Like us on Facebook

Showing posts with label Windows. Show all posts
Showing posts with label Windows. Show all posts

Truth Behind CON Folder, "Bush hid the facts", etc in Microsoft Windows !!

Before reading this post, I recommend U to read Things that MICROSOFT could'nt explain about Windows !! which is already published long back ago.
Bill Gates is not such a person who doesnt even know about his own Oprating system.....

Explanation for the MAGIC #1 is:
Found that nobody can create a FOLDER anywhere on the Computer which can be named as "CON". Not only "CON", u cannot even create the file names with these names AUX, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, LPT9..... !!
The main reason of this is because In MS-DOS, several special "device files" were available to aid in performing certain tasks, such as clearing the screen or deleting extraneous output from a program. In order to maintain backwards-compatibility, all versions of Windows up to and including Windows 7 will refuse to allow you to create a file with these "reserved" device file names.


Explanation for the MAGIC #2 is:
It is true that, when the phrase "Bush hid the facts" is typed into the Windows XP or Windows NT/2000 versions of Notepad as instructed above, the re-opened file displays an unreadable line of squares or Chinese style characters.

The first image below shows the text before closing the Notepad file. The second image shows the text as it is displayed after the file is re-opened:



Bush hid the facts before closing Bush hid the facts after re-opening


Some of the more wide-eyed conspiracy theorists postulate that this result is a form of political commentary directed against US President Bush.

Alas, the truth is far less compelling. It appears that a lot of other character strings in the pattern 4 letters, 3 letters, 3 letters and 5 letters will give the same result. For example, the phrase "Bill fed the goats" also displays the garbled text as shown below:

Bill fed the goats before closing Bill fed the goats after re-opening


In fact, even a line of text such as "hhhh hhh hhh hhhhh" will elicit the same results.

However, some character strings that fit the "4,3,3,5" pattern do not generate the error. For example, the phrase "Bush hid the truth" is displayed normally. However, conspiracy theorists should not take this as aiding their argument. "Fred led the brats", "brad ate the trees" and other strings also escape the error.

Thus, any hint of political conspiracy fades into oblivion and is replaced by a rather mundane programming bug. It seems that a certain combination and/or frequency of letters in the character string cause Notepad to misinterpret the encoding of the file when it is re-opened. If the file is originally saved as "Unicode" rather than "ANSI" the text displays correctly. Older versions of Notepad such as those that came with Windows 95, 98 or ME do not include Unicode support so the error does not occur.


Explanation for the MAGIC #3 is:
Using the rand() function in the way described automatically adds sample text to a word document. In Word 2003 and earlier versions, the rand() function adds several sentences and paragraphs that repeat the words, The quick brown fox jumps over the lazy dog. These words are often used for testing because, together, they contain all the letters in the English alphabet in one concise and coherent sentence. Such a sentence is known as a pangram.

In Word 2007, the rand() function adds information about using specific Word features in order to create a more realistic document for testing. However, if you wish to use the "Quick Brown Fox" pangram in Word 2007, you can still do so by inputting the function =rand.old(). Another Word 2007 option is to use =lorem(), This function automatically adds the familiar
Lorem Ipsum
 dummy text that has been used by the printing and typesetting industry since the 1500's. Nowadays, Lorem ipsum text is also used extensively by web developers and publishers to add random text to such things as templates and website prototypes.

You can alter the results of the rand() function by adding numbers in the round brackets. The first number controls the number of paragraphs while the second number controls the number of sentences in each paragraph. For example, using "rand(3,5)" will add three paragraphs of five sentences each. Leaving the brackets empty will add the default number of paragraphs and sentences, which is set at three sentences and three paragraphs.

Far from being a mystery, this is a well-documented feature of Microsoft Word that simply allows sample text to be quickly added to a document for testing purposes. Microsoft can in fact "explain the result" and does so in an article on the
MS Support Website.


Explanation for the MAGIC #4 is:
The flight numbers which hit the WTC towers are
* American Airlines Flight 11 from Boston to Los Angeles
* United Airlines Flight 175 from Boston to Los Angeles
* American Airlines Flight 77 from Dulles to Los Angeles
* United Airlines Flight 93 from Newark to San Francisco

Q33N is not a flight number......
those are the symbols that come in the wingdings font... for 3 that symbol comes, which you are saying is a building... But i must tell you, that symbol represents a page and not a building.


There are no mysteries about this issue, it might have saved user confusion if Windows displayed an explanatory error message when attempting to create a folder with a reserved name as well.

Things that MICROSOFT could'nt explain about Windows !


TRY this.... 
MAGIC #1 
Found that nobody can create a FOLDER anywhere on the Computer which can be named as "CON". This is something funny and inexplicable? At Microsoft the whole Team, couldn't answer why this happened! TRY IT NOW, IT WILL NOT CREATE A "CON" FOLDER 



MAGIC #2 
For those of you using Windows, do the following: 
1.) Open an empty notepad file 
2.) Type "Bush hid the facts" (without the quotes) 
3.) Save it as whatever you want. 
4.) Close it, and re-open it. 
Noticed the weird bug? No one can explain! 


MAGIC #3 
Again this is something funny and can't be explained? 
At Microsoft the whole Team, including Bill Gates, couldn't answer why this happened! 
It was discovered by a Brazilian. Try it out yourself? 
Open Microsoft Word and type 
=rand (200, 99) 
And then press ENTER And see the magic?..! 


Magic #4 
Did you know that a flight number from one of the planes that hit one of the two WTC towers on 9/11 was Q33N. In Notepad / WordPad or MS Word, type that flight number i.e Q33N. Increase the font size to 72. Change the font to Wingdings. ..... u will be amazed by the findings!!!

THE PROCEDURE ABOVE IS REAL, BUT THE REASONS ARE TRASH. THOSE ARE NOT THE REASONS FOR IT !!
For the true reasons read Truth Behind CON Folder, "Bush hid the facts", etc in Microsoft Windows !!

Working Of Antivirus Programmes....

How does anti-virus software work? 

An anti-virus software program is a computer program that can be used to scan files to identify and eliminate computer viruses and other malicious software (malware).


Anti-virus software typically uses two different techniques to accomplish this:

  • Examining files to look for known viruses by means of a virus dictionary
  • Identifying suspicious behavior from any computer program which might indicate infection

Most commercial anti-virus software uses both of these approaches, with an emphasis on the virus dictionary approach.

Virus dictionary approach:
In the virus dictionary approach, when the anti-virus software examines a file, it refers to a dictionary of known viruses that have been identified by the author of the anti-virus software. If a piece of code in the file matches any virus identified in the dictionary, then the anti-virus software can then either delete the file, quarantine it so that the file is inaccessible to other programs and its virus is unable to spread, or attempt to repair the file by removing the virus itself from the file.

To be successful in the medium and long term, the virus dictionary approach requires periodic online downloads of updated virus dictionary entries. As new viruses are identified "in the wild", civically minded and technically inclined users can send their infected files to the authors of anti-virus software, who then include information about the new viruses in their dictionaries.

Dictionary-based anti-virus software typically examines files when the computer's operating system creates, opens, and closes them; and when the files are e-mailed. In this way, a known virus can be detected immediately upon receipt. The software can also typically be scheduled to examine all files on the user's hard disk on a regular basis.

Although the dictionary approach is considered effective, virus authors have tried to stay a step ahead of such software by writing "polymorphic viruses", which encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match the virus's signature in the dictionary.

Suspicious behavior approach:
The suspicious behavior approach, by contrast, doesn't attempt to identify known viruses, but instead monitors the behavior of all programs. If one program tries to write data to an executable program, for example, this is flagged as suspicious behavior and the user is alerted to this, and asked what to do.

Unlike the dictionary approach, the suspicious behavior approach therefore provides protection against brand-new viruses that do not yet exist in any virus dictionaries. However, it also sounds a large number of false positives, and users probably become desensitized to all the warnings. If the user clicks "Accept" on every such warning, then the anti-virus software is obviously useless to that user. This problem has especially been made worse over the past 7 years, since many more nonmalicious program designs chose to modify other .exes without regards to this false positive issue. Thus, most modern anti virus software uses this technique less and less.

Other ways to detect viruses:
Some antivirus-software will try to emulate the beginning of the code of each new executable that is being executed before transferring control to the executable. If the program seems to be using self-modifying code or otherwise appears as a virus (it immeadeatly tries to find other executables), one could assume that the executable has been infected with a virus. However, this method results in a lot of false positives.

Yet another detection method is using a sandbox. A sandbox emulates the operating system and runs the executable in this simulation. After the program has terminated, the sandbox is analysed for changes which might indicate a virus. Because of performance issues this type of detection is normally only performed during on-demand scans.

Issues of concern:

Macro viruses, arguably the most destructive and widespread computer viruses, could be prevented far more inexpensively and effectively, and without the need of all users to buy anti-virus software, if Microsoft would fix security flaws in Microsoft Outlook and Microsoft Office related to the execution of downloaded code and to the ability of document macros to spread and wreak havoc.

User education is as important as anti-virus software; simply training users in safe computing practices, such as not downloading and executing unknown programs from the Internet, would slow the spread of viruses, without the need of anti-virus software.

Computer users should not always run with administrator access to their own machine. If they would simply run in user mode then some types of viruses would not be able to spread.

The dictionary approach to detecting viruses is often insufficient due to the continual creation of new viruses, yet the suspicious behavior approach is ineffective due to the false positive problem; hence, the current understanding of anti-virus software will never conquer computer viruses.

There are various methods of encrypting and packing malicious software which will make even well-known viruses undetectable to anti-virus software. Detecting these "camouflaged" viruses requires a powerful unpacking engine, which can decrypt the files before examining them. Unfortunately, many popular anti-virus programs do not have this and thus are often unable to detect encrypted viruses.

Companies that sell anti-virus software seem to have a financial incentive for viruses to be written and to spread, and for the public to panic over the threat.

Microsoft Delivering Fast boot times for Windows 8 !!

Among the many promises of Windows 8 are phenomenally fast boot times. A recent Microsoft Developer blog post explained how Microsoft engineers are using a hybrid system to combine the features of a cold boot and hibernation with existing PC hardware to go from off to desktop in less than 40 seconds.

One of the major frustrations for current Windows users is the time it takes to turn the computer on to being able to do work in Windows. Tales of workers turning on the computer, going to get a cup of tea or coffee and coming back just as the desktop appears are all too common, and true. Users have worked around slow Windows boot times for years, with many simply leaving the system on all the time in sleep mode. Leaving ones machine in sleep mode brings its own set of problems as, even the best configured systems will slow over time and require a full stop and restart if for no other reasons to make sure all updates are in place. Further, many feel that it is wasteful to keep systems drawing even the small amount of power required for sleep mode if they are unproductive.
Some of the Boot issues are the consequence of having to accommodate legacy technology. Until recently, every personal computer user from the first IBM PC to just recently, experienced the POST, power on self test that was built into every motherboard’s BIOS chip. In its simplest terms, it was the computer telling itself that it was on and ready to go to work, From there the operating system was loaded, either by hard drive, Floppy disc, or for the truly old school, cassette tape.

As computer processors increased in speed and computer makers moved to faster and faster hard drives, the hardware constraints became less of an issue but did not disappear entirely as it still takes some amount of time for a hard drive to spin up and the operating system accessed. Over the years the POST process became less and less visible to the user, but even today it is in integral part of starting up a PC. However If you have a newer system that was built with the Unified Extensible Firmware Interface (UFEI) you will see some significant improvement as the UFEI does not have to take into account the programming baggage from the cassette tape days. Even better, adding a solid state drive (SSD) to the system cuts the disk access times dramatically.

Microsoft’s approach with Windows 8 is to save the kernel, essentially the steps of system initialization, in much the same way the system saves what is loaded into memory into a hibernation file. Microsoft reports boot time savings of 30% to 70%. The higher end of the range is achieved in systems with multi-core processors Windows 8 can exploit to split up the boot process. For users’ fortunate enough to have a UFEI system with a SSD and a multi-core processor, Windows 8 can provide as close to an instant on experience as you are likely to get.