Today I received another one of those special mails! Chain mails, I mean. This was about how instant noodles cause cancer in you. It told me in no uncertain terms, to stop eating instant noodles. It told me that Instant noodles contain wax that is not easily expelled from your body. It is also carcinogenic and so on. It claimed that many people had died after eating instant noodles, (not instantly, I think).
I did some preliminary search and found that this particular email has been doing rounds since 2002. Imagine, a simple mail going around and around for 5 years now.
These kinds of letters come in all flavours; religious, business, medical, political, philanthropical and what not!
Irritating though they are, one still wonders how gullible and naive our readers can be that believe them. Probably, the concern that they have for others is taken advantage of. And, in any case, I do not lose anything when I forward just this one mail. Or does it affect somewhere?
One should ask oneself. How many people are using email everyday all over the world? And, if one mail is forwarded by everyone every week, just how much of bandwidth is consumed? How much of your friend's time is wasted in reading that particular mail, which he/she could use spending with the family. We could probably use that bandwidth better. And certainly not be a part of spreading misinformation and spam.
So, beware. Before you forward that next mail, try to do a little research yourself. Or, if you aren't so sure, just ignore it. You are not here to save the world. God (or if you are agnostic, Nature) will take care of it.
For some insight into the various ways that people get baited, I suggest you follow the below :
http://www.breakthechain.org
Happy surfing!
The Game called Cricket!
Cricket! It used to be called the Gentleman's game, in the days of yore. Is it anymore?
If you are a gentleman, you would give back the excess change you got at the store. If you are a gentleman, you would smile and tolerate short change given to you at the store. May be you will ask once, but if the storekeeper insists, you would walk away.
This is neither a store, nor are we gentlemen. It is a matter of victory in war. All's fair in love and war.
I am referring to the Symonds's incident last night. There used to be a time when cricketers felt ashamed about such a thing happening on the ground. But, times have changed. It is alright to be dishonest; and admit it. In fact, it is hip. "It is my day. I was given not out anyway".
Little does he realise that there are kids out there looking at him. Kids, to whom he is a role model. Kids, who emulate him, and tell themselves, its okay to be dishonest.
Thats bad for cricket, and in general.
Not surprising when this happens to be Australia. This is a team that almost disowned Adam Gilchrist, when he walked without waiting for the umpire's decision (more than once), in 2004. May be the australians have, as a team, agreed to "never walk, unless the umpire tells you".
Could have been different in different times, when there weren't any action replays, slow motions, snickometers et al. Come to think of it, how did the umpire miss the noise? Had it been in India, it could be said that the noise of the crowd drowned the noise of bat grazing the ball.
Flipping the other side of the coin, we see the player thinking, "I could be dropped, if I walked". "Then, I will lose my endorsements, my wife will divorce me". "And, ...".
A lot more seems to be at stake, these days. So what would you do? Walk or Stay?
By the way, does Adam Gilchrist walk these days?
---
Who's honest? An incomplete list. Add your suggested name too, to make it complete.
Gary Sobers
Brian Lara
Sachin Tendulkar
Adam Gilchrist
Sunil Gavaskar
Courtney Walsh
Kapildev
Clive Lloyd
G R Viswanath
Jonty Rhodes
If you are a gentleman, you would give back the excess change you got at the store. If you are a gentleman, you would smile and tolerate short change given to you at the store. May be you will ask once, but if the storekeeper insists, you would walk away.
This is neither a store, nor are we gentlemen. It is a matter of victory in war. All's fair in love and war.
I am referring to the Symonds's incident last night. There used to be a time when cricketers felt ashamed about such a thing happening on the ground. But, times have changed. It is alright to be dishonest; and admit it. In fact, it is hip. "It is my day. I was given not out anyway".
Little does he realise that there are kids out there looking at him. Kids, to whom he is a role model. Kids, who emulate him, and tell themselves, its okay to be dishonest.
Thats bad for cricket, and in general.
Not surprising when this happens to be Australia. This is a team that almost disowned Adam Gilchrist, when he walked without waiting for the umpire's decision (more than once), in 2004. May be the australians have, as a team, agreed to "never walk, unless the umpire tells you".
Could have been different in different times, when there weren't any action replays, slow motions, snickometers et al. Come to think of it, how did the umpire miss the noise? Had it been in India, it could be said that the noise of the crowd drowned the noise of bat grazing the ball.
Flipping the other side of the coin, we see the player thinking, "I could be dropped, if I walked". "Then, I will lose my endorsements, my wife will divorce me". "And, ...".
A lot more seems to be at stake, these days. So what would you do? Walk or Stay?
By the way, does Adam Gilchrist walk these days?
---
Who's honest? An incomplete list. Add your suggested name too, to make it complete.
Gary Sobers
Brian Lara
Sachin Tendulkar
Adam Gilchrist
Sunil Gavaskar
Courtney Walsh
Kapildev
Clive Lloyd
G R Viswanath
Jonty Rhodes
How do I protect my computer from the Interne(t)Devils?
People keep wondering how to keep their computers free from viruses and worms and other Internet (d)evils. I have tried to put in some information for those who would be seeking answers to the questions regarding Internet Defence in this document.
The Internet is no more a safe place. You are vulnerable the moment you are connected to the Internet. As a regular Internet user, you would be advised to follow some basic rules to distance yourselves from the threats that are impossible to avoid completely.
I assume that you are using a Windows machine (such as XP or Windows 2000).
If you are not very familiar in using the computer, ask your computer technician to
1. Install a personal firewall and configure it
2. Install an antivirus utility
3. Install Firefox browser
4. Install Ad-aware
5. Install Spybot S&D
6. Download Process Explorer and Hijackthis
After installation, your computer has to be checked once for viruses and spyware, immediately.
Alternately, you could prefer to do it yourself. Follow the instructions below.
1. Install a personal firewall
There are free software firewalls (hardware firewalls are expensive and are not oriented towards individual machines) available such as Comodo (http://www.personalfirewall.comodo.com) which are quite good. Others like Zone Alarm, Kerio are also offer adequate protection. Some of them might expect you to make a payment before you could use them.
2. Install antivirus
You need an anti-virus tool that would keep you informed in case your computer is infected by a virus, trojan or similar malicious application. AVG is one that is available free of cost for personal use. You can download it from http://free.grisoft.com. AVG has a small footprint (which means it doesn't consume too much memory and is not a load on your computer) and protects you from most viruses.
3. Install Firefox browser
There is a general perception that the Internet Explorer is less safer on the Internet. If you are using the Internet Explorer, I recommend that you download and install the latest version of Firefox browser ( available from http://www.mozilla.com/firefox/ )
According to wikipedia, Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent. More information on spyware may be found in http://en.wikipedia.org/wiki/Spyware
There are certain things that you should avoid when you are online. Those are visiting crack sites, sites that contain pornographic content, sites that offer you free software, hacking sites etc., It doesn't mean that all such sites are malicious, but for the unaware and uninitiated, it means treading dangerous waters.
To protect you from Spyware, you should install tools that check your computer frequently for other malicious content (such as spyware) that could reside in your computer. These get installed/saved on your computer as a result of using the browser and visiting sites.
4. Install Ad-aware
Download and install, Ad-aware from the following link ( http://www.lavasoftusa.com/products/ad_aware_free.php )
5. Install Spybot S&D
Download and install "Spybot - Search & Destroy" from the following link
http://www.safer-networking.org/en/index.html
When all the above have been done, you can breathe a little easily now that you have done the first part of the job.
The other and most important part, is to be reviewing your security frequently, say every two days. Run your virus scanner, Ad-aware and Spybot S&D, every alternate day or once in three days, or atleast once in a week.
Note down any incidents. There may be a situation where your virus scanner may not be able to clear the virus.
In that case, you may search the WWW for methods to clean it.
The mantra is to update your virus scanner and other tools with the latest updates and frequently check your machine for any suspicious activity.
Run the tools Ad-aware and Spybot S&D frequently, or immediately after you close your browser.
6. Download Process Explorer and Hijackthis
Process explorer tells you the processes that are currently executing on your windows operating system presently. This is preferred over your windows task manager, since malicious software may be hidden from the windows task manager's view.
Download procexp.exe from sysinternals.com (incidentally, the company now has been bought over by Microsoft) http://download.sysinternals.com/Files/ProcessExplorer.zip
Hijackthis is an application that shows the windows registry keys that contain actions that will be executed during the time the operating system is booting (the steps involved before you get your windows desktop). You can go through them and look for suspicious looking files [some of them may contain the extension .exe]
Download hijackthis.exe from http://216.180.233.162/~merijn/programs.php#hijackthis or http://www.spywareinfo.com/~merijn/programs.php#hijackthis
Now that you are more knowledgeable, I hope that you would try these tools that would arm you to protect your computer from hostile invasions.
PS: One other thing that you could do, is to ask the Internet fellow to install a router (assuming yours is a DSL like connection) and configure the IP to the router and not to the machine, which means your computer is not directly connected to Net and is protected from Direct Attack.
The Internet is no more a safe place. You are vulnerable the moment you are connected to the Internet. As a regular Internet user, you would be advised to follow some basic rules to distance yourselves from the threats that are impossible to avoid completely.
I assume that you are using a Windows machine (such as XP or Windows 2000).
If you are not very familiar in using the computer, ask your computer technician to
1. Install a personal firewall and configure it
2. Install an antivirus utility
3. Install Firefox browser
4. Install Ad-aware
5. Install Spybot S&D
6. Download Process Explorer and Hijackthis
After installation, your computer has to be checked once for viruses and spyware, immediately.
Alternately, you could prefer to do it yourself. Follow the instructions below.
1. Install a personal firewall
There are free software firewalls (hardware firewalls are expensive and are not oriented towards individual machines) available such as Comodo (http://www.personalfirewall.comodo.com) which are quite good. Others like Zone Alarm, Kerio are also offer adequate protection. Some of them might expect you to make a payment before you could use them.
2. Install antivirus
You need an anti-virus tool that would keep you informed in case your computer is infected by a virus, trojan or similar malicious application. AVG is one that is available free of cost for personal use. You can download it from http://free.grisoft.com. AVG has a small footprint (which means it doesn't consume too much memory and is not a load on your computer) and protects you from most viruses.
3. Install Firefox browser
There is a general perception that the Internet Explorer is less safer on the Internet. If you are using the Internet Explorer, I recommend that you download and install the latest version of Firefox browser ( available from http://www.mozilla.com/firefox/ )
According to wikipedia, Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent. More information on spyware may be found in http://en.wikipedia.org/wiki/Spyware
There are certain things that you should avoid when you are online. Those are visiting crack sites, sites that contain pornographic content, sites that offer you free software, hacking sites etc., It doesn't mean that all such sites are malicious, but for the unaware and uninitiated, it means treading dangerous waters.
To protect you from Spyware, you should install tools that check your computer frequently for other malicious content (such as spyware) that could reside in your computer. These get installed/saved on your computer as a result of using the browser and visiting sites.
4. Install Ad-aware
Download and install, Ad-aware from the following link ( http://www.lavasoftusa.com/products/ad_aware_free.php )
5. Install Spybot S&D
Download and install "Spybot - Search & Destroy" from the following link
http://www.safer-networking.org/en/index.html
When all the above have been done, you can breathe a little easily now that you have done the first part of the job.
The other and most important part, is to be reviewing your security frequently, say every two days. Run your virus scanner, Ad-aware and Spybot S&D, every alternate day or once in three days, or atleast once in a week.
Note down any incidents. There may be a situation where your virus scanner may not be able to clear the virus.
In that case, you may search the WWW for methods to clean it.
The mantra is to update your virus scanner and other tools with the latest updates and frequently check your machine for any suspicious activity.
Run the tools Ad-aware and Spybot S&D frequently, or immediately after you close your browser.
6. Download Process Explorer and Hijackthis
Process explorer tells you the processes that are currently executing on your windows operating system presently. This is preferred over your windows task manager, since malicious software may be hidden from the windows task manager's view.
Download procexp.exe from sysinternals.com (incidentally, the company now has been bought over by Microsoft) http://download.sysinternals.com/Files/ProcessExplorer.zip
Hijackthis is an application that shows the windows registry keys that contain actions that will be executed during the time the operating system is booting (the steps involved before you get your windows desktop). You can go through them and look for suspicious looking files [some of them may contain the extension .exe]
Download hijackthis.exe from http://216.180.233.162/~merijn/programs.php#hijackthis or http://www.spywareinfo.com/~merijn/programs.php#hijackthis
Now that you are more knowledgeable, I hope that you would try these tools that would arm you to protect your computer from hostile invasions.
PS: One other thing that you could do, is to ask the Internet fellow to install a router (assuming yours is a DSL like connection) and configure the IP to the router and not to the machine, which means your computer is not directly connected to Net and is protected from Direct Attack.
A few things that I heard about Azim Premji (Wipro Chief)
A few things that were said about Azim Premji (hearsay from the mouth of an employee who had seen him up close). I had to record it since I found it interesting and inspirational.
He is not finicky about the mode of travel. He always travels Economy Class. He is also not worried about the brand of car or taxi that he uses to commute. Once when the car that was booked for him did not turn up, he coolly took an auto-rickshaw to his destination.
Compare this with another boss, who waited for 2 hours for a Mercedes to turn up (the time it took to get a replacement when an alternate Toyota or Skoda were available immediately)
Whenever he can, he always stays at the company guest house. He takes food from the company canteen. He says, "What is good for my employees is good for me".
His son was refused stay at the company guest house, since it was only for employees. mmm!
He sees professional and personal lives differently and doesn't mix business with personal.
At one point of time, he had a terror threat on his life. During the entire period, he insisted that co-workers with him travel separately since he did not want them to get hurt in case any incident happened.
Note: For those who do not know, Azim Premji is the chief of Wipro, one of the largest companies in the world.
He is not finicky about the mode of travel. He always travels Economy Class. He is also not worried about the brand of car or taxi that he uses to commute. Once when the car that was booked for him did not turn up, he coolly took an auto-rickshaw to his destination.
Compare this with another boss, who waited for 2 hours for a Mercedes to turn up (the time it took to get a replacement when an alternate Toyota or Skoda were available immediately)
Whenever he can, he always stays at the company guest house. He takes food from the company canteen. He says, "What is good for my employees is good for me".
His son was refused stay at the company guest house, since it was only for employees. mmm!
He sees professional and personal lives differently and doesn't mix business with personal.
At one point of time, he had a terror threat on his life. During the entire period, he insisted that co-workers with him travel separately since he did not want them to get hurt in case any incident happened.
Note: For those who do not know, Azim Premji is the chief of Wipro, one of the largest companies in the world.
How to send email from a form ?
How to send email from a form ?
I had asked this question a few days ago myself. And have been scouting
google for the answer. To be honest, I did get quite a few answers.
But, the problem lay in finding the compatible tool for my installation.
My limitations were:
- I do not own the server
- I cannot install or uninstall any tool on to the server
- The server help was not very familiar with the installation either
- I had to scout the server details (info like the MTA used by the server)
So, was born a script that does not rely on the server configuration, for sending mail.
This script is in php (I tried to use the formmail script, but found that
this is easier) and relies on direct communication with the SMTP server to send mail.
The script uses SMTP AUTHentication for sending mail. This script assumes that you are using the Exim MTA for your email transport.
As you see in the script, though the SMT Protocol (SMTP) is standard, the request and response for different servers are slightly different and the script may have to be modified to suit your server. As mentioned, this
script is for the Exim MTA with SMTP AUTH.
SMTP AUTH means that you can post a message ONLYy after you have identified yourself to the server, meaning that you have to be an authenticated user on your server.
Hopefully, this helps!
Note:
If the php server is not configured correctly, variables defined in the html form may not pass properly into the php document, which is why the "track_vars" is used.
In addition, the phrase $HTTP_POST_VARS["b_first"] creates the appropriate variable in the document that was passed through the form, but was not visible due to some misconfiguration at the server.
Download the "form to email" script below:
form2mail script in a zipped file
I had asked this question a few days ago myself. And have been scouting
google for the answer. To be honest, I did get quite a few answers.
But, the problem lay in finding the compatible tool for my installation.
My limitations were:
- I do not own the server
- I cannot install or uninstall any tool on to the server
- The server help was not very familiar with the installation either
- I had to scout the server details (info like the MTA used by the server)
So, was born a script that does not rely on the server configuration, for sending mail.
This script is in php (I tried to use the formmail script, but found that
this is easier) and relies on direct communication with the SMTP server to send mail.
The script uses SMTP AUTHentication for sending mail. This script assumes that you are using the Exim MTA for your email transport.
As you see in the script, though the SMT Protocol (SMTP) is standard, the request and response for different servers are slightly different and the script may have to be modified to suit your server. As mentioned, this
script is for the Exim MTA with SMTP AUTH.
SMTP AUTH means that you can post a message ONLYy after you have identified yourself to the server, meaning that you have to be an authenticated user on your server.
Hopefully, this helps!
Note:
If the php server is not configured correctly, variables defined in the html form may not pass properly into the php document, which is why the "track_vars" is used.
In addition, the phrase $HTTP_POST_VARS["b_first"] creates the appropriate variable in the document that was passed through the form, but was not visible due to some misconfiguration at the server.
Download the "form to email" script below:
form2mail script in a zipped file
Is there a science beyond science (or) Do you believe in magic?
This is a log of an incident that happened a few weeks ago.
One definition of magic on the Internet:
The practice of using charms, spells, or rituals to attempt to produce supernatural effects or control events in nature.
Magic is part of a larger science, that has not yet been accepted or understood by the scientific community.
We have seen magicians make trains and planes, even the Taj Mahal disappear, on TV live. We have always been interested and fascinated by such activities, if only in the hope to find the trick that cheats the audience.
I met with such an interesting individual in the recent past. I am logging the meeting since something interesting and fascinating happened during that time.
He is an islamic mystic with universal beliefs. A colleague had mentioned about him during a casual conversation and I had evinced an interest to meet with him.
He frequently visits Chennai. And it was during one of his visits that I happened to meet with him. He was staying in a lodge in one of the busy areas of Chennai. We bought some fruits since it is the first time I am visiting him. (In India, it is custom to not go empty handed when you visit someone)
We went on a sunday afternoon. A slightly overcast sky made our drive a bearable one. (Chennai, for the uninitiated, has three seasons; summer, summerer, summerest).
After the introductions were over, we were chatting generally. During the course of the conversation, he asked for my helmet. He took a small flat tin box, which contained black paste that resembled the eyeliner that women use. He took a little of it in his finger and gave the box back to me. He then asked me to put the box inside the helmet.
In the next two minutes something happened that you cannot explain in scientific terms (not atleast in the present scientific scenario).
He started taking new five hundred and thousand rupee notes from inside the helmet. Notes that looked fresh and straight out of the mint. There was a mild fragrance in the room. The notes also smelled sweet. This continued for sometime until the bed he was sitting on contained a small hill made of the rupee notes.
He later explained that these were brought in by the elemental that he had been given by his teacher. These currency notes are probably brought from a real location somewhere around the place (eg., a bank locker). They will disappear (which means they will go back to the place of origin) after 2 and half nazhigai (60 minutes).
Glossary:
Chennai - A southern port city and capital of the state of Tamilnadu, India
Nazhigai - 24 minutes
One definition of magic on the Internet:
The practice of using charms, spells, or rituals to attempt to produce supernatural effects or control events in nature.
Magic is part of a larger science, that has not yet been accepted or understood by the scientific community.
We have seen magicians make trains and planes, even the Taj Mahal disappear, on TV live. We have always been interested and fascinated by such activities, if only in the hope to find the trick that cheats the audience.
I met with such an interesting individual in the recent past. I am logging the meeting since something interesting and fascinating happened during that time.
He is an islamic mystic with universal beliefs. A colleague had mentioned about him during a casual conversation and I had evinced an interest to meet with him.
He frequently visits Chennai. And it was during one of his visits that I happened to meet with him. He was staying in a lodge in one of the busy areas of Chennai. We bought some fruits since it is the first time I am visiting him. (In India, it is custom to not go empty handed when you visit someone)
We went on a sunday afternoon. A slightly overcast sky made our drive a bearable one. (Chennai, for the uninitiated, has three seasons; summer, summerer, summerest).
After the introductions were over, we were chatting generally. During the course of the conversation, he asked for my helmet. He took a small flat tin box, which contained black paste that resembled the eyeliner that women use. He took a little of it in his finger and gave the box back to me. He then asked me to put the box inside the helmet.
In the next two minutes something happened that you cannot explain in scientific terms (not atleast in the present scientific scenario).
He started taking new five hundred and thousand rupee notes from inside the helmet. Notes that looked fresh and straight out of the mint. There was a mild fragrance in the room. The notes also smelled sweet. This continued for sometime until the bed he was sitting on contained a small hill made of the rupee notes.
He later explained that these were brought in by the elemental that he had been given by his teacher. These currency notes are probably brought from a real location somewhere around the place (eg., a bank locker). They will disappear (which means they will go back to the place of origin) after 2 and half nazhigai (60 minutes).
Glossary:
Chennai - A southern port city and capital of the state of Tamilnadu, India
Nazhigai - 24 minutes
Hypocrites all, You, I and the World!
Have you heard about the new role of the Chennai Metropolitan Police? Yes, they have decided to clean up the muck in Chennai's famous Marina Beach. Indeed.
That's a good thing, you say. Why is it hypocrisy? Because, you and I do not go to the beaches of Chennai in the morning or mid afternoon. Those that come there since they have free time. Isn't this the land of the Kamasutra? Why cannot a few lovestruck couples have a good time necking with each other?
Don't the police have anything more important than to do this, is the question. Ask any citizen in this country about the image he has of the Police and you will know. It reminds me of the sequence in the Bible where Jesus speaks to the crowd thus: "Let him who is without sin among you be the first to throw a stone at her."
mmm... Do you see the television channels these days, the song sequences, the movies, the mega mega serials, the comedy shows et al? The people who can get corrupt are watching the television damn it. The television is there through out the day.
The kids are being taught to swear, to abuse, both physically and emotionally, to not respect parents and elders, about revenge, about making money any which way you can...
This morning there was news about a few school kids who kidnapped and killed a kid, inspired by, yes you guessed it, by some television shows.
On the one hand we are worried about lovebirds in the beach sands corrupting the society, and on the other hand, we promote intimate scenes in the television right inside our homes.
PS:
1. If you haven't seen some, you would think they were foreplay scenes from porn movies, the intimate kissing scenes (close-up scenes of the navel, busts and derrieres, kissing on the neck, ears, lips, suggestive movements {which are innocently imitated by the youngsters} and so on).
2. Then you have scenes of grown up men kicking and screaming using swear words, gory scenes where footlong knifes pierce the skin and blood splatters on the face. How realistic, wow!
3. You also have comedy shows where it is cool to swear at your father, mother and all. Yes, cool indeed.
Remember that these are being seen by innocent kids and their emotions waver in the multitude of directions, whose results could be seen in the coming years.
That's a good thing, you say. Why is it hypocrisy? Because, you and I do not go to the beaches of Chennai in the morning or mid afternoon. Those that come there since they have free time. Isn't this the land of the Kamasutra? Why cannot a few lovestruck couples have a good time necking with each other?
Don't the police have anything more important than to do this, is the question. Ask any citizen in this country about the image he has of the Police and you will know. It reminds me of the sequence in the Bible where Jesus speaks to the crowd thus: "Let him who is without sin among you be the first to throw a stone at her."
mmm... Do you see the television channels these days, the song sequences, the movies, the mega mega serials, the comedy shows et al? The people who can get corrupt are watching the television damn it. The television is there through out the day.
The kids are being taught to swear, to abuse, both physically and emotionally, to not respect parents and elders, about revenge, about making money any which way you can...
This morning there was news about a few school kids who kidnapped and killed a kid, inspired by, yes you guessed it, by some television shows.
On the one hand we are worried about lovebirds in the beach sands corrupting the society, and on the other hand, we promote intimate scenes in the television right inside our homes.
PS:
1. If you haven't seen some, you would think they were foreplay scenes from porn movies, the intimate kissing scenes (close-up scenes of the navel, busts and derrieres, kissing on the neck, ears, lips, suggestive movements {which are innocently imitated by the youngsters} and so on).
2. Then you have scenes of grown up men kicking and screaming using swear words, gory scenes where footlong knifes pierce the skin and blood splatters on the face. How realistic, wow!
3. You also have comedy shows where it is cool to swear at your father, mother and all. Yes, cool indeed.
Remember that these are being seen by innocent kids and their emotions waver in the multitude of directions, whose results could be seen in the coming years.
Subscribe to:
Posts (Atom)
Bluetooth on off Switch missing in Windows 10
Sometimes, what happens is that you are unable to switch the Bluetooth in your PC or laptop. Even if you are a professional, it gets you f...
Most Popular
-
Steps to install wkhtmltopdf in Centos 7 Redhat Linux As you may know, wkhtmltopdf is a tool that is used to create a pdf on the fly fro...
-
The East Coast Road! It is advertised as a route with scenic splendour. It can take you from Chennai to Pondicherry in no time. It can al...
-
Error: Connection timed out after 20 seconds of inactivity I just want to share a peculiar sftp connectivity issue that we encount...
-
How do we read signs and omens in everyday life This article is part one about about experimenting with the inherent power of the human ...
-
There is some news for those using the national highway NH 48, especially the Chennai Bengaluru section. There has been an introductio...