is the difference between spyware and viruses?
  • How to keep spyware off of my computer?
  • Is there any legal protection against spyware?
http://www.spywareterminator.com/support/what-is-spyware.aspx


What is spyware?

Spyware is software that is capable of performing certain operations on your computer without your consent, such as displaying advertisements, collecting your personal information, or changing the configuration of your computer.

Other types of unwanted software can alter to your computer with results ranging from minor annoyances to causing your computer to slow down or crash. These programs have the ability to change your Web browser's home page or search page, or add additional components to your browser you may not need or want. These programs also make it very difficult for you to change your settings back to the way you originally had them. These types of unwanted programs are often labeled as spyware.

What is adware?

Adware is software that displays advertisements. This does not mean that any software that provides advertisements or tracks your on-line activities is adware. For example, you may install a free ad-supported version of software, and you "pay" for the service by agreeing to receive targeted advertisements. If you understand the terms and agree to them, you may have decided that it is a fair tradeoff. You may also have agreed to let the company track your online activities to determine which advertisements to show you. To avoid installing adware if you do not wish to "pay" for the service by receiving targeted advertisements, we recommend that you carefully read the software’s Terms of Use and End User License Agreement.

What is malware?

Malware, or malicious software, is designed specifically to damage your machine or interrupt the normal computing environment. A trojan horse, worm or virus could be classified as malware. Some advertising software can be malicious by trying to re-install itself after you have removed it.


What is parasiteware?

Parasiteware is the term for any adware that by default overwrites certain affiliate tracking links. These tracking links are used by webmasters to sell products and to help fund websites. The controversy is centered on companies like WhenU, eBates, and Top Moxie, popular makers of adware applications. These companies release their software to assist users in getting credit for rebates, cash back shopping, or contributions to funds. To the end user, parasiteware represents little in the way of a security threat.


What is a page hijacker?

Hijacker is an application that attempts to take control of the user's homepage and replace it with one that the hijacker chooses. It is a low security threat, but is annoying. Most hijackers use stealth techniques or trick dialog boxes to perform installation.

Browser hijackers commonly do one or more of the following:

* Change your "search" page and passes all searches to a pay-per-search site
* Change your default home page to the company page. Sometimes the software changes them to a portal featuring porn sites.
* May transmit URLs viewed toward the company server


What is a dialer?

A dialer is a type of software used by pornographic vendors. Once dialer software is downloaded, the user is disconnected from his/her modem's usual Internet service provider, is connected to another phone number and is then billed. While dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to the victim.


What is a browser plugin?

A plugin is a software program that extends the capabilities of your Internet browser in a specific way. Not all browser plugins are harmful and some may be helpful. This category contains mostly dubious browser plugins such as “Search Assistant”, toolbars, etc. that have been known to transmit user data to their creators or have been installed using covert means.


What is a commercial keylogger?

Commercial keylogger is a program designed to monitor user activity. It may be used with or without consent. Since it is sold commercially, most anti-virus vendors do not detect it.


What is a commercial network management tool?

A commercial network management tool is mostly used in (large) corporations. It can log the network traffic passively (sniffing) or examine the logs of proxies, etc. Nothing is installed on the individual computers, the software runs on a central server. They can only log items that pass through the network, but not local items such as the entered passwords, keystrokes or screenshots.


What is a data miner?

A data miner’s primary function is to gather data about an end user. Some adware applications may employ data mining abilities.


What is a loyaltyware?

Loyaltyware is a sub-form of adware. Loyaltyware is a type of software that works around the concept of user loyalty by providing incentives in the form of cash, points, airline miles, or other type of goods while shopping.


What is a remote administration tool?

A remote administration tool is a tool designed to be used by network administrators to remotely control a computer on the network, usually for support or inventory purposes. It may be used for spying purposes.


What is a worm?

A worm is a virus-like program that spreads automatically to other computers by distributing itself via email or other means. A worm spreads itself by attacking other machines and copying itself to the affected machine. Both worms and viruses are self-replicating codes that travel from machine to machine by various means. Both worms and viruses have, as their first objective, merely propagation. Both can be destructive, depending on what payload, if any, they have been given. There are some differences in that worms may replace files, but do not insert themselves into files, while viruses insert themselves into files, but do not replace them.


How can I tell that I have spyware on my computer?

You may have spyware installed on your computer if:

* You see pop-up advertisements even when you're not on a website.
* Your homepage or your browser search settings have changed without your knowledge.
* You have a new toolbar in your browser that you didn't want, and find it difficult to get rid of.
* Your computer takes longer than usual to complete certain tasks.
* You experience a sudden rise in computer crashes.


How does spyware get on my computer?

There are several ways spyware or other unwanted software can intrude your computer. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program. Whenever you are installing something on your computer, make sure you carefully read all disclosures, including the license agreement and privacy statement. Sometimes the inclusion of unwanted software in a given software installation is documented, but it may appear at the end of a license agreement or privacy statement.


What is the difference between spyware and viruses?

The average Internet user has difficulty distinguishing viruses from spyware. However there are slight differences. Both are malicious software, both have the capacity to capture and destroy information, ruin performance, and disrupt business processes.

A virus seeks to infect a computer; to replicate; and to infect as many computers as possible, as quickly as possible. For example, an email-delivered virus (a worm) may search your computer's file system for your Outlook address book and send infected email messages to contacts it finds in the address book. A virus relies on email for propagation, but tries many attack vectors such as file sharing, telnet, FTP, IMs, or any services and programs on your computer that communicate with other computers.

Viruses seek to spread, but spyware tries to stay put as a parasite. Spyware disguises itself as a legitimate application or secretly resides as one more data link library (DLL) or registry setting the average user knows nothing about, so that it can collect information about you, your messaging, browsing behavior and your online preferences. Spyware will embed itself deeply into critical components of your operating system and bloat your memory with its monitoring and collection processing executables. So where virus activities are overt and sufficiently extensive in their impact to attract attention quickly, spyware activities are typically covert and their infestations are often long lasting.

Spyware will exploit your computer of anything it can use for monetary gain, for as long as it can remain attached to the host. Spyware is content to sit on a single computer, to monitor what the user does, as is the case with tracking adware; or influence where the user visits, as is the case with targeting advertisers who use browser helper objects that pop-up ads, substitute search engines, and hijack home pages.

Viruses can be intentionally destructive and have been known to erase or corrupt file systems or abet denial of service attacks. Spyware is more interested in having the host remain healthy: a non-functional computer has neither advertising value nor revenue potential to spyware. So spyware typically remains non-destructive, unless you try to remove it. But many spyware packages are removal resistant: you may uninstall them only to find they reappear when you reboot your computer. Others modify many critical components of a computer operating system and incomplete removal often renders the computer inoperable.


How to keep spyware off of my computer?

Here are few useful tips on how to avoid spyware infection:

* Use anti-spyware programs such as Spyware Terminator.
* Keep your anti-spyware programs current by downloading updates.
* If using Microsoft's Internet Explorer, turn off its ability to run scripts without your permission.
* Prevent spyware from transmitting data off the system by using a firewall.
* Do not click on links within pop-ups. By clicking on a pop-up link you may install spyware on your computer. Close the popup with the "X" on the title bar, do not use the "close" link, if there are any available within the window.
* Do not download programs from websites you are not familiar with.
* Be careful of unexpected dialog boxes asking whether you want to perform an action. If you are not sure about the impact of the action, better click "NO" or close the dialog box by clicking the "X" icon in the title bar.
* Do not follow email links offering anti-spyware software. These links may actually install the spyware they claim to be keeping off your system.


Is there any legal protection against spyware?

Although the Can-Spam law that has been in effect for a year, it hasn't had much success against unsolicited email. Legal experts and business technology professionals remain hopeful that laws aimed at reducing adware and spyware will fare somewhat better.

States are moving forward in crafting anti-spyware legislation. A former Governor of Utah signed into law the Spyware Control Act that bans the installation of spyware without the user's consent. A similar law went into effect in California enforcing a $1,000 penalty per violation. At the 109th Congress recently convened Rep. Mary Bono, R-Calif., reintroduced her anti-spyware bill that includes civil fines up to $3 million for violators.

Still, Michael Overly, a technology attorney with the law firm of Foley & Lardner, says that the new laws aren't entirely necessary because the federal Computer Fraud and Abuse Act already makes it illegal for unauthorized system intrusions. Other legal experts point out that Title 5 of the Federal Trade Commission Act enables the FTC to track down anyone conducting deceptive trade practices, and the Electronic Communications Privacy Act also could be used against those who send out spyware.


Read More...

Saturday, October 25, 2008

privateCam_v0.1.exe Virus ရွင္းလင္းနည္း

ယခုရက္ပိုင္းအတြင္ Gtalk ႏွင့္ YAHOO တို႔မွတဆင့္ ကူးစက္ေသာ Virus တစ္မ်ိဳးေပၚေပါက္ေနပါသည္။ အကယ္၍ Gtalk တြင့္ မိမိဆီကို Hey Please help me to test my new cam http://h1.ripway.com/.../privateCam_v0.1.exe ဟုေသာစာေၾကာင္း ၀င္လာပါက အဲဒီစာေၾကာင္းကို လံုး၀မႏွိပ္မိေစရန္သတိျပဳၾကပါ။ တစ္စံုတစ္ေယာက္က ေပးပို႔လာပါက ထိုေပးပို႔လာသူအား သူသည္ Virus infected ျဖစ္ေနေၾကာင္းကို သတိေပးေျပာၾကားေပးၾကပါရန္ ႏွိးေဆာ္အပ္ပါသည္။
privateCam_v0.1.exe Virus ရွင္းလင္းနည္း

ClearPrivateCamVirus << ဖိုင္ေလးကိုႏွိပ္ျပီးေဒါင္းလုဒ္လုပ္ပါ။ သင့္တြင္ AntiVirus Software ရွိပါက ခဏပိတ္ထားလိုက္ပါ။ ျပီးလွ်င္ Zip ဖိုင္အတြင္းမွ ClearPrivateCamVirus ဆုိေသာဖုိင္ေလးကို ႏွစ္ခ်က္ႏွိပ္ျပီး Run လုိက္ပါ။ သင့္စက္ကို Restart ခ်ေပးလိုက္ပါ။ privateCam_v0.1.exe ကိုရေအာင္ရွာ၍ ဖ်က္ေပးလိုက္ပါ။

Read More...

Friday, October 3, 2008

Ethernet Cat5 T568B color order

T568A-Straight Through
W/Green Green W/Orange Blue W/Blue Orange W/Brown Brown

T568B -Straight Through
W/Orange Orange Blue W/Blue Green W/Green W/Brown Brown

Corssover Twisted
PC-1 W/Green Green W/Orange Blue W/Blue Orange W/Brown Brown
PC-2 W/Orange Orange W/Green Blue W/Blue Green W/Brown Brown


Type rest of the post here

Read More...

Thursday, October 2, 2008

Windows Product Activation

Windows Product Activation (WPA) is to ensure that Windows Vista is installed on only a limited number of computers .
Several Identifiers are used
Hardware ID : information generated from a computer hardware configuration
Product ID : A 25- character unique key supplied with the installation media
Installation ID : An identifier that Windows creates from the Hardware ID and Product ID.


During WPA Product ID and Hardware ID are sent to Microsoft. A single Product ID can't be tied to more than one Hardware ID. If the activation check finds that the Product ID has not been activated and tied to a Hardware ID, both ID are recorded and installation is activated. If the activation check finds the product ID is tied to a different hardware ID, the activation is failed.

Read More...

Thursday, September 25, 2008

about XXware

Knowledge about spyware, malware, adware.
http://www.malwarehelp.org/

Maleware
What is Malware, Malware -short for MALicious softWARE- is a term used to broadly classify a form of software which is installed in a computer system mostly without the owners permission with malicious intentions. It includes Trojans, viruses, key loggers, malicious active content, rogue programs and dialers among others.

Spyware
Spyware is defined loosely as any program that secretly gathers information about you and or your computer use through your Internet connection. Typically, a Spyware program gathers information about you by monitoring your computing activities and then transmits it across the Internet to a central server for onward distribution to interested parties for advertising purposes. These programs can also download files, run other programs in the background, and change your system settings.

Adware
Adware is usually a freeware displaying advertising banners within the program interface. The developer creates revenue by selling advertising space in the software product, instead of you having to pay for it. Occasionally, some Adware will also act as spyware which includes information gathering code to send non-sensitive information back to third parties. Some people think that Adware are same as spyware, but Adware isn't necessarily spyware. While legitimate adware companies will disclose the nature of data that is collected and transmitted in their privacy statement, there is almost no way for the user to actually control what data is being sent. In addition to privacy concerns, frequent downloading of advertisement banners and other ads while the user is browsing can slow down the system immensely and for users paying for dialup services by time used, ad-loading and hidden communications with servers can be very costly.

Trojans
A program that comes in secretly and quietly, but it carries a destructive payload. Once you become infected by the worm or virus that that Trojan carries into your computer, it can be very difficult to repair the damage. Trojans often carry programs that allow someone else to have total and complete access to your computer. Trojans usually come attached to another file, such as an .avi, or .exe, or even a .jpg. Many people do not see full file extensions, so what may appear as games.zip in reality could be games.zip.exe. Once the person opens up this file, the Trojan goes to work, many times destroying the computer's functionability. www.ircbeginner.com/ircinfo/ircglossary.html

Viruses
A piece of programming code usually disguised as something else that causes some unexpected and, for the victim, usually undesirable event and which is often designed so that it is automatically spread to other computer users. Viruses can be transmitted by sending them as attachments to an e-mail note, by downloading infected programming from other sites, or be present on a diskette or CD. The best protection against a virus is to know the origin of each program or file you load into your computer or open from your e-mail program.

Browser Hijackers
Browser Hijacking is caused by malicious code which can alter your browser settings without your knowledge. Browser Hijackers are extremely common.
Altering the Homepage, Search Page of your browser.

  1. Changing various options in your Internet settings.
  2. Blocking access to certain functions (parts or all of the internet options screen, registry editor etc) Changing to reset (iereset.inf) file to prevent user being able to reset web settings within the internet explorer options screen.
  3. Automatically add sites to your trusted zone Hijack of URL prefixes, therefore if you enter a site in your browser without a prefix (ie google.com), internet explorer automatically appends http:// to the address.
  4. Altering your winsock list of providers used to resolve domain names.
  5. Adding a proxy server so all your traffic could be intercepted.

Rootkit
A rootkit is a set of tools used by an intruder after cracking a computer system. These tools can help the attacker maintain his or her access to the system and use it for malicious purposes. An attacker enters the victims computer through a security loop hole, like a weak password or a missing patch and then installs his favorite collection of tools which will provide him backdoor(s) to remotely access the cracked system and also mask the fact that the system is compromised.

Web bug
Web bug or Web beacons Also called a Web bug or a pixel tag or a clear GIF. Used in combination with cookies, a Web beacon is an often-transparent graphic image, usually no larger than 1 pixel x 1 pixel, that is placed on a Web site or in an e-mail that is used to monitor the behavior of the user visiting the Web site or sending the e-mail. When the HTML code for the Web beacon points to a site to retrieve the image, at the same time it can pass along information such as the IP address of the computer that retrieved the image, the time the Web beacon was viewed and for how long, the type of browser that retrieved the image and previously set cookie values. Web beacons are typically used by a third-party to monitor the activity of a site. A Web beacon can be detected by viewing the source code of a Web page and looking for any IMG tags that load from a different server than the rest of the site. Turning off the browser's cookies will prevent Web beacons from tracking the user's activity. The Web beacon will still account for an anonymous visit, but the user's unique information will not be recorded. http://www.webopedia.com/TERM/W/Web_beacon.html

Read More...

Saturday, June 21, 2008

Intel® Centrino® with vPro™ Technology

Maximize productivity with security on the chip for business PCs with Intel® Centrino® with vPro™ Technology

Remote manageability providing IT with remote PC monitoring and the ability to diagnose and repair the PC even when the OS is off or unresponsive.
Industry-standard management support for protocols such as WS-MAN and DASH² that are more capable and secure than ASF and enables secure communication between the console and the PC.
Broad industry support from leading manageability and security independent software vendors (ISVs) like Symantec, LANDesk, HP, Microsoft, and Cisco that take advantage of the Intel Centrino with vPro technology features.
Breakthrough battery life enabled by next-generation hafnium-infused 45nm Intel® Core™ microarchitecture
2x greater wireless range and up to 5x faster wireless with the optional integrated 802.11n wireless technology

Read More...

Intel® Centrino® Processor Technology

Discover the ultimate multimedia and gaming notebook with Intel® Centrino® Processor Technology

With new hafnium-based circuitry and up to 6MB L2 cache, you can multitask compute-intensive applications up to 2x as fast, while the new Intel® HD Boost gives you up to 50 percent more speed for hi-def multimedia applications.¹ Plus, you'll enjoy a 3x performance improvement for a super-enhanced hi-def video experience and smoother playback with VC-1 hardware acceleration and optional Intel® Graphics Technology.

With mobile-optimized 800 MHz Front Side Bus (FSB) providing increased bandwidth and up to 20 percent faster data transfer rates, you'll have the performance you need for everything from high-end gaming to hi-def multimedia applications and everything in between.

Intel® Intelligent Power Capability gives you breakthrough enabled battery life so you can stay unplugged longer. The low-leakage, hafnium-based 45nm processor delivers unrivaled energy efficiency while Deep Power Down Technology lets you save power by using it only when you need it. No matter where you're at, you'll have the battery power you need to enjoy DVDs, hours of music, the coolest games, and much more. Plus, with built-in wireless connectivity, you can connect to public Wi-Fi networks around the globe, no wires attached.

With new 3D graphics features like Vertex Shader Model 3.0* and Hardware Transform and Lightening*, and the performance-packed next-gen Intel® dual-core technology, you'll experience hi-def multimedia like you're in it.

Read More...

Intel Core 2 processor with vPro technology

Get the best desktop for business
Remote manageability providing IT with remote PC monitoring and the ability to diagnose and repair the PC even when the OS is off or unresponsive plus convenient remote configuration for over-the-wire set-up. Broad industry support from leading manageability and security independent software vendors (ISVs) like Symantec, LANDesk, HP, Microsoft, and Cisco that take advantage of the Intel Core 2 processor with vPro technology features.


Industry-standard management support for protocols such as WS-MAN and DASH± that are more capable and secure than ASF and enables secure communication between the console and the PC.

Reduce power bills enabled by next-generation hafnium-infused 45nm Intel® Core™ microarchitecture offering reduced electrical current leakage and increased performance while the new efficient design helps PCs meet ENERGY STAR* requirements.

Get breakthrough performance with full 64-bit Windows Vista* and Windows Aero* graphics support without the expense of an external graphics card enabled by powerful Intel® Graphics and full support for next-generation multi-threaded software.

Read More...

Microsoft System Center part-1

Monitoring and managing IT services consumes a large proportion of most corporate IT departments' resources, and in the last few years this workload has been increased by the need to comply with new regulatory requirements. As a result, many organizations have few resources left over to devote to the introduction of new, business-enhancing technologies and services.
Microsoft’s System Center, a family of IT management applications, was designed to address this problem by providing a way to capture and aggregate knowledge about business applications and the IT infrastructure to more effectively manage and control the entire corporate IT environment.

Much of the knowledge and best practices for managing Windows systems and applications built in to System Center comes directly from the Microsoft developers responsible for writing the code for these applications and servers. As a result, organizations that implement System Center have the opportunity to optimize the way they manage their existing IT systems, carry out complex tasks extremely efficiently, and introduce new services according to established best practices.

Operations Manager 2007
Operations Manager 2007 is one of the key members of the System Center family. It offers a practical way to monitor hundreds or thousands of servers, end-user machines and applications, equipping IT staff with a comprehensive, real-time view of the health of the organisation’s IT systems and providing alerts whenever problems occur or intervention is necessary.
Configuration Manager 2007
Another key component of the System Center Family is Configuration Manager 2007 – an upgraded version of the product formerly known as System Management Server. Configuration Manager has been designed to enable secure and scalable deployment of operating systems and applications and detailed configuration management, and to provide comprehensive asset management of servers, desktops, and mobile devices.
Essentials
Essentials brings the breadth of knowledge of the System Center family to medium-sized organizations in a simple, unified solution. It has been designed for organizations with up to 500 PCs and limited in-house IT staff – typically a single person in charge of all IT responsibilities. Essentials is easy to install, and once running it simplifies and carries out specific tasks that medium-sized businesses frequently need to perform—including software distribution, operating system and application updating, and group policy configuration.
Virtual Machine Manager
Virtual Machine Manager, an application that enables centralized management of virtual machine infrastructure and rapid provisioning of new virtual machines by system administrators and qualified end users, making it easy to increase physical server utilization and provide safe application test environments using virtual Windows servers and desktops.

The ability to create and manage virtual machines and move them to appropriate servers efficiently is becoming increasingly important as the benefits of virtual machine technology for cost reduction become more widely understood. Recognizing this, the entire System Center product range can be used to manage both physical and virtual servers, and the same tools – such as Configuration Manager or Operations Manager – work equally well in physical or virtual environments.

Read More...

Web Browser War

The current state of play is that Internet Explorer dominates the Web, commanding some 74 per cent. Following at a distant second is Firefox, with some 18 per cent market share. Safari holds some 6 per cent (hardly snapping at Firefox’s heels, despite Apple’s posturing), while Opera trails far behind with a 0.7 per cent market share.

Now Microsoft has dominated the browser market share for too many years, and the negative effects of this are obvious. Internet Explorer 7 is one of the worst browsers currently available.
Testings show that Firefox 3.0 is the fastest browser currently available. SunSpider JavaScript benchmark tests shows that Firefox 3.0 processes JavaScript ten times faster than Internet Explorer 7, while Opera offers the best CSS standards compliance (scoring 83 out of 100 in the ACID 3 test – a test in which Safari 3.1 scores 75, and Firefox 3.0 scores 71)

Read More...

Features of Windows Server 2008

Enhanced Security Features of Windows Server 2008As Microsoft says that Windows Server 2008 is the “most secure” server OS they have every created, I want to take a minute to touch on the security features of Server 2008. Here is my list:


Active Directory Federation Service – allows administrators to easily set up trust relationships with federation partners.
Read-Only Domain Controllers - these domain controllers will be used in environments where you need a domain controller but you cannot guarantee the physical security of the server.
Server Core Installation - a new type of install of Windows Server 2008 that will allow you to only install the typical Windows network infrastructure services – DHCP, DNS, file sharing, and domain controller functions. What is a big change for most admins is that if you choose to use the “server core” installation, there will be no local GUI interface to the OS.
Password and account lockout policy improvements – offers the ability to have multiple password and account policies in a single domain.
Windows BitLocker Drive Encryption - allows you to encrypt all of the hard drives on a server. This will prevent the data from being viewed if a hard drive or the server is stolen.
The New & Improved Server 2008 Web Server - IIS 7.0
We have to keep in mind that there are so many other applications included in the Windows Server 2008 OS. One of those is Internet Information Server. With Windows Server 2008, IIS has been upgraded to version 7.0. With this upgrade, IIS 7.0 is easier to manage due to its improved interface. The interface offers the ability to perform common tasks faster, security enhancements, web server health information, delegation of administration, and more.
Speed Client Operating System Deployment with WDS
Windows Deployment Service (WDS) is a new Server 2008 feature that allows you to deploy Windows client machines over the network. The new WDS is faster because it uses TFTP. WDS offers client installs performed with either ScheduleCast or AutoCast.
ScheduleCast is a scheduled deployment whereas AutoCast is an “always available” deployment using Multicast. Because AutoCast uses Multicast, you can save on bandwidth by all clients sharing the same streaming data over the network.
Secure your network from unsafe PC clients with Network Access Protection
Microsoft’s Network Access Protection (NAP) is a new policy that can be put into place, requiring clients to meet certain requirements before they can connect to a Windows 2008 server.
If they do not meet the requirements that are set, the client can be quarantined or can be denied access. Even better, if the computer does not meet the requirements, the Windows 2008 Server can deploy the necessary updates that are needed.
By using NAP, you can secure not only local PCs but also home computers or roaming computers that attempt to connect to your network from your LAN or via the Internet with a VPN

Windows Terminal Services Improvements
Windows Terminal Services has been greatly improved in Windows Server 2008. Here are some of the new key features:
RemoteApp - similar to published applications in Citrix, RemoteApp will allow you to share an application with a workstation instead of the entire Windows desktop. It is supposed to have seamless integration with the client PCs so that clients will just see an icon in their start menu or desktop and click on it to run the application.
Terminal Services Gateway - allows remote users who are working away from the office to connect to terminal services. This will help remove the need for remote VPN access for some users.
Terminal Services Web Access – offers the ability for remote users to connect to terminal services with just a web browser. By using this, remote PCs attempting to connect to terminal services do not need to have the remote desktop client or VPN.

One Stop Server Management with Server Manager
Windows Server 2008 Server Manager is a new console that will put all the snap-ins you need to manage your server in a single place, making it easier and faster to for administrators to manage Windows 2008 Servers.

New Windows Server Virtualization Features
Windows Server Virtualization is a new feature that allows you to virtualize any operating system onto one server. This feature will also allow you consolidate many servers into one server. This will allow you to easily create test and development environments without having to use too many resources.
With this feature, Microsoft is hoping to take away a great deal of the virtualization marketplace from VMware. While Microsoft certainly lags far behind VMware in the maturing of their virtualization offerings, by Microsoft offering virtualization already built into the Windows OS, they are going a long way to getting their version of virtualization in the hands of the end user.
As we are just now getting a look at Microsoft’s version of Hypervisor virtualization in the recently released Windows Server 2008 RC0, it is too soon to say how good of a virtualization feature set Microsoft will offer. I encourage you to take a look at it for yourself.

Read More...

What's New in Windows 2008

Windows Server 2008 delivers valuable new functionality and powerful improvements to the core Windows Server operating system to help organizations of all sizes increase control, availability, and flexibility for their changing business needs. New Web tools, virtualization technologies, security enhancements, and management utilities help save time, reduce costs, and provide a solid foundation for your information technology (IT) infrastructure.
Solid Foundation
Virtualization
Web
Security

Read More...