Username: Save?
Password:
Home Forum Links Search Login Register
    News: Keep The TechnoWorldInc.com Community Clean: Read Guidelines Here.
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
  Show Posts
Pages: 1 2 3 [4] 5 6 7 8 9 ... 27
43  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Orkut FunZone / Re: Testimonial Collection on: March 08, 2007, 01:55:14 AM
TESTIN UR BLOOOD

---10%complete

--------20%complete



-----------------50%complete





-----------------------70%copmlete





-----------------------------90%complete



---------------------------------100%complete




RESULTS: NO BLOOD FOUND...JUST HONEY FOUND


SO U R FULL OF HONEY
THATS Y U R SHOOOOOOOOOOOOOOOOOOOO SHWEEEEEEEEEEEEEEEEEEEEEEEEET...!!!
44  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Orkut FunZone / Re: Testimonial Collection on: March 08, 2007, 01:53:37 AM
TESTIMONIAL Karen Ge Hum Ek Dooje Ko Bari Bari,


Humein Lagti Hai Yeh Rasm Bari Pyaari,


Yeh TESTIMONIAL Miltay Hee Ek TESTIMONIAL Bhej Dena,


Kyunke Humein Bilkul Pasand Nahin Udhaari.


***** ***** ***** *****
45  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Orkut FunZone / Re: Testimonial Collection on: March 07, 2007, 01:36:37 AM
..........
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´øo´´´´´´´´
´´´´´´´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶´´´´´´´´´
´´´´´´´´´´´´´´´´´´´´´´´´1¶¢¶¶ø´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´´´´´¶ø¶¶7o´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´´´¶¶¶¶¢7$´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´o$7¶ø¢1ø´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´¶ø¶¶$¶¢$´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´¶¶¶ø$¶¶´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´´¶¶ø¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´´¶oo¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´´¶¢¢¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´´¶77¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´´¶ø¢¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´´¶7o¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´o¶7o¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´o¶o7¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´ø¶o1¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´ø¶7o¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´ø¶71¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´¶¶ø¢¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´¶¶1o¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´¶¶7o¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´ø¶$ø¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´¶¶´o¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´¶¶¢o¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´¶¶o7¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´¶¶$ø¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´¶¶¢´¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´1¶¶ø¢¶1´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´1¶¢¢o$o´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´1øo1o$7´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´1ø¢¢¢¶1´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´7$¢1¢¶´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´¶ø¢øøø7´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´oo7´ooø´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´¶¶øøo$¢¶¶´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´o¶¢777o1¶¶¶´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´¶¶o´o¢´7¶$¶o´´´´´´´´´´´´
´´´´´´´´´´´´´´´¶¶¶¢¢øøo¢¶øø¶ø´´´´´´´´´´´
´´´´´´´´´´´´´´o¶¶$¢ø$¶¶ø$$ø$¶´´´´´´´´´´´
´´´´´´´´´´´´´´¶¶ø$o¢øøøø$$$¢¶ø´´´´´´´´´´
´´´´´´´´´´´´´¶¶ø$¶¢øø$7o$$ø¢¶¶7´´´´´´´´´
´´´´´´´´´´´´´¶$$¶¶øøø¶$$$¶$øø¶¶´´´´´´´´´
´´´´´´´´´´´´¶¶$$$$øøø¶$$ø$oo¢¶¶¶´´´´´´´´
´´´´´´´´´´´¶¶$øø¶øoøo¢ø¢$$$$¢ø¶¶´´´´´´´´
´´´´´´´´´´´¶¶$$$$$¢ø¢øøø¶$$$¶ø$¶ø´´´´´´´
´´´´´´´´´´¶¶¶¢ø¶¶¶$¶ø¶7o¶$$¶$¶$¶¶´´´´´´´
´´´´´´´´´¶¶$$øo¶¶¶¶¶¶¶¶¶¶¶$7´oø¶¶¶´´´´´´
´´´´´´´´´¶¶¶$ø¶ø7´´´´´´´´o¶¶ø¶ø$¶¶7´´´´´
´´´´´´´´¶¶øø$$¶$¶¶¶¶¶¶¶¶¶¶ø$¶¶$¶¶¶¶´´´´´
´´´´´´´ø¶¶$¶¶$$$¢$$$$¶¶¶$$$$¶1´o$¶¶7´´´´
´´´´´´´¶$øø$$$$$¶¶ø7oo7o$$$$¶¶¶¶ø¶¶¶´´´´
´´´´´´¶¶¶$ø$$$$$$ø7¶¶¶¶ø¶$øøøø¶¶$¶¶¶ø´´´
´´´´´´¶¶$$$$øøø$$$$¶¶¶¶¶¶¶¶¶¶¶¶´´¶$¶¶´´´
´´´´´¶¶$$$¶$$$$$¶¶¶¶ø´´´´´7¶¶¶¶øø¶ø¶¢7´´
´´´´ø¶¶$$$$$$¶¶¶¶¶1´´´´´´´´´´´o¶¶¶¶¶¶1¢´
´´´1¶¶$$$$$¶¶¶¶´´´´´´´´´´´´´´´´´´´ø¶¶¶¶´
´´´¶¶$¶¶¶¶¶¶¶´´´´´´´´´´´´´´´´´´´´´´´´ø¶¶
´´$¶¶¶¶¶¶¶¢´´´´´´´´´´´´´´´´´´´´´´´´´´´´´
´´¶¶oø¶¶$´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´
´¶¶ø¶¶¶´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´
´¶¶¶¶´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´
o¶¶´´´´´´´´´´You Just Rock'’´´´´´´´´´´´´
46  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Orkut FunZone / Re: Cool Scraps Collection on: March 07, 2007, 01:31:26 AM
 ٥ﻻ ﻉ√٥ﺎ ٱu      ♡       ♥٥ﻻ ﻉ√٥ﺎ ٱu♡



  ♡  ♥٥ﻻ ﻉ√٥ﺎ ٱu     ♡    ♥٥ﻻ ﻉ√٥ﺎ ٱu      ♡       ♥٥ﻻ ﻉ√٥ﺎ ٱu


♥٥ﻻ ﻉ√٥ﺎ ٱu     ♡      ♥٥ﻻ ﻉ√٥ﺎ ٱu       ♡   ♥٥ﻻ ﻉ√٥ﺎ ٱu ♡   


         ♡    ♥٥ﻻ ﻉ√٥ﺎ ٱu    ♡      ♥٥ﻻ ﻉ√٥ﺎ ٱu    ♡         

♡      ♥٥ﻻ ﻉ√٥ﺎ ٱu      ♡       ♥٥ﻻ ﻉ√٥ﺎ ٱu

                   

٥ﻻ ﻉ√٥ﺎ ٱu♡        ♡      ♥٥ﻻ ﻉ√٥ﺎ ٱu     ♡     ♥٥ﻻ ﻉ√٥ﺎ ٱu ♡   

  ♡      ♥٥ﻻ ﻉ√٥ﺎ ٱu    

             ♡   ♥٥ﻻ ﻉ√٥ﺎ ٱu     ♡      ♥٥ﻻ ﻉ√٥ﺎ ٱu ♡   

♡♥٥ﻻ ﻉ√٥ﺎ ٱu♡     ♡

     ♥٥ﻻ ﻉ√٥ﺎ ٱu     ♡  ♥٥ﻻ ﻉ√٥ﺎ ٱu    ♡   ♥٥ﻻ ﻉ√٥ﺎ ٱu   ♥٥ﻻ ﻉ√٥ﺎ ٱu    ♡


  ♥٥ﻻ ﻉ√٥ﺎ ٱu    ♡    ♥٥ﻻ ﻉ√٥ﺎ ٱu    ♡    ♥٥ﻻ ﻉ√٥ﺎ ٱu    ♡ ♡

♡     ♥٥ﻻ ﻉ√٥ﺎ ٱu    ♡     ♥٥ﻻ ﻉ√٥ﺎ ٱu    ♡     ♥٥ﻻ ﻉ√٥ﺎ ٱu

√٥ﺎ ٱu    ♡ ♡
47  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / SMS / Re: Love SMS on: February 12, 2007, 10:44:11 AM
There are 12 months a year...30 days a month...7 days a week...24 hours a day...60 minutes an hour...but only one like you in a lifetime.

There are two reasons why I wake up in the morning: my alarm clock and you.

Great minds contain ideas, solutions and reasons; scientific minds contain formulas, theories and figures; my mind contains only you!

Love can be expressed in many ways. One way I know is to send it across the distance to the person who is reading this.

If I could change the alphabet, I would put U and I together!

Minsan caring is better than loving. Minsan tea is better than coffee. Minsan smile is better than laughter. Pero nobody is better than you.

There is night so we can appreciate day, sorrow so we can appreciate joy, evil so we can appreciate good, you so I can appreciate love.

You look great today. How did I know? Because you look great everyday.

What is love? Those who don't like it call it responsibility. Those who play with it call it a game. Those who don't have it call it a dream. Those who understand it call it destiny. And me, I call it you.

What is love? It is what makes your cell phone ring every time I send text messages.

If love can be avoided by simply closing our eyes, then I wouldn't blink at all for I don't want to let a second pass having fallen out of love with you.

I used to think that dreams do not come true, but this quickly changed the moment I laid my eyes on you.

Press down if you miss me. Talaga? Sweet mo naman. You really miss me huh? Still pressing down. Impressed na ako, ha? Sobrang miss na yan. Well, I miss you too.

Some people were born with talents. They can do beautiful things with their skills, knowledge and technology. But no one is as talented as you. You just come near, and there is already beauty.

A lady is a woman who makes a man behave like a gentleman. You're such a lady to me.

To forget you is hard to do and to forget me is up to you. Forget me not, forget me never. Forget this text, but not the sender.

When situation gets you down, remember there's Someone in Heaven who loves you and watches over you and there's someone on Earth who cares? I do.

Cell phones can be irritating sometimes. You always have to reload, recharge every now and then. Messages are delayed. But there's one thing I love about it. It connects me to you!

Words begin with ABC. Numbers begin with 123. Music begins with do, re, mi. And friendship begins with you and me!

Rain and sunshine do not always come together. Night and day never coincide. But you and I, whatever they say, is for me the perfect match.
When I dream, I dream of you...maybe one day, dreams will come true.

There is an ocean between us. Forests and mountains keep us apart. I may not be superman, but give me a second and I will fly across countries to send you my love. Have you received it?

If, out of time, I could pick one moment and keep it shining, always new, of all the days that I have lived, I'd pick the moment I met you.

I'm on a mission to get over you, in other words mission impossible.

I wish I'd be a tear in your eye to roll down your cheek and end up with your lips but I never wish you'd be a tear in my eye for I would lose you every time I cry.

When it rains, you don't see the sun, but it's there. Hope we can be like that. We don't always see each other, but we will always be there for one another.

I may run out of message to text you. I may run out of jokes too. I may also run out of battery or even a peso but my heart won't run out of space for you!

You'll know that you miss someone very much when every time you think of that person, your heart breaks into pieces and just a quick "Hello" from that person can bring the broken pieces back.

Love. All my life I have read about it, dreamt of it, waited for it, cried for it, needed it. Now with you, I have found it.

Sherlock Holmes was an idiot and Robert Watt was a fool. One was a detective, the other invented radar. But neither of them ever discovered you. I'm a genius!
When the time comes I can't smile anymore, don't worry about me, I know what to do. I'll just stare at one corner and think of you. No one else could make me happy like the way you do.

There's a love that only you can give, a smile that only your lips can show, a twinkle that can only be seen in your eyes, and a life of mine that you alone can complete.

Everyone wants to be the sun that lights up your life. But I'd rather be your moon, so I can shine on you during your darkest hour when your sun isn't around.

Ah-- I forgot your name. Can I call you mine? And, in case you forget my name too, call me yours!

If I had the letters "HRT", I can add "EA" to get a "HEART" or a "U" and get "HURT". But I'd rather choose "U" and get "HURT" than have a "HEART" without "U".
You may never see how much I care for you. You may never hear how much I treasure you. You may never feel how much I miss you. Coz only here in my heart can you see them true.

There are 4 steps to happiness: 1. you, 2. me, 3. our hearts, 4. together!

If kisses were water, I'd give you the ocean. If hugs were leaves, I'd give you a forest. If love were space, I'd give you a galaxy. If friendship were life, I'd give you mine for free.

It's hard to say hello because it might be goodbye. It's hard to say I'm okay because sometimes I'm not. But it's easy to say I miss you coz I know that I really do.

It's hard for two people to love each other when they live in two different worlds. But when these two worlds collide and become one, that's what you call you and I.

If you're feeling lonely and you think there is nobody there to love, support, listen or show they care, just save this message and every time you realize it, it will remind you that a part of me is always there with you.

Roses are red, violets are blue. I am waiting to hear from a cute guy like you.

They say that as long as there is one person loving you, life isn't a waste. So if you lose hope and thought that life is not worth living, just remember I'm here.

Do you know that men and women are angels created with only one wing? And they need to embrace each other to be able to fly... Hope you can find your angel whom you can fly with forever.

They told me I could do anything if I put my mind into it. Yet no matter how hard I try in all that I do, I just can't take my mind off you.

My biggest reward is to see you smile, know you are happy, and feel you are loved. I know life is sometimes cruel, but that's why I'm here, to show you that life can be good when somebody cares.

I always think of you, but I always fail to know the reason why. Is there something else I should know about you? But there is one thing that I know is true. That life will always be sad without you.

Hatred infects the mind; love dissolves it. You dissolve my mind.

Don't say you love me unless you really mean it cause I might do something crazy like believe it.

I'm afraid to close my eyes coz I might think of you. I'm afraid to open them coz I might see you. I'm afraid to move my lips coz I might speak of you. I'm afraid to listen coz I might hear my heart fall for you.

I'm sorry to be smiling every time you're near. I'm sorry my eyes twinkle whenever you're here. I'm sorry that cupid has made his hit. I'm sorry I love you, I can't help it.

Caring for someone is easy but making someone care for you is hard. Now I keep wondering how did you make it so easy for me to care for you.

Text me when you are sad, text me when you need someone to listen to and you can't find anyone who will. I don't care if I'm your last option, I just don't want you to cry alone.

I don't want to say I miss you, though deep inside I do, coz I'm afraid you might see thru and know how much fear I have of losing someone like you.

If love can be avoided simply by closing our eyes, I wouldn't blink at all for I don't want to let a second pass having fallen out of love with you.

I wish one day you will miss me terribly that no matter how hard you look for me, you won't find me. Why? Because, I want you to miss me the way I'm missing you right now.

If I could be any letter in the alphabet, I'd choose "V" so I can be next to "U"; if you could be any note, I wish you're "RE" so your always beside "ME"!

Whatever you do, I'll walk with you. Hoping that your every dream would come true. Anytime, anywhere, I'll always be there. Wishing you love and happiness because I care.

The spaces between our fingers were created so that another person's fingers could fill them in. Hope you'll find your dream hand to hold you forever
48  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / SMS / Few Funny SMS of my Choice... on: February 12, 2007, 10:42:49 AM
****************************************

1) What is the similarity between Bill gates and me? Dont know? So
simple, He never comes to my house and I never go to his
house ...EGO PRoblem

****************************************

2) We sms Each Other B'coz U Think Im Nice i Think Ur Nice U Think
Im Cool i Think Ur Cool U Think Im Sweet i Think Ur Sweet U Think Im
Smart i Think Ur RigHT

****************************************

3) Who Said English is Easy

Fill this blank with
Yes or No?

1. __ I don't have a BRAIN.

2. __I dont have SENSE.

3. __I am STUPID.

****************************************


4) I can't live without u.Without u I can't even imagine 2 exist.U r
in my breath,I can't live without u even for a second.
HOLD ON...HOLD ON...
Itna khush hone ki jarurat nahin hai,I am talking about OXYGEN.


****************************************



5) I was writing 3 Good Lines about u & i wrote:

1. )_______

2. )_______

3. )_______


nalayak kuchh to accha kiya hota life mein, tabhi likhta.


****************************************

6) I want to Share 'EVRYTHING' with U. Your JOYS ur SADNESS, ur
HAPPY MOMENTS. Every Single SECOND OF THE DAY. Let's START with
Your "BANK A/C

****************************************

7) When cloud breaks rain falls, When coconut breaks water falls,
When luv breaks tears fall, But.. When ur HEAD breaks.. Aailaa !!!
Khali hai!

****************************************

Cool U r sweet U r caring U r artist U r kind U r intelligent U r
atractive U r smart thoda aur IMPROVE karo Tabhi mere jaise banoge.


****************************************

9) Aaj ye baat samjh aai,is dharti par Apki hukumat samjh aai,apko
dharti par bhejna khuda ka bahana tha,kyunki ravan k bad kisi ko to
aana tha..


****************************************


10) A woman worries about the future until she gets a husband. A man
never worries about the future until he gets a wife..


****************************************


11) PanditJi ne apke mobile ki rashi dekh kar bataya hai ki aapke
mobile pe KANJOOSI ki mahadsha mandra rahi hai.Turant 21 Sms ka
yagna karvao


****************************************

12) Shukriya karo oos khuda ka k usne hume banaya hai... kyonki ek
pyaara, achchha, smart,cute & Handsom sa dost humne na sahi tumne to
paya hai


****************************************

13) Ishq ne insaan ko kya se kya bana diyb, kisiko ashiq to kisiko
deewana bana diya, 2 phool ka boj na utha sakti thi mumtaj ,
shahjahan ne pura taj mahal mumt
aj par bana diya.


****************************************

14) There once lived 4friend,Mad,Brain,Sumbody,Nobody.1day,Sumbody
killed Nobody.That time Brain was in toilet Mad call the
police.Mad:Is it police station? Pol
ice:Yes,what is the matter?
Mad:Sumbody killed Nobody
Police:R u mad?
Mad:Yes,Iam Mad
Police:Dont u have brain?
Mad:Brain is in the toilet.


****************************************

15) Main aapko dekhna chahta hoon,aapse milna chahta hoon,par yeh
log bahut zalim hain kehte hain


"ZOO"bandh ho gaya kal aana...

****************************************

16) Sweet persons talk from HUTCH.Lovers talk from AIRTEL . Beggers
talk from BSNL. Beuties talk from SPICE. But BRILLIANTS never talk.
They send SMS


****************************************

17) Asmaan per jitne sitare hain ! Ankhon main jitne ishare
hain 'Samander ke jitne kinare hain " UTNE SCREW DHEELE TUMHARE
HAIN " ha ha ha

****************************************

1Cool Wife:kal raat tum neend me mujhe gaaliya de rahe the.
Husband:Tumhe galat fehmi hui hai.
Wife:kaisi galat fehmi?
Husband:Yehi ki main soya hua tha.

****************************************

19) SardarDirector:U Should jump 2 d swimingpool frm 100 ft Height.
Act: i don't know swiming. SardarDirector: dn't wory, their is no
water.

****************************************

20) Hi jaan_
Kya haal hai jaan_
Kaha ho jaan_
Kab miloge jaan_
Tumhari badi yaad aa rahi hai jaan_
Zyada khush na ho.
Har blank _ mein "war" word add kar lena.

========================================================
49  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / SMS / Romantic SMS on: February 12, 2007, 10:38:33 AM
Sunsaan sarak k sookhay hoi peepal Ki Tuti Hui Tehnee k Murjhaye Hue Pattay Pay Baithay Hue bhoot Kay Pair Say Nikaltay Hue Khoon Kay Beemar Bacteria............HOW R U?Huh??

Bottle main Pepsi say zyaada....used Socks main smell say bhi zyaadaa.... Adnan Sami main charbi say zyaada... Mithai main sweet say zyaada...Pakistan main coruption say zzyaada...
I LOV U



Kudrat ke karishmon mein agar raat na hoti,
To khwab mein unse mulaqat na hoti,
Wo wada to kar gaye ki ayenge khwab mein,
Mare khushi ke neend na aye to kya karen.



Na khwabon me dekha, na nazaron me dekha,
Hazaron me ek humne tum hi ko dekha,
Gum dene wale to har pal hai yahan,
Har pal khushi dene walon me ek aap hi ko dekha




Today, tommorow and yesterday there will be one heart that would always beat for you You know Whose???
your Own Stupid!!!




Kajal banke teri aankho mein samane ki tamanna hai,

Dawa banke tere dard mitane ki tamanna hai,

Yun to haasil hai zamane ki har cheez mujhe,

Sirf ek baar tujhe dulhan ke roop mein paane ki tamanna hai



True friends are those
Who Care without hasitation,
Remember without Limitation,
Forgive without any Explanation,
and Love even with little Communication!!!


The Golden words are "Don't cry in Love"
because for whom u r crying does not deserve your tears
and the person who deserves it will never let u cry!!


What is sweet but not Honey,
Precious but not Money,
Bright but not Sunshine,
Improves with time but not Wine???
Its....OUR FRIENDSHIP!!!




If i cud reach up and hold a star 4 every time u made me smile the entire evening sky wud b in the palm of my hand.




When i am not messaging u it does not mean that i have forgotten u, i am just giving u time to MISS ME!!




Mail Karrha Hoon .. Rakhna Sambal Kay

Jab Be Meri Yaad Aaye Perhna Nikal kAy



Tumseh Doori Ka Ehsaas Satane Laga,
Tere Saath Guzra Har Lamha Yaad Aneh Laga,
Jab Bhi Bhoolne Ke Koshish Ki Mene,
Tu DIL Keh Aau KAREEB Aneh Laga.


Yaadon me hum rahen ye ehsaas rakhna,
Nazaron se dur pal dil ke paas rakhna,
Ye nahi kahte ke sath raho,
Dur sahi par humen yaad rakhna...


PYAAR JAB EK TARAF SE HO TOH SAZA DETA HAIN,
PYAAR JAB DONO TARAF SE HO TOH MAZAA DETA HAIN,
AAJ KAL KI IS DUNIYA MEIN KAUN KISKA HOTA HAIN,
DAGA WAHI DETE HAIN JINPAR KI BHAROSA HOTA HAIN,

Dil gumsum, Zubaan Khamosh,
Aankhein aaj num kyon hai.
Jo kabhi apna hua hi nahin
use aaj khone ka gum kyon hai...


OR KOI GAM NAHI EK TERI JUDAI KE SIVA,
MERE HISSE ME KYA AAYA TANHAI KE SIVA!
YU TO MILAN KI RAATE MILI BESUMAAR,
PYAR ME SAB KUCHH MILA SEHNAI KE SIVA!!


Ankhen to pyar me dilki zuban hoti hai,
sachi chahat to sada bezuban hoti hai.
pyar mai dard bhi mile to kya gabrana,
suna hai dard se chahat aur jawan hoti hai....


sans lene se bhi teri yaad aati hai,
nalene se meri jaan jati hai,
kasise kahun ki sanns se main jinda hon
jabki sans se pehle teri yaad aati hai.

zaraa palat kar to dekh lete,
hum wahi khade the,
pal do pal to aap muskura lete,
to un palo mein hum apni sari zindagi jee lete


Yun toh bahut tha baatane ko,
zamaane se chup ke chaha tha apne chahne wale ko,
kya khabar thi yun tanha chod deega woh,
acha hua ki mere dukh ki khabar bhi na mil paaye zamaane ko. .......


Kuch badli hui takdeer nazar aati hai,
yadon ki bani zanzir nazar aati hai,
padhe to kya padhe har panne par
teri tasveer nazar aati hai...


Khali shishe bhi nishaan rakhte hain...
Tute hue dil bhi armaan rakhte hai...
Joh khaamoshi se guzar jaye,
woh dariya bhi dil me toofan rakhte hain



KARO KOI WADA JISE TUM NIBHA NA SAKO,
MAT CHAHO USE JISE TUM PA NA SAKO,
PYAR KAHAN KISI KA POORA HOTA HAI,
ISKA TO PEHLA SHABD HI ADHOORA HOTA HAI




Meri har khata par naraz na hona,
Apni pyari si muskan kabhi na khona,
Sukoon milta he dekhkar apki muskurahat ko,
Mujhe maut bhi aye to bhi mat rona




Jisne humko chaha, use hum chah na sake,
Jisko chaha usae hum pa na sake,
Yeh samajh lo dil tutne ka khel hai,
Kisi ka toda aur apna bacha na sake






GAMO SE KYA DARNA WO TO SABHI KO MILTE HAIN
PHOOLO KO DEKHO HAMESHA KAANTO KE BEECH KHILTE HAIN





Tumhari yadoon ko rok pana hai mushkil,
Rote huey dil ko manana hai muskil,
Ye dil apko kitna yaad karta hai,
Ek sms main likh pana hai mushkil
50  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / SECURITY TERMINOLOGY on: January 06, 2007, 12:18:26 AM
SECURITY TERMINOLOGY

Anti-virus: Software that scans your pc for viruses, worms, and Trojans using up-to-date virus signatures. Once found, the program can remove, or quarantine the virus and (ideally) keep it from performing whatever malicious duties is was sent to do.

Attack: An attempt by an unauthorized individual or program to gain control over aspects of your pc for various purposes.

Backdoor: This is sometimes referred to as a trapdoor, and is a feature in programs that the original programmer puts into the code in order to fix bugs or make other changes that need to be made. However, if this information becomes known to anyone else it poses a potential security risk.

Firewall: A firewall refers to either a software or hardware device that basically protects your internal network from any outside threat or any unauthorized Internet access from the inside.

Hijacking: An attack whereby an active, established, session is intercepted and used by the attacker. Hijacking can occur locally if, for example, a legitimate user leaves a computer unprotected. Remote hijacking can occur via the Internet.

Hole: A known flaw in code that can compromise the security of your system by allowing unauthorized access.

HTTPS (Hypertext Transfer Protocol Secure): This is a version of http that is far more secure and is used (or should be used) in areas of the web where sensitive information is being used or exchanged.

Key: These are the names of Windows Registry components that are responsible for keeping the settings in Windows. Every time a program gets added to or uninstalled from a pc the Registry gets changed. If a virus gets into your system and makes changes to your registry keys it can cause serious performance changes.

Key loggers: These are used in legitimate programs but have been a favorite of hackers for years. Basically, what a key logger does is log your keystrokes for however long it is configured for. Hackers use these types of programs to find important information like usernames and passwords for sensitive accounts or highly secure areas.

@mm: This is usually seen at the end of a virus name i.e. W32netsky@mm and signifies that this virus is a mass mailer. A mass mailer is the term for a virus that upon infection can mail itself out to email addresses that it harvests from various areas of your hard drive—especially your address book. Sometimes you will see the designation with only one "m" at
the end of the virus name this stands for mailer and this kind of virus can only ride along with email messages you send.

Here are some more security terms that you should become familiar with.

Macro virus: Code written to take advantage of Hotkey" abilities to deliver its payload or replicate. Macros are hotkeys—key combinations that you can record and link to a single or fewer keystrokes.

Payload: This is the portion of the virus that is released into your system; it isn t always destructive but is always unwanted.

Port: The protocol stacks TCP/IP which is the protocol of the Internet (for the most part). There are several small parts to an Internet address, or IP address. While the IP address is your logical location on the web, the port number is an identifier for the service you would like to use on the system you re connecting to.
*A port has always been a tough concept to grab but is a very important component in fighting off hackers, Firewalls are so important because they deny any accesses to or from ports that you haven t granted access to. A firewall is an absolute necessity for broadband users.

Protocol: A set of rules and standards to govern the exchange of data between computers and related devices. There are protocols in almost every aspect of computers from web design to programming to network administration.

Replication: After a virus successfully infects a PC it usually starts to copy itself. Then it tries to infect either different parts of your system, or other systems, usually through address books or shared network files. This is usually one of the chief missions of a virus and by means of replication viruses can grow and infect new systems at an exponential rate.

Security response: The process of research, creation, delivery, and notification of responses to viral and malicious code threats, as well as operating system, application, and network infrastructure vulnerabilities.

SMTP: Simple Mail Transport Protocol. This is an email protocol that is responsible for moving mail from mail server to mail server.

Variant: A modification to the original virus code in an attempt to either throw antivirus software companies off, or create a different effect from the virus.

Virus definitions file: These are data files used by antivirus programs to help them identify and deal with viral attempts to infect your system.
51  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Techno News / Consumers to Lose $2.8 Billion to Phishers in 2006 on: January 05, 2007, 11:52:21 PM
Browser makers may have added new antiphishing features to their products in recent months, but the criminals are still gaining ground in their efforts to defraud U.S. consumers, according to the Gartner research firm.

Phishers have hit more victims with their online attacks, and while fewer people are losing money to phishers, successful attempts have been yielding bigger payoffs, said Avivah Litan, vice president and distinguished analyst at Gartner. "When they do succeeded, they're stealing five times more than they stole last year."

Phishers Get Big Payoffs
The average loss per phishing attack was $1244 this year, Litan said, up from $256. Gartner estimates that the total financial losses attributable to phishing will total $2.8 billion this year.

And users who are taken in by phishing scams are less likely to recover their money, Litan said. In 2005, 80 percent of victims got their money back. This year, that number dropped to 54 percent.

Gartner estimates that 3.5 million Americans will give up sensitive information to phishers in 2006--up from an estimated 1.9 million last year.

Antiphishing Efforts Playing Catch-Up
Although the recently released Internet Explorer 7 and Firefox 2.0 browsers came with new antiphishing features, Microsoft and Mozilla are still playing catch-up with the crooks.

"It's still too early to know how effective [these new antiphishing features] are, but certainly that technology is a couple of years too late," Litan said.

Phishing filters are not working because attackers are moving around their phishing Web sites and making it very difficult for antiphishing tools to tell the difference between a computer that is malicious and one that is simply unknown, she said.

A year ago, the average lifespan of a phisher's Web site was one week. Now it's just a few hours. "In the next year or two it will probably be one server per e-mail," Litan said. "They're impossible to catch and take down."

A Failure to Communicate
Antiphishing expert Paul Laudanski agrees that these attacks are on the rise. Part of the problem, he says, is the fact that Internet service providers and the companies being spoofed by phishers are not doing all they could to share information and track down the criminals.

Often companies are reluctant to share information for fear that it may lead to lawsuits, said Laudanski, owner of Computer Cops and the leader of the Phishing Incident Reporting and Termination squad project.

"What we need, I believe, is free, open communication," he said. "The criminals are working together in this, but it's hard for us to work together."
52  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Protecting Your Children On The Internet on: January 04, 2007, 11:46:42 PM
If you are a parent, as am I, I think we can agree there is little else more important than keeping our children safe and protected. It's difficult enough keeping them safe from the unscrupulous people we read about in the news, but dealing with children and the Internet takes it to a completely new level.

Many young people find instant messaging and e-mail a convenient and fun way to talk with their friends. If you have children, like me, when they're not on the phone, they're talking with their friends on the Internet. We have very strict rules and guidelines about who they can talk with and for how long. We have given them detailed instructions on what to do when they receive e-mail from someone they don't know or receive an anonymous instant message.

Recently, someone close to me received a death threat via an anonymous instant message. The language this person used was so vulgar and explicit you would have thought it came from a prison inmate. Interestingly enough, the person at the other end was a child.

After significant investigation we determined this person was a school mate. They had received detailed information about the child including the child's instant messenger alias, their home address and color, and what type of cars the family drove. Can you imagine how scared this child and child's family was? Quite frankly, it was not only sad but sickening that another child could be so verbally brutal. Additional investigation revealed that the school these children go to were aware that this had been going on for quite some time. Other children had been receiving similar threats.

This particular event was all the result of several children speaking in a chat roam and one child in particular got upset about something that was said. That child contacted another child, who is known to be mean, and asked them to scare one of the other children. We got to the bottom of the whole mess and everyone felt a bit of relief.

It's very important to pay attention and, in some cases, monitor what children are doing on the Internet. It's for their protection and the protection of others. I'm sure I am going to get an ear full from privacy rights advocates on this one. Regardless, the safety of our children is one of the most important tasks a parent has.

If your children use e-mail and Instant Messaging on a regular basis you should;

1) Limit the number of people they can e-mail and message with;
2) Work with them to develop an approved list of friends;
3) Limit the amount of the time they spend e-mailing and messaging;
4) Make your presence known while they are e-mailing or messaging; and
5) If necessary install some sort of monitoring software to see what is going on in chat rooms.

Update: Shortly after writing this article, a 13 year old boy at a middle school in my area was arrested for e-mailing death threats to two teachers. In one e-mail he indicated he was planning on bringing a gun to school to kill a teacher. The other e-mail, sent to a teacher at a different school, indicated that he planned on targeting students as well. For further details please see the full article at South Florida's Sun Sentinel "http://www.sun-sentinel.com/news/local/palmbeach/sfl-pcletter18feb18,1,216444.story?ctrack=1&cset=true."

For information on computer monitoring software take a look at WatchRight http://www.watchright.com/.

A good site to visit to learn more about protecting children on the Internet is www.protectkids.com. It's full of great information every parent should know. Other sites you may want to visit are http://www.isafe.org/, and Obscenity Crimes Reporting http://www.obscenitycrimes.org/.
53  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Miscellaneous / FAQ’s about Testing on: January 03, 2007, 02:07:11 PM
What is Software Quality Assurance ?
Software Quality Assurance involves the entire software development process monitoring and improving the process, making sure that any agreed upon standards and procedures are followed, and ensuring that problems are found and dealt with. It is oriented to prevention .

What is Software Testing ?
Testing involves operation of a system or application under controlled conditions and evaluating the results

(Eg, if the user is in interface A of the application while using hardware B, and does C, then D should happen ).

The controlled conditions should include both normal and abnormal conditions. Testing should intentionally attempt to make things go wrong to determine if things happen when they shouldn t or things don t happen when they should. It is oriented to detection .

Organizations vary considerably in how they assign responsibility for QA and testing. Sometimes they re the combined responsibility of one group or individual. Also common are project teams that include a mix of testers and developers who work closely together, with overall QA processes monitored by project managers. It will depend on what best fits an organization s size and business structure.

What are some recent major computer system failures caused by software bugs?

* In July 2004 newspapers reported that a new government welfare management system in Canada costing several hundred million dollars was unable to handle a simple benefits rate increase after being put into live operation. Reportedly the original contract allowed for only 6 weeks of acceptance testing and the system was never tested for its ability to handle a rate increase.
* Millions of bank accounts were impacted by errors due to installation of inadequately tested software code in the transaction processing system of a major North American bank, according to mid-2004 news reports. Articles about the incident stated that it took two weeks to fix all the resulting errors, that additional problems resulted when the incident drew a large number of e-mail phishing attacks against the bank s customers, and that the total cost of the incident could exceed $100 million.
* A bug in site management software utilized by companies with a significant percentage of worldwide web traffic was reported in May of 2004. The bug resulted in performance problems for many of the sites simultaneously and required disabling of the software until the bug was fixed.
* According to news reports in April of 2004, a software bug was determined to be a major contributor to the 2003 Northeast blackout, the worst power system failure in North American history. The failure involved loss of electrical power to 50 million customers, forced shutdown of 100 power plants, and economic losses estimated at $6 billion. The bug was reportedly in one utility company s vendor-supplied power monitoring and management system, which was unable to correctly handle and report on an unusual confluence of initially localized events. The error was found and corrected after examining millions of lines of code.
* In early 2004, news reports revealed the intentional use of a software bug as a counter-espionage tool. According to the report, in the early 1980 s one nation surreptitiously allowed a hostile nation s espionage service to steal a version of sophisticated industrial software that had intentionally-added flaws. This eventually resulted in major industrial disruption in the country that used the stolen flawed software.
* A major U.S. retailer was reportedly hit with a large government fine in October of 2003 due to web site errors that enabled customers to view one another’s online orders.
* News stories in the fall of 2003 stated that a manufacturing company recalled all their transportation products in order to fix a software problem causing instability in certain circumstances. The company found and reported the bug itself and initiated the recall procedure in which a software upgrade fixed the problems.
* In August of 2003 a U.S. court ruled that a lawsuit against a large online brokerage company could proceed; the lawsuit reportedly involved claims that the company was not fixing system problems that sometimes resulted in failed stock trades, based on the experiences of 4 plaintiffs during an 8-month period. A previous lower court s ruling that "...six miscues out of more than 400 trades do not indicate negligence." was invalidated.
* In April of 2003 it was announced that a large student loan company in the U.S. made a software error in calculating the monthly payments on 800,000 loans. Although borrowers were to be notified of an increase in their required payments, the company will still reportedly lose $8 million in interest. The error was uncovered when borrowers began reporting inconsistencies in their bills.
* News reports in February of 2003 revealed that the U.S. Treasury Department mailed 50,000 Social Security checks without any beneficiary names. A spokesperson indicated that the missing names were due to an error in a software change. Replacement checks were subsequently mailed out with the problem corrected, and recipients were then able to cash their Social Security checks.
* In March of 2002 it was reported that software bugs in Britain s national tax system resulted in more than 100,000 erroneous tax overcharges. The problem was partly attributed to the difficulty of testing the integration of multiple systems.
* A newspaper columnist reported in July 2001 that a serious flaw was found in off-the-shelf software that had long been used in systems for tracking certain U.S. nuclear materials. The same software had been recently donated to another country to be used in tracking their own nuclear materials, and it was not until scienti
sts in that country discovered the problem, and shared the information, that U.S. officials became aware of the problems.
* According to newspaper stories in mid-2001, a major systems development contractor was fired and sued over problems with a large retirement plan management system. According to the reports, the client claimed that system deliveries were late, the software had excessive defects, and it caused other systems to crash.
* In January of 2001 newspapers reported that a major European railroad was hit by the aftereffects of the Y2K bug. The company found that many of their newer trains would not run due to their inability to recognize the date 31/12/2000 ; the trains were started by altering the control system s date settings.
* News reports in September of 2000 told of a software vendor settling a lawsuit with a large mortgage lender; the vendor had reportedly delivered an online mortgage processing system that did not meet specifications, was delivered late, and didn t work.
* In early 2000, major problems were reported with a new computer system in a large suburban U.S. public school district with 100,000+ students; problems included 10,000 erroneous report cards and students left stranded by failed class registration systems; the district s CIO was fired. The school district decided to reinstate its original 25-year old system for at least a year until the bugs were worked out of the new system by the software vendors.
* In October of 1999 the $125 million NASA Mars Climate Orbiter spacecraft was believed to be lost in space due to a simple data conversion error. It was determined that spacecraft software used certain data in English units that should have been in metric units. Among other tasks, the orbiter was to serve as a communications relay for the Mars Polar Lander mission, which failed for unknown reasons in December 1999. Several investigating panels were convened to determine the process failures that allowed the error to go undetected.
* Bugs in software supporting a large commercial high-speed data network affected 70,000 business customers over a period of 8 days in August of 1999. Among those affected was the electronic trading system of the largest U.S. futures exchange, which was shut down for most of a week as a result of the outages.
* In April of 1999 a software bug caused the failure of a $1.2 billion U.S. military satellite launch, the costliest unmanned accident in the history of Cape Canaveral launches. The failure was the latest in a string of launch failures, triggering a complete military and industry review of U.S. space launch programs, including software integration and testing processes. Congressional oversight hearings were requested.
* A small town in Illinois in the U.S. received an unusually large monthly electric bill of $7 million in March of 1999. This was about 700 times larger than its normal bill. It turned out to be due to bugs in new software that had been purchased by the local power company to deal with Y2K software issues.
* In early 1999 a major computer game company recalled all copies of a popular new product due to software problems. The company made a public apology for releasing a product before it was ready.
* The computer system of a major online U.S. stock trading service failed during trading hours several times over a period of days in February of 1999 according to nationwide news reports. The problem was reportedly due to bugs in a software upgrade intended to speed online trade confirmations.
* In April of 1998 a major U.S. data communications network failed for 24 hours, crippling a large part of some U.S. credit card transaction authorization systems as well as other large U.S. bank, retail, and government data systems. The cause was eventually traced to a software bug.
* January 1998 news reports told of software problems at a major U.S. telecommunications company that resulted in no charges for long distance calls for a month for 400,000 customers. The problem went undetected until customers called up with questions about their bills.
* In November of 1997 the stock of a major health industry company dropped 60% due to reports of failures in computer billing systems, problems with a large database conversion, and inadequate software testing. It was reported that more than $100,000,000 in receivables had to be written off and that multi-million dollar fines were levied on the company by government agencies.
* A retail store chain filed suit in August of 1997 against a transaction processing system vendor (not a credit card company) due to the software s inability to handle credit cards with year 2000 expiration dates.
* In August of 1997 one of the leading consumer credit reporting companies reportedly shut down their new public web site after less than two days of operation due to software problems. The new site allowed web site visitors instant access, for a small fee, to their personal credit reports. However, a number of initial users ended up viewing each others reports instead of their own, resulting in irate customers and nationwide publicity. The problem was attributed to "...unexpectedly high demand from consumers and faulty software that routed the files to the wrong computers."
* In November of 1996, newspapers reported that software bugs caused the 411 telephone information system of one of the U.S. RBOC s to fail for most of a day. Most of the 2000 operators had to search through phone books instead of using their 13,000,000-listing database. The bugs were introduced by new software modifications and the problem software had been installed on both the production and backup systems. A spokesman for the software vendor reportedly stated that It had nothing to do with the integrity of the software. It was human error.
* On June 4 1996 the first flight of the European Space Agency s new Ariane 5 rocket failed shortly after launching, resulting in an estimated uninsured loss of a half billion dollars. It was reportedly due to the lack of exception handling of a floating-point error in a conversion from a 64-bit integer to a 16-bit signed integer.
* Software bugs caused the bank accounts of 823 customers of a major U.S. bank to be credited with $924,844,208.32 each in May of 1996, according to newspaper reports. The American Bankers Association claimed it was the largest such error in banking history. A bank spokesman said the programming errors were corrected and all funds were recovered.
* Software bugs in a Soviet early-warning monitoring system nearly brought on nuclear war in 1983, according to news reports in early 1999. The software was supposed to filter out false missile detections caused by Soviet satellites picking up sunlight reflections off cloud-tops, but failed to do so. Disaster was averted when a Soviet commander, based on what he said was a ...funny feeling in my gut , decided the apparent missile attack was a false alarm. The filtering software code was rewritten.
54  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Others / Technical Introduction to XML on: January 03, 2007, 01:36:54 PM
What is XML?:

XML is a markup language for documents containing structured information.

Structured information contains both content (words, pictures, etc.) and some indication of what role that content plays (for example, content in a section heading has a different meaning from content in a footnote, which means something different than content in a figure caption or content in a database table, etc.). Almost all documents have some structure.

A markup language is a mechanism to identify structures in a document. The XML specification defines a standard way to add markup to documents.
What s a Document?:

The number of applications currently being developed that are based on, or make use of, XML documents is truly amazing (particularly when you consider that XML is not yet a year old)! For our purposes, the word "document" refers not only to traditional documents, like this one, but also to the miriad of other XML "data formats". These include vector graphics, e-commerce transactions, mathematical equations, object meta-data, server APIs, and a thousand other kinds of structured information.
So XML is Just Like HTML?

No. In HTML, both the tag semantics and the tag set are fixed. An <h1> is always a first level heading and the tag <ati> is meaningless. The W3C, in conjunction with browser vendors and the WWW community, is constantly working to extend the definition of HTML to allow new tags to keep pace with changing technology and to bring variations in presentation (stylesheets) to the Web. However, these changes are always rigidly confined by what the browser vendors have implemented and by the fact that backward compatibility is paramount. And for people who want to disseminate information widely, features supported by only the latest releases of Netscape and Internet Explorer are not useful.

XML specifies neither semantics nor a tag set. In fact XML is really a meta-language for describing markup languages. In other words, XML provides a facility to define tags and the structural relationships between them. Since there s no predefined tag set, there can t be any preconceived semantics. All of the semantics of an XML document will either be defined by the applications that process them or by stylesheets.
So XML Is Just Like SGML?

No. Well, yes, sort of. XML is defined as an application profile of SGML. SGML is the Standard Generalized Markup Language defined by ISO 8879. SGML has been the standard, vendor-independent way to maintain repositories of structured documentation for more than a decade, but it is not well suited to serving documents over the web (for a number of technical reasons beyond the scope of this article). Defining XML as an application profile of SGML means that any fully conformant SGML system will be able to read XML documents. However, using and understanding XML documents does not require a system that is capable of understanding the full generality of SGML. XML is, roughly speaking, a restricted form of SGML.

For technical purists, it s important to note that there may also be subtle differences between documents as understood by XML systems and those same documents as understood by SGML systems. In particular, treatment of white space immediately adjacent to tags may be different.
Why XML?:

In order to appreciate XML, it is important to understand why it was created. XML was created so that richly structured documents could be used over the web. The only viable alternatives, HTML and SGML, are not practical for this purpose.

HTML, as we ve already discussed, comes bound with a set of semantics and does not provide arbitrary structure.

SGML provides arbitrary structure, but is too difficult to implement just for a web browser. Full SGML systems solve large, complex problems that justify their expense. Viewing structured documents sent over the web rarely carries such justification.

This is not to say that XML can be expected to completely replace SGML. While XML is being designed to deliver structured content over the web, some of the very features it lacks to make this practical, make SGML a more satisfactory solution for the creation and long-time storage of complex documents. In many organizations, filtering SGML to XML will be the standard procedure for web delivery.

XML Development Goals:

The XML specification sets out the following goals for XML

1. It shall be straightforward to use XML over the Internet. Users must be able to view XML documents as quickly and easily as HTML documents. In practice, this will only be possible when XML browsers are as robust and widely available as HTML browsers, but the principle remains.
2. XML shall support a wide variety of applications. XML should be beneficial to a wide variety of diverse applications: authoring, browsing, content analysis, etc. Although the initial focus is on serving structured documents over the web, it is not meant to narrowly define XML.
3. XML shall be compatible with SGML. Most of the people involved in the XML effort come from organizations that have a large, in some cases staggering, amount of material in SGML. XML was designed pragmatically, to be compatible with existing standards while solving the relatively new problem of sending richly structured documents over the web.
4. It shall be easy to write programs that process XML documents. The colloquial way of expressing this goal while the spec was being developed was that it ought to take about two weeks for a competent computer science graduate student to build a program that can process XML documents.
5. The number of optional features in XML is to be kept to an absolute minimum, ideally zero. Optional features inevitably raise compatibility problems when users want to share documents and sometimes lead to confusion and frustration.
6. XML documents should be human-legible and reasonably clear. If you don t have an XML browser and you ve received a hunk of XML from somewhere, you ought to be able to look at it in your favorite text editor and actually figure out what the content means.
7. The XML design should be prepared quickly. Standards efforts are notoriously slow. XML was needed immediately and was developed as quickly as possible.
8. The design of XML shall be formal and concise. In many ways a corollary to rule 4, it essentially means that XML must be expressed in EBNF and must be amenable to modern compiler tools and techniques.
There are a number of technical reasons why the SGML grammar cannot be expressed in EBNF. Writing a proper SGML parser requires handling a variety of rarely used and difficult to parse language features. XML does not.
9. XML documents shall be easy to create. Although there will eventually be sophisticated editors to create and edit XML content, they won t appear immediately. In the interim, it must be possible to create XML documents in other ways: directly in a text editor, with simple shell and Perl scripts, etc.
10. Terseness in XML markup is of minimal importance. Several SGML language features were designed to minimize the amount of typing required to manually key in SGML documents. These features are not supported in XML. From an abstract point of view, these documents are indistinguishable from their more fully specified forms, but supporting these features adds a considerable burden to the SGML parser (or the person writing it, anyway). In addition, most modern editors offer better facilities to define shortcuts when entering text.

How Is XML Defined?:

XML is defined by a number of related specifications:
Extensible Markup Language (XML) 1.0:

Defines the syntax of XML. The XML specification is the primary focus of this article.

XML Pointer Language (XPointer) and XML Linking Language (XLink):

Defines a standard way to represent links between resources. In addition to simple links, like HTML s tag, XML has mechanisms for links between multiple resources and links between read-only resources. XPointer describes how to address a resource, XLink describes how to associate two or more resources.

Extensible Style Language (XSL):

Defines the standard stylesheet language for XML.
55  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Windows / Making Windows Xp Start 60% Faster on: January 03, 2007, 01:22:14 PM
Making Windows Xp Start 60% Faster, tutorial…

Whenever you start your computer, you are faced with a few moments of thumb twiddling while Windows XP boots and prompts you to log on. Although you should expect to wait for a few moments, sometimes Windows XP seems to boot rather slowly. In fact, you may notice that over a period of time the PC that used to roar to life seems a bit sluggish instead. Fortunately, you can perform several techniques that help Windows XP get the bootup speed you want. This chapter explores how to put these techniques to work.

Stopping Unneeded Startup Services

Along with the core operating system and programs that Windows XP runs when it starts, there is also a host of services involved. Many of these services are necessary for Windows XP to operate correctly. However, many of them are for features in Windows XP that you may not use at all. You can peruse the services and disable any service that you do not want to run. The fewer services that run, the more quickly Windows XP will boot.

Caution:
Exercise caution when stopping services. If you do not know what a service does or are unsure of the ramifications of stopping the service, leave it alone. Some services are critical to Windows XP’s operations, so make sure you understand what the service is before you disable it.

To reduce the number of services that start on bootup, you can access two different areas of Windows XP. The first is the System Configuration Utility. The Services tab shows you the services that start when the computer boots.

You can stop a service from starting by simply clearing the check box next to the service and clicking OK. However, before you do so, there is another way to disable services that you may prefer because the interface gives you more information about the service in question.

Open Control Panel/Administrative ToolsServices or else select Start/Run, type services.msc, and click OK. Either way, you see the Services console.

I prefer to use the Services console instead of the System Configuration Utility because it describes what the service does. Additionally, you can double-click a service and examine its properties.

Notice the Startup Type column in Figure 4-2. This information lists whether the service is automatic or manual. Manual services are only started in Windows XP when you start a process that requires the service. Some other process may require the service that has a “dependency” relationship with it; in this case, the dependency service will start, as well. Because these services do not start automatically when you boot Windows XP, you do not need to do anything with manual services.

However, all services listed as automatic start when Windows XP boots. These are the services that increase boot time. As I have mentioned, many of them are necessary and important, so you should not stop automatic services from booting unless you are sure of the ramifications. You can get this information by looking at the Description column. Here’s a quick look at common services you may want to live without:

Automatic Updates: This service enables Windows XP to check the Web automatically for updates. If you don’t want to use Automatic Updates, you can disable the service. You can always check for updates manually at the Windows Update Web site.

Computer Browser: If your computer is not on a network, you don’t need this service. If you are on a network, leave it alone.

DHCP Client: If you are not on a network, you do not need this service. If you are on a small workgroup, you can still increase boot time by configuring manual IP addresses (which I explore later in this chapter).

DNS Client: If you are not on a network, you do not need this service. If you are, leave it alone.

Error Reporting and Event Log: You don’t have to use these services but they can be very helpful, so I would leave them configured as automatic.

Fax: If you don’t use your computer for fax services, you can disable this one.

Help and Support: If you never use the Windows XP Help and Support Center (found on the Start menu), you can disable this service.

IMAPI CD-Burning COM: This service enables you to burn CDs on your computer. If you never burn CDs, you can disable the service.

Indexing Service: Your computer keeps an index of files but if you rarely search for files, the service is just a resource hog. You can stop it and turn the service to manual.

Windows Firewall/Internet Connection Sharing: If you do not use these features, you can disable them.

Infrared Monitor: If you do not use infrared devices, you can disable this service.

Messenger: This service sends alert messages on a local area network (it is not the same as Windows Messenger). If you are not on a network, you can disable this service.

Print Spooler: If you do not do any printing from the computer, you can disable this service. If you print, make sure you leave it as automatic.

Remote Registry: This service allows remote users to modify the Registry on your computer. If you are not on a network, you can disable this service.

System Restore Service: This service allows you to use System Restore. If you have turned off System Restore anyway, you do not need to turn off the service. If you do, you turn off System Restore.

Themes: If you do not use themes, you can disable this service.

Windows Image Acquisition: If you do not use scanners or digital cameras, you can disable this service.

Wireless Zero Configuration: If do not use wireless networking devices, you can disable this service.

You may have a number of other automatic services, depending on software and other configurations on your computer. So it’s a good idea to look through the services and learn more about them. If you double-click a service, a Properties dialog box appears

Notice that on the General tab, you see a Startup Type drop-down menu. If you want to change an automatic service to manual, select Manual here and click OK. As a general rule, don’t disable a service unless you are sure you will never use it. However, manual configuration allows the service to be started when you find it necessary, thus speeding up your boot time.

However, before you change a service to manual, look at the Dependencies tab (see Figure 4-4). This tab shows you which other services depend upon the service you are considering changing.

Keep in mind that services are necessary for the vast functionality you get with Windows XP. Change only those services that you understand and do not use. How you use your Windows XP computer should be the best guide in terms of optional startup services.
56  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Web Browsers / Google Browser Sync ... Firefox Extension on: January 03, 2007, 01:15:28 PM
Introduction

Google Browser Sync for Firefox is an extension that continuously synchronizes your browser settings – including bookmarks, history, persistent cookies, and saved passwords – across your computers. It also allows you to restore open tabs and windows across different machines and browser sessions. For more info, please visit our FAQ.


Please note: Google Browser Sync must update your browser settings whenever you start Firefox. This will increase the start-up time of Firefox (the time between clicking on the Firefox icon and loading your start page) – please bear with us as we work to decrease this delay.



How to Use

To use Google Browser Sync, simply install and configure the extension on all computers for which you'd like your browser settings automatically kept in sync. Even if you only install Browser Sync on a single computer, you can use it to backup your browser settings and to restore your open tabs and windows across browser sessions.
Configuring your computers

After successfully downloading and installing the extension, then restarting your browser, you'll see a setup wizard. (Please note that you'll need a Google Account to complete the setup process; if you don't already have a Google Account, you can create one now.) The setup wizard will take you through a series of quick and easy steps. You'll need to choose which browser components you'd like to keep synchronized with your other computers (the standard install includes all possible components), and choose a PIN to protect your sensitive information.
Configuring your second computer is even easier. You only need to install the extension, log in with your Google Account username and password, and provide your PIN.
Day-to-day use

Google Browser Sync is completely automated. The settings you select at startup are automatically synchronized across each of the computers on which you install Browser Sync. You won't even need to log in every time you start the browser. You can change which browser components are being synced – or even stop the syncing process entirely – using the settings panel in the upper-right corner of the page. The settings panel also gives you access to your PIN.



http://www.google.com/tools/firefox/browsersync/
Install Extension : http://tools.google.com/firefox/browsersync/install.html
Pages: 1 2 3 [4] 5 6 7 8 9 ... 27
Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.149 seconds with 23 queries.