Thursday, September 30, 2010

Indian call centers are cheating us,uk,australian users by scam software

Well being a technical person means you get to see so many different sides of people,but recently what I have seen entirely blew my mind and I am feeling seriously ashamed of myself.

I have joined this new small call center as a technical person,the process going on there is basically randomly calling us.uk and australian people and tell them that we like to perform a free scan using a software for free and naturally most of the time the customers  agree and let the control of their computers to us,the technical people and we start our magic.That would be kind of unprofessional for me to tell you but you know what, I am going to,we use a software that is scam and shows the users there are 32390(approx) errors and infections etc etc are on their computers and certainly the users got afraid and then the agents ask them to buy our original software solutions and then they are asked to fill up a form and get a subscription from our call center for 1 year(costs $149),2 year(I forgot the actual but it was around $250) and for 3 years($349).The trusting users blindly buys  most of the times without even knowing when they are filling the subscriptions forms and putting their highly important information like the credit card number or visa card number when we are all seeing their each step,now I am not saying we are using this number to use it illegally but if someone wants to it will be just a piece of cake for him or her.As we promise to service their computers then what we basically do is use some free but effective softwares like malwarebytes or ccleaner or something like that which the users can download from internet without spending nothing.

I have spent 3 fu***** day in this call center and finally just had it although the job was really easy for me,so am I being a fruitcake here cause so many people are doing it and earning a handsome income.Just thought of a  particular incident one morning an agent came to us and told us a customer who bought a subscription from us and after we have performed service(huh who am I kidding) some company has scanned his computer with their software find the exact number of errors that we found earlier,huh that’s a funny one.

For me it was enough when I had to talk to one of the australian customer,he seemed just too polite and I was furious on myself for lying to him after he paid the money.So bottom line for me I have to find a decent job again oh and for the us uk and australian people do not do not do not believe any person who want to take control of your computer remotely.


Spread this message among the us,uk and australian people as much as you can to save some of our reputation(I don’t know if we have any).

Is Mr Obama listening?

Sourav Bhattacharya

Friday, September 24, 2010

BlixOS: A Platform Independent Operating System created by Indian child prodigies

Suyash Srijan is a Class IX student at the Khaitan Public School in Noida. At the tender age of 14, he, along with his friend Kshitij Kumar, has created an operating system that's turning heads the world over. What makes this operating system stand out is that it is hardware-independent and is capable of booting within 12 seconds. Additionally, it runs Windows-based programs with 90 percent compatibility.

There’s little doubt that the finest feature of the operating system, called BlixOS, is its hardware independence. This makes it capable of offering the same performance on every computer. “It will offer the same performance on every computer, irrespective of the hardware. It uses up very less main memory (100-120 MB) and occupies little space on your hard drive (600-640 MB).”



Suyash understands that the operating system’s speed is a general concern for most users. He says, “The performance of BlixOS is shocking. Copying a 1 GB file from one drive to another takes 40 seconds even if it is to be done using not-so-capable hard drives. BlixOS runs inside its own Virtual Machine so there’s no need to restart your system to run it. Not every computer has the perfect configuration and some people are still use Pentium 4 machines. Windows XP, Vista and 7 often have problems working on systems that cannot match the minimum requirements. However, with BlixOS, you can experience the performance you've dreamed of. BlixOS is divided in to 3 versions - Home, Professional and Ultimate. BlixOS Home is an operating environment, not an OS.”

When you develop something as brilliant as a platform-independent operating system, the most important thing is to market it well. Suyash and his friend have started their very own company. He says, “We have started our own company – Blix Corporation, and taken a license. Since its launch, I’ve received requests from numerous people, even my school friends, who want to join Blix and help us.”

Suyash and his friends have successfully set up their very own company (Blix Corporation) and have their website and Facebook page up and running, via which they interact with those who are interested in the operating system as well as those who would like to help them in future endeavors.



About Blixos Desktop and Professional
BlixOS Professional is a second-edition version of BlixOS, which is built on top of a modified LYNHOST kernel. The kernel has been named ‘Hybird’ due to its fast processing speed. BlixOS provides an intuitive user-interface, which is very easy to understand and use.

What's New With The Blixos Desktop?
New features on the BlixOS desktop make it easier to organize and manage multiple windows. You can switch easily between open windows so that you can focus on important programs and files. Other new features help you add a personal touch to your
desktop.

Gadgets
The operating system allows you to display gadgets on your desktop and use the ‘peek’ features to temporarily view your desktop gadgets without minimizing or closing the windows you’re working on.




Desktop background
Your desktop background doesn't have to be a single image anymore. With BlixOS, you can display a slide show of pictures instead. You can create your own slide show from your personal collection of pictures.

Thumbnail preview
Upon opening multiple windows on the desktop, you may find it challenging to view separate windows and switch between them. You can use the ‘peek’ feature to take a quick look at other open windows without clicking away from the window you are currently working on. Peek makes it easy for you to preview the contents of open windows and switch to the one you want. When you point to a taskbar button, you'll see a thumbnail-sized preview of the window, whether the content of the window is a document, a photo, or even a running video.

The Ultimate Site for Linux Enthusiast

DistroWatch is a website which provides news, popularity rankings, and other general information about various Linux distributions as well as other free software/open-source operating systems such as OpenSolaris and BSD.

http://distrowatch.com/

Some Serial Interface knowledge

2 routers can be connected using serial interfaces.

After set them up to see the encapsulations 

Type

sh interfaces serial 1/0

You will probably see HDLC(Layer 2 protocol runs in place of ethernet,stands for high level data link control,it’s very simple to use,plug the cable in and routers serially connected will run HDLC,no configuration necessary).

To change it to ppp(point to point protocol)

From global config mode

Type

int serial 1/0
encapsulation ppp
exit

you have to do it both routers to up the connection

In a serial connection one side acts as a DCE another side as the DTE

To see it in a router

From global config mode

Type

sh controllers serial 1/0

In DCE side you will see the clockrate applied.

To set the clock rate manually

From global config mode

int serial 1/0
clock rate 64000
exit

 Courtesy to Cisco Guru Jeremy Cioara

Sunday, September 19, 2010

Configuring Nat Overloading

From global config mode

Type

access-list 1 remark sourav_acl category=2(creating the name of the access list)

access list 1 permit 192.168.0.0 0.0.0.255(permit the 192.168.0.0 network with wildcard mask)

access list 1 permit 192.168.1.0 0.0.0.255(permit the 192.168.1.0 network with wildcard mask)

access list 1 permit 192.168.2.0 0.0.0.255(permit the 192.168.2.0 network with wildcard mask)

exit

int vlan 1

ip nat inside(setting vlan 1 interface as the inside of nat)

exit

int fa 0/0

ip nat outside(setting int fa 0/0 interface as the outside of nat)

exit

ip nat inside source list 1 int fa 0/0 overload (to ip nat using the source list 1 as the inside and int fa 0/0 as the outside with overload so that multiple ip can access the intrernet using the 1 global ip,without overload only one ip will be able to access the internet)

Now from exec mode

Type

sh ip nat translations(to see the inside local and inside global as well as outside local and outside global ip address with associate port number)


Courtesy to Cisco Guru Jeremy Cioara

Saturday, September 18, 2010

GNS 3,the ultimate weapon to learn Cisco(I can't believe it's free)

GNS3 is a graphical network simulator that allows simulation of complex networks.

To allow complete simulations, GNS3 is strongly linked with :

    * Dynamips, the core program that allows Cisco IOS emulation.
    * Dynagen, a text-based front-end for Dynamips.
    * Qemu, a generic and open source machine emulator and virtualizer.

GNS3 is an excellent complementary tool to real labs for network engineers, administrators and people wanting to pass certifications such as CCNA, CCNP, CCIP, CCIE, JNCIA, JNCIS, JNCIE.

It can also be used to experiment features of Cisco IOS, Juniper JunOS or to check configurations that need to be deployed later on real routers.

This project is an open source, free program that may be used on multiple operating systems, including Windows, Linux, and MacOS X.
Features overview

    * Design of high quality and complex network topologies.
    * Emulation of many Cisco IOS router platforms, IPS, PIX and ASA firewalls, JunOS.
    * Simulation of simple Ethernet, ATM and Frame Relay switches.
    * Connection of the simulated network to the real world!
    * Packet capture using Wireshark.

Important notice: users have to provide their own IOS/IPS/PIX/ASA/JunOS to use with GNS3.


Basic Rip Version 2 Configuration


Suppose a router is directly connected to networks 192.168.1.0 and 192.168.2.0.

To configure Rip on this router

From Global Config Mode

Type

router rip 

version 2

network 192.168.1.0

network 192.168.2.0

no auto-summary(this is to tell the router to publish the network not with say class c default subnet mask,rather the subnet mask specified by the administrator)

exit

Then from privileged mode

sh ip route(if any other routers are configured rip and send different network info we will see it here)

The result structure of sh ip route will be (if updates came from another rip configured router)

The administrative distance of RIP is 120(administrative distance is the reliability of a protocol and in case of a better protocol  it will be less for example for OSPF it will be 110 and for static routing it will be 1) and it will be specied as 120/x where x is the hop count

from exec mode 

type 

sh ip protocols

To see what protocols are running(in here it will be Rip)

To see the Rip updates in real time

debug ip rip

To disable debugging 

type 

no debug ip rip

or 

u all

Courtesy to Jeremy Cioara



Difference between RIP Version 1 and Rip Version 2

Rip V1:

1.Does not support VLSM so subnetting modification can not be done.

2.No authentication.

3.Uses broadcast and thus creates too much traffic.

Rip V2

1.Support VlSM .

2.Suports authentication.

3.Uses Multicast and reduce the traffic as well as network congestion.

By default RIP send broadcast every 30 seconds


Courtesy to Jeremy Cioara

Different Class of Routing Protocols


Distance Vector

1.Easy to configure.

2.Not many features.

3.RIP,IGRP.


Link State

1.Difficult to configure.

2.Many Features.

3.OSPF,IS-IS.

Hybrid

1.Have the best qualities of Distance vector and Link state.

2.Proprietary.

3.EIGRP. 

courtesy to Jeremy Cioara


Search a string in Cisco IOS

Suppose you have enabled static routing in your router.Now you have to disable it.So you have to find basically every ip route statement and manually put a no before it.That can be a long task.

Cisco Trainer Jeremy Cioara showed a fantastic technique to find every line in sh run output where ip route is present.

sh run | include ip route(that’s the string)

so now you get all the ip route statement and in teraterm you just select the text and right click the text will be pasted.

So conclusion

Long live Cisco guru Jeremy Cioara.

Friday, September 17, 2010

Bharat Operating System Solutions (BOSS)

Bharat Operating System Solutions (BOSS) is a Linux distribution developed by NRCFOSS (National Resource Centre for Free/Open Source Software). This software is also known by the acronym BOSS GNU/Linux or simply BOSS Linux. The latest version of this operating sysem, BOSS GNU/Linux Version 3.0, was released in September 2008.  

This software package has been described as India's own PC operating system and as the most meaningful product to come out of the Indian software industry.
The software has also been endorsed by the Government of India for adoption and implementation in a national scale.

BOSS GNU/Linux is a "LSB certified" Linux distribution: The software has been certified by the Linux Foundation for compliance with the Linux Standard Base standard. 

BOSS GNU/Linux is derived from Debian. Debian uses the Linux kernel (the core of an operating system), but most of the basic operating system tools in Debian come from the GNU Project; hence the appendages GNU/Linux to Debian and BOSS. Debian GNU/Linux provides more than a pure operating system: it comes with over 18733 packages. BOSS GNU/Linux includes nearly all of these packages. 

The product is a free software in the sense in which the term is used by the Free Software Foundation, and it is distributed under the GNU General Public License.
The latest desktop version of BOSS GNU/Linux is fully localised to eighteen Indian languages.

BOSS GNU/Linux Version 3.0 is coupled with GNOME and KDE Desktop Environment with wide Indian language support & packages, relevant for use in the Government domain. Currently BOSS GNU/Linux Desktop is available in almost all the Indian Languages such as Assamese, Bengali, Gujarati, Hindi, Kannada, Malayalam, Marathi, Oriya, Punjabi, Sanskrit, Tamil, Telugu, Bodo, Urdu, Kashmiri, Maithili, Konkani, Manipuri which will enable the mainly non-English literate users in the country to be exposed to ICT and to use the computer more effectively.


Thursday, September 16, 2010

Nora-Jane Noone,The New Definition of Hotness

11044 nj1  images

imfvages nora-jane-noone-10th-annual-premiere-women-in-hollywood-luncheon-arrivals-0oUgE0 MV5BMTY4OTI4MzYyMV5BMl5BanBnXkFtZTYwMDAzMTYz._V1.h_SX400_SY273_ magdalenesisters3 Nora-Jane_Noone

Setting the Cisco Router to be a DHCP Server

From global config mode

Type

ip dhcp pool ip_pool(creating the dhcp pool with the name ip pool)
network 10.10.0.1 255.255.255.0(network for the dhcp pool)
domain-name sourav.local(you should set your dhcp client’s primary dns suffix as sourav.local)
dns-server 4.2.2.2
default-router 10.10.0.1(the dhcp router’s interface ip where all the clients are connected)
import all(this will import those informations into dhcp client by dora process)
lease 3(3 day lease)
exit
ip dhcp excluded-address 10.10.0.1 10.10.0.20(to exclude ips from being leased)
ip dhcp excluded-address 10.10.0.50 10.10.0.254
exit

Now at the client pc simple release renew should gt the ip from dhcp router

To see the ip addresses leased and the mac addresses associated with it

From dhcp server type

sh ip dhcp binding


The Blair Witch Project(1999)




IMDB Rating 6.2/10

In October of 1994 three student filmmakers disappeared in the woods near Burkittsville, Maryland, while shooting a documentary...A year later their footage was found.

Lake Mungo(2008)


Lake  Mungo(2008)

IMDB Rating 6.1/10


"If you've never seen a ghost... Look closer."

Tuesday, September 14, 2010

Jeremy Cioara,the greatest Cisco trainer in the world

cioara_jeremy_c

CERTIFICATIONS Cisco CCNA, CCDA, CCNA Security, CCNA Voice, CCNP, CCSP, CCVP, CCDP and CCIE R&S. Microsoft MCP, MCSE, CNA, CNE. CompTIA A+, N+, INet+

AREAS OF EXPERTISE Includes a strong background in nearly every aspect of Cisco (and Microsoft) network administration and development

CBT NUGGETS TRAINER SINCE 10/03


"I’ve always believed that training is only effective if it inspires people to go beyond what is being taught. Therefore, I think education should be information explained in such a way that it leads to inspiration to push further."

Jeremy Cioara has been involved in training and consulting for over 12 years, covering technology in Novell, Microsoft, and Cisco arenas. In addition, he holds the premier certifications in each of the related technical fields: CNE, MCSE, and CCIE.

Jeremy is the author or technical editor of many IT books including CCNA Voice Official Certification Guide, Cisco IP Telephony (CIPT), CCNA Exam Prep, and CCNA Practice Questions.

He is a featured annual speaker at the Cisco Live (aka Cisco Networkers) conference and maintains a casual blog at www.ciskoblog.com.

Jeremy currently maintains two IT-related organizations, continues to author technical books, and educate individuals in both the classroom and online arenas. He does all this while spending most his time with a growing family and active church life. (We’ve calculated that Jeremy must sleep an average of 30 minutes nightly.)

Internet Explorer is still the worst browser ever

Not much to say,here is a complain from an angry user whom we can relate to very much by the way

“I HATE 8!   The stupid screen freezes all the time or won't even come up then I have to close it and reopen it....then that stupid box comes up wanting to know if I want to restart the previous session or go to the home page.  IE 7 is so much better than 8.  I wish I had never installed the CRAP on my computers.  It's especially bad on our laptop.  AHHHHH!   Can't you do something about this? “

Monday, September 13, 2010

Megan Fox,is she from another planet ?

megan_fox_wallpaper_hot meganfox

61512_f520 images megan-fox-hot- megan-fox-hot megan_fox_hot_photos-1253560742  megan-fox.282 megan-fox megan_fox_maxim_10-08

Kim Clijsters,The sweetest hottie ever appeared on tennis

8283897clijsters clisterslatest Kim Clijsters Open Champion Kim Clijsters Z0BN-M6dTI7l 685c44963f139f72fbf456eb36515a8e-getty-95916508md107_u_s_open_day_  kim_clijsters 014 7904429clijsters 8599149clijsters  kim_cdlijsters article-0-0B081101000005DC-881_468x310  kim_clijsters_citizen_watch_0310 2087562320-defending-us-open-champion-kim-clijsters-of-belgium-participates-inarticle-1228679-06E2B8AA000005DC-824_468x445 6a00d83423e30253ef012875cffc2c970c-400wi

Installing Exchange Server 2003 step by step

Here I have created a distributed environment,one 2003 server acting as a dns server named dns and one 2003 server acting as a dc named dc and in one separate 2003 server I have installed exchange server 2003 and recorded it step by step.

Installing EXE Softwares in Ubuntu 10.04(am I dreaming or what !)

It is possible to install any exe application(not everything)

Using wine

To install wine


system-administration-synaptic package manager-search for wine-mark for installation

After installation

Copy the exe file to ubuntu and right click and open with wine loader

After installation just click the exe


For Example

To install utorrent


 Go to System -> Administration -> Synaptic Package Manager...


 Search for wine...


 Click on the little box in front of the wine entry and select the "Mark for Installation" option..


 Click the "Mark" button when asked to install the required dependencies...


 Click the "Apply" button... and again to confirm the installation...


 Wait for the packages to be downloaded...


 ...and installed...


 When the installation is complete, close Synaptic and proceed to the next step!

Step 2 - Download and Execute uTorrent

Download uTorrent's installer from here and put the file in your home folder.

Create a desktop shortcut for the uTorrent application.

Right click on your desktop and select "Create Launcher..."...

Installing Some Basic Softwares in Ubuntu 10.04

To install flash

sudo apt-get install flashplugin-nonfree

To install java

sudo apt-get install sun-java6-fonts sun-java6-jre sun-java6-plugin

To install a deb package

sudo dpkg -i packagename.deb


To see the installed packages

dpkg -l

To remove a deb package


sudo dpkg -r package-name

To search for a package


apt-cache search package name


To remove broken packages

sudo apt-get install -f

UnHackMe,The Security Tool for Advanced Users

UnHackMe allows you to detect and remove a new generation of Trojan programs - invisible Trojans. UnHackMe is a very useful security utility for your operating system.
They are called "rootkit" A rootkit is a collection of programs that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.
The intruder installs a rootkit on a computer using a user action or by exploiting a known vulnerability or cracking a password. The rootkit installs a backdoor giving the hacker a full control of the computer. 
 
It hides their files, registry keys, and process names, and network connections from your eyes.
Your antivirus could not detect such programs because they use compression and encryption of its files.
The sample software is Hacker Defender rootkit. You need use UnHackMe to detect and remove Hacker Defender or its clone.
 

Kaspersky Virus Removal Tool,The Ultimate free weapon for offline scanning

Kaspersky Virus Removal Tool 2010 is a utility designed to remove all types of threats from computers. Kaspersky Virus Removal Tool 2010 uses the effective detection algorithms realized in Kaspersky Anti-Virus and AVZ. 
 
Kaspersky Virus Removal Tool 2010 does not provide resident protection for your computer. After disinfecting a computer, you are supposed to remove the tool and install a full version of antivirus software. 
 
Advantages:
    * Simplified interface.
    * Can be installed to an infected computer (Safe Mode supported).
    * Composite scan and disinfection system: signature detection and heuristic analyzer.
    * Gathering system information and interactive creation of scripts for disinfection.
General functions:
    * Automatic and manual removal of virus, Trojans and worms.
    * Automatic and manual removal of Spyware and Adware modules.
    * Automatic and manual removal of all types of rootkits.
Kaspersky Virus Removal Tool 2010 is Freeware.
 

Malwarebytes Anti-Malware,The Ultimate weapon to fight Malware

Malwarebytes Anti-Malware is a surprisingly effective freeware antimalware tool. It's a relatively speedy malware remover, with the quick scan taking about 8 minutes even with other high-resource programs running. The heuristics engine proved on multiple computers during empirical testing that it was capable of determining the difference between false positives and dangerous apps. 
 
The app has some nice features rolled in, too. It supports multiple drive scanning including networked drives, context menu options including a scan-on-demand for individual files, and the FileAssassin option under the More Tools section for removing locked files. The interface is simple, but pleasant-looking and well-organized. Tabs live just below the oversized logo, with few options per tab to keep down the clutter. The installation process was fast enough, but interestingly offered up the well-kept changelog and an instant definition file update. 
 
Do note that the real-time protection is restricted to the paid version, as is the scheduler for updates and scans. Overall, though, Malwarebytes Anti-Malware is a responsive malware remover that does what it should with a minimum of fuss.
 

EPIC Browser – First Indian Web Browser

EPIC browser  is  Mozilla powered web browser for Indians. The browser support most of the Indian languages, also it decorated with many Indian themes.  The other advantage is EPIC browser have many application integrations like video, facebook, twitter etc … And Epic is the world’s only Antivirus browser, you can also see a file browser inside the web browser.  Built in Antivirus Scan downloads automatically. Scan your system manually. Epic Kills any viruses it finds.

Difference from other Browsers
    •    The makers claimed that it is the world’s only antivirus browser.
    •    Browser has an inbuilt addon to detect websites that are dangerous.
    •    It is the first ever web browser from India.
    •    Anti-phishing protection – a big bold domain name on the address bar.
    •    You can type in 12 different Indian languages including Hindi, Gujarati, Marathi, Kannada, Telugu, Bengali, Tamil, Malayalam, Urdu and Punjabi.
    •    In the browser’s sidebar you can edit text, read news, view videos and pictures.
    •    Having faster browsing and faster downloads.

Saturday, September 11, 2010

Troubleshooting and Optimizing Switches


By Default every port on Cisco switch is set to auto

In case of a conflict such as one side is full duplex and one side is half duplex collision can occur and network will slow down or may not work

In that case entering the interface duplex and speed should be set manually

For example

int fa 0/0
ip address 192.168.0.1 255.255.255.0
duplex auto
or

duplex half
 
or

duplex full

Then Type

speed 10

or

speed 100

or
  
speed auto

To stop being interrupted by constant messages the command logging synchronous

For example

line console 0
logging synchronous

or

line vty 0 4
logging synchronous

To stop getting logout from console or virtual teletype(vty) session

Type

exec-timeout 180 0(180 minutes and 0 seconds)

or

If you never want to get logged out

type

no exec-timeout

To stop name to ip translation(this can be really annoying)

From global config mode

Type

no ip domain-lookup

To create a short cut for a very useful command by creating alias

For example to create a shortcut of the command sh ip int brief

Type from global config mode

alias exec s sh ip int brief

Then type

do s

This will perform sh ip int brief command

Concept of STP(spanning tree protocol)

If two cisco devices connected in multiple connections the broadcast storm creates a loop and seriously damage the network operation but redundant connections are sometimes really needed

Spanning tree protocols are basically blocks the redundant link from broadcast storm and constantly watches the active link,whenever the active link dies it lets the broadcast storm flow through the redundant link maintaining the connectivity

To get detailed information about an interface

Type

sh interfaces fa 0/1

To see the interfaces descriptively

Type

sh interfaces description