Windows 7
64 bit and 32 bit version
Kernel is based on "MinWin", introduced by Eric Traut in October 2007
new graphic system
improved language and handwriting recognition, useable over touch screen
new user interface
new program menues, with a recent list of the latests file and program functions used
Windows XP mode (Windows 7 Professional or higher)The first Windows 7 Release Candidate build 7100 appeared on April 21st, 2009. The operating system can be tested for 30 days without product activation. Microsoft refer as minimum requirements a computer with 1 ghz CPU, 1 gbyte main memory, 16 gbyte free storage and a DirectX 9 graphics card with a WDDM 1.0 driver or higher. Microsoft cooperates closely with Intel so that Windows 7 can use Hyper-threading still better. The Release Candidate contains the Windows Media Player 12, Internet Explorer 8 and the Windows Defender 6.1. Optionally the Windows XP Mode (XPM) can be downloaded from the Microsoft web site for testing purpose. This promises users of Windows 7 Professional and higher to start some older productive Windows XP applications directly from the Windows 7 desktop. To this an configured, virtual image of Windows XP is installed with Windows Virtual PC. Requirement for the hardware virtualization is a computer with Intel-VT or AMD-V processor. Otherwise the XPM will not start. For a fast working are 2 gbyte of main memory and additional 15 gbyte of free hard disk storage recommended.
Windows Vista
improved program compatibility
improved power management
Windows Search 4.0
Support for 64-bit CPU VIA Technologies
Burning Blu-ray media
Improved support for eSATA drives
Bluetooth stereo headphones now possible
RSS feed sidebar improved in performance and response times
Limit of 10 half open, outgoing TCP connections removed
Windows Server 2003
Computer Tips and Tricks
It is no great mystery that major shifts in cultural and societal processes are marked with new advances in technology. This is also true of information technology. The printing press, the camera, the telephone, the computer, the Internet and the cell phone, are all inextricably linked to major changes in human culture. The printing press is linked to the rise of social movements. The photograph and telephone are linked to the birth of the Industrial Revolution. The advent of early computers and television coincides with the first steps towards global consortiums like the League of Nations. Information media changes how we perceive the world around us. The following profiles are two examples of current media that are expected to make a difference in how information is generated and perceived.
ComputerBigLab.com has been designed as a free introductory level, online computer related website, providing tutorials on computer hardware, software, operating systems, and basic troubleshooting, IT glossary, IT certifications and IT interview questions and answers.If you just want to learn more about your computer's hardware, networking, Certifications and other IT related information, here's a good place to start! Read the tutorials, then try the exercises and computer Tests provided. If you have trouble with the review questions, tutorials or any other please let us know.
The computer computer tips, Interview questions, networking and Free tests may also be helpful for those preparing for Certifications exams, preparing for the interview of computer related jobs, and for students, teachers and the IT professionals.ComputerBigLab.com intended to help all the students, teachers, & other computer / IT professionals of the Computer Science & Computer Technology Field. We have sorted out much information to help them all.We are continuously updating our website. If you have any questions, suggestions and feedback please let us know.
We can improve our website in a very progressive way with your help. Your feedback is always welcomed.
Computer Science and Computer Technology has become the vital part of the education throughout the world.
Computer training is possible through formal education attending one of the many colleges or university offering both IT and computer science programs.
The study skills lesson plans should be so structured that it is dynamic and capable of being altered to suit the student’s growing and changing needs. This helps to make the students more focused in their approach, as they are continually involved in the process of change. After all the students are the ultimate beneficiaries. This however does not mean that the content can be ignored. There should be adequate coverage of any topic so that a certain degree of mastery is indicated. Thanks to the technology available along with networking anyone across the globe is now able to access any online hardware around the globe, you can even play games off your phones through the advances in wireless technology.
Whatever study skills lesson plans are drawn up, remember there is no end to it. All plans have only beginnings, for human beings are unique, and it is this uniqueness, which is conceptually infinite. Whatever plan we draw up will be inadequate, but we do require a basic framework from which to operate.
അഭയ കേസ്: പ്രതിഭാഗത്തിന് കോടതിയുടെ വിമര്ശനം
ആണവതീവ്രവാദം വെല്ലുവിളി: മന്മോഹന്സിങ്ങ്
ആണവായുധനിര്മാണത്തെയും ഉപയോഗത്തെയും തടയാന് ആഗോള ആണവനിര്വ്യാപന കരാറിന് ഇതുവരെ സാധിച്ചിട്ടില്ലെന്നതും ഖേദകരമായ കാര്യമാണ്. ലോകപുരോഗതി ലക്ഷ്യമാക്കി പ്രവര്ത്തിക്കുന്ന ഇന്ത്യയുള്പ്പടെയുള്ള ചില രാജ്യങ്ങളുടെ നിരായുധീകരണ ശ്രമങ്ങള്ക്ക് തുരങ്കം വെയ്ക്കുന്ന രാജ്യങ്ങള്ക്കെതിരെ ലോകരാഷ്ട്ര സംയുക്ത സംഘടനകള് കര്ശനനടപടികള് സ്വീകരിക്കണമെന്നും അദ്ദേഹം പറഞ്ഞു. കേന്ദ്രമന്ത്രി പ്രണബ് മുഖര്ജി, ഐ.എ.ഇ.എ ഡയറക്ടര് ജനറല് മുഹമ്മദ് എല് ബരാദി, ദേശീയ സുരക്ഷാ ഉപദേഷ്ടാവ് എം.കെ നാരായണന്, വിദേശകാര്യ സെക്രട്ടറി നിരുപമ റാവു എന്നിവരും സമ്മേളനത്തില് പങ്കെടുത്തു. ഇന്ത്യയുടെ ആണവപദ്ധതികളുടെ ഉപജ്ഞാതാവയ ഹോമി ജെഹാംഗീര് ഭാഭയുടെ ജന്മശതാബ്ദിയോടനുബന്ധിച്ചാണ് സമ്മേളനം സംഘടിപ്പിച്ചത്.
Storage
IBM 726 Dual Tape Drives
Magnetic tape allows for inexpensive mass storage of information and so is a key part of the computer revolution. The IBM 726 was one of the first practical high-speed magnetic tape systems for electronic digital computers. Announced on May 21, 1952, the system used a unique ‘vacuum channel’ method of keeping a loop of tape circulating between two points allowing the tape drive to start and stop the tape in a split-second. The Model 726 was first sold with IBM’s first electronic digital computer the Model 701 and could store 2 million digits per tape—an enormous amount at the time. It rented for $850 a month.
1956
IBM's Rey Johnson in front of RAMAC 350 Disk File
The era of magnetic disk storage dawned with IBM´s shipment of a 305 RAMAC to Zellerbach Paper in San Francisco. The IBM 350 disk file served as the storage component for the Random Access Method of Accounting and Control. It consisted of 50 magnetically coated metal platters with 5 million bytes of data. The platters, stacked one on top of the other, rotated with a common drive shaft.
1961
The IBM 1301 Disk Storage System
IBM 1301 Disk Storage Unit is released. The IBM 1301 Disk Drive was announced on June 2nd, 1961 for use with IBM’s 7000-series of mainframe computers. Maximum capacity was 28 million characters and the disks rotated at 1,800 R.P.M. The 1301 leased for $2,100 per month or could be purchased for $115,500. The drive had one read/write arm for each disk as well as flying heads, both of which are still used in today’s disk drives.
1962
Tom Kilburn in front of Manchester Atlas console
Virtual memory emerged from a team under the direction of Tom Kilburn at the University of Manchester. Virtual memory permitted a computer to use its storage capacity to switch rapidly among multiple programs or users and is a key requirement for timesharing.
Four Views of the IBM 1311 Including Removable Disk Pack
IBM 1311 Disk Storage Drive is announced. Announced on October 11, 1962, the IBM 1311 was the first disk drive IBM made with a removable disk pack. Each pack weighed about ten pounds, held six disks, and had a capacity of 2 million characters. The disks would rotate at 1,500 RPM and were accessed by a hydraulic actuator with one head per disk. [storage] The 1311 offered some of the advantages of both tapes and disks.
1967
The IBM Photo Digital Storage System, code-named Cypress
IBM 1360 Photo-Digital Storage System is delivered. In 1967, IBM delivered the first of its photo-digital storage systems to Lawrence Livermore National Laboratory. The system could read and write up to a trillion bits of information—the first such system in the world.. The 1360 used thin strips of film which were developed with bit patterns via a photographic developing system housed in the machine. The system used sophisticated error correction and a pneumatic robot to move the film strips to and from a storage unit. Only five were built.
1971
IBM 23FD 8
An IBM team, originally led by David Noble, invented the 8-inch floppy diskette. It was initially designed for use in loading microcode into the controller for the "Merlin" (IBM 3330) disk pack file. It quickly won widespread acceptance as a program and data-storage medium. Unlike hard drives, a user could easily transfer a floppy in its protective jacket from one drive to another.
1978
Original Shugart SA400 5 1/4
The 5 1/4" flexible disk drive and diskette were introduced by Shugart Associates in 1976. This was the result of a request by Wang Laboratories to produce a disk drive small enough to use with a desktop computer, since 8" floppy drives were considered too large for that purpose. By 1978, more than 10 manufacturers were producing 5 1/4" floppy drives.
1980
Shugart ST506 5MB Hard Disk Drive
Seagate Technology created the first hard disk drive for microcomputers, the ST506. The disk held 5 megabytes of data, five times as much as a standard floppy disk, and fit in the space of a floppy disk drive. The hard disk drive itself is a rigid metallic platter coated on both sides with a thin layer of magnetic material that stores digital data.
Seagate Technology grew out of a 1979 conversation between Alan Shugart and Finis Conner, who had worked together at Memorex. The two men decided to found the company after developing the idea of scaling down a hard disk drive to the same size as the then-standard 5 1/4-inch floppies. Upon releasing its first product, Seagate quickly drew such big-name customers as Apple Computer and IBM. Within a few years, it had sold 4 million units.
IBM 3380 Disk System
Hard disks are an essential part of the computer revolution, allowing fast, random access to large amounts of data. IBM announced its most successful mainframe hard disk (what IBM called a “Direct Access Storage Device (DASD)” in June of 1980, actually shipping units the following year. The 3380 came in six models initially (later growing to many more) and price at time of introduction ranged from $81,000 to $142,200. The base model stored 2.5 GB of data, later models extended this to 20GB. IBM sold over 100,000 3380s, generating tens of billions of dollars in revenue making the 3380 one of IBM’s most successful products of all time.
1981
Sony 3 1/2
Sony introduced and shipped the first 3 1/2" floppy drives and diskettes in 1981. The first signficant company to adopt the 3 1/2" floppy for general use was Hewlett-Packard in 1982, an event which was critical in establishing momentum for the format and which helped it prevail over the other contenders for the microfloppy standard, including 3", 3 1/4", and 3.9" formats.
1983
Able to hold 550 megabytes of prerecorded data, CD-ROMs grew out of music Compact Disks (CDs). The first general-interest CD-ROM product released after Philips and Sony announced the CD-ROM in 1984 was "Grolier´s Electronic Encyclopedia," which came out in 1985. The 9 million words in the encyclopedia only took up 12 percent of the available space. The same year, computer and electronics companies worked together to set a standard for the disks so any computer would be able to access the information.
Original Bernoulli Box
The Bernoulli Box is released. Using a special cartridge-based system that used hard disk technology, the Bernoulli Box was a type of removable storage that allowed people to move large files between computers when few alternatives (such as a network) existed. Allowing for many times the amount of storage afforded by a regular floppy disk, the cartridges came in capacities ranging from 5MB to 230MB.
1984
IBM 3480 Cartridge Tape System
Magnetic tape allows for inexpensive mass storage of information and so is a key part of the computer revolution. Announced in March 1984, IBM’s new 3480 cartridge tape system sought to replace the traditional reels of magnetic tape in the computer center with a 4” x 5” cartridge that held more information (200MB) and offered faster access to it. IBM withdrew the system in 1989 but the new format caught on with other computer makers who began making 3480-compatible storage systems for several years after that, offering increased storage capacity in the same physical format.
1994
Early Zip Drive with Disks
The Iomega Zip Disk is released. The initial Zip system allowed 100MB to be stored on a cartridge roughly the size of a 3 ½ inch floppy disk. Later versions increased the capacity of a single disk from 100Mbytes to 2GB.
Networking
1970
Computer-to-computer communication expanded when the Department of Defense established four nodes on the ARPANET: the University of California Santa Barbara and UCLA, SRI International, and the University of Utah. Viewed as a comprehensive resource-sharing network, ARPANET´s designers set out with several goals: direct use of distributed hardware services; direct retrieval from remote, one-of-a-kind databases; and the sharing of software subroutines and packages not available on the users´ primary computer due to incompatibility of hardware or languages.
1971
Ray Tomlinson in 2001
The first e-mail is sent. Ray Tomlinson of the research firm Bolt, Beranek and Newman sent the first e-mail when he was supposed to be working on a different project. Tomlinson, who is credited with being the one to decide on the "@" sign for use in e-mail, sent his message over a military network called ARPANET. When asked to describe the contents of the first email, Tomlinson said it was “something like "QWERTYUIOP"”
1972
Wozniak´s "blue box"
Wozniak´s "blue box", Steve Wozniak built his "blue box" a tone generator to make free phone calls. Wozniak sold the boxes in dormitories at the University of California Berkeley where he studied as an undergraduate. "The early boxes had a safety feature — a reed switch inside the housing operated by a magnet taped onto the outside of the box," Wozniak remembered. "If apprehended, you removed the magnet, whereupon it would generate off-frequency tones and be inoperable ... and you tell the police: It´s just a music box."
1973
Ethernet
Robert Metcalfe devised the Ethernet method of network connection at the Xerox Palo Alto Research Center. He wrote: "On May 22, 1973, using my Selectric typewriter ... I wrote ... "Ether Acquisition" ... heavy with handwritten annotations — one of which was "ETHER!" — and with hand-drawn diagrams — one of which showed `boosters´ interconnecting branched cable, telephone, and ratio ethers in what we now call an internet.... If Ethernet was invented in any one memo, by any one person, or on any one day, this was it."Robert M. Metcalfe, "How Ethernet Was Invented", IEEE Annals of the History of Computing, Volume 16, No. 4, Winter 1994, p. 84.
1975
Telenet, the first commercial packet-switching network and civilian equivalent of ARPANET, was born. The brainchild of Larry Roberts, Telenet linked customers in seven cities. Telenet represented the first value-added network, or VAN — so named because of the extras it offered beyond the basic service of linking computers.
1976
The Queen of England sends first her e-mail. Elizabeth II, Queen of the United Kingdom, sends out an e-mail on March 26 from the Royal Signals and Radar Establishment (RSRE) in Malvern as a part of a demonstration of networking technology.
1979
The Shockwave Rider
John Shoch and Jon Hupp at the Xerox Palo Alto Research Center discover the computer "worm," a short program that searches a network for idle processors. Initially designed to provide more efficient use of computers and for testing, the worm had the unintended effect of invading networked computers, creating a security threat.Shoch took the term "worm" from the book "The Shockwave Rider," by John Brunner, in which an omnipotent "tapeworm" program runs loose through a network of computers. Brunner wrote: "No, Mr. Sullivan, we can´t stop it! There´s never been a worm with that tough a head or that long a tail! It´s building itself, don´t you understand? Already it´s passed a billion bits and it´s still growing. It´s the exact inverse of a phage — whatever it takes in, it adds to itself instead of wiping... Yes, sir! I´m quite aware that a worm of that type is theoretically impossible! But the fact stands, he´s done it, and now it´s so goddamn comprehensive that it can´t be killed. Not short of demolishing the net!" (247, Ballantine Books, 1975).
USENET established. USENET was invented as a means for providing mail and file transfers using a communications standard known as UUCP. It was developed as a joint project by Duke University and the University of North Carolina at Chapel Hill by graduate students Tom Truscott, Jim Ellis, and Steve Bellovin. USENET enabled its users to post messages and files that could be accessed and archived. It would go on to become one of the main areas for large-scale interaction for interest groups through the 1990s.
Richard Bartle and Roy Trubshaw circa 1999
The first Multi-User Domain (or Dungeon), MUD1, is goes on-line. Richard Bartle and Roy Trubshaw, two students at the University of Essex, write a program that allows many people to play against each other on-line. MUDs become popular with college students as a means of adventure gaming and for socializing. By 1984, there are more than 100 active MUDs and variants around the world.
1983
The ARPANET splits into the ARPANET and MILNET. Due to the success of the ARPANET as a way for researchers in universities and the military to collaborate, it was split into military (MILNET) and civilian (ARPANET) segments. This was made possible by the adoption of TCP/IP, a networking standard, three years earlier. The ARPANET was renamed the “Internet” in 1995.
1985
The modern Internet gained support when the National Science foundation formed the NSFNET, linking five supercomputer centers at Princeton University, Pittsburgh, University of California at San Diego, University of Illinois at Urbana-Champaign, and Cornell University. Soon, several regional networks developed; eventually, the government reassigned pieces of the ARPANET to the NSFNET. The NSF allowed commercial use of the Internet for the first time in 1991, and in 1995, it decommissioned the backbone, leaving the Internet a self-supporting industry.The NSFNET initially transferred data at 56 kilobits per second, an improvement on the overloaded ARPANET. Traffic continued to increase, though, and in 1987, ARPA awarded Merit Network Inc., IBM, and MCI a contract to expand the Internet by providing access points around the country to a network with a bandwidth of 1.5 megabits per second. In 1992, the network upgraded to T-3 lines, which transmit information at about 45 megabits per second.
Stewart Brand and Larry Brilliant lecturing on the Well, 1999
The Whole Earth 'Lectronic Link (WELL) is founded. Stewart Brand and Larry Brilliant started an on-line Bulletin Board System (BBS) to build a “virtual community” of computer users at low cost. Journalists were given free memberships in the early days, leading to many articles about it and helping it grow to thousands of members around the world.
1988
ARPANET worm
Robert Morris´ worm flooded the ARPANET. Then-23-year-old Morris, the son of a computer security expert for the National Security Agency, sent a nondestructive worm through the Internet, causing problems for about 6,000 of the 60,000 hosts linked to the network. A researcher at Lawrence Livermore National Laboratory in California discovered the worm. "It was like the Sorcerer´s Apprentice," Dennis Maxwell, then a vice president of SRI, told the Sydney (Australia) Sunday Telegraph at the time. Morris was sentenced to three years of probation, 400 hours of community service, and a fine of $10,050.Morris, who said he was motivated by boredom, programmed the worm to reproduce itself and computer files and to filter through all the networked computers. The size of the reproduced files eventually became large enough to fill the computers´ memories, disabling them.
1990
Berners-Lee proposal
The World Wide Web was born when Tim Berners-Lee, a researcher at CERN, the high-energy physics laboratory in Geneva, developed HyperText MarkupLanguage. HTML, as it is commonly known, allowed the Internet to expand into the World Wide Web, using specifications he developed such as URL (Uniform Resource Locator) and HTTP (HyperTextTransfer Protocol). A browser, such as Netscape or Microsoft Internet Explorer, follows links and sends a query to a server, allowing a user to view a site.Berners-Lee based the World Wide Web on Enquire, a hypertext system he had developed for himself, with the aim of allowing people to work together by combining their knowledge in a global web of hypertext documents. With this idea in mind, Berners-Lee designed the first World Wide Web server and browser — available to the general public in 1991. Berners-Lee founded the W3 Consortium, which coordinates World Wide Web development.
1993
Screen Capture from Original Mosaic Browser
The Mosaic web browser is released. Mosaic was the first commercial software that allowed graphical access to content on the internet. Designed by Eric Bina and Marc Andreessen at the University of Illinois’s National Center for Supercomputer Applications, Mosaic was originally designed for a Unix system running X-windows. By 1994, Mosaic was available for several other operating systems such as the Mac OS, Windows and AmigaOS.
Personal computer hardware
Motherboard
Components directly attached to the motherboard include:
The central processing unit (CPU) performs most of the calculations which enable a computer to function, and is sometimes referred to as the "brain" of the computer. It is usually cooled by a heat sink and fan.
The chipset mediates communication between the CPU and the other components of the system, including main memory.
RAM Stores all running processes (applications) and the current running OS. RAM Stands for Random Access Memory
The BIOS includes boot firmware and power management. The Basic Input Output System tasks are handled by operating system drivers.
Internal Buses connect the CPU to various internal components and to expansion cards for graphics and sound.
Current
The northbridge memory controller, for RAM and PCI Express
PCI Express, for expansion cards such as graphics and physics processors, and high-end network interfaces
PCI, for other expansion cards
SATA, for disk drives
Obsolete
ATA (superseded by SATA)
AGP (superseded by PCI Express)
VLB VESA Local Bus (superseded by AGP)
ISA (expansion card slot format obsolete in PCs, but still used in industrial computers)
External Bus Controllers support ports for external peripherals. These ports may be controlled directly by thesouthbridge I/O controller or based on expansion cards attached to the motherboard through the PCI bus.
USB
FireWire
eSATA
SCSI
ഗുണ്ടാസംഘത്തിന്റെ ആക്രമണം: എ.എസ്.ഐക്ക് പരിക്ക്
ഫിലിപ്പെന്സില് കൊടുങ്കാറ്റിലും പേമാരിയിലും 100 മരണം
സ്ത്രീപീഢനത്തിന് ഗായകന് അറസ്റ്റില്
തൃശൂര് മെഡിക്കല്കോളേജിലെ 14 വിദ്യാര്ത്ഥികള്ക്ക് പന്നിപ്പനി
വര്ക്കല കൊലപാതകം: രണ്ടു പ്രതികളെ റിമാന്ഡ് ചെയ്തു
വീട്ടമ്മയുടെയും മകന്റെയും കൊല: ജ്യോല്സ്യന് പിടിയില്
ഇറാന് ദീര്ഘദൂര മിസൈല് പരീക്ഷിച്ചു
ഗ്രനേഡുകളെ തോല്പിച്ച് മനേഷ് വീണ്ടും ജീവിതത്തിലേക്ക്...
അവയവദാനത്തിന് സുരേഷ്ഗോപിയും ഹരിശ്രീ അശോകനും
കോളക്കമ്പനിമൂലം 86 കോടിയുടെ നഷ്ടമെന്ന് പഞ്ചായത്ത്
ജനസേവനത്തിനു പറ്റിയ തൊഴിലായി മാര്ക്സ് കണ്ടത് പത്രപ്രവര്ത്തനം - വി.എസ്.
തിരുവനന്തപുരം: കാള് മാര്ക്സ് ജനസേവനത്തിന് ഏറ്റവും പറ്റിയ തൊഴിലായി കണ്ടതും തിരഞ്ഞെടുത്തതും പത്രപ്രവര്ത്തനമാണെന്ന് മുഖ്യമന്ത്രി വി.എസ്. അച്യുതാനന്ദന് പറഞ്ഞു. സ്വദേശാഭിമാനി രാമകൃഷ്ണപിള്ളയെ നാടുകടത്തിയതിന്റെ ശതാബ്ദി ആചരണം ഉദ്ഘാടനം ചെയ്യുകയായിരുന്നു അദ്ദേഹം. പാളയം രക്തസാക്ഷി മണ്ഡപത്തിനു മുന്നിലേക്കു മാറ്റി സ്ഥാപിച്ച സ്വദേശാഭിമാനി പ്രതിമയുടെ പുനഃസമര്പ്പണവും മുഖ്യമന്ത്രി നിര്വ്വഹിച്ചു. ഉദ്യോഗം തിരഞ്ഞെടുക്കുന്നതില് ഒരു യുവാവിനുണ്ടാവുന്ന ചിന്തകള് എന്ന വിഷയത്തില് പഠനകാലത്ത് മാര്ക്സ് ഒരു പ്രബന്ധം തയ്യാറാക്കിയ കാര്യം വി.എസ്. അനുസ്മരിച്ചു. പണം സമ്പാദിക്കുന്നതിനോ ആഢംബര ജീവിതം നയിക്കുന്നതിനോ പ്രൗഢിക്കു വേണ്ടിയോ ആകരുത് ഉദ്യോഗം എന്ന് മാര്ക്സ് അതില് പറയുന്നു. മറിച്ച് കഷ്ടപ്പാടുകള് പരിഹരിക്കുന്നതിനും അവര്ക്ക് നല്ല ജീവിതം ലഭ്യമാക്കുന്നതിനും വേണ്ടിയുള്ളതാവണം. നിയമവും തത്ത്വശാസ്ത്രവും പഠിച്ച മാര്ക്സ് ജനസേവനത്തിനായി തിരഞ്ഞെടുത്തത് പത്രപ്രവര്ത്തനമാണ്. ഈശ്വരന് തെറ്റു ചെയ്താലും താനത് റിപ്പോര്ട്ട് ചെയ്യുമെന്നായിരുന്നു സ്വദേശാഭിമാനി രാമകൃഷ്ണപിള്ളയുടെ പ്രതിജ്ഞയും പ്രഖ്യാപനവും. അതിന്റെ അന്തഃസത്ത അദ്ദേഹം ഉടനീളം പാലിച്ചു. തിരുവായ്ക്കതിര്വായില്ലാത്ത കാലത്ത് സ്വാതന്ത്ര്യത്തിനു വേണ്ടി സുധീരം നിലകൊണ്ടുവെന്നതും അനീതിയെയും അഴിമതിയെയും നഖശിഖാന്തം എതിര്ത്തുവെന്നതും പത്രധര്മ്മം എന്തെന്നു കാണിച്ചുകൊടുത്തുവെന്നതും ഐതിഹാസികമാണ്. ഉടമയായ വക്കം അബ്ദുള്ഖാദര് മൗലവി നല്കിയ കലവറയില്ലാത്ത സ്വാതന്ത്ര്യവും പിന്തുണയുമാണ് സ്വദേശാഭിമാനി പത്രത്തെ നീതിക്കുവേണ്ടിയുള്ള പടവാളാക്കി മാറ്റാന് രാമകൃഷ്ണപിള്ളയ്ക്കു കരുത്ത് പകര്ന്നതെന്ന് വി.എസ്. പറഞ്ഞു. രാമകൃഷ്ണപിള്ളയെ മാധ്യമപ്രവര്ത്തകര് മാതൃകയാക്കാമെന്നു പറയുംപോലെ മാധ്യമ ഉടമകള് വക്കം മൗലവിയെ മാതൃകയാക്കണമെന്ന് ഇന്നു പറയാന് കഴിയുമോ എന്നതൊരു പ്രശ്നമാണ്. മാധ്യമങ്ങള് വന്വ്യവസായമായി മാറിയതോടെ മാധ്യമസ്വാതന്ത്ര്യം ആരുടെ അഭിപ്രായ സ്വാതന്ത്ര്യം എന്ന പ്രശ്നമുണ്ടെന്നും അദ്ദേഹം വിലയിരുത്തി.മാധ്യമസ്വാതന്ത്ര്യത്തിനായുള്ള പോരാട്ടത്തിന് ഇന്നും പ്രസക്തിയുണ്ടെന്ന് പ്രതിപക്ഷനേതാവ് ഉമ്മന്ചാണ്ടി പറഞ്ഞു. ജനാധിപത്യത്തിന്റെ ഏറ്റവും വലിയ ശക്തി മാധ്യമസ്വാതന്ത്ര്യമാണ്. ഒരു തിരുത്തല്ശക്തിയായി ജനാധിപത്യ സമൂഹത്തില് മാധ്യമങ്ങള് നിലനില്ക്കേണ്ടത് എല്ലാവരുടെയും വിശേഷിച്ചും ജനാധിപത്യ പദവികള് വഹിക്കുന്നവരുടെ ആവശ്യമാണ്. ചോദ്യം ചെയ്യാനും ചൂണ്ടിക്കാട്ടാനും ആരുമില്ലെങ്കില് അറിയാതെയാണെങ്കിലും തെറ്റുകള് വന്നുകൊണ്ടിരിക്കുമെന്ന് അദ്ദേഹം ചൂണ്ടിക്കാട്ടി. സമൂഹത്തിന്റെ എല്ലാ മേഖലകളിലും സംഭവിച്ചുകൊണ്ടിരിക്കുന്ന ജീര്ണ്ണത, അധഃപതനം എന്നിവയില് നിന്ന് പത്രപ്രവര്ത്തനവും മുക്തമല്ലെന്ന് വിദ്യാഭ്യാസ മന്ത്രി എം.എ. ബേബി പറഞ്ഞു. പാശ്ചാത്യരാജ്യങ്ങളില് ഇത്തരം പ്രവണതകളില് ഇടപെട്ടു നിയന്ത്രിക്കാന് പ്രസ്ഥാനങ്ങളുണ്ട്. ഇവയുടെ പ്രവര്ത്തനഫലമായി വന്കിട പത്രങ്ങള്ക്കു പോലും തെറ്റുകള് ഏറ്റുപറയേണ്ടി വരുന്നു. ഇതുപോലുള്ള തിരുത്തല് പ്രസ്ഥാനങ്ങള് ആവശ്യമില്ലേ എന്ന കാര്യം ചിന്തിക്കണമെന്ന് അദ്ദേഹം നിര്ദ്ദേശിച്ചു. നിയമമന്ത്രി എം.വിജയകുമാര് അദ്ധ്യക്ഷത വഹിച്ച ചടങ്ങില് പി. ഗോവിന്ദപ്പിള്ള സ്വദേശാഭിമാനി അനുസ്മണ പ്രഭാഷണം നടത്തി. ഭക്ഷ്യമന്ത്രി സി. ദിവാകരന്, എ. സമ്പത്ത് എം.പി., എം.എല്.എ.മാരായ വി. ശിവന്കുട്ടി, മാങ്കോട് രാധാകൃഷ്നന്, മേയര് സി. ജയന്ബാബു, ജില്ലാ പഞ്ചായത്ത് പ്രസിഡന്റ് ആനാവൂര് നാഗപ്പന്, മുന് എം.പി. വര്ക്കല രാധാകൃഷ്നന്, ചീഫ് സെക്രട്ടറി നീലാ ഗംഗാധരന്, ഇന്ഫര്മേഷന് സെക്രട്ടറി ഷീലാ തോമസ്, കേരള പത്രപ്രവര്ത്തക യൂണിയന് പ്രസിഡന്റ് കെ.സി. രാജഗോപാല്, മുന് പ്രസിഡന്റ് സി. ഗൗരീദാസന് നായര്, പബ്ലിക് റിലേഷന്സ് ഡയറക്ടര് എം. നന്ദകുമാര് തുടങ്ങിയവര് സംബന്ധിച്ചു. സ്വദേശാഭിമാനി എഴുതിയ 'എന്റെ നാടുകടത്തല്', സ്വദേശാഭിമാനിയുടെ മുഖപ്രസംഗങ്ങളുടെ സംഗ്രഹം, ജനപഥം സ്വദേശാഭിമാനി പതിപ്പ് എന്നിവയുടെ പ്രകാശനവും എം.എ. റഹ്മാന് സ്വദേശാഭിമാനിയെക്കുറിച്ച് സംവിധാനം ചെയ്യുന്ന ഡോക്യുമെന്ററിയുടെ സ്വിച്ചോണും ചടങ്ങില് നടന്നു.
കേരളത്തില് തീവ്രവാദികള് പിടിമുറുക്കിയെന്ന് ഐ.ബി.
എലിശല്യം: എയര് ഇന്ത്യ വിമാനം വൈകി
Death row Iraqis among 8 escapees recaptured
Two of the prisoners were captured Saturday morning in Samarra by security forces conducting house-to-house searches.
U.S. forces have provided military working dogs at the request of the local Emergency Response Unit to search the compound near the jail from which the escapes occurred.
Multi-national forces searched the city and outlying areas from the air.
Three of the eight recaptured prisoners had previously been sentenced to death for crimes that include killing and kidnapping, officials said.
Police launched the manhunt after the prisoners fled through an air vent and then climbed over a concrete prison wall. Iraqi special forces have been called into the search and border guards have been alerted to ensure the men don't cross into a neighboring country, police said.
Police have distributed pictures of the fugitives throughout Salaheddin province, where Tikrit is located.
The Iraqi Interior Ministry has taken charge of the investigation and all prison guards at Tikrit are being investigated, police said. The prison holds more than 400 inmates.
Al Qaeda in Iraq is an insurgent group that pledged its allegiance to Osama bin Laden's al Qaeda terror network in 2004, after the U.S.-led invasion of Iraq. Its members largely are native Iraqis, but they also include foreign fighters, and foreigners have been the group's prominent leaders.
Tikrit, the hometown of former Iraqi dictator Saddam Hussein, is about 160 km (99 miles) north of Baghdad.
Death row Iraqis among 8 escapees recaptured
Two of the prisoners were captured Saturday morning in Samarra by security forces conducting house-to-house searches.
U.S. forces have provided military working dogs at the request of the local Emergency Response Unit to search the compound near the jail from which the escapes occurred.
Multi-national forces searched the city and outlying areas from the air.
Three of the eight recaptured prisoners had previously been sentenced to death for crimes that include killing and kidnapping, officials said.
Police launched the manhunt after the prisoners fled through an air vent and then climbed over a concrete prison wall. Iraqi special forces have been called into the search and border guards have been alerted to ensure the men don't cross into a neighboring country, police said.
Police have distributed pictures of the fugitives throughout Salaheddin province, where Tikrit is located.
The Iraqi Interior Ministry has taken charge of the investigation and all prison guards at Tikrit are being investigated, police said. The prison holds more than 400 inmates.
Al Qaeda in Iraq is an insurgent group that pledged its allegiance to Osama bin Laden's al Qaeda terror network in 2004, after the U.S.-led invasion of Iraq. Its members largely are native Iraqis, but they also include foreign fighters, and foreigners have been the group's prominent leaders.
Tikrit, the hometown of former Iraqi dictator Saddam Hussein, is about 160 km (99 miles) north of Baghdad.
Twin blasts kill 15 in northwest Pakistan
Six people died when a police station in the Bannu district of North West Frontier Province was targeted by a suicide car bomb, police said.
The suicide bomber was in a truck packed with an estimated 160 kg (353 pounds) of explosives, police said. Among the 55 people injured were 28 policemen and 27 civilians. Dozens of nearby shops and buildings were destroyed.
Police arrested a suspect near the Maidan police station.
Another eight people were killed five hours later in the provincial capital of Peshawar after a bomb exploded in the central business district, according to government official Sahibzada Anis Khan.
The blast occurred near a state-owned bank and a military hospital in Peshawar's Saddar market. Police arrested two suspects at the scene but did not say how they were connected to the lethal attack.
Abdul Hamid, the chief executive of Lady Reading Hospital in Peshawar, told CNN that the eight people killed were brought to the hospital and another 45 injured people -- five of them in critical condition -- were being treated.
The head of Peshawar police's bomb disposal squad, Shafqat Malik, told CNN affiliate Geo TV that the Peshawar blast was the work of a suicide car bomber. He said the car was packed with about 100 kg (220 pounds) of explosives.
Seconds before the bomb went off, the suicide attacker lobbed several grenades from the car in an apparent attempt to clear his way and get closer to his target, Malik said.
Khan told CNN that the grenades did not explode.
Police said the suicide bomber's intended target was not immediately clear.
A third bomb exploded Saturday afternoon inside a book store in Gilgit, a city in an autonomous region near the Indian border, police official Wazir Awan said. A store salesman was killed and five others were injured, Awan said.
No one has claimed responsibility for any of Saturday's three attacks.
പി.എസ്.സി. ലിസ്റ്റുകള്
രക്തദാന ദിനാചരണം; ജില്ലാതല ഉദ്ഘാടനം ഒന്നിന്
ഭാരതീപൂജ 28ന്
സൗജന്യ ചലച്ചിത്ര പരിശീലനക്കളരി 28ന്
പുണെയില് പൊതുസ്ഥലത്ത് തുപ്പിയാല് പിഴ 1000 രൂപ
തീവ്രവാദം: മാറേണ്ടത് പാകിസ്താന്റെ നിലപാടെന്ന് മന്മോഹന്സിങ്
Block Or Unblock Websites without software !
Lost your Windows password? Here’s what you can do to get around
Due to the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
You have several options to try and get around this problem.
If you have access to another user account with administrator rights, you can use that account to change the password of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.
First you need to boot the system into Safe Mode.
- Restart your system.
- When you see the blue screen, press the ( F8 ) key about 3 times a second.
- You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode).
- Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).
- The system should boot to Safe Mode.
Once you are at the Account Log on Screen, click on the icon for the user account with administrator rights, or click on the icon for the administrators account.
Note: For Home the Administrator account isn’t normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show. For PRO you can do this in normal mode
When the system has booted to the desktop, use the following steps to change the accounts password.
- Click Start, Control Panel, Administrative Tools.
- Click Computer Management.
- Double click Local Users and Groups, double click the folder Users.
- Right click on the account name that is locked out, and click on Set Password.
- You may get a warning message about changing the password, simply click proceed.
- Leave the New Password box blank, also leave the Confirm Password box blank.
- Click OK, and OK again.
- Then close all Windows, reboot the system and try to log in.
There are also applications that can recover the password for you.
If the above information does not help in recovering the password, the only option left is to format the hard drive then reinstall Windows and the system softwareComputer Reboot automatically and gives Stop Error 0x0000007E, BSOD error
Stop Error 0x0000007E After SP3 is installed , Gives BSOD Stop Error for a second and reboot again.Problem after installation of Windows XP Service Pack 3. Computer Restarts after start up, it prompts for a reboot. This process will continue unless the computer is started in Safe Mode. In Safe mode the computer boots correctly and everything seems fine.
This problem only appears on some systems after upgrading to SP3. This particular problem on systems that have been prepared with SysPrep. The sysprep image was created on an Intel based computer, and then the sysprep image is deployed on a Non-Intel system such as an AMD processor. In these cases, the registry entry for Intelppm is incorrectly set and causes the computer to go into a continuous reboot after the service pack has installed.
How Can I Solve This Problem?
Follow these steps to resolve this issue with the computer not booting correctly after SP3 is installed.
1) Start your computer in Safe Mode.
2) Click on Start, Run, and type REGEDIT and press Enter. This will open the Registry Editor.
3) Click the pluses(+) next to the following registry keys to navigate to the correct spot. HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesIntelppm4) In the right hand column find the entry titled START and double-click on it
5) Change the number to 4 and click Ok
6) Close the Registry Editor
7) Shut down your computer and restart
This time the computer should restart normally and finish the installation of SP3.
Show Hidden Files and Folders not working?
Show Hidden Files and Folders not working?..... If we selecte the radio button “Show hidden files and folders” and then press Ok.. the changes would just disappear upon opening the dialog again. It was probably some virus attack after which the Windows registry was not being updated properly. So here is what methods to restore it back. There are so many methods to restore back the registry. If one method is not working, please try another one.
Method 1:
Go to registry editor by running regedit in the run box.
Go to this key:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Explorer\Advanced
In the right hand area, double click hidden and change the value to 1.
Now you’re all set to go. Check it in your tools menu if the changes have taken effect.
Method 2:1. Click “Start” -> “Run…” (or press Windows key + R)
2. Type “regedit” and click “Ok”.
3. Find the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
Advanced\Folder\Hidden\SHOWALL
4. Look at the “CheckedValue” key… This should be a DWORD key. If it isn’t, delete the key.
5. Create a new key called “CheckedValue” as a DWORD (hexadecimal) with a value of 1.
6. The “Show hidden files & folders” check box should now work normally. Enjoy!
1- Click Start –> Run –> regsvr32 /i browseui.dll –> enter
A confirmation message will appear like given below
2- Click Start –> Run –> regsvr32 /i shell32.dll
Wait for the confirmation and click OK.
If none of the above methods work, please download our Smart Virus Remover from here:
Smart Virus Remover (652.8 KiB, 346,268 hits)
Using this Virus Remover please restore your Windows settings and your show hidden files and folders will be set to default.
Please spare a few moments from your precious time and tell us about your experiences.
How to Avoid Having Your AdSense Accout Banned for Click Fraud
If you trawl through the AdSense message boards you can’t help but come across tales of woe from AdSense publishers that have had their account banned by Google.
Below is a list of ways people have been banned from AdSense and information on how to avoid it happening to you.
Don’t click on your own ads
The obvious one but still people do it. Google has the IP address of the computer/s that you’ve used to create and check your AdSense account. If it sees that this IP address clicks one of your ads you’re in trouble.
Don’t do it. It’s theft. Not from Google but from the AdWords advertisers.
If you want to go to a site advertised by one of your ads don’t click on it look at the URL of the advertising site at the bottom of the ad and type it into your browser.
If you click on one accidentally (which does happen) you’re probably be ok but it’s worth dropping a quick email to Google with an explanation and apology
Don’t log in to AdSense from a shared computer.
As I said above Google keeps a record of every machine IP address used to look at your account. If you check your stats on a machine then someone else clicks on your ads from the same machine Google sees this as click fraud. Worth bearing in mind when thinking of checking your stats from somewhere like an Internet Café.
Don’t log in to your AdSense account from work.
Apart from getting in trouble with the company that employs you there’s also a further real risk. Most companies use a proxy server to access the Internet. A proxy server with ONE IP ADDRESS. Therefore you checking your ads from work means this proxy IP address being recorded by Google as one that you use. Problem is if there are 1000 people in your company it is the same IP address for them too. Google can’t differentiate between you and the other 999 employees in your company. If one of these 999 clicks on one of your ads it’s ban time.
Don’t get into a ‘I’ll click your ads if you click mine’ agreement with another Webmaster.
As above Google will have your IP address and that of every AdSense publisher. If they see these IP addresses consistently clicking on each other ads it’s goodbye for both of you.
Don’t tell friends and family.
Telling friends and family about your money making websites can lead to problems. Even if you tell them not to click on your ads there’s always the chance that Auntie Maud will think it’s a good idea to make some extra money for her favourite nephew. 100 clicks later from the same visitor and your account is screaming ‘Click Fraud’.
Receiving clicks from illegal traffic
Check the AdSense TOS for sources of traffic that aren’t allowed by Google. These include methods like Traffic exchange, PTC advertising, Auto surf etc.
Do monitor your visitor and AdSense figures
Check your account at least once a day. If you see a massive spike coupled with a massive increase in Page CTR investigate using your visitor stats website. If you see it’s all come from the same IP address you could have been the victim of a malicious attack – inform Google via email and offer them access to your logs
BidVertiser.com - Make Money from your Website or Blog
www.bidvertiser.com
Join BidVertiser now and they will turn your advertising space into cash! Simply display the BidVertiser text ads on your website and let advertisers bid against each other!
If you have been banned from Google Adsense or wish to extend your publisher revenue, BidVertiser is just a perfect option
Download Complete Websites to your Desktop and surf them offline
Whether you browse the web for research, work, or fun, there's nothing worse than having to wait for page after page to load in Internet Explorer or Netscape Navigator (or in other popular browsers). The problem is they will only load one page at a time. So if you are viewing a large website with a thousand pages, you'd have to click the mouse a thousand times ... and ... choose a directory/folder a thousands times when you want to save each file. You end up spending a lot of time waiting around and not enough time reading or viewing pages on the Internet.
Note: Using a regular browser to surf large websites or photo galleries takes the fun out of web browsing and makes research a real chore.
But now, with WebSite eXtractor, you can download whole websites (or parts of them) in one go to your computer. You can then view the whole site offline at your leisure - and you can whiz through the saved pages at lightning speed.
WebSite eXtractor is a great tool for researchers, journalists, students, equity analysts, business and marketing executives - as well as for those who want to browse family websites containing digital photo albums.
Advantages :
- Transfer whole websites to CD-ROM or floppy
- Another big benefit of the program is it changes html-links to relative names. In other words, it turns web addresses (URLs) into addresses that work on your computer.
- Researchers, writers, and journalists can easily archive reference material from the Internet.
- The program can download up to 100 files at a time, which saves you a huge amount of time compared to ordinary browsers.
- Website eXtractor automatically lets you download any files that were not copied due to transfer errors or bad connections.
To download the full version use the given torrent :
http://torrents.thepiratebay.org/3655896/Website_eXtractor_9.52_Retail.3655896.TPB.torrent