Showing posts with label Do u Know?. Show all posts
Showing posts with label Do u Know?. Show all posts

Thursday, March 12, 2009

Enabling Ports Manually

To enable ports initially we have to determine wether the ports are
dynamic or static to do his follow this procedure...

A)How to determine if you are using a static or a dynamic port
If you are not sure if you are using a dynamic port, follow these
steps:1. Click Start, and then click Run.
2. In the Run dialog box, type regedit, and then click OK. This
will start Registry Editor.
3. Locate the HKLM/Software/Microsoft/MSSQLServer/MSSQLServer/
SuperSocketNetLib/Tcp/TcpDynamicPorts registry key. Use this key to
determine if dynamic ports are enabled. If it lists a numeric value,
that value is the last dynamic port value that was used by SQL
Server. If it is blank, you are using a static TCP port.
4. Quit Registry Editor.

B)How to enable TCP/IP with dynamic ports
If you are using dynamic ports, you must create an exception for the
SQL Server program in Windows Firewall.

For more information about how to create an exception for the SQL
Server program in Windows Firewall, click the following article

C)How to enable TCP/IP with a static port
To enable TCP/IP connectivity for SQL Server listening on a static
port, you must first know the number of the port that SQL Server is
using. To find the port, you can either use the Server Network
Utility or use the Regkey method.
Use the Server Network Utility to find the port that SQL Server is
using
Note This method works for either a default instance or for a named
instance.1. If you are using the Server Network Utility, click
Start, point to All Programs, point to Microsoft SQL Server, and then
click Server Network Utility. If you are using MSDE or the command
line, click Start, and then click Run. In the Run dialog box, type
svrnetcn.exe, and then click OK.
2. In the Server Network Utility dialog box, you will see a list
of the disabled protocols and a list of the enabled protocols on the
General tab.
3. In the Instances on this server list box, select the instance
that you want to examine.
4. Click to select the protocol that you want to find the port
number for, and then click the Properties button.
5. Make a note of the port number.

Friday, July 25, 2008

Malicious Programs

Virus - Attaches itself to a program and propagates copies of itself to other programs.

Worm - Program that propagates copies of itself to other computers.

Trojan Horse - Program that contains unexpected additional functionality.

Backdoor (trapdoor) - Program modification that allows unauthorized access to functionality.

Exploits - Code specific to a single vulnerability or set of vulnerabilities.

Down loaders - Program that installs other items on a machine that is under attack. Usually, a downloader is sent in an e-mail.

Auto-rooter -Malicious hacker tools used to break into new machines remotely.

Kit (virus generator) - Set of tools for generating new viruses automatically.

Spammer programs - Used to send large volumes of unwanted e-mail.

Flooders - Used to attack networked computer systems with a large volume of traffic to carry out a denial of service (DoS) attack.

Keyloggers - Captures keystrokes on a compromised system.

Rootkit - Set of hacker tools used after attacker has broken into a computer system and gained root-level access.

Zombie - Program activated on an infected machine that is activated to launch attacks on other machines.



Saturday, June 7, 2008

ChaCha Search Engine




ChaCha...though sounds weird, is a website which offers a free 24x7 mobile answer services for people on the go.(i don't think this works in INDIA)

ChaCha launched its beta version on April 1 2008 and works with virtually every provider and allows people with any mobile phone device with normal SMS and voice capability to ask any question in conversational English and receive an accurate answer as a text message in just a few minutes.
Users can call 1-800-2-CHACHA and ask a question after the prompt. The question will then be transcribed into an SMS query. The answer then will be received by the caller in a text message.

Have a look at www.chacha.com

Tuesday, April 8, 2008

Do You Know?

1. What programming language is GOOGLE developed in?

2. What is the expansion of YAHOO?

3. What is the expansion of ADIDAS?

4. Expansion of Star as in Star TV Network?

5. What is expansion of "ICICI?"

6. What does "baker's dozen" signify?

7. The 1984-85 season. 2nd ODI between India and Pakistan at Sialkot - India 210/3 with
Vengsarkar 94*. Match abandoned. Why?

8. Who is the only man to have written the National Anthems for two different countries?

9. From what four word expression does the word `goodbye` derive?

10. How was Agnes Gonxha Bojaxhiu better known?

11. Name the only other country to have got independence on Aug 15th?

12. Why was James Bond Associated with the Number 007?

13. Who faced the first ball in the first ever One day match?

14. Which cricketer played for South Africa before it was banned from international
cricket and later represented Zimbabwe ?

15. The faces of which four Presidents are carved at Mt.Rushmore?

16. Which is the only country that is surrounded from all sides by only one country
(other than Vatican )?

17. Which is the only sport which is not allowed to play left handed?

Here Are the Answers! :

1. Google is written in Asynchronous java-script and XML, or its acronym Ajax ..

2. Yet Another Hierarchy of Officious Oracle

3. ADIDAS- All Day I Dream About Sports

4. Satellite Television Asian Region

5. Industrial credit and Investments Corporation of India

6. A baker's dozen consists of 13 items - 1 more than the items in a normal dozen

7. That match was abandoned after people heard the news of Indira Gandhi being killed.

8. Rabindranath Tagore who wrote national anthem for two different countries one is Indian
's National anthem and another one is for Bangladesh- (Amar Sonar* *Bangla)

9. Goodbye comes from the ex-pression: 'god be with you'.

10. Agnes Gonxha Bojaxhiu is none other Mother Teresa.

11. South Korea ..

12. Because 007 is the ISD code for Russia (or the USSR , as it was known during the cold war)

13. Geoffrey Boycott

14. John Traicos

15. George Washington, Thomas Jefferson, Theodore Roosevelt, and Abraham Lincoln

16. Lesotho surrounded from all sides by South Africa ..

17. Polo.