Friday, October 19, 2012

thumbnail

Disable user access to IE proxy settings

Hello friends, Today we will going to learn how to disable user access to IE proxy settings. Proxy settings  are provide a interface between public to private network internet access. We will set security to access particular website or webpage.
Now we are going to disable the proxy setting to access by user. For this we are going to use group policy.
So are you ready for learn to disable user access to IE proxy settings follow the step given bellow..

Step 1:- Open the run command and type gpedit.msc and click ok


Step 2:- A wizard will open as show below click on User Configuration


 Step 3:-  Click on Administrative Templates





 Step 4:- Now click on Windows Components come under Administrative Templates



Step 5:- Now click on Internet Explorer



 Step 6:- Now in Internet Explorer click on Disable Changing proxy settings


 
Step 6:- Double click on Disable Changing proxy settings  a wizard will open as show below, click on Enabled





Step 7:- Click ok and close the group policy wizard and log off the system and again log in.

Now user can't change proxy on IE. Try it and do you have another method to block it then let me know. I'm waiting your comments.

Wednesday, October 17, 2012

thumbnail

What is Steaming Media



Steaming Media:-
Streaming media is video or audio or both transmitted over a computer network for immediate play. You don’t to first download the file and then it play. The Example of streaming video and audio include Internet radio and television broadcasts, and corporate webcasts.
Streaming Video came about mainly due to the limitations of dialup Internet connections being too slow to show video. Back in the days before cable or broadband access, if you wanted to watch a video, you had to download the entire video before you could watch it  and on a 56k modem that would take forever!
So the technical bods created a technology called "streaming."
Here's Wikipedia's definition:
" ... multimedia that is continuously received by, and normally displayed to, the end-user while it is being delivered by the provider."


How to use Steaming Media:-
High bandwidth network connections are generally needed to work with streaming media. Specific bandwidth requirements depend on the type of content. For example, watching high resolution streaming video requires much more bandwidth than watching low resolution video or listening to music streams.

To access media streams, users open their audio / video players on their computer and initiate a connection to a server system. On the Internet, these media servers can be Web servers or special-purpose devices set up specifically for high-performance streaming.

The bandwidth (throughput) of a media stream is its bit rate. If the bit rate being maintained on the network for a given stream drops below the rate needed to support immediate playback, dropped video frames and/or loss of sound results. Streaming media systems normally use real-time data compression technology to lower the amount of bandwidth used on each connection. Some media streaming systems can also be set up to support Quality of Service (QoS) to help maintain the necessary performance.

Setting Up computer Networks for streaming Media

Certain network protocols have been specially developed for streaming media, including Real Time Streaming Protocol (RTSP). HTTP can also be used if the content to be streamed consists of files stored on a Web server. Media player applications contain built-in support for the necessary protocols so that users typically do not need to change any settings on their computer to receive audio / video streams. Examples of media players include:
·         QuickTime
·         RealPlayer
·         Windows Media Player
·         Content providers wanting to deliver streams can set up a server environment in several different ways:
·         Subscribe to one of the online live streaming video Web services such as justin.tv or ustream.
·         Build a private Internet media server by installing specialized commercial software onto a Web server. Examples of media server software include Real Networks Helix Server and Adobe Flash Media.
·         Buy a commercial hardware/software system for media streaming. These systems typically interface with broadcast television as well as the Internet, and they also support higher performance streaming in many cases.

Steaming Video using Windows Media
In order to use Windows Media for streaming or downloading video and audio, you need to do three things (unless you already have a Win Media file ready to go, in which case you only need to do the last thing):
  1. Choose a format
    Windows Media has several different file formats (see the links at the bottom of the page). If you're not sure which format to use, WMV is the easiest for video. You may also be limited to the options in your editor, which brings us to...
  2. Create a video/audio file
    The easiest way to create a Windows Media file is to export a file from your favorite editing application. Open the original video clip, then look under File > Export to see what options you have.
    For an example of how this works, see Exporting WinMedia from Adobe Premiere.
  3. Place the files on a web page
    This involves entering some HTML code, shown below.
The rest of this page assumes you have a file in your chosen format and you are ready to place it on a web page. There are two ways to do this: Hyperlinking and embedding.

Tuesday, October 16, 2012

thumbnail

Top 10 Computer Virus



Computer Virus is a common threat which all of us faces now days. A virus is basically a hidden code programmed to do something harmful or against the will of the computer it attacks. We try to use one the best anti- virus available according to our data and computing needs. Computer virus is a virtual disease which affect the pc in various ways for example, deleting and corrupting files, slowing down the speed of processing or operating, deleting system files, stealing/sending data without permission and making the pc freeze for a long time. These are relatively less harmful as compared to others. There are some viruses which have literally destroyed the computers of the modern world. Losses incurred annually because of viruses, both private and corporate, amount to millions of dollars.  Although there are innumerable types of viruses, there are some viruses which made their places in history books due to their huge amount of loss brought to companies as well as personal computers all over the world. Some of the computer virus are given below with their short history.
Note: The following is a research for information and educational purposes only but if you think that there is something which you know better than you feel free to comment about it. Our team will look in to it and if your information is valid and accurate and suits the ranking then we will display it by your name.

1. Storm Worm:-

Storm Worm is the most dangerous computer virus which came in the history of internet. It used to come with the emails and the time when you open the email Storm Worm spreads in the entire computer and start destroying important files and documents in your hard drive. Once your pc is affected by Storm Worm then there is a huge loss in terms of valuable files and data.

2. Leap-A/Oompa-A:-

Leap-A/Oompa-A was created in 2006 and is considered as one of the most dangerous viruses of the world. Leap-A/Oompa-As has a way of affecting system through ichat instant messaging. After the Leap-A/Oompa-A affects the system it search for other computers through ichat contacts and then send them a simple jpeg picture file which looks a common file but on the back end of the file there is Leap-A/Oompa-A.once the user or viewer accepts the file then the computer virus is transferred in to his system and this happens so on. That’s why it is not advisable to accept picture files in chat rooms from unknown people.

3. Commwarrior-A:-

Commwarrior-A hit in the summer of 2005, and it struck in an unsuspecting place: cell phones. The first ever cell phone virus, Commwarrior-A spread through text messages, but only infected 60 cell phones. Despite the small number of infected devices, security experts see Commwarrior-A as the beginning of a new kind of virus, and worry that the spread of smart phones means Commwarrior-A was merely the first in what will become a long line of phone targeting malware.

4. Blaster:-

The Blaster was not a particularly dangerous worm, due to a programming error, but it received a lot of media attention nonetheless. The worm exploited a hole in Windows XP programming, and, within its code, contained a specific attack on Bill Gates that read “billy gates why do you make this possible? Stop making money and fix your software!!” An 18-year-old named Jeffery Lee Parson was arrested and eventually sentenced to spend a year and a half in prison for writing an updated version of the worm.

5. Sasser virus:-

Sasser virus has also been famous all over the world. Sasser spreads throughout the system in very less period of time. Although it can be stopped by a firewall. This virus has caused a huge loss to many big companies. When a pc in affected by Sasser mostly it happens that the pc gives an error of restarting after one minute itself and there is no way to stop it whatever work you are doing that has to be closed before one minute so that the data should not be lost.

6. MyDoom:-

MyDoom is a type of email computer virus and spreads all over the pc very fast. In MyDoom a file is attached to the email which gets downloaded automatically at the time when user opens the email or clicks on the email. After that MyDoom starts to expand from pc to pc sharing programs and it is very dangerous for computers running on Windows. MyDoom has caused a serious loss in internet history in 2004 by making the internet speed as slow as to 50 %.

7. Nimda:-

Nimda is a virus which has damaged most of the computers of the world and it first surfaced in 2001 and affected windows severely. If we do some math and calculate the total damage caused by Nimda, then roughly the costs due to damage is found out to be more than $620 million. The main targeted victims of this virus were internet servers and websites. Nimda also spread through emails.

8. Code Red
Named after the Mountain Dew drink favored by the first researchers to analyze the program, this worm first broke out in July, 2001, infecting as many as 360,000 computers in a single day. According to Richard III, the infection proved so hard to stop because the worm would continually re-infect the same computer it had been cleaned from. The worm attacked Microsoft IS servers, and caused massive denial of service problems as it ate up computing resources and IT personnel time.

9. ILOVEYOU:-

The original email virus, ILOVEYOU caused “massive estimated financial damage, with millions of computers infected,” according to Golden Richard III. The email masqueraded as a love letter from a contact in a user’s email address book, and prompted the user to open an attachment containing the virus. Beginning on March 4th, 2000, the virus infected over 50 million computers in only nine days, and caused the CIA and the Pentagon to shut down their computers

10. Creeper:-

First developed in 1971, Creeper might well be the first computer virus. It infected PDP-11 computers connected to ARPANET, the Defense Department-run precursor to the Internet. Once infected, the computer would display the message, “I’m the creeper, catch me if you can!” Self-replicating but not too dangerous, Creeper opened the door that the rest of this list walked through