Monday 31 January 2011

How to Create a Strong Password?

images We must follow the following criteria while creating a Strong Password:
* The password must be a minimum of 8+ characters.
* The password must have 1 number , 1 special character, 1 Upper Case character.
A very simple example is : P@ssw0rd. It fullfills all the criteria's. The 'a' is replaced by a special character @. The 'P' is of upper case. The 'o' is replaced by the numeral 0.
Well, you can now convert your regular password into a Strong Password by following a few changes like the example I have mentioned above for the simple password - P@ssw0rd.
* Make the first character Upper Case.
* Change all 'a' in the password to the special character @.
* Change all 's' in the password to the special character $.* Change all 'l' in

the password to the special character !.
* Change all 'o' in the password to the numerical 0.
* Change all 'i' in the password to the numerical 1.

Friday 28 January 2011

Benefits of Honey in Ayurveda


        All of you are well aware of Honey. It has been considered very beneficial and auspicious in mythology, ayurveda and botanical science. Honey is used as medicine as well as for worship of God. One of the five elements used for preparing 'Panchamrita' (a sacred drink prepared with milk, curd, ghee, sugar and honey) is honey. Honey is included in all auspicious ceremonies and has the power of curing all diseases. It makes us sweet both internally and externally.



Judging the Quality of Honey
When we purchase honey, we are not sure whether it is pure or impure. There are few simple tricks, with which we can clearly judge its quality.
·         Pure honey pours down in the shape of a serpent whereas the impure honey falls flat on the plate. Apply a little honey on a stick and light it on fire, if it starts burning consider it to be pure.
·         Pure honey is transparent. A dog will not lick it. Pure honey has a good smell. It melts in heat and frosts in cold season.
Which regions produce the best honey? Honey found in Kashmir and Himachal is of the best quality and is very beneficial. It gives instant relief in the case of eye problems. The quality of honey found in these regions is extremely good because it is obtained from the lotus flowers grown in the lakes of Kashmir. This type of honey containing a lot of medicinal values is not found in any other place.

Medicinal Effects of Pure Honey

New honey removes phlegm and is a purgative. One or two year old honey reduces fat and is good for digestion.


Honey gives strength and power to the intestines. Regular consumption of honey stops the accumulation of toxic elements in the intestines and also kills worms. It is equally beneficial for chronic diseases, chronic constipation, dysentery and diarrhea.

Honey removes phlegm accumulated in the lungs. It gives relief to the patients of asthma and cough. Honey is also beneficial in cases of tuberculosis. It keeps the mind fresh and healthy. It is especially beneficial for those who do more mental work. Honey increases the humors of the body. Consumption of honey is good for strengthening the sperm, physical strength and gives good shape to the body. Soak one almond twice a day, rub it nicely on a grinding stone in the night and keep it in a bowl. Add one spoon of honey and drink it with cold milk without adding any sugar, half an hour before going to bed. This is beneficial for mental strength, masculinity and physical fitness. This medicine should be taken regularly for two months during the winter season. It is extremely beneficial.


Honey cures phlegm disorder. Take half a spoon of honey and half a spoon of ginger juice to get rid of cough. Add onion juice and honey in equal quantity and take this medicine to get rid of accumulated phlegm. Simply licking honey is also good for curing mild cough. Honey also cures skin problems. Honey cures skin diseases and makes the skin healthy. It also kills worms and stops decay.

Honey improves the eyesight. If lotus honey of Kashmir is available, it should be applied in the eyes like kajal (eye liner). This cures all problems related to the eyes and increases the eyesight.

Drink one glass of cold milk added with a few drops of honey before going to bed. Do not add sugar or sugar candy. This reduces physical weakness. This should be taken regularly for two months. It is necessary to brush the teeth after drinking this milk.

Consume honey with fruits like jelly. It is beneficial for students, doctors, lawyers, intellectual people, elderly persons, pregnant women and children.

Take one glass of clean water with two spoons of honey in the morning before passing bowels. This gradually reduces the fat accumulated in the body. This should be taken regularly for two months. This is beneficial for reducing fat and increases the shine of the body.

Honey has medicinal values; it takes the qualities of the substance which is added to it. This is the special quality of honey. This is the main reason for calling it 'Yogvahi' (medium for mixing medicines).

What should be the quantity when consuming honey?

In the beginning honey should be consumed only in small quantities. Give four to five drops to an infant, half a spoon to young children and one spoon to old people. Increase this quantity gradually and then it can be taken four times a day. Honey can be taken with chapattis, fruits, fruit juice, or almonds. Consume it for two months regularly and discontinue for a month. One can start taking honey after a gap of one month. One or two spoons of honey should be taken everyday.

Useful Tips

Do not take honey with hot food or in the summer season because it is not suitable in hot weather and hot conditions.
Honey creates negative effects when taken in hot conditions.
Honey causes adverse effects when consumed with hot fluids.
Honey turns into poison when it is heated. Honey is equal to poison when it is taken with hot conditions, hot weather or hot food. According to Ayurveda one should not take honey with hot milk, hot water and in hot weather.
There is no benefit if honey and ghee are mixed with equal quantities and taken (they counter each other). In case of need, mix one part of ghee with three or four parts of honey.
Consuming honey in excess quantity is not good for health. It is also advised not to take honey with sugar candy, jaggery, jackfruit, fish, egg, meat, etc. Do not consume honey continuously for several months (pause for one month in between). This can cause a disease called 'Amajirg'.


Yoga and Ayurveda Keep Skin Healthy


       The skin protects the body from cold, heat, sunshine, wind and various diseases, and through sweat it throws out the body's waste material. The body’s complete health depends upon the skin. Skin diseases should not be ignored and should be treated immediately. Perspiration is necessary for good health. Lack of perspiration signifies presence of some disease. Dark spots, prickly heat, boils and other skin diseases are a few of the common ones.


Dark Spots:

Dark spots occur on the neck, hands or on the face. They are either brown or black in colour. On the face they often occur on the nose, there are black patches on the two sides of the nose. This usually occurs in women after menopause, during pregnancy or when sweat pores get blocked.

Surya Namaskar, Bhujangasana, Shirshasana, and Sarvangasana should be practiced to keep oneself free from these diseases.

Kapalbhati pranayama, Nadi shodhan, Bhastrika and general pranayam should be practiced. The difference will be very clear.

Natural Medication:

If it is summer season then apply curd (yoghurt) on the dark spots at night, wash it after 20 minutes and go to sleep. The dryness, pigmentation marks and any other types of marks are cleared. If it is winter season then take lukewarm milk and massage it on the face.

Also if massage is done with lemon juice the pigmentation marks will be removed. Drink one cup of radish juice daily for seven days; all types of marks will be removed.

Grind lentils and lemon juice; apply the paste on the face and massage. This is the best medicine for pigmentation marks.

To remove these marks you may also apply the foam of ocean water mixed with lemon juice.

Eruptions on Face

Many times we find red coloured patches on the skin, these are called eruptions. They are dark on the sides and light colored in the middle. They are formed when spicy, non-vegetarian food, liquor, hot medicines and allergy causing products and food items are consumed.

Natural Medication:

Mix sandal wood powder in Giloy juice and drink 10 ml. Eruptions can be removed.

Take clarified butter (ghee) prepared with cow milk, geru, and rock salt in equal quantity and make a powder. Rub the powder on the skin and wrap yourself in a blanket and sleep in the hot sun. The eruptions will get cleared due to the natural perspiration.

Practice Anulom-Vilom pranayam, Nadi shodhan, and Shitali and Chandra bhedi pranayam.

Prickly Heat

Prickly heat can be overcome by taking water with a little bit of lemon juice thrice daily. Even if it persist then within 10-12 days it will disappear.

Consume sugarcane juice in the morning and afternoon. The body becomes cool and prickly heat will not appear.

Don't eat things which produce heat and try to stay in a cold environment. Wear light clothes. Boil neem leaves in water and when cool take bath with this water. The prickly heat is overcome with this process.

Practice Anulom-Vilom pranayam, Shitali and Chandra bhedi pranayam. These help in removing the prickly heat.

Boils

Boils occur due to impurity in the blood. More intake of spicy food, sour and sweet things lead to impurity in the blood and boils occur in due course.

Natural Medication:

Roots of bitter guard (karela) should be ground and applied on the boils. Boil carrot and tie its poultice on the boils. The leaves of tube (Arbi) should be burnt and the ash should be mixed in oil and applied on the boils. The tender leaves of neem should be mixed in buttermilk and the paste should be applied on the boils.

This should be repeated twice a day. Bark of the neem tree and Rasot should be ground and applied on the boils.

Poultice of fenugreek put on the boils reduces the swelling and gives relief from pain.

Medication through Yoga:

Boils occur due to impurity of blood. Practice yogasanas, which purify blood.

Ardhamatysendrasana, Shirshasana and other yogasanas can be practiced to purify blood.

Practice Anulom-Vilom pranayam, Surya bhedi, Bhastrika, Kapalbhati and other pranayam to make the blood cells healthy. The skin will glow and become healthy, and boils will not occur.

Tumours

Also known as swelling of glands which are caused due to impurity in blood. This results in tumours on the thighs, stomach, armpits, and neck along with swelling and pain. Pus forms in the tumours. Usually it seems like a boil. The swollen part become as hard as a stone, and a burning sensation occurs. Sometimes the boil breaks open.

Natural Medication:

Grind fig, and then heat it. Make poultice and tie it on the tumour. You will get relief from pain and sometimes the boil breaks open quickly. Mix a little guggul and turmeric in horse gram powder, put it on the tumor for it to subside.

Excess Perspiration

Excess perspiration can be caused because of malaria, T.B (lungs), impurity of blood, person prone to pus formation, high fever, bone weakness, general weakness, nervous problems, due to the weakness of systems, forgetfulness, mineral deficiency, general weakness and tastelessness. Yoga can be beneficial during this state. Pranayam is of utmost help. The patient should practice Nadi shodhan, Anulom-Vilom, Kapalbhati, Bhastrika and pranayam. The yogasanas should be practiced slowly.

Natural Medication:

Add pomegranate leaves juice in water and take bath. There wont be complaint of perspiration. The powder of tamarind seeds and flowers should be mixed with water and applied on the skin when there is more perspiration and body odour.

Roast kulthi, make it into two parts and rub it on the body. The perspiration will reduce. Take equal quantity of wood apple pulp (bilva) and Harad and make a fine powder. sprinkle under the armpits daily after bath. At bed time make a paste of it and apply. It will give relief from odour.



SQL Error - MMC cannot open the file


MMC cannot open the file C:\Program Files\Microsoft SQL Server\80\Tools\BINN\SQL Server Enterprise Manager.MSC.
Upon clicking on the SQL Server Enterprise Manager shortcut the following error occurs:
MMC cannot open the file C:\Program Files\Microsoft SQL Server\80\Tools\BINN\SQL Server Enterprise Manager.MSC.
This may be because the file does not exist, is not an MMC console, or was created by a later version of MMC. This may also be because you do not have sufficient access rights to the file.
The msc file did exist and I definately has permissions to it.  So I can only assume it some how got corrupt.
The solution to this is fairly simple... either get another copy of this file, or create one, as follows:
1.     Select Start - Run.
2.     At the Open prompt enter: mmc
3.     Click OK
4.     Select File - Add/Remove Snap-in...
5.     Click Add...
6.     Select Microsoft SQL Enterprise Manager
7.     Click Add, then Close
8.     Click Ok to return to the mmc.
9.     Select File - Save As...
10.  Delete or rename the original (offending) file out the way.
11.  Save the new msc file as C:\Program Files\Microsoft SQL Server\80\Tools\BINN\SQL Server Enterprise Manager.MSC
Now your original shortcut should work.
Alternatively you can always access Enterprise Manager from within the Computer Management mmc.

Alternate Method
at command-line:

RegSvr32 MSXML.DLL
RegSvr32 MSXML2.DLL
RegSvr32 MSXML3.DLL 

or

regsvr32 C:\Windows\system32\msxml.dll
regsvr32 C:\Windows\system32\msxml2.dll
regsvr32 C:\Windows\system32\msxml3.dll

How to Fix Generic Host For Win32 and Svchost.exe Error


          What are Generic Host For Win32 and Svchost.exe Error and how to conferm that your pc infected by this malicious?When your pc infected you will see couple of symptom like these: In time of surfing internet suddenly you will see your internet activites become hault but you are still connected through your network and network icon of taskbar is showing ok.As you can not surf, you try to disconnect your connection but network icon will not removed.Some time you will see different type of message like below:


1."Generic Host Process for Win32 Services has encountered a problem and needs to close. We are sorry for the inconvenience."

2."svchost.exe -- application error the instruction at "0x745f2780" reference memory at "0x00000000". the memory could not be 'read'"

Some error message will report you about faulting netapi32.dll and svchost.exe. or your pc has recoverd from a serious problem.

So these are the common symptom of this problem.



Now we discuss actually what is it

What is an Generic Host Process for Win32 Services and svchost.exe?

Generic Host Process for Win32 Services or svchost.exe is a legal and essential component of Windows which is used to host services which run from dynamic-link libraries (DLLs). Multiple instances of Svchost.exe can run at the same time. So it is not a problem in most cases if you see five or six or even more copies of svchost.exe running in your services because they host different groups of DLLs. However, there are several known spyware anâ trojans that pretend to be legal svchost.exe. They usually have the same name or one of the following names: svchost.exe, svchosts.exe (which often causes svchosts.exe page faults), Generic.exe, svcchost.exe and several others. Please note that legal svchost.exe should reside in Windows\System32 folder and should not appear in startup list.

Now we will see how to remove this evil problem.

There are lots of easy way to remove this problem, I mentioned couple of them below:
Solution 1:

Follow these simple steps and your Windows will be fully cured of this malicious

Close Port 445:

1. Start Registry Editor (Regedit.exe) by clicking Start menu, and then click the Run icon.
2. In the small box that Opens, type: regedit then click the OK button. The Registry Editor will now have opened.
3. Locate the following key in the registry:
HKEY_LOCAL_MACHINESystemCurrentControlSetServicesNetBTParameters
In the right-hand side of the window find an option called TransportBindName.
Double click that value, and then delete the default value, thus giving it a blank value.

Close Port 135:

1. Then you must now navigate to the following registry key:
HKEY_LOCAL_MACHINESoftwareMicrosoftOLE
2. You will see there is a String Value called: EnableDCOM
Set the value to: N (it should currently be Y)
3. Close the Registry Editor. Shutdown and Restart your computer.

Now you will see your problem is solved.

Solution 2:

This is another way to fix Generic Host For Win32 Error in Windows:

1. 'Run' and open 'Regedit' and
Navigate to:
HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > Browser > Parameters
2.Find the Key
Name: IsDomainMaster
and set
Data: False
3.Restart Your PC
Solution 3:

1.Go to 'Run' and open 'cmd'
2.Type 'netsh' in command console then press enter
3.Then type 'winsock' and press enter and then type reset
4.Restart Your PC

These are some easy ways to solve Generic Host For Win32 Error and Svchost.exe Error
without using any third party software or spyware removing tools.If you want to use any tool or software to remove Generic Host For Win32 and Svchost.exe Error you can us these free tools from some website


Thursday 27 January 2011

Basic Computer Terms


Bit - A binary unit of data storage that can only be a value of 0 or 1.
BIOS - BIOS stands for Basic Input/Output System and it is a low level program used by your system to interface to computer devices such as your video card, keyboard, mouse, hard drive, and other devices.
Boot - A term used to describe what happens to a computer when it is turned on, theoperating system begins to run, and then the user is able to use the computer successfully.
Byte - 8 bits of data which has a possible value from 0 to 255

CD-ROM disk - A disk with about 640Mb of storage capacity which are more commonly read than written to.
CD-ROM drive - The hardware component that is used to read a CD-ROM or write to it.
Crash - A common term used to describe what happens to a computer when software errors force it to quit operating and become unresponsive to a computer user.
Driver - A specially written program which understands the operation of the device it interfaces to, such as a printer, video card, sound card or CD ROM drive. It provides an interface for the operating system to use the device.
File - A collection of data into a permanent storage structure. Stored on a permanent storage media such as a computer hard drive.
Firmware - Software written into permanent storage into the computer.
Floppy disk - A low capacity storage media which can be written to as easily as it is read.
Floppy Drive - The hardware component that is used to read or write to a floppy disk.
Hardware - Describes the physical parts of your computer which you can physically touch or see such as your monitor, case, disk drives, microprocessor and other physical parts.
Internet - A network of networks which incorporate a many organizations, physical lines, the ability to route data, and many services including email and web browsing.
ISP - Internet Service Provider is an organization that provides the ability to connect to the internet for their customers. They also usually provide additional services such as e-mail and the ability to host web sites.
MIME - multipurpose internet mail extension
 Memory - Used to provide the temporary storage of information function.
Network - A general term describing to the cables and electronic components that carry data between computers. It is also generally used to refer to the server computers that provide services such as printing, file sharing, e-mail, and other services.
Operating System - The core software component of a computer providing the ability to interface to peripheral and external devices along with program functions to support application programs.
Parallel - A data transmission method where data is sent on more than one line at a time. This may be any number of bits at a time, but is usually one word at a time (two bytes) or possibly three bytes at a time.
Protocols - A standard method used for communications or other internet and network functions.
Security flaw - A software bug allowing an attacker a method to gain unauthorized accessto a system.
Serial - A data transmission method where data is sent on a single line and one bit is sent at at a time. This is similar to a line which one item must come one after another
Software - Describes the programs that run on your system.
SPAM - A term used to describe junk and unsolicited e-mail
Storage Media - A term used to describe any magnetic device that computer data can be permanently stored on such as a hard drive or floppy drive.
URL - Uniform Resource Locator is the term used to describe a link which points to a location of a file on the internet.
Virus - A program that runs on a system against the owner's or user's wishes and knowledge and can spread by infecting files or sending itself through e-mail
Vulnerability - Software errors that allow some kind of unauthorized access when they are used or exploited.
Word - Two bytes or 16 bits of data with a possible unsigned value from 0 to 16535.
Worm - A term used to describe an unwanted program that uses system or applicationvulnerabilities to infect a computer without the user doing anything but connecting to aninfected network.

What is Computer Virus?. How to Protect Yourself from Virus?


Basic types of viruses
File viruses
File viruses, also known as parasitic or executable viruses, are pieces of code that attach themselves to executable files, driver files or compressed files, and are activated when the host program is run. After activation, the virus may spread itself by attaching itself to other programs in the system, and also carry out the malevolent activity for which it was programmed.
Most file viruses spread by loading themselves in system memory and looking for any other programs located on the drive. If it finds one, it modifies the program’s code so that it contains and activates the virus the next time it’s run.
 It keeps doing this over and over until it spreads across the system, and possibly to other systems that the infected program may be shared with. Besides spreading themselves, these viruses also carry some type of destructive constituent that can be activated immediately or by a particular ‘trigger’. The trigger could be a specific date, or the number of times the virus has been replicated, or anything equally trivial. Some examples of file viruses are Randex, Meve and Mr Klunky.

Boot sector viruses
A boot sector virus affects the boot sector of a hard disk, which is a very crucial part. The boot sector is where all information about the drive is stored, along with a program that makes it possible for the operating system to boot up. By inserting its code into the boot sector, a virus guarantees that it loads into memory during every boot sequence. A boot virus does not affect files; instead, it affects the disks that contain them. Perhaps this is the reason for their downfall. During the days when programs were carried around on floppies, the boot sector viruses used to spread like wildfire. However, with the CD-ROM revolution, it became impossible to infect pre-written data on a CD, which eventually stopped such viruses from spreading. Though boot viruses still exist, they are rare compared to new-age malicious software. Another reason why they’re not so prevalent is that operating systems today protect the boot sector, which makes it difficult for them to thrive. Examples of boot viruses are Polyboot.B and AntiEXE.
Multipartite viruses
Multipartite viruses are a combination of boot sector viruses and file viruses. These viruses come in through infected media and reside in memory. They then move on to the boot sector of the hard drive. From there, the virus infects executable files on the hard drive and spreads across the system. There aren’t too many multipartite viruses in existence today, but in their heyday, they accounted for some major problems due to their capacity to combine different infection techniques. A well-known multipartite virus is Ywinz.
Macro viruses
Macro viruses infect files that are created using certain applications or programs that contain macros. These include Microsoft Office documents such as Word documents, Excel spreadsheets, PowerPoint presentations, Access databases and other similar application files such as Corel Draw, AmiPro etc. Since macro viruses are written in the language of the application and not in that of the operating system, they are known to be platform-independent—they can spread between Windows, Mac and any other system, so long as they are running the required application. With the ever-increasing capabilities of macro languages in applications, and the possibility of infections spreading over networks, these viruses are major threats. The first macro virus was written for Microsoft Word and was discovered back in August 1995. Today, there are thousands of macro viruses in existence—some examples are Relax and Bablas.
Network viruses
This kind of virus is proficient in quickly spreading across a Local Area Network (LAN) or even over the Internet. Usually, it propagates through shared resources, such as shared drives and folders. Once it infects a new system, it searches for potential targets by searching the network for other vulnerable systems. Once a new vulnerable system is found, the network virus infects the other system, and thus spreads over the network.Some of the most notorious network viruses are Nimda.
Email Viruses
An email virus could be a form of a macro virus that spreads itself to all the contacts located in the host’s email address book. If any of the email recipients open the attachment of the infected mail, the virus spreads to the new host’s address book contacts, and then proceeds to send itself to all those contacts as well. Email viruses can infect hosts even by previewing the infected email in a mail client.

How to Protect Yourself from Virus?
Virus Protection
virus may or may not present itself. Viruses attempt to spread before activating whatever malicious activity they may have been programmed to deliver. So, viruses will often try to hide themselves. Sometimes there are symptoms that can be observed by a trained casual observer who knows what to look for (but, don't count on it).
Virus authors often place a wide variety of indicators into their viruses (e.g., messages, music, graphic displays). These, however, typically only show up when the virus payload activates. With DOS systems, the unaccounted for reduction of the amount of RAM known to be in the computer is an important indicator resident viruses have a hard time getting around. But, under Windows, there is no clear indicator like that. The bottom line is that one must use anti-virus software to detect (and fix) most viruses once they are on your system.
Your main defense is to detect and identify specific virus attacks to your computer. There are three methods in general use. Each has pros and cons and are discussed via these links. Often, a given anti-virus software program will use some combination of the three techniques for maximum possibility of detection.
With dangerous viruses on the network, what can computer users do to protect their systems?Here are just a few hints:
• Be sure to install an anti-virus software program (see the next section) to guard against virus attacks. Also, be sure you turn on the scanning features. It can't protect you if it's not enabled.
Practice caution when working with files from unknown or questionable sources.
• Do not open e-mail attachments if you do not recognize the sender (though you may also receive viruses from people you know). Scan the attachments with anti-virus software before opening them.
Download files only from reputable Internet sites, and be wary when exchanging diskettes or other media with friends.
• Scan your hard drive for viruses monthly.
Even with these precautions, new viruses may find ways to enter your computer system.