/* A business continuity,disaster recovery,disk storage,disk recovery consultant!So boring?: September 2006*/ A business continuity,disaster recovery,disk storage,disk recovery consultant!So boring?: September 2006

Tuesday, September 26, 2006

Easy hack to speed up your Windows XP PC!

An easy way to speed up your Windows XP PC is to load your Windows kernel into your PC's RAM.

  • The registry key to be modified to speed up your Windows XP PC is HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\DisablePagingExecutive

  • To speed up your Windows XP PC, set HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\DisablePagingExecutive to 1. This will disable the normal Windows XP paging logic that slows down your PC

  • Who should use this technique to speed up your Windows XP PC : This Windows XP registry change should only be used for systems with 256MB or more of memory. Typically, this Windows XP hack to speed up your PC is only advised for systems with 512 MB of memory

Monday, September 25, 2006

Improve Windows XP boot time drastically!

Windows XP boot times can be improved drastically. You just need to tweak a Windows XP registry parameter.

Windows XP has a major drawback in taking a significant amount of time to boot. One option to speed up the boot time is to tweak the prefetching options in the Windows registry.

What is prefetching in Windows XP : Prefetching is caching of system boot files for faster loading. But Hey,the quantum of caching has a significant impact fon system boot time. By selecting the appropriate components for prefetching in Windows XP, the system boot time can be significantly improved

The Windows XP registry key to modify for enabling prefetching :- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Memory Management\Prefetch Parameters\EnablePrefetcher

The options you can modify for this Windows XP registry key

  1. Disable prefetching
  2. Prefetch Application launch files
  3. To Prefetch boot files
  4. Prefetch as many files as possible.

Sunday, September 17, 2006

What is pretexting? And why pretexting could lead to identity theft

  • What is pretexting? Pretexting implies pretending to be someone else in order to access the private records of customers
  • Why is pretexting dangerous? Pretexting is the prelude to identity theft that is nowadays practised not only by individuals but also organized crime
  • What is the HP-Verizon pretexting controversy? HP hired investigators used pretexting by pretending to be telecom personnel and managed to get hold of the phone records of Verizon customers.The HP investigators used pretexting to attempt to solve the news leaks from the HP boardroom. As attorneys battle out this pretexting drama,the US Government and Congress have hopefully woken to the pretexting menace.
As you can see,pretexting is scary and Governments need to enact laws to punish pretexting and identity thefts and protect the rights of customers

Tuesday, September 12, 2006

'I know all about antivirus software!': The infamous Sony rootkit revisited

'I know all about antivirus software!': The infamous Sony rootkit revisited
Good article on rootkit detection. I particularly like the reviews of rootkit detection software.

Another valid question about rootkit: Why isnt the IT industry rising up in protect against rootkits - Why arent rootkits being eliminated while popups are treated like the anti-Christ.

The rootkits protection answer isnt far away - the so called protectors and industry leaders of the IT industry are themselves indulging in spreading their own rootkits. Nothing works like rootkits in intruding people privacy

Friday, September 01, 2006

Thick and thin virtualization

Interesting virtualization categories

Data storage thin virtualization can be defined as virtualization technologies that focuses on non core capabilities in data migration or global name spaces

Thick virtualization is defined as virtualization that focuses on core virtualization technologies such as data storage data replication, data cloning and snapshots.