IMP Info

Latest things in Softwares,Freewares,Open Source,Internet,Programming…

Archive for March, 2006

The New Age of Optical Media

Posted by Parth Barot on March 29, 2006

DVD has long overtaken VHS as the medium for recording TV and pre recorded films. How long will it be before DVD is superseded by the next development? Capacity is the issue here. The possibilities in terms of audio and audiovisual quality created by HDTV will require a medium with greater capacity than can be afforded by today’s DVD disc.

The next generation of recordable media are being developed. Blu ray disc is currently being developed by a consortium of companies including Hitachi, LG, Samsung, Sharp, Sony and Thompson. Dell and Hewlett Packard are also supporting Blu ray disc technology.
Blu ray disc has a capacity of 25GB per layer compared to DVDs 4.7GB.

This technology is being developed because of this greater capacity and this is being mainly driven by the expected explosion of high definition TV. The additional capacity will be nessercary to capture the enhanced quality feature of HDTV

At present Sony has launched a Blu ray recorder onto the Japanese market specifically for recording HDTV.

In parallel Toshiba and NEC are developing a rival format HD DVD, which although has less capacity than Blu ray (15GB) but the HD DVD is similar to Blu ray but the physical properties are closer to current DVDs and can be replicated on existing machinery. Blu ray on the other hand requires new manufacturing equipment.

Whether HD DVD or Blu ray disc become the established protocol remains to be seen, but either one could become the industry standard over the next few years.

Advertisements

Posted in Uncategorized | 1 Comment »

Backup Software

Posted by Parth Barot on March 17, 2006

You won’t have to worry about losing valuable data again if you find the best backup software for your home or office. Whether your main concern is to keep a copy of all your documents or to encode sensitive information, you can find the best backup software that contains the best of both of these features and more. Backup software may not always be cheap, but it is an essential investment for preserving and protecting valuable information.

If security is your main concern, there is backup software that has five different encryption alogrithms that protect your data against hackers. You can also have the file name encrypted for added security. It is easy to add new folders, and you can build your files at the click of a mouse.

The best backup software will:
• Create a backup program
• Choose files for backup
• Define compression settings
• Choose target of the backup

You can have all of your files backed up automatically, or you can pick and choose files to back up. Changes can be made constantly, and most backup software is flexible enough to accommodate multiple versions of the same document or selected revisions. If you want to conserve space, you can select the highest level of compression to make more room. It is also easy to choose which location you want you files stored, whether it is in:

• Hard drive
• USB stick
• Network Folder
• CD
• DVD
• Remote FTP Server

Most backup software employs automatic backup programs that will store your information as it is created. You can choose scheduled backup instead, if you prefer. It is possible to store multiple versions of a document and the wizard feature restores files to their original folders.

Backup software may also contain other features that are helpful, such as virus scanning and disaster recovery. Anti-virus features will help prevent file-destroying crashes from infecting your computer, and disaster recovery will help get your computer up and running again if it does happen to crash. Backup software will ensure that your files will be intact even if your computer temporarily ceases to function.

There are many who simply to backup their files manually on a floppy disk or a CD rather than purchasing backup software. However, these devices have a somewhat short shelf life, and will tend to wear out even if they are not used excessively. It would be a major disappointment to believe that your files are safely backed up when they fail to appear when needed. The sheer effort required to cut and paste and to edit your files for backup will probably cost you in terms of work hours much more than a rather modest investment in backup software. Everything is done automatically with backup software, and there is less likelihood that you will fail to backup certain files due to an oversight.

Backup software varies in price and quality, so it is worth doing substantial research before making your final investment. Some might find that security is more of a priority, whereas others are looking for backup software that will provide them with maximum space. Still others ar searching for the lowest prices on backup software. It is definitely worth it to take advantage of trial offers and demos when they are offered. This will enable you to decide on the backup software that is right for you.

Posted in Tutorials | Comments Off on Backup Software

How To Identify Spoof/Phishing Emails – Protect Yourself From Identity Theft

Posted by Parth Barot on March 14, 2006

What is a spoof email?
Spoof emails (sometimes also called “Phishing”) are emails that pretend to be from a company or bank. The most common often come from eBay, PayPal, Barclays Bank etc. These emails will then contain a web link, if you click on this link then you will be taken to a login page and asked to enter your details. Most of these scammers go a long way to try and get your details, most spoof emails contain links to identical websites and users are tricked into entering their personal information. If you submit your information through one of these spoof websites then the fraudster has all of your details and can commit crimes using your identity.

How do they get my email address?
You may wonder how the scammers got your address or knew you were a member of a particular bank or institution. Often it is just good luck on the part of the scammers. They normally do not target individuals, but send out thousands of scam emails to randomly generated email addresses, in the hope that just a few will be successful. They also trawl the web for valid addresses they can use, and swap this information with each other. If you have ever posted on an Internet forum or published something on the web, there’s a good chance your address is out there somewhere just waiting to be found. If you have fallen victim before, your address is normally added to a list of ‘easy victims’, and you are likely to then receive even more scams.

How can I identify these emails?
Here are 4 simple tests that you can perform on any email you suspect is a spoof. Your email can only pass the test if it passes ALL FOUR of the tests. If your email passes all of the four tests then you can be 99.9% certain that it is a genuine email. If your email passes all four of the tests then we would also advise you to check the “Other Tips” section just to double check that your email is genuine.

If your email fails
If your email fails JUST ONE of the four tests then the email is a spoof and shouldn’t be replied to and should be deleted immediately from your computer. Even if your email fails the test, I would still advise you to check out the “Other Tips” page for more good ways to spot a spoof email.

If you are still in doubt
Unless you are 100% sure that your email is genuine, DO NOT click on any links within the email. Contact the company in question (See the “reporting a spoof” page) and ask them to confirm if the email is genuine or a spoof.

Test 1 – Who is the email addressed to?
Have a look at how the email addresses you. Most spoofs will say something along the lines of “Dear eBay user”. This is the very first thing you should look for in a spoof email. Any email that doesn’t address you by your name is a spoof. Ebay, PayPal and banks always address you by the name you registered with on their site, they NEVER send out emails saying
“Dear valued customer”, “Dear member” etc.
If your email isn’t addressed to you personally then it is a spoof! If your email is addressed to you then move onto the next test to see if it is a spoof email. Some more advanced spoof messages have started to include your name or email address instead of the generic “Dear member” or “Dear user”. So even if your email were addressed to you I would strongly advise you to carry out the 3 other tests.
Test 2 – Where does the link go?
Most spoof emails will contain a link telling you to verify your details. You can quickly tell if your email is a spoof by hovering your mouse over the link. When your mouse is over the link, look in the bottom left hand corner of your screen and you will see the “link destination”. The destination of a spoof link will usually look something like this:
http://slp.clinker.net.mx/.sh/.a/index.htm?SignIn&ssPageName=h:h:sin:us
Compare this with a real eBay link:
http://k2b-bulk.ebay.co.uk/ws/eBayISAPI.dll?MyeBaySellingSummary
And you can see the difference. You can easily check if you email is a fake by looking at the first part of the link destination, if the destination is a combination of numbers (102.382.54.23) or a link like the one in my spoof link above then the chances are that your email is a spoof.
Any non-spoof link will contain the name of the company in the first part of the link, eg:
http://cgi.ebay.co.uk http://cgi.ebay.com http://cgi.paypal.com
Please note: Some spoof links will contain the words “eBay” or “PayPal” in the final part of the link. These are also spoofs!
All real emails will only contain the company name in the very first part of the link; after http://. If you still aren’t sure if you have a spoof email, move onto the next test.

Test 3 – Who really did send you the email?
This test may seem a little confusing but don’t worry it isn’t as difficult as it looks. What we are going to do is find out where the email came from. Most people don’t know this but you can trace the origin of your emails in most mail programs. To do this we have to view the “FULL message header”, here is how you do this in the following email programs. If your program isn’t listed here please contact your email provider for instructions:
Hotmail 1. Click on “Options” 2. Click on “Mail display settings” 3. The 3rd option can be used to display the header settings, select “Full” from the check boxes 4. Click on “OK” to save your settings
Outlook Express 1. Right click on the email and select “Properties” 2. Select the “Details” tab
Now that we can view the message headers, here is how you identify a spoof:
Look in the part of the header that says “Received From”. If the email has come from anyone other than the sender it’s a spoof. I had a spoof email and performed this test and notice that the email had been sent from a Yahoo account. Obviously a real email from eBay would not have been sent from a Yahoo address!

Read the rest of this entry »

Posted in Tutorials | 45 Comments »

Alcohol – How to make\burn images using alcohol?

Posted by Parth Barot on March 11, 2006

By:Parth Barot
Now a days, most of the people are using CD Burning softwares.But see many doesn’t have CD writers.so, what to do for making CDs of games and other softwares which can not be run without CD in the drive?

Simple!Make image file of the CD in your Hard Disk Drive.It means make a same data file as CD,Load the file in virtual CD/DVD software and fool the operating system and the software/game itself that you are using the original CD!

Which software to use?ok we have some choices here.
1.Slysoft’s Clone CD
2.Alcohol 120%
3.Nero

And many more available free/paid but these 3 are the most used for burning and etc.

1.Clone CD(.ccd) is good for bad CDs.make images in large sizes but you can use them.Supports most of image file formats.

2.Alcohol is the best one among these three.Because it suports all kind of image formats and also make images in Clone CD(.ccd) and Nero(.nrg) formats.It is fast and better as it scans the CD and tells you that can’t make image and can’t burn it!small size also. (I suggest this one as i am using it.)

3.Nero…The big one(New Nero 7 is about 100 MB setup size!Too big!)it has many other features but i think no need to use it if you only want to use for making images.

Here i am giving small tutorial for use of Alcohol

Making CD image—————————–
1.Install Alcohol 120% and let the PC restart if it wants it.Because it installs drivers for virtual CD drive.

2.Start Alcohol and click File–>Image Making Wizard.Wizard popups as shown below.
Alcohol Make image Wizard

3.As shown in image above,choose your source CD drive from which you want to make image file.(Shown with Red A)

4.Then from ‘DataType’ combo box select Data format.If data cd then select what ever you want.If very bad and scratched cd then select ‘video cd with bad sectors’ as shown in Red B.

5.For skipping reading errors and scanning the disc, use the checkboxes given.

6.Click on next and then choose the location on your HDD to save image.

7.In file formats, select MDS (alcohol’s own format)for best reduced size.If you think its a bad CD then you can select CCD(clone cd format) but it takes more size.

8.Then make the image by finishing the wizard.

9.Your image is in you drive.Load it in Alcohol’s virtual drive and use it as you are using CD.

same like this you cam burn CD images to CDs directly by selecting the image files.And copy dics to dics also.

Posted in Tutorials | 2 Comments »

Keep Your Passwords Safe on Public Use Computers

Posted by Parth Barot on March 9, 2006

As you no doubt realize, passwords are the keys to our resources, our belongings and our online accounts, including our finances. While using our own home or office facilities, most of us work hard at keeping the possibility of having our information monitored or stolen at as low a level as possible. But the threat is still quite real. Part of our protection armor must include the use of protection software such as virus scanners and spyware scanners. It really is a very bad idea to use any internet connected computer today that does NOT have any means of virus or spyware protection. Almost all new computers sold today come equipped with some form of protection pre-installed. And a variety of alternate programs and services are available, many of them at no cost.

But what do you do if you are not at your home or office? This poses a much greater security risk to your password and account safety. Examples and accountings of hijacking of passwords, of tracking surfing activity and of capturing screen information of a user seem to be a common occurrence.
The best method of dealing with these facilities is to simply not use them for any medium or high security uses such as accessing bank accounts or other highly sensitive services you require.
But, of course we don’t live in a vacuum and circumstances may dictate that you simply must do so at various times. So when it is essential, there are many steps you should take to ensure your own security. These steps will take a few minutes, but will increase your security by a wide margin and give you peace of mind that your passwords, accounts and information are not being compromised.
First, ensure that the computer you are using is free from spyware. The most vicious of spyware forms is “key logging” software that records your keystrokes. This will instantly compromise your passwords and everything those passwords allows access to. If the computer you are using has one of the brand name spyware scanners installed, run it to ensure there are no hidden threats lurking behind the scenes. On many public machines, the start menu will offer a virus or spyware selection. If there are none of these available on the machine, you can visit one of a number of websites to run a spyware scan without installing a complete application on the computer, which, since it is a public computer, is likely not allowed. There are a number of these out there and you can pick one (or more!) from an internet search for the words “online spyware scan”. Most of these require a script be installed and run and will take a few minutes to identity the cleanliness of the computer. Follow the instructions given by the software vendor’s website. If there are threats that cannot be easily removed by the software, move on to another machine and advise the owner of the problem.

The next step you should take is to ensure the browser you will be using will not store your usernames and passwords. For Internet Explorer, this function is called “autocomplete” and can be disabled through the options setting of the menus. It is good practice to test that this has actually been turned off by logging into one of your accounts with a phony password. Then close and restart the internet browser and start the login process again. If the system does not offer you a “remembered” password as you type in the same username and phony password once again, you know that it is not storing your passwords. You can then login with your real username and password. On the other hand, if it brings up a password or username before you have completed typing it, do not put in your real information, but go back and try turning off “autocomplete” once again. Otherwise, you should simply move on to another machine.

Once you have accessed your accounts and have completed your sessions, make sure you purge as much of your activity from the computer as possible. Be sure to delete all “temporary files” and all “cookies” from the machine. This is done from selections under the options setting of the browser you are using. This helps erase your tracks from any prying eyes after you leave the computer!
Our information, accounts, resources and the passwords that unlock all of them are too valuable to leave for granted or to chance.

Knowing how to use passwords away from home is only a portion of the methods and techniques we all need to know to protect our belongings, our security and our personal and family identities.
You too can learn how to simply and easily create a number of secure passwords that avoids being compromised by any number of methods, and at the same time will be easily remembered. Visit the “Easily Create and Remember Secure Passwords” web site at http://www.perfectpassword.com.

So,

1.Don’t use autocomplete in nay browser.
2.Always deletes history and cookies when completes your work.
3.Deletes all temporary files and browser cache.
4.First,see in task manager that if any suspect programme/application is running?

Posted in Tutorials | 3 Comments »

Windows Linux DualBoot

Posted by Parth Barot on March 8, 2006

Windows Linux DualBoot Tutorial

This tutorial was written to help set up a dual boot on a SATA drive but it will also work for PATA so continue forward and I will let you know if you need to skip something. In order to have a fully functional dual boot system it is preferred that Windows be loaded first. After that you can load Linux and easily dump the boot configuration on Windows NTLDR file (comparable to Linux boot file).

At least one of the following scenarios exist and that is why you are here reading this tutorial;

  • You have a new Serial HDD (SATA) with no software installed,
  • You have a new Parallel HDD (PATA) with no software installed,
  • You have a HDD with Windows already installed, or
  • You have a HDD with Linux already installed.

I used the following software;

  • Windows 2000 Pro (this tutorial should work for 98 and XP also)
  • SuSe 10

1. Setting Up a New SATA Drive

Note: The most popular Windows platforms, Windows 2000 and Windows XP (pre SP1), were released before and during the release of SATA drives.

In order for Windows to recognize the SATA HDD you will need to get the SATA/Raid drivers and place them on a floppy. These drivers can usually be obtained at the web site of your motherboard manufacturer. Look for Raid drivers (usually the location of the SATA drivers also) in their driver download section. If you can search the site look for TXTSETUP.OEM. You absolutely need this file and it will more than likely be located with the drivers needed. If you are unable to find the drivers needed then see this article for information on integrating installation packs and service packs.

TXTSETUP.OEM is a must! Windows Install uses this file to search for the applicable drivers. Proceed to Install windows.

2. Setting Up a PATA Drive

If this is a brand new drive go ahead and proceed to Install Windows.

If this is an installed hard drive with only Linux loaded, then back up and copy all your configuration files to a floppy, cd, or another drive. After that is done and verified the files were copied you need to clean the hard drive so you can start fresh and load Windows first.

If this is an installed drive with Windows already loaded you need to ensure there is sufficient unpartitioned space for Linux to load on. You have two options.

Note: There is a difference in free space and unpartitioned space. Typically when users load Windows they select the C: drive and the whole drive is formatted to NSTF or FAT. Linux needs unformatted/unpartitioned space to install.

  1. You can do a fresh install of Windows, or
  2. You can free up unpartitioned space if you have a partition program.

More @ Here

Posted in Tutorials | Comments Off on Windows Linux DualBoot

VideoLan

Posted by Parth Barot on March 8, 2006

As far as marketing goes I guess this article may one day bring me some hate for teaching some dumbass to build online infomercials, but I assure you my motives are far less industrious.

If you live outside North America, like me, you might think watching your favorite TV provider back home was impossible. In fact for years I figured I was just stuck with crap TV and limewire downloads. Trailerpark Boys, Battlestar Gallactica, and Family Guy had become pleasures I relied on friends to send me in the mail, years after they aired. Until now…

I have been fiddling with this all day and I will say VLC (www.videolan.org) is one of the coolest open source programs I have come across in some time. Platform support is universal from Win32, *Nix to even long dead BeOS. These are also the people behind Google Video if that is any indication. VLC allows you to stream video online, multicast, save incoming streams, and do all sorts of cool things only people with lots of money should be able to do – like open your own TV station. The quality is really amazing and of course endlessly tweakable. Oh and ya did I mention it is completely free? Ok I did, onwards…

I tested VLC by getting a friend to stream DISH Network to me from the US and it was VERY watchable. Keep in mind this was streaming from Seattle, WA to Bangkok, TH. 18 hops.

Streaming using a Video Capture Card

What you will need:

– Operating System
– 1 Video Capture Card
– Drivers for Video Capture card (go to driversguide.com to find software drivers for video capture cards)
– DirectX 9.0c
– VLC (please get the nightly CVS version, a lot of good folks work really hard on this software, and PLEASE donate to them if you can)
– A network connection
– Windows Media Player
– A WHOLE LOT of patience

Step 1

– Install Capture Card (I use all ATI Wonder Cards and have no problem)
– Install or Update your DirectX (windowsupdate.com)
– Install VLC

Step 2 FOR NAT(using DHCP for home networks)/DSL/CABLE Routers

– Go to your router and click on Port Forwarding
– Enter your VLC server’s IP address and the desired port for forwarding.
– Your router should accept the setting and tell you everything is ok

Step 3

– Fire up VLC
– Go to File > Open Captue Device > Video Device Name > Refresh.. (wait a moment) click on the default bar and then click on your capture device driver (the one that came with your card)
– Now click Stream/Save > Settings
– Click on Play Locally and MMSH. Insert YOUR LOCAL IP ADDRESS and DESIRED port (for folks using NAT thats 192.X.X.X that you forwarded on your router earlier)
– Click on Video Codec and select your Video Codec format (I use WMV since I am using WMP), then select a good bit rate like 192 or 128, then select the size of the picture in your player (1 – 2)
– Repeat the instructions above for audio
– One VERY IMPORTANT quality setting is TTL – Type 10 at a minimum. This tells VLC the number of routers your stream will probably go across.
– Click Ok and Click Ok again to start your stream

Step 4

– Open WMP and click on File > Open URL
– Type http://:9494
– Your video will take a bit to buffer but then you should see your pictures.

I would love to hear results from anyone else working with VLC. My next step is to setup a remote control with an external IRD box, so I can change channels – yes people ARE doing this! Check my official VideoLan Tutorial thread for updates on this project.

Posted in Tutorials | Comments Off on VideoLan

Inner-Browsing: Extending Web Browsing the Navigation Paradigm

Posted by Parth Barot on March 6, 2006

When you click a link on a web page, your web browser makes a request to a web server which usually results in a new web page as a response. That new page may have links that take you to other pages, which may in turn have more links, and so on. This model of web navigation is so common that most Internet users do little else. But as the Internet matures, this model has begun to show its age and its limitations. For web developers, for example, it provides less fine-grained control over the experience, and it can strain bandwidth and other resources. And for users it usually doesn’t begin to approach the seamlessness and usability of good application user interfaces.

Recently, however, modern browsers and enriched web standards have begun to make new navigational and presentational models possible. One such model is Inner-Browsing, which is our name for a model in which all navigation occurs within a single page, as in a typical application interface. The single-page context and abstraction of data from the presentation can give your web applications new continuity, precision and control. This model is also interesting because is optimized to access contextual data instead reloading full web pages.

abstract picture showing browsing inside the web page with lightweight contextual data

This article discusses the concept of inner-browsing and possible approaches for its implementation. It also provides two implementation examples using the model. The first one looks like a traditional DHTML ticker application and uses hidden IFRAMES and JavaScript to provide updates inside the webpage’s ticker headlines section. This sample was made using IFRAMEs to illustrate a possible implementation. An implementation can also use other transport technologies such as SOAP-based remote procedure calls, XMLHTTPRequest interfaces, or DOM 3 Load. The second example shows a tabbed menu that dynamically loads news headlines into the current web page. This implementation uses XMLHTTPRequest.

Extending Traditional Hypertext Navigation

The hypertext approach to developing web pages, in which developers format text layouts into pages and link those pages to related content, is analogous to a book or a magazine: readers view pages, go to other pages for more information, and view resources listed as references on that page. HTML and web standards have evolved and now offer flexible and fine-grained control to layout as well supporting DHTML, powerful programming languages like JavaScript, and additional media through embeddable third-party resources like Flash, Java, VRML, etc. Additionally, server-side technologies have also evolved, supporting and connecting different resources to different browsers.

Despite all the evolution, we still see the underpinnings of the original model in modern web sites. We still connect through a set of links that mostly drive us to a new page, and we still occasionally lose track of where we are. Also, on the server side, the server often has to rebuild all of the context of the user interface with each new request. Of course, this traditional approach is useful and easy to implement, which is why it is still so widely used. But the real showcase for new browser features and web standards like HTML 4.0 and DOM Level 2, and XML are models like inner-browsing, where these technologies can begin to be used in the way that they were envisioned. Many of the new web technologies in the HTML 4.0 specification, XML 1.0, DOM Level 3 were explicitly created with application-like behavior and more sophisticated navigational models in mind. In the next section we will introduce inner-browsing as an extension to the traditional model.

Let’s start defining what we mean by inner-browsing. In this model, when a request goes to the web server, the current page is updated rather than replaced. Without leaving the page, the user browses new information and preserves the page’s context. This new navigational method allows us to make HTML user interfaces behave similarly to non-web based applications such as contact management software. The basic implementation uses a resource such as the web page or the web application to control the navigation system. In other words, the page is the browsing device during the experience, and the user is “immersed” in that browsing device.

What does this mean, practically speaking? What does it look like? Good candidates for inner-browsing include a spell check application, in which the text entered in a web page is checked as it is typed; a webmail application that uses the inner-browsing model to display the separate messages and message lists in an integrated way, much like a client mail app; and a stock ticker that spools the information across the web page. See the table below for a description of how applications like this exemplify inner-browsing and how they might be implemented using the inner-browsing approach.

More @ devedge-temp.mozilla.org

Posted in Tutorials | Comments Off on Inner-Browsing: Extending Web Browsing the Navigation Paradigm

What Is Next For Internet Browsers?

Posted by Parth Barot on March 4, 2006

With new browsers coming out all of the time, no one can really predict what the future holds for internet browsing. As of right now, most people who surf the internet use Internet Explorer (IE) as their browser of choice. Over the past years IE has not really changed that much, and since Internet Explorer has a monopoly over other browsers, it really doesn’t have to. The fact is though, that the Internet Explorer browser and some other browsers could be much better. There are many browsers to choose from on the internet, with a variety of features, but what we want is one browser that has it all.

The perfect browser would be one with great security and complete compatibility with all Web standards. It is very hard to make a browser that can display every website that uses old Web standards, and display new and more advanced websites using new Web standards. The perfect browser would be one that could seamlessly integrate with plug-ins and other add-ons that are available on the net today. The hardest part would really be designing a browser that runs ActiveX and other Web technologies without compromising files outside of the browser, without the user having to deal with security alerts and other nuances.

If a company were to get the opportunity to design a browser that actually suits everyone’s needs, they would have to balance between those who make Web sites and those who view them. Also, the ability to block pop up ads and other annoyances should be available at the touch of a key. Another feature that should be mandatory is the ability to download the Web sites text before the images. This will decrease your waiting time and make your internet surfing speedier.

Navigation is also a major area that current browser designers need to address. Many users go back and forth between many different web sites and as of right now just about every browser does not make this task as simple as it could be. For example, and tabbed and ordered navigation system along the left side of your browser would be perfect for locating pages that you have just viewed but need to get back to, and other pages that you have looked at in the past but don’t remember the exact URL of the page.

Searching is another very important factor of a good browser, and I don’t just mean the web. Wouldn’t it be nice if you browser could search your computer also! Then you would literally have everything available right at your fingertips, in one easy to use program. Another search function that browsers perform is a page search, which basically can search for a specific word or sentence on whatever web page you are looking at. To expand that, and make it better, they should also enhance the search and provide the ability to search for all grammatical forms of a certain word and other advanced search options that will allow you to find what you are looking for on a big web page with lots of content.

To sum things up, an integration of useful toolbars, better navigation of browsing history and other enhanced functions will be what makes the browser of the future that everyone will use. So watch out Microsoft, if you don’t get on the ball Internet Explorer will soon become a thing of the past. Remember, a good browser should be an information manager, since its primary use is to gather information.

So Opera,FireFox,Internet Explorer,Maxthon,Flock,Netscape are the main in the competition but Opera is winner i think because in next version 9 of opera there are many features included like Bittorrent client,Widgets and many more.And opera is Freeware now!

Then in second number FireFox is there and because it is freeware from starting it is there.And also opensource for it’s extesions.

Posted in Tutorials | Comments Off on What Is Next For Internet Browsers?

AVI to VCD with Xing MPEG Encoder

Posted by Parth Barot on March 4, 2006

By:Parth Barot

Download, install and register these applications:
DivX Operational Player
Xing MPEG Encoder
VCD Cutter

1) Open DivX Operational Player first. Load your divx movie. Select with BEGIN/END buttons maximal range. In Operational Wizard press Audio Fragment button.

2) Type filename of WAV file: for example, “MYAUDIO”. Press Next. Select NO COMPRESSION. Press Extract.

3) Converting your newly created wav file into the right format for MPEG is quite simple.. Download and install Xing MPEG Encoder. Open Xing MPEG Encoder, Click on NEW. You will see a list of profiles for use chose the following: STREAM PROFILES/VIDEO CD/PAL, click NEXT. Chose the checkbox labeled AUDIO ONLY. Chosing this option will then grey out the video box. Chose the BROWSE button under AUDIO FILENAME and locate your AUDIO wav file (“MYAUDIO.WAV”), then click BROWSE again under TARGET FILENAME to chose where you wish to save your encoded audio file. Then click FINISH. Press the ENCODE BUTTON to start encoding your wav file.

4) Now we have an AVI file which is your divx movie and a .wav file and an .MPA audio file. You may wish to test your MPA file to see if the sound came out correctly. After you are happy with the new audio source you can now delete the huge wav file that is taking up valuable room on your hard drive

5) Again open Xing MPEG Encoder and click NEW. Once again click on VIDEO CD/PAL, click next. Chose the checkbox labeled SYSTEM this time because we are going to glue the audio with the video for the final conversion to MPEG. Chose the BROWSE button under VIDEO FILENAME you will have to copy your divx movie to your hard drive if you haven’t already done so, locate your divx movie on your hard drive. Chose the BROWSE button under AUDIO FILENAME and locate your AUDIO MPA file, then click BROWSE again under TARGET FILENAME to chose where you wish to save your encoded MPEG file. Then click FINISH. Press the ENCODE BUTTON to start encoding your MPEG file.

6) Download and install VCDCutter. Open VCDCutter and click on FILE/OPEN MOVIES or CTRL + O, chose your newly created MPEG. Move the slider bar to the start of the movie, go to the top tool bar and choose EDIT/CLIP MARK IN or F5. Now move the slider bar to roughly the center of the movie and chose a good spot to mark the out section example a fade to black transition or cut scene.

7) Once this is done go once again to the top tool bar and choose EDIT/CLIP MARK OUT or F6. once this is done press F7 to add the first selection to your CLIP LIST. Now where you have just chosen your mark out position this becomes your MARK IN position so again press F5. Once you have done this move the slider bar to the end of the movie and press F6 again for the MARK OUT position of clip two, now press F7 to add this selection to your CLIP LIST.

8) Now you should be looking at your CLIP LIST tab and see the two selections that you have made. Right click on the first clip and chose SAVE THIS CLIP to save it to your chosen location. (NOTE: the clips will save to the default save location unless you manually change the location by pressing F3, once you have pressed F3 go to the SETTINGS tab then BROWSE for the WORKING DIRECTORY of your choice, it’s a good idea to have a folder on a secondary partition on your hard drive for doing this. You should now have two MPEG files that can now be transferred directly into NERO Burning Rom. Download the latest from http://www.nero.com/

8) This step is perhaps the easiest step of the VCD creation. Open up Nero Burning Rom and go to FILE/NEW or CTRL + N. Select VIDEO CD, check the the boxes CREATE STANDARD COMPLIANT CD and USE CD-I APPLICATION. Next we go to the LABEL tab and name the fist disc under VOLUME LABEL. Now click the NEW button. In the FILE BROWSER, locate your two MPEG files. Drag and drop the first part of the movie to the VIDEO Window. The file you have just put in this window will then be analyzed for compatibility with VIDEO CD, once this part is complete (it doesn’t take too long) simply open the WRITE DIALOG box. Make sure that the two boxes WRITE and FINALISE CD are checked and then continue on to press the WRITE button. Repeat all of these steps for the second part of the movie.

You now have yourself a PAL encoded VIDEO CD that you can play on your home dvd player.

Posted in Tutorials | 1 Comment »