Wednesday, March 30, 2011

KNOW YOUR CITY WEATHER IN GTALK BY GOOGLE GURU

Google-labsGoogle Labs has launched a service that let’s you make use of IM and your mobile to receive information like weather, sports score, currency conversion, translation and so on.

The service called “Google Guru” is still an experimental one. To make it work you have to add a contact “guru” in your Google Talk list. After it is added, you can send your queries formatted in a specific way to get quick information in reply. The service has no natural language processing so your queries must be in a specific format.

google guru

This is a quick use of “Google Guru” and an instant reply for weather information in Bangalore, India.

The service seems useful only if you’re in front of your PC and are looking for a quick answer for a simple query like weather, sports info, translation or currency conversion and want to avoid some extra mouse clicks to open your web browser and do that search. Natural language translation is something which still would be desired functionality for “Google Guru”. Apart from using it through Google Talk on your smartphone, how will it be useful and easy for mobile users is still unknown to us. You can find out more about Google Guru here.

via [TNW]

Sunday, March 27, 2011

key codes

VK_LBUTTON    01    Left mouse button
VK_RBUTTON    02    Right mouse button
VK_CANCEL    03    Control-break processing
VK_MBUTTON    04    Middle mouse button
¾     05-07    Undefined
VK_BACK    08    BACKSPACE
VK_TAB    09    TAB
¾     0A-0B    Undefined
VK_CLEAR    0C    CLEAR
VK_RETURN    0D    ENTER
¾     0E-0F    Undefined
VK_SHIFT    10    SHIFT
VK_CONTROL    11    CTRL
VK_MENU    12    ALT
VK_PAUSE    13    PAUSE
VK_CAPITAL    14    CAPS LOCK
¾     15-19    Reserved for Kanji systems
¾     1A    Undefined
VK_ESCAPE    1B    ESC
¾     1C-1F    Reserved for Kanji systems
VK_SPACE    20    SPACEBAR
VK_PRIOR    21    PAGE UP
VK_NEXT    22    PAGE DOWN
VK_END    23    END
VK_HOME    24    HOME
VK_LEFT    25    LEFT ARROW
VK_UP    26    UP ARROW
VK_RIGHT    27    RIGHT ARROW
VK_DOWN    28    DOWN ARROW
VK_SELECT    29    SELECT
¾     2A    Undefined
VK_EXECUTE    2B    EXECUTE
VK_SNAPSHOT    2C    PRINT SCREEN
VK_INSERT    2D    INS
VK_DELETE    2E    DEL
VK_HELP    2F    HELP
VK_0    30    0
VK_1    31    1
VK_2    32    2
VK_3    33    3
VK_4    34    4
VK_5    35    5
VK_6    36    6
VK_7    37    7
VK_8    38    8
VK_9    39    9
¾     3A-40    Undefined
VK_A    41    A
VK_B    42    B
VK_C    43    C
VK_D    44    D
VK_E    45    E
VK_F    46    F
VK_G    47    G
VK_H    48    H
VK_I    49    I
VK_J    4A    J
VK_K    4B    K
VK_L    4C    L
VK_M    4D    M
VK_N    4E    N
VK_O    4F    O
VK_P    50    P
VK_Q    51    Q
VK_R    52    R
VK_S    53    S
VK_T    54    T
VK_U    55    U
VK_V    56    V
VK_W    57    W
VK_X    58    X
VK_Y    59    Y
VK_Z    5A    Z
VK_LWIN    5B    Left Windows key (MS Natural Kb)
VK_RWIN    5C    Right Windows key (MS Natural Kb)
VK_APPS    5D    Applications key (MS Natural Kb)
¾     5E-5F    Undefined
VK_NUMPAD0    60    Numeric keypad 0
VK_NUMPAD1    61    Numeric keypad 1
VK_NUMPAD2    62    Numeric keypad 2
VK_NUMPAD3    63    Numeric keypad 3
VK_NUMPAD4    64    Numeric keypad 4
VK_NUMPAD5    65    Numeric keypad 5
VK_NUMPAD6    66    Numeric keypad 6
VK_NUMPAD7    67    Numeric keypad 7
VK_NUMPAD8    68    Numeric keypad 8
VK_NUMPAD9    69    Numeric keypad 9
VK_MULTIPLY    6A    Multiply
VK_ADD    6B    Add
VK_SEPARATOR    6C    Separator
VK_SUBTRACT    6D    Subtract
VK_DECIMAL    6E    Decimal
VK_DIVIDE    6F    Divide
VK_F1    70    F1
VK_F2    71    F2
VK_F3    72    F3
VK_F4    73    F4
VK_F5    74    F5
VK_F6    75    F6
VK_F7    76    F7
VK_F8    77    F8
VK_F9    78    F9
VK_F10    79    F10
VK_F11    7A    F11
VK_F12    7B    F12
VK_F13    7C    F13
VK_F14    7D    F14
VK_F15    7E    F15
VK_F16    7F    F16
VK_F17    80    F17
VK_F18    81    F18
VK_F19    82    F19
VK_F20    83    F20
VK_F21    84    F21
VK_F22    85    F22
VK_F23    86    F23
VK_F24    87    F24
¾     88-8F    Unassigned
VK_NUMLOCK    90    NUM LOCK
VK_SCROLL    91    SCROLL LOCK
¾     92-B9    Unassigned
¾     BA-C0    OEM specific
¾     C1-DA    Unassigned
¾     DB-E4    OEM specific
¾     E5    Unassigned
¾     E6    OEM specific
¾     E7-E8    Unassigned
¾     E9-F5    OEM specific
VK_ATTN    F6    Attn
VK_CRSEL    F7    CrSel
VK_EXSEL    F8    ExSel
VK_EREOF    F9    Erase EOF
VK_PLAY    FA    Play
VK_ZOOM    FB    Zoom
VK_NONAME    FC    Reserved for future use.
VK_PA1    FD    PA1
VK_OEM_CLEAR    FE    Clear

alt codes copyright, register, trademark, and many more

©
Copyright symbol
0169

®
Registered symbol
0174


Trademark
0153


List Dot
0149

§
Section Symbol
0167


Dagger
0134


Double Dagger
0135


en-dash
0150


em-dash
0151


Paragraph Symbol (Pilcrow)
0182

Saturday, March 26, 2011

HOW TO RESTRICT TO INSTALL SOFTWARE IN XP

 

software restriction policies in Windows XP. Administra...

This article describes software restriction policies in Windows XP.
Administrators can use software restriction policies to allow software to run. By using a software restriction policy, an administrator can prevent unwanted programs from running. This includes viruses and Trojan horse software, or other software that is known to cause problems.

You can use the Group Policy tool in Windows XP to implement software restricti...

You can use the Group Policy tool in Windows XP to implement software restriction policies. To enable a software restriction policy, use either of the following methods:

  • Using Group Policy
    1. Click Start, and then click Run.
    2. Type gpedit.msc, and then click OK.
    3. Expand the following items:

      Computer Configuration
      Windows Settings
      Security Settings
      Software Restriction Policies

  • Using the Local Security Policy
    1. Click Start, and then click Run.
    2. Type secpol.msc, and then click OK.
    3. Follow the instructions to enable a policy.
    The Default Security Level and Exceptions

You can configure the default security level and define additional rules that form exceptions to the default rules. The default security level determines the behavior for all programs. Additional rules provide exceptions to the default security level. The two security levels are:

  • Disallowed - If you set Disallowed as the default rule, no programs are permitted. You must create additional rules that enable particular programs to run.
    Using Disallowed as the default is not a good idea unless the administrator has a complete list of permitted programs.
  • Unrestricted - If you set Unrestricted as the default rule, all programs are allowed to run. You must create additional rules if you want to restrict individual programs.
    Unrestricted is best if the administrator does not have a complete list of permitted programs, but needs to prevent certain programs from running.

 

Additional Rules

You can configure several types of additional rules:

  • Hash - With a Hash rule, the administrator lists the program file to be blocked or explicitly permitted. It is hashed, and this results in a cryptographic fingerprint that remains the same, regardless of the file name or location. You can use this method to prevent a particular version of a program from running or to prevent a program from running, regardless of where it is located. An issue in Windows XP (all service pack levels) prevents hash rules from working with DLL files. Hash rules do work correctly with Windows Server 2003 and with later versions of Windows. One possible workaround for Windows XP is to create a logon script that unregisters the relevant DLL files by using the following command:

    regsvr32 /u filename.dll

  • Certificate - You can build Certificate rules by providing a code-signing software publisher certificate. Like Hash rules, Certificate rules apply no matter where the program file is located or what it is named.
  • Path - Path rules apply to all programs that run from the specified local or network path, or from subfolders that are in the path.
  • Internet Zone - You can use Internet Zone rules to apply software restriction policy rules based on the Microsoft Internet Explorer security zone in which the program is run. Currently, these rules apply only to Microsoft Windows Installer packages that are run from the zone. Internet Zone rules do not apply to programs that are downloaded by Internet Explorer.

 

General Configuration Rules

In addition to the default security and additional rules, you can also define general configuration rules to determine how software restriction policies are applied on the computer. These include:

  • Enforcement - You can use the Enforcement settings to determine which files are enforced, and which users are subject to the security restriction policy configuration. By default, all software files except libraries (such as dynamic-link libraries, or DLLs) are subject to the security restriction policy settings. You can configure the security restriction policies to apply to all software files. Note that this may require that you add rules for each library file that is required by a program.
    By default, all users are subject to the security restriction policy settings on the computer. You can configure enforcement for all users except local administrators, which allows local administrators to run disallowed programs.
  • Designated Files Types - You can use this policy to configure the file types to which the security restriction policy settings apply.
  • Trusted Providers - You can use the Trusted Providers properties to configure which users can select trusted publishers. You can also determine which, if any, certificate revocation checks are performed before trusting a publisher.

 

AppLocker on Windows 7 and on Windows Server 2008 R2

Although software restriction policies and AppLocker have the same goal, AppLocker is a complete revision of software restriction policies. AppLocker was introduced with Windows 7 and Windows Server 2008 R2. You cannot use AppLocker to manage the software restriction policy settings. AppLocker rules are enforced only on computers that are running Windows 7 Ultimate and Enterprise editions or all editions of Windows Server 2008 R2, whereas the software restriction policy rules are enforced on these and earlier versions.
Additionally, if AppLocker and the software restriction policy settings are configured in the same Group Policy object (GPO), only the AppLocker settings are enforced on the computers that are running Windows 7 and Windows Server 2008 R2. Therefore, if you must use both software restriction policies and AppLocker in your organization, we recommend that you create AppLocker rules for computers that can use AppLocker policy and software restriction policy rules for computers that are running earlier versions of Windows.
For more information about how to use these two software restriction technologies, see the AppLocker topic in the Microsoft TechNet Technical Library:

Friday, March 18, 2011

Moongphali ki Chutney

मूंगफली के दानो की चटनी (Moongphali ki Chutney) इडली, दोसे के साथ खाई जाती है. बहुत ही स्वादिष्ट होती है. 3-4 दिन तक फ्रिज में रख कर खाई जा सकती है.

आवश्यक सामग्री - Ingredients for Ground Nut Chutney

  • मूंगफली के दाने एक कटोरी भुने और छिले हुये
  • हरी मिर्च 2-3
  • राई आधा छोटी चम्मच
  • लाल मिर्च पाउडर 1-2 पिन्च
  • नीबू 1 रस
  • रिफाइन्ड तेल 2 छोटी चम्मच
  • नमक स्वादानुसार

विधि - How to make Groundnut Chutney
मूंगफली के दाने आपने जिस कटोरी से नाप कर लिये हैं उसी कटोरी से नाप कर उतना ही पानी ले लीजिये. अब इसमें नमक और हरी मिर्च डाल कर बारीक पीस लीजिये. बाउल में निकालिये अगर यह आपको बहुत अधिक गाढ़ी लगे तो थोड़ा पानी और मिला दीजिये. अब इसमें आप नीबू का रस मिला दीजिये.

अब गैस पर छोटी कढ़ाई गरम किजिये और इसमें तेल डालिये इसके बाद राई डालिये.  राई कड़कड़ाहट के साथ भुन जायेगी. गैस बन्द कर दीजिये. अब इसमें 1-2 पिंच लाल मिर्च पाउडर डालिये, और इस तड़के को

चटनी में डाल दीजिये. चम्मच से एक दो बार चला दीजिये. चटनी (Groundnut Chatni) तैयार है.

Chane ki dal ki Chutney

भुनी हुई चने की दाल बाजार में मिल जाती है.  इससे बनी चटनी बड़ी स्वादिष्ट होती है.  इडली, दोसे और बड़ो इत्यादि के साथ यह चटनी प्रयोग की जाती है.

आवश्यक सामग्री - Ingredients for Chane ki dal ki Chutney
  • भुनी चने की दाल - 100 ग्राम
  • हरी मिर्च - 2-3
  • नीबू - 1
  • राई - छोटी चम्मच
  • रिफाइन्ड तेल - 2 छोटी चम्मच
  • कशमीरी मिर्च - 2 पिंच
  • नमक - स्वादानुसार
विधि - How to make Chane ki dal ki Chutney

चने की दाल में इतना पानी मिलायें जितनी चने की दाल है, हरी मिर्च और नमक मिला कर बारीक पीस लें. बाउल में निकालें और नीबू का रस मिला दें.

तड़के के लिये, गैस पर छोटी कढ़ाई रखें और उसमें तेल डाल कर गरम करे. गरम तेल में राई डालें. राई कड़कड़ाहट के साथ भुन जायेगी. गैस बन्द कर दें, और उसमें 2 पिंच कशमीरी मिर्च की डालें.  इस तड़्के को चटनी में मिला दें. स्वादिष्ट चटनी तैयार है.

MIRCH PATORI

पटोरी (Patori Besani Mirch) अधिकतर राजस्थान के चित्तोड़ के इलाकों में बनायी जाती है. आप इसे बनाकर दस दिन तक प्रयोग में ला सकते हैं.

आवश्यक सामग्री - Ingredients for Patori Besani Mirch
  • लम्बी  हरी मिर्च - 6-7
  • बेसन - 1 बड़ा चम्मच
  • सरसों का तेल - 1 बड़ा चम्मच
  • हींग - 2 पिंच
  • जीरा - आधा छोटी चम्मच
  • राई - आधा छोटी चम्मच
  • हल्दी पाउडर - आधा छोटी चम्मच
  • धनिया पाउडर - एक छोटी चम्मच
  • सोंफ पाउडर - एक छोटी चम्मच
  • सोंफ साबुत - एक छोटी चम्मच
  • अमचूर पाउडर - एक छोटी चम्मच
  • नमक - स्वादानुसार
विधि How to make Patori Besani Mirch

 

हरी मिर्च को धोकर, डंठल तोड़िये, और काट लीजिये.

बेसन को सूखा हल्का ब्राउन होने तक भूनिये.

कढ़ाई में तेल डाल कर गरम कीजिये.  हींग, जीरा और राई डाल दीजिये.  जीरा और राई तड़कने के बाद हल्दी पाउडर, धनियां पाउडर, सोंफ पाउडर, कटी हुई मिर्च, अमचूर पाउडर और नमक डाल कर सबको अच्छी तरह चम्मच से मिला दीजिये.

एक टेबिल स्पून पानी डालिये, और 2 मिनिट तक ढककर धीमी गैस पर पकने दीजिये.  ढक्कन खोलिये और भूना हुआ बेसन डाल कर अच्छी तरह मिला दीजिये.  आपकी पटोरी तैयार है.

अपने मन पसन्द खाने के साथ, पटोरी का स्वाद लीजिये