Wednesday, March 25, 2009

Sri Maha Sastha Vijayam

A fine evening at the office,just googling on the evening hours i was drawn to the page
http://www.hindu.com/2009/01/25/stories/2009012558470200.htm
which i read casually was attracted at the end, this is an article about a person residing in coimbatore. Mr Aravind Subramaniam who is aged just 26, has dedicated his lifetime for lord sastha(Incarnation of Lord Ayyappa) and had published the book named Sri Maha Sastha Vijayam.

Am very much impressed to see a complete works on lord sastha, am yet to read the book.Yet I would suggest every ardent devotee of lord ayyappa to visit this site and purchase the book, this book i believe, contains the rarest collection of the lord which every devotee must be proud to have one.

The link to the site is given below.

Hats off to Mr Aravind. Keep Going, God bless you.

Visit

http://aravindsastha.blogspot.com/2009/02/shri-maha-sastha-vijayam.html

Thursday, July 3, 2008

Notepad Secret and Funny Trick

A funny trick You can do using Notepad in Windows XP.

Open Notepad.
Type the words as follows:
Bush hid the facts.
Now save the file (give it any name you like), close the notepad.
open it again. ou will se Square characters instead of the words you had written.
It Works Only with XP.

Sunday, May 4, 2008

CAPTCHA


For the last few days, I have been trying to use CAPTCHA on websites . I can’t seem to get it right !! And I don’t know how many people actually do. I mean if we can’t get it right after one, two, three, wait upto five tries, then something is terribly wrong.

Not all websites are bad. Just some. But it is progressively getting worse. Not so long before someone in the US files a lawsuit against these people for harassment over the Internet.

Wednesday, April 23, 2008

Approaching the job market

The most important prerequisite for a job search and to approach the job market is to have a clear,crisp and realistic goal.When you are sure about what type of job you want,What is your salry expectation,in which region you like to work,only then you are ready to face the job market head on.With all these information in hand you can probably make a genine case to the prospective employer to hire you for that particular job.If you are not ready with all these information ,then start finding it out.You should analyse yourself based on your knowledge,experience,qualification your family commitments and most essential your capabilities,talents and skills.Unless you are ready with all these important information you are not ready for job search.

You will be wasting time in searching for something,which you are not sure of.If you know what you want,where you can find it and how you can get it,then you are a success,for which a clear goal is to be set as a starting point and also the target.

In the market of jobs,about 80%of the available jobs are never advertised.Thats put you at real disadvantage in this highly competitive job market.If you are not exposed to these opportunities,you surely have no access to these interviews.How can you increase your chances of the jobs you want.

Tuesday, April 15, 2008

GOOGLE Data Centres

google-data-center-map-usjpg.jpg


Google’s data infrastructure is massive and spread across the world. All that Web crawling, indexing, and searching takes enormous amounts of computing power, not to mention everyone pounding away at Gmail, Google Apps, Blogger, Google Reader, and every other project dreamed up at the Googleplex. But where are all of these data centers and how many are there? Google doesn’t really say. But that doesn’t keep people from trying to figure it out. Here is a map of all known Google data centers, including spaces it leases and that are under construction. in Russia and South America. Future data center sites may include Taiwan, Malaysia, Lithuania, and Blythewood, South Carolina, where Google has reportedly bought 466 acres of land.


googel-data-center-map-europe.jpg


google-data-center-map-world.jpg



Saturday, April 12, 2008

E-mail Best practices

1.Prevent virus outbreaks and spam

Viruses are often spread through e-mail. You can greatly reduce the spread of e-mail viruses by using antivirus software, using only e-mail services that offer automatic antivirus protection (such as AOL, Google, Hotmail, and Yahoo), opening e-mail only from trusted sources, opening only attachments you're expecting, and scanning attached files with antivirus software before opening them.

Spam is loosely defined as unsolicited bulk e-mail and loosely correlates to the junk mail that turns up in your home mailbox. But spam represents more than unwanted clutter. It clogs e-mail accounts—and networks and servers—while trying to sell products, spread jokes, or propagate Internet hoaxes.

Reduce the amount of spam you receive by being cautious where you post your e-mail address. Avoid publishing your e-mail address on Web sites or submitting it to every site or organization that requests it.

Never forward chain messages, which often reveal coworkers’ and colleagues’ e-mail addresses to other parties. Use caution when accepting e-mail offers or agreeing to accept mailings from vendors; subscribe only to Web sites and newsletters you really need and consider creating a generic Hotmail or Yahoo e-mail account for these subscriptions.

Don’t open unsolicited e-mail. If you accidentally open spam, don’t click links offering to unsubscribe or remove you from the mailing list unless the sender is a trusted vendor

2. Avoid phishing attacks

Phishing scams are designed to steal consumers’ personal information. They often use doctored and fraudulent e-mail messages to trick recipients into divulging private information, such as credit card numbers, account usernames, passwords, and even social security numbers.

Online banking and e-commerce are generally safe, but you should always be careful about divulging personal and corporate information over the Internet. Phishing messages often boast real logos and appear to have come from the actual organization, but those messages are frequently nothing more than copyright infringements and faked addresses. If you suspect a message possesses any credibility, you are much safer calling the company directly—preferably at a telephone number printed on a paper statement or invoice—and talking to an authorized representative.

3.Manage your Inbox

Sort messages by priority, subject, date, sender, and other options to help find important e-mail that requires your attention. Proper e-mail etiquette dictates that you respond to all e-mail in a timely fashion. Generally speaking, you should respond to all professional e-mail within a business day, even if it’s just to say you’ve received the message and will look into the matter. Occasionally, you may receive an e-mail thread that contains responses from several people; always read the entire thread before responding.


4.Compose professional messages

Writing subject lines can be tricky, but you should always include one. The goal is to summarize the message without being too wordy or too vague. Long subjects tend to be skimmed or ignored, and they don’t always fully display in e-mail viewers. For best readability, use sentence case for subject lines rather than all caps:

Agenda for meeting on 02/03/2008

Not

AGENDA FOR MEETING ON 02/03/2008

5.Properly use CC and BCC

The carbon copy (CC) and blind carbon copy (BCC) features found in most e-mail clients allow you to send copies of an e-mail to others you need to keep informed but who aren’t necessarily the primary recipients.


When copying others, be certain the e-mail message pertains to them. If you use e-mail address lists, verify that all of the members of the list should receive the e-mail, too, and remove those who don’t need to be included. And use the BCC feature sparingly. If sensitive topics require BCCing others, it may be best to take the matter offline and discuss it in person.

7.Obey etiquette rules when forwarding messages

Before you forward an e-mail, make sure that all recipients need to receive the message. In addition, be careful when forwarding sensitive or confidential information. Never forward proprietary information to external audiences or to unauthorized recipients. Before clicking the Send button, review whether a message’s contents are appropriate for each listed recipient.

8.Don't be a party to a flame war

Flame wars are heated e-mail exchanges that are more emotional than reasoned, and they have no place in professional communications. If you receive a flame or suddenly find yourself in a flame war, take a little time

before responding, if you respond at all. Think about the situation and reply rationally not emotionally.

You may also decide not to reply but to deal with the issue in person. Often, flame wars are started because of a simple misunderstanding. An ill-phrased comment (or even a well phrased one) can be misconstrued by a recipient, who then fires off a salvo in response. Instead of replying, go talk to the person and discuss the message. If talking with the person doesn’t end the problem, involve a manager for assistance in resolving the issue offline.

9.Protect e-mail addresses

Don't divulge your coworkers’ e-mail addresses to vendors, friends, or others outside the organization. Verify that recipients listed in the To and CC fields should be receiving messages and that you won't be revealing others' e-mail addresses in the process. Don't post your or coworkers’ e-mail addresses on Internet forums or bulletin boards, on Usenet groups, in chat rooms, or in other public areas.

Here are a couple of simple ways to help keep others’ e-mail addresses private. First, use the BCC feature when you need to hide their e-mail addresses from external audiences. Second, delete their addresses from messages you forward. It takes only a few moments and will reduce the chances of coworkers’ e-mail addresses proliferating in the wild.

10.Be smart about handling attachments

E-mail attachments consume inordinate amounts of e-mail server space and network bandwidth and are often the culprits behind virus outbreaks—but they're often the easiest way to transfer files. Just be sure to follow these guidelines when e-mailing attachments:

1. Don’t attach large files to an e-mail.

2. Limit the number of files you attach to a message to five or fewer.

3. Save attachments to your hard drive and then delete the e-mail message containing the attachment.

4. Don’t open unexpected attachments or those sent by unknown parties.

5. Always scan files with an antivirus program before opening an attachment. Never click an attachment without first confirming that it’s virus-free.

6. Don't annoy recipients by forwarding attachments they can’t access. If an attachment requires a new or less-common application, say so in your message.

11.Don't include sensitive or potentially embarrassing information

Don't make the mistake of thinking your e-mails are private. They're not. Think of them as postcards. You should never include any information in an e-mail that you wouldn’t want published on the front page of your local newspaper. In other words, never send confidential, proprietary, sensitive, personal, or classified information through e-mail. You should also refrain from making inflammatory, emotionally charged comments in e-mail.


12.Know when to use e-mail (and when not to)

Businesses provide e-mail for professional, business-related use, not for jokes, gossip, or chain e-mails. Also remember that you shouldn't send an e-mail to do a conversation's work. Complicated subjects are often difficult to explain face to face, much less in an e-mail. Instead of firing off a complicated explanation via e-mail, set up a short meeting to address the issue in person.

E-mail is also a poor stand-in for conversation when conducting critical, difficult, and/or unpleasant discussions, such as issues related to human resources matters. Touchy communications are best handled in person.

13.Hoaxes, scams, and urban legends - the downside of email

Email hoaxes are the online equivalent of urban legends. Email hoaxes may entail a variety of subjects from virus warnings to false stories of plans to start taxing email. Often they are harmless in nature, but they can cause unnecessary chaos and sometimes fear. Most people have good intentions when they forward these email messages. They are probably unaware that they are circulating an email hoax.

It is important to recognize when you receive a hoax so that you can play a part in stopping it from spreading. With email hoaxes, it is often difficult to distinguish whether or not it is truth. Many sound like they are doing you a favour by warning you of something dangerous (a computer virus, medical risk, etc.). The email will often look legitimate by falsely citing reputable sources.

Here are some questions to consider if you suspect an email may be a hoax:

· Does the email suggest that you email it to everyone you know?

· Does the email start out by saying 'This is not a hoax'?

· Can you see that the email has already been forwarded through a lengthy chain of people?

· Does the email cite a source (i.e. CNN) but no date that the info was released or link to that source's web site?

· Does the email sound too good to be true? (i.e. Microsoft will pay you $5 for everyone you send this to)

· Does the email have an 'urgent warning'?

· Does the email ask you to delete files?

If you answer yes to any of these questions, you may be dealing with an email hoax.

Before you consider forwarding any email that asks you to forward it to anyone else you should be able to do the following:

· Verify the original date the message was created and sent.

· Verify the original sender of the message.

· Verify any quotes made by any organizations mentioned with specific URL's (web addresses) that backup the claims made in the message.

· If the e-mail is for a cause, be able to verify the date of any action mentioned and/or the specific piece of legislation that is mentioned

· Just Google it to find out whether it is a HOAX or NOT

Monday, April 7, 2008


Have you ever thought of retrieving a deleted text message from your cell phone??
If yes, srivignesh have found out a solution for you. This website, named brickhousesecurity.com provides a hardware worth $ 150 using which you can punch in the SIM card ( from which you want to retrieve the deleted message) and finally plug in the USB device on your computer's USB port. That's it! Now you can easily retrieve the deleted messages from your SIM card.



For detailed information on the product check out the video above or click here: