Jump to content
Reliance Jio & Reliance Mobile Discussion Forums

Vishal Gupta

RIM Guru
  • Content count

    1,896
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by Vishal Gupta

  1. Download Bitpim

    BitPim 0.7.35 development release is available. List of Changes Download Bitpim 0.7.35
  2. LG RD2030 Clock Settings

    There is no way to adjust the clock in the phone! It always tell the correct time. So no need to worry. U can correct ur office clock time with it...
  3. Lg Rd 2030 (rconnect Problem)

    Most probabily Cable problem!!! Try 2 things! 1.) Check another cable with ur phone. 2.) Check other phone with ur cable. U'll be able to know whats the cause of problem...
  4. Windows Vista will include a new technology known as Freeze Dry designed to maintain application states and unsaved documents even when patches are automatically applied and PCs are rebooted. Speaking at the Australian Tech Ed conference on the Gold Coast in Queensland this week, senior product manager Amy Stephan offered a preview of the Freeze Dry technology. Many IT managers plan to automatically install patches and updates on machines during periods when they are inactive, such as overnight or on weekends. However, as some patches require machines to reboot, users who leave documents open and unsaved run the risk of losing that data if the machine is automatically updated. Freeze Dry eliminates that problem by automatically saving application state and documents and then restoring them once the system restarts, Stephan said. Microsoft has promoted the general concept of saving application state in earlier discussions of Windows Vista, formerly codenamed Longhorn, but hasn't previously revealed the Freeze Dry moniker. A new point release of Vista is expected at the Professional Developers Conference in Los Angeles later this month. Officials said this week that beta 2 of the operating system is on target for a wider release before the end of the year. The software giant isn't the first company to try and grab the Freeze Dry name. In 1999, Hewlett-Packard released a Java compression technology called FreezeDry, and took out a US trademark on the name. However, the technology failed to attract widespread attention, and HP let the trademark lapse in July 2002.
  5. BIRTHDAY WISHES!

    Happy Birthday...
  6. Last week, the Internet Storm Center, a group of security professionals that track threats on the Net, flagged a flaw in how a common Microsoft Windows utility and several anti-spyware utilities detect system changes made by malicious software. By using long names for registry keys, spyware programs could, in a simple way, hide from such utilities yet still force the system to run the malicious program every time the compromised computer starts up. Already, some spyware authors seem to be playing with the rudimentary technique to try and hide their programs, said Tom Liston, a handler for the Internet Storm Center and a network security consultant for Intelguardians. "We have seen indications that someone is trying this technique out," Liston said. "Basically, we have seen code that is stuffing a key in the registry with a huge length. Yet, the author still doesn't have it working." A Microsoft representative said that the company is investigating the report, but does not consider the problem an operating system flaw. "Our early analysis indicates that this attempt to bypass these features is not a software security vulnerability, but a function within the operating system that could be misused," the company said in a statement. "Microsoft is reviewing the report to determine further details and whether there is any potential impact for customers and will provide appropriate customer guidance if necessary." The potential threat comes as more malicious software has started to use various techniques to attempt to escape detection. Some attackers have merely used targeted Trojan horses and customized spyware to evade defensive software. Such techniques are believed to be the reason that a sustained attack on US and UK government agencies and industry has largely gone unnoticed. The creators of more advanced rootkits - software designed to stealthily and completely compromise a system -are starting to add memory-hiding to their bag of tricks, said Greg Hoglund, CEO of software analysis firm HBGary and author of the recently published ROOTKITS: Subverting the Windows Kernel. Hoglund discussed the technique at the Black Hat Security Briefings and DEF CON hacker convention in July. "Spyware is the biggest problem right now, and the people that are writing it are starting to get a clue, and that's a scary trend," Hoglund said. The potential for hiding the execution of programs using overly long registry keys, on the other hand, is much smaller, because Microsoft and affected security software vendors will likely fix the affected utilities soon, he said. "None of the people that I know who are writing rootkits would not use this method to hide the key," he said. The technique involves using a registry key whose name is longer than 256 bytes. The Windows Registry holds important system data, including what programs to run at startup. The long key and any of its subkeys are not seen by the affected utilities, but can be read by the system just fine. By using the technique, a malicious program could run every time a computer is started, but keep its execution a secret from the utilities, the Internet Storm Center said. Programs that apparently cannot detect malicious software using the registry technique include AdAware, Microsoft's Anti-spyware Beta, Norton SystemWorks 2003 Pro, Registry Explorer and WinDoctor, according to an ISC posting. The Internet Storm Center could not create a definitive list, because the programs apparently acted differently on non-English versions of Windows. Symantec, the creator of the Norton brand of system utilities, is the owner of SecurityFocus. The technique works against Microsoft's RegEdit utility, but other system utilities, such as Reg.exe and the Microsoft Configuration Editor, are not affected, the software giant stated. The developers of the affected programs are already working on fixes for their products. If Microsoft fixes the RegEdit issue, it may also solve the issue for other vendors, ISC's Liston said. "It should be something that Microsoft should be able to address in the next monthly update," he said. "There are a lot of programs out there that do things like look at the registry that are affected by this." While the technique may only be useful for a limited time, spyware authors will likely incorporate it into their programs, said Joe Stewart, senior researcher for security firm Lurhq. Another major threat, bot software, will likely not use the technique, he said. "Spyware usually does a much better job of hiding itself in the registry than bot software," Stewart said. "Even though bots are often used for spyware, adware or other financially motivated activity, they are programmed as if they were just general-purpose utilities - for some reason they almost always go with the tried-and-true 'Run' registry key." System integrity checkers and security software should attempt to detect more surreptitious techniques like registry hiding, added HBGary's Hoglund. Hoglund and two other researchers have modified a common rootkit using techniques, ironically, taken from a way of protecting against buffer overflows, a common software flaw. The memory cloaking allows a rootkit to run its own code while hiding that code from detection by the operating system. Such techniques will likely become common in malicious software in the near future, he said. Hoglund stressed that security software makers have to start thinking more like attackers and adding more advanced detection capabilities to their products. "If your security tools aren't also using rootkit-like techniques, then they can be subverted easier," he said.
  7. Microsoft is about to announce that it is acquiring an Internet start-up called Teleo. Teleo is developing a voice over IP technology that is similar to what is found in Skype and the new Google Talk. Sources say that Microsoft intends to integrate this technology into an upcoming version of MSN. Teleo's voice over IP technology revolves mostly around making calls to normal phones. Presently, Teleo offers a monthly $4.95 service that allows users to make calls to traditional phones for 2 cents per minute world-wide. It also provides users with their own unique phone number that allows users to call them via a regular phone (imbound calling). In essence, users receive their own universal net phone number and users can call it with their regular phones. Other features include being able to insert click-to-call commands in email and webpages, conferencing, call forwarding, voice mail, and more. The acquisition puts MSN in a more direct head to head competition with Skype and Google's recently released "Google Talk". When these features will first show up in MSN is anyone's guess.
  8. Very Strange R Connect Problem

    Now I'm facing the same problem. As soon as I'm trying to download ne file, speed is going down. I'm getting very poor speed. JAAGO! RELIANCE WALE JAAGO!!!
  9. Microsoft Sets Its Sites On Google Talk

    Microsoft announced it has acquired Teleo Inc., a provider of Voice over Internet Protocol (VoIP) software and services that enable people to place phone calls from PCs to traditional phones while delivering this technology in unique ways through a variety of software and Web applications. Combining the technology and expertise of Teleo with Microsoft’s existing VoIP investments in MSN is expected to help advance efforts to connect people to the information and people that matter to them ultimately enhancing the integration of rich voice capabilities throughout MSN communication and information services, including MSN Messenger. What is Teleo? Founded in 2003, Teleo’s initial beta offering, also called Teleo, allowed customers to use their PC to make VoIP calls to cell phones, regular phone or PCs. Through its integration with Microsoft Outlook and Internet Explorer, the Teleo service also facilitated “click to call” dialling of any telephone number that appears on screen – such as within a Web site, search results or e-mail. What has happened to the Teleo beta? Teleo has discontinued its beta offer. How will customer data collected by Teleo be used by Microsoft? Customer data collected by Teleo will only be used for resolving billing and technical issues and will not be used for marketing purposes without the customer’s consent. What does Microsoft plan to do with the Teleo service? Microsoft plans to incorporate and expand upon Teleo’s technologies, integrating them into the MSN services infrastructure, with plans to ultimately deliver new VoIP consumer applications in future releases of MSN services, such as MSN Messenger. Where can I use VoIP services now? The new version of MSN Messenger allows users to talk to each other online, PC to PC, with no call charges. Additionally, if both users have a webcam installed they can also have a full screen video conversation – all this, and much more, completely free of charge!
  10. Non SMS Stuff

    My English Professor # Inside the Class: * Both of u three, get out of the class. * (Facing the Board) Dont talk in front of my back. * Open the doors of the window. Let the atmosphere come in. * Cut an apple into two halves - take the bigger half. * Shhh... quiet, boys... the principal just passed away in the corridor. * You, meet me behind the class. (meaning AFTER the class...) * Close the doors of the windows please... I have winter in my nose today. * Take Copper Wire of any metal especially of Silver. * Take 5cm wire of any length. * shhh... quite, the principal is rotating in the school. # About his family: * I have two daughters. Both of them are girls...(?) # At the ground: * All of you, stand in a straight circle. ( u know who said this ) * There is no wind in the ball. # To a boy, angrily: * I talk, he talk, why you middle middle talk? # Giving a punishment: * You, rotate the ground four times... * You, go and under-stand the tree... * You three of you, stand together separately. * Why are you late - say YES or NO... (?) # Sir at his best: Sir had once gone to a film with his wife. By chance, he happened to see one of our boys at the theatre, though the boy did not see them. So the next day at school (to that boy): "Yesterday I saw you WITH MY WIFE at the Cinema Theatre"
  11. Non SMS Stuff

    PROFESSIONAL MATRIMONIAL ADS SOFTWARE ENGINEERS: Wanted a Girl with a Lovely Look & Feel, Good GUI with Security features(privileges only for the Specific User especially critical Functionalities).There must not be any Critical or Medium Bug in her. Low Bugs can be deferred But needs to B fixed by the Next Build. She must _NOT_ be PLATFORM INDEPENDENT or USER FRIENDLY. We are ready to Test the Application & CERTIFY the product but we will assure it will never be released to ANY OTHER Customer. DOCTOR: Recently a love-bug injected in me a strange bacteria, making me desirous of marriage. I'm looking for a girl who is patient and has knowledge of all ills and pills, is religious minded and keeps away from all sins be it anasin, metasin or crosin. I promise to be a good doctor with no side effects. Apply or reply. BEGGAR: Allah ke naam pe koi ek biwi de de, Doosre ki nahi to apni hi de de, Allah tujhe ek ke badle do dega, Hillary hogi to Monika bhi dega LAWYER: I hereby beg to solicit myself as an eligible candidatefor the post of husband after marriage. The person whom I'm looking for should be strictly a girl. The girl should be strictly a girl. The girl should be willing to surender to the service and jurisdiction of My Lordi.e.Myself. Any objection would be overruled and will not be sustained. Apply in confidence and if you have the confidence. BANKER: Wanted wife who takes interest in me and credits me with her service. SHAYAR: Badi muddat ke baad ek arzoo jaagi hai, Ki hum bhi shadi shuda ho jaye, Kya vajah shadi karane ki jo kahde sahi sahi, To yaaron ab khud se kaam ghar ka hota nahi. DRUNKARD: wanted a girl. Girl's father should preferably have a soda factory. I am an occasional alchoholic who drinks only when friends come home. Friends come home only seven times a week. Girl preffered will carry me from bar to ghar. Meet personally or send soda for trial. Sample should be ample. CAR MECHANIC: Wanted a sturdy wife. Should be in working condition. Should be above average and must run the household at a good average............
  12. BIRTHDAY WISHES!

    Happy B'day!!!
  13. Downloading The Ringtone Thorugh The Mms.

    It has been so many times discussed in the forum. So pls search before posting!! Closing Topic...
  14. According to very recent internal Microsoft documentation, the software giant is planning an aggressive release schedule for several products over the next year or so. Windows Vista ....Microsoft is planning to ship Windows Vista Beta 2 in late 2005, not in early 2006. According to internal documentation, Vista Beta 2 is scheduled to be "feature complete" by September 29, 2005. Then, Vista Beta 2 will enter lockdown mode between October and November 9, 2005. After that date, Vista Beta 2 will be in escrow and will ship on December 7, 2005, about 3 weeks later. What about post-Beta 2? According to a second set of documentation viewed yesterday, Microsoft will ship Vista Release Candidate 0 (RC0) on April 19, 2006, and Windows Vista RC1 on June 28, 2006. Microsoft currently plans to release Vista to manufacturing on August 9, 2006, and make the product broadly available by November 15, 2006. Longhorn Server Except for the release to manufacturing (RTM) date, all the Vista dates apply to Longhorn Server as well. But once we reach summer 2006, Longhorn Server will fork from the Vista client release schedule. We'll see an RC2 release of Longhorn Server on October 18, 2006, and the RTM release on January 10, 2007, according to the latest documentation. That's a much earlier release date than previously anticipated. WinFS Microsoft surprised a lot of people by shipping WinFS Beta 1 yesterday (see more at source), and as it turns out, the project is suddenly well ahead of schedule. In the more recent schedule, WinFS Beta 1 will be followed by at least one Community Technology Preview (CTP) release, which is currently due February 15, 2006. Then, on May 1, 2006, Microsoft will release WinFS Beta 2. Beta 3 is currently scheduled for November 15, 2006, with a Beta 3 Refresh release expected in April 2007. WinFS is currently scheduled for RTM in third quarter 2007, well after Longhorn Server. SQL Server 2005 SQL Server 2005 will ship within months. On September 13, 2005, the first day of the Professional Developers Conference (PDC) 2005, Microsoft will announce that SQL Server 2005 has hit the RC1 milestone, and the company will place the code into escrow in anticipation of the final release. The English language version of SQL Server 2005 is currently expected to RTM on October 14, 2005, about 3 weeks before its public launch. Other language versions will ship in December 2006 and January 2007.
  15. BIRTHDAY WISHES!

    Happy Birthday!!!
  16. Thats a good Idea! But pls create separate threads for these things. There is already a thread running for ringtones for Nokia 6255: Ringtones For Nokia 6255 So If u want to download / upload ringtones, use the above mentioned thread! And this thread will be used for sharing wallpapers for Nokia 6255. And if u also want to share MMS clips / movies for it, u can start new thread for it! < Topic Title Changed >
  17. Php Tutorial

    Following is a gr8 tutorial with images: PHP Tutorial: Installation
  18. BIRTHDAY WISHES!

    Happy Birthday!
  19. Credit Limit On Reliance Postpaid Subscribers

    I too got an extra page in my FWP BILL today about my Credit Limit. They set my Credit Limit to Rs. 6,500.00. PS: My bill is always under 2K. most of the times its between 1700 -1800.
  20. All About Nokia 6255

    I think tanveer was talking about PC Suite for Nokia phones. Its available on Nokia site...
  21. Non SMS Stuff

    Interpreting women's vocabulary Fine This is the word women use to end an argument when they are right and you need to shut up. Five Minutes If she is getting dressed, this is half an hour. Five minutes is only five minutes if you have just been given 5 more minutes to watch the game before helping around the house. Nothing This is the calm before the storm. This means "something" and you should be on your toes. Arguments that begin with "nothing" usually end in "fine". Go Ahead This is a dare, not permission, DON'T DO IT! Loud Sigh Although not actually a word, the loud sigh is often misunderstood by men. A "Loud Sigh" means she thinks you are an idiot and wonders why she is wasting her time standing here and arguing with you over "Nothing". That's Okay This is one of the most dangerous statements that woman can make to a man. "That's Okay" means that she wants to think long and hard before deciding how and when you will pay for your mistake. Thanks This is the least used of all words in the female vocabulary. If a woman is thanking you. Do not question it, just say you're welcome and back out of the room slowly.
  22. Modaco Summer Event 2005 C550 Theft

    That was brilliant Idea...
  23. Very Strange R Connect Problem

    Yah! Me too getting some better speed now. But not like it was before some days...
  24. Virus/worm

    Do what Arun has suggested! It'll surely work. And pls tell the result...
  25. Should Camera Phones Be Barred!

    Banning camera phone is not the solution. But atleast mobile manufactures should add a click sound in the phone s/w, when the photo is taken using the mobile. The sound should be loud enough so that the person can know that he has been kept in the mobile...
×