Moving To a New Site

I have just decided that it's time to move on and have my own domain. All the posts in this blog will be moved to:

www.pinoygeek.org

Personal posts will be transferred to: raldz.pinoygeek.org

Friday, September 17, 2004

Formatting Nokia 6600 Phone

Format Your Phone - Nokia 6600
by: Zaki

It may happen that a program corrupts the C: drive of your phone. In such case, some data can be lost of course but, more annoying, some applications may not work or work only partially,...

On a Series 60 based phone, two key sequences will allow to restore your phone to a cleaner state:

Normal Reset (*#7780#) : Restores ini files from rom but preserves user data (photos, 3rd party apps etc)

Deep Reset (*#7370#) : This reformats completely the C: drive. All applications and files stored on this drive will be lost and clean default files will be rewritten

In both case, the phone will ask you a confirmation and you will have to enter your security code (12345 by default). In all cases make sure you have at least 3/4 charge of battery power left

Files and applications stored on E: drive are not be affected by these sequences



Useful help: Full phone formatting a 6600!

Here to let everyone know how to perform a FULL phone formatting on a 6600! If you encounter situation like below on your 6600,
1. Blank screen phone unable to reboot
2. Phone only able to boot-up to "Nokia" word screen
3. Install some program but not able to uninstall it after that
4. Unable to delete unwanted files on C drive

Do a Full phone formatting on your 6600! as steps below
1. Make sure you have at least 3/4 charge of battery power left
2. Backup your contacts list and personal files to MMC memory card
3. Switch-off your 6600 phone
4. Press and hold 3 keys; Green dial key, * Star key, no. 3 key on keypad and then press the power on/off to switch on the 6600 phone

Remember, do not let go the 3 press and hold keys until you see a formatting word screen show!

5. After a few minutes when the Full phone formatting completed, your 6600 will back to original system and factory setting.

Wednesday, September 15, 2004

What is Spyware?

Spyware is Internet jargon for Advertising Supported software (Adware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Why is it called "Spyware" ?
While this may be a great concept, the downside is that the advertising companies also install additional tracking software on your system, which is continuously "calling home", using your Internet connection and reports statistical data to the "mothership". While according to the privacy policies of the companies, there will be no sensitive or identifying data collected from your system and you shall remain anonymous, it still remains the fact, that you have a "live" server sitting on your PC that is sending information about you and your surfing habits to a remote location.....

Are all Adware products "Spyware"?
No, but the majority are. There are also products that do display advertising but do not install any tracking mechanism on your system.

Is Spyware illegal?
Even though the name may indicate so, Spyware is not an illegal type of software in any way. However there are certain issues that a privacy oriented user may object to and therefore prefer not to use the product. This usually involves the tracking and sending of data and statistics via a server installed on the user's PC and the use of your Internet connection in the background.

What's the hype about?
While legitimate adware companies will disclose the nature of data that is collected and transmitted in their privacy statement (linked from our database), there is almost no way for the user to actually control what data is being sent. The fact is that the technology is in theory capable of sending much more than just banner statistics - and this is why many people feel uncomfortable with the idea.

On the other hand...
Millions of people are using advertising supported "spyware" products and could not care less about the privacy hype..., in fact some "Spyware" programs are among the most popular downloads on the Internet.


Real spyware...
There are also many PC surveillance tools that allow a user to monitor all kinds of activity on a computer, ranging from keystroke capture, snapshots, email logging, chat logging and just about everything else. These tools are often designed for parents, businesses and similar environments, but can be easily abused if they are installed on your computer without your knowledge.

These tools are perfectly legal in most places, but, just like an ordinary tape recorder, if they are abused, they can seriously violate your privacy.


Facts about "Computer E-mail Viruses"

by: Erick Gerlitz

Does this sound familiar: "Don't read or open any e-mail titled Good Times! It will destroy your computer!" Many of you have received e-mails warning you of reading a specific e-mail sent to you going by a certain name (e.g.- "Good Times," etc.). These warnings tell you your computer will face certain doom if you open these e-mails and read them. THESE WARNINGS ARE A HOAX.

The TRUTH of the matter is, *YOU CAN NOT GET A VIRUS OR ANY SYSTEM DAMAGING SOFTWARE BY READING AN E-MAIL*. E-mails (that is, the ACTUAL message) can not contain viruses. This is why:


>> A virus can not exist in an e-mail text message. They also can NOT exist in USENET (newsgroup) postings or simply "float around" the internet. Viruses must be attached to and infect an executable program (.exe, .com). Viruses and other system-destroying bugs can ONLY exist in EXECUTABLE FILES, and since e-mail is not a system file in that sense, viruses can not exist there. While reading e-mail, you are not executing any malicious code to activate! Thus, no virus can exist. HOWEVER, if you (or your computer) download a FILE attached to an e-mail or USENET posting (i.e.-binary) and RUN it, there IS a chance that file could contain a virus, since a runable file could contain a virus. It is also very important that you DO NOT, under any circumstances, allow your e-mail program to automatically execute an attached file. You risk infection by doing so!

>> Viruses are generally (almost always) OS (operating system)-specific. Meaning, viruses created for a DOS application can do no damage on a Macintosh, and vice-versa. If you take a careful look at these e-mail hoaxs, you'll notice that very few are specific about which system it "infects." There has been one exception to the OS-specific rule, which is called the Microsoft Word Macro Virus, which infects documents instead of the program. This virus can affect both Macintosh and PC computers because of the way the application was written (it contains the same source code on several OS's). In the future, we might see viruses cross OS-boundries because Java, ActiveX programming languages break the typical "rules" of how a virus is OS-specific.

>> If you carefully read these hoax letters, you can pick out strange, non-sensical technical jargon, used to confuse and scare those who aren't computer experts. This jargon usually talks about systems of a computer that don't exist or things that aren't possible.