Cool Application – Photosynth

Have you been taking lots of pictures, have you created videos, what next. There is a really cool technology call Photosynth.

This is a site on the net where you upload you pictures and the site bring all you photos together into an interactive picture.

 

Think about this,

How many people took pictures of the moment when Obama takes the oath?

How many different angles where there, would it be great if you could virtually move you view of the event by clicking on pictures and look at the event from different points of view.

To see a demo go here

http://edition.cnn.com/SPECIALS/2009/44.president/inauguration/themoment/

 

To create your own Photosynth go here

http://photosynth.net/learn.aspx

To see more Photosynth

http://photosynth.net/

Keyboard Shortcuts for Windows Vista

Vista Shortcuts using the Windows key:

Window key+B Sets focus to first icon in the notification area. You can use arrow keys to move among the icons in the notification area or press Tab to move around
on the taskbar.

Window key+D
Show Desktop (without the Sidebar).

Window key+E Windows Explorer (opens to Computer).

Window key+F Find Files or Folders (aka Search).

Window key+M Minimize All windows (Sidebar not included).

Window key+Shift+M Undo Minimize All Windows.

Window key+R Open the Run dialog box.

Window key+Tab 3-D Flip (flips you through your applications but with a cool graphic instead of the standard Alt+Tab). Requires the use of the Aero user interface.

Window key+Pause/Break System Properties.

Window key+F1 Windows Help.

Window key+L Locks workstation. If the user account has a password, it must be reentered to unlock the system again.

Window key+U Ease of Access Settings.

Window key+Spacebar This shows the Sidebar (the Sidebar must be open, but minimized).

Ctrl+Window key+Tab Brings up Flip-3D, but it will stay on the desktop so you can scroll up, down, left and right.

Security resources

A great site for look to see if you have application, operating system or hardware with security holes is http://secunia.com/.

I call this the equal opportunity security bug site. You can find information on Windows, on next page d-link, Cisco and all other products.

 

You can subscribe to get updates regularly. Interesting when you look at site you find more Linux security issues then Windows Issues.

 

Server 2008 r2 Beta

After much anticipation, Microsoft has now made Windows 7 Beta available for evaluation and testing to IT professionals! But most people did not realize that Server 2008 R2 is now able to be download as well.

Interesting I have Lenovo w700 Quad Core laptop with 8 gigs of memory and installing the Server 2008 r2 all but 3 drivers was found for me by the OS! That because Server 2008 r2 uses the same drivers as Vista 64.

Windows 7 and Server 2008 r2 are the same Operating System just features are missing or installed based on the version. for example Hyper-v will only come in server operating system. FYI Server 2008 r2 is 64 bit only !

For TechNet subscribers, you can download Windows 7 Beta today here


 
 

Windows 7 Beta

After much anticipation, Microsoft has now made Windows 7 Beta available for evaluation and testing to IT professionals! For TechNet subscribers, you can download Windows 7 Beta today here. On January 9th, the beta will open to all IT professionals on the Springboard Series for Windows 7.

 

I been using the for some time and I been very stable and found most of the device I had on my computer, what interesting is the when I installed windows Vista 64 I had a small problem finding Drivers, with the beta of Windows 7 it was a much easier solution .

Keyboard Shortcuts for Windows 7

Windows 7 boasts a lot of great new shortcuts

Here are some to use

Win+Home: Clear all but the active window

Win+Space: All windows become transparent so you can see through to the desktop

Win+Up
arrow: Maximize the active window

Win+Down arrow: Minimize the window/Restore the window if it’s maximized

Win+Left/Right arrows: Dock the window to each side of the monitor (If you’ve got dual monitors, adding Shift to the mix (e.g., Win+Shift+Right arrow) will move the window to the adjacent monitor.)

Win+T: Focus and scroll through items on the taskbar.

Win+P: Adjust presentation settings for your display

Win+(+/-): Zoom in/out

Shift+Click
a taskbar item: Open a new instance of that application

UAC and WINDOWS 7

Now with Windows 7 you can control how the UAC function work so you can reduce all warning and make the notifications about System UAC prompts less harsh..

 

User Account Control (UAC)

Why User Account Control (UAC)is a technology and security infrastructure introduced with Microsoft ‘s Windows Vista operating system. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase in privilege level.

How many of us work on our computer as Administrator?

This is bad if you are using your XP computer and surf the web, stuff could happen. for example

I go to the bad web site that want to load malware on to my computer, because I am login in as administrator the computer believes that I have all the knowledge to protect my computer, so if I click on something to install it does, with no warnings.

In VISTA the UAC function act this way;

1f you are login into vistas as administrator vista has a new method for security called SPLIT token You look like you are login in as Administrator but you are using a standard user profile and when an APPLICATION or process needs Admin privileges you are prompted to give THAT process ONLY Admin permissions so rest of operating system is still running as standard user.

For those of you who use Linux this is different from SU as ROOT when now the WHOLE computer is no running as ROOT.

UAC allow only that process to be elevated. THIS IS GREAT.


Besides disabling many important security features built into Windows, disabling UAC also poses a risk relating to application compatibility.

Important security features:

UAC stops administrative programs from running that you do not start. With UAC on, no program can run with admin control of your computer without your permission. Disabling UAC allows any program to use your administrative power, even if you do not start it.

UAC is also the technology that allows Internet Explorer Protected Mode to work – turning off UAC gets rid of that.

Application Compatibility:

Many non-administrative programs assume that they will be running with administrative power, and so they write settings or files to locations that they are not supposed to write to (such as Program Files).

In Vista under UAC, non-admin programs cannot do this, even if the user is an administrator, so UAC has to deal somehow with these programs, since there are a bunch of them that do this.

In order to get these programs to work in Vista, UAC watches for these common write-to-protected-location scenarios. When it detects a write to a monitored location that is failing because the program does not have administrator power, UAC makes a copy of the modified data and saves it inside of your user profile folder WITHOUT modifying the file/data in the protected location, while making the program THINK that it was saved to the protected location.

Whenever a non-compliant program opens a file in a protected location, UAC first checks to see if there is a “modified” version of that file inside of your user profile folder, and if so, opens the modified file instead of the original, without the program realizing it.

This allows the program to function by making it THINK that it is writing to a protected location, when in reality it is not.

When you disable UAC, this compatibility feature of UAC is turned off.

This means that all those hidden copies of modified data are now invisible to applications, since they will be seeing the original, unmodified data that exists inside of the real protected folder that they now have access to.

The consequences of this transition can be quite drastic if you have many programs on your computer that relied on this compatibility feature to function, since they will no longer have access to any created or modified data that they think they have saved to protected locations – instead, they will only see the original data that was probably put in place when their application was installed.