Thursday, June 26, 2008

Vodafone India Pre-Registering Customers for iPhone 3G

Vodafone India has started pre-registering customers for the iPhone 3G from Apple, promising that the device will be available soon, but the company will as yet not disclose when the device will be offered to customers.

The Indian government has as yet to issue final guidelines on the auction of 3G (third generation telephony) spectrum and licenses in India. One of the issues holding up a final decision is whether foreign companies can bid for the license.

Vodafone is however already an operator in India following its acquisition of a majority stake in mobile services company Hutchison Essar, renamed as Vodafone Essar. Vodafone announced earlier this year that the iPhone 3G will be available in India during the year.

In an advertisement on Wednesday in The Times of India and on its Web site, the company is offering to pre-register customers for the iPhone 3G. The company however cautions that the device offered by Vodafone is currently compatible only with 2G networks, and some of its features may not work in India.

A Vodafone India spokesman declined to comment further on the company's offering.

Bharti Airtel, another large Indian operator, has also said it will launch the iPhone 3G in India later this year. The company has not specified the date for the availability of the phone to its customers. Vodafone's offer to pre-register customers reflects significant market interest in the Apple iPhone, and may be an attempt to get a marketing edge over Bharti Airtel.

Monday, June 16, 2008

How to make Vista's User Account Control less annoying?

Windows Vista's UAC (User Account Control) feature is, for most of us, a constant annoyance, A little work on it can make a good going. Turning it off entirely can leave the system vulnerable to online threats. Fortunately, we can do a bit of fine-tuning via the Group Policy Object Editor (GPOE) to disable the most irritating parts of this feature without ditching it altogether.


Run >> gpedit.msc

UAC Prompt

Find at the left pane: Local Computer Policy\Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options

Click Security Options and opt at right for User Account Control options

To retain the benefits of UAC, leave it turned on but set it to stop prompting you. Double-click User Account Control : Behavior of the elevation prompt for administrators in Admin Approval Mode.

Choose Elevate without prompting, click OK ignoring a pop-up which complains that UAC is not on.

UAC prompt can also be suppressed entirely however it's not as safe as the default settings, I guess.

Windows Vista Home Premium does not have the GPOE (Group Policy Object Editor). Here's an alternative:


Run >> regedit

Find and go to: HKEY_LOCAL_MACHINE_SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System

At the right pane, edit ConsentPromptBehaviorAdmin changing the value to 0.

The effect to the changes/editor is immediate.

Important: Please, be cautious while working with the Windows Registry, a back up is always intended. Visit more hacks on registry editing on previous geeklog posts here.

Sunday, June 15, 2008

Creating Hibernate Button for your system

It's very simple to create an icon which resides in your desktop of the long striven Windows XP.

Just right click on your desktop, to create a new shortcut having the path/location as below

%windir%\system32\rundll32.exe PowrProf.dll, SetSuspendState

Choose an icon you desire, and here you go. Remember to select Enable Hibernate Support from Power Options in the Control Panel.

Saturday, June 14, 2008

Advanced Google: Search Faster, Find More

Whatever you're looking for, just type the appropriate words into your browser's search field, or into the Google search field, and press <Enter>. In most cases, the information you're looking for will appear somewhere in the first page of results. But this won't always happen.

If your search targets a specific aspect of a common topic—say, contemporary analyses of Albert Einstein's Special Theory of Relativity—then finding it in the results can be a needle-in-the-haystack affair.

To guide Google to your search goal, you may need to use some of the service's advanced features. Once you're familiar with these great, free tools, you can access them with no extra clicks by entering Google's command-line options directly into the familiar search box. I'll show you how to speed up your basic and advanced searches, and how to generate more-accurate search results.

Narrow Your Search

Looking for pages that mention Albert Einstein? (Who isn't?) If you simply enter Albert Einstein in the search field, you'll pull up a trove of Einsteiniana, starting with photos, biographies, official archive sites, and extensive Wikipedia articles. In short, it's more than you can deal with. To narrow your search, add terms; Google accepts up to ten. Searching for 'Albert Einstein Swiss patent clerk relativity' yields lots of pages detailing how he developed his revolutionary theories while working his day job. You'll know that you have introduced too many search terms if Google either reports no matches or coughs up only pages containing useless dictionary-like lists of words. Enclosing terms in quotation marks instructs Google to match the quoted terms literally; when you enter "Albert Einstein" and "patent clerk", Google skips pages that discuss Tom Einstein and grocery clerks.

Thursday, June 12, 2008

Gmail Users Trial 13 New Features

Google is inviting Gmail users to test out 13 new features it's considering adding to the Webmail service.
 Available via the 'labs' function in Gmail's settings, the services include a quick-link tool that allows users to bookmark specific messages, the ability to assign mouse gestures to various actions, and customizable keyboard shortcuts. The most popular features will then become standard within Gmail.
 "There are some things in here we think are probably bad ideas," Gmail product manager Keith Coleman said ,specifically in regards to a snake game.
 "It's something we would never do."
 Currently only Google engineers can create code for 'lab' features. However in the future, the company hopes external developers will be able to build Gmail tools.
 "Once the code is written and mostly working, it'll get into the next product build that goes to users [through the labs feature]," explained Coleman.
 "We'd like to get to a point where more people can build on this. That would require something with a different level of interface," Coleman added.
 "We're interested in making it possible for users and us to iterate on the product faster, so it's something we're interested in."

Microfot's Last Call for Windows XP is Mid-June

 It's last call for consumers to buy PCs pre-loaded with Windows XP.

Most major PC makers and retailers will stop taking orders for consumer-oriented desktops and laptops with the older operating system by the middle of June. The simplest option for getting a new PC — heading to a big-box retailer — will yield the spottiest XP options.

You already know the context. Microsoft is phasing out Windows XP in favor of Vista, and the OEMs responsible for the vast majority of PC sales — such as Dell, Gateway, Hewlett-Packard, and Lenovo — are falling into line. Microsoft's basic policy sounds simple: "Windows XP will no longer be available for purchase from Microsoft for general retail and OEM partners as of June 30, 2008."

Consumer options ending in just days
But most OEMs aren't waiting that long to stop taking orders for XP-based PCs.

If you really want to buy a consumer system like Dell's Inspiron running XP, you need to hurry up. Dell will stop taking orders for those systems on June 18. Hewlett-Packard's cutoff date is June 10; Lenovo's is June 15. Gateway (now owned by Acer) says it will sell XP systems until the end of the month, but a call to the company's sales line found there are no longer any XP machines in stock and that none (as far as the sales rep knew) would be available.

On the retail front, consumers can buy XP systems at Best Buy until inventory is exhausted. It's not clear how long that will be, but a check of the company's Web site turned up very few models. A spokeswoman for Circuit City said her company will have some XP models available on its Web site at the end of the month, but it wasn't clear to her when the systems would go off sale.

A few loopholes you can try
Although XP-loaded consumer systems are soon to be gone, there is a basketful of loopholes that some people will be able to exploit to get XP on new systems.

Most involve the sale of "downgrade" licenses for businesses. A business is defined as anyone who buys a PC model designated as a business model by the manufacturer; thus, individuals can buy these "business" PCs.

Microsoft's "downgrade" policy is that anyone who buys Vista Ultimate or Vista Business can install XP over Vista using the Vista license. (All business PCs come with one of those two versions of Vista. Consumer PCs often come with other versions of Vista for which there is no "downgrade" option.) But you have to supply your own XP disc and call Microsoft to transfer the license.

Some PC makers are taking care of that hassle for you. They'll "downgrade" their business PCs to XP Professional, and ship you the discs to install Vista later if you choose. (Microsoft requires that they ship you those discs, as technically you bought a Vista PC, so you can "upgrade" to Vista later under the same license.) Dell, HP, and Lenovo will all offer the "downgrade" option on select business (and in Dell's case, some high-end gaming-oriented systems) at an additional cost. How long they'll make this option available is unclear, though. Dell is committing only until February 2009 to have the "downgrade" option available on its Vostro and select XPS lines of PCs, for example.

The "downgrade" option will not be available from either Best Buy or Circuit City.

Businesses that have a Vista site license can also "downgrade" their systems to XP, such as InfoWorld has previously outlined.

System builders — those who make custom PCs, such as at local computer repair shops — can sell XP until February 2009. And XP will be available on ultra-low-cost laptops and desktops until 2010.

Monday, June 09, 2008


Quick Heal Technologies launched its Guardian antivirus that is aimed at the home user segment. The antivirus protects from viruses, rootkits and spywares. Guardian AV updates itself daily, has real-time protection and auto Hijack restore features. The distribution reach is provided by eSys and NCS computech.
Guardian antivirus — a three-in-one protection for PC users at an affordable cost — was launched by Quick Heal Technologies on Tuesday. This product will cater to the ever-increasing demand of the home user segment. Guardian Antivirus has been developed with a vision to protect each and every computer in the country at the lowest price.

This product not only provides protection against viruses but also protects from rootkits and spywares," says Pradeep Dixit, Product Manger Guardian Antivirus. Guardian AV has features like detection and removal of all types of Malware, daily updates, real-time protection and auto Hijack restore. The engine employed by Guardian Antivirus is the most trusted and award winning Quick Heal engine which ensures an absolute and carefree protection. Quick Heal engine gives the Guardian AV an advantage of using user friendly yet world class product. It is protection for PC at the most affordable price for Indian common PC user.

Guardian Antivirus is available at the price of Rs. 849 ($20). The distribution reach is provided by eSys and NCS computech.
Taken from

Friday, June 06, 2008

Lock Any Folder in your PC using My Lockbox by FSPro Labs 

One of the easiest method to go thru. Folder Lockbox is a security software enabling you to password protect any folder on your computer. 

 Lock Any Folder in your PC using My Lockbox by FSPro Labs

Folder Lockbox is a very light software and extremely easy to use. The protected folder (lockbox), better to say the MUST file of the program itself, is hidden from any user and application of the machine, including Administrator and System itself. One of the most exciting feature is that it is impossible to access the lockbox not only from the local computer, but also from the net as the Folder Lockbox says.

Folder Lockbox Control Panel allows you easily change basic lockbox parameters: lockbox location, protection status, password, this is illustrated in the screenshot above. The program is effective, easy to use and best of all - it's free.

Why use Folder Lockbox?

  • Password protect almost any folder on the computer, be cautious on protecting your system files.

  • Instant protection - no file scrambling or moving to another place

  • Inaccessible even by the system administrators and remotely by the internet.

  • Can be protected in Windows safe mode

  • Extremely easy in use and absolutely Freeware

Enabling and disabling protection

When you start the computer, your lockbox folder is locked and hidden.

To unlock this folder you should either start Folder LockBox Control Panel and click Unlock button or open My Lockbox shortcut.

Please note that in both cases, Folder Lock Box prompts you to input your password. If you close Control Panel, a small Folder Lock Box icon  will appear in the system tray notifying you that Lockbox is unlocked. You can click this tray icon to run Folder Lockbox Control Panel.

To lock the folder again, either run Folder Lockbox Control Panel and click Lock button or click right mouse button on the Folder Lockbox tray icon and select Lock and Quit from the drop-down menu.

This software is freeware for any use. You may use it as long as you wish, no registration required. For details please, visit the official link at the bottom of this article.

The information on this article is based on
My Lockbox, version 1.2
Copyright (c) FSPro Labs, 2006-2007. All Rights Reserved.

For details visit

Wednesday, June 04, 2008

Tuesday, June 03, 2008

Virus.Win32.Parite.b : Remove viruses and worms with ease and passion

 Virus.Win32.Parite.b : Remove viruses and worms with ease and passionNot again badly that my system got infected by something that resides at temporary folder with name ena1.tmp having size 172KB, sometimes the name ena1.tmp got itself replaced with other name. Whatever, not lately I restored off my system and scanned using the beta version of Kaspersky Antivirus 8, and the whole lot infected virus was determined to be Virus.Win32.Parite.b which was a step ahead from its parent Virus.Win32.Parite.a both of these are purely parasitic viruses which modify the code of the infected file. The infected file remains partially or fully functional.

The KAV displayed the following notice every time the infected file/folder was scanned.

Status     Object
------       ------
will be deleted when the computer is restarted: virus Virus.Win32.Parite.b File: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ena1.tmp//UPX

To the sadness after the complete scanning and rebooting the system the virus was still resided at the %temp% folder. Later delving thoroughly, it was found that the virus Virus.Win32.Parite.b replicated itself into the System Volume Information system folder of the local drive and the pen drive as well. Surprisingly, in my JetFlash V110 pendrive there used to be no such system folder as System Volume Information. And with no further lingering, I just deleted it using TuneUp Shredder and all such unwanted files were deleted successfully, and finally a decisive full system scan was done to eliminate all the infected files and the virus itself.

continue reading and exploring full source code of the virus below

Malware Descriptions / Parasitic Classic Viruses section of the writes on parasitic viruses Virus.Win32.Parite.b as

Parasitic viruses modify the code of the infected file. The infected file remains partially or fully functional.

Parasitic viruses are grouped according to the section of the file they write their code to:

  • Prepending: the malicious code is written to the beginning of the file
  • Appending: the malicious code is written to the end of the file
  • Inserting: the malicious code is inserted in the middle of the file

Inserting file viruses use a variety of methods to write code to the middle of a file: they either move parts of the original file to the end or copy their own code to empty sections of the target file. These are sometimes called cavity viruses.

File and Boot Viruses here is very useful information on aliases and coding of the virus we are dealling with:

Virus.Win32.Parite.b (Kaspersky Lab) is also known as: Win32.Parite.b (Kaspersky Lab), W32/Pate.b (McAfee),   W32.Pinfi (Symantec),   Win32.Parite.2 (Doctor Web),   W32/Parite-B (Sophos),   Win32/Parite.B (RAV),   PE_PARITE.A (Trend Micro),   W32/Parite (H+BEDV),   W32/Parite.B (FRISK),   Win32:BackDoor-Servu (ALWIL),   Win32/Parite (Grisoft),   Backdoor.FtpUServ.A (SOFTWIN),   W32/Parite.B (Panda),   Win32/Parite.B (Eset)

This parasitic memory resident virus is functionally identical to Win32.Parite.a. It differs from Parite.a only in the key that it creates in the system registry:


Details of Virus.Win32.Parite.a (Kaspersky Lab) is also known as: Win32.Parite.a (Kaspersky Lab), W32/Pate.a (McAfee),   W32.Spybot.Worm (Symantec),   Win32.Parite.1 (Doctor Web),   W32/Parite-A (Sophos),   Win32/HLLW.SpyBot (RAV),   PE_PARITE.A (Trend Micro),   W32/Parite (H+BEDV),   W32/Spybot.IA (FRISK),   Win32:SpyBot-GEN (ALWIL),   Win32/Parite (Grisoft),   Win32.Parite.A (SOFTWIN),   Trojan.Spybot.gen-3 (ClamAV),   W32/Spybot.BE.worm (Panda),   Win32/Parite.A (Eset)

The virus consists of a dropper, which is witten in assembler, and the virus part itself, written in Borland C++.  When an infected file is launched, the control flow is passed to the virus dropper, which writes the virus to a temporary file and executes its infection procedure. The virus searches for Win32 EXE PE files with .scr and .exe extensions on all logical drives of computer, and also in shared resources of local network, and infects them.

The virus doesn't manifest itselfs presence in any way. The structure of infected file looks like this:

Host file
dropper - drops "main" to TEMP dir and executes it.
main - searches for files and infects them, e.t.c.

The AutoRun.inf file contained the following code, think this is system dependent and further it directly attacks the system shell command.


In actual, the above code won't be functional as I have changed the values in brackets. This is all about how the virulent code looks like.

The virus treated report from Kaspersky Antivirus 8 Beta Version

Status Object
------ ------
virus Packed.Win32.PolyCrypt.b File: J:\portables\proceeded\processed\Boss.exe/bossinv.exe
Trojan program Backdoor.Win32.Skrat.e File: J:\processed\setup - mbhttpbf.exe//data0001
malware File: J:\setup - mbhttpbf.exe//data0003
Trojan program Trojan-Spy.Win32.WebPageRecorder.b File: J:\setup - Stealth Web Page Recorder.exe/WebPageRecorder.exe
Trojan program Trojan-PSW.Win32.XPassLogger File: J:\ \portables\proceeded\processed\setup - XP Login Password.exe/kbfiltr.sys
virus Packed.Win32.PolyCrypt.b File: J:\ \processed\Blazing Invisible Boss.exe/bossinv.exe
Trojan program Trojan-PSW.Win32.Agent.eb File: J:\ \processed\Girls_boys.exe
malware Nuker.Win32.Small.b File: J:\ \processed\send messages to IP.exe//UPX//Autoit
Trojan program Backdoor.Win32.Skrat.e File: J:\ \processed\setup - mbhttpbf.exe//data0001
malware File: J:\ \processed\setup - mbhttpbf.exe//data0003
Trojan program Trojan-Spy.Win32.WebPageRecorder.b File: J:\ \processed\setup - Stealth Web Page Recorder.exe/web.dll
riskware not-a-virus:RiskTool.Win32.HideWindows File: G:\AUTOPLAY\DOCS\COMMON\CMDOW.EXE
Trojan program Trojan-PSW.Win32.XPassLogger File: J:\ \processed\setup - XP Login Password.exe/kbfiltr.sys

More more studies:

Subscribe to geeklog feed Bookmark and Share

Design by Free blogger template