AROS is a lightweight open source OS designed to be compatible with AmigaOS 3.1 but also improve on it. The project was started in 1995 and can today be run on both PowerPC and IBM PC compatible hardware. It also includes an emulator that makes it possible to run old Amiga applications.

Morph OS

MorphOS is a lightweight, media-centric OS build to run on PowerPC processors. It is inspired by AmigaOS and also includes emulation to be able to run Amiga applications.


Source model: Closed source
License: Mixed proprietary and open source
Platform: Pegasos, some Amiga models, EFIKA.

Sky OS

SkyOS is a closed source project written by Robert Szeleney and volunteers. It originally started as an experiment in OS design. It’s intended to be an easy-to-use desktop OS for average computer users. Well-known applications such as Firefox have been ported to run on Sky OS.


Source model: Closed source
License: Proprietary
Platform: x86
State: Beta

Syllable desktop

Syllable is a free and open source operating system that was forked in 2002 from AtheOS, an AmigaOS clone. It’s intended as a lightweight and fast OS suitable for home and small office users.


Source model: Free and open source
License: GNU General Public License
Platform: x86
State: Alpha

React OS

ReactOS is an operating system designed to be compatible with Microsoft Windows software. The project started in 1998 and today it can run many Windows programs well. The ReactOS kernel has been written from scratch but the OS makes use of Wine to be able to run Windows applications.

Source model: Free and open source
License: Various free software licenses
Platform: x86 (more under development)
State: Alpha

Heysan is VIRUSSSS !!!

Heysan Link :- Its spreading fast and lot of things appear to be changing..like contact list being deleted, people in your contact list recieving link to heysan.com as if you are sending it..and much more. Until we find some solution from Google, People please be advised nto to open suck links.

For those of you who have been regularly using GMail, the recent arrival of unexplained chats from your friends might have piqued your curiosity. A chat lands up in your GMail Inbox claiming to have been sent to you by one of your friends bearing some sort of cheesy one liners and that you should click on the link to view them. Something like this:


Though usually I'm highly suspicious of these sorts of clicks, I went ahead and clicked it. (After all, Firefox, my favourite web browser has quite a decent track record as far as security is concerned).The site that opened up looked like:

There are all kinds of people in the world and some are likely to enter their Google ids and passwords due to ignorance. In my opinion, this site is a fraud that is directly and obviously obtaining access to userids and passwords of GMail accounts and using them to perpetuate a mass mailing campaign from within the comfortable confines of your GMail inbox. The fact that there exists a hidden link to admob.com (a highly SEOed advert site - see image) by means of a 1px x 1px image, bolsters my gut feeling about this site. Beware all of you who get a link to heysan.com - I think that its just the tip of a very large iceberg. Recent reports of a click based vulnerability in all browsers is a further cause for tension. Be on your toes everyone!



Haiku

Introduction :
Haiku is an open source project aimed at recreating and continuing the development of the BeOS operating system (which Palm Inc. bought and then discontinued). Haiku was initially known as OpenBeOS but changed its name in 2004.
Haiku is compatible with software written for BeOS.



Source model: Free and open source
License: MIT License
Platform: x86
PowerPCState: Pre-Alpha

Read more at the Haiku website.

AmigaOS 4.1

Introduction :
This month (September 2008) AmigaOS 4.1 was released .
Although AmigaOS is a veteran in the field (many have fond memories of the original Amiga computer), its current version is a fully modern OS. AmigaOS only runs on specific PowerPC-based hardware platforms . The company ACube is currently marketing and distributing AmigaOS and is going to bundle the OS with their motherboards.

Hardware Requirements :
PowerPC processor running at 400MHz or higher, 256 megabytes of RAM, 100 megabytes of hard drive space, and a Radeon 7000 video card. A Radeon 9250 is recommended, however, as AmigaOS 4.1 contains a new graphics subsystem that—like Windows Vista and Macintosh OSX—uses the card's 3D features for a graphics compositing layer.

The OS is solid and evolving, and there are many places it could go. The announcement of support for the SAM440 motherboards is just a start: there is a large existing base of PowerPC-based Macintoshes that could easily be made to run OS 4.1, and the low RAM requirements of the OS would make it perfect for running on Sony's PlayStation 3 or on any number of mobile platforms.

Source model: Closed source
License: Proprietary
Platform: PowerPC
State: Final






Changing label of drives on UBUNTU desktop !!

Install mtools for FAT32 or FAT16 partition or ntfsprogs for NTFS .
After installing unamount whose label is to be renamed and run required utility as the root user.
Restart the computer.

Phishing !!!


Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.

Communications purporting to be from popular social web sites (Youtube, Facebook, Myspace), auction sites (eBay), online banks (PayPal), or IT Administrators (Yahoo, ISPs, corporate) are commonly used to lure the unsuspecting.

Phishing is typically carried out by e-mail or instant messaging and it often directs users to enter details at a fake website whose URL and look and feel are almost identical to the legitimate one.

Even when using SSL with strong cryptography for server authentication it is practically impossible to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users and exploits the poor usability of current web security technologies

Email Spam !!!

Email Spam is a Form of net abuse, in which messaging systems indiscriminately send unsolicited bulk messages .

Also known as unsolicited bulk Email (UBE) or unsolicited commercial email (UCE), is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.
Since , e-mail is an extremely cheap mass medium, and professional spammers have automated their processes to the extent that millions of messages can be sent daily with little or no labor costs.
Thus, spamming can be very profitable even at what would otherwise be considered extremely low response rates.
Increasingly, e-mail spam today is sent via "zombie networks", networks of virus- or worm-infected personal computers in homes and offices around the globe; many modern worms install a backdoor which allows the spammer access to the computer and use it for malicious purposes.

Email Spoofing !!!!

E-mail spoofing is a term used to describe fraudulent e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source.Is a technique commonly used for spam e-mail and phishing to hide the origin of an e-mail message. By changing certain properties of the e-mail, such as the From, Return-Path and Reply-To fields (which can be found in the message header), ill-intentioned users can make the e-mail appear to be from someone other than the actual sender. The result is that, although the e-mail appears to come from the e-mail indicated in the "From" field (found in the e-mail headers) it actually comes from another e-mail address, probably the same one indicated in the "Reply To" field; if the initial e-mail is replied to, the delivery will be sent to the "Reply To" e-mail, that is, to the spammer's e-mail.
Method :- The technique is now used ubiquitously by mass-mailing worms as a means of concealing the origin of the propagation. On infection, worms such as ILOVEYOU, Klez and Sober will often try to perform searches for e-mail addresses within the address book of a mail client, and use those addresses in the From field of e-mails that they send, so that these e-mails appear to have been sent by the third party. For example: User1 is sent an infected e-mail and then the e-mail is opened, triggering propagation The worm finds the addresses of User2 and User3 within the address book of User1 From the computer of User1, the worm sends an infected e-mail to User2, but the e-mail appears to have been sent from User3 .

Installing XP over Vista !!!!

You need empty partition . To make one use computer management to resize existing partition and make space for a new one.
To resize partition :-
Go to disk management application . Righ Click on partition .
Click on shrink volume. Choose SPace.
Change drive letter or path to avoid confusion.
Right click on empty space created.
Click on new Simple volume.
Create partition with right click drive letter.
now --- > Boot using XP installation CD and install.
--- > You wont be able to boot into windows vista any longer.Boot into XP and install software called VistaBootPRO from www.vistabootpro.org which allows to make entry and changes to boot record.

Is the pen drive dead ????

Similar solution if your pen drive is not visible in My Computer .
Solution :- Go to My computer .
Right Click and click on manage.
Computer Management window opens.

Click on storage.
Click Disk Management.
You can see your pen drive here.
Format it with FAT32.
Even now if u cannot see your pen drive on my computer or it does not opens , then your pen drive is dead.

PC hangs and restarts automatically !!!

Similar errors :-
1) PC hangs and display error - display driver has stopped working normally. To work properly go for restart.
2) Boot Disk Error.
Solution :-
May be your hide drive is faulty.Run software Speedfan which has hard drive health utility . ALso you can download bootable disc called Ultimate Boot CD and boot from it and run some more checking utilities.
These will detect if there is any problem with the hard disk.

XP doesn't shows more than 3.25 GB RAM for 4GB Configuration ???

Such type of limitation is faced by 32 -bit operating systems.Install a 64 - bit windows XP and you will be able to use all 4GB.


Fingerprint Scanners for Security !!!

Computerized fingerprint scanners have been a mainstay of spy thrillers for decades, but up until recently, they were pretty exotic technology in the real world. In the past few years, however, scanners have started popping up all over the place -- in police stations, high-security buildings and even on PC keyboards. You can pick up a personal USB fingerprint scanner for less than $100, and just like that, your computer's guarded by high-tech biometrics. Instead of, or in addition to, a password, you need your distinctive print to gain access.
A fingerprint scanner system has two basic jobs -- it needs to get an image of your finger, and it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images. There are a number of different ways to get an image of somebody's finger. The most common methods today are optical scanning and capacitance scanning. Both types come up with the same sort of image, but they go about it in completely different ways.

Optical Scanners

The heart of an optical scanner is a charge coupled device (CCD), the same light sensor system used in digital cameras and camcorders. A CCD is simply an array of light-sensitive diodes called photosites, which generate an electrical signal in response to light photons. Each photosite records a pixel, a tiny dot representing the light that hit that spot. Collectively, the light and dark pixels form an image of the scanned scene (a finger, for example). Typically, an analog-to-digital converter in the scanner system processes the analog electrical signal to generate a digital representation of this image. See How Digital Cameras Work for details on CCDs and digital conversion.
The scanning process starts when you place your finger on a glass plate, and a CCD camera takes a picture. The scanner has its own light source, typically an array of light-emitting diodes, to illuminate the ridges of the finger. The CCD system actually generates an inverted image of the finger, with darker areas representing more reflected light (the ridges of the finger) and lighter areas representing less reflected light (the valleys between the ridges).
Before comparing the print to stored data, the scanner processor makes sure the CCD has captured a clear image. It checks the average pixel darkness, or the overall values in a small sample, and rejects the scan if the overall image is too dark or too light. If the image is rejected, the scanner adjusts the exposure time to let in more or less light, and then tries the scan again.
If the darkness level is adequate, the scanner system goes on to check the image definition (how sharp the fingerprint scan is). The processor looks at several straight lines moving horizontally and vertically across the image. If the fingerprint image has good definition, a line running perpendicular to the ridges will be made up of alternating sections of very dark pixels and very light pixels.
If the processor finds that the image is crisp and properly exposed, it proceeds to comparing the captured fingerprint with fingerprints on file.

Capacitive Scanners

Like optical scanners, capacitive fingerprint scanners generate an image of the ridges and valleys that make up a fingerprint. But instead of sensing the print using light, the capacitors use electrical current.
The diagram below shows a simple capacitive sensor. The sensor is made up of one or more semiconductor chips containing an array of tiny cells. Each cell includes two conductor plates, covered with an insulating layer. The cells are tiny -- smaller than the width of one ridge on a finger.




The sensor is connected to an integrator, an electrical circuit built around an inverting operational amplifier. The inverting amplifier is a complex semiconductor device, made up of a number of transistors, resistors and capacitors. The details of its operation would fill an entire article by itself, but here we can get a general sense of what it does in a capacitance scanner. (Check out this page on operational amplifiers for a technical overview.)
Like any amplifier, an inverting amplifier alters one current based on fluctuations in another current (see How Amplifiers Work for more information). Specifically, the inverting amplifier alters a supply voltage. The alteration is based on the relative voltage of two inputs, called the inverting terminal and the non-inverting terminal. In this case, the non-inverting terminal is connected to ground, and the inverting terminal is connected to a reference voltage supply and a feedback loop. The feedback loop, which is also connected to the amplifier output, includes the two conductor plates.
As you may have recognized, the two conductor plates form a basic capacitor, an electrical component that can store up charge (see How Capacitors Work for details). The surface of the finger acts as a third capacitor plate, separated by the insulating layers in the cell structure and, in the case of the fingerprint valleys, a pocket of air. Varying the distance between the capacitor plates (by moving the finger closer or farther away from the conducting plates) changes the total capacitance (ability to store charge) of the capacitor. Because of this quality, the capacitor in a cell under a ridge will have a greater capacitance than the capacitor in a cell under a valley.
To scan the finger, the processor first closes the reset switch for each cell, which shorts each amplifier's input and output to "balance" the integrator circuit. When the switch is opened again, and the processor applies a fixed charge to the integrator circuit, the capacitors charge up. The capacitance of the feedback loop's capacitor affects the voltage at the amplifier's input, which affects the amplifier's output. Since the distance to the finger alters capacitance, a finger ridge will result in a different voltage output than a finger valley.
The scanner processor reads this voltage output and determines whether it is characteristic of a ridge or a valley. By reading every cell in the sensor array, the processor can put together an overall picture of the fingerprint, similar to the image captured by an optical scanner.
The main advantage of a capacitive scanner is that it requires a real fingerprint-type shape, rather than the pattern of light and dark that makes up the visual impression of a fingerprint. This makes the system harder to trick. Additionally, since they use a semiconductor chip rather than a CCD unit, capacitive scanners tend to be more compact that optical devices.