Archive for the 'Tech Info' Category

Import Contacts into Gmail

August 27, 2006
  1. First export your contacts into a CSV file
  2. Go to Gmail Account click Contacts and Import CSV file to it

Heres how you can create CSV file in Microsoft Outlook

  • Choose File | Import and Export.
  • Choose Export to a file
  • Choose Comma Separated Values (Windows)
  • Choose your Contacts folder
  • Give the file a name and browse to the folder where you want to save it, and click Next and then Finish.

How To Delete Google Search History

June 19, 2006

Heres how you can "hide the evidence" of the terms that you searched for on Google

In Internet Explorer

  1. Click the Tools menu and select Internet Options
  2. Click the Contents tab.
  3. Click the Auto Complete button.
  4. Click the Clear Forms button.

NOTE that this will clear the auto complete information saved by all Web forms, not just Google's!


April 10, 2006

what is barcamp?

March 23, 2006


BarCamp is an ad-hoc un-conference born from the desire for people to share and learn in an open environment. It is an intense event with discussions, demos and interaction from attendees.

Anyone with something to contribute or with the desire to learn is welcome and invited to join.

When you come, be prepared to share with barcampers.
When you leave, be prepared to share it with the world.


Attendees must give a demo, a session, or help with one. All presentions are scheduled the day they happen. Prepare in advance, but come early to get a slot on the wall.

Presenters are responsible for making sure that notes/slides/audio/video of their presentations are published on the web for the benefit of all and those who can’t be present. 

Whats Happening In INDIA

An unconventional techie rebellion has reached Indian shores. Fighting the onslaught of “invite-only” expensive trade conferences, the Silicon Valley software community started the Bar Camp in 2005. A year on, the movement is in India, home to an enviable pool of technology professionals.

Delhi hosted the first ‘desi Bar Camp’, with 75 participants at the Adobe office. Staying true to the US concept, it was open to all and free of cost. “There were no big-ticket speakers, so anyone could sign up and make presentations,” said organiser Amit Ranjan.

The success of the Delhi Bar Camp made news in the blogosphere, and soon, city-specific groups started their own camps. Now Chennai, Hyderabad and Bangalore have joined the fray.

In India, tech conferences could cost Rs 3,500 per day or more. After being “bored to death at paid conferences,” Kiruba Shankar, Chennai Bar Camp organiser, said the “un-conference” set-up appeals as, “the best ideas anyhow occur at tea break or lunch when people talk freely and network.”

The event aims to foster sharing of ideas, where participants discuss topics like Web 2.0, an internet ecosystem or talk about the feasibility of innovations like the $100 laptop.

All Bar Camps have dedicated ‘Wikis’ – websites that allow users to add or modify content, giving information about the event, with blogs being used to woo techies.

The Hyderabad Bar Camp will see at least 50 participants, while Chennai expects to touch the 100-mark. “This will be a conference of peers and not another pedagogical do,” said Hyderabad organiser Ramesh Loganathan.

Chennai and Hyderabad will host Bar Camps on April 8, so the organisers plan to use video conferencing to enable techies to follow developments in both cities.

An essential for Bar Camps is a wi-fi (wireless internet)-enabled campus.

The Hyderabad Bar Camp will be held at Indian Institute of Information Technology and the Chennai event at the IIT campus.  The Bangalore gig is still to be fixed. “Both Yahoo and Adobe campuses are available. Bangalore could easily attract max participants,” said R Muthu Kumar, Bangalore organiser.

Tech Talk

March 20, 2006

PHP is short for Hypertext Pre-processor. It is a open source, server-side, HTML-embedded scripting language that lets you create dynamic Web pages. It is usually used to connect databases to Web sites. Pages using PHP end with a .php file extension rather than the .htm extension used in HTML pages

Digital Zoom is a fake zoom which creates a zooming effect by enlarging the pixels in the image on-the-fly. This type of zooming degrades the quality of the image, making it pixelated and unclear. On the other hand, optical zoom is achieved through lenses and, hence, is a lot more clearer and refined

DVI means Digital Visual Interface. A connection standard developed to connect computers to digital monitors such as flat panels and digital projectors. These connectors offer better colour and pictures as compared to older counterparts

CMYK is an abbreviation for cyan, magenta, yellow and key (black) – the four colours that form the ink-sets of many photo-quality printers. When combined together in varying proportions, CMYK can be made to produce the full colour spectrum. Some printers use six ink colours to achieve smoother, more photographic prints. The two additional colours are often lighter shades of cyan and magenta.

Thin Client is a stripped down PC designed specifically to be a “dumb terminal” in a client/server network. These terminals tend to cost less than fully-equipped computers especially since it uses software from – and processing power of – a remote server. Thin clients have no need for full software or internal devices of its own.

Love Working With Registry

March 6, 2006

Open Registry settings for other users through the Load Hive feature of Windows XP’s Registry Editor.

-> Select the HKEY_USERS
-> choose File, Load Hive.
-> navigate to another user’s folder(C:\D & S\username)
-> Select the ntuser.dat file and click Open
-> Now you’ll be prompted for a Key Name (enter any name)
-> select the key you added and choose File, Unload Hive.

Unhide the Administrator

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList

Administrator == 1 (if not there create one)

Clear the Google Search be cont..

What is cryptography?

February 25, 2006


  • Data that can be read and understood without any special measures is called plaintext
  • The method of disguising plaintext in such a way as to hide its substance is called encryption.
  • Encrypting plaintext results in unreadable gibberish called ciphertext.
  • The process of reverting ciphertext to its original plaintext is called decryption.
  • Cryptography is the science of using mathematics to encrypt and decrypt data.
  • cryptanalysis is the science of analyzing and breaking secure communication.
  • Cryptology embraces both cryptography and cryptanalysis.
  • A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and decryption process. A cryptographic algorithm works in combination with a key—a word, number, or phrase—to encrypt the plaintext.
  • A cryptographic algorithm, plus all possible keys and all the protocols that make it work comprise a cryptosystem.
  • conventional cryptography, also called secret-key or symmetric-key encryption, one key is used both for encryption and decryption.
  • Public key cryptography is an asymmetric scheme that uses a pair of keys for encryption: a public key, which encrypts data, and a corresponding private, or secret key for decryption.
  • PGP is a hybrid cryptosystem. It combines some of the best features of both conventional and public key cryptography.

How PGP works?
When a user encrypts plaintext with PGP,

  1. PGP first compresses the plaintext.
  2. PGP then creates a session key. This key is a random number generated from the random movements of    your mouse and the keystrokes you type.
  3. This session key works with a conventional encryption algorithm to encrypt the plaintext; the result is ciphertext.
  4. Once the data is encrypted, the session key is then encrypted to the recipient’s public key. This public key-encrypted session key is transmitted along with the ciphertext to the recipient.


  5. Decryption works in the reverse. The recipient’s copy of PGP uses his or her private key to recover the temporary session key, which PGP then uses to decrypt the conventionally-encrypted ciphertext.



Keys are stored in encrypted form. PGP stores the keys in two files on your hard disk; one for public keys and one for private keys. These files are called keyrings. ……………..TO BE CONTINUE 😉 


BitTorrent Info

February 19, 2006

What is BitTorrent?
   BitTorrent is a protocol designed for transferring files. It is peer-to-peer in nature, as users connect to each other directly to send and receive portions of the file. However, there is a central server (called a tracker) which coordinates the action of all such peers. The tracker only manages connections, it does not have any knowledge of the contents of the files being distributed, and therefore a large number of users can be supported with relatively limited tracker bandwidth. The key philosophy of BitTorrent is that users should upload (transmit outbound) at the same time they are downloading (receiving inbound.) In this manner, network bandwidth is utilized as efficiently as possible. BitTorrent is designed to work better as the number of people interested in a certain file increases, in contrast to other file transfer protocols.

What is a .torrent file?
   This is a small metadata file. Metadata here means that the file contains information about the data you want to download, not the data itself.Your BitTorrent client needs the .torrent file to connect to the tracker (see below) and download the data you want.

What are seeds?
   A seed is a client that has a complete copy of the data of a certain torrent. Once your BitTorrent client finishes downloading, it will remain open until you click the Finish button (or otherwise close it). This is known as being a seed or seeding.

What are leechers?
   A leecher is a client that is currently downloading a torrent. Generally a leecher does not have the complete file, otherwise it would be called a seed.

What is a tracker?
   A server on the internet that acts to coordinate the actions of BitTorrent clients. When you open a torrent, your machine contacts the tracker and asks for a list of seeds and peers to connect to.