Ultrasurf: to bypass blocked sites

Blocked site made frustrationIn most of the colleges or IT industries, you will observe that many sites will be blocked or even you will not be able to hat through online messenger. People use to open orkut, facebook, youtube but they will not be able to open it due to proxy enabled firewall in hat organization. I also got annoyed with such things and one day go to know, how to surpass all these barriers.

Why to use or test any proxy site to open such sites when there is a small application for it which does its job at its best. Yes! ultrasurf is there to solve your problem. (You can smile :)). More than 70% organizations usually ban  Social networking sites. Few companies allow with some term and conditions. Sometimes its good to not having access to such sites, else it may harm work culture and productivity. But it may be used for refreshment and kind of updates about friends, families, about other companies, sites etc.

For example: I wish to see updated news of few companies or sensex through twitter, then how i will be able to see it if they will block twitter at office?Why social sites are banned?

  • Its daily traffic is over 8000 GB and daily hits would be near around 800 million
  • Its free to use
  • Latest version is 9.97
  • Its so light, size is 500 Kb approx.
  • You just need to download it and double click on it whenever you wish to use automatic enabled proxy server to bypass your organization's proxies.
  • It requires IE only and works on almost any O.S. version of windows (like XP,Vista, win 7)

Add-on for Firefox

Firefox users need to download the firefox add-on besides the above software: Download Firefox add-on(.zip) (md5: 6ce151b1b0ef8430031a8e9a69f38806)

Installation:

Unzip it, drag the wjbutton_en.xpi file to firefox window. Click the "Install" button in the pop-up window to install it. The UltraSurf icon will show at the right-bottom of the firefox window. Close all firefox windows and re-open firefox. A grey-out UltraSurf icon means UltraSurf is disabled. A bright colorful icon means UltraSurf is enabled. Click it to enable/disable it. To change the settings or uninstall it, go to "tools/add-ons" of firefox. Start UltraSurf program and enable the firefox add-on, your internet activities thru Firefox will be under UltraSurf's protection.

Automatic upgrade

When UltraSurf software releases a new version, you will see a pop-up window telling you to download the latest version when you open the UltraSurf home page. I hope you will like it. Comment is needed! Happy Alien Blogging You tube access deniedUltrasurf v9.97

What is Google WAVE and PROJECT NATAL

natalA GOOGLE Wave is an application by google that collaborates several Google features. A user who has installed Google wave will be able to access and use Google features like Orkut, Google Talk and Gmail efficiently.
Google wave can also check for errors (grammatical and spelling) as well translate text to forty different languages. Google has not yet announced when Wave will be released.

For the User’s Convenience, Google will open source part of the code so that users can develop or Modify the features of the program. Upcoming days ,  no need to use of different browser , in Single place you can use all features of google.    Microsoft is working on Project Known as ‘NATAL’ , which on completion would probably be the new face of gaming. It involves gaming without the use of any controllers. End users will be able to play games or interact with the interface with gestures and spoken commands on their existing Xbox consoles. The device would be around nine inches and a motion sensor would be placed either above or below the device. It would feature face and voice recognition as well as full body 3D  motion capturing capabilities.

Observers are expecting it to be launched up to end of 2010.

How to find out , who is Invisible (In Gmail)

offline line User There is simple trick to find out Invisible user. The Gmail Chat application that is present on the left pane of the site allows users to appear 'Invisible'  to their contact. For this , You will need the 'Google Talk' desktop application. One you have logged on to your account, follow these steps to determine which of your contacts is invisible :

  • Open 'Google Talk' chat application
  • Search for contact by typing his/her name in the search box
  • Once the name of the contact shows up in the contact list click the entry to open the chat window.

  • Click the dropdown arrow present under the close button and click ‘Go off the record’ .
  • If you  receive a message saying , “<user ID> @ gmail.com is offline and can’t receive messages right now’  then user is logged off".
  • If the above message does not appear after you send a message then user is invisible mode.

This trick is working in most cases so far. However , there may be varying results in case of users who log on to Google talkusing third party tools like mobile chat applications.

Pidgin: Universal Chat software v2.6.6

Pidgin: Universal Chat SoftwareEvery time when you wish to chat with your friends and foes, you have to open separate chat software for that like msn, skype, yahoo, gtalk and so on. Why not to use only one software for all these stuffs.

Then I saw one site called meebo.com (its really a cool one, web based chat site). It allows you to login with your yahoo or gmail or skype etc ids. But if you are looking for a software that will provide you such facilities , then pidgin is there.

Pidgin (formerly named Gaim) is a multi-platform instant messaging client, based on a library named libpurple.

Libpurple has support for many commonly used instant messaging protocols, allowing the user to log into various different services from one application.  libpurple is intended to be the core of an IM program. When using libpurple, you'll basically be writing a UI for this core chunk of code. Pidgin is a GTK+ frontend to libpurple, and Adium (like pidgin but for Mac OS X) is a Cocoa frontend. Whatever be your chat program, whatever language you use, if you are going to connect with network, user dialogue box, user authentication in fancy manner; you have to use libpurple. It is being used by pidgin, meebo, EQO(for mobile users), Adium etc.

 

It’s an open source software and written in C and its plugins are written in C#, Python, Perl etc. Its file Size is 14.10 MB and latest Version is 2.6.6 Pidgin supports following chat networks:  AIM, ICQ, Google Talk, Jabber/XMPP, MSN Messenger, Yahoo!, Bonjour, Gadu-Gadu, IRC, Novell GroupWise Messenger, QQ, Lotus Sametime, SILC, SIMPLE, MXit, MySpaceIM, and Zephyr. It can support many more with plugins.

It  Supports many international and lots of regional languages too like Kannada, Gujarati  ,  Telugu, Punjabi, Marathi and Hindi (of course).  It supports almost all popular languages over the world. Whatever be your OS you can use it (Windows and Linux is common).

It became very popular  after 2007 and today millions of people use it worldwide. It supports all famous chat networks like

Shows all chat list

  • Bonjour
  • Gadu-Gadu
  • Google Talk
  • Groupwise
  • ICQ
  • IRC
  • MSN
  • MXit
  • MySpaceIM
  • QQ
  • SILC
  • SIMPLE
  • Sametime
  • XMPP
  • Yahoo!
  • AIM
  • Zephyr
  • Now Facebook chat also being supported through XMPP network.

But I found only one demerit in it, that is why I use it rarely. If you are logged in with your yahoo account , next time if you will login with your gmail account, it will show you your yahoo and gmail friend list together (imagine in case of yahoo, gmail, msn, aol: how long list you will be having). One more thing is that, if you are using it alone then its ok. If your friends also gets logged in through the same software then he/she will be able to see your whole friend list also (Isn’t it bad?). I hope in next version they will do something to this issue.

Bit Torrent: an introduction about torrents

Bit Torrent BitTorrent logois the name of a peer-to-peer (P2P) file distribution protocol, and is the name of a free software implementation of that protocol.

A Protocol is a formal description of message formats and the rules that two computers must follow in order to exchange those messages. P2P is a jargon for Peer-to-Peer file sharing. File sharing is not a new phenomenon. The first of the file sharing clients appeared in early 1999 and reached mainstream popularity within a few months. Peer-to-Peer file sharing is now a seven year old phenomenon, and by many subscribers would be considered a fundamental Internet service.

Some terms associated with file sharing: Peer:A peer is one instance of a BitTorrent client running on a computer on the Internet to which other clients connect and transfer data. Usually a peer does not have the complete file, but only parts of it. However, in the colloquial definition, “peer” can be used to refer to any participant in the swarm (in this case, it’s synonymous with “client”).

Seeder : A seeder is a peer that has a complete copy of the torrent and still offers it for upload. The more seeders there are, the better the chances are for completion of the file.

Leech : A leech is usually a peer who has a negative effect on the swarm by having a very poor share ratio – in other words, downloading much more than they upload. Most leeches are users on asymmetric internet connections and do not leave their BitTorrent client open to seed the file after their download has completed. However, some leeches intentionally avoid uploading by using modified clients or excessively limiting their upload speed. The term leech, however, can be used simply to describe a peer or any client that does not have 100% of the data. U can say like us student who serrves the pc for our download purpose just after the download we cut-off the connection. So we are are all leachers!

Torrent : A torrent can mean either a .torrent metadata file or all files described by it, depending on context. The torrent file contains metadata about all the files it makes downloadable, including their names and sizes and checksums of all pieces in the torrent. It also contains the address of a tracker that coordinates communication between the peers in the swarm.

Tracker : A tracker is a server that keeps track of which seeds and peers are in the swarm. Clients report information to the tracker periodically and in exchange receive information about other clients to which they can connect. The tracker is not directly involved in the data transfer and does not have a copy of the file.

File sharing characteristics : Peer-to-Peer usage follows the typical 80/20 rule, in that 80% of files downloaded (by volume of total traffic)represent only 20% of the files available (by number of unique files available). In fact, research shows the breakdown is closer to 90/10. The language used for bit comet command is C++ while bit torrent works on Python.

Limitations and security : BitTorrent does not offer its users anonymity. It is possible to obtain the IP addresses of all current, and possibly previous, participants in a swarm from the tracker. This may expose users with insecure systems to attacks.

Another drawback is that BitTorrent file sharers, compared to users of client/server technology, often have little incentive to become seeders after they finish downloading. The result of this is that torrent swarms gradually die out, meaning a lower possibility of obtaining older torrents. Some BitTorrent websites have attempted to address this by recording each user’s download and upload ratio for all or just the user to see, as well as the provision of access to older torrent files to people with better ratios. Also, users who have low upload ratios may see slower download speeds until they upload more. This prevents users from leeching, since after a while they become unable to download much faster than 1-10 kB/s on a high-speed connection. Some trackers exempt dial-up users from this policy, because they cannot upload faster than 1-5 kB/s.

BitTorrent is best suited to continuously connected broadband environments, since dial-up users find it less efficient due to frequent disconnects and slow download rates.

Some facts to be known about torrents:

Q: What are the five best torrent search engine?

A: As of October 2, 2006, the 5 Best Bit Torrent search engine sites are listed below. This list is selected from hundreds of reader votes, and voted on each week by a small panel of torrent download users. The criteria used to evaluate these torrent sites: breadth and depth of database, database currency, ease of use and searching, speed of access,general integrity of files, information provided on the torrent P2P community, price of membership, and readers’ comments.

1.The Pirate Bay (the piratebay.org)
2.Torrentz.com (its a torrent search engine)
3.Isohunt (this one is also cool)
4. Demonoid (i use it frequently)
5. Desitorrents.com (for indian movies)

Q. What Are the good BitTorrent software packages?

A: 1. uTorrent (has all the functions a torrent downloader, yet it very small memory foorprint)
2. Azureus (A utorrentJava lanBitLord logoguage client; was the best until uTorrent software came along)
3. ABC
4.Bitlord (Nice-looking GUI appearance )
5.BitComet (Good, but losing popularity to uTorrent and Azureus)
6.The Original BitTorrent Client (Authored by Bram Cohen himself; no fancy GUI here, but it downloads quickly)

Q: How are torrents special? How is the torrent community different from Kazaa or Limewire?
A: Like the other file-sharing networks (Kazaa, Limewire, Gnutella, eDonkey, and Shareaza) BitTorrent’s primary purpose is to distribute large media files to private users. Unlike most P2P networks, however, BitTorrent stands out for 5 major reasons:

1. BitTorrent networking is NOT a publish-subscribe model like Kazaa; instead, BitTorrent is true Peer-Peer networking where the users do the actual file serving.

2. Torrents enforce quality control by filtering out corrupted and dummy files, ensuring that downloads contain only what they claim to contain.

3. Torrents actively encourage users to share (“seed”) their complete files, while punishing users who “leech”.

4. BitTorrent can achieve download speeds over 1500 kilobits per second.

5. BitTorrent code is open-source, advertising-free, and adware/spyware-free. This means that no single person profits from BitTorrent’s success.

An important thing to note is that download speeds are controlled by Torrent tracking servers, who monitor all swarm users. If you share, tracker servers will reward you by increasing your alotted swarm bandwidth (sometimes up to 1500 kilobits per second).
Similarly, if you leech and limit your upload sharing, tracking servers will choke your download speeds, sometimes to as slow as 1 kilobit per second. Indeed, the “Pay It Forward” philosophy is digitally enforced! Leeches are not welcome in a BitTorrent swarm.

Beware of spam mail

What steps can I take to minimize spam email? What is spam email? Why is spam email an issue? Spam email is generally annoying, and can slow down computer networks and the delivery of legitimate email, and increase your download Spam mailcosts.

Why is spam email an issue?

Have you ever observed that you are getting few mails based on your search criteria. Even Google does so. In my Gmail inbox i find suggested mail based on my search on Google. Sometime you will get message like "Congrats! you won the lottery and so and so…", play this video, its amazing or some power point slides (either from your friend or from strangers).

Do you check these stuffs through any anti-virus before opening it?

I guess more than 75% users will say no. What if on click on such things will crash your system or will leak your personal information. Have you even thought about it? if not then start thinking….. This is what we call spam and through Social engineering it is very easy to get information about you and about your system.

You might have read or heard about web security that is being provided by any banks. They use "https" protocol to make it safe and a lot of security features are there. You might have read these few  lines somewhere which is written below: We are committed to developing online and electronic products to help taxpayers meet their obligations and make the experience easier, cheaper and more personalized. We place significant effort and resources into ensuring the security and privacy of tax information and the integrity of our systems. However, it is equally important that you know about, and can minimize the risk of, certain information technology issues that could:

  • cause you significant inconvenience or costs
  • impact on your ability to deal with us electronically or online
  • result in the loss or damage of your electronic information, or
  • lead to your electronic records or tax details being misused.

If you manage your tax affairs using a computer system, or use the Internet or e-commerce systems to deal with the tax office, then you should be aware of spam email.

What is spam email?

Spam email is the electronic equivalent of junk mail. It is email that is not requested and usually not wanted. It is typically used to promote a particular product or service. The amount of spam being sent has increased significantly over the past few years. Some authorities claim that spam may account for up to 80% of all email in the world.

Spam email is generally annoying, and can slow down computer networks and the delivery of legitimate email, and increase your download costs.

Most significantly, spam email may be used to distribute computer viruses, spy ware or Trojans that could affect your computer or allow others to access your personal information. Related publications available are:

What steps can I take to minimize spam email?

  • Delete all spam mail. Do not ask to be removed from a mailing list or follow hyperlinks to unsubscribe from further email. This just indicates your email address is active and you'll most likely receive even more unsolicited email.
  • Never purchase anything from a company that sends you spam email. This only supports the activity.
  • If you need to provide details to a particular website, review their privacy policies. Make sure you know what they will do with your email address and personal details. Do not provide your email address to any organisation you do not trust.
  • Set up a spam filter if your email program has this functionality. This can reduce spam by marking, blocking or deleting spam email.
  • Spam from Australian companies or individuals can be reported to the Australian Communications Authority (ACA) which administers the Spam Act 2003.

Spam emails produce as much greenhouse gas emissions each year as 3.1million cars, according to new research. A study for computer protection company McAfee showed that globally, spam uses 33 billion kilowatt hours (KWh) a year – enough energy to power 2.4million homes.

The research also found that the UK was the joint fourth biggest emitter of CO2 from spam in the world, creating 50,000 tonnes of carbon dioxide a year.
Greenhouse gases: Spam uses 33 billion kilowatt hours a year – enough energy to power 2.4million homes, claims the research. The Carbon Footprint of Spam study by researchers ICF said that nearly four-fifths of the energy use associated with the emails was in end-users deleting spam and searching for legitimate emails.

The report also claimed that spam filtering currently saved enough energy to reduce emissions equivalent to taking 13 million cars off the road.

More…

Jeff Green, senior vice president of product development and McAfee Avert Labs, said: 'As the world faces the growing problem of climate change, this study highlights that spam has an immense financial, personal and environmental impact on businesses and individuals.

'Stopping spam at its source, as well as investing in state-of-the-art spam filtering technology, will save time and money and will pay dividends to the planet by reducing carbon emissions as well.'

Note: I liked this article and read it somewhere a month ago, so thought to share with you people.

 

Links that may save your time on internet

Hi friends, whenever and whatever be the case, we usually do a lot of search for specific topic like downloading songs, movies, books etc., online tutorials related to programming, or any other area like Maths, Bio and so on . Now I tried to put few important links here so that you can save you time whilst searching such stuffs. I hope it would be very helpful to you internet guys.

  1. Songs/Movies (Audio/Video)