Digital Photo Id Cards, Greate Info


Digital Photo ID Cards
By Frank White

Q: What do you need to make a Digital Photo ID Card?
A: Making digital photo ID cards typically requires several components all working together.
1. You need a computer on which you run the photo ID badge software. You cannot print the cards on a PVC card printer without a computer – the printer can't perform anything without the computer.
2. You need software and it must:
a) Offer a database to store the names and personal information of the people for whom you want to issue badges.
b) Provide a way to integrate image capture with the database – not only import images, but associate the images with specific database records.
c) Provide a way to design and edit badges.
d) Send badges from the computer to a card printer. Badging software, like other business applications, comes in a variety of "flavors" – from low-end to high-end. That is, in addition to performing the simple processes described above, the application may come with many other "features" which enhance the usability and functionality of the application. Features might include requiring a secure log-on, allowing the user to add, delete, or edit database fields and create or print reports, etc.
3. You need a PVC card printer to print the badges. PVC (polyvinylchloride) is the same material that your white plastic household plumbing pipes are made out of. It is porous enough to allow colored inks to be absorbed into the surface of the plastic using a "dye sublimation" process, yet durable enough to last years. The PVC printer allows you to print a photo ID badge directly to a plastic card. The non-digital process required cutting and pasting an instant photo and inserting it into a laminated pouch which must then be sealed by sending it through a heat laminator.
4. You need a digital camera or other "input" device. Your PC and software must allow you to:
a) Plug in a camera.
b) Capture the image through the software. More versatile systems will allow you to capture portraits through video cameras, digital cameras, scanners, or by importing from a file –an "import from file" feature allows someone to send a picture to you by email as a file attachment, which you can then import into the database.
5. Additional hardware may be required, such as a video capture board for certain video cameras, tape backup device, UPS (uninterrupted power supply), etc. Video capture boards, for example, are installed in a PCI or AGP expansion slot on your PC's motherboard. The camera usually plugs directly into these boards. Special lighting may need to be set up where you take portrait pictures. If you want to incorporate fingerprints and signatures in your database and badge, then additional image capture devices will be required for them.
6. Consumables are also part of the package. You will need blank or pre-printed PVC cards and printer ribbons (usually in rolls which print from 250-350 cards per).

How To Make Your Own Radio Station

::Must HAVE Winamp (Any Version)::
First, things First your speed has to be at least 256/64 kbps (which means Dial-up users, will have alot of latency, just dnt bother)
Second, your going to have to have a domain, an updated one with the current i.p active. (Could be anything e.g. My sig)


Now, Your gonna have to download the Shoutcast Files.


Go to www.shoutcast.com to get the files.


Ok After downloading these, installing Both of them in any order i dnt care. Go to START>PROGRAM FILES>SHOUTcast DNAS>EDIT SHOUTCAST DNS CONFIG.


Ok your gonna have to Configure it:
Go Down and where it says password: change (that means your gonna have to change it to whatever, make sure u remember)
The Portbase: change it to whatever port you want it
Maxusers: (lets be realistic here, dnt put in 10000, like NXS's radio station) your bandwidth has to be extremely good, if your cable, 50 user max is ok, ADSL should stay below 10 users, and T1 connections should do whatever tickles there fantasy.


EDIT>SAVE.


Open winamp, RIGHT CLICK>OPTIONS>PREFRENCES>DSP EFFECT> and choose the NULLSOFT SHOUTCAST.


Go to OUTPUT, and then click on Connection, Through the ADDRESS, type your address which you have done through www.no-ip.com, PORT NUMBER, whatever u did in the EDIT.txt, and your password.


Then go to Encoder, and choose your quality of your music. Go back to OUTPU>OUTPUT CONFIG> YELLOW PAGES. this is your advertisemant information. dow hatever you like there.


Now Connect. to check that your Radio os on-line go to http://(your address that you added in the prefrence)

How To Add A Url Address Bar To The Taskbar


You can add an Internet URL address bar to your Windows XP taskbar. Doing so will let you type in URLs and launch Web pages without first launching a browser. It will also let you launch some native Windows XP applications in much the same way as you would via the Run menu (so you could type in calc to launch the calculator or mspaint to launch Microsoft Paint. Here's how you add the address bar:


1. Right-click on the taskbar, select Toolbars, and then click Address.


2. The word Address will appear on your taskbar.


3. Double click it to access it.


4. If that doesn't work, your taskbar is locked. You can unlock it by right-clicking on the taskbar again and uncheck Lock the Taskbar.


NOTE: You may also need to grab the vertical dotted lines beside the word Address and drag it to the left to make the Address window appear.

Clear Unwanted Items From Add And Remove


Clear Unwanted Items From Add And Remove

Run the Registry Editor (REGEDIT).
Open HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Uninstall, and remove any unwanted subkeys under "Uninstall."


Caught A Virus


Caught A Virus?


If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.




Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.


You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.


It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.


For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."


Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.


Is Your PC "Owned?"


I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?


Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:


* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.


I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.


Sniffing Out an Infection


There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.


To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.


If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.


Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.


Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.


If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.


What to Do Next


Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.


* If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
* If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.


A Microgram of Prevention


Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.


Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).


Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.


Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."


Here are a few more pointers for a virus-free life:


* Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.
* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.
* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.

Backtracking EMAIL Messages


Backtracking EMAIL Messages  


Tracking email back to its source: Twisted Evil
cause i hate spammers... Evil or Very Mad


Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages come from and who is spreading spam and viruses. The "From" header is little more than a courtesy to the person receiving the message. People spreading spam and viruses are rarely courteous. In short, if there is any question about where a particular email message came from the safe bet is to assume the "From" header is forged.


So how do you determine where a message actually came from? You have to understand how email messages are put together in order to backtrack an email message. SMTP is a text based protocol for transferring messages across the internet. A series of headers are placed in front of the data portion of the message. By examining the headers you can usually backtrack a message to the source network, sometimes the source host. A more detailed essay on reading email headers can be found .


If you are using Outlook or Outlook Express you can view the headers by right clicking on the message and selecting properties or options.


Below are listed the headers of an actual spam message I received. I've changed my email address and the name of my server for obvious reasons. I've also double spaced the headers to make them more readable.




Return-Path: <s359dyxtt@yahoo.com>


X-Original-To: davar@example.com


Delivered-To: davar@example.com


Received: from 12-218-172-108.client.mchsi.com (12-218-172-108.client.mchsi.com [12.218.172.108])
by mailhost.example.com (Postfix) with SMTP id 1F9B8511C7
for <davar@example.com>; Sun, 16 Nov 2003 09:50:37 -0800 (PST)


Received: from (HELO 0udjou) [193.12.169.0] by 12-218-172-108.client.mchsi.com with ESMTP id <536806-74276>; Sun, 16 Nov 2003 19:42:31 +0200


Message-ID: <n5-l067n7z$46-z$-n@eo2.32574>


From: "Maricela Paulson" <s359dyxtt@yahoo.com>


Reply-To: "Maricela Paulson" <s359dyxtt@yahoo.com>


To: davar@example.com


Subject: STOP-PAYING For Your PAY-PER-VIEW, Movie Channels, Mature Channels...isha


Date: Sun, 16 Nov 2003 19:42:31 +0200


X-Mailer: Internet Mail Service (5.5.2650.21)


X-Priority: 3


MIME-Version: 1.0


Content-Type: multipart/alternative; boundary="MIMEStream=_0+211404_90873633350646_4032088448"




According to the From header this message is from Maricela Paulson at s359dyxxt@yahoo.com. I could just fire off a message to abuse@yahoo.com, but that would be waste of time. This message didn't come from yahoo's email service.


The header most likely to be useful in determining the actual source of an email message is the Received header. According to the top-most Received header this message was received from the host 12-218-172-108.client.mchsi.com with the ip address of 21.218.172.108 by my server mailhost.example.com. An important item to consider is at what point in the chain does the email system become untrusted? I consider anything beyond my own email server to be an unreliable source of information. Because this header was generated by my email server it is reasonable for me to accept it at face value.


The next Received header (which is chronologically the first) shows the remote email server accepting the message from the host 0udjou with the ip 193.12.169.0. Those of you who know anything about IP will realize that that is not a valid host IP address. In addition, any hostname that ends in client.mchsi.com is unlikely to be an authorized email server. This has every sign of being a cracked client system.




Here's is where we start digging. By default Windows is somewhat lacking in network diagnostic tools; however, you can use the tools at to do your own checking.


davar@nqh9k:[/home/davar] $whois 12.218.172.108


AT&T WorldNet Services ATT (NET-12-0-0-0-1)
12.0.0.0 - 12.255.255.255
Mediacom Communications Corp MEDIACOMCC-12-218-168-0-FLANDREAU-MN (NET-12-218-168-0-1)
12.218.168.0 - 12.218.175.255


# ARIN WHOIS database, last updated 2003-12-31 19:15
# Enter ? for additional hints on searching ARIN's WHOIS database.


I can also verify the hostname of the remote server by using nslookup, although in this particular instance, my email server has already provided both the IP address and the hostname.


davar@nqh9k:[/home/davar] $nslookup 12.218.172.108


Server: localhost
Address: 127.0.0.1


Name: 12-218-172-108.client.mchsi.com
Address: 12.218.172.108


Ok, whois shows that Mediacom Communications owns that netblock and nslookup confirms the address to hostname mapping of the remote server,12-218-172-108.client.mchsi.com. If I preface a www in front of the domain name portion and plug that into my web browser, http://www.mchsi.com, I get Mediacom's web site.


There are few things more embarrassing to me than firing off an angry message to someone who is supposedly responsible for a problem, and being wrong. By double checking who owns the remote host's IP address using two different tools (whois and nslookup) I minimize the chance of making myself look like an idiot.


A quick glance at the web site and it appears they are an ISP. Now if I copy the entire message including the headers into a new email message and send it to abuse@mchsi.com with a short message explaining the situation, they may do something about it.


But what about Maricela Paulson? There really is no way to determine who sent a message, the best you can hope for is to find out what host sent it. Even in the case of a PGP signed messages there is no guarantee that one particular person actually pressed the send button. Obviously determining who the actual sender of an email message is much more involved than reading the From header. Hopefully this example may be of some use to other forum regulars.

XP REPAIR INSTALL


   
   XP REPAIR INSTALL
   
   1. Boot the computer using the XP CD. You may need to change the 
      boot order in the system BIOS. Check your system documentation 
      for steps to access the BIOS and change the boot order. 
    
    
  2. When you see the "Welcome To Setup" screen, you will see the 
     options below This portion of the Setup program prepares Microsoft 
     Windows XP to run on your computer:


   To setup Windows XP now, press ENTER.


   To repair a Windows XP installation using Recovery Console, press R.


   To quit Setup without installing Windows XP, press F3.


    
    
    3. Press Enter to start the Windows Setup. 


      do not choose "To repair a Windows XP installation using the 
      Recovery Console, press  R", (you do not want to load Recovery 
      Console). I repeat, do not choose "To repair a Windows XP 
      installation using the Recovery Console, press  R". 


    4. Accept the License Agreement and Windows will search for existing 
       Windows installations. 


    5. Select the XP installation you want to repair from the list and 
       press R to start the repair. If Repair is not one of the options, 
       read  this Warning!! 


    6. Setup will copy the necessary files to the hard drive and reboot.  
       Do not press any key to boot from CD when the message appears. 
       Setup will continue as if it were doing a clean install, but your 
       applications and settings will remain intact.
     
    Blaster worm warning: Do not immediately activate over the internet 
    when asked, enable the XP firewall
    [ http://support.microsoft.com/?kbid=283673 ]
    before connecting to the internet. You can activate after the 
    firewall is enabled. Control Panel - Network Connections. Right click 
    the connection you use, Properties, and there is a check box on the 
    Advanced [ http://michaelstevenstech.com/xpfirewall1.jpg ] page.




    7. Reapply updates or service packs applied since initial Windows XP 
    installation. Please note that a Repair Install from the Original 
    install XP CD will remove SP1/SP2 and service packs will need to be 
    reapplied. 
    Service Pack 2
    http://www.microsoft.com/downloads/details.aspx?FamilyId=049C9DBE-3B8E-
    4F30-8245-9E368D3CDB5A&displaylang=en 
    An option I highly recommend is creating a Slipstreamed XP CD with SP2.
    Slipstreaming Windows XP with Service Pack 2 (SP2)
    http://www.winsupersite.com/showcase/windowsxp_sp2_slipstream.asp

  ______________________________________________________________________
    
    Warning!!
    If the option to Repair Install is not available and you continue 
    with the install;you will delete your Windows folder and Documents 
    and Settings folder. All applications that place keys in the registry 
    will need to be re-installed. You should exit setup if the repair 
    option is not available and consider other options.


    Try the link below if the repair option is not available.
    Windows XP Crashed?
    http://www.digitalwebcast.com/2002/03_mar/tutorials/cw_boot_toot.htm
    Here's Help. 
    A salvage mission into the depths of Windows XP, explained by a 
    non-geek


    by Charlie White 
    http://www.digitalwebcast.com/2002/03_mar/tutorials/cw_boot_toot.htm


    Related links
    You May Lose Data or Program Settings After Reinstalling, Repairing, 
    or Upgrading Windows XP (Q312369)
    http://support.microsoft.com/default.aspx?scid=kb;en-us;Q312369


    System Restore "Restore Points" Are Missing or Deleted (Q301224)
    http://support.microsoft.com/default.aspx?scid=kb;en-us;Q301224


    How to Perform an In-Place Upgrade (Reinstallation) of Windows XP 
    (Q315341)
    http://support.microsoft.com/search/preview.aspx?scid=kb;en-us;Q315341
    
    Warning!! If the Repair Option is not Available 
    What should I do? Most important do not ignore the information below!


    If the option to Repair Install is NOT available and you continue 
    with the install; you will delete your Windows folder, Documents and 
    Settings folders.  All Applications that place keys in the registry 
    will need to be re-installed. 


    You should exit setup if the repair option is not available and 
    consider other options. I have found if the Repair option is not 
    available, XP is usually not repairable and will require a Clean 
    install.http://michaelstevenstech.com/cleanxpinstall.html
    If you still have the ability to access the Windows XP installation, 
    backup all important files not restorable from other sources before 
    attempting any recovery console trouble shooting attempts. 
    
    Possible Fix by reconfiguring boot.ini using Recovery Console.
    1.Boot with XP CD or 6 floppy boot disk set.
    2. Press R to load the Recovery Console.  
    3. Type bootcfg.  
    4. This should fix any boot.ini errors causing setup not to see the  
       XP OS install.  
    5. Try the repair install.


    One more suggestion from MVP Alex Nichol


    "Reboot, this time taking the immediate R option, and if the CD 
     letter is say K: give these commands


    COPY K:\i386\ntldr C:\
    COPY K:\i386\ntdetect.com C:\




   (two other files needed - just in case) 


   1. Type: ATTRIB -H -R -S C:\boot.ini DEL C:\boot.ini 


   2. Type: BootCfg /Rebuild


   which will get rid of any damaged boot.ini, search the disk for 
   systems and make a new one. This might even result in a damaged 
   windows reappearing; but gives another chance of getting at the 
   repair"



   Feedback on success or failure of the above fixes would be greatly 
   appreciated.






    Feedback on success or failure of the above fix would be greatly 
    appreciated.
    xpnews@michaelstevenstech.com




    
Michael Stevens MS-MVP XP
Publishing of this document without permission of the author is 
forbidden.
4-29-2003
Revised 11-05-2004

Popular Posts

 
IT News & Updates © 2012 | Designed by Syed Muaaz Ahmad Gilani ,