Today morning while I was reading on the net, I read one article about 98-year-old Hal Lasko, “The Pixel Painter”, better known as Grandpa. An absolutely beautiful and inspirational story, involving a Microsoft product. This just proves that it’s not the software or hardware that makes a good artwork. It’s the artist and how he/she uses it. I believe below given sentence is hundred percent apt for him. A great artist can make beauty out of any medium, no matter how limited. For full details log on to
Posted by lakkireddymadhu | with no comments

Hi, I was looking for a solution to publish the schema and data into a single script. Found the solution at

Also saw some good content related to Ghost records in SQL Server, Transparent Data Encryption, etc.. nice SQL stuff..





Posted by sonu | with no comments

From the first windows to windows 7 and a sneak peek in the future.. :)

Part 1

Part 2

Part 3

Part 4

Posted by sudeep | with no comments

As far as I know, Microsoft is providing an awesome Web Development IDE for FREE for the first time...

Microsoft Web Matrix is an IDE for Web Developers that allows you to create, edit and publish websites from a single Tool. WebMatrix allows you to create web sites from the scratch or if you want to use popular Open source Blog software like Wordpress, you can customize and use or use some templates that is packaged with the WebMatrix Application.

WebMartix also provides option of installing and Managing open source Database like MySQL. WebMatrix wizard installs the database necessary for you to use if you select any CMS like DOTNET  Nuke or Wordpress, etc and provides admin console for managing the database in the same IDE.

Visit this link to know more about Microsoft WebMatrix

Visit this link to Learn Microsoft WebMatrix. 

The venerable VGA

port is about to die, with the biggest names in the industry including Samsung, Lenovo, LG, Dell, Intel and AMD agreeing to phase it out with-in five years in favour of today’s  HDMI and Display port

The newer standards are better suited to TV and computer display applications respectively, and allow for more flexibility, lower power consumption, higher resolutions, 3D and digital content protection schemes.

The analog VGA standard is nearing 20 years old already.

Video Graphic Array (VGA) refers specifically to the display hardware first introduced with IBM PS/2 line of computers in 1987.


A VGA Connector is the most common port on any computer. It connects any standard monitor to the CPU or you can use this port on your laptop to connect an external monitor or projector. It is also commonly known as RGB Connector

, D Sub 15, mini sub D15 and mini D15 as it consist of a total of 15 pins in three rows.VGA connections are commonly colour-coded with blue plastic and labels.

Digital Visual Interface (DVI) is a video interface standard designed to provide very high visual quality on digital display devices such as flat panel

computer displays
and digital projectors
. DVI connections are usually color-coded with white plastic and labels.


It was developed by an industry consortium, the Digital Display Working Group

(DDWG) to replace the "legacy analog technology" VGA connector
 standard. It is designed for carrying uncompressed digital
video data to a display. It is partially compatible with the High-Definition Multimedia Interface

High-Definition Multimedia Interface (HDMI) is the most advanced digital audio and video connector existent today on the market. A single cable provides not only High Definition video content on your display, but also outstanding sound quality with 8-channels digital audio at 192 kHz

sample rate with 24 bits/sample. It is the best and an affordable solution for connecting your HD-enabled devices such as HD DVD player or Blu-ray player to your High-Definition TV


HDMI cables have 19-pin connectors.

Source: chip, Wikipedia


Thanks And Warm Regards,
SANOOP.CV| Bangalore
Contact: +91 9738823736



Posted by cv.sanoop | with no comments

   Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman","serif";}


Dear All,

                       MUGGING AND SAFETY ON THE ROADS                                 

Of late, we have been getting the reports of renewal of incidents of Bangaloreans travelling in cars getting mugged by a motorcycle based gang in areas around Outer Ring Road. The targeted areas are
a)     Iblur Circle – Sarjapur road,
b)    Bellandur Circle – Yamalur road on Bellandur Tank bed
c)     Sarjapur road – Hosur road via Jail road
d)    Sarjapur road – Hosur road via Haralur
e)     Marathahalli and surroundings
The Modus Operandi
a)     The gang generally has a black motorcycle with a driver and a pillion. Usually they the target the car with single person inside.
b)    They continuously honk from behind or forcibly tap on the window to stop the car saying that you have hit their bike.
c)     As soon as you stop the car and open the door, they will enter and sit inside and tell you that you have hit their bike/injured a person in the accident and have to pay compensation.
d)    They will snatch your mobile not allowing you to call police.
e)     They will ask you to give them the money. If you don’t have, they force you to draw from nearby ATM.  
f)     The members of the gang speak loudly in Kannada and are known to take only money or gold.
Guidelines to Employees
a)     Always roll up windows and lock the doors of your car from inside when driving alone. We have seen many of us don’t do it making it easy for anyone to just open and enter the car.
b)    Don’t panic when you hear continuous honking from behind.
c)     If you have to stop the car, call police or ORRCA (Outer Ring Road Companies Association) Helpline immediately and try and make sure that you stop in a place which is not isolated.
d)    Don’t get down from the car and allow any stranger to get in.
e)     In the event of them getting into your car, get out immediately as you will be in public place. Raise your voice and get the people around.
f)     Don’t lose your temper. Be cool and handle the situation.
g)    If possible, take their photograph and vehicle number plate in your cell phone.
h)     If pushed into a situation, tell them that you can arrange money from your friend and take them to place, where people known to you are available.
i)      Keep the “Pepper spray” ready as a defence and use it properly and carefully only if they try to threaten you or attack you. Pepper spray is available in outlets of More and Health & Glow.
j)      Do not get panicky and give away all your valuables at the first instance.
k)     Remember that their operation is a planned one and even they are equally scared but pretend to be courageous.  
l)      If the situation aggravates, don’t risk your life. There is no need to be a hero! Your safety is important.
The Police have intensified patrolling in these areas and have provided the following numbers to be called if there is any incident. We have checked and confirmed these numbers.
            Cheetah Mobile Patrol 1 -  9902660986
            Cheetah Mobile Patrol 2 -  9980834703
            HAL Police station  -    9480801616 /080-22942542

Please save these numbers in your cell phone and call them if you need help.


Thanks And Warm Regards,Yes
SANOOP.CV| Bangalore
Contact: +91 9738823736



Posted by cv.sanoop | with no comments

1] Browse C:\WINDOWS\system32\drivers\etc

2] Find the file named "HOSTS"

3] Open it in notepad

4] Under " localhost" Add , and that site will no longer be accessable.

5] Done!



Yes   localhost


--> is now unaccessable



Thanks And Warm Regards,
SANOOP.CV| Bangalore
Contact: +91 9738823736



Posted by cv.sanoop | with no comments


Back up system state

Ntbackup.exe provides simple and advanced options for backing up Active Directory components. When you back up system state, you can choose to include or exclude system-protected boot files. System-protected boot files are not used for installations from restored backup media. When the backup file that you create is to be used for additional domain controller installations, you can clear the advanced option to back up system-protected files. Clearing this option decreases the size of the .bkf file, as well as the time required to back up, restore, and copy the system state files.

Use these procedures to back up the system state only. These procedures do not back up the system disk or any other data on the domain controller except for the system-protected files.

Use the first procedure, "To back up system state including system-protected files," for routine system state backup. Use the second procedure, "To back up system state excluding system-protected files," if you want to create a smaller backup that is effective for installing domain controllers from restored backup media.


To back up system state, you must log on locally to the domain controller, or Remote Desktop must be enabled on the remote domain controller so that you can connect remotely.

Administrative credentials

  • To perform the following two procedures, you must be a member of the Domain Admins group or a member of the Backup Operators group.

To back up system state including system-protected files

  1. To start the Windows Server 2003 backup utility, click Start, click Run, type ntbackup, and then click ok

 This procedure provides steps for backing up in Wizard Mode. By default, the Always Start in Wizard Mode check box is selected in the Backup or Restore Wizard. If the Welcome to the Backup Utility Advanced Mode page appears, click Wizard Mode to open the Backup or Restore Wizard.

  1. On the Welcome to the Backup or Restore Wizard page, click Next.
  2. Select Back up files and settings, and then click Next.
  3. Select Let me choose what to back up, and then click Next.
  4. In the Items to Back Up window, double-click My Computer.
  5. In the expanded list below My Computer, check System State, and then click Next.
  6. Select a location to store the backup:
    • If you are backing up to a file, type the path and file name for the backup (.bkf) file (or click Browse to find a folder or file).
    • If you are backing up to a tape unit, choose the tape that you want to use.


You should not store the backup on the local hard drive. Instead, store it in a location, such as a tape drive, away from the computer that you are backing up.

  1. Type a name for this backup according to the recommendations in Backing Up Active Directory Components, and then click Next.
  2. On the last page of the wizard, click Advanced.
  3. Do not change the default options for Type of Backup. Normal should be selected, and the check box for Backup migrated remote storage data should remain cleared. Click Next.  
  4. Select Verify data after backup, and then click Next.
  5. In the Backup Options dialog box, select a backup option, and then click Next.
  6. If you are replacing the existing backups, select the option to allow only the owner and administrator access to the backup data and to any backups that are appended to this medium, and then click Next.
  7. In the When to back up box, select the appropriate option for your needs, and then click Next.
  8. If you are satisfied with all of the options that are selected, click Finish to perform the backup operation according to your selected schedule.


The system state can also be backed up by using Ntbackup from a command line with appropriate parameters. For more information, at a command prompt type ntbackup /?.

The following procedure produces a smaller .bkf file that does not include system boot files. By using this procedure, you can reduce the time that is required to perform the backup and subsequent restore, as well as the amount of disk space that is required. This method is recommended when the restored backup is to be used for installing additional domain controllers.

To back up system state excluding system-protected files

  1. To start the Windows Server 2003 backup utility, click Start, click Run, type ntbackup, and then click OK.
  2. On the Welcome to the Backup or Restore Wizard page, click Advanced Mode, and then click the Backup tab.
  3. In the console tree, select the System State check box.
  4. In Backup media or file name, type a name for this backup according to the recommendations in Backing Up Active Directory Components.
  5. Click Start Backup, and then click Advanced.
  6. Clear the Automatically back up System Protected Files with the System State check box, and then click OK.
  7. Click Start Backup.
Posted by cv.sanoop | 1 comment(s)


Fatal error: The system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."


You have just been struck by the Blue Screen of Death. Anyone who uses Microsoft Windows OS will be familiar with this. What can you do? More importantly, how can you prevent it happening?








1. Hardware conflict :

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager (see Image 2). Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.





Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is

If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.




2. Bad RAM :

RAM (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by RAM might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) RAM with 60ns RAM will usually force the computer to run all the RAM at the slower speed. This will often crash the machine if the RAM is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the RAM. This can make it more stable. Another way to troubleshoot a suspected RAM problem is to rearrange the RAM chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling RAM try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to RAM. Modern RAM chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programs.

3.  BIOS settings :

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

Microsoft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4. Hard disk drives :

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter.

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

5 .Fatal OE exceptions and VXD errors :

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 .Viruses :

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated daily from the website of your antivirus software .

7 . Printers :

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer.

Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8. Software :

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use CCleaner

clean up the System Registry and remove obsolete entries.

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F8. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

9 . Overheating :

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU

10. Power supply problems :

A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS

). This will give you a clean power supply when there is surge, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.


Thanks And Warm Regards,Yes
SANOOP.CV | Bangalore
Contact: +91 9738823736

Posted by cv.sanoop | 4 comment(s)
Filed under: , ,



1. Open windows explorer on the computer where you run Symantec Endpoint protection manager.

2. Change directory to the :\Program Files\Symantec\Symantec Endpoint Protection Manager\Tools folder.

3. Double click the Resetpass.bat executable file.The password is reset to the default password.

4. Be sure to change the password immediately.



Default Credentials:

User name: admin

Password: admin



Note: If you change the admin account name to something other than admin and then subsequently run resetpass.bat, it changes the account name back to admin.

Source:Madhu Sir Blog


Thanks And Warm Regards,
SANOOP.CV| Bangalore
Contact: +91 9738823736




Posted by cv.sanoop | with no comments
Filed under: ,

presently everyone is behind making the virtual world more realistic...

and as we see, we have now movies coming in 3D to give that 'real' effect in the movies..

but still to get the stereoscopic experience it is always a pain to wear those glasses for hours...

so, Microsoft's Applied Sciences group have come up with a lens which makes it possible to view a 3D image without the use of the glasses.

The new lens, which is thinner at the bottom than at the top, steers light to a viewer's eyes by switching light-emitting diodes along its bottom edge on and off. Combined with a backlight, this makes it possible to show different images to different viewers, or to create a stereoscopic (3-D) effect by presenting different images to a person's left and right eye.

Read more

Posted by sudeep | 2 comment(s)

Companies such as Lifenaut are taking the initial steps toward the creation of a digital avatar into which one's knowledge and personality can be uploaded, and that survives its human template's death. There are various projects underway to make representations of the human face that are lifelike as well as empathetic in order to aid interaction with digital avatars. Another challenge is imbuing the avatar with human-like conversational abilities, and Lifenaut is customizing chatbot software for individuals. The Lifenaut avatar converses using capabilities derived from the Jabberwacky chatbot, which seeks common patterns in conversations and uses this to guarantee that its dialogue makes the most possible sense in the context of what has just been said to it. Uploading a personality into the Lifenaut avatar is arduous, starting with the rating of nearly 500 statements according to how accurately they reflect the individual's feelings, followed by the construction of "memories" for the avatar by uploading diary entries, photos, videos, and other material. The subject also must spend hours in conversation with other avatars, to be mined by his or her avatar as a source of knowledge and mannerisms.
Read more

Posted by sudeep | with no comments

Firstly, I would Like to express my Heart felt thanks to Mr. Vinod Kumar, Technology Evangelist, Microsoft for sharing his knowledge about using shortcuts to some of the things like drawing tables etc in a Developers Meet - Acad Dev Con'09 that took place in PESIT during the year 2009.


+-----+----------------+------------+ and then press enter (this will create a table with one row and 3 column as displayed below)


Increase Row ???

(Press Tab keeping the cursor at the last column)

Draw Lines:



(3 Underscore to draw a bold line)

(3 minus to draw a single line)


(3 equals symbol to draw a double line)

Adding Symbols:

© - open (followed by C and then followed by)

® - open (followed by R and then followed by)

TM - open (followed by TM and then followed by)

Working with Font Size:

Ctrl key + { - Increase font Size by 1

Ctrl key + } - decrease font Size by 1

Applying Styles :

Heading 1 - ctrl key + alt key + 1

Heading 2 - ctrl key + alt key + 2

Heading 3 - ctrl key + alt key + 3

Posted by irajesh | with no comments

What is Iron Python?

 Iron Python is Microsoft's implementation of the Python Language using the .NET Technology. Its a powerful and easy to learn.

Basics of Iron Python:

This is the welcome screen when you load the IPY Console


 Iron Python interprets the codes line by line and hence it'll take couple of min between execution of each statements.


Lets see how IPY displays a text :


The Syntax is print text_here. For example, here i'm displaying Hello. The syntax for it is print "Hello". 

 Lets see how IPY does swapping of 2 number:


In IPY, there are no concepts of arrays etc. All you have is something called Lists. This List can contain anything ie: numbers, characters, strings, etc TOGETHER :) :)

Syntax for declaring a list is:


In the above program, i've declared 2 variables and b with the following contents:



Now, the big job of swapping :(  .. 

We break our head in figuring how should we use the function for swapping - either by passing values or by passing address. Well, all I can say is IPY makes life easy :) :) 

All u need to do is :


and your swapping is done :) :)

now when you give print a and print b u'll find that swapping is complete :) :)


There are a lot of things that you can do using IPY. I'll shortly upload more examples in IPY.

You can visit This Link for downloading the IPY setup file. Keep checking the link for downloading the IPY extension for VS 2010 :) :)

Posted by irajesh | 1 comment(s)

What is MVP Award?

The Microsoft MVP Award recognizes exceptional technical community leaders who foster the free and objective exchange of knowledge by actively sharing their real world expertise with users and Microsoft. MVPs are exceptional technical community leaders from around the world who are awarded for voluntarily sharing their high quality, real world expertise in offline and online technical communities. Microsoft MVPs form a highly select group of experts, representing the technical community?s best and brightest. They share a deep commitment to community and a willingness to help others.

How to apply?

The nomination Program runs all over the year(once in every three months). Make yourself active in Community activities, Tech Blogs, Take sessions, help the community, etc. Fill in the Nomination form that is available in the Microsoft MVP Official Site and send it to


For more details regarding MVP Award Visit:

Microsoft MVP Official Site - Click Here

msigeek Blog Post - Click Here


Good Luck for becoming MVP :) :)

Posted by irajesh | 3 comment(s)
Filed under: , , , , ,
More Posts Next page »