SearchAdsensecode

Google
Web www.hydengg.blogspot.com

Placements In MNC

Wanna get informed about the latest news about openings for freshers and experienced people in HYDERABAD .

Join our community in ORKUT :


CLICK HERE TO JOIN THE JOB COMMUNITY IN ORKUT


And get updated about openings from various companies like

  1. Cognizant
  2. Infosys
  3. Microsoft
  4. Oracle
  5. Wipro
  6. TCS
  7. Satyam
  8. Dell
  9. HSBC
  10. ADP
And many more software companies



More over u can get tips for freshers and experienced people to face interviews , previous placements papers , resume writing tips , etc

B.com , B.A , B.Sc results

The results for B.com , B.A , B.Sc and B.C.A will be available on the following websites :

1. Osmania University website :
B.A , B.Com and B.Sc results will be available soon.

2.Other Websites :
B.A , B.Com and B.Sc results will be available soon .


These results are no longer available , visit home page for latest results from osmania university.

Best of luck for
B.A , B.Com and B.Sc results .


Photo : High Court of A.P


This photo is of High court of Andhra pradesh located at southern banks of river Musi , Hyderabad . The construction started on 15th April, 1915 and was completed on 31st March, 1919. On 20th April, 1920 the High Court building was inaugurated by Nizam VII Mir Osman Ali .




Marvelous ................. wat say ? well i m fascinated by the architecture .

New 7 wonders , vote now


New seven wonders are being selected and the only nominee from INDIA is TAJ MAHAL .

so i request u all to vote for TAJ MAHAL as many number of times possible and don't forget to tell your friends to vote for Taj mahal .


link to vote is given below ....... only few more days left, only 24 days left as on 12/06/2007.

hurry up plzzzzzzzz


VOTING LINES CLOSED


Brief history about TAJ MAHAL :

In 1612, Arjumand Banu Begam, a Muslim Persian princess better known by her other name, Mumtaz Mahal was married to Shah Jahan (then Prince Khurram), the fifth Mughal emperor. Mumtaz was the emperor's second wife .

Mumtaz bore 14 children, and when she died during childbirth in 1631, Shah Jahan was so heartbroken then Shah Jahan decided to immortalize the memory of his beloved wife by building the finest monument ever - a monument of eternal love. Herein lies the genesis of the Taj Mahal. The construction documents show that its master architect was Ustad Ahmed Lahori, the renowned Islamic architect of his time.Construction began in 1631, and over 20,000 workmen and master craftsmen worked laboriously for 22 years to give shape to the emperor's passionate dream!

Facts to make every Indian proud

Q. Who is the GM of Hewlett Packard (hp) ?
A. Rajiv Gupta

Q. Who is the creator of Pentium chip (needs no introduction as 90% of the today's computers run on it)?
A. Vinod Dahm

Q. Who is the third richest man on the world?
A. According to the latest report on Fortune Magazine, it is Azim Premji, who is the CEO of Wipro Industries. The Sultan of Brunei is at 6 th position now.

Q. Who is the founder and creator of Hotmail (Hotmail is world's No.1 web based email program)?
A. Sabeer Bhatia

Q. Who is the president of AT & T-Bell Labs (AT & T-Bell Labs is the creator of program languages such as C, C++, Unix to name a few)?
A. Arun Netravalli

Q. Who is the new MTD (Microsoft Testing Director) of Windows 2000, responsible to iron out all initial problems?
A. Sanjay Tejwrika

Q. Who are the Chief Executives of CitiBank, Mckensey & Stanchart?
A. Victor Menezes, Rajat Gupta, and Rana Talwar.

Q. who is the new CEO of Pepsi ?
A. Indra K. Nooyi

We Indians are the wealthiest among all ethnic groups in America, even faring better than the rest.
There are 3.22 millions of Indians in USA (1.5% of population). YET,
38% of doctors in USA are Indians.
12% scientists in USA are Indians.
36% of NASA scientists are Indians.
34% of Microsoft employees are Indians.
28% of IBM employees are Indians.
17% of INTEL scientists are Indians.
13% of XEROX employees are! Indians.


Some of the following facts may be known to you. These facts were recently published in a German magazine, which deals with WORLD HISTORY FACTS ABOUT INDIA.

1. India never invaded any country in her last 1000 years of history.
2. India invented the Number system. Zero was invented by Aryabhatta.
3. The world's first University was established in Takshila in 700BC. More than 10,500 students from all over the world studied more than 60 subjects. The University of Nalanda built in the 4 th century BC was one of the greatest achievements of ancient India in the field of education.

7 Surefire Steps to a Positive Attitude

Attitude, as you have heard many times, is every-thing. That theory has been written in thousands of books, spoken to millions of people, and driven deep into your mind. Why? It's true.
Your attitude is your own personal filter for every-thing that happens to you, around you, or within you. What takes place in this world is not as important as how you view it.
You cannot choose what will happen to you. You cannot guarantee success and happiness for yourself. These things are out of your control. You can, however, choose how you feel about these things, about how you respond to these situations.
With a positive attitude, you will have the ability to be happier each and every day, make others around you happier, and live a good life. Below are seven tips that can help you keep your positive attitude going.


1. PUT THINGS IN PERSPECTIVE...
When you find yourself getting fed up and your mood is taking a turn for the worse, take a step back and put things into perspective.
Is the stress and frustration really worth it? When you look at the bigger picture, don't they seem a bit insignificant? They should, because nine times out of ten the daily problems we face are not really that important when we take a look at life as a whole.
You are alive, you have food, shelter, and freedom. These things are reason enough to smile when you wake in the morning.
2. HAVE SOMETHING TO LOOK FORWARD TO.....
You are expecting something in the mail. Each day you run to the mail box, filled with excitement and anticipation. And then, finally, it comes!
People love to look forward to things. Some say that anticipation of something happening is better than when it actually happens.
We all have special events that are coming up. Holi-days, birthdays, vacations, weekends, etc. Keeping these in mind will give you something to stay excited about.
3. HELP OTHERS....
There is no better way to forget about your worries than to help someone else with theirs. When you take the focus off of yourself, and give your attention to helping people, your attitude will change dramatically.
This tip not only includes helping friends and family, but also volunteering to help those in need whom you may not know. When you give of yourself, you'll receive tenfold in return.
4. TAKE A BREAK ......
There are times when the only solution is to get away from it all. If you know that you are in a negative mood, or have been in low spirits for some time, take a break. It could be just what you need.
Taking a break can vary from a short trip in your car, to a vacation in the Bahamas. A walk around the block, or a leisurely drive around the neighborhood can also work wonders for your mood and attitude.
5. TALK WITH A POSITIVE FRIEND......
Talking things out can help you see the good in a bad situation. Call a friend and tell them about your problem, or just chat about any topic that comes to you. This is a very therapeutic and effective cure to a rough day.

6. LIFE IS SHORT......
One thing to always remember is that life is short. The worst thing would be to look back on your days wishing you could have been happier. Now is the time to take a good look at your attitude and make the necessary improvements.
Days, weeks, months, and years have a way of rushing by. Don't let them pass while you are in a negative mood about life. A positive attitude is worth the work, effort, and change that it takes to create it. Look back with no regrets, only happy memories.
7. PEOPLE HAVE DONE MORE WITH LESS.....
A common cause for a poor attitude is the feeling that you are in a situation that is just too hard to deal with. Perhaps you don't have the job you want, or you may have a boss that drives you crazy. It may even be more serious than that. You may be too young, too old, too tired, too unlucky, etc...
People have done more with less.
Many people from all over the world have overcome obstacles, solved problems, and maintained a positive attitude through the most trying of times. If they can do it, so can you.
The power of a positive attitude is always within your reach. You simply have to extend your hand and grab it. Use the tips above to gain a great attitude, and to make your life happier, healthier, and wealthier.
waiting for u r comments and thoughts ................reply soon

Google Talk

Google Talk is Google's instant communications service. Like Gmail , Google's free webmail service, Google Talk uses Google's innovative technologies to help people communicate more effectively and efficiently. This means Google Talk is fast, intuitive and fun to use.

It also means you can start thinking about instant communications in a new way. Google Talk offers you different ways to integrate real time communications into your online experience. The Google Talk Gadget lets you see who's online and send instant messages from your Google Personalized Homepage, without installing any software. And by downloading the Google Talk Client, you can make voice calls and transfer files to your friends.

And if you use Gmail, Google Talk offers you even more. You'll find all of your Gmail contacts organized in your Talk contacts list. Gmail also archives all of your Google Talk chats and makes them searchable. And since Google Talk is integrated into Gmail, you'll be able to chat with all your Talk contacts there, too.



CLICK HERE TO DOWNLOAD GTALK'S Website


Or click on google pack , which on the right hand side of this page , it comes along with many other useful softwares like sketch up , google talk , picasso , google tool bar , etc .......

Forgot root password in LINUX ?

Resolution:

You can change your root password from single user mode or rescue mode. Getting into single use mode depends on your bootloader:

GRUB

Booting into single user mode using GRUB is accomplished by editing the kernel line of the boot configuration. This assumes that either the GRUB boot menu is not password protected or that you have access to the password if it is.

If the GRUB boot menu is password protected and you do not have access to the password, then you will need to use a rescue disk to boot the system. Follow the instructions given by the rescue disk boot process to recover your installation and then chroot to your system image (usually accomplished by issuing the command chroot /mnt/sysimage). From this point you should be able to use the passwd to change the root password of the system.

At the boot prompt, select the kernel that you wish to boot with and press 'e' (for edit). You will now be taken to a screen where you can edit the boot parameters. Move the cursor to the kernel line and press 'e' again. Now append an 'S' to the end of the line, press Return, and then 'b' (for boot). The system will now start in single user mode and you can change the root password using the passwd command.

LILO

When the system comes to the LILO: prompt, type linux single . When you get the # prompt you will need to type passwd root. This will update the password to a newer one. At this point you can type exit and your system should return to the boot sequence. Alternatively, you can reboot your system with the shutdown -r now or reboot commands. The system should boot up normally. You can now use your new root password to gain root access.

If LILO is configured to not wait at the boot menu (timeout value in /etc/lilo.conf set to 0) you can still halt the boot process by pressing any key in the split second before LILO boots the kernel.

10 Ways to Defend Against IM Threats

Consumers can protect themselves from viruses, worms, and Trojans delivered through IM. By following some basic rules, it’s easy to keep these threats from slowing you down.

  • Choose your screen name carefully. Don't use your real name, email address, or other personally identifiable information.
  • Only share your screen name with people you trust, and ask them to keep it private. Only communicate with people on your contact or buddy list. To prevent “spim” (IM spam), use settings to block messages from people you don’t know.
  • Don’t display your screen name or email address in public places such as Internet directories or personal profiles. Some IM services link your screen name to your email address when you register. Consider setting up a secondary email account if this is the case, since your address could be harvested for phishing attacks.
  • Never provide private information like account numbers or passwords in an IM conversation. Network sniffers can intercept unencrypted IM traffic. Anti-virus software and a firewall will protect you from Trojans and viruses, but cannot protect your information once it leaves your PC.
  • Fortify your computer with strong security software and keep it up to date. The security suite guarantees trusted PC protection from viruses, hackers and spyware. Its cutting-edge features include X-Ray for Windows®, which detects and kills rootkits and other malicious applications that hide from anti-virus programs. Its integrated anti-virus, anti-spyware, firewall, anti-spam, anti-phishing, and backup technologies work together to combat today’s sophisticated, multi-pronged attacks.
  • Configure your IM application correctly. Make sure it does not open automatically when you fire up your computer. Turn off your computer and disconnect the DSL or modem line when you’re not using it.
  • Enable automatic Windows updates, or download Microsoft® updates regularly, to keep your operating system patched against known vulnerabilities. Install patches from other software manufacturers as soon as they are distributed. A fully patched computer behind a firewall is the best defense against Trojan and spyware installation.
  • Configure your anti-virus software to automatically scan all email and IM attachments and downloaded files. Never open attachments from people you don’t know. If you know the sender, contact them to confirm the file is trustworthy. Beware of spam-based phishing schemes—don’t click on links in emails or instant messages.
  • Be careful when using P2P file sharing with IM. Trojans sit within file sharing programs waiting to be downloaded. Avoid files with the extensions .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd. Configure your file settings to limit the folders that other users can access.
  • Monitor and limit your children's use of IM. Put the computer in a high traffic family area and limit nighttime use. Parental controls in the firewalls or any security suites help parents control the information that their children receive and send.

How to Protect Against Pharming

Pharming is an attempt to defraud Internet surfers by hijacking a Web site’s domain name, or URL, and redirecting users to an imposter Web site where fraudulent requests for information are made.

To protect yourself against pharming, follow these basic guidelines:
  • Check the URL of any site that asks you to provide personal information. Make sure your session begins at the known authentic address of the site, with no additional characters appended to it.

  • Maintain effective, up-to-date virus protection.

  • Use a trusted, legitimate Internet Service Provider. Rigorous security at the ISP level is your first line of defense against pharming.

  • Check the certificate. It takes just a few seconds to tell if a site you land on is legitimate. On the latest version of Internet Explorer and on many other commonly available Web browsers, go to "File"" in the main menu and select "Properties",or right click your mouse anywhere on the browser screen and, from the menu that pops up, click on"Properties. When the "Properties" box pops up, click on "Certificates" and check if the site carries a secure certificate from its legitimate owner.

  • Avoiding visiting suspicious websites.

  • Block suspicious Web sites automatically. Softwares like Norton confidential detects and blocks fake Web sites, making it easier for you to be confident most of the sites you are using are legitimate.

How to Protect Against Phishing

Phishing is an online con game, and phishers are nothing more than tech-savvy con artists. In a typical phishing scam, phishers send out emails, which appear to come from a legitimate company, in an attempt to scam users into providing private information that will be used for identity theft.

Phishers use a variety of sophisticated devices to steal information—including pop-up windows, URL masks which simulate real Web addresses, and keystroke loggers that capture account names and passwords.


To protect yourself against phishing, follow these basic guidelines:
  • Be wary of emails asking for confidential information—especially of a financial nature. Legitimate organizations will never request sensitive information via email.

  • Don’t get pressured into providing sensitive information. Phishers like to use scare tactics, and may threaten to disable an account or delay services until you update certain information. Be sure to contact the merchant directly to confirm the authenticity of their request.

  • Familiarize yourself with a Web site’s privacy policy.

  • Watch out for generic-looking requests for information. Fraudulent emails are often not personalized, while authentic emails from your bank often reference an account you have with them.

  • Never submit confidential information via forms embedded within email messages.

  • Never use links in an email to connect to a Web site. Instead, open a new browser window and type the URL directly into the address bar.

  • Maintain effective software to combat phishing.

Prevention from Online Fraud and Identity Theft

Online fraud is a type of cyber crime that uses email, web sites, chat rooms or message boards. There are many different types of online fraud, including phishing and pharming scams, which use forged e-mails and Web sites to trick recipients into giving out personal information such as credit card data, social security numbers, and passwords.

When armed with a little technical advice and common sense, you can prevent online fraud.
We recommends following these basic steps to avoid becoming a victim of online fraud:


Do's

  • Consider disabling file sharing on your computer.
  • Be careful about opening attachments, especially from unknown senders.
  • Familiarize yourself with a Web site’s privacy policy, especially if you are asked to provide confidential and/or personal data.
  • Review bank and credit card statements regularly.
  • Install and regularly update software firewall, antivirus, and anti-spyware solutions.
  • Keep your Windows operating system and all your applications updated with the latest security patches.
  • Create strong passwords and protect them carefully or consider using password protection software.
  • Shred bank and credit card statements and other financial data before disposal.
  • Check your bank and credit card statements monthly.
  • Strong passwords have eight characters or more, and use a combination of letters, numbers, and symbols.
  • Take advantage of your right to a free annual credit report.
  • If you think you’ve become a victim of ID theft or cybercrime, report it to the proper authorities immediately.

Don’ts

  • Don’t provide personal data to anyone over the phone or in person (for a job or loan application, for example) unless you are certain of the other party’s trustworthiness.
  • Don’t ever give out your personal information in response to an email, a web site you’ve come to through an external link, or a pop-up screen that appears on a real Web site. Open a new browser window and type the URL directly into the address bar to ensure the site is legitimate.
  • Don’t keep financial data on laptops unless absolutely necessary; laptops are far more likely to be stolen than desktops.

What is BETA Version ?

A "beta" is a pre-release version of a product that is available for public testing before the final version of the product is released. Through public testing, they can evaluate how the product performs in "real world" environments and collect valuable feedback from you. We want you to tell us what you like and don’t like about the product and report any problem to the product company.

Your valued opinions will make the products the best they can be and help them exceed the customers’ expectations.

So no harm in trying out BETA softwares .......... go ahead

Transact safely

The Basics: Getting Started

Transaction security describes the safety of your confidential information as it is sent across the Internet, and the need to protect it from con artists who try to steal it for their own benefit.

To protect yourself, We recommend following these basic guidelines:
  • Keep your computer updated with the latest patches and updates as soon as they become available.

  • Make sure your computer is configured securely, especially when it comes to configuring your Web browser and email software. Security and privacy settings can often be configured without any special expertise, simply by using the "Help" feature of your software, or visiting the vendor’s web site.

  • Choose strong passwords and keep them safe. Strong passwords have eight characters or more and use a combination of letters, numbers, and symbols.

  • Review bank and credit card statements regularly.

  • Protect your computer with essential security software, including a software firewall and antivirus protection. We recommend Zone Labs Firewall and Norton Internet Security Suite .

  • Exercise caution when sharing any personal information online.

  • Keep in mind that online offers that look too good to be true usually are.

Norton comes up with AntiBot

Symantec today announced the release of the new Norton AntiBot product to public beta testing. Based on technology licensed from Sana Security, NAB is designed to detect bots and other malware strictly based on behavior, without requiring predefined signatures. The product is designed as a standalone security utility, compatible with Symantec's security solutions as well as with solutions from other vendors.

Google Gears

Google has launched a new product, Gears, which will allow users to have access to online applications while they are offline. This means that even without logging on to the Internet, you can open your mail or read Google news. Gears is an open source software which can be added on to browsers and developed as users deem fit. Using the new tool, people can store their online data in their computer and access it when they are off the Net. When one goes online, the data will be synchronised with that in the web server.


According to Google, Gears ‘fills a gap’ which had always perturbed Net users and makes browsing a ‘seamless experience’. To begin with, Google’s services can be accessed offline. Soon other major sites will shift ‘gears’ to incorporate the new tool.



CLICK HERE TO READ MORE


NOKIA N95 Specifications


Brand Nokia
Type N95
Form factor Slide
Color Silver
Network
GSM Network EDGE, GPRS, GSM, UMTS (3G)
Service 850, 900, 1800, 1900
Connectivity
Bluetooth v2.0 with A2DP
Infrared yes
Wi-Fi (WLAN) yes
USB 2.0
Fax / Data yes
Display
Main display Color TFT
Color display 16.000.000 colors
Dimensions in.
Resolution 240x320 pixels
External display no
Memory
Internal memory 160MB
External memory 2GB
Memory slots 1
Storage types MicroSD
Basic
Battery Lithium Ion 950 mAh (BL-5F)
Standby time 220 hours
Talk time 6.5 hours
Calling
Vibrate alert yes
Photo ID no
Ringtones Monofone, MP3, Polyfone, Realtone / Truetone
Camera
Camera yes
Megapixels 5 megapixels
Maximum photo resolution 2592x1944 pixels
Digital zoom 20x
Optical zoom no
Auto focus yes
Flash yes
Recording video yes
Second (front) camera yes
Messaging
SMS yes
MMS yes
T9 text function yes
E-mail yes
Internet browsing yes
Entertainment
FM radio yes
Java yes
Audio player AAC, eAAC, MP3
Video player 3GP, MPEG4
Features
Add ringtones yes
Organiser Calculator, Calendar, Reminders, Document viewer
Video call yes
Other features Built-in GPS navigation, Voice dial, Voice memo
Format
Weight 4.2 oz.
Dimensions (H x W x D) 3.9x2.1x0.8 in.