Monday, July 30, 2007

More About The Trojan Horse

Let’s take a closer at the Trojan Horse using The NetBus Trojan as a reference

The Netbus Trojan has two parts to it as almost all Trojans do.
There is a Client and a Server. The server is the file that
would have to get installed on your system in order to have
your system compromised. Here’s how the hack would go.

The objective of the Hack is Getting the potential victim to install the server
onto his/her system. Now there are two ways to it.

Method 1
Send the server file (for explanation purposes we’ll call the file
netbusserver.exe) to you via E-Mail. This was how it was
originally done.
The hacker would claim the file to be a game of some sort.
When you then double click on the file, the result is nothing.
You don’t see anything. (Very Suspicious)
Note: (How many times have you double clicked on a
file someone has sent you and it apparently did
At this point what has happened is the server has now been
installed on your system. All the “hacker” has to do is use the
Netbus Client to connect to your system and everything you
have on your system is now accessible to this “hacker.”

But with increasing awareness of the use of Trojans, “hackers”
became smarter, and thus method 2 comes into picture.

Method 2
You might have often recieved games like hit Bill Gates in the face with a pie. Perhaps the game
shoot Saddam? There are lots of funny little files like that.
Now I’ll show you how someone intent on getting access to
your computer can use that against you.
There are utility programs available that can combine the
(“server” (a.k.a. Trojan)) file with a legitimate “executable
file.” (An executable file is any file ending in .exe). It will
then output another (.exe) file of some kind. Think of this
process as mixing poison in a drink.
Same procedure goes for
combining the Trojan with another file.
For Example:
The “Hacker” in question would do this: (say, he sends you game called "Ball Game")
Name: ball.exe (name of file that starts the chess
Trojan: netbusserver.exe (The Trojan)

The joiner utility will combine the two files together and output
1 executable file called:
This file can then be renamed back to ball.exe. It’s not
exactly the same Ball Game. It’s like the poisoned drink, it’s
just slightly different.
The difference in these files will be noticed in their size.
The original file: chess.exe size:60 Kbytes
The new file (with Trojan): ball.exe size: 75 Kbytes
(Explanatory Made-Up figures)
The process of joining the two files, takes about 10 seconds to
get done. Now the “hacker” has a new ball game file to send out
with the Trojan in it.

What happens when you click on the new ball.exe file?

The Ball Game program starts like normal. No more
suspicion because the file did something. The only difference
is while the Ball Game program starts the Trojan also gets installed
on your system.
Now you receive an email with the attachment except in the
format of Ball.exe.
The unsuspecting will execute the file and see a Ball game.
Meanwhile in the background the “Trojan” gets silently
installed on your computer.

If that’s not scary enough, after the Trojan installs itself on
your computer, it will then send a message from your
computer to the hacker telling him the following information.

Username: (A name they call you)
IP Address: (Your IP address)
Online: (Your victim is online)

So it doesn’t matter if you are on dial up. The potential
hacker will automatically be notified when you log on to your

This is enough for reading, in a single post. With the next post in the series, we'll talk about some other ways that your PC can be compromised by a H4x0r

Sunday, July 29, 2007

Installing 'XAMPP' for Working with PHP

(This is a guest author article.)

I don't want to get any further into PHP without being prepared for it. As I wrote in An Introduction to PHP, I recommend using XAMPP for Windows to set up a server on a PC running Windows. I would be a hypocrite for saying that if I wasn't using it myself. I held off on writing this article until I could take the time to install it on my own PC (my laptop).

Before I could install XAMPP, which includes practically everything I need to run a web server, I had to remove the old software. I had older versions of PHP, MySQL, Mercury Mail and a different web server that I no longer used. After I finished uninstalling all the old junk, I installed XAMPP. XAMPP installed Apache HTTPD 2, MySQL 5, PHP 5 + 4 + PEAR + Switch, MiniPerl 5, Openssl 0.9, PHPMyAdmin 2, XAMPP Control Panel 2.5, Webalizer 2, Mercury Mail Transport System v4, FileZilla FTP Server 0.9, SQLite 2, ADODB 4, Zend Optimizer 3, XAMPP Security, and Ming. That's a lot of software, but you have to download add-ons to install Perl 5 and Tomcat 6. I don't need them right now, so I didn't bother.

Even using "localhost" or "" as your local server address, setting up security is a good idea. Before I proceeded I put http://localhost/security in my address bar and viewed the security settings. The XAMPP pages were not secure, the MySQL server was not secure and phpMyAdmin was not secure. I clicked the link about halfway down the page, ending in "xamppsecurity.php" and set the passwords for both the MySQL server and the XAMPP pages. I had to navigate to c:\xampp\phpmyadmin and edit the "" file to include the same password I set for the MySQL database. XAMPP has a pretty good front end but it can't do everything automatically. Hence the need to manually edit the phpMyAdmin configuration file.

Why do I think security is important on your local machine? Unless your PC is disconnected from the Internet from now on, any servers running are open to attack. Why make it easier for attackers by leaving the security holes open? Firewalls, any of them, can have flaws that allow penetration. Securing your servers is an extra step in case you're allowing your server to be seen on the Internet or if your firewall has been compromised.

Once the servers are set up, you can create web pages and experiment with PHP and database interaction. Since I'm in the process of writing an article about using XAMPP to set up a WordPress "sandbox" over at Untwisted Vortex, I'll be installing a local copy of my web site on my machine. I already have a duplicate of the all the files. I also have multiple backup copies of the database. My next step is to export the database to an XML file and then import it to my sandbox server. XAMPP made the appropriate changes to the "php.ini" file so that I can upload a file up to 32 megabytes in size. The default for PHP is 2 megabytes and it isn't big enough for my database import. I know that because I tried it when I changed web hosts. I ended up restoring a backup copy and it wasn't very easy to do.

(Edit: WordPress doesn't support large files for export to import of WordPress to WordPress yet. I don't need the data for testing, so I'll skip that step and just set up a new database on the PC.)

The next article I write on PHP will concentrate on some "gotchas" of the "php.ini" file. Script writers who publish their scripts at various repositories make a lot of mistakes with it (and make a lot of assumptions) and consequently their scripts have code that isn't correct for all situations. In the meantime, you can set up a web server that supports PHP on your PC if you want to follow along. Don't worry; you can remove all that software later if you don't want to mess with it.

Friday, July 27, 2007

The Trojan "Horse": An Introduction


Trojan’s are probably the most compromising of all types of attacks on systems around the world. Trojans are being released by the hundreds every week, each more cleverly designed than the other. I have observed that Trojans are primarily responsible for almost all Windows Based machines being compromised. For those of you who do not know what Trojans are I’ll briefly explain. Trojans are small programs that effectively give “hackers” remote control over your entire Computer.

A few of the features of Trojan Horses are listed here:
  • Open your CD-Rom drive
  • Capture a screenshot of your computer
  • Record your key strokes and send them to the “Hacker”
  • Full Access to all your drives and files
  • Ability to use your computer as a bridge to do other
  • hacking related activities.
  • Disable your keyboard
  • Disable your mouse…and more!
Composition of a Trojan Horse

Almost all Trojans have two parts to them. There is a Client and a Server. The server is the file that would have to get installed on your system in order to have your system compromised.

We'll look at some further aspects of TROJANS later by talking about two of the most popular Trojan Horses. The NetBus and SubSeven

For now, wish you good time reading this.

Thursday, July 26, 2007

Save yourself the greener paper. Use coupons

Keep-Cash is an online coupon-‘n’-hot deals website that shows its readers the immense potential hidden in the use of coupons and coupon codes for saving money. The site updates itself on a very regular daily basis and offers some of the hottest deals available out there!
Best Buy Co., Inc. is a leading North American specialty retailer of consumer electronics, personal computers, entertainment software and appliances, and is featured on Keep Cash with lots of coupons and coupon codes that can be used to redeem exciting products like a Sony Vaio T7200 2GB 160GB 13.3" Notebook shipped for $1850 flat. (See more on the website!)
Best Buy coupons, BUY.COM deals, NEWEGG.COM deals just being a few of them, Keep-Cash offers a complete list of coupon codes on the web for over a thousand leading stores. If you come across a coupon that is not listed there or some coupon or coupon code has expired then you can contact them and bring it to their notice and they will take care. Besides, With their weekly newsletter, you can get free online coupons delivered directly to your inbox.
Now, that’s what I call intelligent and smart.
In a nutshell, if you are looking for smart bargains, the best deals available and more importantly if you want to save money by availing attractive discounts, Keep-Cash and their Coupons are the way you must go.
Keep your pockets greener. Use coupons
This is a sponsored (paid) post.

Wednesday, July 25, 2007

I signed up for PPP!

A friend of mine referred me to this one-of-the-millions online-earning opportunity that actually works for the bloggers!

There isn't just a single reason that I love PayPerPost, there are just many! PayPerPost has come up with a genius idea, this brand new form of ads on blogs which makes it a truly "Consumer Generated Advertising Network". The PPP service is fast and efficient. My blog was just accepted within three working days!

The PayPerPost system is transparent and it effectively verifies the authenticity of Blog-claims prior to registering any. The system, allows in marketplace only an easily navigable Blog that points anyone precisely to any particular Blog-post, being looked for, via the daily archives. I was first rejected because I archived my TechXtreme monthly, but this made me sure that this is finally the opportunity that I was looking for. A system that could distinguish between what is worth the game and what is just useless. This inspired me so much to submit my Blog again after I made the necessary changes. And I was mighty glad I did.

Apart, PayPerPost is an excellent way to make friends as you meet 'n' share opinion with hundreds of like-minded bloggers from around the world! I have just been here for a day as of now, & I admit that "I love it".

Monday, July 23, 2007

"My Computer leads to Search" blues

I have been getting many e-mails in the recent past about this problem, when someone would double-click on any folder in 'My Computer' and that would open a search window. This can be pretty annoying. And its, of course, unwanted. After All,who'd wanna search when one knows where one wanna go to. You don't want to open a search window when you double-click an album to play your favorite song in it.

Here's the simple solution:

Open 'regedit' and navigate to the following keys one by one:

In the pane to the right hand side, delete the "Default" key. If it doesnt work then delete the key "find" under both.

Everything should now be OK

Test-Drive your Adsense

Sometimes it becomes absolutely necessary for us to test the various widgets we have added on our blogs/websites ! when working with the code, or otherwise. This may include, you clicking on your own (adsense) ADs. Now, its a well-known and well-understood fact that Adsense doesn't like 'flat' impressions and self-clicking our ads. And no one is (I think) fool to o risk his/her Adsense account for any invalid activity.

So,here's a simple solution to this problem. Just add "google_adtest = ‘on’;" to your ad code.


google_ad_client = “pub-xxxxxxxxxxxxxxxx”;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = “468×60_as”;
google_ad_type = “text”;
google_ad_channel =””;
google_adtest = ‘on’;

Now any impressions or clicks will be ignored by Adsense, So you can test the adsense on your website/blog without any hassles.
As the Adsense TOS clearly say:
Any AdSense ad code, search box code, or referral code must be pasted directly into Web pages without modification. AdSense participants are not allowed to alter any portion of the ad code or change the layout, behavior, targeting, or delivery of ads for any reason.

Even though you are allowed to make this change in your ad code even though Google’s Policies and TOS don’t allow you to make any changes in code.Just in case you are uncertain about it, please contact Adsense Support Team.

Also, remember to remove google_adtest = “on”; once you are done or you won’t make any money.

Sunday, July 22, 2007

Face of BroadBand in India

I have got myself a BSNL 'Home 900 UL Plus' that offers a speed of 256kbps and unlimited BandWidth for 'INR 900'. There's no cap on amount of data that I can upload or download. But are we there yet?
I guess, No ! The maximum download speed that I have ever seen my connection record is less than 36kbps.

A tech-mag DIGIT in its March edition had nicely put the point forth,

"Hey, watch this hilarious video", says the friend from US, and you click on the YouTube link with all imaginable anticipation. "Its still loading," you say, when said friend asks you whether you have watched it. Now,if your US based friends are something like ours, they'll instantly give in to the temptation to send you a screenshot of their 500KBps (yes, thats kilo bytes) and call it Awww.jpg

With even the prices falling, more options being available, the broadband that we are presented with is just not enough. Some ISP would offer you a 256kbps (kilo bits sadly :-( ) with 500MB cap on upload and download and any further usage than the alloted bandwidth you are charged by the kb. I had in recent past used a
INR 500 plan that had a 1GB upload/download cap. Now what is it for us lazy-potatoes, who think its better to download some album or movie from the net in about a day or two's time rather than go out and buy ourselves a CD. With clear memories in mind, of the huge bill that they handed over to me (about 7000 Indian Rupees) I made a shift to the 900-Unlimited Plan. But the speed is so-pathetically slow that I have stopped uploading any videos to You-Tube or even watching them embedded anywhere! I don't feel any better than before because its like you can't download more than a few GBs of stuff in a month at this speed, for the only thing we got to do is not sitting in front of the PC and monitoring the connection. When it disconnects or stops responding when downloading or uploading a large file.

Someone was(still is! anyway)a fool to offer 2Mbps connection with a data-cap of 1GB.
You may think of it as if a Genie has come out of some magical Chiraag and aks you to make a wish that he'll grant. You ask for heavenly pleasure of using a Hi-Speed connection just for two days and the wish is granted (How much time will you take to do off with just a GB of data at this speed,anyway!)

All we can do is just hope for more. Hope for fatter net-pipes in coming days.
2007, when started, was being dubbed as an 'Year of Broadband' for India. Lets see till where this goes. Till where our ISPs take us and what do they have in store for us. The 7th month is all about to pass away. Will the face of broadband in India change by the end of this year. Let us see!

Saturday, July 21, 2007

So Dissolved in Writing

These days I have started finding more pleasure in my work, practicing what I learn in my classes, trying to use each and every feature that I see in Photoshop CS2. I have kind of started loving to play around with the little Flash I know.

And about this all, I have started WRITING everything down, sometimes in the MS Word and sometimes in my home work notebook. I was just going through the PHP manual (which RT pointed to in his previous post) and I must say, This was the first time after my board exams that I sat for in March, that I wrote so much.

Apart writing for learning,I find myself more engaged in thought-work for those things that I feel I wanna write about (Just as scribbling in this WYSIWYG editor,this very post); documenting what I wanna write down at RT's Untwisted Vortex and what all I wanna share with you,readers, here on techXtreme. Hari has rightly said (On writing and ideas) that "The more you write, the more you want to write". And as his theory of writing goes.

It is an extremely useful technique to clarify vague thoughts, but sometimes writing down ideas can also be very limiting and confined to what can be expressed in words. But I’ve often noticed that even if I have strong and very clear views on a particular subject, I have a lot of difficulty in expressing them in words which convey exactly what I feel about that subject. I’ve often rejected blog posts because on reading them again, I could hardly recognize my own ideas in them. Sometimes one is so engrossed in building up a coherent theme that the real message gets buried. Very often thoughts aren’t easily expressible in coherent terms. And because thoughts = ideas + feelings, they don’t easily translate into a written format.
Hari's actually got a strong point in here. This is exactly how is it! Atleast this is how is it for me.
Such is the vast expanse of the sea of thoughts,of ideas,of views (etc.) in my mind, that I feel like taking up the "challenge of not only accepting complex and inexpressible ideas, but to put them down in simple, understandable language" This is the force with which I am writing (I should say, I have started writing!, instead) This is the force that has now so much dissolved me into it.

But whatever. I am enjoying what I am into and I'll try my best to keep enjoying it. As long as this goes on with me!

Friday, July 20, 2007

An Introduction to PHP

(This is a guest author article.)

Learning any computer programming/scripting language isn't hard as long as you follow the proper learning steps.

Today I want to talk about PHP. PHP stands for "PHP: Hypertext Preprocessor". Part of that is kind of redundant, isn't it? Here's why: PHP/FI, the first version, was created by Rasmus Lerdorf in 1995. PHP/FI stood for "Personal Home Page / Forms Interpreter". So the "PHP" part of that is now included for recognition purposes only.

PHP/FI was based on Perl scripts. As it grew in complexity, C functionality was added and version 2 was produced. Eventually, PHP3 was released and that's when it really took off with developers. Believe it or not, there are still some servers (but very few) out there running that version of PHP. PHP4 is still the most commonly used version today, even though PHP5 has been in existence since July of 2004.

On July 13, 2007, the PHP development team announced the end-of-life for PHP4 as December 31, 2007, with critical security fixes until August 8, 2008. Now would be a good time to migrate the servers and software to PHP5. PHP6 is in development now.

The comprehensive manual at PHP: Hypertext Preprocessor includes a "hello world" tutorial that can familiarize you with the basic steps to getting it working on any web site. Fortunately most blog, CMS, and forum software already has it all in place. But what if you want to change something or add some functionality the software doesn't include? Unless you know what you're looking for, and what you're looking at means, it might as well be a foreign language to you. That's where a "sandbox" version of your web site comes into play. That's usually how I make major changes to my blog at Untwisted Vortex.

Most Linux distributions include everything you need to set up a server on your own PC, including the PHP implementation. All you have to do make sure it only points to your PC's server IP address (usually On Windows, it's a little harder. I recommend using XAMPP for Windows. I've tried just about every Windows-based web server there is at one time or another, and I think this package is the best choice. XAMPP is an acronym that spells out what it includes (except for the X): Apache web server, MySQL database server, PHP interpreter and Perl interpreter. Once you set it all up, it's just a matter of playing with the code on web pages you design.

I'm sorry, but I'm not familiar enough with other operating systems to even guess what package would be the best to use. There is, however, a XAMPP version for Linux, Mac OS X and Solaris, in addition to the Windows version.

That's enough for one day. I can only suggest, if this interests you at all, is to do a lot of reading before the next article I publish on the subject. That will probably happen tomorrow.

(Update 2007-07-29: I was tied up with other things and my next article should be today.)

Thursday, July 19, 2007

Getting Back Into Technology

(This is a guest author article.)

When I was invited to write for Abhinav's blog, I was a little hesitant about the prospect. It has been more than 6 years since I did anything technically serious. That was back when I was the IT/MIS manager for a telemarketing corporation in Phoenix, Arizona, USA.

I realized, however, that I have a lot of experience that dates all the way back to the early 80s and as recently as last year. It would be a shame to hoard the knowledge that years of experience have taught me.

In the next few days, I'll be writing some articles on specific topics that are more tech-oriented than I'm used to writing. Since I'll be digging a lot of it out of the recesses of my memory, it may take longer than I expect. The first batch will begin with a programming language (or scripting language, if you prefer) and my experiences with it.

It should be a lot of fun -- I don't get into this much on my own blog at Untwisted Vortex. Perhaps writing here will pique my interests once again.

Tuesday, July 17, 2007

Types Of Booting: Cold and Warm Boot

The Boot sequence used when a PC id powered on from a powered off condition is called a COLD BOOT. A cold boot is done when the computer is started from a cold(or completely powered off) status. A WARM BOOT happens when the PC is already powered on. An example is Pressing the RESET button.
A cold boot causes the complete boot and POST sequence to run. However, the POST process does not run after a warm boot.

A brief about CMOS

Because of the initial cost of the Complementary Metal Oxide Semi-Conductor (CMOS) technology, memory, transistors and large parts of most microprocessors were once reserved for storing the startup configuration of the PC. With technology advances and lower costs, however, CMOS technology is now even being used throughout the PC. CMOS memory requires only about one-millionth of an amp to hold any data stored on it. Using only a lithium battery, CMOS memory is able to store the startup configuration of a PC for many years. The term CMOS is still synonymous with PC’s startup configuration data

Basics of Booting a PC

Note: This is a very long post so I advise you to read it in parts, Maybe you can do with one heading at a time or whatever is convenient to you.

Note: Bookmark this page (CTRL+D) to return if you close this page after reading a part.

Note: If you have any questions, then please feel free to post a comment and put your question or response

Booting of the Computer

So far we have talked about various things that we can do on a computer... Whether Offline or online. But a little of the most know about how a computer starts (no! not just smackin’ the switch/buttons and powering it on!). So in this post I am gonna talk about the very basics of Switching on and Booting of the COMPUTER.


We know about almost unlimited software. But, the first and the foremost software that comes into picture when the computer is switched on is BIOS. This is what happens when you switch on the computer.

Switching on the Computer:

When the computer is switched on,the current is passed on to the various cards. From here it goes to the chip called the BIOS chip. It is the one which wakes the computer and you see the various messages on the monitor. Once the BIOS has performed its house keeping activites, the control is shifted to the operating system (OS). But the booting of the PC is very interesting. Read on..

What is BIOS:

BIOS is Basic Input/Output System. In PCs, the boot process is very important. It is the process which makes the computer run and hands over the computer system to the OS for running. The importance of PCs BIOS is that it performs all the functions, the PC needs to get started. The BIOS contains the first instruction the PC needs to get started, programming that checks that PCs hardware is attached and ready and other routines to help the computer get up and running.

Booting of the computer:

Another of activities of the BIOS is to provide the interface that connects the CPU to the input and output devices attached to the PC. The BIOS relieves the PC from needing to know about how hardware devices are attached to the computer. When a new device is attached to the computer, only the BIOS configuration data needs to be updated rather the need of updating every piece of software in the PC as to where the hardware is attached and where its drivers are located.

When the PC boots,the PCs hardware cannot perform independent actions. It must have instructions to do anything at all. These instructions are carried in the form of PC’s software, which are blocks of instructions that guide the hardware to perform specific activities.

System Boot Sequence:

The process used to boot a PC by the action of BIOS is a fairly complex sequence of steps that verifies the configuration, checks the hardware and loads the software. The actual steps included in a particular BIOS’s boot sequence can vary by manufacturer but the following are the typical of the steps normally performed during the system boot sequence.

Ø When you turn on the PC’s power switch, the internal power supply initializes itself. The power supply doesn’t provide the power to the rest of the PC immediately. As soon as the power supply is able to supply reliable power to the motherboard, it transmits a “good power” signal to the motherboard’s chipset, which sends a system rest command to the processor. At this point, from all outward appearances the PC looks as if its still powered off.

Ø The system rest command sent by the motherboard’s chipset causes the CPU to read its first instruction from what is called the jump address. The jump address is always located in fixed preset location. Typically address FFFF0h is in system memory. The jump address contains the physical address of the BIOS’s boot program on the ROM BIOS chip.

Ø The CPU executes the first instructions, which copies the BIOS programs into system memory and starts running the BIOS.

Ø The BIOS then performs the POST (Power-On Self Test) process. The POST verifies and tests the hardware configuration stored in the BIOS configuration information. Should the POST detect any problems, it sounds beep codes, or flashes error messages about the nature of the problem and the Boot-Process stops.

Ø If the POST detects no problems, the boot process continues. At this point the system BIOS looks for video adapter’s BIOS and starts it. Virtually all the devices on the PC have their own BIOS. This is the first time that you will know the PC is booting; besides from the noises of the disk drives and single beep indicating all is well.

Ø The display of video adapter’s information is followed by information about the system BIOS itself. This usually includes info about the manufacturer and the version of BIOS programs.

Ø Any device BIOS routines are started. Next, the BIOS begins a series of tests on the system, including the amount of memory detected on the system which now can be displayed on the screen and any error messages can be flashed (because now BIOS has the use of the monitor, so it don’t need to make beeps anymore as earlier).

Ø With the device BIOSs loaded, the system BIOS checks if the devices listed in the CMOS (wait for the next post, its going to be about it) configuration data are present and functioning. Including their speeds, access modes and other parameters. In this sequence, the serial and parallel ports are assigned their identities (COM1, COM2, LPT1 etc.). As each device is passed, a message is displayed that it was found, configured and tested.

Ø If the BIOS supports Plug and Play (PnP) technology, any PnP devices are configured, info about them displayed on the screen, although it typically goes by much too fast to be read.

Ø At the end of the test and configuration sequence, the BIOS should display a summary data screen that details the PC as the BIOS sees it and indicating that the system is verified and ready for the use.

Starting the OS:

To start the Operating System, the BIOS must first find it. Included in the CMOS data is a parameter that indicates the disk drives and the order in they which should be accessed to find the operating system. In most cases, the sequence by default is first floppy disk drive, then the hard disk drive and then the CD ROM drive. This sequence can however be changed to reflect the sequence the user defines as desired.

If the first boot device is the Hard Disk Drive (HDD), the BIOS looks for the Master Boot record (MBR) to use to start the OS. If the boot device is a floppy disk drive (FDD),then the BIOS looks at the first sector on the Floppy Disk for the OS program. If the Boot Program is not found on the first device then the second device is looked for, then third and so on until the program is found. If no boot device is found, then the boot sequence stops and error message (“Error loading OS” or “No Boot Device avalable” , depending on the case) is displayed.

The PC should now be up and running and ready for use.

Recommended: Next time you boot up a PC, watch this sequence more closely to see if you recognize the actions taking place.

Sunday, July 15, 2007

Techxtreme Banner

This is not going to be official,though. I made this out just playing around with photoshop after getting bored a big deal with nothing to do online ..

Please review this piece and leave your comments about it ..

Find the greater out of two numbers

I have worked out a very very simple but useful javascript. That is for comparing two numbers. Ok,we can sure just see the two numbers and tell which one is greater,but this is going to be here just for (you can say fun,or .. ..) newbie programmers in javascript who need to understand how these scripts work.

I'll insert the active script here so that its readily usable as a DEMO and those who want the the script code may leave a comment for that with their e-mail address and I'll email you the code (FREE)

Here it is

Click this button and follow the prompts to see how it works

You may need to enable active content on Internet Explorer(it'll show up in a bar just on the top of this window's workspace that the content from this site is blocked) to be able to use this function.
If this doesn't work for Firefox users,then please open this page in Internet Explorer.

Saturday, July 14, 2007

Change the color of windows in Microsoft Vista

In Microsoft Vista there are some limitations with the colors that you can set around your window.
To change this all that you have to do is, Run regedit (registry editor) & find your way to HKEY_CURRENT_USER --> Software --> Microsoft --> Windows --> DWM.

Then change the colorizationcolor value to a hexidecimal color (ie. green is 8000FF00).
Then run cmd.exe & then type in "net stop uxsms" and then after the completion of that process type in "net start uxsms".

I believe it'll work for almost all colors.

Getting your IP address

This very basic thing tutorial is for the neest of the newbies.
I'll tell you how to get your IP address,locally from your PC and online also.

1st of all (for those who don't know), IP address is a unique ID to your machine. Like fingerprints are to humans,IP addresses are to PCs. Its a set of 4 numbers describing your PC uniquely and also give us an Idea about the location.

The set of numbers is in the format
Where xxx can be anything from 0-255 (i.e. there can be any of the total 256 values for each part)

Now,we come to the focus of this post. Getting your IP address.

  • Locally,you can get the IP address of your PC by navigating to (XP users) Start>Run and typing in "ipconfig" without the quotes. Alternately Press the WinLogo+R and type "ipconfig" without the quotes and press enter.

    A black window containing a lots of information,(but our area of concern!)the IP address will be listed under "IP ADDRESS"
    A side-note to this,this black window just flashes on the screen. You need to take a screenshot of the window to get the desired information(by pressing PrintScreenSysRq key and then pasting the image in Paint or PhotoShop,etc.

    So there are chances that you miss out the desired information if you take the screenshot too early or miss the black window away! if you take the screenshot too late. Now comes the online way to save you from these woes! Read On..

  • So,the other (a.k.a the online )way is to simply visit What-Is-My-IP and get your IP address. But if you use proxy to surf the Internet anonymously then you'll get the IP of your proxy server. Not of your system. Similar problem will be faced if your ISP masks your IP (for security purposes). So getting it locally is the way to go,then.
Good Day.
Keep your comments and suggestions coming.

Saturday, July 7, 2007

Open command line window in any directory

Ok, we have talked about this little useful tip sometime earlier on my previous website @googlepages. But,i felt that i should put it up again and share it with you all because of its usefulness.
This tip will create a right-click menu item to open up the command line window from the particular loacation(directory) that you are at and wanna work in..

Copy this to a text editor and save the file as a .reg
then merge with the main registry by opening it or right-clicking & then selecting merge.
Restart the PC to see the changes.
Now you can open the command window right from the directory you want to open it from,directly by right clicking and selecting the option,instead of "RUN"ing cmd.exe and then typing on the path you wanna be at.

Windows Registry Editor Version 5.00

@="Open command window Here"

@="cmd.exe /k \"cd %L\""

* For Windows XP users

Cool. Isn't it?

Monday, July 2, 2007

Removing the Navigation Bar from your blog

I have removed the Navigation Bars from all my blogs. The blogs now look fairly clean without these, and not much like some BLOGGER blogs. There's an easy way to do it. Here's how to:

Add the following lines of code to your blog template

#navbar-iframe {

And you are quite done :)

But,I myself experience some shortcomings with this. Now with the Navigation Bar no longer visible,I have to goto the blogger home everytime i have to make any changes to the blog (customising it) or every time i have to make a new post. With the NavBar handy,it wasn't something that could be called a TASK...

Anyway readers,take the way that suits you.
Good Day.

Sunday, July 1, 2007

The Orkut Mania

Orkut mania is over one and all. And people are coming up with all possible stuff they can come up with to make their profiles attractive, to make new friends, impressing their fellows with cool looking or cute/sweet/kootchie-moootchie (let us be outta it!) testimonials.

Here's a pick from a friend's about me::

▌││ │▌▌▌▌ ││▌ ││▌▌│▌®


Well,nice work Mr.
Sure looks good...

(And the copy-paste people! Get to work.)

Question Set 2 (Lateral thinking)

Here is the question set-2,my friends. So,get your brains working and into action right now. Again,the answers will be posted after a while,after you've tried answering them (post your answers through comments please)

Question 1
Coast to Coast:

Train A and train B are crossing the country, from coast to coast, over 3,000 miles of railroad track. Train A is going from east to west at 80 miles per hour, and Train B is going from west to east at 90 miles per hour. Which train will be closer to the west coast when they meet? (Hint: You don't have to do any math to get the answer. Just use your head!)

Question 2
Crossing the River:

Jake was standing on one side of the river, and his dog Scruffy was standing on the other side. "Come on Scruffy, come, boy!" shouted Jake. Scruffy crossed the river, ran to Jake, and got a treat for being a good dog. The amazing thing was that Scruffy didn't even get wet! How did Scruffy do that?

Question 3
Digging Dirt:

How much dirt is in a round hole that is 9 feet deep with a diameter of 3 feet? (Hint: You don't have to do any math to get the answer. Just use your head!)

Question 4
Minus Two:

How many times can you subtract the number 2 from the number 32?

Question 5
Name the Dog:

Once a dog named Nelly lived on a farm. There were three other dogs on the farm. Their names were Blackie, Whitey, and Brownie. What do you think the fourth dog's name was?

Waiting for your answers..
Good Luck.