Earn money online,free sms,free software site
সোমবার, ১৮ মে, ২০০৯
about animal and plants
Humans , animals and plants are all important elements of the natural environment . But humans are cruelly destroying plants and animal and thereby creating the extinction of various plants and animals everyday . These losses are particularly severe in the areas of tropical forest which cover only 7% of the surface of the globe, but which provide the living space for between 50% and 80% of all our wildlife . Many wild animals and birds such as pandas , bears tigers alligators , whales ,wolves ,eagles falcons kites and buzzards are faced with the threat of extinction today . Their decline has been accelerated by the destruction of their feeding and nesting places , by the collection of eggs and above all by the widespread use of chemicals and pesticides which enter their food chains leading to sterility and a mass deaths. Hunting of birds and animals is another cause of their extinction. Men kill birds for food and feathers, hunt big cats to make fur coats and slaughter alligators and other reptiles for shoes and bags . In addition , whale hunting has also drastically reduced the number of blue whales in the Atlantic Ocean. We know that all species are important for maintaining ecological balance.
Labels:
Animal and plants
শনিবার, ৯ মে, ২০০৯
the life of british peoples
The
British have a reputation for keeping their emotions private and for being reserved in their public behaviour. There are some obvious things that people from overseas notice in British behaviour. For example , on public transport, people do not usually talk to other passengers. On meeting people do not embrace and often simply shake hands on a first introduction. In theatres , concert halls and cinemas, audiences are quiet during performances and reactions are often restrained . None of this behaviour traits , however , need to be interpreted by visitors as unfriendliness and in general , if a visitor makes the first move to start a conversation, they will , they will find that British people are friendly and very considerate. On the other hand , some aspects of British behaviour might seem too informal for foreigners . An example is the informal use of first names among staff holding different status at work. Although it would be a blasphemy for a student to call his/her teachers by their first names in Bangladesh, it is quite common in British colleges and universities . Britain lies in the temperate region. In winter, it is very cold and windy . You should carry warm clothes with you. Moreover , there are a number of significant differences in norms and behaviour . Here are some useful tips for those visiting U.K.
people in Britain often socialize at home , but unless you know someone very well it is not usual to just drop in without at least telephoning first to make sure that it is convenient.
If you accept an invitation for a meal in someones home , it is regarded as a definite appointment and it would be considered bad manners not to turn up. If you really do have to cancel an invitation, do let your hosts know as soon as possible , before they making preparations.
If there are certain foods that you cannot or do not eat , do let your host know in advance, in order to save embarrassment on the day .
Whether you are visiting just for a meal or for a longer stay , it is customary to take a small gift for your host flowers or chocolates, for example.
If you stay with a British family , you should act thoughtfully at all times . Be on time for meals . If you need to miss a meal let your host know if you are going to be staying out late so that they wont worry about you Offer to help with household chores – your offer will probably be turned down but will still be appreciated.
British have a reputation for keeping their emotions private and for being reserved in their public behaviour. There are some obvious things that people from overseas notice in British behaviour. For example , on public transport, people do not usually talk to other passengers. On meeting people do not embrace and often simply shake hands on a first introduction. In theatres , concert halls and cinemas, audiences are quiet during performances and reactions are often restrained . None of this behaviour traits , however , need to be interpreted by visitors as unfriendliness and in general , if a visitor makes the first move to start a conversation, they will , they will find that British people are friendly and very considerate. On the other hand , some aspects of British behaviour might seem too informal for foreigners . An example is the informal use of first names among staff holding different status at work. Although it would be a blasphemy for a student to call his/her teachers by their first names in Bangladesh, it is quite common in British colleges and universities . Britain lies in the temperate region. In winter, it is very cold and windy . You should carry warm clothes with you. Moreover , there are a number of significant differences in norms and behaviour . Here are some useful tips for those visiting U.K.
people in Britain often socialize at home , but unless you know someone very well it is not usual to just drop in without at least telephoning first to make sure that it is convenient.
If you accept an invitation for a meal in someones home , it is regarded as a definite appointment and it would be considered bad manners not to turn up. If you really do have to cancel an invitation, do let your hosts know as soon as possible , before they making preparations.
If there are certain foods that you cannot or do not eat , do let your host know in advance, in order to save embarrassment on the day .
Whether you are visiting just for a meal or for a longer stay , it is customary to take a small gift for your host flowers or chocolates, for example.
If you stay with a British family , you should act thoughtfully at all times . Be on time for meals . If you need to miss a meal let your host know if you are going to be staying out late so that they wont worry about you Offer to help with household chores – your offer will probably be turned down but will still be appreciated.
Labels:
life and culture
বুধবার, ৬ মে, ২০০৯
ABOUT INTERNATIONAL SPACE STATION
The first Space Station Salyut was launched by the Russians in 1971 .Since then four Space Stations have been launched by the Russians and one American to conduct experiments in Space . Scientists have launched Space Stations which provide laboratories for living and conducting experiments . It is a 17-nation project which marks unprecedented international co-operation in Space research. The Space Station is expected to be completed by the year2006 .
Labels:
SPACE STATION
Living in a space
Scientists have been experimenting with the idea Living In Space for a long time . But it is not easy to live in Space. There is no gravity and the body needs a lot of adjusting to do. One of the scientists reported that his heart beat had become slower , and bones and muscles had felt weaker as calcium had been decreasing from them . His head had felt heavy as there was no gravity to keep blood down in the legs and there was also a feeling of Space sickness which is like travel sickness . Doing everyday jobs also becomes difficult . Water cannot be poured because it stays ion one place like a big ball. .If you want a drink , you must do it with straw from a closed container . If you sprinkle salt , it spreads all around you and heavy objects can be moved with one finger as they have no weight . Astronauts , therefore , need months of training to be able to adjust to conditions in Space.
Labels:
Space
মঙ্গলবার, ৫ মে, ২০০৯
about trendpc-cillin software
I have written here details about trend Pc-cillin software,like how to install, how to configure it ,how to use ,why it has been used by many peoples etc.
1. About Trend Micro PC-cillin Internet Security 2005
========================================================================
Trend Micro PC-cillin Internet Security 2005 delivers comprehensive
protection against all types of viruses, worms, Trojans, and blended
threats, including network viruses. It also blocks hackers, spyware,
phishing attacks, inappropriate content, and spam. Featuring Home
Network Control and Wi-Fi Intrusion Detection, it is the first
personal Internet security solution designed to extend desktop
security to your home and wireless networks.
1.1 Overview of This Release
=====================================================================
Trend Micro PC-cillin Internet Security 2005 version 12.40 provides
the Pattern Rollback Tool. This tool ensures that PC-cillin is
using a stable virus pattern file to keep the machine environment
secure.
This release also enables PC-cillin Internet Security to support
incremental pattern file updates to reduce the size of downloads
when updating product components.
2. What's New
========================================================================
Pattern Rollback Tool
---------------------
The Pattern Rollback Tool removes the latest virus pattern file in a
user's computer and restores the previous one. Users can run this tool
when PC-cillin Internet Security does not start normally after loading
the latest virus pattern file.
Incremental pattern file update
-------------------------------
Updating pattern files incrementally results in smaller file sizes,
which allows faster downloads when updating program components.
Subscription renewal
--------------------
PC-cillin Internet Security subscription can now be renewed from the
Registration screen of the PC-cillin console.
2.1 Resolved Known Issues (from 12.10 version)
=====================================================================
Initialization
--------------
Initializing PC-cillin Internet Security usually takes some time to
complete. In release 12.40, PC-cillin Internet Security was optimized
for faster initialization.
Rescue Disk
-----------
When scanning viruses using a pattern file rescue disk, failure to
read the division pattern may occur. After installing this version,
this problem will no longer occur.
Network virus pattern loading
-----------------------------
The process of loading network virus patterns has been improved so
that users will not get the message "Unable to update the network
virus pattern for the personal firewall".
Manual Scan
-----------
Users can now stop Manual Scan on demand even if scanning is not yet
complete.
Processing time for big debug log file
--------------------------------------
PC-cillin Internet Security has been optimized for faster processing
of large debug logs.
Security Check
--------------
This version allows the "Results" screen of Security Check to be
closed.
Manual Scan with compressed file
---------------------------------
In the "Manual Scan" result screen, uncleanable viruses in compressed
files are grayed out and cannot be selected.
Private Data Protection
-----------------------
When detecting private data sent by Internet Messenger, the detection
screen shows the receiver's name all the time.
3. Documentation Set
========================================================================
In addition to this readme file, the documentation set for this
product includes the following:
o Online help -- Context-sensitive help screens that provide guidance
for performing a task
o Quick Start Guide -- product overview, installation planning,
installation and configuration instructions, and basic information
intended to get you "up and running"
o Knowledge Base -- a searchable database of known product issues,
including specific problem-solving and troubleshooting topics.
http://kb.trendmicro.com/solutions/
Electronic versions of the printed manuals are available at:
http://www.trendmicro.com/download
4. System Requirements
========================================================================
Operating System:
-----------------
Microsoft(TM) Windows(TM) 98
Microsoft Windows 98 SE
Microsoft Windows Me
Microsoft Windows 2000 Professional with Service Pack 4 or above
Microsoft Windows XP Home or Professional with Service Pack 1, 2
Microsoft Windows XP Media Center Edition
Microsoft Windows XP Tablet PC Edition
CPU:
----
* Intel Pentium(TM) 233MHz or equivalent processor for
Windows 98, 98SE, Me
* Intel Pentium 300MHz or equivalent processor for Windows 2000, XP
* Intel Hyper-Threading supported
Memory:
-------
* 64MB of RAM for Windows 98, 98SE, Me, 2000
(128MB or above is recommended)
* 128MB of RAM for Windows XP
For all installations:
----------------------
* Internet Explorer 6.0 with Service Pack 1 or above
* 100MB of available hard disk space for installation
* Adobe(TM) Acrobat(TM) is required to view documentation that is
provided in PDF format. You can download the free Acrobat Reader(TM)
software at http://www.adobe.com.
* RAID is not supported.
* A monitor with a resolution of 800 x 600 pixels or more, and
High Color (65536 colors) or more
Email software and Web browser required for some features:
----------------------------------------------------------
Email software for Mail Scan and Anti-spam
------------------------------------------
The following software has been verified to work correctly with
Mail Scan, Anti-spam, and Private Data Protection:
- Microsoft Outlook Express 6.0
- Microsoft Outlook 2000, 2002, and 2003
- Netscape 7.1
- Eudora Pro 6.0
- Becky! Internet Mail version 2
Services and for Webmail Scan
-----------------------------
The following services have been verified to work correctly with
Webmail Scan:
- AOL Mail
- Yahoo! Mail
- MSN Hotmail
Note: Webmail Scan does not work with Hotmail when it is accessed by
Microsoft Outlook Express, Microsoft Outlook, or MSN Explorer.
Web Browsers for Webmail Scan, Private Data Protection and
the URL Filter
----------------------------------------------------------
The following software has been verified to work correctly with
Webmail Scan, Private Data Protection and the URL Filter:
- Microsoft Internet Explorer 6.0 Service Pack 1 or above
- Netscape 7.1
- AOL 7.0
Instant Messengers for Private Data Protection
----------------------------------------------
The following software has been verified to work correctly with
Private Data Protection:
- Windows Messenger 4.7, 5.0
- MSN Messenger 6.2
- ICQ 4 Lite Edition
Internet connection required for some functions:
------------------------------------------------
* An Internet connection is necessary to register online, download
updates, obtain virus information, browse pages on the Trend Micro Web
site, or send email messages.
* If you use a router to connect to the Internet, make sure your router
doesn't automatically start a dial-up connection for the Intelligent
Update feature because this could result in an extra connection fee.
Modify the router settings as required, or disable Intelligent
Update.
5. Installation
========================================================================
Installing Trend Micro PC-cillin Internet Security 2005 is simple and
only takes a few minutes.
If a previous version of Trend Micro PC-cillin, other than PC-cillin
Internet Security 2004 or PC-cillin Antivirus 2004, or any other virus
protection or firewall program is installed on your computer, remove it
before installing Trend Micro PC-cillin Internet Security 2005.
If Trend Micro PC-cillin Internet Security 2004 or PC-cillin Antivirus
2004 is installed, PC-cillin Internet Security 2005 will use the
existing serial number.
How to install Trend Micro PC-cillin Internet Security 2005
-----------------------------------------------------------
To install Trend Micro PC-cillin Internet Security 2005:
1. Insert the Trend Micro PC-cillin Internet Security 2005
program CD into your CD-ROM drive, and do the following:
* If the menu automatically appears, click Install Program, and
then click Next.
* If the installation program doesn't automatically start, click
Start > Run. In Open, type D:\Setup\setup.exe and click OK
(where D:\ is the drive letter of your CD-ROM). Click Next.
2. Click "I accept the terms in the license agreement" to accept and
continue installing Trend Micro PC-cillin Internet Security 2005.
The installation procedure will quit if you do not accept the terms.
3. Click Next, and then continue to follow the onscreen instructions.
4. Restart the computer.
Refer to the Trend Micro PC-cillin Internet Security 2005 Quick Start
Guide for detailed installation instructions.
6. Post-Installation Configuration
========================================================================
This section provides a list of the most important tasks you have to
complete to get up and running with Trend Micro PC-cillin Internet
Security.
To effectively use Trend Micro PC-cillin Internet Security and start
protecting your computer, Trend Micro strongly recommends that you
perform all of these tasks.
* Register Trend Micro PC-cillin Internet Security.
Register your software to enable updates. Trend Micro PC-cillin
Internet Security 2005 needs to update pattern and program files to
stop the latest viruses (see "Registering Trend Micro PC-cillin
Internet Security" in the Quick Start Guide for instructions).
* Perform a Manual Update.
Trend Micro recommends you update your scan engine and virus
pattern files immediately after installing the product, and regularly
update thereafter. Enable the Intelligent Update option to let Trend
Micro PC-cillin Internet Security automatically update itself (see
"Updating Trend Micro PC-cillin Internet Security" in the Quick Start
Guide for instructions).
* Manually Scan all files.
Perform a complete scan of your computer to ensure there are no
viruses or other malicious programs hiding on your PC (see "Scanning
your entire computer" in the Quick Start Guide for instructions).
Note: Trend Micro recommends that you update your scan engine and
virus pattern files immediately after installing the product.
7. Known Issues
========================================================================
7.1 Software Compatibility
======================================================================
NTT Flets ADSL Connection Tool
------------------------------
When using the Personal Firewall with the NTT Flets ADSL Connection
Tool, configure the NTT Flets ADSL Connection Tool to use Protocol
Driver mode. If it is configured to use Filter Driver mode, the
following functions will not be available:
- Wi-Fi Detection
- Automatic Profile Change
VPN and firewall software
-------------------------
Errors may occur if PC-cillin Internet Security is installed with the
following software:
- AT&T VPN Client
- ZoneAlarm Firewall 5.1
Uninstall these applications before installing PC-cillin Internet
Security 2005.
Uninstall Norton Personal Firewall 2002/2003 before installing
PC-cillin Internet Security 2005 on Windows98/ME, or install PC-
cillin Internet Security in "Antivirus only" mode.
When using some VPN software, the following functions may not be
available:
- Wi-Fi Detection
- Automatic Profile Change
Windows Firewall
----------------
If you enable Personal Firewall, Trend Micro recommends turning off
Windows Firewall to reduce resource usage.
7.2 Personal Firewall
======================================================================
Adding or removing the Personal Firewall
----------------------------------------
You can choose whether to install the Personal Firewall during
installation. However, the Personal Firewall cannot be added or
removed after installation.
Enabling or disabling the Personal Firewall
-------------------------------------------
Close all running programs before you enable or disable the
Personal Firewall. Some systems could experience a temporary slowdown
while starting Trend Micro PC-cillin Internet Security 2005, Internet
Explorer, or other applications immediately after you modify the
Personal Firewall settings.
Changing your Personal Firewall profiles
----------------------------------------
Close all running programs before you change Personal Firewall
profiles. Some systems could experience a temporary slowdown
while starting Trend Micro PC-cillin Internet Security 2005, Internet
Explorer, or other applications immediately after you modify the
Personal Firewall settings.
Exception Rule list priorities
------------------------------
The priority of Exception List rules is based on the location in the
list. Higher location on the list means higher priority. For example,
if you set two rules (the first one to allow port 100 traffic and the
second to deny port 100 traffic), port 100 traffic is permitted
because the first rule is higher on the list. You can change the
priority with arrow buttons on the Exception Rule screen.
Illegal characters for the Exception List rule "Explanation" field
------------------------------------------------------------------
You cannot use the character "|" in the Exception List rule
"Explanation" field.
Personal Firewall security level and displayed Exception List rules
-------------------------------------------------------------------
Depending on the security level you set for the Personal Firewall, the
Exception List rules may or may not be displayed.
Specifying incoming and outgoing ports for Exception List rules
---------------------------------------------------------------
When creating Exception List rules, remember that for incoming rules,
the specified port number is describing a port number on your own
computer. For outgoing rules the port number is describing a port
number on another computer.
About Network Virus Emergency Center
------------------------------------
The Network Virus Emergency Center function is integrated into the
Personal Firewall. Therefore, when the Personal Firewall is disabled,
this function also becomes disabled.
Personal Firewall profile settings for shared network resources
---------------------------------------------------------------
By default, the Personal Firewall provides maximum security to protect
users from network attacks. However, to access local area network
resources (such as file sharing or printer sharing) you must use the
Office network profile in the Firewall Profiles settings.
To apply this Personal Firewall profile, in the system tray,
right-click the program icon and click User profile > Office
network. (The system tray is next to the clock, on the bottom right
hand side of your screen.)
7.3 Other Issues
======================================================================
Connections established before enabling Trend Micro PC-cillin Internet
Security 2005
----------------------------------------------------------------------
Starting Trend Micro PC-cillin Internet Security 2005 shuts down
network connections established while Trend Micro PC-cillin Internet
Security 2005 was disabled.
Wi-Fi Detection
---------------
* Wi-Fi Detection is designed not to run in the following situations:
(1) When the bit mask length of a subnet mask is smaller than 22
(2) When all network adapters are disabled
(3) If no IP address is correctly assigned to it
* If the firewall on the target PC blocks NetBIOS, the host names will
not be displayed.
Update once after installing Trend Micro PC-cillin Internet Security
2005 without registering
--------------------------------------------------------------------
Within a few moments after typing your serial number on the Trend
Micro Internet Security 2005 main screen, a window appears prompting
you to update. After installing Trend Micro PC-cillin Internet
Security 2005 and before registering online, you are permitted to
update only once. Once you close this window, you must register
online to update.
Schedule during manual task scanning
------------------------------------
Scheduled scan tasks are not executed if a Manual Scan was performed
on the same date. Also, if the multiple scan tasks conflict, only the
first scan task is executed, while others are disabled.
How to enable or disable your scheduled scan tasks
--------------------------------------------------
You can enable or disable scan tasks by selecting or clearing the scan
task check box on the left side of the list in the Scan Task screen.
If you clear the check box, the task won't be performed when
scheduled.
All drives scanning
-------------------
The Main UI [Scan For Viruses] and specified scan tasks can scan all
local drives. However, mapped network drives are not included in the
scan. A scan task that includes [Scan For Viruses] and [Scan
Everything] can scan removable disks, such as floppy disks, and CD-ROM
drives. If no media is inserted, it automatically skips and continues
to scan the next drive.
Manual scanning and progress bar status during scan tasks
---------------------------------------------------------
The progress bar calculates the total number of files divided by the
number of scanned files. In the beginning of a Manual Scan or during a
scan task, the progress bar appears to be around 100% because the
number of files initially scanned is almost identical to the
number of files counted. Later the files will be counted much quicker
than they will be scanned and the progress bar will more accurately
reflect the scan progress.
How to clean compressed files
-----------------------------
The ZIP clean (compressed file cleaning) function can handle infected
files in the first layer of compression (files compressed once).
Infected files compressed and divided in more than two layers (for
example, ZIP files compressed again using the ZIP format) cannot be
cleaned automatically.
Turbo Scan
----------
Before beginning Manual Scan with Turbo Scan enabled, PC-cillin
Internet Security checks the target files for modifications
since the last time they were scanned. If there are an extremely
large number of files, enabling Turbo Scan may not provide
a speed improvement.
Security Check
--------------
After completing an update from Windows Update, Security Check
sometimes still detects known security vulnerabilities. Check the
Microsoft Web Site for other security patches such as Office Update.
Spyware Scan
------------
Some items detected by Spyware Scan may not be harmful, and may be
necessary for other software to function properly. Removal of these
items cannot be undone, so practice caution because you are removing
them at your own risk.
Spyware Removal
---------------
Some spyware and other grayware may not be deleted. If this occurs,
check the spyware information by clicking "More Information", then
perform the recommended action or actions.
About Mail Scan
---------------
* If you need to set the specific proxy type with your application
software, the Email Scan may not be performed.
* If your incoming mail server uses a port other than port 110,
incoming (POP3) mail scanning will not function.
* Mail Scan does not support IMAP.
* If your email software's setting leaves a copy of your email on
the mail server, after installing Trend Micro PC-cillin Internet
Security 2005, the messages previously downloaded from the server
will download again.
About Malformed mail warning
----------------------------
When you enable Anti-spam, Private Data Protection, or Email Scan, you
may receive an email message with the title "Malformed mail warning".
This means that Trend Micro PC-cillin Internet Security 2005 has
detected an email that may contain malicious contents and has attached
it to this new email message as a text file. If you need to read the
original email message, Trend Micro recommends you open it as a
text file. To prevent infection, do not save the original email as an
email file and do not reply to this email.
Displaying the virus property of your files
-------------------------------------------
Trend Micro PC-cillin Internet Security 2005 will scan for viruses if
you right-click a file and choose Property from the short-cut menu,
then click the Virus Property tab. However, for some versions of
Windows, the image file types .AWD, .DCX, .PCX, .TIFF, .TIF, .WIF, and
.XIF are associated with a program. Trend Micro recommends that you
don't scan these file types by right clicking them because system
performance could become unstable. Instead, Trend Micro recommends
that you perform a Manual Scan.
Backup files
------------
If you configure Trend Micro PC-cillin Internet Security to create
backup files before the virus cleaning process, these files will be
saved in the Quarantine folder. Backup files can be deleted or
restored using the Quarantine Folder actions. Refer to Trend Micro
PC-cillin Internet Security 2005 online help for detailed instructions
on handling files in the Quarantine Folder.
Default setting for URL Filter, Private Data Protection, and Anti-spam
----------------------------------------------------------------------
By default, the URL Filter, Private Data Protection and Anti-spam
functions are disabled. You need to manually enable these functions.
URL Filter and Private Data Protection do not support all protocols
-------------------------------------------------------------------
The URL Filter function only checks traffic using the HTTP protocol.
The Private Data Protection function only checks traffic using the
HTTP, SMTP, or IM (ICQ, MSN) protocols.
The URL Filter and Private Data Protection functions do not use the
following protocols to check traffic:
- HTTPS
- FTP
- Encrypted communication protocols, such as SSL
- Hyperlinks, such as Microsoft Word/Excel
Also, traffic will not be checked When Proxy Auto-Config (PAC)
is being used.
Webmail Scan and Proxy Auto-Config (PAC)
----------------------------------------
The Webmail Scan function does not support PAC.
Private Data Protection for Instant Messenger
---------------------------------------------
Enabling or disabling Private Data Protection shuts down the
Instant Messenger (ICQ, MSN) connections.
Home Network Control
--------------------
Disable or configure Windows Firewall if it is installed with
Home Network Control. Otherwise, it will block network communication
for Home Network Control. (Home Network Control uses UDP 40116
and TCP 62471. The process name is PcCtlCom.exe.)
Font size on your screen
------------------------
If you select large font size from your computer's Screen Property,
some Trend Micro PC-cillin Internet Security layouts will be distorted.
Trend Micro suggests using small font size.
Trend Micro PC-cillin Internet Security 2005 Online help
--------------------------------------------------------
Install Microsoft Internet Explorer 6.0 Service Pack 1 or above to
correctly view Trend Micro PC-cillin Internet Security 2005 online
help.
Windows XP Guest account
------------------------
The Windows XP Guest account is not supported.
Upgrading Microsoft Windows OS or Service Pack
----------------------------------------------
Remove Trend Micro PC-cillin Internet Security 2005 before upgrading
Windows or the Service Packs.
Pattern files and Scan engine
-----------------------------
You may download pattern files and scan engine updates while your
support period is valid. Note that you are responsible for any fees
charged by your service provider(s) for downloads. For more information
about the product and virus protection, visit the Trend Micro Web site
or the Customer Care Center.
8. Release History
========================================================================
Trend Micro(TM) PC-cillin Internet Security 2005 (12.30) August 2005
Trend Micro(TM) PC-cillin Internet Security 2005 (12.10) December 2004
Trend Micro(TM) PC-cillin Internet Security 2005 (12.0) September 2004
9. Contact Information
========================================================================
A license to the Trend Micro software usually includes the right to
product updates, pattern file updates, and basic technical support for
one (1) year from the date of purchase only. After the first year,
Maintenance must be renewed on an annual basis at Trend Micro's
then-current Maintenance fees.
You can contact Trend Micro via fax, phone, and email, or visit us
at:
http://www.trendmicro.com
Evaluation copies of Trend Micro products can be downloaded from our
Web site.
Global Mailing Address/Telephone Numbers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For global contact information in the Asia/Pacific region, Australia
and New Zealand, Europe, Latin America, and Canada, refer to:
http://www.trendmicro.com/en/about/overview.htm
The Trend Micro "About Us" screen displays. Click the appropriate
link in the "Contact Us" section of the screen.
Note: This information is subject to change without notice.
10. About Trend Micro
========================================================================
Trend Micro, Inc. provides virus protection, anti-spam, and
content-filtering security products and services. Trend Micro allows
companies worldwide to stop viruses and other malicious code from a
central point before they can reach the desktop.
Copyright 2005, Trend Micro Incorporated. All rights reserved.
Trend Micro, the t-ball logo, PC-cillin are trademarks of Trend Micro
Incorporated and are registered in some jurisdictions. All other
marks are the trademarks or registered trademarks of their respective
companies.
11. License Agreement
========================================================================
Information about your license agreement with Trend Micro can be
viewed at:
http://www.trendmicro.com/en/purchase/license/
Third-party licensing agreements can be viewed:
- By selecting the "About" option in the application user
interface
- By referring to the "Legal" page of the Getting Started Guide or
Administrator's Guide
1. About Trend Micro PC-cillin Internet Security 2005
========================================================================
Trend Micro PC-cillin Internet Security 2005 delivers comprehensive
protection against all types of viruses, worms, Trojans, and blended
threats, including network viruses. It also blocks hackers, spyware,
phishing attacks, inappropriate content, and spam. Featuring Home
Network Control and Wi-Fi Intrusion Detection, it is the first
personal Internet security solution designed to extend desktop
security to your home and wireless networks.
1.1 Overview of This Release
=====================================================================
Trend Micro PC-cillin Internet Security 2005 version 12.40 provides
the Pattern Rollback Tool. This tool ensures that PC-cillin is
using a stable virus pattern file to keep the machine environment
secure.
This release also enables PC-cillin Internet Security to support
incremental pattern file updates to reduce the size of downloads
when updating product components.
2. What's New
========================================================================
Pattern Rollback Tool
---------------------
The Pattern Rollback Tool removes the latest virus pattern file in a
user's computer and restores the previous one. Users can run this tool
when PC-cillin Internet Security does not start normally after loading
the latest virus pattern file.
Incremental pattern file update
-------------------------------
Updating pattern files incrementally results in smaller file sizes,
which allows faster downloads when updating program components.
Subscription renewal
--------------------
PC-cillin Internet Security subscription can now be renewed from the
Registration screen of the PC-cillin console.
2.1 Resolved Known Issues (from 12.10 version)
=====================================================================
Initialization
--------------
Initializing PC-cillin Internet Security usually takes some time to
complete. In release 12.40, PC-cillin Internet Security was optimized
for faster initialization.
Rescue Disk
-----------
When scanning viruses using a pattern file rescue disk, failure to
read the division pattern may occur. After installing this version,
this problem will no longer occur.
Network virus pattern loading
-----------------------------
The process of loading network virus patterns has been improved so
that users will not get the message "Unable to update the network
virus pattern for the personal firewall".
Manual Scan
-----------
Users can now stop Manual Scan on demand even if scanning is not yet
complete.
Processing time for big debug log file
--------------------------------------
PC-cillin Internet Security has been optimized for faster processing
of large debug logs.
Security Check
--------------
This version allows the "Results" screen of Security Check to be
closed.
Manual Scan with compressed file
---------------------------------
In the "Manual Scan" result screen, uncleanable viruses in compressed
files are grayed out and cannot be selected.
Private Data Protection
-----------------------
When detecting private data sent by Internet Messenger, the detection
screen shows the receiver's name all the time.
3. Documentation Set
========================================================================
In addition to this readme file, the documentation set for this
product includes the following:
o Online help -- Context-sensitive help screens that provide guidance
for performing a task
o Quick Start Guide -- product overview, installation planning,
installation and configuration instructions, and basic information
intended to get you "up and running"
o Knowledge Base -- a searchable database of known product issues,
including specific problem-solving and troubleshooting topics.
http://kb.trendmicro.com/solutions/
Electronic versions of the printed manuals are available at:
http://www.trendmicro.com/download
4. System Requirements
========================================================================
Operating System:
-----------------
Microsoft(TM) Windows(TM) 98
Microsoft Windows 98 SE
Microsoft Windows Me
Microsoft Windows 2000 Professional with Service Pack 4 or above
Microsoft Windows XP Home or Professional with Service Pack 1, 2
Microsoft Windows XP Media Center Edition
Microsoft Windows XP Tablet PC Edition
CPU:
----
* Intel Pentium(TM) 233MHz or equivalent processor for
Windows 98, 98SE, Me
* Intel Pentium 300MHz or equivalent processor for Windows 2000, XP
* Intel Hyper-Threading supported
Memory:
-------
* 64MB of RAM for Windows 98, 98SE, Me, 2000
(128MB or above is recommended)
* 128MB of RAM for Windows XP
For all installations:
----------------------
* Internet Explorer 6.0 with Service Pack 1 or above
* 100MB of available hard disk space for installation
* Adobe(TM) Acrobat(TM) is required to view documentation that is
provided in PDF format. You can download the free Acrobat Reader(TM)
software at http://www.adobe.com.
* RAID is not supported.
* A monitor with a resolution of 800 x 600 pixels or more, and
High Color (65536 colors) or more
Email software and Web browser required for some features:
----------------------------------------------------------
Email software for Mail Scan and Anti-spam
------------------------------------------
The following software has been verified to work correctly with
Mail Scan, Anti-spam, and Private Data Protection:
- Microsoft Outlook Express 6.0
- Microsoft Outlook 2000, 2002, and 2003
- Netscape 7.1
- Eudora Pro 6.0
- Becky! Internet Mail version 2
Services and for Webmail Scan
-----------------------------
The following services have been verified to work correctly with
Webmail Scan:
- AOL Mail
- Yahoo! Mail
- MSN Hotmail
Note: Webmail Scan does not work with Hotmail when it is accessed by
Microsoft Outlook Express, Microsoft Outlook, or MSN Explorer.
Web Browsers for Webmail Scan, Private Data Protection and
the URL Filter
----------------------------------------------------------
The following software has been verified to work correctly with
Webmail Scan, Private Data Protection and the URL Filter:
- Microsoft Internet Explorer 6.0 Service Pack 1 or above
- Netscape 7.1
- AOL 7.0
Instant Messengers for Private Data Protection
----------------------------------------------
The following software has been verified to work correctly with
Private Data Protection:
- Windows Messenger 4.7, 5.0
- MSN Messenger 6.2
- ICQ 4 Lite Edition
Internet connection required for some functions:
------------------------------------------------
* An Internet connection is necessary to register online, download
updates, obtain virus information, browse pages on the Trend Micro Web
site, or send email messages.
* If you use a router to connect to the Internet, make sure your router
doesn't automatically start a dial-up connection for the Intelligent
Update feature because this could result in an extra connection fee.
Modify the router settings as required, or disable Intelligent
Update.
5. Installation
========================================================================
Installing Trend Micro PC-cillin Internet Security 2005 is simple and
only takes a few minutes.
If a previous version of Trend Micro PC-cillin, other than PC-cillin
Internet Security 2004 or PC-cillin Antivirus 2004, or any other virus
protection or firewall program is installed on your computer, remove it
before installing Trend Micro PC-cillin Internet Security 2005.
If Trend Micro PC-cillin Internet Security 2004 or PC-cillin Antivirus
2004 is installed, PC-cillin Internet Security 2005 will use the
existing serial number.
How to install Trend Micro PC-cillin Internet Security 2005
-----------------------------------------------------------
To install Trend Micro PC-cillin Internet Security 2005:
1. Insert the Trend Micro PC-cillin Internet Security 2005
program CD into your CD-ROM drive, and do the following:
* If the menu automatically appears, click Install Program, and
then click Next.
* If the installation program doesn't automatically start, click
Start > Run. In Open, type D:\Setup\setup.exe and click OK
(where D:\ is the drive letter of your CD-ROM). Click Next.
2. Click "I accept the terms in the license agreement" to accept and
continue installing Trend Micro PC-cillin Internet Security 2005.
The installation procedure will quit if you do not accept the terms.
3. Click Next, and then continue to follow the onscreen instructions.
4. Restart the computer.
Refer to the Trend Micro PC-cillin Internet Security 2005 Quick Start
Guide for detailed installation instructions.
6. Post-Installation Configuration
========================================================================
This section provides a list of the most important tasks you have to
complete to get up and running with Trend Micro PC-cillin Internet
Security.
To effectively use Trend Micro PC-cillin Internet Security and start
protecting your computer, Trend Micro strongly recommends that you
perform all of these tasks.
* Register Trend Micro PC-cillin Internet Security.
Register your software to enable updates. Trend Micro PC-cillin
Internet Security 2005 needs to update pattern and program files to
stop the latest viruses (see "Registering Trend Micro PC-cillin
Internet Security" in the Quick Start Guide for instructions).
* Perform a Manual Update.
Trend Micro recommends you update your scan engine and virus
pattern files immediately after installing the product, and regularly
update thereafter. Enable the Intelligent Update option to let Trend
Micro PC-cillin Internet Security automatically update itself (see
"Updating Trend Micro PC-cillin Internet Security" in the Quick Start
Guide for instructions).
* Manually Scan all files.
Perform a complete scan of your computer to ensure there are no
viruses or other malicious programs hiding on your PC (see "Scanning
your entire computer" in the Quick Start Guide for instructions).
Note: Trend Micro recommends that you update your scan engine and
virus pattern files immediately after installing the product.
7. Known Issues
========================================================================
7.1 Software Compatibility
======================================================================
NTT Flets ADSL Connection Tool
------------------------------
When using the Personal Firewall with the NTT Flets ADSL Connection
Tool, configure the NTT Flets ADSL Connection Tool to use Protocol
Driver mode. If it is configured to use Filter Driver mode, the
following functions will not be available:
- Wi-Fi Detection
- Automatic Profile Change
VPN and firewall software
-------------------------
Errors may occur if PC-cillin Internet Security is installed with the
following software:
- AT&T VPN Client
- ZoneAlarm Firewall 5.1
Uninstall these applications before installing PC-cillin Internet
Security 2005.
Uninstall Norton Personal Firewall 2002/2003 before installing
PC-cillin Internet Security 2005 on Windows98/ME, or install PC-
cillin Internet Security in "Antivirus only" mode.
When using some VPN software, the following functions may not be
available:
- Wi-Fi Detection
- Automatic Profile Change
Windows Firewall
----------------
If you enable Personal Firewall, Trend Micro recommends turning off
Windows Firewall to reduce resource usage.
7.2 Personal Firewall
======================================================================
Adding or removing the Personal Firewall
----------------------------------------
You can choose whether to install the Personal Firewall during
installation. However, the Personal Firewall cannot be added or
removed after installation.
Enabling or disabling the Personal Firewall
-------------------------------------------
Close all running programs before you enable or disable the
Personal Firewall. Some systems could experience a temporary slowdown
while starting Trend Micro PC-cillin Internet Security 2005, Internet
Explorer, or other applications immediately after you modify the
Personal Firewall settings.
Changing your Personal Firewall profiles
----------------------------------------
Close all running programs before you change Personal Firewall
profiles. Some systems could experience a temporary slowdown
while starting Trend Micro PC-cillin Internet Security 2005, Internet
Explorer, or other applications immediately after you modify the
Personal Firewall settings.
Exception Rule list priorities
------------------------------
The priority of Exception List rules is based on the location in the
list. Higher location on the list means higher priority. For example,
if you set two rules (the first one to allow port 100 traffic and the
second to deny port 100 traffic), port 100 traffic is permitted
because the first rule is higher on the list. You can change the
priority with arrow buttons on the Exception Rule screen.
Illegal characters for the Exception List rule "Explanation" field
------------------------------------------------------------------
You cannot use the character "|" in the Exception List rule
"Explanation" field.
Personal Firewall security level and displayed Exception List rules
-------------------------------------------------------------------
Depending on the security level you set for the Personal Firewall, the
Exception List rules may or may not be displayed.
Specifying incoming and outgoing ports for Exception List rules
---------------------------------------------------------------
When creating Exception List rules, remember that for incoming rules,
the specified port number is describing a port number on your own
computer. For outgoing rules the port number is describing a port
number on another computer.
About Network Virus Emergency Center
------------------------------------
The Network Virus Emergency Center function is integrated into the
Personal Firewall. Therefore, when the Personal Firewall is disabled,
this function also becomes disabled.
Personal Firewall profile settings for shared network resources
---------------------------------------------------------------
By default, the Personal Firewall provides maximum security to protect
users from network attacks. However, to access local area network
resources (such as file sharing or printer sharing) you must use the
Office network profile in the Firewall Profiles settings.
To apply this Personal Firewall profile, in the system tray,
right-click the program icon and click User profile > Office
network. (The system tray is next to the clock, on the bottom right
hand side of your screen.)
7.3 Other Issues
======================================================================
Connections established before enabling Trend Micro PC-cillin Internet
Security 2005
----------------------------------------------------------------------
Starting Trend Micro PC-cillin Internet Security 2005 shuts down
network connections established while Trend Micro PC-cillin Internet
Security 2005 was disabled.
Wi-Fi Detection
---------------
* Wi-Fi Detection is designed not to run in the following situations:
(1) When the bit mask length of a subnet mask is smaller than 22
(2) When all network adapters are disabled
(3) If no IP address is correctly assigned to it
* If the firewall on the target PC blocks NetBIOS, the host names will
not be displayed.
Update once after installing Trend Micro PC-cillin Internet Security
2005 without registering
--------------------------------------------------------------------
Within a few moments after typing your serial number on the Trend
Micro Internet Security 2005 main screen, a window appears prompting
you to update. After installing Trend Micro PC-cillin Internet
Security 2005 and before registering online, you are permitted to
update only once. Once you close this window, you must register
online to update.
Schedule during manual task scanning
------------------------------------
Scheduled scan tasks are not executed if a Manual Scan was performed
on the same date. Also, if the multiple scan tasks conflict, only the
first scan task is executed, while others are disabled.
How to enable or disable your scheduled scan tasks
--------------------------------------------------
You can enable or disable scan tasks by selecting or clearing the scan
task check box on the left side of the list in the Scan Task screen.
If you clear the check box, the task won't be performed when
scheduled.
All drives scanning
-------------------
The Main UI [Scan For Viruses] and specified scan tasks can scan all
local drives. However, mapped network drives are not included in the
scan. A scan task that includes [Scan For Viruses] and [Scan
Everything] can scan removable disks, such as floppy disks, and CD-ROM
drives. If no media is inserted, it automatically skips and continues
to scan the next drive.
Manual scanning and progress bar status during scan tasks
---------------------------------------------------------
The progress bar calculates the total number of files divided by the
number of scanned files. In the beginning of a Manual Scan or during a
scan task, the progress bar appears to be around 100% because the
number of files initially scanned is almost identical to the
number of files counted. Later the files will be counted much quicker
than they will be scanned and the progress bar will more accurately
reflect the scan progress.
How to clean compressed files
-----------------------------
The ZIP clean (compressed file cleaning) function can handle infected
files in the first layer of compression (files compressed once).
Infected files compressed and divided in more than two layers (for
example, ZIP files compressed again using the ZIP format) cannot be
cleaned automatically.
Turbo Scan
----------
Before beginning Manual Scan with Turbo Scan enabled, PC-cillin
Internet Security checks the target files for modifications
since the last time they were scanned. If there are an extremely
large number of files, enabling Turbo Scan may not provide
a speed improvement.
Security Check
--------------
After completing an update from Windows Update, Security Check
sometimes still detects known security vulnerabilities. Check the
Microsoft Web Site for other security patches such as Office Update.
Spyware Scan
------------
Some items detected by Spyware Scan may not be harmful, and may be
necessary for other software to function properly. Removal of these
items cannot be undone, so practice caution because you are removing
them at your own risk.
Spyware Removal
---------------
Some spyware and other grayware may not be deleted. If this occurs,
check the spyware information by clicking "More Information", then
perform the recommended action or actions.
About Mail Scan
---------------
* If you need to set the specific proxy type with your application
software, the Email Scan may not be performed.
* If your incoming mail server uses a port other than port 110,
incoming (POP3) mail scanning will not function.
* Mail Scan does not support IMAP.
* If your email software's setting leaves a copy of your email on
the mail server, after installing Trend Micro PC-cillin Internet
Security 2005, the messages previously downloaded from the server
will download again.
About Malformed mail warning
----------------------------
When you enable Anti-spam, Private Data Protection, or Email Scan, you
may receive an email message with the title "Malformed mail warning".
This means that Trend Micro PC-cillin Internet Security 2005 has
detected an email that may contain malicious contents and has attached
it to this new email message as a text file. If you need to read the
original email message, Trend Micro recommends you open it as a
text file. To prevent infection, do not save the original email as an
email file and do not reply to this email.
Displaying the virus property of your files
-------------------------------------------
Trend Micro PC-cillin Internet Security 2005 will scan for viruses if
you right-click a file and choose Property from the short-cut menu,
then click the Virus Property tab. However, for some versions of
Windows, the image file types .AWD, .DCX, .PCX, .TIFF, .TIF, .WIF, and
.XIF are associated with a program. Trend Micro recommends that you
don't scan these file types by right clicking them because system
performance could become unstable. Instead, Trend Micro recommends
that you perform a Manual Scan.
Backup files
------------
If you configure Trend Micro PC-cillin Internet Security to create
backup files before the virus cleaning process, these files will be
saved in the Quarantine folder. Backup files can be deleted or
restored using the Quarantine Folder actions. Refer to Trend Micro
PC-cillin Internet Security 2005 online help for detailed instructions
on handling files in the Quarantine Folder.
Default setting for URL Filter, Private Data Protection, and Anti-spam
----------------------------------------------------------------------
By default, the URL Filter, Private Data Protection and Anti-spam
functions are disabled. You need to manually enable these functions.
URL Filter and Private Data Protection do not support all protocols
-------------------------------------------------------------------
The URL Filter function only checks traffic using the HTTP protocol.
The Private Data Protection function only checks traffic using the
HTTP, SMTP, or IM (ICQ, MSN) protocols.
The URL Filter and Private Data Protection functions do not use the
following protocols to check traffic:
- HTTPS
- FTP
- Encrypted communication protocols, such as SSL
- Hyperlinks, such as Microsoft Word/Excel
Also, traffic will not be checked When Proxy Auto-Config (PAC)
is being used.
Webmail Scan and Proxy Auto-Config (PAC)
----------------------------------------
The Webmail Scan function does not support PAC.
Private Data Protection for Instant Messenger
---------------------------------------------
Enabling or disabling Private Data Protection shuts down the
Instant Messenger (ICQ, MSN) connections.
Home Network Control
--------------------
Disable or configure Windows Firewall if it is installed with
Home Network Control. Otherwise, it will block network communication
for Home Network Control. (Home Network Control uses UDP 40116
and TCP 62471. The process name is PcCtlCom.exe.)
Font size on your screen
------------------------
If you select large font size from your computer's Screen Property,
some Trend Micro PC-cillin Internet Security layouts will be distorted.
Trend Micro suggests using small font size.
Trend Micro PC-cillin Internet Security 2005 Online help
--------------------------------------------------------
Install Microsoft Internet Explorer 6.0 Service Pack 1 or above to
correctly view Trend Micro PC-cillin Internet Security 2005 online
help.
Windows XP Guest account
------------------------
The Windows XP Guest account is not supported.
Upgrading Microsoft Windows OS or Service Pack
----------------------------------------------
Remove Trend Micro PC-cillin Internet Security 2005 before upgrading
Windows or the Service Packs.
Pattern files and Scan engine
-----------------------------
You may download pattern files and scan engine updates while your
support period is valid. Note that you are responsible for any fees
charged by your service provider(s) for downloads. For more information
about the product and virus protection, visit the Trend Micro Web site
or the Customer Care Center.
8. Release History
========================================================================
Trend Micro(TM) PC-cillin Internet Security 2005 (12.30) August 2005
Trend Micro(TM) PC-cillin Internet Security 2005 (12.10) December 2004
Trend Micro(TM) PC-cillin Internet Security 2005 (12.0) September 2004
9. Contact Information
========================================================================
A license to the Trend Micro software usually includes the right to
product updates, pattern file updates, and basic technical support for
one (1) year from the date of purchase only. After the first year,
Maintenance must be renewed on an annual basis at Trend Micro's
then-current Maintenance fees.
You can contact Trend Micro via fax, phone, and email, or visit us
at:
http://www.trendmicro.com
Evaluation copies of Trend Micro products can be downloaded from our
Web site.
Global Mailing Address/Telephone Numbers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For global contact information in the Asia/Pacific region, Australia
and New Zealand, Europe, Latin America, and Canada, refer to:
http://www.trendmicro.com/en/about/overview.htm
The Trend Micro "About Us" screen displays. Click the appropriate
link in the "Contact Us" section of the screen.
Note: This information is subject to change without notice.
10. About Trend Micro
========================================================================
Trend Micro, Inc. provides virus protection, anti-spam, and
content-filtering security products and services. Trend Micro allows
companies worldwide to stop viruses and other malicious code from a
central point before they can reach the desktop.
Copyright 2005, Trend Micro Incorporated. All rights reserved.
Trend Micro, the t-ball logo, PC-cillin are trademarks of Trend Micro
Incorporated and are registered in some jurisdictions. All other
marks are the trademarks or registered trademarks of their respective
companies.
11. License Agreement
========================================================================
Information about your license agreement with Trend Micro can be
viewed at:
http://www.trendmicro.com/en/purchase/license/
Third-party licensing agreements can be viewed:
- By selecting the "About" option in the application user
interface
- By referring to the "Legal" page of the Getting Started Guide or
Administrator's Guide
Labels:
about antivirous software
শনিবার, ২ মে, ২০০৯
About Nokia Phone suite software
Nokia is large company in telecommunication sector. Its application is of various kinds by which nokia phone set connect to Pc.It is very important to know all user that how it works .Here are some of its feature of Nokia Pc suite software which can be connet with PC for data transferring works:;::
Nokia PC Suite applications:
Content Copier allows you to back up and restore personal data between a compatible phone and a compatible PC. It also lets you copy information between two compatible Nokia phones.
Nokia PC Sync allows you to synchronise contacts, calendar items, notes, to-do items, and e-mails between a compatible phone and a compatible PC Personal Information Manager (PIM).
Nokia Phone Browser allows you to manage the folders of a compatible phone through Windows Explorer.
Nokia Contacts Editor allows you to view and edit the contacts of a compatible phone on your PC. You can also create, delete and organise contacts in the Contacts view in Nokia Phone Browser.
Nokia Text Message Editor allows you to write and send text messages and print them from your PC. You can also organise text messages in the Messages view in Nokia Phone Browser.
Nokia Application Installer allows you to install Symbian and JavaTM applications from a compatible PC to a compatible phone.
Nokia Audio Manager allows you to create and organise digital music files on a compatible PC and transfer them to a compatible phone.
Nokia Image Converter allows you to modify images and transfer them to a compatible phone as wallpapers, portrait images, and MMS pictures.
Nokia Multimedia Player allows you to play multimedia messages, audio files and video files, and create playlists of your favourite multimedia files. You can also save video and audio files in a format that allows you to use them in a compatible mobile phone or attach them to MMS messages.
Nokia Sound Converter allows you to convert General MIDI ringing tones into Scalable Polyphony MIDI tones and transfer them to a compatible phone.
Image Store allows you to store images and videos from a compatible phone on a PC and view the images and videos after storing using Nokia Multimedia Player or Windows Explorer.
One Touch Access allows you to connect your PC to the Internet using packet data (in GPRS or 3G networks, depending on the phone and network capabilities).
Nokia PC Suite applications:
Content Copier allows you to back up and restore personal data between a compatible phone and a compatible PC. It also lets you copy information between two compatible Nokia phones.
Nokia PC Sync allows you to synchronise contacts, calendar items, notes, to-do items, and e-mails between a compatible phone and a compatible PC Personal Information Manager (PIM).
Nokia Phone Browser allows you to manage the folders of a compatible phone through Windows Explorer.
Nokia Contacts Editor allows you to view and edit the contacts of a compatible phone on your PC. You can also create, delete and organise contacts in the Contacts view in Nokia Phone Browser.
Nokia Text Message Editor allows you to write and send text messages and print them from your PC. You can also organise text messages in the Messages view in Nokia Phone Browser.
Nokia Application Installer allows you to install Symbian and JavaTM applications from a compatible PC to a compatible phone.
Nokia Audio Manager allows you to create and organise digital music files on a compatible PC and transfer them to a compatible phone.
Nokia Image Converter allows you to modify images and transfer them to a compatible phone as wallpapers, portrait images, and MMS pictures.
Nokia Multimedia Player allows you to play multimedia messages, audio files and video files, and create playlists of your favourite multimedia files. You can also save video and audio files in a format that allows you to use them in a compatible mobile phone or attach them to MMS messages.
Nokia Sound Converter allows you to convert General MIDI ringing tones into Scalable Polyphony MIDI tones and transfer them to a compatible phone.
Image Store allows you to store images and videos from a compatible phone on a PC and view the images and videos after storing using Nokia Multimedia Player or Windows Explorer.
One Touch Access allows you to connect your PC to the Internet using packet data (in GPRS or 3G networks, depending on the phone and network capabilities).
Labels:
Software
about speedboat attack game
Here I have written about various things about speedboat attack game from where you will be able to know many things about this good racing games. This informative blog contains many thing about the game like how to install ,technical support, how to configre, how to play , about various features of the game.
Technical Support
-----------------
If you experience any problems please contact:
Technical Support
Telstar Electronic Studios Ltd.
The Studio
62-64 Bridge Street
Walton-on-Thames
Surrey
KT12 1AP
U.K.
Tel: + 44 1932 232299
Fax: +44 1932 252702
Email: games.support@telstar.co.uk
IMPORTANT - PLEASE READ THIS ADDENDUM TO THE SPEEDBOAT ATTACK MANUAL BEFORE CONTACTING TECHNICAL SUPPORT
1. To upload your scores to the Internet Hall of Fame launch the 'Upload scores' option in the Speedboat Attack group on your Windows Start menu rather than from within the game itself.
2. In order to proceed to the next championship league you need to finish in third or higher position at the END of the championship league not in each race as written in the manual.
3. Some functions will only work in certain modes, for example:
· You can only call the repair helicopter when you are playing Action mode
· The special effects camera, toggle map and rear view mirror on/off keys will only work in cockpit view
4. Pressing F12 will save a screen shot to disk. You will find any saved screen shots located in the game directory on your hard disk. The default directory is
c:/program files/criterion studios/speedboat attack/
5. After uninstalling the game some data files may be left behind in the game directory. These will have the file extension .css and are the data for any championship or time trials you saved. If you reinstall the game into the same directory without deleting these files you will still be able to access previously saved games. In addition any screen shots will also remain until you choose to delete them.
6. Please note that 3dfx is the only 3D graphics hardware supported by Speedboat Attack.
7. If you experience any problems with the keys locking in 2 player mode please see below for help.
Network hints and tips
Starting a network game via the Internet, LAN or modem
1. Creating a network game
In any network game one player will act as the game 'host', i.e. that player will create a game and then all the other players will connect to the host's machine. As host you choose the course and game style from the appropriate option screens. Then go to the Network option screen and follow the instructions below.
Note that when you select Network screen you may get a message alerting you to the fact that IPX is not installed on your machine. If so, please see the trouble shooting section below for information on how to install IPX.
a) Select the method of connection, LAN, Modem or Internet
b) Select 'race' or 'deathmatch'
c) Select 'create session'
d) Select the total number of players (if you are playing a modem game this will be a maximum of 2)
e) Click OK
f) If a modem game had been selected the modem dialup box will be displayed. Select 'connect'.
g) Wait for other players to join. Information on which players have joined and how many are left to join will be displayed at the bottom of the screen. Once all players have joined the game will begin.
h) Once in the game any player can pause the game by pressing 'p'. Similarly if any player presses the Escape key the game will be paused. If that player chooses to exit the game at this point a message will be displayed on the other players machines saying, for example, 'James retired' If a player retires from a 2 player game the race is over and will automatically exit to the network screen. All other games will continue whilst there are at least 2 players in the race.
2. Connecting to a game
Once a player has created a game, then you can choose to join that game as follows:
a) Select Network from the main menu. At this point you may get a message alerting you to the fact that IPX is not installed on your machine. If so, please see the trouble shooting section below for information on how to install IPX.
b) Choose the method of connection, i.e. LAN, Modem or Internet
c) Select 'connect'.
d) All current sessions will be displayed; select the session to which you wish to join
e) If 'Internet' game has been selected a dialogue will appear asking you to enter the IP address of the Host machine. Enter IP address as supplied by the Host (you will need to ask the host for this) or alternatively leave blank to search for available sessions.
f) If 'modem' game has been selected a dialogue will appear asking you to enter the phone number of the Host's modem. Again, the Host will need to give you this.
TROUBLE SHOOTING
Common problems
1. IPX not installed
When playing a LAN or modem game you will need to ensure that you have IPX installed on your machine. The easiest way to check whether this is the case is to try and create a LAN game following the instructions above. If IPX is not installed a dialogue will be displayed, both when you enter the network screen and again when you try and create a game. To install IPX follow the instructions below:
1. From the 'Start' button go to 'Settings' and then 'Control Panel'
2. Double click on 'Network' icon
3. In the Configuration window select 'Add'
4. Double click on 'Protocol' and then select 'Microsoft'
5. Select 'IPX/SPX-compatible Protocol' and click OK.
6. You will now be back at the configuration window. In the list of network components double click on the Adapter and select 'Bindings'.
7. Make sure that the box next to IPX/SPX-compatible Protocol is checked.
8. Click OK
9. You will have to restart Windows for the new settings to take effect.
2. Network Connection not working
When attempting to play any network game first ensure that your are connected to the appropriate service. The easiest way to do this is as follows:
LAN:
Try connecting to your network server. If you are unable to do this it is likely that there is a problem with your connection rather than with the game. Contact your network administrator for help.
Modem and Internet:
Try connecting to your service provider. If you are unable to do this it is likely that there is a problem with your connection. Contact your service provider for help.
3. How to find out your IP address
If you are acting as the game host in an Internet game you will need to provide other people with your IP address. Your IP address may change each time you log on. In order to find out your IP address during a particular session follow the instructions below:
1. From the Windows Start Menu select the MS-DOS Prompt
2. At the prompt type 'winipcfg' (Win 95) or ipconfig (Windows NT)
3. Your IP address will be supplied on screen. Make a note of it and then type EXIT to return to Windows.
4. Improving performance
The minimum specification machine required to run Speedboat Attack is a P90 with 16 Mb RAM. Obviously the slower your machine the slower the game will run. However, there are ways you can improve performance:
1) Close all other programs before starting Speedboat Attack.
2) When racing in cockpit view press F3 to turn off the rear view mirror.
3) Select a lower graphics setting. To do this, select 'Configuration' from the 'Game Options' sub-menu and then select 'Graphics'. The default setting is 'High' but you can select 'Medium' or 'Low', this reduces the graphic detail displayed.
5. Keys locking in 2 player mode
Because of the way in which some keyboards are designed you may find that the keys 'lock' when more than 4 keys are used at any one time, for example, when playing 2 player split screen mode. One solution is for one of the players to use the mouse or a joystick/joypad.
To reconfigure the controls used by either player select 'controls' from the 'configuration' sub menu and select which method will be used be each, i.e. keyboard, mouse or joystick. If keyboard is the selected option for both players, select 'configure' next to 'Player1' and once in the configuration screen click on '2 players'. This will display the keys for both players on the screen.
Getting Started
---------------
The Speedboat Attack manual explains the various game elements and controls for the game. For those of you who don't like reading manuals here are the key things you will need to know:
Default keys
· Up arrow Accelerate/Forward
· Down arrow Brake/Reverse
· Left arrow Left
· Right arrow Right
· Ctrl Machine-gun fire
· Space Missile fire
· P Pause
· H Call for Repairing Helicopter
· F2 Toggle through available views
· F3 Cockpit mirror on/off
· F6 Special effects Camera on/off
· F7 Music on/off
· F12 Save screen shot to disk
· Esc Heat aborted, return to main menu
and in two player mode the default keys are:
Player 1
· S Accelerate/Forward
· X Brake/Reverse
· Z Left
· C Right
· Ctrl Machine-gun fire
· Tab Missile fire
· P Pause
· R Call for Repairing Helicopter
· Esc Heat aborted, return to main menu
Player 2
· Up arrow Accelerate/Forward
· Down arrow Brake/Reverse
· Left arrow Left
· Right arrow Right
· Insert Machine-gun fire
· Delete Missile fire
· P Pause
· ] Call for Repairing Helicopter
· Esc Heat aborted, return to main menu
The default keys can be changed in the 'configuration' sub menu.
Technical Support
-----------------
If you experience any problems please contact:
Technical Support
Telstar Electronic Studios Ltd.
The Studio
62-64 Bridge Street
Walton-on-Thames
Surrey
KT12 1AP
U.K.
Tel: + 44 1932 232299
Fax: +44 1932 252702
Email: games.support@telstar.co.uk
IMPORTANT - PLEASE READ THIS ADDENDUM TO THE SPEEDBOAT ATTACK MANUAL BEFORE CONTACTING TECHNICAL SUPPORT
1. To upload your scores to the Internet Hall of Fame launch the 'Upload scores' option in the Speedboat Attack group on your Windows Start menu rather than from within the game itself.
2. In order to proceed to the next championship league you need to finish in third or higher position at the END of the championship league not in each race as written in the manual.
3. Some functions will only work in certain modes, for example:
· You can only call the repair helicopter when you are playing Action mode
· The special effects camera, toggle map and rear view mirror on/off keys will only work in cockpit view
4. Pressing F12 will save a screen shot to disk. You will find any saved screen shots located in the game directory on your hard disk. The default directory is
c:/program files/criterion studios/speedboat attack/
5. After uninstalling the game some data files may be left behind in the game directory. These will have the file extension .css and are the data for any championship or time trials you saved. If you reinstall the game into the same directory without deleting these files you will still be able to access previously saved games. In addition any screen shots will also remain until you choose to delete them.
6. Please note that 3dfx is the only 3D graphics hardware supported by Speedboat Attack.
7. If you experience any problems with the keys locking in 2 player mode please see below for help.
Network hints and tips
Starting a network game via the Internet, LAN or modem
1. Creating a network game
In any network game one player will act as the game 'host', i.e. that player will create a game and then all the other players will connect to the host's machine. As host you choose the course and game style from the appropriate option screens. Then go to the Network option screen and follow the instructions below.
Note that when you select Network screen you may get a message alerting you to the fact that IPX is not installed on your machine. If so, please see the trouble shooting section below for information on how to install IPX.
a) Select the method of connection, LAN, Modem or Internet
b) Select 'race' or 'deathmatch'
c) Select 'create session'
d) Select the total number of players (if you are playing a modem game this will be a maximum of 2)
e) Click OK
f) If a modem game had been selected the modem dialup box will be displayed. Select 'connect'.
g) Wait for other players to join. Information on which players have joined and how many are left to join will be displayed at the bottom of the screen. Once all players have joined the game will begin.
h) Once in the game any player can pause the game by pressing 'p'. Similarly if any player presses the Escape key the game will be paused. If that player chooses to exit the game at this point a message will be displayed on the other players machines saying, for example, 'James retired' If a player retires from a 2 player game the race is over and will automatically exit to the network screen. All other games will continue whilst there are at least 2 players in the race.
2. Connecting to a game
Once a player has created a game, then you can choose to join that game as follows:
a) Select Network from the main menu. At this point you may get a message alerting you to the fact that IPX is not installed on your machine. If so, please see the trouble shooting section below for information on how to install IPX.
b) Choose the method of connection, i.e. LAN, Modem or Internet
c) Select 'connect'.
d) All current sessions will be displayed; select the session to which you wish to join
e) If 'Internet' game has been selected a dialogue will appear asking you to enter the IP address of the Host machine. Enter IP address as supplied by the Host (you will need to ask the host for this) or alternatively leave blank to search for available sessions.
f) If 'modem' game has been selected a dialogue will appear asking you to enter the phone number of the Host's modem. Again, the Host will need to give you this.
TROUBLE SHOOTING
Common problems
1. IPX not installed
When playing a LAN or modem game you will need to ensure that you have IPX installed on your machine. The easiest way to check whether this is the case is to try and create a LAN game following the instructions above. If IPX is not installed a dialogue will be displayed, both when you enter the network screen and again when you try and create a game. To install IPX follow the instructions below:
1. From the 'Start' button go to 'Settings' and then 'Control Panel'
2. Double click on 'Network' icon
3. In the Configuration window select 'Add'
4. Double click on 'Protocol' and then select 'Microsoft'
5. Select 'IPX/SPX-compatible Protocol' and click OK.
6. You will now be back at the configuration window. In the list of network components double click on the Adapter and select 'Bindings'.
7. Make sure that the box next to IPX/SPX-compatible Protocol is checked.
8. Click OK
9. You will have to restart Windows for the new settings to take effect.
2. Network Connection not working
When attempting to play any network game first ensure that your are connected to the appropriate service. The easiest way to do this is as follows:
LAN:
Try connecting to your network server. If you are unable to do this it is likely that there is a problem with your connection rather than with the game. Contact your network administrator for help.
Modem and Internet:
Try connecting to your service provider. If you are unable to do this it is likely that there is a problem with your connection. Contact your service provider for help.
3. How to find out your IP address
If you are acting as the game host in an Internet game you will need to provide other people with your IP address. Your IP address may change each time you log on. In order to find out your IP address during a particular session follow the instructions below:
1. From the Windows Start Menu select the MS-DOS Prompt
2. At the prompt type 'winipcfg' (Win 95) or ipconfig (Windows NT)
3. Your IP address will be supplied on screen. Make a note of it and then type EXIT to return to Windows.
4. Improving performance
The minimum specification machine required to run Speedboat Attack is a P90 with 16 Mb RAM. Obviously the slower your machine the slower the game will run. However, there are ways you can improve performance:
1) Close all other programs before starting Speedboat Attack.
2) When racing in cockpit view press F3 to turn off the rear view mirror.
3) Select a lower graphics setting. To do this, select 'Configuration' from the 'Game Options' sub-menu and then select 'Graphics'. The default setting is 'High' but you can select 'Medium' or 'Low', this reduces the graphic detail displayed.
5. Keys locking in 2 player mode
Because of the way in which some keyboards are designed you may find that the keys 'lock' when more than 4 keys are used at any one time, for example, when playing 2 player split screen mode. One solution is for one of the players to use the mouse or a joystick/joypad.
To reconfigure the controls used by either player select 'controls' from the 'configuration' sub menu and select which method will be used be each, i.e. keyboard, mouse or joystick. If keyboard is the selected option for both players, select 'configure' next to 'Player1' and once in the configuration screen click on '2 players'. This will display the keys for both players on the screen.
Getting Started
---------------
The Speedboat Attack manual explains the various game elements and controls for the game. For those of you who don't like reading manuals here are the key things you will need to know:
Default keys
· Up arrow Accelerate/Forward
· Down arrow Brake/Reverse
· Left arrow Left
· Right arrow Right
· Ctrl Machine-gun fire
· Space Missile fire
· P Pause
· H Call for Repairing Helicopter
· F2 Toggle through available views
· F3 Cockpit mirror on/off
· F6 Special effects Camera on/off
· F7 Music on/off
· F12 Save screen shot to disk
· Esc Heat aborted, return to main menu
and in two player mode the default keys are:
Player 1
· S Accelerate/Forward
· X Brake/Reverse
· Z Left
· C Right
· Ctrl Machine-gun fire
· Tab Missile fire
· P Pause
· R Call for Repairing Helicopter
· Esc Heat aborted, return to main menu
Player 2
· Up arrow Accelerate/Forward
· Down arrow Brake/Reverse
· Left arrow Left
· Right arrow Right
· Insert Machine-gun fire
· Delete Missile fire
· P Pause
· ] Call for Repairing Helicopter
· Esc Heat aborted, return to main menu
The default keys can be changed in the 'configuration' sub menu.
description about bijoy
I have written a lot of things about bijoy in this blog.How to install, Bijoy-2000 versions good sides, how this bangla font works in pc, why it is improtnat for users ,how to configre it into PC etc. It is a documentary blog .Not every people choice it but choice who need it. Here it is below:::::
Hello, it is great to release a software for writing Bangla when we are
into the new millenium.
Please note the following:
1. Before you install Bijoy-2000 please install Bijoy Fonts to your systems which
will help you to read Bijoy Guide.
2. Make sure that you use the authorised Bijoy Keyboard for eaxct typing as there
are a few updates on Bijoy Keyboard. Presently only Perfect Keyboard is the
authorised Keyboard.
3. Bijoy 2000 is the latest version of our most popular software Bijoy. Make sure
you do not have an old copy of Bijoy installed in your system.
4. This version is good for Win NT 4.0 and Windows 2000 as other versions of
Bijoy does not work good with these two OSes.It will however run on
Windows 95 and Windows 98 also.
If you have an older system like Windows 3.1, please ask for the older version
of Bijoy which will be Bijoy 4.0.
5. As this is a 32 bit software we have changed some behaviour of Bijoy-2000
which are as follows.
a) Putting the cursor on the Bijoy Icon at the bottom which is popularly
known as task bar click right mouse button to open the dialogue box of Bijoy.
b) You can make Bijoy active or inactive from the Bijoy dialogue box/startup menu.
You can also have Help from Bijoy dialogue box.
c) Bijoy Logo is no more in the menu bar area. It is in the bottom.
d) You will have a Color Logo now.
6) We have given two Folders wihthin Bijoy-2000 Folder. One folder contains installer.
Another folder has the Fonts.
7) Bijoy 2000 includes Bijoy Keyboard only. If you need more keyboards like
Munir, National, Satyajit, Gitanjali etc, you might ask for Bijoy Pro.
Bijoy Pro is scheduled to be released in March 2000.
8) When you install Bijoy you are asked to put a serial number. Please write your
Licence number there. However Bijoy will work even if you write any other number
in the field.
9) Please note that Bijoy is licensed only with the signature of
Mustafa Jabbar. Any software which does not include a original signed licence from
Mustafa Jabbar is not an original software.
Enjoy writing with Bijoy-2000.
Thanking You,
Mustafa Jabbar
Ananda Computers
8/6, Segun Bagicha,
Dhaka-1000, Bangladesh
Ph: 9554731, 9560669.
Fax: 8802-9562517
E-Mail: ananda@bdlink.com
BCS Computer City, Dhaka Office:
Srishty
101, BCS Computer City, IDB Bhavan
Dhaka-1215
Chittagong:
870, Sheikh Mujib Road, Chittagong
Phone: 031-712254, 712207
Motijheel Office:
188 Motijheel Circular Road, Dhaka-1000
Bogra Office:
Sherpur Road (Opposit Satani House)
Bogra
India Distributor
Sonolite
55, Eliot Road, Calcutta-700016
Phone:2299967
E-Mail: hyder@vsnl.com
Keyboard Licencee
Computer Source
House#11/B, Road No 12 (New)
Dhanmondi R/A
Phone: 9127592, 9132827, 8125970
E-Mail:source@citechco.net
$$$$$$$$$$$$$$$$$$$$$$$$$$
$ $
$ S/N: B2000-01-0001301 $
$ $
$$$$$$$$$$$$$$$$$$$$$$$$$$
Hello, it is great to release a software for writing Bangla when we are
into the new millenium.
Please note the following:
1. Before you install Bijoy-2000 please install Bijoy Fonts to your systems which
will help you to read Bijoy Guide.
2. Make sure that you use the authorised Bijoy Keyboard for eaxct typing as there
are a few updates on Bijoy Keyboard. Presently only Perfect Keyboard is the
authorised Keyboard.
3. Bijoy 2000 is the latest version of our most popular software Bijoy. Make sure
you do not have an old copy of Bijoy installed in your system.
4. This version is good for Win NT 4.0 and Windows 2000 as other versions of
Bijoy does not work good with these two OSes.It will however run on
Windows 95 and Windows 98 also.
If you have an older system like Windows 3.1, please ask for the older version
of Bijoy which will be Bijoy 4.0.
5. As this is a 32 bit software we have changed some behaviour of Bijoy-2000
which are as follows.
a) Putting the cursor on the Bijoy Icon at the bottom which is popularly
known as task bar click right mouse button to open the dialogue box of Bijoy.
b) You can make Bijoy active or inactive from the Bijoy dialogue box/startup menu.
You can also have Help from Bijoy dialogue box.
c) Bijoy Logo is no more in the menu bar area. It is in the bottom.
d) You will have a Color Logo now.
6) We have given two Folders wihthin Bijoy-2000 Folder. One folder contains installer.
Another folder has the Fonts.
7) Bijoy 2000 includes Bijoy Keyboard only. If you need more keyboards like
Munir, National, Satyajit, Gitanjali etc, you might ask for Bijoy Pro.
Bijoy Pro is scheduled to be released in March 2000.
8) When you install Bijoy you are asked to put a serial number. Please write your
Licence number there. However Bijoy will work even if you write any other number
in the field.
9) Please note that Bijoy is licensed only with the signature of
Mustafa Jabbar. Any software which does not include a original signed licence from
Mustafa Jabbar is not an original software.
Enjoy writing with Bijoy-2000.
Thanking You,
Mustafa Jabbar
Ananda Computers
8/6, Segun Bagicha,
Dhaka-1000, Bangladesh
Ph: 9554731, 9560669.
Fax: 8802-9562517
E-Mail: ananda@bdlink.com
BCS Computer City, Dhaka Office:
Srishty
101, BCS Computer City, IDB Bhavan
Dhaka-1215
Chittagong:
870, Sheikh Mujib Road, Chittagong
Phone: 031-712254, 712207
Motijheel Office:
188 Motijheel Circular Road, Dhaka-1000
Bogra Office:
Sherpur Road (Opposit Satani House)
Bogra
India Distributor
Sonolite
55, Eliot Road, Calcutta-700016
Phone:2299967
E-Mail: hyder@vsnl.com
Keyboard Licencee
Computer Source
House#11/B, Road No 12 (New)
Dhanmondi R/A
Phone: 9127592, 9132827, 8125970
E-Mail:source@citechco.net
$$$$$$$$$$$$$$$$$$$$$$$$$$
$ $
$ S/N: B2000-01-0001301 $
$ $
$$$$$$$$$$$$$$$$$$$$$$$$$$
about trendpc-cillin software
I have wrote here some words about how to install trend pc-cillin antivirous software in your laptop or desktop pc and why it is different from other antivirous software. I have also written that why I have choice that and its various features which can attract anyone choosing this antivirous software for their PC.I have mentioned some informations about Trend PC-Cillin software 2005 version below:::::
1. About Trend Micro PC-cillin Internet Security 2005
========================================================================
Trend Micro PC-cillin Internet Security 2005 delivers comprehensive
protection against all types of viruses, worms, Trojans, and blended
threats, including network viruses. It also blocks hackers, spyware,
phishing attacks, inappropriate content, and spam. Featuring Home
Network Control and Wi-Fi Intrusion Detection, it is the first
personal Internet security solution designed to extend desktop
security to your home and wireless networks.
1.1 Overview of This Release
=====================================================================
Trend Micro PC-cillin Internet Security 2005 version 12.40 provides
the Pattern Rollback Tool. This tool ensures that PC-cillin is
using a stable virus pattern file to keep the machine environment
secure.
This release also enables PC-cillin Internet Security to support
incremental pattern file updates to reduce the size of downloads
when updating product components.
2. What's New
========================================================================
Pattern Rollback Tool
---------------------
The Pattern Rollback Tool removes the latest virus pattern file in a
user's computer and restores the previous one. Users can run this tool
when PC-cillin Internet Security does not start normally after loading
the latest virus pattern file.
Incremental pattern file update
-------------------------------
Updating pattern files incrementally results in smaller file sizes,
which allows faster downloads when updating program components.
Subscription renewal
--------------------
PC-cillin Internet Security subscription can now be renewed from the
Registration screen of the PC-cillin console.
2.1 Resolved Known Issues (from 12.10 version)
=====================================================================
Initialization
--------------
Initializing PC-cillin Internet Security usually takes some time to
complete. In release 12.40, PC-cillin Internet Security was optimized
for faster initialization.
Rescue Disk
-----------
When scanning viruses using a pattern file rescue disk, failure to
read the division pattern may occur. After installing this version,
this problem will no longer occur.
Network virus pattern loading
-----------------------------
The process of loading network virus patterns has been improved so
that users will not get the message "Unable to update the network
virus pattern for the personal firewall".
Manual Scan
-----------
Users can now stop Manual Scan on demand even if scanning is not yet
complete.
Processing time for big debug log file
--------------------------------------
PC-cillin Internet Security has been optimized for faster processing
of large debug logs.
Security Check
--------------
This version allows the "Results" screen of Security Check to be
closed.
Manual Scan with compressed file
---------------------------------
In the "Manual Scan" result screen, uncleanable viruses in compressed
files are grayed out and cannot be selected.
Private Data Protection
-----------------------
When detecting private data sent by Internet Messenger, the detection
screen shows the receiver's name all the time.
3. Documentation Set
========================================================================
In addition to this readme file, the documentation set for this
product includes the following:
o Online help -- Context-sensitive help screens that provide guidance
for performing a task
o Quick Start Guide -- product overview, installation planning,
installation and configuration instructions, and basic information
intended to get you "up and running"
o Knowledge Base -- a searchable database of known product issues,
including specific problem-solving and troubleshooting topics.
http://kb.trendmicro.com/solutions/
Electronic versions of the printed manuals are available at:
http://www.trendmicro.com/download
4. System Requirements
========================================================================
Operating System:
-----------------
Microsoft(TM) Windows(TM) 98
Microsoft Windows 98 SE
Microsoft Windows Me
Microsoft Windows 2000 Professional with Service Pack 4 or above
Microsoft Windows XP Home or Professional with Service Pack 1, 2
Microsoft Windows XP Media Center Edition
Microsoft Windows XP Tablet PC Edition
CPU:
----
* Intel Pentium(TM) 233MHz or equivalent processor for
Windows 98, 98SE, Me
* Intel Pentium 300MHz or equivalent processor for Windows 2000, XP
* Intel Hyper-Threading supported
Memory:
-------
* 64MB of RAM for Windows 98, 98SE, Me, 2000
(128MB or above is recommended)
* 128MB of RAM for Windows XP
For all installations:
----------------------
* Internet Explorer 6.0 with Service Pack 1 or above
* 100MB of available hard disk space for installation
* Adobe(TM) Acrobat(TM) is required to view documentation that is
provided in PDF format. You can download the free Acrobat Reader(TM)
software at http://www.adobe.com.
* RAID is not supported.
* A monitor with a resolution of 800 x 600 pixels or more, and
High Color (65536 colors) or more
1. About Trend Micro PC-cillin Internet Security 2005
========================================================================
Trend Micro PC-cillin Internet Security 2005 delivers comprehensive
protection against all types of viruses, worms, Trojans, and blended
threats, including network viruses. It also blocks hackers, spyware,
phishing attacks, inappropriate content, and spam. Featuring Home
Network Control and Wi-Fi Intrusion Detection, it is the first
personal Internet security solution designed to extend desktop
security to your home and wireless networks.
1.1 Overview of This Release
=====================================================================
Trend Micro PC-cillin Internet Security 2005 version 12.40 provides
the Pattern Rollback Tool. This tool ensures that PC-cillin is
using a stable virus pattern file to keep the machine environment
secure.
This release also enables PC-cillin Internet Security to support
incremental pattern file updates to reduce the size of downloads
when updating product components.
2. What's New
========================================================================
Pattern Rollback Tool
---------------------
The Pattern Rollback Tool removes the latest virus pattern file in a
user's computer and restores the previous one. Users can run this tool
when PC-cillin Internet Security does not start normally after loading
the latest virus pattern file.
Incremental pattern file update
-------------------------------
Updating pattern files incrementally results in smaller file sizes,
which allows faster downloads when updating program components.
Subscription renewal
--------------------
PC-cillin Internet Security subscription can now be renewed from the
Registration screen of the PC-cillin console.
2.1 Resolved Known Issues (from 12.10 version)
=====================================================================
Initialization
--------------
Initializing PC-cillin Internet Security usually takes some time to
complete. In release 12.40, PC-cillin Internet Security was optimized
for faster initialization.
Rescue Disk
-----------
When scanning viruses using a pattern file rescue disk, failure to
read the division pattern may occur. After installing this version,
this problem will no longer occur.
Network virus pattern loading
-----------------------------
The process of loading network virus patterns has been improved so
that users will not get the message "Unable to update the network
virus pattern for the personal firewall".
Manual Scan
-----------
Users can now stop Manual Scan on demand even if scanning is not yet
complete.
Processing time for big debug log file
--------------------------------------
PC-cillin Internet Security has been optimized for faster processing
of large debug logs.
Security Check
--------------
This version allows the "Results" screen of Security Check to be
closed.
Manual Scan with compressed file
---------------------------------
In the "Manual Scan" result screen, uncleanable viruses in compressed
files are grayed out and cannot be selected.
Private Data Protection
-----------------------
When detecting private data sent by Internet Messenger, the detection
screen shows the receiver's name all the time.
3. Documentation Set
========================================================================
In addition to this readme file, the documentation set for this
product includes the following:
o Online help -- Context-sensitive help screens that provide guidance
for performing a task
o Quick Start Guide -- product overview, installation planning,
installation and configuration instructions, and basic information
intended to get you "up and running"
o Knowledge Base -- a searchable database of known product issues,
including specific problem-solving and troubleshooting topics.
http://kb.trendmicro.com/solutions/
Electronic versions of the printed manuals are available at:
http://www.trendmicro.com/download
4. System Requirements
========================================================================
Operating System:
-----------------
Microsoft(TM) Windows(TM) 98
Microsoft Windows 98 SE
Microsoft Windows Me
Microsoft Windows 2000 Professional with Service Pack 4 or above
Microsoft Windows XP Home or Professional with Service Pack 1, 2
Microsoft Windows XP Media Center Edition
Microsoft Windows XP Tablet PC Edition
CPU:
----
* Intel Pentium(TM) 233MHz or equivalent processor for
Windows 98, 98SE, Me
* Intel Pentium 300MHz or equivalent processor for Windows 2000, XP
* Intel Hyper-Threading supported
Memory:
-------
* 64MB of RAM for Windows 98, 98SE, Me, 2000
(128MB or above is recommended)
* 128MB of RAM for Windows XP
For all installations:
----------------------
* Internet Explorer 6.0 with Service Pack 1 or above
* 100MB of available hard disk space for installation
* Adobe(TM) Acrobat(TM) is required to view documentation that is
provided in PDF format. You can download the free Acrobat Reader(TM)
software at http://www.adobe.com.
* RAID is not supported.
* A monitor with a resolution of 800 x 600 pixels or more, and
High Color (65536 colors) or more
how to install gta
My blog is about installing Grand theft Auto .Some people do wrongs about it.If anyone follow this he or she can do this easily .It is game installation instruction article
Insert Grand Theft Auto III disc one into the CD / DVD drive.
If you have Autoplay enabled then the setup routine will automatically
launch.
If you do not have Autoplay enabled, then use Explorer to navigate
Grand Theft Auto III disc one, and manually launch setup.exe
Footprint
Grand Theft Auto III requires approximately 700 MB of hard disk space.
Save Games
Grand Theft Auto III uses the “My Documents” directory of the currently
logged in user to store the “GTA3 USER FILES” directory. This is where
we store save games. This was chosen to allow each user on Windows 2000
or Windows XP to have their own saves.
Uninstallation
When Grand Theft Auto III is uninstalled, we do not delete the “MP3”,
“SKINS” and “GTA3 USER FILES” directories. It is up to the user to
remove these manually.
Insert Grand Theft Auto III disc one into the CD / DVD drive.
If you have Autoplay enabled then the setup routine will automatically
launch.
If you do not have Autoplay enabled, then use Explorer to navigate
Grand Theft Auto III disc one, and manually launch setup.exe
Footprint
Grand Theft Auto III requires approximately 700 MB of hard disk space.
Save Games
Grand Theft Auto III uses the “My Documents” directory of the currently
logged in user to store the “GTA3 USER FILES” directory. This is where
we store save games. This was chosen to allow each user on Windows 2000
or Windows XP to have their own saves.
Uninstallation
When Grand Theft Auto III is uninstalled, we do not delete the “MP3”,
“SKINS” and “GTA3 USER FILES” directories. It is up to the user to
remove these manually.
Labels:
installing Grand Theft Auto
job aplication(phase-2)
how to write a job application below:
To,
The General Manager (Admin),
Dhaka Electric Supply Company (LTD),
Banani Model Town,
Dhaka-1213.
Subject : Prayer for the post of “Assistant”
Sir,
In response to your advertisement in daily Ittefaq dated 15th January in 2009 for the post of “Assistant” I beg to offer myself as one of the candidates . If you consider me I would be greatful to you.
May I therefore, hope and pray that you would be kind enough to consider me for the post.
Dated : 30-03-2009 Your faithfully
Md. Kudrat-E-Khuda
To,
The General Manager (Admin),
Dhaka Electric Supply Company (LTD),
Banani Model Town,
Dhaka-1213.
Subject : Prayer for the post of “Assistant”
Sir,
In response to your advertisement in daily Ittefaq dated 15th January in 2009 for the post of “Assistant” I beg to offer myself as one of the candidates . If you consider me I would be greatful to you.
May I therefore, hope and pray that you would be kind enough to consider me for the post.
Dated : 30-03-2009 Your faithfully
Md. Kudrat-E-Khuda
Labels:
job aplication(phase-2)
job aplication
how to write a job application shortly ,I have wanted to wrote it below .So that
nobody do not do mistake at writing job application easily within a shortest matter
of time. One can do it like below:::::
To,
The General Manager (Admin),
Dhaka Electric Supply Company (LTD),
Banani Model Town,
Dhaka-1213.
Subject : Prayer for the post of “Assistant”
Sir,
In response to your advertisement in daily Ittefaq dated 15th January in 2009 for the post of “Assistant” I beg to offer myself as one of the candidates . If you consider me I would be greatful to you.
May I therefore, hope and pray that you would be kind enough to consider me for the post.
Dated : 30-03-2009 Your faithfully
Md.A
nobody do not do mistake at writing job application easily within a shortest matter
of time. One can do it like below:::::
To,
The General Manager (Admin),
Dhaka Electric Supply Company (LTD),
Banani Model Town,
Dhaka-1213.
Subject : Prayer for the post of “Assistant”
Sir,
In response to your advertisement in daily Ittefaq dated 15th January in 2009 for the post of “Assistant” I beg to offer myself as one of the candidates . If you consider me I would be greatful to you.
May I therefore, hope and pray that you would be kind enough to consider me for the post.
Dated : 30-03-2009 Your faithfully
Md.A
Labels:
job application
environment pollution
Now a days ,Mouchak road is the busiest road in the city Dhaka.I see here the same problem as I face in the sadarghat area. I find here hardly any existence of trees . The whole area is full of multistoried buildings , shops and markets . the place is crowded with people . Mountebanks and hawkers are found canvassing their goods at the top of their voice through mikes which cause serious sound pollution . Traffic jam is a common scene here . No passenger knows when he will reach his destination . Moreover reckless driving often causes accident for which sometimes people fall a victim of unnatural death. The drivers of the vehicles drive their cars at their sweet well. Smoke emitted from buses, trucks , tempo and other motor vehicles polluted air for which people cant inhale fresh air. It is high time we took necessary measures to get rid of all these problems . The city corporation can play a vital role in this regard . Well planned spacious roads should be constructed to avoid traffic jam. Traffic rules should be imposed strictly so that the drivers are bound to obey them.
Labels:
environment pollution
shot comment about tress
Now a trees are becoming a very important thing for the world.we should plant more trees to save this world from extinction. Trees are not too pricy . Some of it is cheap . We should plant more for many reasons . Trees are many kinds.
Labels:
trees(short)
the harmful effects of TV
Today TV is the most important mode of entertainment to all classes and ages of people . In the towns and cities , there is hardly any house where there is not a TV set . Even in the villages , we see that wealthy persons have a TV set . But the young generation is badly addicted to it which set us thinking . Though , all the programmes on the TV are not harmful , we have to think what it is giving and taking away from our young generation . Young people most often watch the exciting films on violence and crime . They also see the obscene films . All these things leave a damaging effect on their soft mind . If once bad things lay root deeply in their soft mind , it will remain in their mind . They will try to commit crimes and violence in an aristocratic way and it needs no telling that young persons are going astray day by day. They are becoming addicted to narcotics . They don’t like any kind of educative programme. So, the guardian should be more cautious in the matter of running TV. They should allow their boys and girls to see only those programmes from which thy can derive much benefit and make the right use to build up their career. Again , we should not forget the proverb that forbidden things always taste sweet.
Labels:
Harmful effects of TV
The bad sides of Dhaka city
Mouchak road is the busiest road in the city Dhaka.I see here the same problem as I face in the sadarghat area. I find here hardly any existence of trees . The whole area is full of multistoried buildings , shops and markets . the place is crowded with people . Mountebanks and hawkers are found canvassing their goods at the top of their voice through mikes which cause serious sound pollution . Traffic jam is a common scene here . No passenger knows when he will reach his destination . Moreover reckless driving often causes accident for which sometimes people fall a victim of unnatural death. The drivers of the vehicles drive their cars at their sweet well. Smoke emitted from buses, trucks , tempo and other motor vehicles polluted air for which people cant inhale fresh air. It is high time we took necessary measures to get rid of all these problems . The city corporation can play a vital role in this regard . Well planned spacious roads should be constructed to avoid traffic jam. Traffic rules should be imposed strictly so that the drivers are bound to obey them
Labels:
Dhaka city
এতে সদস্যতা:
পোস্টগুলি (Atom)