Monday, April 23, 2007

Suprising Bug in Windows


For those of you using Windows:


1.) Open an empty notepad file
2.) Type "Bush hid the facts" (without the quotes)
3.) Save it as whatever you want.
4.) Close it, and re-open it.

Watch Star War Movie in ur Command Prompt

Watch Star War Movie in ur Command Prompt

Type this in your command prompt or through run command
telnet towel.blinkenlights.nl
And See the Star War Movies in your command Prompt.

Hidden Music in WINDOWS XP

HIDDEN MUSIC IN WINDOWS xp!!!
Try it.

1->Set the folder option to show all hidden and system files
2->Go to C:\WINDOWS\system32\oobe\images
3->Find a file by name title.wma and play it

Fun & Entertainment

Todays Dinner:
Sardarji standing below a tube light with a open mouth……………..WHY? because his doctor advised him“Todays dinner shouldbe light

Horses and Sardars:
There were two sardars, Zail Singh & Jarnail Singh.Both of them bought a horse each. “How will we know which is your & which is mine?” asked Zail. ”Easy” repliedJarnail. “I’ll cut mine’s tail,yours will be the one with tail” This was heard by a few boys ,they cut the other’s tail too.Next morning the confusion continued. “Don’t worry “retorted Jarnail.“I’ll tie a bell around its neck; yours will be the one without the bell.” The boys heard this also & cut the bell. The next day, Zail got frustrated & said “Okay now the last criterion, white will be yours & black will be mine

The Story behind Orkut

A guy lost his girlfriend in a train accident.... but the gal's name nowhere appeared in the dead list. This guy grew up n became IT technical architect in his late 20?s, achievement in itself!!.
He hired developers from the whole globe and plan to make a software where he could search for his gf through the web..
Things went as planned... and he found her, after losing millions of dollars and 3 long years!! It was time to shut down the search operation, when the CEO of Google had a word with this guy and took over this application,This Software made a whopping 1 billion dollars profit in its first year, which we today know as ORKUT .

The guy's name is ORKUT BUYUKKOTEN . Yes its named after him only. Today he is paid a hefty sum by Google for the things we do like scrapping. He is expected to b the richest person by 2009. ORKUT BUYUKKOTEN today has 13 assistants to monitor his scrapbook & 8 to
monitor his friends-list. He gets around 20,000 friend-requests a day &about 85,000 scraps!!!Some other Cool Facts abt this guy:
* He gets $12 from Google when every person registers to this website.
* He also gets $10 when you add somebody as a friend.
* He gets $8 when your friend's friend adds you as a friend & gets $6 if anybody adds you as friend in the resulting chain.
* He gets $5 when you scrap somebody & $4 when somebody scraps you.
* He also gets $200 for each photograph you upload on Orkut.
* He gets $2.5 when you add your friend in the crush-list or in the hot-list.
* He gets $2 when you become somebody's fan.
* He gets $1.5 when somebody else becomes your fan.
* He even gets $1 every time you logout of Orkut.
* He gets $0.5 every time you just change your profile-photograph.
* He also gets $0.5 every time you read your friend's scrap-book & $0.5 every time
you view your friend's friend-list.

Technology that retrieves sounds in the wall

Technology that retrieves sounds in the wall :
Scientists have developed a technology that can retrieve sounds and conversations that get recorded in the walls around us. An Indian scientist and a software engineer have been working on the secret project for 17 years costing more than 255 crore rupees. Their identities are kept secret for security reasons. "Well, the methodology is in great demand by the Americans and in Europe it's worth billions of dollars," the scientist said. "We have had kidnap threats, so we can only go public when our security is guaranteed".
How does it works:
Every wall in a room is made up of millions and millions of atoms. Each atom is a collection of electrons, protons and neutrons - all electrically charged and constantly moving. When anyone inside the four walls of a room speaks, the sound carries energy that travels in waves and hits the walls. When this voice energy hits the atoms in a wall the electrons and protons are disturbed. Each word spoken hits the atoms with a different energy level and disturbs the atoms differently. Scientists have worked on the software and technology that can measure how each atom has been disturbed and match each unique disturbance with a unique word. The technology virtually "replays" the sequence of words that have been spoken inside the walls. It's like rewinding a tape recorder and you can go as far back in history as you want.
Historic secrets:
The scientists have already recorded many historic conversations some of which are classified as secret. They have extracted a few words by Aurangzeb from the walls of the Red Fort in Delhi and from the walls of the Agra Fort. They contain what Shahjahan said to Noorjahan on the night before she died. It's not just voices from the distant past that can be replayed - when you leave your room at work your boss can tap the walls and hear all that you said.The amazing technology could change the way we live. Inside the bedroom or boardroom - nothing is a secret any more. It will change way nations spy on each other and it will most certainly lead to the re-writing of history books. The technology will be available commercially for sale 12 months from now in April 2008

Thursday, April 19, 2007

Donate ur eyes



Do you wanna 'see' the 'world' after death?


If Yes ?





Donates Your Eyes !!










DONATE YOUR ‘EYES’!!

For ABAPers Difference between LSMW and BDC

What is the exact difference between BDC and LSMW?
BDC is the way to transfer data by writing a batch input program which can use either session or call transaction method.
LSMW used to transfer data without/less code.
What type of data we transfer using LSMW?
LSMW is best suited for transferring master data.
Actually BDC and LSMW are not comparable at all.
for example LSMW itself can use BDC as a way of mass data transfer.
BDC is a mass data transfer technique via screen logic of existing SAP Data entry transactions. It behaves as if you are manually making thousand of entires into sap system as a background job. And that is probably the reason why BAPI's are preffered over BDC's.
On the other hand LSMW is a tool to facilitate DATA migration from other legacy systems ... It contains step by step procedure for data migration.
Like Managing Data Migration Projects , Creating Source Structures , Mapping Source structures wid Target structures , etc etc
LSMW internally might well be using the following techniqes for data transfer..1. IDOX2. Direct Input / BDC4. BAPI's
LSMW is an encapsulated data transfer tool. It can provide the same functionality as BDC infact much more but when coming to techinical perspective most the parameters are encapulated. To listout some of the differences :
LSMW is basicaly designed for a fuctional consultant who do not do much coding but need to explore the fuctionality while BDC is designed for a technical consultant.
LSMW offers different techinque for migrating data: Direct input ,BAPI,Idoc,Batch input recording. While bdc basically uses recording.
LSMW mapping is done by SAP while in BDC we have to do it explicitly .
LSMW is basically for standard SAP application while bdc basically for customized application.
Coding can be done flexibly in BDC when compared to LSMW
Diff. between BDC and LSMW."The Data Transfer Workbench (or DX Workbench, transaction SXDA) is an integrated SAP tool that supports data transfer and analysis. It does not have the built-in features for mapping for source structures to target structures, but it will allow you to integrate Legacy System Migration Workbench (LSMW) objects as processing tasks within a run definition. The DX workbench has many features for creating test data and performing data migrations - for example, logging of data migration runs. However, if you need to map or convert data, you should use the LSMW. Or, you can integrate your LSMW objects as task within a more user-friendly data migration run, in which the LSMW project steps "Read data", "Convert data," and "Start IDoc processing" are automated and use the features of both tools. If you donot need logging and automated data migration runs, you can perform your data migration without the DX Workbench."
釘atch Data Communication (BDC) is the oldest batch interfacing technique that SAP provided since the early versions of R/3. BDC is not a typical integration tool, in the sense that, it can be only be used for uploading data into R/3 and so it is not bi-directional. BDC works on the principle of simulating user input for transactional screen, via an ABAP program. Typically the input comes in the form of a flat file. The ABAP program reads this file and formats the input data screen by screen into an internal table (BDCDATA). The transaction is then started using this internal table as the input and executed in the background.
In 舛all Transaction・ the transactions are triggered at the time of processing itself and so the ABAP program must do the error handling. It can also be used for real-time interfaces and custom error handling & logging features. Whereas in Batch Input Sessions, the ABAP program creates a session with all the transactional data, and this session can be viewed, scheduled and processed (using Transaction SM35) at a later time. The latter technique has a built-in error processing mechanism too.
Batch Input (BI) programs still use the classical BDC approach but doesn稚 require an ABAP program to be written to format the BDCDATA. The user has to format the data using predefined structures and store it in a flat file. The BI program then reads this and invokes the transaction mentioned in the header record of the file.
Direct Input (DI) programs work exactly similar to BI programs. But the only difference is, instead of processing screens they validate fields and directly load the data into tables using standard function modules. For this reason, DI programs are much faster (RMDATIND - Material Master DI program works at least 5 times faster) than the BDC counterpart and so ideally suited for loading large volume data. DI programs are not available for all application areas.

How to create a ALV grid

report z_alv_data_display .


data : begin of itab occurs 100,
belnr like bsas-belnr,
budat like bsas-budat,
dmbtr like bsas-dmbtr,
xblnr like bsas-xblnr,
end of itab.

data i_repid like sy-repid.
data i_lines like sy-tabix.


type-pools: slis.
data: int_fcat type slis_t_fieldcat_alv,
is_layout type slis_fieldcat_alv.
data: wa_fieldcat like line of int_fcat.

selection-screen: begin of block b1.
parameters : ddate like bsas-bldat,
glact like bsas-hkont.
selection-screen:end of block b1.


start-of-selection.

select bldat dmbtr belnr budat hkont xblnr from bsas
into (itab-bldat, itab-dmbtr, itab-belnr, itab-budat, itab-hkont, itab-xblnr) where bldat eq ddate and hkont eq glact.
append itab.
endselect.
select bldat dmbtr belnr budat hkont xblnr from bsis
into (itab-bldat, itab-dmbtr, itab-belnr, itab-budat, itab-hkont, itab-xblnr) where bldat eq ddate and hkont eq glact.
append itab.
endselect.
end-of-selection.


i_repid = sy-repid.
is_layout-col_pos = 1.
is_layout-fieldname = 'BELNR'.
is_layout-tabname = 'ITAB'.
is_layout-seltext_l = 'Document No'.
append is_layout to int_fcat.
clear is_layout.
is_layout-col_pos = 2.
is_layout-fieldname = 'BLDAT'.
is_layout-tabname = 'ITAB'.
is_layout-seltext_l = 'Document Dt'.
append is_layout to int_fcat.
clear is_layout.
is_layout-col_pos = 3.
is_layout-fieldname = 'BUDAT'.
is_layout-tabname = 'ITAB'.
is_layout-seltext_l = 'Posting Dt'.
append is_layout to int_fcat.
clear is_layout.
is_layout-col_pos = 4.
is_layout-fieldname = 'HKONT'.
is_layout-tabname = 'ITAB'.
is_layout-seltext_l = 'GL Act No'.
append is_layout to int_fcat.
clear is_layout.
is_layout-col_pos = 5.
is_layout-fieldname = 'DMBTR'.
is_layout-tabname = 'ITAB'.
is_layout-seltext_l = 'Amt(Lcl Curncy)'.
append is_layout to int_fcat. clear is_layout.
is_layout-col_pos = 6.
is_layout-fieldname = 'XBLNR'.
is_layout-tabname = 'ITAB'.
is_layout-seltext_l = 'Reference'.
append is_layout to int_fcat.
clear is_layout.
*----------------------------------------------------------
* Call for ALV list display
call function 'REUSE_ALV_LIST_DISPLAY'
exporting
I_CALLBACK_PROGRAM = 'Z_ALV_SIMPLE_EXAMPLE_WITH_ITAB' i_callback_program = i_repid
it_fieldcat = int_fcat[]
i_save = 'A' tables
t_outtab = itab[]
exceptions program_error = 1
others = 2. if sy-subrc <> 0.
write: / 'Returncode', sy-subrc,
'from FUNCTION REUSE_ALV_LIST_DISPLAY'.
endif.

Nice Pictures







Wanna Work





Now I came to know
The Reason lies here
I am just bringing a meaning to the word

Tuesday, April 10, 2007

Virus Information

Top Viruses:

1. TROJ_GENERIC
Malware Type: Trojan This is the Trend Micro generic detection for low-threat Trojans. It also installs itself as a browser helper object (BHO) by creating certain registry keys.
2. ADW_CNSMIN.G
Malware Type: Adware This adware arrives on a system via the Internet, or bundled with other applications. It does not have a valid End-User License Agreement (EULA).It is a plugin that can monitor or manipulate a user's Internet activity by adding itself in the Layered Service Provider (LSP). Like most adware, it generates pop-up avertisements.
3. WORM_NYXEM.E
Malware Type: Worm This worm propagates by attaching copies of itself to email messages that it sends to target addresses, using its own SMTP engine. Through this SMTP engine, it is able to easily send the email message without using other mailing applications, such as Microsoft Outlook.
4. WORM_ANIG.A
Malware Type: Worm This memory-resident worm propagates by dropping copies of itself in shared network drives. It steals login information and saves the obtained data in a file, which can be retrieved by a remote user. Its keylogger component substitutes the standard Microsoft Graphical Identification and Authentication DLL (MSGINA.DLL) to carry out its information-stealing routine.
5. POSSIBLE_INFOSTL
Malware Type: Susupicious files This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to known variants of the following spyware:TSPY_LEGMIR TSPY_LINEAGE TSPY_QQPASS
6. HTML_NETSKY.P
Malware Type: HTML This HTML malware arrives as an email with an executable file attachment that is detected by Trend Micro as WORM_NETSKY.P. It exploits a known vulnerability in Internet Explorer versions 5.01 and 5.5 known as the Automatic Execution of Embedded MIME Type. This vulnerability causes Internet Explorer to automatically run executable file attachments in email messages.
7. WORM_NETSKY.DAM
Malware Type: WormThis is Trend Micro's detection for the damaged samples of WORM_NETSKY variants. It runs on Windows 95, 98, ME, NT, 2000 and XP.
8. TROJ_HORST.HFMalware Type: TrojanThis Trojan usually arrives as a file dropped by other malware or as a file downloaded unknowingly by a user when visiting malicious Web sites.

Portable Hard Drives

A Portable hard drive is one of the best available solutions in contemporary times for storing high volumes of data and keeping it secure. In a Floppy disk there is no guarantee of data retention and the amount of data stored is negligible, as compared to a portable storage device. The portable storage device is considered to be a better option than a CD (700 MB) or a DVD (4 GB or 8 in case of a dual layer DVD), as one does not need a writer to copy data on it. These drives are a viable option compared to thumb drives/pen drives. A thumb drive can store up to 2 GB of data, which is much less compared to the portable drives. Also, carrying a portable drive is not a problem at all, given its sleek and compact design. The potential of a portable drive to store high quantity (20, 40, 60, 80, 120 GB) of data is also an advantage.The portable storage drives available in the market today are plug and play devices. One does not need anything else to run it. Just plug the device to a PC/notebook via a USB cable and you are on. The devices are USB 1.0 and 2.0 compatible. It is also very easy to copy files from a PC/notebook to a portable storage device. Just copy the files from the former and paste it in the device. You can also keep the device attached to the PC and run files from it. Some of the popular brand portable storage devices available in the market include LaCie, Iomega, Fujitsu, and SeaGate among others.

Wednesday, April 4, 2007

Hard-Drive Encryption

Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions. Data on an encrypted hard drive cannot be read by anyone who does not have access to the appropriate key or password. This can help prevent access to data by unauthorized persons and provides a layer of security against hackers and other online threats.
The concept of hard-drive encryption is simple enough. When a file is written to the drive, it is automatically encrypted by specialized software. When a file is read from the drive, the software automatically decrypts it while leaving all other data on the drive encrypted. The encryption and decryption processes are transparent to all common applications such as word processors, databases, spreadsheets or imaging programs. A computer equipped with hard-drive encryption appears, from the user's point of view, to function as any other computer would.
Windows Vista Enterprise and Ultimate editions offer a hard-drive encryption program called BitLocker that employs two-factor authentication.