Saturday, June 27, 2009

Microsoft Security Essentials

Download Microsft's New Security Essential Software 
Free Antivirus software by Microsoft in its beta stage is now available for download officially. It’s limited public beta is released restricting 75,000 downloads.Microsoft Security Essentials replaces Windows Live OneCare, and supersedes Windows Defender. It’s targeted at users who can’t pay or simply won’t pay for a security product.

if You cant download use following Link

Saturday, June 20, 2009

New Apple IPhone 3G S Comes Out



Apple 3Gs  has been release, This has Apple 3.0 OS and it has massive Vedio and Audio capabilities too. Value is nearly 70000 thousand. 
Feathures of new Apple 3GS .......

1. Increased speed: This is the reason, after all, it’s called the iPhone 3 G Speed. The RAM is now 256 MB, the MHz has been increased, and there is a new PowerVR SGX graphics chip. Loading times, processing speeds, and more are upgraded.

2. Three megapixel camera: The camera has been upgraded from 2 megapixels and has autofocus. Tap on an area of the screen to help focus.

3. Video recording: It took long enough, but the iPhone 3G S records video.

4. Video editing: To make up for the lack of video in the iPhone 3G, the new iPhone has some nifty video editing software. The software is demoed on the above clip from Late Night With Jimmy Fallon.

5. Voice recognition: You can talk to the phone and it’ll make phone calls and play music. This is more advanced than your standard “Call Jessica” functionality.

6. Nike+iPod: The Nike+iPod is a version of the iPod Nano that communicates with Nike shoes so you know how far and hard you ran. The new iPhone supports this too.

7. Compass: This iPhone has a real compass that points to magnetic north.Google MapsGoogle Maps will also move with you based on which direction you face, which is very neat.

8. Increased battery life: It’s supposed to provide 12 hours of talk time, 30 hours of audio, and 10 hours of video. In reality, it seems to be a slight increase, but we’ll take it.

Two Sri Lankans honoured by Mozilla Foundation

Two Sri Lankans have been granted access to modify official releases of Mozilla Foundation’s products, language packs and patches such as Mozilla Firefox web browser.

The two members of the LAKapps team, a Mozilla localisation project K.Sarveswaran, Systems Engineer at the Department of Computer Science and Engineering, University of Moratuwa (UoM) and Rohana Dassanayake, Systems Analyst at the Arthur C. Clarke Institute (ACCIMT) have been awarded this opportunity to access Mozilla’s L10n repository.

‘Both gentlemen have been active members of LAKapps from its very initiation and their commitment to the localisation of Free and Open-Source Software (FOSS) was thus rewarded by the Mozilla localisation project. This is a rare opportunity in the IT field and LAKapps is honoured to have been recognised,’ an official from LAKapps, a project to improve local language Internet-based software development and deployment said.

How good is Microsoft's free antivirus software?

Microsoft has officially unveiled its long-awaited consumer antivirus offering. Formerly code-named “Morro,” it’s now been christened Microsoft Security Essentials, and it will enter public beta testing next week. If you have a licensed copy of Windows XP (Service Pack 2 or above), Windows Vista, or Windows 7, you’ll be able to download and install the software at no additional charge. No subscription is required for ongoing definition updates, either. The final release is scheduled for this fall. (My colleague Mary Jo Foley has more on what beta testers can expect next week.)

The public beta will be limited to 75,000 downloads, Microsoft says, and the targets are global. The initial beta release is limited to the United States, Israel (where a core development team is based), and Brazil. Next month, the beta will open up for users in China. It’s no coincidence that Microsoft is rolling out early in Brazil and China, which are large-scale vectors of malware infections because of the sheer number of Windows users running without antivirus protection. According to Microsoft, barriers to adoption of paid security software are especially high in developing markets, where internet access is slower and credit cards are unavailable to a large percentage of the population.

The public beta will be limited to 75,000 downloads, Microsoft says, and the targets are global. The initial beta release is limited to the United States, Israel (where a core development team is based), and Brazil. Next month, the beta will open up for users in China. It’s no coincidence that Microsoft is rolling out early in Brazil and China, which are large-scale vectors of malware infections because of the sheer number of Windows users running without antivirus protection. According to Microsoft, barriers to adoption of paid security software are especially high in developing markets, where internet access is slower and credit cards are unavailable to a large percentage of the population.


Friday, June 19, 2009

Mozilla 3.5 RC Released

Mozilla FireFox 3.5 RC comes out now.Seems Mozilla Go ahead day by day,Mozilla and Chrome will be the great competition

http://www.mozilla.com/en-US/firefox/all-beta.html

Monday, June 15, 2009

ගූ - ඨයිම් -බර ගෙ ගොන් ටොක්

දෑන් අලුත්ම තාලේ වෙබ් බ්‍රව්සර් එකක් තියන්වා, මේක හදපු එකා මේක තනිකරම මෑර බලෙන් තමා ප්‍රොමෝට් කරන්න ට්‍රයි කරන්නෙ. මේක අපේ රටේ හදපු එකක් කියල තමයි උන් කියන්නෙ. බම්බුව තමයි. මේක තනිකරම කොපියක් කියල දෙන් ඔප්පු වෙල ඉවරයි. මේක හදපු එකා වෑඩ කාරයෙක් වෙන්න අති, එත් මේක කොපි කරල බොරුවට මිනිස්සු රවට්ටන එක වෑරදි නෙ.
මේ සෙට් එකේ ඉන්නව දුටුගෑමුණු රජ්ජුරුවන්ගෙ දස මහා යෝධයින් ගෙ නමක් තියන රොම්පියෙක්. මේ කාලකන්නිය දුටුගෑමුණු රජ්ජුරුවන් වත් විකුනගෙන හරි තමන්ගෙ බිස්නස් එක කර ගන්න හදන්නෙ, මම ඔය කාල්කන්නි යට කියන්ව පුලුවන්න්නම් කොන්දක් තියන්වනම් බොරු නම් වලින් පෙනී ඉන් නෙතුව වරෙන් යකෝ රියල් නේම් එකෙන්.

Sunday, June 14, 2009







මෙන්න අපේ කොල්ලන්ගෙ වෑඩ.....මෙහෙම ෆ්ල්ඩින් පාරක් මේ ක්‍රිකට් ඉතියාසෙ කවුරුත් දෑකල නෙ........මෙන්න අපේ කොල්ලන්ගෙ උනන්දුව

නීරෝ ඔබට නිවන් සුව




මේ අපේ ජාතික වීරයෙක් ගෙ බොඩි එකක්. මෙයා තමයි අපේ රටෙ හිටපු සුපිරිම ස්නපර් ගනර්...නම නම් අහල ඈති ....නීරෝ තමයි නම...මෙයා කොටි 180 විතර තමන්ගෙ ස්නපර් එකෙන් පත බාල තියනව. යුද්දෙ අවසන හරියෙ තමයි මෙයා ට වෙඩි වෑඩුනෙ, මේ වීඩියො එක බලන්න සෙන්සිටිව් අයට අමරුයි. එක හින්ද බලන්න එපා... නමුත් තමන්ගෙ අද දවස අපේ හෙට වෙනුවන් කෑප කල නීරෝ ට නිවන් සුව ලබෙවා කියල අපි හෑමෝම ප්‍රර්ථනා කරමු...

Saturday, June 13, 2009

වින්ඩොස් සෙවන් අල්ටිමේට් එඩිසන්

ක Microsoft OS වල (Windows XP වලින් ඉහල ) මේ edition කතාව එනවා. මේක ඈති කරන්න හේතුව එක එක වින්ඩොස් යුසස් ලා ගෙ රික්වයාමන්ට් වෙනස්. කරන වෑඩ වෙනස්..මේ නිසා තමයි මේ විදිහට ටාගට් group වලට එක එක වර්සන් අවෙ. වින්ඩොස් vista වලයි වින්ඩොස් සෙවන් වලයි,අලුතෙන් අල්ටිමේට් වෙර්සන් කියල එකක් එනව. මේ අල්ටිමේට් වෙර්සන් එක දැනට මාර්කට් එකේ වෑඩිම අලවියක් තියන එඩිසන් එක. මේකෙ ගොඩක්ම ටාගට් එක වෙන්නෙ එස්පට් යුසස් ලා. මෙක ගොඩක්ම ප්‍රොපිසනල් එහෙම නෙත්නම් බිස්නස් එඩිසන් එකට සමානයි.එත් බිස්නස් එඩිසන් එකේ නෑති සමහර ස්පෙසල් පීචර්ස් ටිකක් මෙක තියනවා. 


මේකෙ එක පීචර් එකක් තියනවා බිට් ලොකර් කියල. එකෙදි වෙන්නෙ මුලු ඩ්‍රිවර් එකම එන්ක්‍රිප්ට් කරන්න පුලුවන්. මේක අත්තටම ඉතාම වටිනා පීචර් එකක්.අන් ඔතර්ස් ඈස්සස් වලින් බේරෙන්න තියන මෑක්සා පීචර් එකක්. පෙන් ඩ්‍රෑවර්ස් පවා මෙකන් එන්ක්‍රිප්ට් කරන්න පුලුවන්.

අනිත් සුපිරි පීචර් එක තමයි ඩ්‍රෑයිවර් එක වර්චුවල් එකක් ආකාරයට බෑක්ප් කරන්න පුලුවන්. .vhd කියල තමයි මේක සේව් වෙන්නෙ.තමන්ට මේක නිසා අපිට පුලුවන් අපේ කරන්ට් සෙටින් වලින් ම වෙර්චුවල් මෑසින් එකක් අප් කරන්න පුලුවන්. අපිට ඔන ටෙස්ට් එකක් එකෙ කරන්න පුලුවන් එතකොට.මේ හාඩ් එක යුස් කරල මෑසින් එක බූට් කරන්න පුලුවන්ඩ නම් කියන්නෙ බෑ.

ලෑන්වේග් පෑක් කියන්නෙ තවත් පීචර් එකක්. ප්‍රොපිසනල් එකේත් මෙක තියනවා. ඉට අමතරව තවත් ලන්වේජ් තිහක් විතර මේකෙ තියනවා, මුලු OS එකම කම්පීට්ලි ලන්වේජ් චෙන්ජ් වෙන්නවා.

ඊට අමතරව වින්ඩොස් 2008 සෙර්වර් එඩිසන් එකත් එක්ක වින්ඩොස් 7 සිකුවර් කන්නෙක්සන් එකක් එස්ටබ්ලිස් වෙනවා. මේක වර්චුවල් ප්‍රයිවට් නෙට්වර්ක් එකක්ට වඩා සිකුවර් කියලා මයික්‍රොසොප්ට් එකෙන් කියල තිබුන කියල මම අහල තියනවා.මම කොහොමද කියල නම් දන් නෙ..



Friday, June 12, 2009

Windows 7 UAC flaw: "Pandora's box of all vulnerabilities"

The UAC flaw, a serious issue bubbling away underneath the surface of Microsoft’s next operating system, has been described as the “Pandora’s box of security vulnerabilities”. But what is it exactly? Where did it all start from, what is the vulnerability and where do we go from here? Hopefully this will explain it a bit better.

The background

UAC, or User Account Controls, made its first appearance in Windows Vista as a precautionary measure to ensure the user doesn’t modify something which would change a setting which would effect the overall stability or usage of the computer. It also served as a preventative control to make sure programs and applications wouldn’t run without your express permission, or an application changing your settings without you being fully aware of it. This came in the form of an annoying popup box, I’m sure you won’t have any problem in remembering:



Standard users would be able to modify “user settings“, such as the wallpaper, screensavers, how things look on screen and suchlike. If standard users wanted to modify “global settings“, settings which affected the experience of other users such as screen resolution or installing applications, they would be prompted to do so by UAC. To enable standard users to modify global settings, they would need to be “elevated” to temporary administrator status to do this. Afterwards, the user would revert back to standard user status.

Turning UAC off in Vista had a bit of a trick behind it. It wasn’t a case of simply ticking a box, rather having to go through a hidden Windows utility and launching a command process; it wasn’t deemed necessary for an ordinary end-user to disable it.

However, through much complaining, hissy fits and multiple workarounds being circumvented across the web, Microsoft buckled and tamed down UAC in an effort to be less intrusive, less annoying but more secure.

Instead of taming the system, they’ve blown its bloody head off.

The vulnerability

In Windows 7, the settings have changed for UAC, allowing the system to be more malleable and flexible for users. Certain applications which are digitally signed are fast-tracked through UAC by default to reduce the unnecessary user interaction. The vulnerability shows itself when this third-party application calls on malicious code “by proxy” through an existing Windows application, which never invokes the UAC prompt.

To put it simply, through application piggybacking, it allows malware to be automatically elevated to administrator user status which in turn allows it full, unrestricted access to the computer and global settings.

Long Zheng, Windows enthusiast, evangelist, student and campaigner of this flaw, spoke to me earlier today. He has written many times on this, along with his friend and colleague Rafael Rivera, who created a proof-of-concept behind this flaw. This video, available on Zheng’s website, details how the proof-of-concept works in a Windows 7 environment.

කැස්පා කීස් දන් සෑල

කැස්පා කීස් තියනවා. බාන අය බා ගන්න....
http://www.sendspace.com/file/p992qm


Thursday, June 11, 2009

වින්ඩෝස් 7 RC එක දැම්ම

මමත් ඔන්න වින්ඩෝස් 7 RC එක දැම්ම.කියල වෑඩක් නෑ...සුපිරි...බිල් ගෙ හොඳම OS එක මේක වෙන්න ඇති...මෙමරි කන්නෙත් නෑ, ප්‍රොසසරේ කන්නෙත් නෑ.මේක release candidate (අත්හදා බැලීමෙ සංස්කරණයක්) විදිහට තමයි නිකුත් වුනේ... අවුරුද්දක් යනකම් key ඵක පාවිච්චි කරන්න පුලුවන්...මෙන්න බා ගන්න..... http://www.microsoft.com/windows/windows-7/default.aspx

මේක ULTIMATE Edition එකක්...vista වල ඉදල update කරනව නම් VISTA SP1 තියෙන්න ඔන. අනික මේක Windows 7 version එකේ ඉදල update කරන්නත් බෑ...ඇලුතෙන් ම ඉන්ස්ටොල් කරන එක තමා හොම වෑඩේ...

Tuesday, June 9, 2009

Sri Lanka Telecom successfully deploys IPv6 in ISP Network

Why using Ipv6?

IPv4 has only about 4.3 billion addresses available—in theory, and we know that we don’t even get to use all of those. There really are only about 250 million addresses that can be assigned to devices.

There are a lot of reports that give us all kinds of numbers, but all you really need to think about to convince yourself that I’m not just being an alarmist is the fact that there are about 6.5 billion people in the world today, and it’s estimated that just over 10 percent of that population is connected to the Internet, which means will run out of them, and it’s going to happen within a few years.

That statistic is basically screaming at us the ugly truth that based on IPv4’s capacity, every person can’t even have a computer—let alone all the other devices we use with them. I have more than one computer, and it’s pretty likely you do too. And I’m not even including in the mix phones, laptops, game consoles, fax machines, routers, switches, and a mother lode of other devices we use every day! So I think I’ve made it pretty clear that we’ve got to do something before we run out of addresses and lose the ability to connect with each other as we know it. And that “something” just happens to be implementing IPv6.

The problem of IPv4 address exhaustion was recognized in the early 1990s, when various experts made projections showing that if the increasing rate of the allotment of IPv4 addresses continued, the entire address space could be depleted in just a few short years. A newversion of IPknown in the development stage as IP Next Generation or IPng, and which is now IPv6was the proposed solution. But it was

recognized that developing the new standards would take time, and that a short-term solution to IPv4 address depletion also was needed.

That short-term solution was Network Address Translation (NAT), which allows multiple hosts to share one or a few public IP addresses. Behind the NAT device, private IP addresses are used.

NAT has been so successful in slowing IPv4 address depletion, and has become such a standard part of most networks, that to this day many still question the need for a new version of IP. But the widespread use of NAT has changed the open, transparent, peer-to-peer Internet into something much more like a huge collection of client-server networks. Users are seen as being connected around the "edge" of the Internet, and services flow out to them.

Although most of the IPv6 standards were completed years ago, it is only recently that serious interest in migrating from IPv4 to IPv6 has been shown. There are two fundamental drivers behind the growing recognition of the need for IPv6.

The first is widespread vision of new applications using core concepts such as mobile IP, service quality guarantees, end-to-end security, grid computing, and peer-to-peer networking. NAT stifles innovation in these areas, and the only way to get NAT out of the way is to make public IP addresses abundant and readily available.

The second fundamental driver for IPv6 is the rapid modernization of heavily populated countries such as India and China. A compelling statistic is that the number of remaining unallocated IPv4 addresses is almost the same as the population of China: about 1.3 billion.With its aggressive expansion of its Internet infrastructure, China alone in the near future will represent an unsupportable pressure on an

already strained IPv4 address pool. In India, with a population size close to China's, 4- and 5-layer NAT hierarchies exist just to support the present demands for IP addresses.

IPv6 replaces the 32-bit IPv4 address with a 128-bit address, making 340 trillion trillion trillion IP addresses available. That number will meet the demands for public IP addresses, and answer the needs of the two fundamental drivers discussed here, well into the foreseeable future.

Benefits using Ipv6?

IPv6 includes the following enhancements over IPv4:

Expanded address space—IPv6 uses 128-bit addresses instead of the 32-bit addresses in IPv4.

Globally unique IP addresses—The additional address spaces allow each node to have a

unique address and eliminate the need for NAT.

Fixed header length—The IPv6 header length is fixed 40 bytes, allowing vendors to improve

switching efficiency.

Improved option mechanism—IPv6 options are placed in separate optional headers (extension headers )that are located between the IPv6 header and the transport layer header. The option headers are not required.

Address autoconfiguration—This capability provides for dynamic assignment of IPv6

addresses. IPv6 hosts can automatically configure themselves, with or without a Dynamic

Host Configuration Protocol (DHCP) server (Plug & play).

Support for labeling traffic flows—Instead of the type-of-service field in IPv4, IPv6 enables

the labeling of packets belonging to a particular traffic class for which the sender requests

special handling. This support aids specialized traffic, such as real-time video& traffic flow. There are several advantages to differentiating flows, from providing a finer-grained differentiated class-of-service treatment to ensuring, when balancing traffic loads across multiple paths, that packets belonging to the same flow are always forwarded over the same path to prevent possible reordering of packets. As of this writing, however, the complete specification of how to use the flow label field is still being debated, and routers currently ignore the field.

Mobility and security: Mobility and security help ensure compliance with mobile IP and

IPsec standards functionality. Mobility enables people to move around in networks with

mobile network devices—with many having wireless connectivity.

The standard enables mobile devices to move without breaks in established

network connections. Because IPv4 does not automatically provide this kind of mobility,

you must add it with additional configurations. In IPv6, mobility is built in (any cast), which means that any IPv6 node can use it when necessary.

IPsec is mandatory in IPv6. IPsec is enabled on every IPv6 node and is available for use. The

availability of IPsec on all nodes makes the IPv6 Internet more secure. IPsec also requires

keys for each party, which implies a global key deployment and distribution.

Maximum transmission unit (MTU) path discovery—IPv6 eliminates the need to

fragment packets by implementing MTU path discovery before sending packets to a

destination, routers doesn’t need to do fragmentation any more.

Site multihoming—IPv6 allows multihoming of hosts and networks to have multiple IPv6

prefixes, which facilitates connection to multiple ISPs.

Monday, June 8, 2009

Windows 7

වින්ඩෝස් 7 ඔක්තෝබර් මාසෙ 22 Release කරනව

Is Microsoft Sabotaging Firefox With Sneaky .NET Updates?

Sabotage may be a strong choice of word, but it immediately came to mind with the news of Microsoft’s latest .NET update.

The Microsoft .NET Framework 3.5 Service Pack 1, unleashed in February, forces an undisclosed Firefox extension on Windows users, called “Microsoft .NET Framework Assistant 10″, and it does so without asking the users permission.

To add insult to injury, the extension not only injects a serious security vulnerability into Firefox (also present in Internet Explorer), but it disables the uninstall button, meaning the only way to get rid of it, is to edit the Windows registry - a course of action not recommended for your usual non-tech-savvy user, as dabbling in the dark arts of registry editing can open you up to a slew of problems, and potentially kill Windows altogether.

A report by annoyances.org ominously states..

“This update adds to Firefox one of the most dangerous vulnerabilities present in all versions of Internet Explorer: the ability for websites to easily and quietly install software on your PC. Since this design flaw is one of the reasons you may’ve originally choosen to abandon IE in favor of a safer browser like Firefox, you may wish to remove this extension with all due haste.”

The official purpose of the add-on is to add ‘One-Click’ support and the ability to report installed .NET framework versions to the web server, but it also allows websites to install software on a users PC without their knowledge. This is a very serious security flaw that effectively turns Firefox into an open gateway for malware, much like Microsoft’s own web browser, Internet Explorer.

At best, one could call this stealth install a serious conflict of interest between competing browsers - at worst, it’s out-and-out sabotage, not only of a user’s PC, but of Firefox itself, which has gained a reputation for stability and security, much to the chagrin of Microsoft.

In forcing this add-on down the throats of faithful Firefox users, Microsoft have circumvented the more honest approach to installing Firefox extensions, via the offical Mozilla Add-ons page, betraying the trust of its users in the process.

Microsoft Internet Explorer currently enjoys a market share of 66% due only to it’s forced integration with the Windows operating system, but Firefox is rapidly gaining ground, currently at an estimated 22% and climbing. Being a competitor in the browser market, Microsoft have absolutely no business injecting stealth add-ons into Firefox, let alone blocking them from the uninstall process.

If you’ve been affected by this malicious update, you can follow the removal instructions provided by annoyances.org.


Friday, June 5, 2009

Dangerous Microsoft DirectX vulnerability under attack

Microsoft today warned that hackers are using rigged QuickTime media files to exploit an unpatched vulnerability in DirectShow, the APIs used by Windows programs for multimedia support.

The company has activated its security response process to deal with the zero-day attacks has issued a pre-patch advisory with workarounds and a one-click “fix it” feature to enable the mitigations.


From the advisory:

Microsoft is aware of limited, active attacks that use this exploit code. While our investigation is ongoing, our investigation so far has shown that Windows 2000 Service Pack 4, Windows XP, and Windows Server 2003 are vulnerable; all versions of Windows Vista and Windows Server 2008 are not vulnerable.

More: 
http://www.microsoft.com/technet/security/advisory/971778.mspx

Solution :

http://support.microsoft.com/kb/971778

Download :

http://go.microsoft.com/?linkid=9668322

Thursday, June 4, 2009

විස'ටා service pack 2  අවිල'ලා...........



windows 7එන අවුැද'ෙ' අගදි එලියට දානව......Release Candidate එකක' විදිහට තමයි  එලියට එන'න.....සූපිරියටම තියනව...... 



Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Powerade Coupons