Monday, April 26, 2010

ALT tab

Alt - Tab


Alt-Tab is the common name for a keyboard shortcut on Microsoft Windows Windows 3.0 onwards used for switching between top-level windows without using the mouse; hence it was named Task Switcher (Flip in Windows Vista). Casual users may press Alt-⇆ Tab to
Newegg.ca is Finally Here! Please join us to celebrate these great deals!
alternate between the two most recent tasks, but used to its full potential, Alt-Tab can switch to any running program. The list of tasks is kept in an order with the most recently used tasks at the front. Tab does not need to be pressed as many times to move the task selection cursor from the front of the list to a nearer task—the more recently used, the easier to get back.

Since its introduction in Windows, the Alt-Tab keyboard combination has also been incorporated to other widely used operating systems, such as Mac OS X and free software desktop environments such as KDE and GNOME.

Precise behavior

Alt-Tab is accessed by a somewhat unusual application of the keyboard. First the Alt key is pressed and held down. While Alt is down, Tab may be pressed and released , sometimes combined with Shift if desired, to cycle the cursor through a list of tasks. A special task selection window appears the first time Tab is pressed with Alt down. The release of the Alt key is the act that closes the task selection window and switches to the selected task.

The fact that the menu is held open by keeping Alt pressed may seem unusual, given the way the modifier keys (Ctrl, Alt, and Shift) are typically used, but the behavior is quite intuitive and users quickly become accustomed to it[who?].






LOGISYS Computer CS888CL Transparent Computer Case Pre-Assembled With Side Panel Window

LOGISYS Computer CS888CL Transparent Computer Case Pre-Assembled With Side Panel Window


The Logisys CS888 will leave nothing to the imagination, and that's just how you’ll like it. Front to back, this mid-sized tower is made of clear acrylic to show off the powerful system inside without distractions. In order to have a powerful system worth showing though, this case gives you the room you need to make it. It started with four 5.25" external optical drive bays, and, remembering their importance, made room for two 3.5" external bays for fan controls, card readers, or anything else desired. Internally, which is now out for anyone to see, the power of six hard drives is provided for. From there, it included enough cooling power of three 80mm fans. One is placed as an intake fan up front, and the other two are placed on top and in the back for the much needed exhaust. The combined power of these three fans allow for a near constant breeze over all of your sensitive hardware. The choice of your next case is clear. With Power Supply: No Power Supply Mounted: Top Motherboard Compatibility: ATX With Side Panel Window: Yes External 5.25" Drive Bays: 4 External 3.5" Drive Bays: 2 Internal 3.5" Drive Bays: 6 Expansion Slots: 7









The full capabilities of Alt-Tab are learned intuitively by many users. Its behavior has undergone few changes over the years and has many subtle features that define it.

The behavior can be defined by these rules:

* As long as there is more than one task window, the task list appears as soon as Tab is pressed with Alt down.
* The task list remains open until Alt is released.
* Tab moves the cursor forward in the list; Shift-Tab moves it backward. In the event that there are many windows, Tab or Shift-Tab can be allowed to autorepeat.
* With the initial press of Tab or Shift-Tab, the square selection cursor is placed onto the window immediately following or immediately before the active one. If there are no topmost windows above the active window, an initial Shift-Tab wraps the cursor around to the end of the list.
* Esc while Alt is still down aborts the switch.
* The windows are listed by their "Z-order". Any windows which are "always on top" are kept at the head of the Z-order sequence and are listed first, followed by the current window and the windows underneath it.
* Switching to a window moves it to the top of the Z-order sequence, moving it to the front of the list, with the exception that "always on top" windows remain topmost and at the front of the list.
* When the Alt-Tab window is not in use, Alt-Esc lowers a window, placing it at the bottom of the Z-order sequence. This sends it to the end of the list. Alt-Shift-Esc is equivalent to one Alt-Shift-Tab except that minimized windows are selected without being restored.
* Minimizing a window also sends it to the end of the list in the same way as Alt-Esc. Some applications, notably Outlook, violate this.






LOGISYS Computer Area 51 CS51WBK Black Computer Case With Side Panel Window

LOGISYS Computer Area 51 CS51WBK Black Computer Case With Side Panel Window


The truth is out there, and it's closer than you think. Logisys created the Area 51 mid-sized tower to bring out anyone's inner geek. They started with what was really important, and gave it substance. Four 5.25" and two 3.5" external drive bays are set and ready for action. The impressive five internal 3.5" drive bays will make sure that you won't run out of space for years to come. From inside out this case was designed around thumb screws to be sure that no one will ever again be stuck searching for tools to adjust one misplaced cable. From there the exterior is but window dressing on the potential power within, but that makes it all the more important. State of the art hardware should be given a state of the art look. Logisys couldn’t agree more, and gave a case that will bring to mind every alien conspiracy theory ever heard. A look that is so iconic, and yet made to last. With Power Supply: Yes Power Supply Mounted: Top PSU Main Connector: 24Pin Motherboard Compatibility: 12" x 10" ATX With Side Panel Window: Yes External 5.25" Drive Bays: 4 External 3.5" Drive Bays: 2 Internal 3.5" Drive Bays: 5










Windows Vista changed the default behavior[1] (under most default installations) with its Flip interface. The six most recently used items in the Flip tab-order work as described, then remaining windows are ordered alphabetically by application path (and optionally grouped, depending on the 'group similar taskbar buttons' setting which is enabled by default).






LOGISYS Computer CS305BK Black Enhanced SOHO Computer Case

LOGISYS Computer CS305BK Black Enhanced SOHO Computer Case


With Power Supply: Yes Power Supply Mounted: Top PSU Main Connector: 20+4Pin Motherboard Compatibility: ATX External 5.25" Drive Bays: 4 External 3.5" Drive Bays: 1 Internal 3.5" Drive Bays: 5 Expansion Slots: 7









These rules have certain interesting consequences (in the absence of "always on top" windows such as Task Manager):

* Pressing Alt, pressing Tab, releasing Tab, and releasing Alt (the typical way an Alt key combination is performed) will always alternate between the two most recent tasks.
* Alt-Shift-Tab can restore the most recently minimized window. (If there are "always on top" windows, the lowest of these will be selected instead.)
* Pressing Alt-Tab-Tab (two tabs with Alt continuously held down) provides the same feeling of a quick switch back and forth, but with three programs. The three programs are activated in sequence, repeatedly. In general, any number of tabs can be used to achieve this behaviour with any number of windows, though beyond a small number of windows it becomes tedious and is less useful.
* To expel one of three tasks from use in the above situation, minimize that window and Alt-Tab will immediately begin to behave as if the most recent two tasks were the two remaining.
* To abort the Alt-Tab, before releasing Alt one can press Shift-Tab to undo everything. (Or press Esc.)

A list of top-level windows is maintained with a continually updated ordering. When the selector menu is initially activated by Alt plus the first Tab, the list is populated this way:

* All 'always-on-top' top-level windows according to Z-order, front-to-back, if any exist
* All ordinary top-level windows according to Z-order, front-to-back

This list does not change while the selector remains open. On each new invocation of Alt-Tab, the order can change.






APEVIA MX-PLEASURE-NW-BK Black Computer Case

APEVIA MX-PLEASURE-NW-BK Black Computer Case


The Apevia MX-Pleasure case is delicately balanced between striking style and outstanding performance. Front panel features two “old school� gauges with modern blue backlights to monitor temperature and fan speed, fan control, along with an I/O panel (2 USB 2.0 ports and a Firewire). Both front panel and side panel are lockable, for added security. The case come standard with a 80mm side fan, and a 120mm rear fan, both with blue LED lights, to give you strong airflow and cool blue lighting. Your standard ATX, Baby AT, or Micro ATX motherboard and peripherals will have plenty of power with the included 500-watt power supply, and you’ll have plenty of room to for it all, with 7 expansion slots. A tool-less rail system makes it easy to install up to four external 5.25� drives, two external 3.5� drives, and seven 3.5� internal drives. Case feet fold in and out for stability when you need it. Whether you’re building from the ground up, or looking to expand your current system, the MX-Pleasure is an grand blend of style and function. With Power Supply: Yes Power Supply Mounted: Top PSU Main Connector: 20+4Pin Motherboard Compatibility: Standard ATX / Baby AT / Micro ATX With Side Panel Window: No External 5.25" Drive Bays: 4 External 3.5" Drive Bays: 2 Internal 3.5" Drive Bays: 7









freelancer Illustrative examples

Windows may be divided into two categories, 'always-on-top' and ordinary. When a task is switched to, it is moved to the head of its category. For the following example, suppose there are no 'always-on-top' windows. Let A be the current window title. Hold down Alt and press and release Tab once, leaving Alt pressed. The window list comes up. A is guaranteed to be first in the list. Suppose the complete list is A W Z E U B C. The selection cursor will initially be on W. Suppose we want to switch to window U. Without releasing Alt, press Tab three more times and then release Alt. Then hold down Alt and press-release Tab once leaving Alt down. The window list will now show U A W Z E B C. Then Tab over to E and release Alt, selecting window E. Press and hold down Alt and press-release Tab once leaving Alt down. The window list will now show E U A W Z B C. Note that the windows switched to with Alt-Tab (E, U, A) are in order of how recently they were switched to. Now Tab over to A and release Alt. Press and hold down Alt and press-release Tab leaving Alt down. The window list will show A E U W Z B C. The effect of this most-recently-used behavior is that to return to the most recent task, Tab is pressed once, for the second most recent task Tab is pressed twice, and so on for all tasks. The priority of a window in terms of Alt-Tab accessibility is how recently it was used. If A is now minimized, the list will become E U W Z B C A, and if Z is minimized the list becomes E U W B C A Z. Thus minimizing a window mimics the effect of not using it for a long time.






LOGISYS Computer MDLED1GN GREEN LAZER LED Light

LOGISYS Computer MDLED1GN GREEN LAZER LED Light


Specifications: Color: Green Type: LED










The commonplace alternation between the 2 most recent tasks (using a fast Alt-Tab with all keys released immediately) is precisely a special case of the above behavior. Suppose the windows are A B C and we want to alternate between A and B. Hold Alt while pressing and releasing Tab; continue holding Alt. The list will show A B C and the cursor will initially be over B. When Alt is released B will be selected, Tab having been pressed a total of 1 time, and zero attention to the task selection cursor having been necessary. Again, press and release Tab while holding Alt. The list will show B A C and the cursor will initially be over A. When Alt is released we have switched back to A. Displaying the list again, the order has returned to A B C and this sequence can recur. On close inspection, in the course of typing Alt-Tab and releasing both keys quickly, the task list window can be observed to flicker for a split second, so .

If the user has been switching among 3 applications and wants to dispense with one of them by minimizing, one of the remaining ones will be on top immediately after minimizing, and ordinarily Alt-Tab will alternate between the 2 remaining windows. If a program fails to move to the end of the list when minimized, pressing Alt-Tab once will return to the minimized program. Failures such as this can result in a frenzied reordering of the Alt-Tab list by means of several Alt-Tab-Tab-Tab... sequences to compensate for the program misbehavior. The algorithm for this reshuffling is intuitive after using Alt-Tab for a long time.






LOGISYS Computer CLK15GN 15

LOGISYS Computer CLK15GN 15" Green Deluxe Sound Activated Cold Cathode Kit


Features: Input Voltage: DC 12 Volt. Input Current: 700mA Input Connector: Molex 4pin connector with pass-through. Output Connector: 2 Output socket for dual 15" cold cathode lights. Inverter: Sound control activation, sensitivity adjustable, with on/off switch to override sound control feature. Cold Cathode light: Appr. 15" (14.3" long in acrylic tube) Parts: 90 days limited Labor: 90 days limited













If the user attempts to switch to an application using Alt-Tab but the application fails to update its place in the z-order (for example, if its window procedure is hung), then the next time Alt-Tab is invoked, the task selection cursor may initially point unexpectedly far into the list of icons, just past the application in question, which will not have been moved to the head of the list.

Applications have some say in where they are located in the Alt-Tab order. The list of windows is altered by the creation and destruction of windows, programmatic hiding, showing, raising, and lowering of windows, and alterations to the window z-order [2] .






LIAN LI PC-60BPLUSII W Black Computer Case With Side Panel Window

LIAN LI PC-60BPLUSII W Black Computer Case With Side Panel Window


What goes into your case is more important than the case itself, and Lian-Li hasn't forgotten that. That's why the PC-60B PLUS II is designed to protect its cargo from excess heat with a veritable maelstrom of air. It isn't just that this case has an 80mm fan on the roof and one in the rear, or the 120mm Fan up front and one on the side panel. It is the skill and precision in which they are placed, to make the cooling power of the four fans greater than the sum of its parts. With all of that, you can feel secure filling it’s four external 5.25" and two external 3.5" drive bays, and its ample five internal hard drive bays without fear of blocking air flow to your maxed out ATX motherboard, all seven of its PCI expansion slots full. Your system will remain safe and cool in the hottest action, and your masterpiece will be viewable to all through its high quality acrylic side window. With Power Supply: No Power Supply Mounted: Top Motherboard Compatibility: 12" x 9.6" ATX With Side Panel Window: Yes External 5.25" Drive Bays: 4 External 3.5" Drive Bays: 2 Internal 3.5" Drive Bays: 5 Expansion Slots: 7













The order of the Alt-Tab list corresponds directly to the z-order, once the windows have been sorted according to 'always-on-top' status. Alt-Shift-Esc is equivalent to one Alt-Shift-Tab except that minimized windows are selected without being displayed.[3]
freelancer Windows-specific issues and hacks

Alt-Tab works even if Windows Explorer is no longer running. On Windows NT-based systems, Alt-Tab is managed by CSRSS (Client/Server Runtime Subsystem). It works even when Ctrl-Alt-Del and Ctrl-Shift-Esc (Task Manager) (which are managed by Winlogon) do not.[4]






LIAN LI PC-A05 A Silver Computer Case

LIAN LI PC-A05 A Silver Computer Case


Clean modern lines combined with ultra-modern performance, Lian-li's PC-A05-A is the ideal tower. Housing two 5.25" and one 3.5" External drive bays, it saves space by leaving out redundant drive bays made obsolete by today's multipurpose ROM drives. It hasn't forgotten the internal hard drives that are so necessary today, leaving space for three 3.5" internal drives. It also gives easy access to two USB 2.0 ports ,an IEEE 1394 (Firewire) port and two audio ports up front. This case makes cooling a literal breeze. It has two 120mm ball bearing fans: one located in front of the hard drives for intake, and another in the rear of the case for exhaust. This causes a constant cooling cross breeze over all your sensitive equipment protecting them from the ravages of heat. The A05-A supports ATX Motherboards 12" x 9.6" or smaller, with 7 PCI expansion slots in the rear. With Power Supply: No Motherboard Compatibility: 12" x 9.6" ATX With Side Panel Window: No External 5.25" Drive Bays: 2 External 3.5" Drive Bays: 1 Internal 3.5" Drive Bays: 3 Expansion Slots: 7 Front Ports: 2 x USB2.0 ; 2 x Audio ; 1 x IEEE1394













Alt-Tab may be intercepted (or effectively disabled) by means of a low-level keyboard hook.[5] Such a technique is used by applications such as the Virtual Network Computing (VNC) viewer to pass Alt-Tab keystrokes to the remote desktop when the VNC window is active.

Under Windows XP, the Tweak UI PowerToy[6]. can adjust the number of rows and columns in the task list window, or it can be adjusted via a registry edit[7]. This is helpful if there are so many windows that the list would spill over into multiple pages.






HEC 6AR6BS2F Black / Silver Computer Case

HEC 6AR6BS2F Black / Silver Computer Case


With Power Supply: Yes Power Supply Mounted: Top PSU Main Connector: 20+4Pin Motherboard Compatibility: ATX With Side Panel Window: No External 5.25" Drive Bays: 4 External 3.5" Drive Bays: 2 Internal 3.5" Drive Bays: 5













Another Microsoft PowerToy, Alt-Tab Replacement[6], is available for Windows XP that displays a screenshot of each application in the task list rather than just its icon, and allows the user to use the mouse to select the desired application. A more advanced version of this functionality, named Windows Flip, is built into Windows Vista.

A number of third-party tools, similar to Alt-Tab Replacement, are also available that add additional functionality to Alt-Tab.

Additionally, Windows Vista allows the user to navigate through the alt-tab menu using mouse or arrow keys.

When the Aero Glass theme is enabled, Windows Vista also offers a 3D view of the windows themselves that animates as the user cycles through it. The behaviour is very similar to Alt-Tab and is accessed by holding down the Windows key instead of Alt while pressing tab. While this view is visible, windows can be selected and made active by clicking on them with the mouse.

If there is only one window on the system, Windows does not show a selector dialog at all when Alt-Tab is pressed; the key sequence will simply restore or give focus to that window in case it is minimized or not focused.

If you prefer the smaller XP icons over the larger Vista "thumbnail" icons, you can change the functionality by:

* Start → Computer
* Hit the "System Properties" button (on the Toolbar under the File | Edit toolbar)
* Select "Advanced System Settings" (under Tasks grouping in the left-hand column); this gives you "System Properties" dialogue box, the "Advanced Tab" should be displayed.
* Hit the Settings Button under Performance. Uncheck the "Enable Desktop Composition" checkbox (the 3rd checkbox from the top in the Custom list box).
* Hit OK

freelancer Non-Windows functionality
freelancer Macintosh

Similar functionality exists on Mac OS X using Command instead of Alt, and switching between applications rather than windows. The Macintosh switcher has the additional capabilities of pointing at the desired icon with the mouse (also present in Windows Vista and above), and dropping files on applications' icons. Selected application can be hidden or closed using H or Q button without closing the menu. Command-` works similarly to switch between windows within the same application.

In the classic Mac OS, third party extensions (such as LiteSwitch X and Many Tricks Witch) provided this behavior.
freelancer Unix

Unix-like desktop systems such as fvwm, KDE, and GNOME have added a compatible function. On some systems including Sun's CDE and old versions of fvwm, the Alt-Tab key combination is mapped to less sophisticated functionality such as only alternating between two windows, cycling forward or backward in a list of all windows in a fixed order, or opening a task applet in which one has to use arrow keys or the mouse to select a task and then click or push Enter. Some window managers such as WindowLab forego the onscreen window list and simply bring each window to the front in turn as Alt-Tab is pressed.

Not all window managers provide this functionality as a core feature. For example, Blackbox does not; users desiring this behavior can add it by running a helper application such as bbkeys.
freelancer Compiz Fusion

Compiz Fusion (aka Beryl, Compiz) has similar functionality, but displays a preview of the window as well as its icon (Present in Windows Vista and above, with DWM enabled). It also makes use of Alt-Shift-Tab by moving backwards through the displayed programs, and it is possible to activate a Windows Flip 3D alternative using the Windows key and Tab.
freelancer GNOME

Metacity, the GNOME window manager, has similar functionality to versions of Windows released before Vista, but it only displays the outline of the currently selected window on the screen. Windows, on the other hand shows the whole selected window, which helps the user to pick the correct window from multiple windows with a similar title or icon.
freelancer History

The Alt-Tab key combination to switch between windows has been present in all versions of Windows since Windows 1.0. However, there was no visual indication of the list of windows available when switching between windows until Windows 3.1, when this feature was introduced as the 'Fast "Alt+TAB" Switching' checkbox in the Display control panel applet, internally known as "CoolSwitch"[8].

Before CoolSwitch, the Alt-Tab combination was similar to the Alt-ESC combination (which also switched windows), but Alt-ESC redrew each window immediately on each stroke, while Alt-TAB brought the windows to the top but did not redraw them until the Alt key was released.
freelancer Inconsistency

An example of a program that violates the expectation that pressing Alt-Tab one time will switch to the previous application is Adobe Reader 7.0.x. Like newer versions of Microsoft Word it attempts to give a separate icon in the Alt-Tab task menu to each MDI document. However, unlike Word, it brings two items to the front of the list whenever a document is selected using Alt-Tab: first an icon representing the main Reader window and then an icon for the individual document. While in Adobe Reader, pressing Alt-Tab one time selects the second item in the list, which is the icon for the PDF document. Adobe Reader remains the current task when Alt-Tab is released. Thus it is demonstrated that the correct operation of Alt-Tab, like some other aspects of the Windows environment such as the Clipboard chain, depends on individual applications being written correctly.

Friday, April 23, 2010

firewall

Windows Vista Firewall Blocking Rule Information Disclosure Vulnerability

There is an information disclosure vulnerability in Windows Vista that could allow a remote anonymous attacker to send inbound network traffic to the affected system. It would be possible for the attacker to gain information about the system over the network.







Spyware Doctor

Spyware Doctor

Spyware Doctor is a top-rated malware & spyware removal utility that detects, removes and protects your PC from thousands of potential spyware, adware, trojans, keyloggers, spybots and tracking threats. Now with AntiVirus!










Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factor may be helpful in your situation:

• The vulnerability is restricted to only allow attacker to gain system information about the affected system. Valid user credentials would be required to access additional services or local resources.
• In Windows Vista, if the network profile is set to “Public”, the system is not affected by this vulnerability.






Spyware Doctor with AntiVirus

Spyware Doctor with AntiVirus

Spyware Doctor with AntiVirus is a top-rated malware, spyware & virus removal utility that detects, removes and protects your PC from thousands of potential spyware, adware, trojans, viruses, keyloggers, spybots and tracking threats.










Workaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:


Disable Teredo

You can help protect against this vulnerability by disabling the Teredo transport mechanism. This prevents Teredo from being used as a transport or mechanism to traverse the NAT. To do this, run the following command as an administrator:

Netsh int ter set st disable
• Disable Teredo by modifying the registry.

Teredo can also be disabled by modifying the Windows registry. Create the following registry value to disable Teredo as a transport mechanism.

Note Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the "Changing Keys And Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" and "Edit Registry Data" Help topics in Regedt32.exe

1. Start, click Run, type “regedit" (without the quotation marks), and then click OK.

2. Navigate to the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tcpip6\Parameters\

3. Right click on the DisabledComponents key and select Modify.

4.Set the value to 0x8 to disable Teredo.

Impact of Workaround: If you disable Teredo, depending on network configuration, applications that use the Teredo interface will not function or be accessible.

• Block inbound and outbound Teredo UDP traffic using a Windows Vista Firewall setting.
A custom firewall rule can be created that blocks all Teredo related traffic from communicating with the affected system. To do this, follow these steps:

1.Click Control Panel, click Classic View.

2.Click Administrative Tools and then Double-click Windows Firewall with Advanced Security.

3.Select Inbound Rules.

4.Select CoreNetworking - Teredo (UDP-In).

5.Right click, select Properties.

6.Select “Block the connections”.

7.Select Outbound Rules.

8.Select Core Networking - Teredo (UDP-Out).

9.Right click, select Properties.

10Select “Block the connections”.

Impact of Workaround: If you block Teredo network traffic using the custom Windows Firewall rule, applications that use the Teredo interface will not function properly or be accessible.


Block Teredo UDP outbound traffic on perimeter firewalls.

Blocking all outbound UDP traffic destined to port 3544 at the network perimeter will disallow affected Vista systems from communicating with external attempts to exploit the vulnerability.

Impact of Workaround:Depending on network configuration, applications that use the Teredo interface will not function or be accessible outside of the network perimeter.
Top of sectionTop of section


What is the scope of the vulnerability?
This is an information disclosure vulnerability. An attacker who successfully exploited this vulnerability could gain information about the vulnerable system and be able to identify it’s existence on the network.

What causes the vulnerability
On Windows Vista, network traffic is handled incorrectly through the Teredo interface which causes some firewall rules to by bypassed.

What might an attacker use the vulnerability to do?
An attacker who successfully exploited this vulnerability could bypass some of the firewall rules of an affected system.

How could an attacker exploit the vulnerability?
An attacker could remotely activate the Teredo interface under certain configuration scenarios or would have to convince a user to click a link containing a Teredo network address on a Web site, in an e-mail message or Instant Messenger message. Clicking the link would cause Teredo to enter an active state and subsequently cause the affected host to initiate communications with the attacker. This would then allow the attacker to know the target’s Teredo network address which could then be used to send communications to the host that are not blocked by the local Windows Vista firewall. Additionally, as Teredo facilitates network tunneling once a connection is established with an attacker, it would also be possible for the communications to potentially bypass network perimeter firewalls.

What is Teredo?
Teredo is an IPv6 transition technology that provides address assignment and host-to-host automatic tunneling for unicast IPv6 traffic when IPv6/IPv4 hosts are located behind one or multiple IPv4 network address translators (NATs). To traverse IPv4 NATs, IPv6 packets are sent as IPv4-based User Datagram Protocol (UDP) messages. See the TechNet Web site for more information regarding the Teredo service.

Could the vulnerability be exploited over the Internet?
Yes, this vulnerability could be exploited over the internet once a user has clicked on specially crafted link containing an IPv6 address causing the Teredo interface to be activated.

What systems are primarily at risk from the vulnerability?
Any Windows Vista system where the network profile is not set to “Public” could be at risk from this vulnerability. Windows Vista systems that use Remote Assistance or Meeting Space may be at more risk because these applications automatically place Teredo in an active state.

What does the update do?
The update modifies the Windows Vista firewall and core network components to ensure that the default behavior is to block unsolicited traffic over the Teredo interface.

When this security bulletin was issued, had this vulnerability been publicly disclosed?
No. Microsoft received information about this vulnerability through responsible disclosure.

When this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited?
No. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers and had not seen any examples of proof of concept code published when this security bulletin was originally issued.
link
http://technet.microsoft.com/en-us/library/cc875811.aspx







Spam Monitor

Spam Monitor


Spam Monitor is easy to use anti-spam filter to protect your Inbox against unsolicited junk email.












Thursday, April 15, 2010

Dealing with Error Messages

Dealing with Error Messages

Explore the Net with Internet Explorer/MSN

Error messages can cause you frustration, but they're not impossible to overcome. In fact, you can avoid most error messages by using a few simple techniques. In this article, we'll catalog some of the most common Internet error messages and provide practical solutions that will prevent you from getting them.

400 - Bad request

401 - Unauthorized

403 - Forbidden or Connection refused by host

404 - Not Found or Object Not Found

502 - Service Temporarily Overloaded

503 - Service Unavailable

Bad file request and Too many users

Cannot add form submission result to bookmark list

Failed DNS lookup

File contains no data

Helper application not found and Viewer not found

Host unavailable

Host unknown and Unable to locate host

Network connection was refused by the server and Too many connections - try again later

NNTP server error

Permission denied

Unable to locate the server

You can't log on as an anonymous user

400 - Bad request

This error message indicates that the server can't figure out the URL (Uniform Resource Locator) you requested. The problem often occurs because of incorrect URL syntax. If you typed the URL, check it for incorrect uppercase or lowercase letters, colons, and slashes. Try to type the URL again. If you still get an error, try to backtrack the URL to the directory the document resides in. If the error message persists, the problem might be with the document. Your only recourse is to contact the site's administrator.

Freelancer

401 - Unauthorized

This error usually occurs when an Internet site is protected and the server didn't receive the correct encryption ID or password for entry. If you're registered with the site, you can try your password again if you have the opportunity. As with URLs, passwords are often case-sensitive, so type the password carefully. You can also get this error from servers that deny access from certain domain types, for example, domain names ending in edu.

Freelancer

403 - Forbidden or Connection refused by host

This error is similar to the 401 error. It usually occurs when a server denies access because of your domain, because of security restrictions, or because you don't have a password. This error also occurs when you haven't signed up with a site that requires registration. You can try to register with the site or try your password again. You can also attempt to contact the site's administrator for a password.

Freelancer

404 - Not Found or Object Not Found

This error often appears as Not Found or Object Not Found, as shown in Figure A. This error is common and occurs when the host server can't find the specific HTML (Hypertext Markup Language) document you requested. A 404 error usually stems from a document name change or a document deletion. It can also occur when you've made a syntax error in the document name. Your best bet is to assume you made a mistake when you typed the URL. Backtrack by deleting the portion of the URL that follows the last slash. Then re-access the URL and look for it in the parent directory.

Freelancer

502 - Service Temporarily Overloaded

This error indicates that the server is experiencing high-traffic load and can't process the request. You can often access the site by trying to reload it. If the error persists, you may want to try again later.

Freelancer

503 - Service Unavailable

This error occurs when your access provider, gateway, or system is down or busy. Your only alternative is to wait a minute or two and try again.

Freelancer

Bad file request and Too many users

These error messages indicate a problem with HTML coding at the site. The problem may be that your browser doesn't support the form you're trying to access. You can try to bypass this problem by E-mailing the Web site administrator for help.

Freelancer

Cannot add form submission result to bookmark list

This error message appears when you try to save the results of a form-based search engine as a bookmark. The problem is that the URL of the query results is invalid—even though it may not appear to be. You can bypass this problem by printing the search results, or you can try to save them in an HTML document on your hard disk.

Freelancer

Failed DNS lookup

This error indicates that the Domain Name System (DNS) can't translate the URL into a valid Internet address. This DNS error message occurs in several situations. The server that you're trying to connect to may be overloaded with traffic or temporarily down. If the server is just busy, you can sometimes get through by trying to access the site again. If the server is temporarily down or offline, there's nothing you can do except try later. Unfortunately, there's no way for you to tell whether a server is down or just busy. You might have also incorrectly typed the URL.

If you're accessing the Internet via a modem and you get a DNS error for each Web site you try to access, chances are something is wrong with your connection. Try relaunching your browser and your required communication software. If the problem persists, contact your Internet service provider (ISP).

Freelancer

File contains no data

When you get this error, it means that you've accessed the right Web site, but the file you requested is empty. There's a possibility that the site administrator is updating the site, in which case you can try to access the document again later. You can also try to bypass this problem by retyping the URL with :80 before the last slash.

Freelancer

Helper application not found and Viewer not found

These errors occur when your browser doesn't recognize a file. This usually happens when you download a file that needs a specialized viewer, for example, a RealAudio sound file or a compressed ZIP file. If you don't have the helper application, your best bet is to save the file to a disk and then try to get the application that will let your browser read the file.

Freelancer

Host unavailable

This error usually occurs when the host server is down. You can try to access the site again by clicking the Reload button on your browser's toolbar.

Freelancer

Host unknown and Unable to locate host

These errors often occur for one of three reasons: the host server is down, you've lost your Internet connection, or you incorrectly typed the URL. Try clicking the Reload button first. If this method doesn't work, check the URL. If you still get the error message, check your Internet connection.

Freelancer

Network connection was refused by the server and Too many connections - try again later

These errors most often indicate that the server is too busy to handle more traffic. You can try the site again by clicking the Reload button or wait until a later time.

Freelancer

NNTP server error

An NNTP server error appears when you try to log on to a USENET newsgroup and can't gain access. This error signals several possible problems. As is often the problem, the host server may be down, or you may have incorrectly typed the URL. It's also possible that the newsgroup you chose isn't available through your Internet service provider (ISP), in which case you can't access the newsgroup unless you contact your ISP and get it to add the newsgroup. Another possible problem is that you may have incorrectly entered your browser's newsgroup preferences.

Freelancer

Permission denied

This message occurs when you're trying to upload a file to an FTP site. The message indicates that the site's administrator won't allow the upload, the site is too busy, or you've used the wrong syntax in the URL. Look at the URL syntax first and type it again. If the error message reappears, you should try again later. If the problem persists, you can try to E-mail the site's Webmaster for help.

Freelancer

Unable to locate the server

This error message indicates that your browser can't locate the server or that you incorrectly typed the URL. Look carefully at the server name in the URL and try retyping the URL.

Freelancer

You can't log on as an anonymous user

This error message appears when you try to access certain FTP sites. It indicates that the site allows access only to registered members, or that the site allows access to only a limited number of non-members, in which case the site is simply busy. You can try to access the site again later, or if you're a registered member, try entering your user ID and password manually using an FTP software package.

Monday, April 12, 2010

software







OmniPage Professional 17 Upgrade

OmniPage Professional 17 Upgrade


OmniPage 17 saves time and money by eliminating retyping. Paper and PDF files are instantly and accurately converted into your favorite PC applications.













Trend Micro Internet Security 2010







Acronis Backup & Recovery 10  Server for Linux - Version Upgrade

Acronis Backup & Recovery 10 Server for Linux - Version Upgrade


Locally managed online server backup, server disk imaging, and bare-metal restore solution for Linux Servers.


















Acronis Recovery for Microsoft Exchange Enterprise incl. Acronis Advantage Premier

Acronis Recovery for Microsoft Exchange Enterprise incl. Acronis Advantage Premier


Perfect Exchange servers recovery tool!


















Acronis Backup & Recovery 10  Advanced Workstation - Version Upgrade incl. AAP

Acronis Backup & Recovery 10 Advanced Workstation - Version Upgrade incl. AAP


Acronis Backup & Recovery 10 Advanced Workstation Easily provides with centralized back up and restore of your workstations











Joins

Inner join

An inner join is the most common join operation used in applications, and represents the default join-type. Inner join creates a new result table by combining column values of two tables (A and B) based upon the join-predicate. The query compares each row of A with each row of B to find all pairs of rows which satisfy the join-predicate. When the join-predicate is satisfied, column values for each matched pair of rows of A and B are combined into a result row. The result of the join can be defined as the outcome of first taking the Cartesian product (or cross-join) of all records in the tables (combining every record in table A with every record in table B) - then return all records which satisfy the join predicate. Actual SQL implementations normally use other approaches like a Hash join or a Sort-merge join where possible, since computing the Cartesian product is very inefficient.







OmniForm Premium 5

OmniForm Premium 5

OmniForm Premium 5.0 is the easiest solution to automate your forms creation and data management process. Convert paper forms to digital, design from scratch and manage the data collection digitally with no programming experience.








SQL specifies two different syntactical ways to express joins: "explicit join notation" and "implicit join notation".

The "explicit join notation" uses the JOIN keyword to specify the table to join, and the ON keyword to specify the predicates for the join, as in the following example:

SELECT *
FROM employee
INNER JOIN department
ON employee.DepartmentID = department.DepartmentID

The "implicit join notation" simply lists the tables for joining (in the FROM clause of the SELECT statement), using commas to separate them. Thus, it specifies a cross-join, and the WHERE clause may apply additional filter-predicates (which function comparably to the join-predicates in the explicit notation).

The following example shows a query which is equivalent to the one from the previous example, but this time written using the implicit join notation:

SELECT *
FROM employee, department
WHERE employee.DepartmentID = department.DepartmentID






OmniPage 17

OmniPage 17


OmniPage 17 is our entry level scanning, document conversion and OCR productivity application. It delivers the most accurate document conversion available, turning paper and PDF files into electronic files you can edit search and share. OmniPage 17 ensures that your converted electronic documents look exactly like the original - complete with text, graphics, columns and tables.











The queries given in the examples above will join the Employee and Department tables using the DepartmentID column of both tables. Where the DepartmentID of these tables match (i.e. the join-predicate is satisfied), the query will combine the LastName, DepartmentID and DepartmentName columns from the two tables into a result row. Where the DepartmentID does not match, no result row is generated


Equi-join

An equi-join, also known as an equijoin, is a specific type of comparator-based join, or theta join, that uses only equality comparisons in the join-predicate. Using other comparison operators (such as <) disqualifies a join as an equi-join. The query shown above has already provided an example of an equi-join: SELECT * FROM employee INNER JOIN department ON employee.DepartmentID = department.DepartmentID SQL provides an optional shorthand notation for expressing equi-joins, by way of the USING construct (Feature ID F402): SELECT * FROM employee INNER JOIN department USING (DepartmentID) The USING construct is more than mere syntactic sugar, however, since the result set differs from the result set of the version with the explicit predicate. Specifically, any columns mentioned in the USING list will appear only once, with an unqualified name, rather than once for each table in the join. In the above case, there will be a single DepartmentID column and no employee.DepartmentID or department.DepartmentID. The USING clause is supported by MySQL, Oracle, PostgreSQL, SQLite, DB2/400 and Firebird in version 2.1 or higher. Natural join

A natural join offers a further specialization of equi-joins. The join predicate arises implicitly by comparing all columns in both tables that have the same column-name in the joined tables. The resulting joined table contains only one column for each pair of equally-named columns....

The above sample query for inner joins can be expressed as a natural join in the following way:

SELECT *
FROM employee NATURAL JOIN department

Cross join

A cross join, cartesian join or product provides the foundation upon which all types of inner joins operate. A cross join returns the cartesian product of the sets of records from the two joined tables. Thus, it equates to an inner join where the join-condition always evaluates to True or where the join-condition is absent from the statement. In other words, a cross join combines every row in B with every row in A. The number of rows in the result set will be the number of rows in A times the number of rows in B.

Thus, if A and B are two sets, then the cross join is written as A × B.

The SQL code for a cross join lists the tables for joining (FROM), but does not include any filtering join-predicate.

Example of an explicit cross join:

SELECT *
FROM employee CROSS JOIN department

Example of an implicit cross join:

SELECT *
FROM employee, department;

Outer joins

An outer join does not require each record in the two joined tables to have a matching record. The joined table retains each record—even if no other matching record exists. Outer joins subdivide further into left outer joins, right outer joins, and full outer joins, depending on which table(s) one retains the rows from (left, right, or both).

(In this case left and right refer to the two sides of the JOIN keyword.)

No implicit join-notation for outer joins exists in standard SQL.

Left outer join

The result of a left outer join (or simply left join) for table A and B always contains all records of the "left" table (A), even if the join-condition does not find any matching record in the "right" table (B). This means that if the ON clause matches 0 (zero) records in B, the join will still return a row in the result—but with NULL in each column from B. This means that a left outer join returns all the values from the left table, plus matched values from the right table (or NULL in case of no matching join predicate). If the left table returns one row and the right table returns more than one matching row for it, the values in the left table will be repeated for each distinct row on the right table.

For example, this allows us to find an employee's department, but still shows the employee(s) even when they have not been assigned to a department (contrary to the inner-join example above, where unassigned employees are excluded from the result).

Example of a left outer join, with the additional result row italicized:

SELECT *
FROM employee LEFT OUTER JOIN department
ON employee.DepartmentID = department.DepartmentID


Right outer joins

A right outer join (or right join) closely resembles a left outer join, except with the treatment of the tables reversed. Every row from the "right" table (B) will appear in the joined table at least once. If no matching row from the "left" table (A) exists, NULL will appear in columns from A for those records that have no match in B.

A right outer join returns all the values from the right table and matched values from the left table (NULL in case of no matching join predicate).

For example, this allows us to find each employee and his or her department, but still show departments that have no employees.

Example right outer join, with the additional result row italicized:

SELECT *
FROM employee RIGHT OUTER JOIN department
ON employee.DepartmentID = department.DepartmentID



Full outer join

A full outer join combines the results of both left and right outer joins. The joined table will contain all records from both tables, and fill in NULLs for missing matches on either side.

For example, this allows us to see each employee who is in a department and each department that has an employee, but also see each employee who is not part of a department and each department which doesn't have an employee.

Example full outer join:

SELECT *
FROM employee
FULL OUTER JOIN department
ON employee.DepartmentID = department.DepartmentID

NULL NULL Marketing 35

Some database systems (like MySQL) do not support this functionality directly, but they can emulate it through the use of left and right outer joins and unions. The same example can appear as follows:

SELECT *
FROM employee
LEFT JOIN department
ON employee.DepartmentID = department.DepartmentID
UNION
SELECT *
FROM employee
RIGHT JOIN department
ON employee.DepartmentID = department.DepartmentID
WHERE employee.DepartmentID IS NULL

SQLite does not support right join, so outer join can be emulated as follows:

SELECT employee.*, department.*
FROM employee
LEFT JOIN department
ON employee.DepartmentID = department.DepartmentID
UNION ALL
SELECT employee.*, department.*
FROM department
LEFT JOIN employee
ON employee.DepartmentID = department.DepartmentID
WHERE employee.DepartmentID IS NULL
Self-join

A self-join is joining a table to itself. This is best illustrated by the following example.


A query to find all pairings of two employees in the same country is desired. If you had two separate tables for employees and a query which requested employees in the first table having the same country as employees in the second table, you could use a normal join operation to find the answer table. However, all the employee information is contained within a single large table.[

Considering a modified Employee table such as the following:
Alternatives

The effect of outer joins can also be obtained using correlated subqueries. For example

SELECT employee.LastName, employee.DepartmentID, department.DepartmentName
FROM employee LEFT OUTER JOIN department
ON employee.DepartmentID = department.DepartmentID

can also be written as

SELECT employee.LastName, employee.DepartmentID,
(SELECT department.DepartmentName
FROM department
WHERE employee.DepartmentID = department.DepartmentID )
FROM employee

Implementation

Much work in database-systems has aimed at efficient implementation of joins, because relational systems commonly call for joins, yet face difficulties in optimising their efficient execution. The problem arises because (inner) joins operate both commutatively and associatively. In practice, this means that the user merely supplies the list of tables for joining and the join conditions to use, and the database system has the task of determining the most efficient way to perform the operation. A query optimizer determines how to execute a query containing joins. A query optimizer has two basic freedoms:

1. Join order: Because joins function commutatively and associatively, the order in which the system joins tables does not change the final result-set of the query. However, join-order does have an enormous impact on the cost of the join operation, so choosing the best join order becomes very important.
2. Join method: Given two tables and a join condition, multiple algorithms can produce the result-set of the join. Which algorithm runs most efficiently depends on the sizes of the input tables, the number of rows from each table that match the join condition, and the operations required by the rest of the query.

Many join-algorithms treat their inputs differently. One can refer to the inputs to a join as the "outer" and "inner" join operands, or "left" and "right", respectively. In the case of nested loops, for example, the database system will scan the entire inner relation for each row of the outer relation.

One can classify query-plans involving joins as follows:

left-deep
using a base table (rather than another join) as the inner operand of each join in the plan
right-deep
using a base table as the outer operand of each join in the plan
bushy
neither left-deep nor right-deep; both inputs to a join may themselves result from joins

These names derive from the appearance of the query plan if drawn as a tree, with the outer join relation on the left and the inner relation on the right (as convention dictates).
Join algorithms

Three fundamental algorithms exist for performing a join operation.

Nested loops
Main articles: Nested loop join and block nested loop

Use of nested loops produces the simplest join-algorithm. For each tuple in the outer join relation, the system scans the entire inner-join relation and appends any tuples that match the join-condition to the result set. Naturally, this algorithm performs poorly with large join-relations: inner or outer or both. An index on columns in the inner relation in the join-predicate can enhance performance.

The block nested loops (BNL) approach offers a refinement to this technique: for every block in the outer relation, the system scans the entire inner relation. For each match between the current inner tuple and one of the tuples in the current block of the outer relation, the system adds a tuple to the join result-set. This variant means doing more computation for each tuple of

Merge join


If both join relations come in order, sorted by the join attribute(s), the system can perform the join trivially, thus:

1. Consider the current "group" of tuples from the inner relation; a group consists of a set of contiguous tuples in the inner relation with the same value in the join attribute.
2. For each matching tuple in the current inner group, add a tuple to the join result. Once the inner group has been exhausted, advance both the inner and outer scans to the next group.

Merge joins offer one reason why many optimizers keep track of the sort order produced by query plan operators—if one or both input relations to a merge join arrives already sorted on the join attribute, the system need not perform an additional sort. Otherwise, the DBMS will need to perform the sort, usually using an external sort to avoid consuming too much memory.

Hash join
Main article:
A hash join algorithm can only produce equi-joins. The database system pre-forms access to the tables concerned by building hash tables on the join-attributes. The lookup in hash tables operates much faster than through index trees. However, one can compare hashed values only for equality (or inequality), not for other relationships.