Free Download High resolution wallpapers for Windows, Linux and Mac OS X desktop

InterfaceLIFT website provides graphical user interface enhancements for Mac OS X, Microsoft Windows, and Linux.

You can download desktop wallpaper, icons, themes, and news with a focus on community. New content is posted virtually every day on this site.

All you have to do is visit their website

Select wallpaper

Select Size and click on download

You can view, sort or select wallpapers date wise or size wise. Currently they are offering 1,236 desktop backgrounds in widescreen and standard format for use with all operating systems. New wallpaper is posted daily!

Visit InterfaceLIFT website to pimp your desktop :)

C++ program to calculate tomorrow’s date

Q. How do I write C++ program that calculate tomorrow’s date? For example user input a date 30/03/2007, then it should print 31/03/2007. Your program must take care of following issues:
=> Leap year
=> Validate date for month, day etc
=> Change of date/month/year should be handled properly.
Continue reading “C++ program to calculate tomorrow’s date”

Howto connect MySQL PostgreSQL server to Microsoft Office Application using ODBC

Learn how to connect Microsoft application such as Excel and other to MySQL and PostgreSQL database server running on Linux. This is an excellent information / howto.

In cases where business applications have been built on open source databases, it may be necessary to connect other Windows applications, such as Microsoft Access or Excel, to these databases for reporting or business intelligence purposes.

One potential application of this process is to use Excel as a front-end for data analysis. Data can be pulled from views or tables and then further analyzed, graphed, and the like. Even pivot tables can be used to create even more powerful reporting solutions.

This how-to walks through this process using Excel as an example application. Although in this example, the MySQL and PostgreSQL servers are running on Linux, the steps are no different if the software is running on Windows. These steps are:
1. Setting up authentication
2. Installing the ODBC Drivers
3. Configuring the data source
4. Importing the data.

=> Connecting Office Applications to MySQL and PostgreSQL via ODBC

Free Fast Public DNS Servers List

The most basic task of DNS is to translate hostnames such as theos.in to IP address such as 74.86.49.131. In very simple terms, it can be compared to a phone book. DNS also has other important use such as email routing.

This is my list of better, fast public dns servers and free dns server (as compare to your ISP / DSL / ADSL / cable DNS service providers dns servers). These dns servers are free to all. I was able to improve my browsing speed with following DNS servers. Use any one of the following provider.

The most basic task of DNS is to translate hostnames such as theos.in to IP address such as 74.86.49.131. In very simple terms, it can be compared to a phone book. DNS also has other important use such as email routing.

This is my list of better, fast public dns servers and free dns server (as compare to your ISP / DSL / ADSL / cable DNS service providers dns servers). These dns servers are free to all. I was able to improve my browsing speed with following DNS servers. Use any one of the following provider.
Continue reading “Free Fast Public DNS Servers List”

Terminal or shell command to shutdown or reboot Ubuntu Linux

So how do you shutdown or reboot the Ubuntu Linux server from a terminal or a shell prompt? If GUI is working you can always click on a shutdown button. If GUI is not working or if you are working remotely over ssh type the following commands to shutdown from a terminal:
Continue reading “Terminal or shell command to shutdown or reboot Ubuntu Linux”

Understanding IPv6 (Internet Protocol version 6) for home and enterprise networking

Internet Protocol version 6 (IPv6) is a network layer protocol for packet-switched internetworks. It is a next version of current IPv4. IPv6 supports 2128 addresses, approximately.

ArsTechnica has published an excellent guide:

The engineers who design the machinery deep inside the bowels of the Internet have been working on it for more than a decade, but recently, companies like Microsoft and Apple have been more aggressive about enabling it in their new products: IPv6, the protocol that will power the next generation Internet.

TCP/IP has served us well since it was born in 1981, but for some time now it has been clear that the IP part has a limitation that makes continued growth of the Internet for decades to come problematic. In order to accommodate a large number of hosts but not waste too much space in the IP packet on overhead, the TCP/IP designers settled on an address size of 32 bits. With 32 bits, it’s possible to express 4,294,967,296 different values. Over half a billion of those are unusable as addresses for various reasons, giving us a total of 3.7 billion possible addresses for hosts on the Internet. As of January 1, 2007, 2.4 billion of those were in (some kind of) use. 1.3 billion were still available and about 170 million new addresses are given out each year. So at this rate, 7.5 years from now, we’ll be clean out of IP addresses; faster if the number of addresses used per year goes up.

=> Everything you need to know about IPv6

Your WordPress blog may get hacked if you are using 2.1.1 version

I’ve updated my blog few days back. But in case if you are still running 2.1.1 makes sure you get updated version.

This morning we received a note to our security mailing address about unusual and highly exploitable code in WordPress. The issue was investigated, and it appeared that the 2.1.1 download had been modified from its original code. We took the website down immediately to investigate what happened.

It was determined that a cracker had gained user-level access to one of the servers that powers wordpress.org, and had used that access to modify the download file. We have locked down that server for further forensics, but at this time it appears that the 2.1.1 download was the only thing touched by the attack. They modified two files in WP to include code that would allow for remote PHP execution.

Read more

Server Computer Configuration for an Internet Service Provider (ISP)

Here is a quick question from one of our reader:

What sort of computer should you buy for an ISP? We need a computer for mailing, hosting customer sites and running games like Quake. We are small startup ISP.

For mailing and webhosting need you need to purchase a dedicated server. You can build one for yourself (a whitebox) or order from Dell and other vendors. A minimum suggested configuration:

Web server
=> Dual Intel XEON or AMD Dual core processor

=> RAID 5 1/2 TB disk space

=> 4 GB Ecc RAM

=> Linux or FreeBSD UNIX operating system
This web server can handle shared hosting load. You can use same configuration computer for mailing with anti spam and anti virus software.

For gaming you can get a Dual core Intel / AMD CPU with lods of RAM and fast hard disks.

Remember an ISP server mean lots of services such as a Firewall, Web, FTP, RADIUS server etc. You should also consider operating system and your own level of handling the same. You can also purchase 3rd party game and management control panel. Basically you need to do good research before making a final decision.

Top virus threats in 2007

McAfee Inc, a leading dedicated security technology company, on Wednesday announced its top ten predictions for security threats in 2007 from McAfee Avert Labs. According to McAfee Avert Labs data, with more than 217,000 various types of known threats and thousands more not yet identified, it is clear that malware is increasingly being released by professional and organised criminals.

Malware or malicious software is a software designed to infiltrate and damage a computer system without the owner’s consent. The expression is a general term to mean various forms hostile, intrusive, or annoying software or programme code.

Computers are an essential part of everyday life. As a result there is a huge potential for monetary gains by virus writers. With sophisticated techniques on the rise, it is becoming increasingly hard for the general user to identify or avoid malware infections.

In no particular order, McAfee Avert Labs’ top ten security threats for 2007 are:

1. Number of password-stealing Web sites will increase using fake sign-in pages for popular online services

2. Volume of spam, particularly bandwidth-eating image spam, will rise

3. Popularity of video sharing on the Web makes it inevitable that hackers will target MPEG files

4. Mobile phone attacks will become more prevalent as mobile devices become smarter

5. Adware will go mainstream

6. Identity theft and data loss will continue to be a public issue

7. The use of bots will increase as a tool favoured by hackers

8. Parasitic malware, or viruses that modify existing files on a disk, will make a comeback

9. The number of rootkits on 32-bit platforms will increase

10. Vulnerabilities will continue to cause concern fueled by the underground market for vulnerabilities

Top 10 computer virus threats in 2007