Custom Search

Tuesday, August 18, 2009

Game Informer : Xbox 360 at 54.2 percent failure rate

The latest issue of Game Informer contains a surprising statistic for anyone who's ever loved and lost their Microsoft-branded home console – according to their survey, in which over 5,000 console owners participated, the Xbox 360's current failure rate due to the Red Ring of Death, E74 or other hardware failure is 54.2 percent. They also calculated the relative death toll for PS3s due to the Yellow Light of Death (10.3 percent) and Wiis, due to ... well, we're not actually sure what color the Wii's light turns to upon its demise (6.8 percent).

Unfortunately, for having the highest failure rate, survey participants also pinned Microsoft for having the least helpful customer service representatives. Not that it matters – later in the survey, only 3.8 percent of participants said they'd never buy another Xbox 360 due to its high failure rate.

Speaking of which, we're not sure what future techno-utopia this poll was conducted in, but a 54.2 percent Xbox 360 failure rate sounds awfully low. Had the survey's participants been comprised entirely of Joystiq staffers, it would have been a bone-chilling 100 percent

Sunday, August 16, 2009

Free Tools to Back Up Your Online Accounts


Cloud computing means you can store your data in web applications and access it from any browser, anywhere—but that doesn't mean you don't need a backup plan. Safeguard your data when a storm's a-brewing in the cloud with these tools.

Next time your favorite web site is down or you're locked out of an account, make sure you've got the crucial info you need where you can get to it: on your computer.

"But I don't need backup if my data's in the cloud," you say. "Big companies with lots of servers are better at backup than little old me could ever be." That's true, but cloud computing does come with risks. Depending on an external service to host, update, and maintain the software you love and the data you need is both the cloud's advantage and disadvantage: you're putting your stuff on computers you don't control at a single point of access (or failure). Companies get shut down or bought, accounts get locked up, servers (and you) go offline. If you store your email, photos, documents, contacts, bookmarks, and journal entries in the cloud, there are easy ways to back up all that information from popular online services to your computer. You know, just in case.

Back Up Your Gmail

Your web-based email account at Gmail, Yahoo, Windows Live Mail or elsewhere is probably the place you create, store, and exchange your most important data in the cloud. If your webmail supports POP (and Gmail does out of the box, Yahoo and Windows Live if you pay for their premium service), then "backup" to your computer is simply a matter of downloading new messages on a regular basis.Update: Apparently Windows Live Mail does offer POP for non-premium accounts. ThanksPatriciaBrinston!

Command line geeks who want to automate the process, see how to back up Gmail with fetchmail. Otherwise, you can fire up a desktop email client (like Thunderbird, which stores your mail in standard mbox files) and simply download your messages every month or so. Alternately, check out the previously-mentioned Gmail Backup utility. If you're willing to fork over a few bucks a month, BackupMyMail supports Gmail, Yahoo, and Hotmail accounts and also offers a free trial.


Back Up Your Flickr Account

Lots of people who use popular photo-sharing service Flickr simply upload photos already on their hard drive to the web site, so they've already got their images on their computer. However, if you post photos from your cellphone to Flickr, or have a local hard drive crash and want to restore your photos from the service, a few utilities will help you do so. Folks comfortable on the command line should check out Dan Benjamin's FlickrTouchr script. It downloads the original size of all the photos in your Flickr account and saves them to folders based on your set names. FlickrTouchr does not save videos or other photo meta information. Here's more on how FlickrTouchr works.

For a graphical Flickr backup solution, check out the free and Java-based FlickrEdit app. Browse your photos in FlickrEdit's interface, check the ones you want to back up, and save them to a folder on your computer using the "Backup selected" button on the bottom right hand side of the window. Unlike FlickrTouchr, FlickrEdit can back up your contacts' photos, your favorite photos, or any subset of your photos depending on which you choose. It also embeds meta information into the photo's IPTC header. Unlike FlickrTouchr, you've got to manually page through the photos you want backed up from FlickrEdit which can be time-consuming if you have more than a few hundred in your account.

Back Up Your Google Docs

If it's the documents, spreadsheets, and presentations that are piling up in your Google Docs account that you want backed up, check out the free, Windows-only GDoc Backup (original post). The utility exports all the documents you have to your desktop in one fell swoop, and it does it smartly: it only downloads the document if it doesn't exist on your computer or has an older date.

Mac and Linux users should check out the geekier Python script, GDataCopier (original post). It requires futzing at the command line, but since it's a script, you can set it to update your backup copy with new or updated documents on a regular basis with cron and forget it.

Back Up Your Twitter Account

If your tweets are more than just ephemeral toots of the moment, you want a backup copy of them on your computer. Twitter only makes up to 3,200 tweets available for download on a given account, so if you're approaching that number there's even more reason to start saving your stuff—because it won't be available from the Twitter web site proper.

Command line lovers can use this clever method to download their tweet XML via cURL. Alternately, web application Backup My Tweets does just that and lets you download your tweets in HTML, PDF, or JSON format, with a gotcha: you have to tweet about Backup My Tweets in order to use the free trial. We posted about tweet backup solutionTweetake, which outputs your tweets in a CSV file, but be warned: Tweetake requires you enter your Twitter username and password on their site, which isn't the most secure option the Twitter API offers. (Don't enter your Twitter password anywhere other than Twitter.com itself; if you do to use a Twitter-related service, change it immediately afterward.) For more Twitter archiving options, check out the social media experts' picks over at ReadWriteWeb.


Back Up Your Facebook Account

Facebook backup utilities are scant compared to the glut of Twitter apps out there, but Social Safe is an Adobe AIR application that gets the job done. Social Safe costs $3 right now—so not technically free, but also not much more than a fancy cup of coffee—and it backs up your Facebook profile, friends list, photos, and photos that others have tagged with your name. (That last part is especially useful when your high school friends have gotten on the service and added class pictures with you in them.) Social Safe does not, however, back up your Facebook status stream, comments on your updates, or your wall posts, which was pretty disappointing what with it not being free.


Back Up Your Blog (Tumblr, WordPress, and Others)

You put a whole lot of time and effort into keeping up your blog, and you don't want server downage, a database blow-up, or a host lockout to wipe out your posts. While the best method of backup for your blog depends on what service you use, here are a few options for the biggies.

Tumblr users should check out this handy tumble-log backup utility, which sucked in and spit out 272 of my tumblelog's posts in a flash. Folks hosting their own WordPress installation should check out the WP-DB-Backup plug-in, which emails you or saves regular backups of your blog's database. I personally have restored my blog using output from this plug-in, but my fellow editor The How-To Geek had a bad experience with the plug-in. He recommends backing up your web server with rsync and a regular mysqldump command.

If your blog is hosted at Blogger or another service, you can use a web site copying utility to spider its pages and save them as HTML to your computer. For more on how to do that on the Mac or PC, see the previously posted Ask Lifehacker: How Do I Back Up My Blog?.

You can also mirror an entire web site to your hard drive using the hackable command line tool wget. Similarly, a well-formed cURL command can back up your Delicious bookmarks.

Hackers Put Social Networks Such as Twitter in Crosshairs

Web sites such as Twitter are becoming increasingly favored by hackers as places to plant malicious software in order to infect computers, according to a new study covering Web application security vulnerabilities.

Social-networking sites were the most commonly targeted vertical market according to a study of hacking episodes in the first half of the year. The study is part of the latest Web Hacking Incidents Database (WHID) report, released on Monday. In 2008, government and law enforcement sites were the most hit vertical.

Social networks are "a target-rich environment if you count the number of users there," said Ryan Barnett, director of application security research for Breach Security, one of the report's sponsors, which also includes the Web Application Security Consortium.

Twitter has been attacked by several worms, and other social-networking platforms such as MySpace and Facebook have also been used to distribute malware. That's often done when an infected computer begins posting links on social-networking sites to other Web sites rigged with malicious software. Users click on the links since they trust their friends who posted the links, not knowing their friend has been hacked.

The WHID sample set is small, encompassing 44 hacking incidents. The report only looks at attacks that are publicly reported and those with which have a measurable impact on an organization. The WHID's data set is "statistically insignificant" compared to the actually number of hacking incidents, but shows overall attacker trends, Barnett said.

Other data showed how Web sites were attacked. The most common attack was SQL injection, where hackers try to input code into Web-based forms or URLs (Uniform Resource Locators) in order to get back-end systems such as databases to execute it. If the input is not properly validated -- and malicious code ignored -- it can result in a data breach.

Other methods used include cross-site scripting attacks, where malicious code gets push to on a client machine, and cross-site request forgery, in which a malicious command is executed while the victim is logged into a Web site.

The WHID found that defacing Web sites is still the most common motivation for hackers. However, the WHID includes the planting of malware on a Web site as defacement, which also points to a financial motivation. Hacked computers can be used to send spam, conduct distributed denial-of-service attacks and for stealing data.

"Ultimately they [the hackers] want to make money," Barnett said.

Tuesday, August 11, 2009

How can you delete a virus which an antivirus can't?

Doesn't it look strange? A virus which can neither be deleted nor be taken any action by an antivirus, how can you delete it? But don't worry I have a solution for this one.


First of all, the main thing you should do is deep system scan with the help of an antivirus like Bit Defender or others. You can find lots of antivirus package in market but I prefer Bit Defender, Avast, Norton and Kaspersky. These are the most popular antivirus these days and works well.


Ok. After you have scanned your computer thoroughly, you shouldn't worry about the viruses which the antivirus can react upon. You should worry for the ones which the antivirus can't do anything to. Are you worried? Now don't ? 'coz I have the solution for this as I have already said about this.


Get the log file made by the antivirus. You will find the location of the file and virus which couldn't be acted upon. Visit them through registry editor and kill them by deleting the related keys described in the log file. Problem solved. You are now virus free.


Free Up Your Hard Disk

No matter how big your hard drive is, all those video clips and music files that you share can easily clog your disk. Instead of deleting your media, why not delete some less precious stuff? There are a handful of places where Windows stores (and seems to forget about) its temporary files on your drive; cleaning up this trash can free up some space.


One of these temporary user areas includes a group of folders that contain images of the last Web pages that you went to, as well as uncompressed ZIP files that you have opened. Another folder of stored temporary Web files lets the PC load frequently used images such as logos and icons from the hard drive, rather than from the online sources. Clearing these files out periodically gets rid of those sites that you visited only once, freeing up space for others. You can also allocate a smaller portion of your hard drive for this temporary Web usage, adjusting things to your liking.


Deleting the temporary Web files is an automated procedure within the Internet Explorer browser. When you are viewing a Web page, just click on the Tools drop-down menu, then Internet Options. Then, within Temporary Internet Files, click on Delete Files. You can also delete your cookies here, but be prepared to log on again to all of those Web sites that used to identify you automatically. If you want to adjust the size of this temporary Internet files folder, click on Settings. If you want to view the files before you delete them, click on View Files to see the whole mess. You can be a CSI, digging through the mass of cache files for Web sites opened by other people. Firefox and Opera offer similar levels of automation.


In Windows XP, temporary files are placed in two or more places on your PC's hard drive: C:\Documents and Settings\{your log-on name}\Local Settings\Temp. Windows' temporary system files are stored in:C:\Windows\Temp. Some computer manufacturers and applications create temporary folders in C:\Temp.


You can delete all of the files within these folders, but make sure that you close down as many applications as possible before doing so. As you open applications, temporary working files are placed in this folder, so deleting them when those applications are open will generally produce an error. It's not uncommon to have more than 2MB of files here. Feel free to tag and delete everything in a folder at once by highlighting a single file, then pressing Ctrl-A and then Delete. Once the files fly into the trash can, don't forget to empty the trash.

Some of the Symbian Codes that work with most of the Nokia Mobiles

*#7370# - Soft format - resets all the telefone Memory (like Formatting a disk)


NOTE :- Battery should be full up to at least 75%, do not accomplish during the procedure under any circumstances ! The procedure takes some minutes (approx. 3-4)


Green*3 - Hard format - If the Mobile (only telephone memory) formats, puts back the attitudes (see * to # 7780 #) and implements a RESET.


NOTE :- Battery should be full up to at least 75%, do not accomplish during the procedure under any circumstances ! The procedure takes some minutes (approx. 3-4)


Proceeding : Equipment switch off, keep "green key" (take off) at the same time pressed, "*" and to "3" key and switch the equipment on (the keys thereby keep further pressed)... to "Formatting" on the display appears...