Académique Documents
Professionnel Documents
Culture Documents
introduction!
Team >>
Publisher
What do you
have to say?
www.think .com/feedback
Note: Your opinion could earn you the next 3 Issues Free
■ editorial
Re-evolution!
1100100~1101001~1100111~1101001~1110100
Karan Manral
Assistant Editor
karan_manral@jasubhai.com
CgNTENTS J U N E 2 0 0 1
EDITORIAL 7 DIALOG 26
CONTENTS 10
COLOPHON 16 CONNECT
PULSE 18 SPOTLIGHT
AMD going 4 mobile MP3 toppers: Pentagram 28
XP building a monopoly?
Nokia’s Linux-based consoles FACE-OFF
MIT promotes OpenCourse Should corporates monitor
quicktake: Ken Constable, employees’ Net usage? 30
Vice-President, Dell Asia
Pacific COLUMN
Whois?: GRUB Madhu Kurup on
Hypethesis: Simputer network security 32
tomorrowstechnology:
ModelMaker 3D scanner TECHNOLOGY NEXT
Embedded and real time
operating systems 36 50
E-mail goes vernacular!
DROOLMAAL
PDAs and handhelds 42
RESOLVE
PASSPORT WIRED
Get a .Net certification 44 Remote control your
machine 62
WIDE ANGLE
How satellites affect our UNWIRED
daily lives 48 Sending SMS text messages
through the Net 64
NETRETURNS
Send and receive e-mail in S.O.S.
your regional language 50 Solutions to your
computing problems 70
56
Construct your own Web site
FIRSTHAND
A guide to building TIPS & TRICKS
your Web site 56 Desktop security 79
ON THE COVER
79
TIPS & TRICKS
Unbreachable desktop
security
➜
10 June 2001
■ contents
Products
reviewed
FIREWALLS
BlackICE Defender 2.5
eSafe Desktop 3
McAfee Personal Firewall 2.1
NeoWatch 2.2
Norton Personal Firewall 2001
PGP Desktop Security 7
Sygate Personal Firewall 4
Tiny Personal Firewall 2.0.13
ZoneAlarm 2.6
ZoneAlarm Pro 2.6
ANTIVIRUS SOFTWARE
Antivir 9x, AVG, eScan,
F-Secure, InoculateIT,
36
Embedded systems and RTOSs
McAfee 5.1, Norton AntiVirus make your dreams a reality
2001, QuickHeal 6.0.1
Software on CD
ON THE CD
Mindware
DEVELOPERS: AG Win-
dowWatch (Freeware),
Developers Pad (Freeware),
Iraje (Trialware), Virtual Pas- Mindware API MONITOR V1.5 graphics files
cal (Freeware) A software that monitors and
RESOLVE displays API calls made by KOOLMOVES V2.05
GRAPHICS: iBrowser (Free- TROUBLESHOOTING applications Create your own Shockwave
ware), PaintStudio Lite (Free- Basic queries and tweaks on Flash movies and animated gif
ware), Shell Picture (Trialware) registry editing frames using this Web anima-
tion authoring tool
HOME: Kool Karaoke (Free- WORKSHOP
ware), MP3Organiser (Free- Take a class on ‘Connecting HOME
ware), Super CD Cover Maker dual monitors’ using a dual- PCDJ SILVER PLAYER
(Freeware), WordWeb (Free- head monitor card A dual deck MP3 player with
ware) shuffle and auto play functions
Sponsored by
E-PAPERS
IN MAGAZINE: AVG Free Working with PDFs GRAPHICS
(Freeware), AntiVir Personal and e-books ULEAD PHOTOIMPACT 6.0
Edition for Windows 9x/Me Create images for Web pages
and NT/2000 (Freeware), SOFTWARE using various features includ-
NeoWatch (Trialware), DEVELOPERS ing vector 2D and 3D graphics,
Sygate Personal Firewall PYTHON V2.1 visual page layout and one-
(Freeware), Zone Alarm An easy-to-use programming click HTML output.
(Freeware) language with more structure
and support for larger pro- XNVIEW 1.19
INTERNET: Copernic grams, more error checking This software offers support which allows you mix MP3s
2001Basic (Freeware), File- and high level built-in data for 150 different image file for- and match beats song to song
Contd on page 14… types mats to view and convert your with a BPM counter
12 June 2001
➜
■ contents
…Contd from page 12 PERSONAL SENTINEL 1.5 Internet connection, find and ARENA
portal (Freeware), Netup A program that monitors your clean junk and obsolete files, GAMES
(Freeware), Vivian mail Internet surfing for bugs and optimise the system registry AGE OF EMPIRES II: AGE OF CON -
(Freeware) also displays the privacy risk and manage start-up items QUERORS
level of Web sites among a whole lot of other Get into the shoes of Attilla the
OFFICE: BuddyShare (Free- functions Hun and other legendary war-
ware), Direct Connect Client INTERNET riors with this real time strate-
Sponsored by
(Freeware), Encryption Plus MSN EXPLORER V6.10 HEALTH & gy demo
Folders (Freeware), Eudora Microsoft’s integrated desktop VISION
5.1 (Free/Adware), HTMLGen idea, a new Web interface, inte- Protecting yourself from vari- FIFA 2001V3
(Freeware) Perpetual Budget grated support for music and ous computing related health Improved facial animations,
(Shareware) video, support for up to nine hazards advanced realism, authentic
users and more in this Internet team kits and logos are a few
RESOURCES:Adobe Acrobat service and content solution IN PRINT improvements that the latest
Reader (Freeware), Desktop from MSN A LIST version of Fifa 2001 boasts of
Architect (Freeware) Best performing hardware and
DirectX 8.0a (Freeware), WINMX V2.51 software products in different SURGE
Download Accelerator Plus A file sharing program with categories Cool music featuring Avalance,
(Freeware) beta, mIRC 5.9-32 features such as support for Pentagram and also the best of
bit (Shareware), PowerAr- any file type and connections PRICEWATCH movie trailers and mediaware.
chiver 2001(Freeware), to networks based on Napster Computer component prices
Winamp (Full version) Win- and OpenNap protocols for your reference CONNECT
dows Media Player 7 (Free- SITEMAP
ware) IN MAGAZINE WINDOWS 2000 Get fashion inputs, model pro-
Yahoo! Messenger (Free- MCAFEE VIRUS SCAN V5.15 Tutorial for Complete, free course from files, addresses of boutiques on
ware) Protect your PC from viruses end-users www.fashionindia.net
in files, e-mail and active X
UPDATES:AVG 6.0 Free Edi- controls downloaded from the INDIA SITES
tion virus definition (Free- Internet with this thorough MINDMATTERS Indian sites and ISP related
ware), Internet Explorer 5.5 virus protection, detection and E-BOOKS news
(Freeware), Mozilla 0.9 removal system E-commerce Handbook, All
McAfee VirusScan (Free- about PCs and more NEWSLETTERS
ware), MSN Messenger OFFICE Featured this month are
(Freeware), Windows Net- EASYOFFICE FREEWARE WHITEPAPERS newsletters on free graphics
Meeting 3.01 (Freeware) A Word- and Excel-compatible A whole lot of whitepapers on sites
office suite with features such new cellular standards
UTILITIES:CloneCD (Share- as EasyWord for word process- BOOKMARKS
ware),H_menu 4.0 (Free- ing, EasySpreadsheet for basic TIPS & TRICKS Satisfy your thirst for Indian
ware), Macro Angel and advanced spreadsheets and Fun things for Sponsored by arts and crafts with this
(Freeware), MBProbe (Free- a lot more you to do with month’s bookmarks
ware), MemViewer (Free- easter eggs
ware) UPDATES DROOLMAAL
MOZILLA 0.9 Playware DIGITAL WORLD
Playware All new features such as a new Powered by
ARENA: Age of Empires II: cache, image library, help view- GALLERY
Age of Conquerors (Demo), Loads of wallpapers, screen-
Hard Wood Sii savers, themes, and WinAmp Feast your eyes on some spec-
202(Demo),Hwc Setup skins for you to spruce up your tacular handhelds and PDAs
(Demo), Monkey Brains PC with
(Demo), Sierra (Demo), Stunt
GP Demo (Demo),World Cata-
clysm (Demo)
GALLERY:Wallpapers, Win-
dows Screensavers, Win- er and greatly improved SSL
dows Themes, WinAmp Skins and MailNews performance.
14 June 2001
■ service~ colophon
VOLUME 1, ISSUE 2
◆ How to contact us ◆ Advertisers
Chairman and Publisher Jasu Shah
Associate Publisher and index
Managing Editor Maulik Jasubhai EDITORIAL plete address, telephone number Acer Peripherals . . . . . . . . .113
Assistant Editor Karan Manral
Products for Test/Review and e-mail of the developer. Adobe . . . . . . . . . . . . . . . . . .141
Editorial Send a complete working copy AMD . . . . . . . . . . . . . . . . . . . .149
Writers Manu Khanna, Nilesh Kakade, American . . . . . . . .Back Cover
Anil Patrick R., Rinki Banerji
of the product (not a ‘trial’ or CUSTOMER/ SUBSCRIPTION
Features Editor Sveta Basraon ‘demo’ version) to the Digit SERVICES Power Conversion
Copy Editors Mohan Krishnan, Test Centre. Only products that E-mail: Any queries or problems Amkette . . . . . . . . . . . . . . . . . .57
Shweta Johri, Julian Vongeyer
Thinkdigit.com Aalaap Ghag, Sunil are currently available in the regarding Digit Interactive, sub- Asus . . . . . . . . . . . . . . . . . . . .145
Srinivasan Indian market will be consid- scriptions or other problems BPL Mobile . . . . . . . . . . . . . . .15
Design
Consultant G.V. Sreekumar
ered. The products must have can be mailed to Bull Power . . . . . . . . . . . . . . .53
Art Director Marshall Mascarenhas the complete name of the man- help@jasubhai.com Creative Technologies . . . . . .31
Senior Visualiser V. Jeevanand ufacturer or developer, details Elent Enterprises . . . . . . . . . .78
Senior Designer Shivasankaran C. Pillai, Pager: 9623-987273 at Mumbai
Senior Graphic Artist Solomon Lewis regarding the name of the Epson IndiaPvt.Ltd .Inside Back
Digital Imaging Artist Neeta Wadiker model and its type and the Pager: 9624-329229 at Cover,147
Infographist Jaya Shetty Pune, Hyderabad and Bangalore
Junior Visualiser Shyam Shirsekar
end-user price. Product Epson Singapore Pte. Ltd. . . .69
Senior Photographer Ashesh Shah brochure and a complete speci- Post: If sent by post, please Gates Academy . . . . . . . . . .119
Photographers Rahul Sharma, fication sheet must be includ- mark ‘Customer Service’. In
Mexi Xavier
Gigabyte . . . . . . . . . . . . . . . . .23
Illustrator Mahesh Benkar, Ram ed, along with the name of a case of subscription problems, Intel . . . . . . . . . . . . . . . . . . . . .25
Contributing Illustrator Farzana person to be contacted for please mention the subscription Karma . . . . . . . . . . . . . . . . . .129
Cooper information. particulars.
Test Centre Karrox Technologies . . .13,19,33
Reviewers Marco D’Souza, Ashu Kaveri Powertronics . . . . . . .61
Mehrotra, Dipti Ranade, Varun Singh, DIGIT INTERACTIVE MARKETING SERVICES
Dipayan Choudhury, Aliasgar Pardawala, Maple IT . . . . . . . . . . . . . . .71,73
Rossi Fernandes, Menlyn Noronha, Yatish Contact Ranvijay Singh, Content IT companies whose products Microsoft . . . . . . . . . . . . . . . . .59
Suvarna, Mehul Mehta Co-ordinator, Multimedia have been
Co-ordinator Gautami V. Chalke
Microworld . . . . . . . . . . . . . .133
(cdcontent@jasubhai.com) for declared win-
Multimedia Neoteric Informatique . . . . . .21
Co-ordinator V. Ravi Shankar inclusion of software on Digit ners in a Digit
NetCracker . . . . . . . . . . . . . .121
Designer Kabir Malkani Interactive. A write-up detailing Test can use
Programmers Hemant Charya, Liu Ai NetVarsity . . . . . . . . . . . .108,109
Chin, Babuprasad the features of the software, the Digit Test
Network Associates . . . . . . .139
Content Ranvijay Singh, Vaibhav Kapoor complete loading instructions Centre logo.
Digital Video Bimal Unnikrishnan Network Solution . . . . . . . .39,41
and a letter certi- They must
Production Pinnacle Systems . . . . . . . . . .51
General Manager Shivshankar fying that the address their
Rashi Peripherals . . . . . . . . . .17
Hiremath product is orig- requests for licences, reprints
Controller Nitin Terse
inal must and bulk orders of Digit to Rational software . . . . . . . . . .29
Senior Co-ordinator Vrushali Sonawane Ronaq . . . . . . . . . . . . . . . . . . .35
Managers Harish Suvarna, Shiv accompany the software. The Suneel Yadav, at our Nerul
Hiremath software must also have the com- office in Navi Mumbai. Samsung . . . . . . . . .Inside Front
Senior Executive R. Ganeshan, Cover,8,9,11
Amit S. Navarange
Operations Seagate . . . . . . . . . . . . . . .65,111
Head Sarang Dash SIBM . . . . . . . . . . . . . . . . . . . .47
Assistant Manager Shailesh Iyer
Co-ordinator Sriram Iyer
◆ Sales & Marketing Offices Sparr Electronics . . . . . . . . . .45
Circulation and Logistics Summit Infotech . . . . . . . . .75,77
Head–Circulation & Logistics HEAD OFFICE MUMBAI
Navi Mumbai Rupesh Sreedharan TCS . . . . . . . . . . . . . . . . . . . . .137
Akhilesh Singh
Distribution & Logistics Sandip Maiti Ad Sales Manager Transcend . . . . . . . . . . . . . . .127
Nicholas Kiro, Arup Ghosh, Vice President Bhavesh Thakore VLSI Design & . . . . . . . . . . .120
Sandeep Rane Sales & Client Marketing Clayton Brace
Information Systems Navin Sahani Phone: +91 22 6591849-50, 6591651 Research centre
Co-ordinator Ajit Rodrigues Client Marketing Fax: +91 22 6591592 XPS Cargo . . . . . . . . . . . . . . . .67
Assistants Sunita D’Cunha, Sunil Rakesh Rana SECUNDERABAD
D’souza Ad Sales Support Venu
Marketing HEAD OFFICE:
Brand Manager Louis D’Mello
NEW DELHI Phone: +91 40 7726091, 7811176/7439
EDITORIAL, MARKETING AND
Marketing Services Rajiv Bose Vijay Adhikari Fax: +91 40 7641697
Regional Manager CUSTOMER SERVICE
Marketing Communication Mithun Roy CHENNAI Plot No D-222/2,
International Marketing Koshy Thomas Sahayaraj Prabhu
Ad Sales Manager TTC Industrial Area, MIDC, Shirvane,
Jasmine Taraporevalla Phone: +91 44 8235186-89
Consumer Marketing Arvind Prabhakar Fax: +91 44 8230731 Nerul, Navi Mumbai 400 706
Manager Mou Maiti Rahul Bhardwaj Phone: 022-7629191/9200
Amit Dhume, Abhyuday Mukhopadhyay, Phone: +91 11 6445320-25 PUNE Fax: 022-7615225, 7629223/24
Sandeep M, Nabjeet Ganguli Fax: +91 11 6445321 Sanjay Nepali Printed and published by Jasu R. Shah on
Customer Service Namita Shetty, Phone: +91 20 4482059, 4494572
BANGALORE Tele-Fax: +91 20 4482059 behalf of Jasubhai Digital Media Pvt Ltd, 26
Reema Sadarangani, Jasneet Kaur, S. Saikumar Maker Chambers VI, 2nd Floor, Nariman
Roshan Jeypaul, Ronny Joseph CALCUTTA
Ad Sales Manager Point, Mumbai 400 021, India.
Raghu Pillai Jayanta Bhattacharya Managing Editor: Maulik Jasubhai
Cover Photograph: Colston Julian, Phone: +91 33 2822183, 2827842,
assisted by Bajirao Pawar Kiran Karri Printed at Tata Infomedia Limited,
Phone: +91 80 5098799/830/865/891 2828016
Model: Indranil Prabhadevi, Mumbai 400 025
Tele-Fax: +91 80 5098717 Fax: +91 33 2827673
16 June 2001
■ pulse
18 June 2001
■ pulse
quicktake Redalert
Ken Constable, Vice President, Dell Asia Pacific
Vengeance gone VBS.VBSWG2.Z@mm
Dell Computer has entered the direct model, the latest tech- wrong This is an encrypted
VBScript worm that sends
Indian market. Dell’s speciality nology is available to the cus- The first person to be charged itself to all recipients in your
lies in directly delivering cus- tomer so there is an for cyber crime in the country, Microsoft Outlook address
tom-built PCs to specific cus- investment protection. If a new is the 16-year old son of a book. Rated as 4 (severe) by
tomer orders. technology is announced from retired Indian Air Force offi- Symantec, it arrives as an
▲ What type of business is Dell Intel today, just give us a call. cer, who was arrested by the attachment, with the subject
looking at in India? We will make sure New Delhi police for creating as Mawanella and the mes-
The policy of that the technology is a porn site featuring the class- sage, ‘Mawanella is one of
Dell worldwide is available to you today. mates and teachers who made the Sri Lanka’s Muslim Vil-
to go direct—the This also reduces fun of him at school. lage’. If no Microsoft Outlook
secret of Dell's suc- costs. Constantly teased in school, application is installed, the
cess. We are cur- ▲ What advantages do this Standard XII student qui- worm displays the message
rently looking at Dell machines have etly found a way to hit back. He ‘Please Forward this to
the SME market, over assembled PCs? created a pornographic site everyone’. The worm creates
which is a bigger All Dell machines Amazing-gents.8m.net (taken a copy of itself, called
Ken Constable
chunk of the pie. are built in the Dell down now) that ran a warning mawanella.vbs, in the Win-
VICE PRESIDENT
Two products are factory. No one out- that ‘girls should enter at their dows\system folder. To
Dell Asia Pacific
being launched side the factory can own risk’. remove this worm using
in the desktop segment and tamper with it. Our design is His plan backfired when a Norton Antivirus (NAV), run
two products in the laptop unique. You can open the girl in class complained to her LiveUpdate to get the most
segment. We sell directly to machine and take out the father about her being fea- recent virus definitions. Start
the people through our Web components without a screw- tured in the malicious Web NAV and run a full system
site www.dell.co.in or through driver. In laptops there are spe- site. The boy has been sen- scan, making sure that NAV
our toll free number 1600-33- cial stress points designed to tenced by a juvenile court to is set to scan all files. Delete
8046. Our sales representative protect the internal compo- 14 days’ judicial custody at a any files detected as
will provide assistance in nents. The PCs have a single juvenile remand home in VBS.VBSWG2.Z@mm.
selecting a product keeping button with an ‘e’ written on it Delhi. Clearly not the best of
the price factor in mind. In the that provides online help. ways to take revenge. Sub 7 2.2 Beta
First discovered in Decem-
ber 1999, this Trojan has
been consistently updated
by the author. With each
Nokia playing with Linux consoles revision, updates, are added
to the DAT files. Sub 7 2.2
Nokia has announced its plans form-independent OpenGL sys- made the hardware an open beta offers the usual access
to introduce a Linux-based tem. This would also give Nokia design so anyone else can to the user’s data via the
home entertainment console. access to a large existing base make a clone or compatible Internet. By default, the Tro-
The Media Terminal product. This makes it look jan uses TCP port 27374. It
will be able to func- like Nokia plans on using is normally distributed as a
tion as a video game the Open Source approach Win32 PE exe dropper that
player, MP3 digital for both the hardware (x86 may be disguised as a JPG
music player, Web architecture) and the soft- or BMP picture. When run,
browser, digital TV ware on this device. this dropper installs two
recorder and digital TV Whether this is a viable files into the Windows fold-
set-top box. It will solution, only time will tell. er: the main server exe files,
compete with Sony’s The company plans to normally called msrexe.exe,
Playstation and release the device in and a loader program nor-
Microsoft’s Xbox in Europe this summer and in mally called run.exe, win-
what’s becoming an increasing- of gaming software titles and the US late this year or in early dos.exe or mueexe.exe. Do
ly crowded space. game development expertise. 2002. a full scan of the system
The development platform Rickard Nelger, head of the Visit www.nokia.com/multime- with McAfee or NAV and
for the games on this device will Nokia Home Communications dia/mediaterminal.html for more follow the instructions to
probably be the popular plat- group, says that they have information and pictures. remove the file.
➜
chips in competition with IBM ◆ Intel challenges Sun with telecommunications server ◆ AOL and CompUSA announce alliance
20 June 2001
■ pulse
realitybites
MIT Promotes Open Course
he industry doesn’t have a pricing
“T problem—it has an operating
expense problem” The bottom
It’s a natural marriage of
American higher education
nation of professional staff
and teaching assistants who
Michael Dell, CEO Dell Com- line—what we and the capabilities of the will put materials for more
puters, while predicting a drop really need is World Wide Web, said MIT than 500 courses on the Web.
in revenue. more customers President Charles Vest, Of course, students who do
to pay for it! announcing that the Massa- the course on the Web will not
chusetts Institute of Technolo- receive a degree, which is
gy (MIT) will make the reserved only for the on-
materials for nearly all its campus students who enroll at
courses freely available on the MIT with $26,000 as annual
f we’re not able to quickly resolve Internet over the next 10 tuition fee.
“I these issues, it will be necessary for
Congress and the (United States) Copy-
years.
Located in Cambridge,
OpenCourseWare would
work more in terms of teach-
right Office to step in.” Massachusetts, MIT is a pri- ing and training young stu-
Heck, if we’re
Rob Glaser, RealNetworks vate research university with dents and faculty in
lucky we could
CEO, speaking about the more than 900 faculty and developing countries where
get a patent or
resemblance between their roughly 10,000 undergraduate information and the develop-
two out of this
MusicNet subscription service and graduate students. ment of infrastructure and
and Napster Roughly 2,000 courses will institutions are sorely needed.
be offered for free via MIT’s
new OpenCourseWare pro-
gram. The initiative is estimat- thermometer
ed to take the best part of a
do not question the right of the decade and is projected to cost Hot
“I Open Source software model to com-
pete in the marketplace…companies and
in the region of $100 million.
It would involve incorpo-
XML
Everyone who’s
And there’s going
individuals should be able rating lecture notes, syllabi, anyone is evan-
to be trouble if
to choose either model.” exams, simulations and gelising it
you pick Open
Craig Mundie, of Microsoft streaming video lectures for AMD
Source
referring to his earlier speech nearly all of the research uni- With the intro-
criticising the Open Source versity’s 2,000 courses. It will duction of the
model begin with a two-year pilot Athlon 4, they’re
program involving a combi- getting a foot into
the mobile PC,
high-performance
mobile ‘cell’.
Visual Basic
Almost 3 million
VB programmers
have shifted to
the other plat-
forms.
➜
◆ MS monopoly anticipated with launch of Windows XP in October ◆ ‘Cheeseworm’ repairs broken Linux systems ◆ XBox video
22 June 2001
■ pulse
game console launching in November ◆ DigitalTV makes its approach ◆ New subscription service launched by Napster
24 June 2001
■ pulse~ dialog
The change of name to Digit came to me as a surprise, but reading that the con-
tents and quality of the articles will remain the same reassured me. I hope the
same is true for the CD. I loved CHIP India and will love Digit too. After all, what’s
in a name?
Pankaj Nagar, Via Web site Web awar
ds
First of all, let me commend you on the excellent choice of name—Digit. Cool, short
ditched?
What will
and snappy. Sounds just sophisticated enough to make it seem young and at the happen to
CH IP-Dishn the
same time not a new kid on the block. et Web Aw
This was on ards?
e of the fore
Dhruv,Via Web site Web awar most
ds that al
P.S. I hope your first magazine cover is kick-ass and mind blowing. fanatics wer l Net
e looking ou
a kind of Fi t for—
lmfare awar
Dear CHIP…er…Digit, the Netizen ds for
s. Are you
planning to still
When I saw your advertisement stating that CHIP is being discontinued, I was go ahead w
If so, when? ith it?
heart broken because it was the only magazine that was just right.
SANDEEP,
Then I learnt about Digit. It’s about time you came up with a better name!
Via Web site
Sushir, Via Web site
26 June 2001
Yeh con ha
i!
The actual tr
uth is that C DIGIT WHO?
India, and w HIP will be
ill be in the republished
con game! market soon in
. Digit is just Somehow, I am not happy with Digit. CHIP sounded better and I will miss it big
ANIRUDD a
HA AND SA time.
Via Web site RANSH
A Shetty, Sriram, Via Web site
CHIP is the best computer magazine in the market. Please do not stop it
The fact is that we created all the Antonia Paes, Via Web site
content here for Indian audi-
ences. Digit is here. Right now! I don’t understand what is happening to my CHIP. I feel like a mother who has
lost her child.
Tadikonda Srinath, Via Web site
What’s the logic behind this name change when it already sounds so good and
is so popular? This is really a shock. Come on guys it’s more than just a name to
most people. Me included.
and then
Whyundenrsotandwyo?ur rationale in basicuralowly nusseintug pa atbranthe time of the maging-
d name Prasanth, Via Web site
27
■ connect~ spotlight
28 June 2001
■ connect~ face-off
“The individual’s
“If an employee privacy is
uses the Internet compromised when
for personal an organisation
purposes, it is a monitors the Net
waste of available usage of its
resources“ employees“
30 June 2001
■ c o n n e c t ~ column
madhu m. kurup
Are all your eggs in one basket?
amiliarity breeds contempt. It also
F breeds virus and hacker attacks.
Which is why diversity is the name
of the game in network security
Normal is boring. Sometimes, though, normal ety of versions as well. With so much diversity,
can be more dangerous than just plain boring. we should be safe, right? But given the virus
Security depends on the attacker being as mini- attacks that routinely cripple the Windows world,
mally aware of your information as possible. we realise the effects of having an OS based on a
Highly diverse, dissimilar systems are likely to common family with similar security issues. Love
pose greater difficulty for an attacker than a stan- Bug, Melissa and the KaK virus extracted a dev-
dard, normal and expected configuration. From astating price in terms of the damage they caused.
a security standpoint, being average is more than The fact that Microsoft routinely creates software
just being mean (pun unintended). Using simi- that allows malicious external code to be execut-
lar application software, operating systems or ed via an e-mail client is inexcusable; the rate at
even configurations is a probable cause for secu- which these e-mail viruse spread is an even more
rity issues. Thanks to the Internet, now we are serious cause for concern.
much more closely connected than we actually Another example of the implications of a Win-
believe or understand ourselves to be. This con- dows bug comes from a newly discovered exploit
nection implies that problems in one configura- that affects IIS 5.0 servers. This bug is estimated to
tion can migrate to another with ease. affect over a million servers world-wide. How
The foremost tool used to externally analyse many of these servers are likely to be patched in
your machine is nmap (www.insecure.org/nmap). time to avoid automated tools that hunt for such
Nmap is a port scanner that can tell you exactly servers is yet to be known. However, if you read
which OS and what services are operating on a the relevant Microsoft Security Bulletin, you will
given machine. Once an attacker is able to obtain find that if you had not retained the defaults but
information regarding the configuration of the had customised your IIS setup instead, this prob-
machine, the situation changes. If the scan lem could have been avoided. The rate at which
reveals the machine to be of a default or well- these infections spread reveals that monoculture,
known configuration, scripts are usually avail- especially in an office or in an organisation, is a
able to attack it. These problems are not specific fertile breeding ground for an attack.
to just the Windows or just the Unix world, they So, then, the Unix world is much safer, right?
are occurring with increasing frequency in both. Well, not really. Linux is humorously described
True, one would assume that there’s a fair as the Unix de-fragmentation tool. And, for far
degree of diversity in the Windows world—after too long, most new users seem to think that Red
all, Windows is available as 3.1, 95, 98, CE, ME, Hat is Linux and vice versa. The outbreak of the
NT, 2K, XP (with some of these in Home, Pro- Ramen, Li0n and Adore (www.nipc.gov/warnings/
fessional Server and Data Center variants). If that alerts/2001/01-010.htm) worms indicates that Linux
isn’t enough, you may or may not have applied usage is also beginning to show a lack of diversi-
the various service packs supplied by Microsoft. ty. These worms make use of the fact that
Hang on, we aren’t done yet—the IIS Web Serv- machines are typically installed using the default
er, IE and Outlook Express are available in a vari- Red Hat install—something that installs ➜
32 June 2001
■ c o n n e c t ~ column
34 June 2001
■ connect~ t e c h n o l o g y n e x t
Fantasies embedded
Embedded systems ANIL PATRICK R. using your modem. Read on to find out what
doctor is configuring a cardiac pacemaker these technologies have in store for you.
and real time
A
operating systems
are fast achieving
ubiquity, blurring the
inside his patient’s chest while sitting 200
kilometres away. Another person is travel-
ling in a driver-less car that takes him from
Mumbai to New Delhi using its in-built naviga-
tion program. Impossible? Not really. Advances
How ‘real’ is real time?
When it comes to real-life situations like con-
trolling a traffic signal or a steel furnace, the OS
has to respond immediately. Imagine the plight of
in technology have taken place at such speed that a driver if his car’s anti-skid mechanism refuses to
lines between these fictitious scenarios are likely to be translat- respond the moment he jams his brakes. This is
science fiction and ed into reality within the next couple of years. where RTOS comes in. Real time operating sys-
Real Time Operating Systems (RTOS) and tems are those that respond to inputs immedi-
hard reality embedded systems are two among the several ately (see box, ‘What is an RTOS?’).
technologies that will play a major role in mak-
ing these concepts possible. First stop—embedded technology
You may say these technologies have been Why use a hammer when a gentle touch would
around for a long time and there have been no do? This is the basic idea behind all the appliances
such dramatic developments. But what you may that make use of embedded systems. They are
not know is that RTOS and embedded systems pre-programmed to perform a dedicated or nar-
are the unsung heroes of much of the technolo- row range of functions as part of a larger system,
gy you use today—the video game you play, or usually with minimal end-user interaction. For
the CD player or the washing machine you use example, an entire operating system like Win-
employ them. Without an embedded system and dows 98 is not required for controlling a car’s
an RTOS, you would not even be able to go online valve that has only certain types of movements, or
36 June 2001
Imagin: Neeta Wadiker
in real time
a washing machine, which uses only specific were unimaginable in the past. The second fac-
cleaning routines. tor was the emergence of several integrated soft-
Embedded systems are used in navigation ware environments, which simplified the
tools like global positioning systems (GPS), development of these applications. The third
automated teller machines (ATMs), networking factor was the coming together of embedded
equipment such as routers and switches, digital systems and the Internet, which made possible
videos and cameras, mobile phones, aerospace the networking of several embedded systems to
applications, telecom applications, etc. Even toys operate as part of a large system across net-
make use of embedded systems (see box, ‘What works—be it a LAN, WAN or the Internet. This
goes into an embedded system?’). convergence of embedded systems with the
Embedded systems are usually low in cost and Internet is going to transform the way we live.
are easily available off the shelf for most applica-
tions. They usually have low design risks, since it In the driving seat
is easy to verify the designs using evaluation There are several tasks in which real time OSes
boards. The easy availability of good design tools beat their desktop counterparts hands-down. A
(many of them in the freeware domain) and soft- common application of embedded systems in
ware engineers have been two key factors in the real world is in automobiles because these
fuelling the growth of embedded systems. systems are cheap, efficient and problem-free.
Embedded systems have received a major Almost every car that rolls off the production
shot in the arm over the past two or three years line these days makes use of embedded technol-
due to three factors. The first was the develop- ogy in one form or the other. RTOSs are pre-
ment of standard run-time platforms like Java, ferred in this area due to their fast response times
which enabled their use in myriad ways that and minimal system requirements.
37
■ connect~ t e c h n o l o g y n e x t
Most of the embedded systems in automo- built-in management functions. And they will
What is an RTOS? biles are rugged in nature, as most of these sys- also be connected to the Internet in most cases.
tems are made up of a single chip. Other factors Real time OSes will work wonders when it
A real time operating system aiding their use are the low costs involved, ease comes to intelligent houses. The huge advantage
(RTOS) is an OS that guar- of development, and the fact that embedded they have over desktop OSes is their low cost.
antees a certain capability devices can be networked to act as sub-modules This factor alone can keep desktop OSes out of
within a specified time con- in a larger system. No driver clashes or ‘system the running, but there are other reasons as well.
straint. There are two types busy’ conditions happen in these systems. Their An intelligent house may have more than 50 dif-
of RTOSs—hard and soft. compact profiles enable them to fit easily under ferent devices in it. Imagine the cost of licensing
Consider an automated the cramped hood of a car. that many copies of Windows 2000! Also, RTOSs
assembly line that makes Embedded systems can be used to implement are capable of being inter-networked, which
use of robots for assembling features ranging from adjustment of the sus- enables co-ordinated functioning between
a ceiling fan. The robot will pension to suit road conditions and the octane devices at a scale that is unimaginable if desktop
be required to place the ball OSes are used. Imagine getting
bearings of the fan at the W indow scalded while having a hot show-
precise moment when each
Fuel quality er—all because of an OS ‘freeze’
GP defroster monitoring
fan reaches a specific posi- or ‘crash’. Ouch!
tion at a certain time inter-
val. In a hard RTOS, if the
Fuel The doctor will see you now
calculation could not be
injec- Imagine a time when body trans-
performed for making the plants like cardiac pacemakers
Automat
ball bearing available at the
ic
will be able to monitor and man-
right time, the OS would ter-
AB Traction age themselves remotely. These
minate with a failure. For a systems will be so compact that
soft RTOS, the assembly line Embedded systems in a car the patient wouldn’t even be
would continue to operate aware that they are embedded in
even though the fan is miss- content in the fuel to antilock braking systems his body. Another point in favour of RTOSs is
ing ball bearings. This is bad (ABS) and security systems. Speaking of things their stability, instantaneous response and effi-
because the productivity of nearer home, the ‘computer chip’ that controls ciency. No OS crashes or delays in responding, as
the whole assembly line is fuel injection in a Hyundai Santro or the one is the case with most desktop OSes. After all,
lost. Generally used OSes that controls the activation of air bags in the which patient can rest easy with the thought of
like Microsoft’s Windows recently launched Fiat Siena Weekend is noth- his life literally hanging by a thread due to the
2000 or IBM’s OS/390 can ing but an embedded system. Right from brakes time taken by the OS to load!
be considered as RTOSs to automatic traction control to air bags and Embedded technology advances are pointing
since they satisfy some con- fuel/air mixture controls, there may be up to 30- towards the use of pacemakers that can be trans-
ditions of an RTOS. Howev- 50 embedded systems within a present-day car. planted in or near the heart itself. The pace-
er, they do not meet all the And this is just the beginning. maker will be able to monitor parameters like
requirements of an RTOS. blood pressure, blood flow, pulse rate, tempera-
In general, an RTOS has Home is where the chip is ture, etc, using microsensors planted in various
the following features: How would you like to live in a house that recog- parts of the body. This capability will enable the
■ Multitasking nises your fingerprints and opens the front door pacemaker to automatically vary its operation to
■ Process threads that can automatically? Imagine a fridge that checks your suit the changing body conditions. It will also
be prioritised food supplies and places orders to replenish transmit data using wireless transmission, thus
■ A sufficient number of them; or intelligent lights and air conditioners enabling a doctor to constantly monitor its oper-
interrupt levels that adjust their settings automatically according ation. In most cases, wireless transmission is
RTOSs are usually to the light and heat available at various times of likely to be done by a transmitter implanted near
employed in small embed- the day. What about a microwave oven that can the surface of the skin. In case any abnormality
ded operating systems that send a message to your PDA saying that the cake is detected, the doctor will be able to take reme-
are packaged as part of you kept to bake is done? These are all possible dial action even from a remote location.
microdevices like micro- in the near future. In fact, many of these devices
processors. have already made their debut using embedded Wired wearables
The major difference systems for controlling them and the Bluetooth A mobile phone in the form of a ring or a ear-
between embedded sys- technology for communication. ring? What about cool sunglasses, with stream-
tems and RTOSs is that Homes of the future will employ embedded ing video displays built into them? All these can
embedded systems are technology devices to become ‘intelligent’. An soon be a reality. Embedded systems have a small
basically platform-less sys- intelligent house is essentially a network of smart footprint and consume very little power, which
tems, that is, they do not devices, which could be a fridge, TV, microwave makes them ideal for wearable computing appli-
use any operating system, oven, washing machine or any of the numerous cations. The minimal system requirements of
whereas RTOSs work on domestic appliances that we use at home. They these devices ensure that the hardware is almost
specific OSes. will be able to optimise themselves or report microscopic.
maintenance problems to technicians using IBM is already working on the prototype of ➜
38 June 2001
■ connect~ t e c h n o l o g y n e x t
Infographics: Mahesh Benkar
Pacemak
What goes into Senso
an Embedded
System?
An embedded system is W ireless trans-
any device controlled by
instructions stored on a
chip. These devices are
Transmit
usually controlled by a
microprocessor that exe-
cutes the instructions Senso
stored on a Read Only
Memory (ROM) chip. Doct Patie
One of the most popu-
lar Real Time Operating
Systems (RTOS) in use Embedded systems can completely change the way pacemakers operate
today is QNX (pronounced
‘queue nicks’). It is used for
everything from medical a mobile phone that can be worn as jewellery. unit or laser transceiver fixed in front of it to
instrumentation and moni- The components of the phone will be distrib- determine the distance and relative speed of any
toring nuclear reactors, to uted among different pieces of jewellery—ear- vehicle in its path. The ACC computer (what else
traffic lights and industrial ring, necklace, ring and bracelet. but an embedded system or a grouped system of
process control. In fact, it is The phone is likely to have Bluetooth capa- embedded systems) constantly controls the
so widely used that we use bility built into it. The earrings will have embed- throttle and brakes of the car. This helps to make
devices having QNX several ded speakers and will act as the receiver. The sure that the set cruise speed or adapted speed of
times a day without being necklace will have embedded microphones that traffic at that time is not exceeded.
aware of it. will act as the mouthpiece users can talk into. Another revolution is the way Internet serv-
QNX makes use of a IBM calls the ring part of the phone the ‘decoder ices will be integrated into the car. So when you
micro kernel as opposed to ring’. Light emitting diodes (LEDs) will flash to drive past your mechanic’s, you will be remind-
OSes such as Windows and indicate an incoming call. The ring will also have ed that your engine oil needs a refill, and when
UNIX, so system level func- features that will enable it to be programmed to you cross the city limits, the toll will automati-
tions such as device drivers flash different colours for a particular user or to cally get deducted from your bank account. And
are not part of the system. indicate the importance of a call. A video graph- while passing the shopping mall, your PDA,
The kernel contains a mini- ics array (VGA) will be built into the bracelet,
mum number of features which will display the name and phone number
for implementing basic sys- of the caller. The bracelet will also integrate the
tem calls. These include keypad and dialling functions in it. IBM plans
message passing along to incorporate voice recognition technology for
with other interprocess dialling a number. The phone may also have fea-
communication, interrupt tures to indicate new e-mail.
handling support, and
other features. The other Don’t keep your eyes on the road
functions of the operating Embedded systems can also make driver-less
system are provided vehicle control a reality. Major automobile man-
optionally and modularly ufacturers are already engaged in work on these
through processes that concepts. One such technology is Adaptive
communicate mostly Cruise Control (ACC) from Ford. A mobile phone that you can wear as jewellery
through message passing. ACC allows cars to keep safe distances from
Message passing is a two- other vehicles on busy highways. The driver can which is connected to the Net via the car, will
way asymmetric synchro- set the speed of his car and the distance between inform you about a new sale. In fact, the auto-
nised exchange of data his car and others. When traffic slows down, matic toll deduction concept is already in effect
between two processes in ACC alters vehicle speed using moderate brak- in several countries around the globe.
the OS. It is called asym- ing. This ensures that a constant distance is All these application areas are just tiny drops
metric because one of the maintained between cars. As soon as traffic in the big ocean of embedded systems technol-
processes must be a becomes less, ACC moves up to the desired ogy. These proverbial ‘Davids’ are all set to con-
‘sender’ and the other must cruise speed that has been set by the driver. The quer a world that is forbidden territory for the
be a ‘receiver’ for passing driver can override the system anytime he wants popular desktop OS ‘Goliaths’. So wait with
to take place. to by braking. bated breath for the fireworks to come. They are
Each car with ACC has a microwave radar sure to blow your mind.
40 June 2001
■ connect~ droolmaal
SIZ E it up!
MOHAN KRISHNAN regular software such as Word
and Excel. Others have even cov-
Y
ou can’t just call them per- ered personal entertainment with
sonal digital assistants any built-in MP3 players and support
longer. Most PDAs now offer for watching movie clips. Here’s a
Internet connectivity and look at some next-generation
come with pocket versions of your handhelds.
➜ HP Jornada 720
➜
PDA Powerhouse
A convenient PDA that also provides Internet connectivity, the HP
Sony Clie PEG N-710C Jornada 720 sports a 206 MHz processor with 32 MB SDRAM and
Pure Entertainment also offers 2D graphics acceleration. There’s an in-built 56K
The Sony Clie is not just a PDA, it’s also a personal enter- modem, and also USB support. It weighs 510 grams and comes
tainment organiser, with an in-built MP3 player, audio with the Pocket Office suite. The 6.5-inch colour display is capable
software and a high-resolution reflective TFT colour of 65,536 colours and a maximum resolution of 640x240 pixels.
display (320x320 pixels) screen that can even be used You can also record notes using the built-in voice recorder.
for watching movie clips. The 33-MHz Motorola Web site: www.hp.com/jornada
Dragonball VZ processor with the Palm OS forms
the basic framework for this device.
Web site: www.sonystyle.com/micros/clie
➜
Packed to Perfection
It’s light, quite light, at just 178.6 grams, but with a 206 Mobile Internet Organiser
MHz Intel RISC processor under its hood, the At 200 grams, this mobile organiser doesn’t weigh you down
Compaq Pocket PC promises to zip even though its loaded with features. Revo Plus comes with an
through e-mails, schedules, MP3 files ARM 710 core running at 36 MHz. It includes standard features
and digital photos. Standard Pocket PC such as a calculator, scheduler, alarms, etc, and you can specify
versions of office suites are available, as different alarms that will set off at the appropriate times. Colour
also support for 4,096 colours at 12-bit display is still missing in the 4800x160-pixel resolution. You get
(240x320 pixels). e-mail as well as WAP connectivity with this PDA.
Web site: www.compaq.com/products/IPAQ Web site: www.psion.com/revoplus
42 June 2001
➜
Ericsson Communicator Platform
All-round Communication
The Ericsson Communicator Platform is based on
EPOC. It has an in-built GPS receiver for positioning
information and works on GSM technology. Inter-
net is accessible through WAP as well as HTML.
There’s also an in-built Bluetooth chip for wireless
connectivity with other devices. The Communica-
tor comes with a colour touch-screen and the
interface is designed for easy accessibility.
Web site: www.ericsson.com
Visor Edge
➜
43
■ connect~ passport
SEE SHARP
44 June 2001
■ connect~ passport
sounds cool. Wait, there’s more. Some distrib- known as MCSE, is a networking course where-
uted computing systems would be such that each in a student is imparted training on installing,
What is available? of these three computers could actually be run- configuring and administering the Windows
Following are the courses ning a different operating system! 2000 operating system.
that have been released by To put it in a nutshell, .Net plans to erase the On the other hand, the Microsoft Certified
Microsoft to its training part- boundaries that exist between applications and Solutions Developer or MSCD is a program-
ners across the world. the Internet. Instead of interacting with an ming course and deals with developing cus-
Course 1905: Building XML- application or a single Web site, .Net will con- tomised software and solutions for the business
based Web Applications nect the user to an array of computers and or SoHo community. For example, after com-
Description: Training on services that will exchange and combine objects pleting the MCSD course one could use MS SQL
how to structure and vali- and data. or Visual Studio to develop inventory control
date data in a document by software for, say, a large production house. After
using document type defini- Big deal! What do I get out of it? this certification the student can also administer
tions (DTDs). Thanks to the unpredictable ‘blue screens’ and and manage databases with the SQL knowledge
Course 1913: Exchanging a million other shortcomings that have been an that he/she has acquired.
and Transforming Data integral part of all its software products, .Net is also a programming course and to a
Using XML and XSLT Microsoft has always been criticised. But still, certain extent can be called the successor to
Description: Techniques for Microsoft products are the obvious choice for MCSD. Till now Microsoft has not announced a
exchanging and transform- new computer users. In fact, most home, SoHo replacement for the current MCSD track. How-
ing data using XML and and even enterprise users don’t know of any OS ever, it might do so in the future. So the best bet
XSLT. Best practices for using other than Windows. Even today, it’s virtually for someone who is interested in getting a pro-
XML and XSLT by giving impossible for most people to name a word gramming-based certification is to go in for .Net
compelling examples of the processor other than MS Word. So, in .Net’s rather than MCSD.
best ways to solve real- The reason for this is
world problems. quite simple: if and when
Microsoft disbands MCSD,
the demand for MCSD pro-
The demand for .Net fessionals is going to
professionals is going to increase decline. In such a scenario,
by leaps and bounds once most MCSD professionals
Microsoft releases the first .Net- will end up spending huge
based operating system amounts of money and,
Jitendra Nair more importantly, time to
Karrox Technologies upgrade their skills to the
.Net platform.
46 June 2001
applications), IIS 5.0 Web Server, Exchange 2000 up. Nair adds, “The initial intent is there. Com-
(messaging server), SQL 2000 (database panies are ready to absorb .Net professionals. Try it out!
server), etc. The demand is going to increase by leaps and
bounds once Microsoft releases the first .Net- Here is a glossary of some
The Facilitators based operating system, which it should by the of the technical terms
Going by the requirements, you are probably end of 2001.” C#: Pronounced as ‘C
getting a fair idea of the scope and vastness of Employment avenues aside, another issue of sharp’, this is a simple,
the .Net platform. But don’t think that this is concern is the remuneration that will be object-oriented, and type-
something you can’t do on your own. You can. offered. This is because we Indians have this safe programming language.
The only things required are dedication and a really bad habit of going and doing the same C# is firmly planted in the C
lot of hard work. Once you think you are ready, course that our neighbour did. As a result of and C++ family tree of lan-
you can walk up to the nearest Microsoft Pro- this, 1,000 job seekers might line up for 50 guages. C# aims to combine
metric Institute one fine day and crack the exam. vacancies. Because of this excess supply in rela- the high productivity of Visu-
In case you think you can’t, there are people tion to demand, those who finally do get the al Basic and the raw power
and institutes that can help you. In India, jobs will end up working for half to one-fourth of C++.
Microsoft has tied up with various institutes to of what a .Net professional would get in the US. ASP.NET: A revolutionary
provide training to people who are interested in This has happened in the past with jobs relat- new programming frame-
.Net certification. One such institute is Karrox ed to MCSE/MCSD, Java certification, etc, and work that enables the rapid
Technologies. It is offering .Net as part of a com- it just might happen again. development of powerful
prehensive modular career program called In any case, if your basic programming con- Web applications and servic-
K-Map that spans four semesters. Karrox is not cepts are clear, then you should be able to decide es. Part of the emerging
the only one. NIIT and APTECH are also offer- whether or not .Net certification is the thing Microsoft .Net platform, it
ing .Net certification courses. for you. provides the easiest and
Visit www.microsoft.com/downloads and download most scalable way to build,
That’s it then the software (if you have lots of bandwidth, that deploy and run distributed
Now comes the all-important question—what is) along with the documentation. Play around Web applications that can
about job prospects? .Net is still in its nascent with the software and let that help you make up target any browser or
stage in India. Still, one thing is certain. Sooner your mind about whether or not to go in for the device.
rather than later, the demand is going to build .Net certification.
1/2 Page H. AD
47
■ connect~ wideangle
On my wavelength… sn’t it strange that satellites that were developed for spying and
Graphic images of impending storms,
instant reporting of events from
remote corners of the world, receiving
I other defence needs during the Cold War are now affecting our
daily lives? So much so that we don’t leave our house for a trip
to the nearest hill station before seeing the latest weather report
beamed down to us by our ‘friend from up above’—the INSAT IIB
satellite.
quality radio broadcast even when you
are on the move…welcome to the When disaster strikes
Jan 2001: Devastating earthquake rocks Gujarat
world of satellites Predicting earthquakes is an extremely complex task due to
the challenges involved in tracking the minute shifting of the
earth’s tectonic plates, which collide to cause earthquakes. These
measurements are difficult to record because the plates move just
a few millimetres every year.
Seismologists at the California Institute of Technology and the
Japanese Geographical Survey Institute (GSI) are now hoping to
use Global Positioning Systems (GPS) to accurately predict an
earthquake a few hours before it actually strikes, thus preventing
the loss of thousands of lives.
Solar-powered receivers and antennas are placed in quake-
prone regions. They transmit their positions through signals,
which are sent out every 30 seconds or so, to two or more satel-
lites in orbit. Researchers and scientists use the results to try and
predict when the stress building between plates is likely to culmi-
nate into an earthquake in a particular region.
48 June 2001
The US-based FAA and cargo airlines such as take off—like the Iridium telephone communi-
UPS and FedEx are already testing the feasibili- cations network.
ty of GPS-based alternatives, which can help One new service that has begun to take off all
increase safety and efficiencies in controlling air- over the world is satellite radio. Radio has been
craft arrivals and departures. Using new digital an extremely popular medium since before
tools, pilots would be able to get precise infor- World War II. Even in the age of television and
mation from their cockpit displays about their the Internet, radio continues to be popular
position, the positions of other planes and maps amongst a wide range of audiences. Traditional-
of a particular airport and its runways. This ly, the problem areas for radio have been the
would be enabled by a combination of satellite quality and range of the broadcast. Despite the
positioning technology and digital datalinks popularity of thousands of stations that have
between aircraft. adopted the Internet as a medium for streaming
If Boeing and the others can convince the scep- music to listeners all over the world, these issues
tics that this system has to be adopted, it will have not been resolved completely.
become necessary for each and every one of the Satellite radio promises to deliver a solution
world’s 14,000-plus commercial jets, military and to both of these problems. It is probably the first
private aircraft to have a costly receiver installed. significant advancement in radio since the
The likelihood of this happening in the immedi- arrival of FM more than 30 years ago. It offers
ate future seems remote, but over the long run listeners access to their favourite programmes
satellites may be the only way to enable aircraft to while on the move, when they are out of range
fly more safely, ease congestion, and prevent flight of conventional radio stations. Picture this: stat-
delays that seem to be an everyday occurrence. ic free CD quality music from your favorite sta-
tion, beamed to you in your car, home, or
The new radio personal stereo—anywhere in the world. This
Most of the applications for satellites have tradi- is going to be possible because digital technol-
tionally been centred around communication, ogy is actually being incorporated into the radio
whether you consider the extremely successful receiver set itself.
services for consumers like television broadcast- Sirrus, XM Radio and Worldcast are the pio-
WorldSpace
ing, moderately successful ones like satellite- neers that are looking to bring satellite radio to becoming a Radio
based Internet access, or ones that just did not consumers all over the world. All of them will Star?
probably use proprietary chipsets in their
receivers that will allow them to decipher the In India, US-based broad-
encrypted broadcast signal. The signal itself will caster, WorldSpace, first test-
be transmitted via a network of two or three launched its radio services
satellites and several ground-based repeating in Bangalore in September
stations. 2000. The company claims
These services are targeted primarily at car that the response has been
radio listeners, who will have access to a large quite positive. WorldSpace is
selection of channels. The receivers are already offering several models of
being offered by car manufacturers in the US, satellite radio receivers,
including Ford, BMW and DiamlerChrysler, as ranging from Rs 4,400 to
options on their newer models. Users will have to Rs 9,990.
pay a monthly subscription charge for the service, They have signed up
which will include many commercial-free chan- with Radio Mid-Day and
nels. However, several of the larger manufacturers AIR, in addition to other
of consumer electronics like Hitachi, Panasonic popular international broad-
and JVC have introduced digital receivers for the casters. WorldSpace also
home device markets. creates some original pro-
grammes, including modern
Future scope rock and contemporary pop
Although a large number of people are already hits as well as broadcasts
Car Watcher dependent on satellites, mostly for communica- for children and adults.
Beware, all car thieves! tion, these ‘eyes in the sky’ are now going to make Music, education and
US-based Seaguard Electronics and Direct- an impact on our everyday lives in a more sig- entertainment programmes
ed Electronics have developed Valet Car Com nificant manner. What kind of help will these in a multitude of languages
II, a system designed to provide a Web- satellites render unto humankind in the future? that include English, Hindi,
enabled theft tracking system that can be Even Nostradamus would have been hard- Tamil and Telugu are
accessed from any PC connected to the Inter- pressed to answer this question. But what is cer- beamed by the AsiaStar
net. So if your Maruti gets stolen, just use this tain is that we shall continue to become satellite to subscribers
cyber ‘valet’ to track down the missing car. increasingly dependent on these sentinels that across Asia.
orbit our planet.
49
■ connect~ netreturn
50 June 2001
■ connect~ netreturn
Jagran—Hindi special
In case you need to send only Hindi e-mail,
Transliteration check out this site. www.jagran.com offers the option
The easiest way to write a of sending mail only in English or Hindi. Regis-
message in a regional lan- tration is simple. The page will look unreadable
guage is to type out the when you log on for the first time, but this is rec-
words using the Engish tified after you download the required fonts by
alphabet. For example, Aap selecting the option, Download Hindi Font, and
kaise hain? (How are you?). then installing it.
Sites that offer the facility of One option for sending e-mail in Hindi using
sending e-mail in regional Jagran is the Phonetic Style, which is the same as
languages will then convert transliteration and allows you to type the letter
this message into the ver- in Hindi using English equivalents. You could
nacular script. check the Show/Hide keyboard option when
This process of convert- you’re composing a Hindi e-mail. This brings up
ing characters from one par- a Hindi keyboard below the mail being com- Langoo.com: view it in the language you want
ticular script to another is posed. Positioning the cursor on each alphabet
called transliteration. In our will give you the English equivalent of the Hindi native language (provided, of course, it’s sup-
case, it would be the con- alphabet. Above the Hindi keyboard is a dynam- ported by the site). In fact, the whole site can be
version of the English (also ic guide showing the different Hindi equivalents viewed in your native language instead of in
known as Roman or Latin) based on the first alphabet you type. English.
script to Hindi or Telugu or The best part about Langoo is that it does not
another regional language Langoo.com—a global view require you to install any new fonts, and using it
script, and vice versa. It If you’re looking for something more than just is child’s play. The language can be changed at
should be clearly under- an Indian language e-mail site, you must visit your whim. Hindi, Punjabi, Tamil, Farsi, Gujarati
stood that transliteration is www.langoo.com. This US-based site offers an and Urdu are the Indian languages currently
not the same as translation. impressive array of Indian and foreign lan- available on Langoo. A help list on English char-
In transliteration, only the guages. In addition to Indian languages such as acter equivalents for the regional language char-
characters are converted to Hindi, Tamil, etc, langoo.com also features Chi- acters is available under the text box where you
another script. There is a nese, French, Arabic, Russian, Greek and a whole type in your message. This is a very useful feature
strong possibility that factors host of other languages. This is one of the best when compared to epatra and rediff, where the
such as pronunciation, sites for sending regional language messages and alphabet usage lists appear only when you type in
meanings, accents, etc., the options offered are sure to make you linger the first alphabet.
would change if translitera- on at the site to check them all out. So what are you waiting for? Select your lan-
tion methods are not prop- You can even chat and send e-cards in your guage, register, and start Langooing.
erly designed and used.
A transliteration can
either be applied to a string Get that Epatra Going
of text in one go, or can be
used incrementally for a typ- Click on the Sign Up link on the home page to Select the
ing and buffered output. For get the registration form. language in
example, let’s consider that Fill in the form and click the ‘Register me’ but- which you want
you want to have the word ton at the bottom of the page. This takes you to to write your e-
‘Hello’ transliterated to the next page along with a prompt, asking if mail. Click Go,
Hindi. For the Hindi equiva- you want to download and install HlInstall.exe.
lent, you may have to type Click on the ‘Run program from current loca-
in ‘Helau’. This is the string tion’ option and press OK. The font will be auto- and start typing
of characters that gives the matically installed on your system. your mail.
Hindi script equivalent of Now go As you type the
Hello after transliteration. to the bot- first letter of an
Different transliteration tom of the alphabet, a help
schemes have different Web page table pops up,
string combinations. and log on
Most transliteration using your showing the cor-
schemes work reasonably password. rect combination
well with Hindi, but are not This takes of English charac-
as efficient with other you to the ters required to
regional languages. Inbox. Select the Compose option on the left- get the desired
hand side of the page to start composing your regional language
e-mail. character.
52 June 2001
Downloading and Installing Fonts
Except for langoo.com, most sites that employ transliteration New Font.
require special fonts to be installed on the PC for proper font dis- In Add Fonts, select the
play. These fonts have to be downloaded from the site. The directory into which you
process of installing these fonts is simple enough, but it can be unzipped the font, and select
quite a pain on a dial-up connection. the font name. Click OK, and
To install the fonts, browse through these
steps after you have downloaded the font.
Many of the fonts will be in zipped format. the font will be installed on
Unzip the fonts, using an unzipping utility like your PC.
WinZip 8.0, to a particular In most cases, the fonts
directory. may not be clear or may not
Now go to Start > Settings > be displayed properly. Well,
Control Panel, and select Fonts. the only solution to this is to
Click File, and select Install install them again.
Problems that may crop up their e-mail, which enables the recipients of
Most of the problems that may crop up when these mail to download the fonts directly from
using regional e-mail services are related to the the site. And do read the FAQ section of the site
fonts. At times, the fonts may not be clear or may as it will provide you information on rectifying
not be displayed properly. In such cases, try the problems that you will encounter.
installing the fonts again (see box: Downloading So now you can make your e-mail as person-
and installing fonts). Problems may also arise at al as you would a handwritten letter in your
the receiver’s end. He/she will not be able to view mother tongue. And no more worries about
the e-mail properly if the required fonts are not postal or courier delays either. Reach out and say
loaded. Most of the services include a link on what you feel—anytime you feel like it!
1/2 page H. AD
53
■ connect~ firsthand
WELCOME TO MY HOME
Build it exactly the RINKI BANERJI ical, and can become a rather interesting endeav-
hat a wonderful home you have!”You our. On your personal Web page, you can upload
“W
way you’ve always
wanted to and watch
the world admire
your dream work.
hear these words and beam with
pride. Ever wondered about having
another home that could make you as
proud? Your very own Web site can have its
doors open 24 hours a day to visitors from all
photographs of yourself and your loved ones. Tell
the world what an interesting and eventful life you
lead, by maintaining a personal diary that folks
from across the world can peek into around the
clock. Professional sites, on the other hand, are
over the globe. centred on a business proposition. As Atul Garg,
We’re talking about an MBBS student who has built his own site
Make it your dream home… (w w w.atulrg.com) says, “Personal Web sites help
constructing your Once you have decided what your site is going to you gain an identity on the Internet, while profes-
own Web site be about, whether it will be a professional Web site sional sites help you make money.” Irrespective of
or a personal Web page, you might be fretting the purpose of your site, there are certain elemen-
about the labour and expense it might entail. tary issues that you will have to deal with when
Think again! It’s actually simple, usually econom- you go about building your very own Web site. ➜
56 June 2001
■ connect~ firsthand
Location, location, location! make your choice—some of these free Web space
On the Internet your Web site address becomes providers can be quite unreliable and a lot of
your identity. You can choose to use the URL them have shut down services recently. You
(Universal Resource Locator) provided to you by might end up staring at a blank page instead of
your Web host, which might go like www.servi- your dream cyber abode.
ceprovider.com/yourname. But if you are look- “The netfirms subdomain account of one of
ing for a unique identity then your first move my friends got permanently deleted when he did
should be to register your own domain name. not access it for nearly two months because he
There are several sites that offer these servic- had other urgent matters to attend to,” says
es, allowing you to register either online with an Anup.
international credit card or via a longer paper- Also, the free Web hosts might not be able to
driven application process which allows you to provide you with some of the features that are
pay by cheque or demand draft. important for your site.“I purchased the domain
You would have to cough up anywhere name from net4domains.com and secured 25
between Rs 500 and Rs 1,000 to get your domain MB of free Web space. However, they do not
name registered. You need to first make sure that offer e-mail forwarding services for subdomain
the name you have in mind has not already been accounts and all mail needs to be forwarded to
taken. Most of these sites (like w w w.register.com) another e-mail address belonging to me. Besides,
provide a search facility that helps you to settle you can’t upload any file bigger than 1 MB,
on a unique name for your cyber abode. Simply which is a problem for me,” says Anup.
hook on to the site and enter the domain name If you don’t want to avail of free Web space
you want in the search box to check if it is because of the uncertainties and the strings
available. attached, you can buy server space from an Inter-
“When we were looking to register our net Service Provider. Net4domains has packages
domain, we found a plethora of tempting offers ranging from Rs 850 for a 2 MB student account
from various sites. We finally zeroed in on for one year to an economy pack which costs
net4domains, which registered our domain Rs 5,500 for 15 MB annually. Hosting on a serv-
name for Rs 575 for a period of two years,” says er located in another country (mostly the US and
Anup Nair, who owns an e-consultancy site. Canada) can cost less and is usually a more reli-
able solution due to the higher bandwidth avail-
Where do I host it? ability in those countries.
Once you’ve decided on your domain name you
need to look for a place to host your site. This Looking for an architect?
means getting hard disk space on a computer Now that you’ve got a name and place for
that is always connected to the Internet. your site, you can either outsource the entire
There are a plethora of sites such as geoci- development process to a pro-
ties.com and homestead.com offering free Web fessional Web developer
space to users. These offer anything between 25 or employ your musty
and 50 MB of free space. But you would do well gray cells to read up on
to consult your friends and colleagues before you the basics and then ➜
58 June 2001
■ connect~ firsthand
60 June 2001
The Right Ingredients
You can enhance your site with interactive features. Links such
as ‘Contact Us’, ‘About Us’, ‘Disclaimer’, etc, give the user a gener-
al idea of your Web site and can induce him to either surf
through it or out of it.
The ‘Contact Us’ link should include your official e-mail
addresses where the user can post his queries and complaints,
and offer feedback on your content, products or services. Never
display your postal address on your site—it can be misused.
The ‘About Us’ link should offer company details and a brief
description of what your Web site offers.
The ‘Disclaimer’ notice is a legal document that limits your
responsibility for the content, products or services offered
through the site.
Keeping it ship-shape
Just remember that Web site maintenance is a very essential chore.
After all, you don’t let your brick-and-mortar home run to seed.Your
cyber abode will require some looking-after as well. Be prompt when
it comes to maintaining your Web site.
The more complex your site gets, the more difficult it will be to
maintain it. You need to be diligent and resourceful to tackle those
frustrating times when your ISP fails you, when you have problems
using your FTP client, or (God forbid!) the server crashes. Updat-
ing your site on a regular basis and maintaining consistency in your
content are the surest ways to attract visitors and keep them hooked
to your site.
61
ALISAGAR PARDAWALA which means the program as well as its source
hat if someone were to give you a magic code are obtainable for free.
62 June 2001
Vital Stats Should I go in for
GoToMyPc GoToMyPC?
Price: $19.95 per month
Web site: www.gotomypc.com This, of course, depends on
Download size: 1.35 MB for the server, 200 the kind of use you would
KB for the viewer have for a service like this and
Platforms: Windows 9x/NT/2000 whether you are willing to pay
for it. There are lots of useful
Virtual Network Computing things that GoToMyPC allows
Price: Free you to do. The draw mode
Web site:
GoToMyPC with the MacOS desktop lets you draw anything on the
www.uk.research.att.com/vnc/download.html
remote machine’s desktop
Download size: 978 Kb
Platforms: Windows 9x/NT/2000, Linux, Unix, Expertcity had originally started GoToMyPC with the mouse. The in-built
Sun Solaris to help out its technical support team, so that it chat applet lets users talk.
could remotely help customers with their prob- These could be immensely
lems, without having to go on-site. But then, real- useful to technicians in high-
Accessing VNC using a Java-enabled browser ising its potential, it made GoToMyPC a public lighting areas of the screen
As an alternative to using the VNCviewer, you service for anyone who wanted to connect to his and indicating things to the
can also access the remote PC from any stand- or her PC from anywhere. Until May this year, customer without being physi-
alone Web browser that supports Java, like Inter- Expertcity was offering the free beta version of cally present.
net Explorer. All that’s needed is the machine GoToMyPC. But now the company has decided A unique feature is the
name/IP address and the port (by default, this is to charge a monthly fee of $19.95 for a single user. support for two-way file
set at 5800). transfers. GoToMyPC does
Set it up now not use the conventional
GoToMyPC Step 1: Log on to gotomypc.com. Register to set method of transferring cap-
Expertcity’s GoToMyPC allows you to control up your account. You will need to give your cred- tured video from the remote
your PC from a remote location anywhere in the it card information after which the GoToMyPC machine to the local
world, as long as you have an Internet connec- software will be downloaded and will assign the machine. Actually, it uses a
tion and a Web browser. What sets GoToMyPC remote PC an access code, user name and pass- compression algorithm that
apart from other PC-controlling software is that word, which is chosen by you. efficiently transfers data.
it is a service instead of a specific software. One of the biggest disad-
The best part of this Web-based service is that, Step 2: From the local machine, log on to goto- vantages of GoToMyPC is
unlike with most other services, you do not need mypc.com. Hit the connect button next to the that it is dependent on the
a permanent IP address for the computer you nickname of the remote machine. A tiny 200-KB speed of your Net connec-
wish to have control over. Simply register with the plugin will be downloaded automatically. This tion. Even at 56 Kbps, there
service and download a very small client program plugin lets you connect via your Web browser can be up to a 30-40 second
that rests in your system tray. Since a static IP to the remote machine on which the GoToMyPC lag between the two
address is not required to use this service, it software has been installed. machines. Also, it only sup-
is ideal for people who need to access The remote machine will ports the Windows platform,
their PC but don’t know the technical respond to the local though plans are underway
properties of the network to which machine’s monitor, key- to release a cross-platform
it is connected. board and mouse. version.
Another consideration is
security. Even though it pro-
vides 128-bit encryption, it is
not as secure as software
such as Symantec’s
pcAnywhere. So companies
that have highly sensitive
data might not want to go in
for this service.
On the other hand, it is a
boon for people who have
round-the-clock access to
the Net at their workplace
and need to access their
machines regularly from
home or while they’re on the
move.
63
■ resolve~ unwired
Everyone’s getting on ANIL PATRICK R. would you rather use your trusted instant mes-
f ‘expensive teeny-weeny messages that yup- senger (IM)? Both these services have their pros
to the SMS
bandwagon—here’s
how you can join in
the fun!
I pies send back and forth on their mobiles’ is
what you think SMS (Short Message Service)
refers to, then you’re only partly correct. You
can easily send an SMS text message to your
friend’s mobile even if you don’t have one. And
and cons. Web sites offer features such as track-
ing whether or not your SMS has been delivered.
However, there is always the risk of your cell
phone number being marketed. IMs are gener-
ally more secure when it comes to this aspect.
the story doesn’t end with text messages on However, most of them do not have tracking
mobiles! features—you have to rely on providence with
most IMs.
Getting on the SMS highway
Get the basic information on the required tools. SMS via e-mail
For this, check out the box, ‘SMS Funda Pack’. Nowadays, most cellular operators allow e-mail
Okay, now that you have the basics right, you can messages to be sent to users. The usual e-mail
choose how you want to send the SMS. Do you address of the user is in the form,
want to send the message from a Web site or number@provider.com. For example, if you want
THE LONG
and
SHORT
of it
64 June 2001
■ resolve~ unwired
Whitepapers on
Wireless Technologies
check out
Mindware
➜
66 June 2001
■ resolve~ unwired
68 June 2001
■ r e s o l v e ~ s.o.s.
Troubleshooting
Troubleshooting Problems with installing Windows Me, printer not being
FAQs and tips for registry editing
check out detected, converting PDF files to word, configuring a modem in
Mindware Linux...solutions to these and other problems
Applications Windows
Voice error Me doesn’t install
Whenever I open IBM ViaVoice 98, it gives me Whenever I try to install Windows Me on my
the following error, ‘VOICEPAD caused an Windows 98SE, setup runs well till ten per cent
invalid page fault in module MFC42.DLL’. How of it is complete but then it shows the following
do I get rid of this message? message, ‘Setup cannot copy the files to your
Kovid, system. error-Suo325.’
via e-mail Ibadat,
via e-mail
This error could occur because the
mfc42.dll file is missing, corrupted or it’s This problem arises when a corrupted
the wrong version. This file is required by .cab file has been copied to the hard disk.
many applications and usually most appli- This corruption can be caused either by a
cations come along with their own copy of virus or by failing hardware, but the most
the file, which is placed in the likely reason is a scratched, dirty or dam-
Windows\System folder, thus causing aged CD-ROM. Try cleaning the CD-ROM
problems for other applications. Disabling existing DNS servers in Kppp or replace it. Also make sure that your PC
To fix this problem, the file required by is not infected by a virus. If this does not
Voice Pad should be placed in the ViaVoice help, you need to check the possibility of
directory. You should follow these steps: failing hardware.
Make sure that you can see all the files (hid-
den as well as system) in your system. Then Linux
rename mfc42.dll in C:\Windows\System to Of native and swap partitions
mfc42.dll.old. Reboot the system before this I recently upgraded my system to a 20 GB
step to ensure that no program is using this HDD. I have five disk partitions that contain
file. Next, reinstall ViaVoice. Now you will 3.99, 3.65, 3.65, 3.65 and 3.64 GB, respectively.
find a new copy of mfc42.dll file in C:\Win- I would like to install Red Hat Linux 6.2 in the
dows\System. Copy this file to the Configuring wvdial last partition of 3.64 GB. But when I run the
viavoice\bin directory. Finally, rename the Linux setup and allocate swap and native par-
mfc42.dll.old file back to mfc42.dll in to avoid confusion later on. Use the com- titions, it says, ‘Boot Partition too big’ and does
C:\Windows\System. This should get rid of mand ln -s /dev/ttyS0 /dev/modem. not allocate the native partition, although it
the error. Now you could use any one of the does allocate the swap partition. What should
diallers that are available in Linux. One of I do?
Linux the best utilities is Kppp, which is very easy Hariharan,
Modem in Linux to configure. Those who like command via e-mail
How do I go about configuring a modem in Linux line utilities could use wvdial. To configure
Red Hat 7.0? wvdial, you need to use the command wvdi- This is a common problem when the
Aji, alconf /etc/wvdial.conf. You have a host of con- hard disk size is too big. The error occurs
via e-mail figuration options for wvdial. You should when the boot partition falls outside the
see the man pages for wvdial for more 1024 cylinder area of the hard disk. You
Configuring a modem under Linux is information. Also note that if you are using should try the following. Delete all the par-
pretty much the same as it is in Windows. utilities like wvdial you will have to set the titions that you have made for Linux, that
All you need to know is which port it is DNS server to that of your ISP. This can be is, swap partitions. Then make a /boot par-
installed on. done using netconf. This can be avoided if tition of around 10-16 MB of Ext2 type.
A point to note is that COM1 in Win- you are using Kppp, as it has the option of Now go ahead with making all the other
dows is ttyS0 in Linux, COM2 is ttyS1, and accepting your ISP’s DNS server in its con- partitions, namely, the /Linux Ext2 type
so on. Once you figure this out, you should figuration, with your current DNS server and the swap partitions. This should solve
symlink this device to /dev/modem, so as being disabled. the problem. ➜
70 June 2001
■ r e s o l v e ~ s.o.s.
Hardware place without the formatting getting lost? one or more bad sectors on the hard disk.
Printer problems in Win Me Arun Sinha, The error ID is DEFRAG005 when Disk
I am using Windows Me. The problem is that via e-mail Defragmenter is unable to write to a sector
when I connect my printer on the USB port, and when it is unable to read from a sector,
Windows does not detect it. If I use the Add You cannot convert .pdf files directly the error ID is DEFRAG006. To fix the
New Hardware wizard, it still does not detect it. to .doc files. However, you can use tools
Please tell me what to do. such as BCL Drake (available at
Anoop, www.zdnet.com/downloads/). This tool allows
via e-mail you to convert .pdf files to .rtf files. If this is
This problem occurs if the printer was an online document, you can also convert it
previously installed, or if an install was to html format, using the Adobe PDF con-
attempted and did not finish for some rea- version form available at
son. In this case, when you attempt to rein- http://access.adobe.com/simple_form .html.
stall the driver, the ‘Add New Hardware
Wizard’ does not appear again. Windows
To solve the problem, you need to unin- Defrag will not read Editing the Scandisk.ini
stall the printer first. Download and exe- I have a Pentium 90 MHz PC. I have been expe-
cute the USB supplemental uninstaller riencing trouble with the Disk Defragmenter in problem, you need to run Scandisk with
from the manufacturer’s site. This will Windows 95. After checking the drive for errors, the Thorough option enabled, as you have
uninstall the printer from your system. a message comes up that says, ‘Windows could already done. Since you have not found any
After the system restarts, you will be able to not access part of this drive, ID No. bad sectors and the problem is not yet
install your printer successfully. DEFRAG006’. It also suggests using Scandisk, fixed, you need to configure Scandisk to
which I did with the Thorough option enabled. detect disk timeouts and check each clus-
Applications Scandisk could not find any errors on the disk. ter five times while performing a surface
From .pdf to .doc What could be the problem? scan. To do so, you need to do the follow-
To convert .pdf format files to Word document Rupak Ranjan Roy, ing:
files, I use the Copy & Paste method. The prob- via e-mail Use Notepad to open the Scandisk.ini
lem is that the formatting gets lost. This is espe- file, present in the Windows\Command
cially troublesome when tables are involved. Is This error occurs when Disk Defrag- folder. Create an [Environment] section in
there any way in which this conversion can take menter is unable to read from or write to the file, if the section does not already exist,
and then add the following lines to the sec-
tion, if they don’t already exist:
Windows fixfun /a ScanTimeOut=On
Unwanted affection This will scan the files on your hard NumPasses=5
I work on a network and of late, many of the drive and repair any file found to be Save and then close the Scandisk.ini file.
applications on my system do not work. My infected with the virus. Instructions for Restart the computer in MS DOS mode
system has also become slow and crashes removal, for all versions of Windows, are and then click Yes.
often. I scanned my system with an antivirus also available at www.symantec.com/avcen- Type the following line:
software, and found that the system is infect- ter/venc/data/fix.dos.funlove.4099.html scandisk C:
ed with the Funlove virus. How do I get rid of Then press [Enter] to run Scandisk.
it? You should run a surface scan when
Vinay Raj, Scandisk prompts you to do so, and repair
via e-mail any errors that it finds. You can then start
your PC normally and run Disk Defrag-
W32.Funlove.4099 is a menter. This should solve your problem.
virus that works on a net-
work and affects .exe, scr and Hardware
.ocx files on Windows 95, BIOS updates
98, Me, NT and 2000 sys- I have a computer with a P-III 800 MHz proces-
tems. It corrupts most of the sor and an ASUS CUV4X motherboard, with
Windows applications and Windows 98SE installed. I get an error some-
causes the system to crash times that says, ‘BIOS Data Update Not Correct
often. To get rid of this virus, Cpuid 000000586’. Please tell me what it means
you need to download the and how to fix it.
virus removal tool that is Rajesh,
available at via e-mail
www.symantec.com/avcenter/Fixfun.exe
You need to copy this file to a DOS This message is from the BIOS Update
bootable floppy, and then run the tool as data file located in the motherboard BIOS.
follows: To make sure your PC does not continue to
Illustrations: Farzana Cooper
display this message, you must run the ➜
72 June 2001
■ r e s o l v e ~ s.o.s.
BIOS update utility. You need only run this the user.
program once. This utility will load the You can disable the option completely,
correct data file for the steppings of the but there is no way you can disable it from
processor so that the correct data file is only wiping off the applications. However,
available. If you do not have access to the here is what you can do. You can get Win-
Update utility program, then it is possible dows Me to take a snapshot of the system
to update your system BIOS from the Asus just before you install an application, and
site (www.asus.com). if it works fine, take another one after the
installation.
Applications
No icon, no access! Internet and communications
I downloaded and installed TweakUI from Modem queries
download.com. It was working nicely till I I have a 28.8 Kbps internal modem. When I dou-
removed its icon from the Control Panel. Now, ble-click on ‘modem’ in the system tray to see
since there is no TweakUI icon in Control Panel, Check the TweakUI box to make it show its data transfer rate, it gives the number of bits
I can’t run it, nor can I do or undo any changes, up in Control Panel or bytes received and sent. My questions are
as I just don’t have access to it. Uninstalling and as follows:
reinstalling did not work. Windows 1. When I am browsing any site without
Donnir, Wipeouts sending any data to it, the modem lights still
via e-mail Windows Me has an excellent facility called blink, indicating some bytes are being sent.
System Restore. However, when I opt to restore Please tell me what this information is about?
Icons in Control Panel are controlled my system to any previous date, the computer 2. Though the maximum speed of the
by the .cpl files. TweakUI allows you to wipes out any programs or applications that modem is 28.8 Kbps, sometimes the data trans-
hide these icons from the Control Panel. might have been installed after the restore date. fer rate is large such that it reaches 11500 bps
The problem is that it does not prevent Is there any way to disable this wiping out of (that is 11.5 Kbps) and sometimes as low as 2
you from hiding its own icon. applications installed after the ‘restore date’? KBps. How is this possible?
However, here’s what you can do to Doc Lawrence, Manty,
fix this problem. Go to Start > Find > Files and via e-mail via e-mail
Folders. Here, enter *.cpl and click OK.
You should get a list of cpl files. The System Restore feature actually The modem light blinks as there is
Find TweakUI and right-click it. You restores the system to the last snapshot some data transfer that is taking place on
should find an option, ‘Open With taken by Windows Me. It deliberately does your machine. If the page you are brows-
Control Panel’. Selecting this option not install the applications that were ing contains ads that change dynamically,
will open TweakUI. Then click on the installed after this time, because they data transfer takes place when these ads
Control Panel tab and click on the might have caused the system to crash. load.
TweakUI checkbox. This should solve the Windows Me takes these snapshots at This could also be due to an instant
problem. some intervals, or at the time specified by messenger that is running, a download in
progress, or even some backdoor or a
virus. You can use the command, netstat, in
Windows server is down or unavailable for some DOS to check what ports are being used in
Unsent mail reason, your SMTP server cannot verify your machine.
I am unable to send any messages through the address and may reject the relay. If Secondly, you have the date transfer
Outlook Express. My default mail handler is this is the case, the message will be sent rate wrong as you are mistaken between
cal2.vsnl.net.in. I receive the following error when the receiving server is again avail- the bauds, bits and bytes of the modem.
message, ‘The message could not be sent able. You actually cannot do anything Your modem speed could either be said to
because one of the recipients was rejected about the error as this is usually a prob- be 28.8 kilo bauds per second or 28.8 kilo-
by the server. Subject’, Account: lem with the ISP. bits per second.
‘cal2.vsnl.net.in’, Server: ‘cal2.vsnl.net.in’, A baud is the number of signalling ele-
Protocol: SMTP, Server Response: ‘550 ments that occur each second. This is
<my_email_address>... Relaying denied’, approximately equal to the number of bits
Port: 25, Secure(SSL): No, Server Error: per second. Now, 1 kilobit in communica-
550, Error Number: 0x800CCC79’. tion terms would be 1024 bits (2^10),
A.G. Krishnan, while a byte equals 8 bits.
via e-mail Your data transfer speed reaches speeds
of 11500 bits per second, that is 11.5 Kbps
This error, which is usually ran- to 2 Kilobytes per second, which translates
dom, means that your SMTP server as 16 Kbps. Hence, the data transfer that is
is checking whether the recipient taking place is not from a minimum of 2
name actually exists before sending KBps to 11.5 Kbps, but from a minimum
your mail. If the recipient’s mail of around 11 Kbps to a maximum of 16
Kbps.
74 June 2001
■ r e s o l v e ~ s.o.s.
Windows Reboot the system. Windows should box that will ask for the source and the des-
Driving slow detect the Primary IDE channel. Don’t tination of the file you are extracting. This
My computer, with Windows 95 installed, has allow Windows to reboot, and let it detect should solve the problem.
become very slow. When I run my computer in the Secondary IDE channel. Now continue
safe mode and open the system icon in the Con- to boot into Windows 95 and then reboot Windows
trol Panel, in the Performance tab, I see the fol- from the Shutdown menu. If this too does Added options
lowing errors: not work, you should format the hard disk When I right-click on Start, I can see the options
1. “Compatibility mode paging reduces overall and repartition using fdisk. Open, Explore, and Find in the context menu.
system performance. Windows was unable to Can I add more options to this context menu,
identify a real-mode driver or memory-resident Windows which can open applications?
program loaded in your Config.sys or Autoex- Truant files Satish and Sanju,
ec.bat file. I have a Pentium II 333 MHz, 48x CD-ROM sys- via e-mail
You will see another message that lists the tem. When I try to play VCDs through Windows
name of the driver or program causing the prob- Media Player 7, it displays an error message, ‘A Yes, you can add your own options in
lem. Because Windows could not identify the device attached to the system is not function- this context menu. To do so, open Win-
driver or program, it has switched to MS-DOS ing’. When I try to enter into MS-DOS prompt dows Explorer. Go to View > Folder Options >
compatibility mode to ensure the program will from Windows 98, I get a similar error message File Types. Here, click on Folder and click
run. and another which says, ‘The object that MS- Edit. Now click on New and specify a name
However, this slows down overall performance. DOS prompt refers has been unaccessible or for the action that would appear in the
To improve performance, remove the program removed’. What may be the error? How can I menu. Also specify the program that would
or driver causing the problem, or contact its overcome it? execute this action. Click OK, and close.
manufacturer for an updated version.” Sivapadmanaban, You will now see your own option in the
2. “Drive X: using MS-DOS compatibility mode via e-mail context menu.
file system. This problem often occurs on more
than one drive. Usually it is caused by a driver Internet and communications
in Config.sys that Windows doesn’t recognise, Clear URLs
and is related to the problem ‘Compatibility When you click on the drop-down button in
mode paging reduces overall system perform- Internet Explorer’s address bar, you can see a
ance.’
If you also see that problem, see the Help for
that problem first. If you only see this message
on one drive, that drive is using an MS-DOS
compatibility (real-mode) driver, which may
slow down access to that drive.
Contact your hardware manufacturer to see if
an updated driver is available for your drive. If
not, the drive may work more slowly than is opti- Deleting select URLs from Internet Explorer
mal, but you can still use it.”
Munish, list of all the URLs that you have visited. Is it pos-
via e-mail sible to selectively clear URLs from this drop-
Specifying the source and destination for down list? I do not want to get rid of all the URLs
Windows 95 uses the MS-DOS com- the damaged or missing files by doing a Clear History.
patibility mode when it is not using 16 or Gaurav,
32-bit disk access drivers. To fix the prob- via e-mail
lems, you could try the following: It seems that you have a damaged or
Go to Start > Run. Type regedit and click missing Vgafull.3gr file or Winoa386.mod You can edit the registry to do this, or
OK. In Registry Editor, click on Edit > Find. file in the Windows\System folder. To solve use software that allows you to do so. How-
Type noide and click on Find Next. Delete the problem, you should rename these two ever, backup your registry before editing it.
all the entries that you find. Reboot the files (use the Find tool) and extract the cor- Here’s what you should do: Go to Start > Run.
machine. rect files using WinZip or System File Type regedit and click OK. Go to
If this does not work, go to Start > Settings Checker. HKEY_Current_User\Software\Microsoft\
> Control Panel > System. In the Device Manag- To open the System File Checker, go to Internet Explorer\Typed URLs\.
er tab, check if the Primary and Secondary Start > Run and type sfc; click on OK. Select Here, you will find many URLs. Just
IDE channels have any conflicts (exclama- the ‘Extract one file from installation disk’ select the ones that you do not need and
tion marks next to them). Select Standard radio button and type out the file you want delete them. Make sure that your IE is not
IDE/ESDI Hard Disk Controller and click to extract. running. Exit the registry and restart Win-
Remove. Clicking on Start will bring up a dialog dows. The URLs should be gone.
76 June 2001
■ resolve~ t i p s & t r i c k s
tri
Contents
&
WINDOWS OS
tips
Windows 9x/Me
Creating security policies..........................2
s
Enabling file extensions ............................3
Scraping past security................................3
Changing default locations ......................3
Windows NT/2000
Restricting guest access ............................4
Encrypting and securing files...................4
Watching your shares-I ..............................4
Watching your shares-II.............................4
BROWSER PROTECTION
Internet Explorer 5 and 5.5
Deleting cookies..........................................5
Working around cookies ...........................5
Disabling Windows Scripting Host.........5
Disabling AutoComplete...........................5
Deleting History items ...............................5
Filtering content...........................................5
Disabling Java...............................................6
Changing settings of restricted zone.....6
Netscape Navigator
Changing your security level....................6
Clearing the Location Bar .........................6
Managing cookies .......................................6
Setting privacy options ..............................6
Manage your Usernames and
Passwords......................................................6
Encrypt passwords......................................7
SAFETY IN E-MAIL AND CHAT
Disabling archiving of postings...............7
1
Avoiding newsgroup spams ....................7
Encrypting messages..................................7
Blocking messages using filters..............7
Password protection ..................................7
Changing the Internet Zone.....................7
Hiding IP address in ICQ...........................8
Spoofing your IP in mIRC .........................8
Using a proxy server ...................................8
Keeping a spam address ..........................8
PC SECURITY
Locking Internet access
in ZoneAlarm ................................................8
E-mail protection in Norton.....................8
Importance of Live Updates ....................8
Illustration: Mahesh Benkar Scanning all downloads ...........................8
79
■ resolve~ t i p s & t r i c k s
WORKING WITH WINDOWS
There’s no understating the fact that most likely you are going to be working with one Windows operating system or the other.
So, getting to know the OS is quite important
Ad will come
80 June 2001
unbound to TCP/IP and you no longer object, which is basically a wrapper for
have to worry about your file shares OLE data. Double-clicking on the scrap
being accessed over the Net. file launches any program that may have
been defined in the properties of the
Enabling file extensions scrap object. The scrap object icon is
By default Windows Explorer hides file quite similar to the icon for a text docu-
extensions for known file types, and this ment, and even if Windows Explorer is
includes the .vbs extension which is also configured to show all extensions, it hides
used to create many of the malicious the .shs extension that is associated with
scripts. Therefore, it’s quite possible that a scrap document. So, you can easily end
you might receive an attachment in your up opening an e-mail attachment, say,
e-mail with the actual file name as good- goodstuff.txt.shs (which only gets dis-
image.jpg.vbs, but since the .vbs is a played as goodstuff.txt), and invoke a
known file extension, it gets hidden and malicious command (such as opening
you perceive the file name as goodim- some file or running the format com-
age.jpg and since .jpg files are non-exe- mand) associated with that scrap object.
cutable you open it. This could cause the To prevent this, you have to modify
Disable file sharing Visual Basic Script to execute whatever some settings in the registry. Back up
code is written in it (provided you have your registry before you proceed. Type
why file and print sharing feature should Active Scripting enabled). To regedit in the Run menu, and go to
be enabled. To disable it, open Control HKEY_CLASSES_ROOT\ShellScrap.
Panel and double-click on the Network Locate the NeverShowExt value in the
icon. You will see a list of installed pro- right-hand pane and then delete this
tocols, including ‘File and Print Sharing value. Adopt a similar procedure for the
for Microsoft Networks’. Click on File value under HKEY_CLASSES_ROOT\
and Print Sharing, then click Remove, DocShortcut. Now, all that’s left to do
and finally click OK. Reboot your PC to is change the icons for the scrap object
save the changes. so that they don’t resemble the text
icon. Go to Windows Explorer > Tools, click
Unbinding NetBIOS to TCP/IP on the File Types tab and select the .shs
3
By default, NetBIOS is bound to TCP/IP extension. Click on Advanced, and then
protocol, and therefore it is possible for on Change Icon. Browse to the pifm-
outside intruders to access your file gr.dll file, and select one which presents
shares. You can prevent this by unbind- the warning signals or the dynamite or
ing NetBIOS to TCP/IP. Firstly, you need shield, so that you know there’s danger
to have NetBEUI installed along with associated with such file extensions.
TCP/IP. (Install NetBEUI from the Pro-
tocols options in the Network Configu- Changing default locations
ration menu). Now, select the Dial-up Uncheck the option to hide known file Many intrusion attempts and malicious
Adapter that you use to connect to the extensions Web sites look at specific directories for
Internet, and click on Properties. Go to certain files. This is done on the
the Bindings tab, and uncheck all the prevent this from happenning, go to the assumption that the software will usual-
boxes except for the TCP/IP Dial-up Explorer Window, select Tools > Folder ly be installed in the default locations.
Adapter. Click OK. Now, select TCP/IP > Options, click on the View Tab and For example, Windows will most prob-
Dial-up Adapter, and click on Properties. uncheck the ‘Hide file extensions for ably be in C:\Windows and other appli-
Ignore any warning messages, and click known file types’ option. cations will be within the C:\Program
the Bindings tab. Uncheck all the boxes Files folder.
present here, and click OK. You will get Scraping past security Wherever possible, don’t use the
another warning message, but click No What happens when you try to paste, default folder and change it to some
at this juncture. Close the Network prop- say, the contents of your Word document other name. This will make the task of
erties menu and restart the machine. into the Explorer folder? You get what is whoever is trying to pry into your sys-
This will result in NetBIOS being known as a scrap document or scrap tem all the more difficult.
Ad will come
81
■ resolve~ t i p s & t r i c k s
Ad will come
82 June 2001
BROWSER PROTECTION
Your browsing activity and the configuration you have selected can, to a large extent, define the security levels that you enjoy.
Configure it right for safe surfing
Internet Explorer 5 and 5.5 actions and applications it allows or guess your passwords. When the Auto-
Internet Explorer is the most popular blocks. It is better to click Custom Lev- Complete function is active, some sites,
browser and therefore majority of the els, and then select to prompt for cook- search engines and entry fields retain the
exploits are targetted towards it. So, you ies that are stored on your computer and words you’ve entered, so anyone who
definitely need to be more cautious per-session cookies. This allows you to uses the browser after you and visits that
control which sites you want to allow site can see the entries you made.
Deleting cookies cookies. Remember though, that some To turn off this feature, in the Inter-
Many Web sites drop little files onto your sites may not work properly if cookies is net Options dialog box, click the Con-
system that let them keep track of your disabled. In addition to this, you should tent tab. Next, click the AutoComplete
passwords, and the date and time of your also disable ActiveX, since this can pose button in the Personal Information sec-
visits. To get rid of these files, delete the a serious security hazard. tion to display the AutoComplete Set-
contents of the Cookies folder and the tings window. Uncheck the ‘Forms’ and
Temporary Internet Files folder in your Disabling Windows Scripting Host ‘Usernames and Passwords on Forms’
Windows directory (but not the folders Internet Explorer installs Windows boxes.
themselves). This will remove all traces Scripting Host by default, and this is
of your surfing pattern. You could also used to run VB scripts that may contain Deleting History items
use a third-party cookie cleaning soft- viruses or Trojans. To remove Windows The History folder stores a record of all
ware such as Cookie Crusher. Scripting Host, go to Control Panel > the Web sites you’ve visited. This is very
Add/Remove Programs > Windows Setup. Select convenient, but then your boss, friend,
Working around cookies Accessories and from there uncheck or colleague can easily find out what
Adjust IE’s security settings to keep ran- Windows Scripting Host. You can also you’ve been surfing. Here’s what you
dom Web sites from sending cookies to go to the Folder Options in Windows can do to get rid of unwanted URL his-
your hard drive or uploading ActiveX Explorer, and select the .vbs file type and tories: in Internet Options under the
Controls. To do this, select Internet remove it. General tab, find the History section
Options from the Tools menu, and click and click the Clear History button.
on the Security tab. Slide the bar under Disabling AutoComplete Repeat this before you close the brows-
5
‘Security level for this zone’ up or down The AutoComplete feature may be use- er. Set the ‘Days to keep pages in Histo-
to increase or decrease the security level. ful while filling out forms and user- ry’ to 1. This will not only keep IE neat
Each level (High, Medium, Medium- names, but it also allows other users to and tidy, but will also act as a cushion if
Low, and Low) lists exactly which know your username and then probably you forget to clear.
If you don’t want to clear your entire
History folder, you can choose to remove
single pages. To do this, click the Histo-
ry button on your IE toolbar to open the
History window frame. Right-click on
the file you want to dump and select
Delete from the pop-up window.
Filtering content
Certain sites on the Internet are certain-
ly not appropriate for children. You can
use a separate software program for fil-
tering content, but IE also has some
built-in filtering tools. To configure
these, click the Content tab from Inter-
net Options. Next, click the Enable but-
ton under Content Advisor and adjust
Adjust security settings to block cookies Tame Auto-Complete to ensure privacy the slider in each of the four categories:
Ad will come
83
■ resolve~ t i p s & t r i c k s
Language, Nudity, Sex, and Violence. The Click Remove Cookie to zap the cookie
Description box at the bottom details from your PC.
what each level allows. Click OK to acti-
vate the Advisor. Setting privacy options
It’s advisable to be discreet when you’re
Disabling Java signed on to Netscape 6 Instant Messen-
Java and JavaScript applets can take con- ger. To ensure privacy, click Tasks, Instant
trol of your browser and you should
therefore exercise caution in surfing
unknown and potentially questionable
sights. Both Java and JavaScript can be
disabled from within the browser, but Lock out hacker, cracker attacks
you will miss out on a lot of serendipi-
tous cyber experiences if you surf with
JavaScript turned off. The best course, Clearing the Location Bar
then, would be to toggle between these Most of us mere mortals occasionally
settings according to the perceived secu- visit Web sites or perform searches that
rity threat. we don’t want anyone else to know
Chat with no one but your friends
Changing setting of restricted
zone Messenger, and then select the Preferences
The default settings of Internet Explor- icon. Under Instant Messenger, select Pri-
er for Restricted Sites has Active Scripts vacy. Choose either the ‘Block all users
enabled, which sounds a bit of a from connecting’ button or the ‘Block the
contradiction. To modify this settings, users listed below’ button, and type in the
in Internet Explorer, go to Tools > Options screen names of the people you want to
> Security and select Restricted Zones. avoid chatting with. Click OK.
Click on Custom Level and then go
to the Active Scripting option and Manage your Usernames and
6 disable it. Hide visited sites Passwords
Netscape’s Password Manager stores and
Netscape 6 about. But then anyone can see the last
The latest release of Netscape might be dozen URLs you entered into the Loca-
quite sluggish and not that popular, but if tion bar by clicking the little down arrow
you are a Netscape fan, certain safety on the right side of the window.
measures are still in order To clear the list, select Edit > Preferences
> Navigator > History. Finally, in the Histo-
Changing your security level ry dialog box, click on Clear Location
Skittish about sending unencrypted infor- Bar.
mation, such as your name, phone num-
ber, or address across the Web? Managing cookies
Thankfully, Netscape 6 warns you The History folder isn’t the only place
before it sends information through an where Netscape records your surfing
unencrypted fill-in form. To enable this habits. Many Web sites drop cookies
feature, select Tasks Privacy And Security onto your system. To clear them, select
in Security Manager, and click the Appli- Tasks > Personal Managers > Cookie Manager. A
cations tab. Then check the ‘Sending pop-up window will appear with a list of
unencrypted information to a site’ box. the cookies already on your PC. Get warnings from Netscape
From this dialog box, you can also set Select a cookie to see its name, the
Netscape 6 to raise a red flag before you domain name the cookie came from, its automatically enters your login infor-
enter or leave a site that does not support path, whether it’s secure or not, its expi- mation for password-protected Web
encryption. ration date, and the data it is storing. sites. To start using the Password
Ad will come
84 June 2001
Manager, click Edit, Preferences, and Tools > Personal Manager > Password words in the above manner is that any-
then choose Password Manager in the Manager, and finally View Saved Pass- one who uses your computer will have
Advanced section. Next, click the Enable words. From the same configuratio access to your saved passwords, for
Password Manager check box in the pop- menu, you can also choose to encrypt instance your bank account. Netscape 6
up dialog box. the data that is stored on your hard disk, allows you to store all your passwords
The next time you visit a site that so that others don’t have access to it. behind a master password. To do this,
requires you to log in, you’ll be prompt- select Tasks > Privacy and Security > Password
ed to create a master password. To see a Encrypt Passwords Manager and finally the Change Personal
list of all your stored passwords, select The problem with saving your pass- Security Password option.
Ad will come
85
■ resolve~ t i p s & t r i c k s
the drop-down menu, and select Spoofing IP in mIRC cookies. Another such tool is InterMute
Restricted Sites. For changing the Zone When you are chatting in an IRC chan- (www.intermute.com/), which blocks pop-
in Outlook Express, go to Tools > Options > nel, anyone can just give the command ups as well.
Security, and select the Restricted Sites /whois <yournickname> to get your IP
option. address. Keeping a spam address
To spoof your IP address, you can use When filling up registration forms at
Hiding IP address in ICQ the command, /mode <yournick> +x (or +z) sites or when you have to provide your
Since ICQ works by establishing a direct depending on the channel. Alternative- e-mail address at public places, you
connection, you should ensure that your ly, you can work through a proxy server should use an e-mail address that you
IP address is not visible to other users. or an anonymiser. have specially created for that purpose
Select the option to hide your IP address and don’t give out your personal e-mail
(though a determined user can easily Using a proxy server address.
bypass this security option), and ensure The best possible solution for absolute Also, see to it that you reveal the bare
that other users need authorisation before privacy is to surf using a proxy server. minimum in the forms, and give false
they can connect to you. You can even You could, for instance, use Internet information as far as possible (unless you
select to remain invisible to most users Junkbuster Proxy (www.junkbusters.com/ are in a shopping site, and require deliv-
and not publicise your details on the Web. ht/en/ijb.html), which can selectively block ery of a product).
PC SECURITY
You can secure your PC by using firewalls and antivirus programs and configuring them correctly. A few tips towards this end
Ad will come
86 June 2001
■ select~ t e s t d r i v e
THROW A SCANNER
IN YOUR WORKS ALIASGAR PARDAWALA today’s scanners are sleeker and smaller than
Choose one from ith innumerable free Web services and their predecessors, so you don’t have to allot half
among our
recommendations
and liven up your
W ‘get-your-Web-site-up-in-five-minutes’
software, the need for affordable imaging
solutions is very apparent. The good news
is that a plethora of such solutions are now avail-
able and you can choose from among them
of your desktop space to your new scanner.
Speed test
The speed of each scanner was first tested using
a simple text document created in the lab, which
reports and depending on your application. contained both text and a company logo.
presentations with With a scanner, you can port all those birth- This document was previewed using the
day and family photos over to your personal Twain drivers that came with each scanner, and
distinctive images Web site. Apart from working with just images, the timing was logged using a stopwatch. Here,
if you buy a scanner with OCR capabilities, you we logged the duration between the moment the
can also scan documents and text from newspa- Preview button was pressed and the moment the
pers and magazines. image appeared in Photoshop.
The latest scanners offer a host of features The fastest preview was generated by the
such as Scan-to-Web and Scan-to-e-mail. The Epson 1640 SU, which uses Twain 5 drivers
Scan-to-Web function enables you to post developed by the same vendor. The scanner took
More Info on images to your Web site at the touch of a button, only 5.58 seconds to preview the document at
the test process and the while the Scan-to-e-mail feature allows you to 300 dpi in true colour. The other impressive per-
products tested, check out e-mail an image directly—you don’t have to sep- formers in the preview test were the Microtek
arately import it into your e-mail client. ScanMaker 3600, which took 8.58 seconds, and
Mindware
Apart from the enhanced functionality, the Epson 1240U Photo (9.31 seconds).
Detail on the
fabric
■ Image Quality: and subtle variations in colour, hue, brightness, and resolution.
Since the prime ■ Resolution: To determine the maximum resolution at which
function of a scan- each scanner could pick out the finer details, we used a resolution
ner is to pick up target that consisted of five squares forming bar patterns, created
images and con- at different dpi ratings.
vert them into dig- ■ Speed: We logged the time taken to scan a range of different
Detail in flowers ital format, image images, and at different resolutions and colour depths. Additional-
quality is one of the ly, the time taken to scan text documents and photographs in full
most important parameters for evaluating flatbed scanners. Two colour and gray scale modes was also logged.
reference images were used to test the image quality—the IT8.7 ■ Features: We also considered build quality, ability to scan trans-
colour card, which is a standard image used worldwide for colour parencies, documentation, buttons for one-touch scanning opera-
correction and calibration, and an A4-size photograph that tions, and provision for upgrading to an Automatic Document
helped determine the accuracy of the scanner in picking out details Feeder.
The preview speed depends a lot on the tech- done at 300 dpi in full colour mode and subse- Contents
nology used, the implementation of the optics quently in gray scale mode, using the maximum TEST PROCESS . . . . . . . . .100
used in the scanner, and the software that con- bit-depth offered by the scanner. FLATBED SCANNERS . . . . .100
trols these scanning elements. In gray scale mode, the HP ScanJet 5300C Acer ScanPrisa 640BU
Next, we scanned the document in black- emerged the winner with a timing of 13.5 sec- Acer ScanPrisa 640U
and-white (line-art) mode and then in gray scale onds. The Umax Astra 2400S, which is a SCSI Acer ScanPrisa 1240UT
mode at 200 dpi. The document was scanned scanner, came in second by clocking 15 seconds. Epson 1240U Photo
directly to Photoshop from the Twain drivers of The fastest scanner in full colour mode was Epson 1640SU
the respective scanners. the Epson Perfection 1640SU. It scanned the test HP Scanjet 5300C
The HP ScanJet 5300C was the best among photograph in just 25.31 seconds. The first run- HP Scanjet 6350C
Microtek Scanmaker 3600
the pack in this test—it took just 8.31 seconds to ner-up was the Umax Astra 3400 with a timing
Microtek Scanmaker X6
scan the document in black-and-white mode, of 31 seconds. This scanner, however, gave an Mustek 1200CUB
and 9.25 seconds for the scan in average performance in the other tests. The UMAX Astra 3400
gray scale mode. In black- results indicated that the Epson Perfection UMAX Astra 3450
and-white mode, the 1640SU is the best suited for office UMAX Astra 2000p
HP ScanJet 5300C applications because of its UMAX Astra 2400S
scanned the image, speed in scanning the pho- UMAX Astra 4000U
opened Photoshop tograph, although it was UMAX iA101
and displayed the image not quite as fast in BOXES
in the application in just 9 scanning the text USB or SCSI? . . . . . . . . . . . . .102
How Much Colour Depth? . .102
seconds. This impressive per- document.
Scanning Transparencies . . .103
formance could be primarily The Umax Astra An Eye for Detail . . . . . . . . . .104
attributed to HP’s proprietary Twain 3400 is the perfect SCORE BOARD . . . . . . . . .104
drivers. buy if you are looking DECISION MAKER . . . . . . .103
The final speed test was conducted for an inexpensive CONCLUSION . . . . . . . . . .105
using the test photograph. The scanning was HP ScanJet 5300C scanner for home use.
101
■ select~ t e s t d r i v e
USB or SCSI?
Almost all low-end scanners use a par-
allel port with a pass-through for a
printer to also connect to the computer.
This provides an inexpensive way to
connect both the printer and the scan-
ner to the computer. The downside to
this is that speed is compromised and
the other external Zip drives that need
the parallel port cannot connect to the
scanner. USB devices have been very
successful in the market and you
should opt for a USB connection over a
parallel connection since it offers
increased plug-n-play support, greater
reliability and better flexibility. as the fastest scanner in the speed test and togram function in Photoshop was used to
A high-end scanner usually comes the quality of the scans was also quite determine the standard deviation of the
with a SCSI connector. This is because impressive. The Epson Perfection 1640SU red, green and blue colour values. The cri-
SCSI connectors can handle a lot of came in a close second. terion was the same: a value of 2 or high-
data—a feature that is needed when er meant that the scanner had successfully
dealing with large files. SCSI connectors Image quality evaluation using IT8 card detected the colour variations. Although
usually ship with their own card and This is one of the most comprehensive tests none of the scanners scored below 2, many
the SCSI connector of a scanner is likely to evaluate the performance of imaging of them failed to pick up the green tones
to be incompatible with other SCSI equipment. It was used to evaluate the abil- accurately.
cards. ity of the scanners to differentiate between The HP ScanJet 6350C recorded the
If you are buying a low-end scanner fine nuances in colour and luminosity.
with a resolution of less than 600 dpi, To ascertain the scanner’s ability to dis-
then opt for a USB device, while if you tinguish tonal resolution in gray scale How Much Colour Depth?
need a high-end scanner, a SCSI con- areas, a set of 22 different blocks were
nector is a good choice. observed to check for blending between Colour/bit depth is often wrongly asso-
adjacent blocks. This test determines the ciated with the number of colours a
accuracy of the scanner in reproducing the scanner can pick up. The bit depth is
It would be unfair to omit mentioning various colour blocks in the IT8 card. actually the number of levels of colour
the Epson 1240U Photo, which wasn’t far First, we checked if the scanner could that a scanner can distinguish between.
behind in any of the tests but couldn’t accurately pick up the 22 different shades The extent of brightness values that a
make it to the ranks of the top three. of colour. In order to log the most accu- scanner captures (also called the
Although it took more time than expected rate values, we used the histogram func- dynamic range) depends upon two fac-
(84 seconds) for scanning the test photo- tion in Photoshop. We scanned the IT8 tors—the sensor and the analog-to-digi-
graph in full colour mode, it logged above- card onto Photoshop using the maximum tal converter (ADC). For photos, the
average results in all the other speed tests. optical resolution and bit-depth offered by minimum depth needed is 24-bit, that
Overall, the HP ScanJet 5300C emerged the scanner in full colour mode. We select- is, 8-bits per colour or gray shade.
ed an area that comprised 50 per cent each However, even high-end 24-bit scan-
of two adjacent blocks and ascertained the ners often reduce the number of bits
standard deviation using Photoshop’s his- from 8 to 6. This means that the image
togram option. If the reading was greater does not have a 24-bit depth and so
than or equal to 2, then it implied that the quality suffers. Also, the 6-bit colours
scanner had differentiated between the tend to gather around the mid-tones,
two blocks. All the scanners but one passed leading to deterioration in quality of the
this test by differentiating between adja- shadows and highlights. As the bit-
cent blocks right up to block No 22. The depth increases, the output quality of
exception was the Mustek 1200CUB, the scanner should also increase. How-
which could only detect differences among ever, some manufacturers use a 24-bit
the first 21 blocks. scanner with a 10-bit ADC instead of an
The next test performed using the IT8 8-bit ADC. This improves image quality
card was the colour uniformity test. In this to such an extent that it may even be
test, seven coloured blocks in the A row better than a 30-bit scanner. However,
were selected in Photoshop. These were you would need 30 bits or more for
the lightest blocks in the row with very fine scanning slides or films.
variations among them. Again the his-
103
■ select~ t e s t d r i v e
Specifications
SPECIFICATIONS
Manufacturer Dealer Phone E-mail Price Max. Max. Light source Scanning
Resolution Resolution element
(Optical) (Interpolated)
AceR ScanPrisa 640BU Acer Peripherals 022-5705230 pankajpamani@acercm.com.tw Rs 6,700 600x1200 19200x19200 Cold cathode fluorescent CCD
AceR ScanPrisa 640U Acer Peripherals 022-5705230 pankajpamani@acercm.com.tw Rs 5,500 600x1200 19200x19200 Cold cathode fluorescent CCD
AceR ScanPrisa Acer Peripherals 022-5705230 pankajpamani@acercm.com.tw Rs 16,000 600x1200 19200x19200 Cold cathode fluorescent CCD
1240UT
Epson 1240U Photo Epson India ltd 080-5321266-70 sheetal@eid.epson.co.in Rs 19,500 1200x2400 9600x9600 White cold cathode fluo- ColorMatrixCCD
rescent lamp line sensor
Epson 1640SU Epson India ltd 080-5321266-70 sheetal@eid.epson.co.in Rs 22,500 1600x3200 12800x12800 White cold cathode fluo- Color MatrixCCD
rescent lamp line sensor
HP Scanjet 5300C Hewlett Packard (I) ltd 011-6826000 princy_bhatnagar@hp.com Rs 12,499 1200x2400 9600x9600 Dual cold-cathode CCD
flourescent
HP Scanjet 6350C Hewlett Packard India ltd 011-6826000 princy_bhatnagar@hp.com Rs 26,499 1200x2400 999,999 Dual cold-cathode CCD
flourescent
MICROTEK Scanmaker Microtek International 491 3986/87/ info@compuageindia.com Rs 4,550 600x1200 9600x9600 Cathode fluorescent CCD
3600 Ltd. 88/89/90 lamp
MICROTEK Microtek 491 3986/87 info@compuageindia.com Rs 7,250 600x1200 9600x9600 Cathode fluorescent CCD
Scanmaker X6 International Ltd. /88/89/90 lamp
Mustek 1200CUB Integra Micro Systems 8207208/8215179 mumbai@integramicro.com Rs 9,000 600x1200 19200x19200 Cathode fluorescent CCD
Pvt. Ltd. lamp
UMAX Astra 3400 Neoteric Infomatique 022-4172600 sales@neoteric-info.com Rs 5,550 600x1200 9600x9600 Cold cathode lamp CCD
UMAX Astra 3450 Neoteric Infomatique 022-4172600 sales@neoteric-info.com Rs 9,950 600x1200 9600x9600 Cold cathode lamp CCD
UMAX Astra 2000p Neoteric Infomatique 022-4172600 sales@neoteric-info.com Rs 3,900 600x1200 9600x9600 Cold cathode lamp CCD
Cold cathode lamp
UMAX Astra 2400S Neoteric Infomatique 022-4172600 sales@neoteric-info.com Rs 18,000 600x2400 9600x9600 CCD
UMAX Astra 4000U Neoteric Infomatique 022-4172600 sales@neoteric-info.com Rs 17,000 1200x2400 9600x9600 Cold cathode lamp CCD
UMAX iA101 Neoteric Infomatique 022-4172600 sales@neoteric-info.com Rs 6,500 600x1200 9600x9600 Cold cathode lamp CCD
48-bit Yes 8.5x11.7 F/B 8.5x11.7 19x12x3.5 8.8lb USB No Ulead PhotoExpress,ABBYY FineReader OCR soft- B+
ware,Presto! PageManager
48-bit Yes 8.5x11.7 F/B 8.5x11.7 19x12x3.5 8.8lb USB No Ulead PhotoExpress,ABBYY FineReader OCR soft- B+
ware,Presto! PageManager
48-bit Yes 8.5x11.7 F/B 8.5x11.7 18x12x3 8.8lb USB No "ABBYY FineReader,Presto! PageManager,ScanButton B
software,Ulead PhotoExpress"
42-bit Yes 8.5x11.7 F/B 8.5x11.7 269x435x93mm (W.D.H) 2.8kg USB Yes PageManager,ScanButton software,Ulead A-
PhotoExpress "
42-bit No 8.5x11.7 F/B 8.5x11.7 17.4x11.4x3.8 4.5 kg USB Yes Adobe PhotoDeluxe, ScanSoft Textbridge Pro OCR; A-
ArcSoft PhotoPrinter, ArcSoft Panorama Maker.
36-bit Yes 8.5x11.7 F/B 8.5x11.7 19.9x11.9x4.1 8.1 lb USB No Adobe PhotoDeluxe, ScanSoft Textbridge Pro OCR; B+
ArcSoft PhotoPrinter, ArcSoft Panorama Maker.
36-bit No 8.5x11.66 F/B 8.5x11.66 19.6x12.3x7.6 12.7 lb USB/SCSI 2 No HP PrecisionScan,PhotoDeluxe,Hemera PhotoObject A-
gallery, Hemera NetGraphics, Internet DesignShop
42-bit Yes 8.5x11.7 F/B 8.5x11.7 290x100x440 - USB No HP PrecisionScan, HP Scanjet Copy utility,Hemera B
PhotoObject Gallery, WebShop Designer 5.0.
36-bit No 8.5x11.7 F/B 8.5x11.7 11.5x3.2x17.3 11 lb SCSI No Adobe PhotoDelux,PhotoImpact, Caere B
OmniPage,Caere PageKeeper,Trellix Web.
48-bit No 8.5x11.7 F/B 8.5x11.7 16.1x10.6x1.4 4.2 lb USB No MICROTEK Scansuite, PhotoImpact,Kai's B
PhotoSoap,Caere PageKeeper,Caere OmniPage
42-bit Yes 8.5x11.7 F/B 8.5x11.7 18.2x11.6x2.6 - USB No Ulead Photo Express, Text Bridge OCR B
42-bit Yes 8.5x11.7 F/B 8.5x11.7 18.2x11.6x2.6 - USB TP Adobe Photo Deluxe,Caere OmniPage, NewSoft B+
cover Presto! PageManager, NewSoft Vistashuttle.
36-bit Yes 8.5x14 F/B 8.5x14 21.4x13x4.1 9.9 lb Parallel No Adobe Photo Deluxe,Caere OmniPage, NewSoft B+
Presto! PageManager, NewSoft Vistashuttle.
42-bit No 8.5x14 F/B 8.5x14 21.4x13x4.1 9.9 lb SCSI No B+
42-bit Yes 8.5x11.7 F/B 8.5x14 21.4x13x4.1 9.9 lb USB No Adobe Photo Deluxe A-
Yes F/B 8.5x11.7 18.2x11.6x2.6 - USB No MGI Photo Suite III, OCR, Mailpack B+
CONCLUSION Perfection 1640SU was the clear winner. The HP ScanJet 6350C was also a note-
After putting all the scanners through our Due to its high price tag, this scanner is not worthy performer, delivering excellent
speed and image quality tests, we came up the best option for most home users, but it quality both in the photo and the combi-
with a set of choices for virtually any appli- is definitely a very viable option for the document tests, and at very impressive
cation. demanding office user speeds.
In terms of sheer who is looking for the In the budget category, the Acer Scan-
speed as well as overall best scanning solution Prisa 640U turned in an excellent per-
performance, the Epson in the sub-Rs 30,000 formance and is an ideal buy for home
price range. users who are looking for both quality and
speed at an affordable price.
The runner-up in this range was the
Umax Astra 3450, with its high cost being
the only drawback of this scanner.
With the steady advancement of optical
technology coupled with declining prices,
scanners are rapidly penetrating the home
segment. For all you imaging buffs out
there, the future of imaging looks really
Acer ScanPrisa 640U Epson Perfection 1640SU clear and sharp!
105
■ select~ t e s t d r i v e
IMAGING WITH
INK
F
products tested, check out
ing society’s newsletter, today’s inkjet print-
Mindware
ers are capable of some of the most realistic
images and sharp text printouts today.
Printer technology has not really witnessed
as drastic a change as that seen in other realms of Contents
computing such as 3D graphics processing, but
it has seen a very significant drop in terms of the TEST PROCESS . . . . . .107
technology available for a given price. INKJET PRINTERS . . . .110
Until about six months ago, for instance, 1440 Budget Printers
dpi printing was imaginable only in the profes- Canon BJC 1000SP
sional printing segment, and home and SoHo Canon BJC 2100SP
users had to be content with a 600 dpi resolu- Canon BJC 3000
tion. However, today’s printing technology lets Canon BJC 5100
even home users enjoy full colour printing at Canon BJC7100
high densities, and at prices that put inkjet-print- Canon BJC 50G
ing technology within the reach of most home EPSON Stylus Colour 680
users. HP DeskJet 840C
HPDeskJet 930C
TEST PROCESS HP DeskJet 950C
The test system consisted of a Celeron 466- LEXMARK Z12
based computer with 128 MB SDRAM, a LEXMARK Z22
440BX-based motherboard, and a 20 GB Sea- LEXMARK Z32
gate U8 IDE hard disk. Since the performance of LEXMARK Z42
the printers also depends on the interface, we LEXMARK Z52
configured the parallel port to operate using the Wipro eMerge e7460
ECP+EPP mode. The USB ports were also Mid-range Printers
enabled on the system to support printers that EPSON Stylus Colour 880
EPSON Stylus Photo 870
featured this interface.
HP DeskJet 970Cxi
We loaded Windows 98 SE on a cleanly for-
HP DeskJet 990Cxi
matted system and mapped the image of the
Kodak PPM 200
drive with the OS and all the drivers loaded. This
BOXES
image was restored after each printer was tested
Printers, Then
so as to eliminate any interference from previ-
and Now . . . . . . . . . . . 110
ously loaded printer drivers.
Inkjet Maintenance . . . 112
Each of the printers was subjected to a range
SCORE BOARD . . . . . . 114
of tests that evaluated their performance on two
DECISION MAKER . . . 114
basic parameters—printing speed and image
CONCLUSION . . . . . . . 115
quality. For ascertaining the print speed, we used
a sample document file that consisted of five ➜
107
■ select~ t e s t d r i v e
sample letters, each having text combined fine nuances. It printed the text document in gray
with a graphic logo. The time taken to We also considered features such as scale mode in 55 seconds, which was the
print out this sample file in black-and- build quality, thoroughness of the docu- fastest time logged in this mode. The run-
white and gray scale modes was logged. mentation, bundled software, etc, with ners-up (in gray scale mode) were the Lex-
The image quality test consisted of two points being awarded for each feature. mark Z42 (61 seconds) and the Canon BJC
tests that were run using two separate sam- Based on the price, two categories 2100SP (88 seconds).
ple prints. The first document was a com- emerged: budget printers priced You may well wonder why
bination of text, vector graphics and below Rs 15,000, intended for you would ever need to print
photos. The output of this document was home use, and mid-range a document in gray scale
evaluated to determine the printer’s per- printers costing more mode. Well, if you have
formance in terms of its ability to reproduce than Rs 15,000, used used colours in a docu-
converging lines, concentric circles, high more in offices. ment and just need a
contrast text on a dark background, and the printout to proof it, you
finer details in the original document. Speed could take the printout in gray
To evaluate the performance of the For comparing the scale mode and save your
printer in handling photographic prints, speed of the printers, expensive colour cartridge for
we used an actual A4-sized photograph the text document was the final printouts.
that featured many variations in hue and printed in normal Lexmark Z52: Sturdy and fast In the image document test in
brightness, and also had many details and draft mode (or normal mode, the winner was the
black-and-white mode) on plain paper, Epson Stylus Color 880 with a print speed
and then again using gray scale mode. We of 31 seconds, followed by the Canon BJC
Printing Speed then printed the image document in both 5100 (43 seconds) and the Epson Stylus
(5-page document in seconds) gray scale and normal colour modes on Color 680 (62 seconds). If you need a
plain paper. We logged the time taken for printer to execute volume-printing tasks
each of these printouts to determine the in colour, go for the Epson Stylus Color
printer’s performance in each of the two 880.
modes. In the final speed test, wherein the
The Lexmark Z52 clocked the fastest image document was printed in gray scale
time of 36 seconds for printing the five- mode, the Epson Stylus Color 680
page text document in normal mode, fol- emerged as the winner with a timing of 44
lowed by Hewlett-Packard’s DJ 990Cxi (42 seconds. Three printers came in a close
seconds) and the Epson Stylus Color 880 second—the Lexmark Z52, the Epson Sty-
(60 seconds). So if the bulk of your print- lus Color 880, and the Epson Stylus Photo
ing applications at home or office involves 870, with all three clocking 63 seconds. So
text documents, the Lexmark Z52, with its if you regularly proof images and want to
combination of speed and excellent print conserve your colour cartridge, you have
quality, is the best choice. a choice of four printers. ➜
Image quality bars with 10 levels of colour saturation minute details even from such a small
When you consider buying a printer, the to determine each printer’s ability to cap- image. The joint winners here were the
image quality it offers is sure to be upper- ture the colour variations. The winner in Hewlett-Packard DJ 990Cxi and the
most on your mind. If the test of a printer this department was the Hewlett- Kodak PPM 200, with the Epson Stylus
is in its ability to print image documents Packard DJ 990Cxi—it was able to accu- Color 880 and three other HP printers los-
that are faithful to the original, then its rately reproduce 59 of the 70 coloured ing out narrowly.
ability to print documents with text and boxes. The same Finally, we determined the printer’s
images combined may be considered the vendor’s DJ ability to pick up small font sizes by observ-
acid test. We divided the image 930C came a ing the reproduction of the text printed in
quality test into two close second four different font sizes. This is a relevant
parts: by flawlessly feature if you want to print multiple pages
The combi-docu- picking up 56 in a single sheet: You would then have to
ment: This docu- of the 70 depreciate the font size and would want
ment, as mentioned boxes, while your printouts to still be readable.
earlier, contained both the Epson Sty- All the Lexmark printers barring the
high-resolution images lus Photo 870 Z12, as well as HP’s 990Cxi, 970Cxi, 930C,
as well as text, which took third place and 950C, were able to print three of the
were combined in a by picking up 55 font sizes. Others that matched this per-
manner that would com- boxes. formance were the Kodak PPM 200, the
prehensively test the print- The next sec- Epson Stylus Photo 870, and the Canon
er’s image reproduction tion we observed BJC 7100.
capabilities, including its ability to was the black box We then aggregated the scores achieved
replicate the finer details of the with the yellow by each printer. The overall winners were
HP DeskJet 990Cxi: High in quality
original. but also in price text. Here again, the Canon BJC 7100, and Hewlett-
The Flower-Woman photo: the Hewlett- Packard’s DeskJet 950C, 840C and 930C.
This was the second part of the Packard printers The other impressive performers were the
test procedure wherein the image (see took the top positions and were followed Lexmark Z52, the Hewlett-Packard DJ
image in the Scanner comparison test) con- closely by the Epson Stylus Color 880 and 990Cxi, and the Kodak PPM 200.
tained several minute details, such as the the Kodak Personal Picture Maker 200.
wrinkles on the woman’s forehead, details The Lexmark range fared the poorest, with Image quality (Flower- woman)
in the clothing, contrast and sharpness in all the outputs displaying a splurge of We concluded the image quality test by
the flowers, etc that would put the printer black without even a tint of the yellow observing the printouts of the Flower
to the test. colour of the text in the original. Woman photo, and this was the most cru-
We also considered a passport-sized cial part of the test as the image contained
Image quality (combi-document) photograph of the flower-woman to deter- numerous minute details.
We used photo quality inkjet paper, and mine the printer’s ability to pick out We checked for faithful reproduction
the document was printed in photo or
high-resolution mode as opposed to the
normal or draft mode that was used in the
speed test. We observed the four-colour
Inkjet Maintenance
checkered box in the output to evaluate the Here are a few tips on maintaining your can be done from the toolbox or the
colour depth and the sharpness of the inkjet printer: monitoring software that gets installed
checks. Only five printers passed this test Aligning/calibrating the print head: This along with the printer drivers. Generally, a
without any errors—the Epson Stylus is one of the most important tasks to be test pattern is printed while the cleaning
Color 870, the Epson Stylus Color 880, the performed after installing a new printer or process is on, and this can help you
Canon BJC 5100, the Canon BJC 7100, a new cartridge. If the print head is not determine whether a particular cartridge
and the Wipro Emerge e7460. Seven of the calibrated properly, it may result in abnor- is out of ink.
printers displayed an almost flawless per- mal or bad print quality. The newest Checking for paper jams: This is a fre-
formance—for instance, the HP DJ 930C range of printers from Hewlett-Packard quent problem with inkjet printers, and
lost a point for pixelation in the black have an automatic calibration process could happen because of dust collecting
checks, while the Epson Stylus Color 680 wherein the print head is calibrated auto- in the paper path. You have to clean the
lost a point for uneven checks. matically after the printer is installed or printer regularly, especially the area near
The concentric circles image, which when the printer detects a cartridge the paper output tray. Check for bits of
had lines drawn from the centre to the cir- change. paper and even stapler or paper pins that
cumference of the outermost circle, was Cleaning the print head: If you could cause paper jams and eventually
checked for accuracy of reproduction. The encounter problems while printing, such damage the printer’s assembly. It is a
Epson Stylus Photo 870 secured the high- as abnormal linings, bandings, uneven ink good practice to use a blower or vacuum
est score allocated for reproducing this fea- flow, or missing colours, the printer noz- cleaner once in a while to remove dust
ture, while the others lost out because of zles are probably clogged with excess from the parts that are not accessible with
jagged lines or non-uniform colouring. dried ink that needs to be cleaned. This your bare hands.
Next, we observed the seven coloured ➜
Specifications
Manufacturer Model Dealer Phone E-mail Price Resolution Interface Input buffer
BUDGET RANGE
Canon BJC 1000SP CRR Centre* 011- 6806572 brijesh@canon.co.in Rs 3700 720 X 360 Parallel 10 KB
Canon BJC 2100SP CRR Centre 011- 6806572 brijesh@canon.co.in Rs 4000 720 X 360 Parallel/USB 54 KB
Canon BJC 3000 CRR Centre 011- 6806572 brijesh@canon.co.in Rs 6500 1440 X 720 Parallel/USB 128 KB
Canon BJC 5100 CRR Centre 011- 6806572 brijesh@canon.co.in Rs 9500 1440 X 720 Parallel 4 MB
Canon BJC7100 CRR Centre 011- 6806572 brijesh@canon.co.in Rs 13000 1200 X 600 Parallel 256 KB
Canon BJC 50G CRR Centre 011- 6806572 brijesh@canon.co.in Rs 15000 720 X 360 Parallel/ IRDA 32 KB
EPSON Stylus Colour 680 Epson Singapore P.Ltd 080-5321266 sheetal@eid.epson.co.in Rs 8000 2880 x 720 Parallel / USB 32 kb
Hewlett-Packard DeskJet 840C HP India 011-6826000 princy_batnagar@hp.com Rs 8499 600 X 1200 Parallel / USB 2 Mb
Hewlett-Packard DeskJet 930C HP India 011-6826000 princy_batnagar@hp.com Rs 10990 2400 x 1200 Parallel / USB 4 MB
Hewlett-Packard DeskJet 950C HP India 011-6826000 princy_batnagar@hp.com Rs 11499 2400 x 1200 Parallel / USB 4 MB
LEXMARK Z12 T.V.S Electronics 044-2325506 ap.aditya@tbg.tvse.co.in Rs 4295 1200 x1200 Parallel / USB NA
LEXMARK Z22 T.V.S Electronics 044-2325506 ap.aditya@tbg.tvse.co.in Rs 4495 1200 x1200 Parallel / USB NA
LEXMARK Z32 T.V.S Electronics 044-2325506 ap.aditya@tbg.tvse.co.in Rs 5495 1200 x1200 Parallel / USB NA
LEXMARK Z42 T.V.S Electronics 044-2325506 ap.aditya@tbg.tvse.co.in Rs 8695 2400 x1200 Parallel / USB NA
LEXMARK Z52 T.V.S Electronics 044-2325506 ap.aditya@tbg.tvse.co.in Rs 10995 2400 x 1200 Parallel / USB NA
Wipro eMerge e7460 Wipro Pheripherals Ltd 080-6397418 helpdesk.mumbai@wepindia.com Rs 4500 (Only colour cartridge) 600 x 600 USB 512 KB
MID-RANGE
EPSON Stylus Colour 880 Epson Singapore . Ltd 080-5321266 sheetal@eid.epson.co.in Rs 19000 2880 x 720 Parallel/USB 256 kb
EPSON Stylus Photo 870 Epson Singapore P. Ltd 080-5321266 sheetal@eid.epson.co.in Rs 19500 1440 x 720 Parallel/USB 256 kb
Hewlett-Packard DeskJet 970Cxi HP India 011-6826000 princy_batnagar@hp.com Rs 19990 2400 x 1200 Parallel/USB 4 MB
Hewlett-Packard DeskJet 990Cxi HP India 011-6826000 princy_batnagar@hp.com Rs 24499 2400 x 1200 Parallel/USB 8 MB
Kodak PPM 200 Summit Infotech 011-6517995 vkalyan@summitindia.com Rs 18000 1200 x 1200 USB NA
of details such as the colour of the trast quality, were the Lexmark Z52 and the feature. Printers that printed even when
woman’s teeth and the wrinkles on her fore- Hewlett-Packard DJ 990Cxi. the lid was open incurred penalty points,
head, and looked out for signs of dithering since it is not safe to print with the lid
or graininess in the print. Three printers Features open, especially if there are children
performed exceptionally well here—the We considered features such as build qual- around. Most of the Lexmark models
Epson Stylus Color 880, the Epson Stylus ity, documentation, bundled software, printed even when the lid was kept open.
Photo 870, and the Kodak Personal Picture accessories offered with the standard pack- Dual-side printing facility was offered only
Maker 200. Those that narrowly lost out, age, the type of power connector provided, by the HP printers, with some models
primarily due to dithering and poor con- etc., with points being allocated for each offering it as an optional feature. But
although the Canon BJC 2100SP and the
Lexmark Z52 don’t posses this mecha-
Decision Maker nism, the software manipulates the entire
process by first printing alternate pages
and then flashing an online message that
Performance Lexmark Z52 prompts you to reverse the sides and place
the pages in the input tray in the correct
Budget sequence.
Features Canon BJC-3000 The printers from Lexmark, Epson and
Canon display an online print status win-
dow that helps you keep track of the print
Performance Epson Stylus Color 880 jobs that have been fired.
Mid-range The Lexmark Z52 emerged as the most
Features HP 990 CXi feature-rich printer, followed by the
Canon BJC-3000, the Hewlett-Packard
970Cxi and the Lexmark Z42.
4 PPM 50 Pages Black & Colour 600 Pages 100 Pages Bubblejet Ink On Demand 2.2 Kg 360mm x 174mm x 160mm Yes Yes B
5 PPM 50 Pages Black & Colour 1800 Pages 130 Pages Bubblejet Ink On Demand 2.4 Kg 370mm x 191mm x 164mm Yes Yes B+
9 PPM 50 Pages Black & Colour 500 Pages 280 Pages Bubblejet Ink On Demand 3.7 Kg 418mm x 3.6mm x 169mm Yes Yes A-
10 PPM 130 Pages Black & Colour NA NA Bubblejet Ink On Demand 5.3 Kg 498mm x 279mm x 222mm Yes Yes B+
8 PPM 130 Pages Black & Colour 900 Pages 320 Pages Bubblejet Ink On Demand 6.4 Kg 467mm x 313mm x 218mm Yes Yes A-
5.5 PPM 30 Pages Black & Colour 170 Pages 40 Pages Bubblejet Ink On Demand 900 Grams 302mm x 112.5mm x 49mm Yes Yes B
3.8 PPM 100 Pages Black & Colour 600 PAGES 300 PAGES Epson Micro piezo 4.1 Kg 450mm x 547mm x 259mm Yes Yes A-
5 PPM 100 Pages Black & Colour NA NA HP Thermal Inkjet 5.66 Kg 18" x 7" x 14" Yes Yes B
7.5 PPM 100 Pages Black & Colour NA NA HP Thermal Inkjet 5.7 Kg 440mm x 196mm x 400mm Yes Yes B+
8.5 PPM 100 Pages Black & Colour NA NA HP PhotoRet lll Clr Layering 5.94 Kg 440mm x 196mm x 370mm Yes Yes B+
3 PPM 100 Pages Colour Cartridge Only NA NA Thermal Inkjet 1.8 kg 296mm x 373mm x 678 mm Yes Yes B
3.5 PPM 100 Pages Colour Cartridge Only NA NA Thermal Inkjet 2.4 kg 319.8mm x 447mm x 495.6mm Yes Yes B
3.5 PPM 100 Pages Black & Colour NA NA Thermal Inkjet 2.4 kg 319.8mm x 447mm x 495.6mm Yes Yes B+
5 PPM 100 Pages Black & Colour NA NA Thermal Inkjet 4 kg 287mm x 444mm x 521mm Yes Yes B+
7 PPM 100 Pages Black & Colour NA NA Thermal Inkjet 4 kg 287mm x 444mm x 521mm Yes Yes A-
2 Pages 100 Pages Black only (Printer avaliable NA NA Thermal Inkjet 5.4 Kg 404mm x 476mm x 211mm Yes Yes B
with Colour and Black Cartridge)
4.6 PPM 100 Pages Black & Colour 900 Pages 300 Pages Epson Micro piezo 5.6 Kg 450mm x 546mm x 269mm Yes Yes A
8.8 PPM 100 Pages Black & Colour 540 Pages 220 Pages Epson Micro piezo 5.6 Kg 470mm , 613mm x 302mm Yes Yes A-
10 PPM 150 Pages Black & Colour NA NA HP Thermal Inkjet 5.9 Kg 431.8” x 196.8” x 431.8” Yes Yes A-
13 PPM 150 Pages Black & Colour NA NA HP Thermal Inkjet NA 431.8” x 431.8” x196.8” Yes Yes A-
NA NA Color & Black NA NA Thermal Inkjet 2.6 Kg 463mm x 234mm x 195mm Yes Yes A-
CONCLUSION quality and so you wouldn’t let pricing breathtaking. This was especially apparent
It’s clear that there can be no outright win- constrain your choice. in the photograph printout, where the
ner for all uses—your application and In the performance category, the details in the various sections of the photo
your budget will determine the best print- Epson Stylus Color 880 with its faithful came through brilliantly. Also, with very
er for you. If you are what we could term reproduction of fine details and colour robust build quaity and righ features, this
as the ‘average home user’, you would want gradations emerged the clear winner. printer is a very good choice for the
to strike a balance between performance While the printer performed well in the demanding office user who needs the best
(both in terms of speed and image quali- speed tests, it really shone in image quali- in printing technology.
ty) and price. If you are a graphics profes- ty prints, where the level of details and the The Canon BJC 3000, with its com-
sional, you can’t possibly compromise on ability to faithfully reproduce col ors was mendable print quality, bagged our Best
Value award as it offered good perform-
ance at a very good price point, making it
an ideal choice for the home user who’s
interested in printing stationary, cards etc
without spending too much.
With the price for a given technology,
speed, and resolution declining rapidly
over the recent past, inkjet printers are now
well within the reach of the home user. If
you are still deliberating on the pros and
cons of buying your first printer or upgrad-
ing to a new one, an evening of window
shopping will help you make the decision,
for you are sure to find a product that fits
Epson Stylus Color 880: Good performance Canon BJC 3000: Value for money your requirements and your budget.
115
■ select~ t e s t d r i v e
117
■ select~ t e s t d r i v e
Glossary access the Internet, prevent malicious scripts applets was a grey area with all the firewalls
or controls from stealing information or (except Norton to some extent). Sites man-
TCP: Transmission Control Protocol is the uploading files and prevent Trojans and age to exploit the vulnerabilities in Inter-
method used to transfer information other backdoors from running as servers. net Explorer, Outlook Express and other
between two connected computers over Port scans: The good thing with most of software to steal information or upload
a network or the Internet. In a TCP the firewalls we tested was that they didn’t files. Therefore, even if firewalls do not
implementation, the protocol divides the show up any ports as open in the Nmap and recognise such malicious sites, they should
information into smaller packets, and Retina scans. If at all there was an open be able to warn you when data is being
also at the same time ensures that the port, it was port 139, which is related to retrieved or written to your machine.
packets reach the other side safely. sharing files over networks. The one soft- We were able to easily upload a .hta file,
UDP: User Datagram Protocol is a con- ware that showed up more open ports was which runs a ‘Hello World’ message, to the
nectionless transport protocol, which eSafe desktop. It showed port 139, port Test Bench without the firewalls detecting
means that you do not need to have a 6699 (the port used by the Napster applica- any warning. Only Norton stopped the
connection established between the tion), and other such ports as open. Black- loading of a malicious Java applet on
host and the remote machine before ICE Defender was the most informative in
starting transfer of data. terms of identifying the port scan attempts,
ICQ, for instance, is an application and even recognised the Nmap scans and
that uses the UDP protocol. UDP, how- the actual commands that were being sent.
ever, doesn’t ensure that the packets Intrusion attacks: The differences came up
reach easily, though it is faster. when we tried the application level or OS
ICMP: Internet Control Message Protocol level exploits. Firewalls such as Sygate, Tiny
carries control messages that are used to and eSafe showed up the blue screen
acknowledge and respond to connec- momentarily when we tried an IGMP
tions. For example, the ping command flooding. Others such as Norton Personal
uses this protocol. Firewall, ZoneAlarm and NeoWatch
IGMP: The Internet Group Management became unstable with packet flooding
Protocol is an extension of the IP proto- attacks. However, such intrusion detection
col and a standard for IP multicasting. It attempts had no effect on ZoneAlarm Pro, PGP Desktop wards off most intrusion
is used to inform local routers about the and the Network Associates products— attempts
presence of a member of a multicast McAfee Personal Firewall and PGP Desk-
group. If a host is part of a multicast top Security. These two, in fact, managed another site. We were also able to config-
group, then it is also more prone to to do quite a bit of load balancing by ignor- ure eSafe Desktop to block the .hta file
IGMP flooding. ing such attacks totally, to the extent that we from being uploaded. eSafe employs the
Packet sniffer: Packet sniffing refers to did not even come to know that we were method of selective file-sharing or ‘sand-
monitoring data that is passed over a being flooded with packets. We faced no box’. So for each application, you can spec-
network. You have specific software that problem with exploits targeted at software ify the directory rights (or even file rights)
allow you to sniff the packets that travel such as ICQ or mIRC, and the firewalls in terms of read, write, execute, delete, etc.
and retrieve information from it. were able to ward them off easily. For instance, you can specify that Internet
RATs/Backdoors: Remote Administra- Malicious Web sites: Detection of mali- Explorer will have no read rights over the
tion Tools are a method of controlling cious ActiveX controls, scripts or Java Windows Desktop and System directory,
remote machines using the IP address.
Trojans such as SubSeven and BackOri-
fice are RATs in that sense as you can
control a remote machine if the Trojan is
Scanning through Web Sites
installed in it. Before you start the firewall hunt, you The ASP site of Network Associates
Normally, these Trojans have a server can get your machine diagnosed online Mcafeeasap.com, also gives a free trial to
part and a client part. The server is using Web sites that offer this service. check your system for vulnerabilities
installed in the remote machine and lis- These Web sites normally scan your using PGP CyberCop scanner. The only
tens on a particular port. Using the machine using some commercial port problem here is that you have to register
client, you can connect to the server on scanner to see if there are any ports open first before availing of this facility. There
that port, and then control the machine and report the same to you. are other Web sites which offer a paid
in any way you want. You can even Remember though, that if you are service, and this is more useful if you
enable packet sniffing using some RATs. scanning from a dial-up access, this may have your own Web site or domain
DoS/Nukes/Flooding: Denial of Service take some time. And you cannot be name. Some of the sites offering audit
attacks prevent a target machine from beyond a gateway or a proxy which hides through the Web are:
accessing a network resource. A simple your IP address if you want your machine www.symantec.com
form of a DoS attack is by sending large scanned. www.grc.com
packets of data to a single machine, Symantec’s site even offers to scan www.mcafeeasap.com
thereby making it unstable or even your machine for Trojans and analyses www.securityspace.com
crashing it. the privacy features of your computer. www.automatedscanning.com
1/2 page AD
119
■ select~ t e s t d r i v e
June 2001
Breaking the Firewall
Is a personal firewall the solution to all dependent on you and the rules you cre-
your security problems? Certainly not, as ate. If a suspicious application tries to
many reports would seem to suggest. For access the Internet, your firewall will most
instance, there’s a utility specifically tar- likely give a warning. Now, if you choose
geting ZoneAlarm and ZoneAlarm Pro that to allow this application access, then
stops ZoneAlarm if it is running, and pre- don’t blame the firewall if the application
vents it from starting. Called ZoneMutex , turns out to be a Trojan. That’s the main
this is just a small terminate-and-stay-resi- loophole most cracks for firewalls work
dent (TSR) program. Previous versions of around. It’s the belief that if you are pre-
ZoneAlarm were also prone to an Nmap sented with an application that sounds
scan which was done using port 67 as the familiar (say Explorer.exe or Iexplore.exe), Block protocols in ZoneAlarm Pro
identified port (nmap –g67 –sS <IP address>). you are most likely to give access to this
eWeek magazine also reported another application. It’s therefore possible for a McAfee was a bit different in terms of
crack for BlackICE Defender that allowed Trojan to rename itself as a known appli- the protocols that it supported. While
to get past the firewall. The same crack cation and gain access to the system. most firewalls restricted themselves to
was supposed to work with other fire- Regularly monitor the activities of your TCP and UDP, or added IGMP and ICMP,
walls such as Norton also. firewall and use the NetWatcher utility McAfee had support for allowing or block-
Remember that the effectiveness of a that comes with Windows to check out ing RIP (Routing Information Protocl),
personal firewall is to a great extend your shares. ARP, PPTP, etc. In terms of customising
and ease of use, the simplest to use to block
ports and protocols were ZoneAlarm Pro
ports, and you can add other ports to traffic you want blocked, and then the and Tiny.
monitor. ports on which the firewall will listen to Application-level security: The simplest
Tiny and ZoneAlarm Pro use the con- block the traffic. eSafe or BlackICE had the way a firewall works is by restricting or
cept of blocking certain protocols on a same features, but the difference was that granting permission to applications to
range of ports. In both of these, you can you had to manually enter the information access the Internet. The first time an appli-
select the protocol and the direction of for each port. cation tries to access the Internet, the
1/2 page AD
121
■ select~ t e s t d r i v e
firewalls open up a response box which and the Pro version have separate settings
you can use to allow or disallow that for the local network. In eSafe, the person-
application, and also tell the firewall to al firewall module doesn’t allow blocking
remember this rule for future reference. Network Neighbourhood, but in the
This is a very important feature because it Administrator module, under the privi-
is the best way of knowing if some leges for the user, you can cut off access to
unknown application (or Trojan) is trying local networks.
to access the Internet. In some firewalls, Other features: Different firewalls came
application-level filtering was bundled with many other utilities that added to the
along with the feature to block ports or feature list. Norton and eSafe have the pri-
protocols. Sygate was the best in this fea- vacy or protection of confidential infor-
ture. After you use an application for the mation feature. Here, you can specify
first time and create a rule to allow it, you confidential information that you do not
can specify the IP addresses that this appli- want transmitted to any Web site or non-
cation can use, the range of ports that are Sygate is the easiest to configure secure site. So, you can easily enter some
allowed, and even schedule a period-range digits of your credit card, and block this
during which the application can be run. host name. In some firewalls, you can cut information from being passed. Norton also
ZoneAlarm Pro also offers some features off access to the Internet using the IP allows you to block referrer logging, that is,
related to application-level filtering in address range, or by setting the security sites you visit will not know where you came
terms of ports and protocols that are relat- level to the highest. ZoneAlarm Pro has a from. You also have the provision to block
ed to the application. You can also specify single icon that allows you to immediately cookies. Some firewalls also come with pass-
whether the application has access to the stop access to the Internet. word protection features. Tiny is the only
local zone or Internet zone, and whether Into the Network Neighbourhood: one that has a remote administration utili-
the application can act as a server to other Intruders don’t just exist in the Internet ty. eSafe also ships an antivirus package
programs trying to connect to it. space—they could be people who are sit- along, while PGP has features relating to
Blocking IP addresses and Web sites: ting next to you in a cyber cafe or in office digital signatures and protection for VPNs
Although it is not traditionally part of a and sharing the same network connection. (Virtual Private Networks).
firewall’s job, most firewalls nowadays So, firewalls should ideally also protect you Among the various firewalls, it is evi-
sport this feature. They can be used to from intrusions coming from the local net- dent that ZoneAlarm Pro and Norton Per-
block access to malicious Web sites or as a work, and even deny certain computers sonal Firewall 2001 have the maximum
content filtering tool. They can even access to files shared on your PC. Most fire- number of features.
restrict access to machines in the local net- walls didn’t sport this feature, and even if
work. Most firewalls just ask you to speci- they did, it didn’t work properly and we Ease of use
fy the IP addresses that have to be banned. could easily access shares on the Test A firewall may perform well and have loads
Norton allows you to ban IP addresses or Bench. eSafe, Norton, ZoneAlarm and of features, but if it is difficult to configure
host names (including subnets) in con- ZoneAlarm Pro were the only ones that and access the features, then all the good
junction with the protocol. PGP works in allowed disabling of file sharing to banned qualities are of no use. Ease of use is there-
a similar fashion. ZoneAlarm Pro has a computers on the local network. In Nor- fore an important criterion in choosing a
separate module that allows you to create ton, you could do that by restricting pro- firewall, and we looked at factors such as
a restricted zone based on IP address or tocols to local addresses, while ZoneAlarm interface, configuration and reporting to
judge the firewalls.
Configuration: With most firewalls, you
Tracing back the Intrusion could start working out of the box using
just the default setting, without having to
If you are facing a number of intrusion Zone Labs, and also monitors the informa- configure anything. This is true especially
detection attempts, then if you have the tion that is sent, so you can even keep in the case of application-level firewalls.
time and inclination, you can take some your identity a secret. You should report Here, every time an application tries to
proactive measures. Most firewalls tell you such attacks as it helps security organisa-
the IP address of the machine that made tions build a database of places from
the intrusion attempt. A firewall such as where intrusion attacks are being made,
NeoWatch also comes with the NeoTrace and try to ensure that they don’t happen
utility that allows you to backtrace to again. If you get the IP address, even you
where the intrusion attempt came from, can report the intrusion to the ISP from
and also report the intrusion to its Web where the attack came or to the domain-
site. NeoTrace basically performs a trace hosting provider. The ISPs and Domain
route operation on the IP address to find space providers normally have a policy
out where the address originated. You can wherein their IP addresses cannot be
do the same using the command tracert <IP used for such intrusion activities, and can
address> in your DOS prompt. ZoneAlarm therefore remove the offender from their
also allows you to report an intrusion to network.
Filter the results in NeoWatch
Firewall Configuration ease Intuitive Taskbar Sounding alerts Log file format Filtering logs Graphical
icons representation
BlackICE Defender Partial ✘ ✔ Average ✘ ✔
eSafe Desktop ✘ ✘ ✔ Average ✘ ✘
McAfee Personal Firewall ✘ ✘ ✘ Poor ✘ ✘
NeoWatch ✔ ✘ ✔ Good ✔ ✘
Norton Personal Firewall 2001 ✘ ✔ ✘ Good ✔ ✔
PGP Desktop Security ✘ ✘ ✔ Average ✔ ✘
Sygate Personal Firewall Partial ✔ ✔ Good ✔ ✔
Tiny Personal Firewall ✘ ✔ ✘ Average ✘ ✔
ZoneAlarm ✔ ✔ ✔ Average ✘ ✔
ZoneAlarm Pro ✔ ✔ ✔ Average ✔ ✔
125
Specifications
DETAILS OF THE FIREWALLS
Firewall BlackICE Defender eSafe Desktop 2 McAfee Personal NeoWatch 2.2 Norton Personal PGP Desktop Sygate Personal Tiny P
2.5 Firewall 2.1 Firewall 2001 2.5 Security 7 Firewall 4 wall 2
(Evaluation)
Performance
Blocking port Yes Partial Yes Yes Yes Yes Yes Yes
scans
Intrusion blocking Yes Blue screen Yes Highly unstable Slightly unstable Yes Blue screen Blue s
Trojan Detection Yes Yes Yes Partial Partial Partial Yes Yes
Features
Preset levels 4 3 3 5 3+3* 6 3 3
Port blocking Yes Yes No No Yes (with protocol) No No Yes (w
Protocol blocking Yes (with port No Yes No Yes
blocking) Yes No Yes
Application level No Yes (with sandbox) Yes No Yes (with protocol) No Yes Yes (w
security
IP address filter Yes No No Yes Yes (with protocol) Yes (with protocol) Yes Yes (w
Blocking Web sites No Yes No No Yes No No No
Restricting file Yes Yes Yes No No
sharing Yes Yes No
Privacy feature No Yes No No No
Ease of use Yes No No
Configure from Partial No No Yes No
main menu No No Partial
Intuitive taskbar No No No No No
icons Yes No Yes
Sounding alerts Yes Yes No Yes No Yes Yes No
Filtering logs No No No Yes Yes Yes Yes No
Graphical repre- Yes No No No Yes No Yes Yes
sentation
Contact & Network ICE Aladdin Knowl- Network Associ- NeoWorx Symantec (Con- Network Associ- Sygate Tiny S
Developer edge Systems ates (Phone: tact: Tech Pacific, ates (Phone: Technologies
9821019104, E-mail: 022-5960227, 9821019104, E-mail:
annette_castelino adil@techpacin- annette_castelino
@nai.com) dia.com) @nai.com)
Web site Networkice.com Esafe.com Nai.com Neoworx.com Symantec.com Nai.com Sygate.com Tinyso
Price $40 (approx) Free for personal $29 $40 $50 $60 Free for personal Free f
use use use
Rating B B+ B B- B+ B+ B+ B
* Levels for Security and Privacy ** Levels for local zone and Internet Zone
■ select~ t e s t d r i v e
How you wish you ROSSI FERNANDES AND YATISH SUVARNA programs that can be used to monitor or even
could get rid of ikes, what is that weirdly named file on your control the functioning of the infected computer.
those viruses on
your machine. A
look at the top
Y hard drive? Is it a game? Is it a joke? Guess
again—you’re infected by a virus! With the
advent of broadband Internet connectivity,
DVDs and the ubiquitous CDs and floppy disks,
there exist many potential ports through which
So remember that the next time your kid sis-
ter downloads that new game from the Internet
or one of the guys at work accesses a new Flash-
enabled Web site, your home computer or office
network could be subject to virus threats. The
malicious files and content can enter your com- consequences of having a virus in your system
antivirus software puter. Add to that backdoors or certain sections in could be anything—from an annoying message
for your needs applications that developers keep open either wil- on your monitor, to a full-blown failure and cor-
fully or for development work. Potentially harm- ruption of your data, operating system and appli-
ful files can be placed on your computer through cations. So long as there is software, there will
these ports. Once this happens, there are always be a certain breed of people who are intent
on wreaking havoc on computers for no appar- sheet. We also looked at
ent reason. Hundreds of new viruses are put out aspects such as availability
in the wild every year. Starting to feel panicky? of regular updates. Based
One of the best approaches to battle this scourge on the weightage assigned
is to face the problem head-on with the help of to the various parameters,
antivirus (AV) software. we reached the final score.
BUSTERS
archive. InoculateIT and Norton, even the others didn’t
Contents
TEST PROCESS . . . . . . . . . .131
ANTIVIRUS SOFTWARE . . .131
There were two main virus scanning tests, perform well, with F-Secure detecting only about
Antivir 9x
which included the main uncompressed file 2 per cent of the viruses in the compressed files.
AVG
scanning test and the compressed virus scan-
eScan
ning test that we ran on each of the antivirus Time for scan
F-Secure
software packages. In this comparison test, we Do you shy away from doing a full system scan
InoculateIT
only evaluated antivirus software targeted for on a regular basis because just the thought of the
McAfee 5.1
personal use or a small networked environment. hours it will take puts you off? Consider a soft-
Norton AntiVirus 2001
We did not look at enterprise-class antivirus ware such as InoculateIT, which has a good
QuickHeal 6.0.1
protection suites or client-server based antivirus detection rate, and is able to scan the hard disk
TABLE:Antivirus
applications. (of a 1 GB partition) in 6 minutes flat. To a large
Specifications . . . . . . . . . . . . 134
The overall score for each software was decid- extent, the scanning time is dependent upon the CONCLUSION . . . . . . . . . .134
ed by logging the various features, performance options that you have selected. Pure detection is
rates, ease of use and test results into a spread- faster, but if you select options for cleaning,
■ select~ t e s t d r i v e
during the boot e-mail, etc. With Norton, you can specify
process, so there is the auto-protect feature to work even
an increase in boot- when you just access a folder and don’t
up time. If you are a necessarily double-click on the executable.
performance freak, You can also specify the file extensions that
you will want this you want to be checked apart from the
difference to be default ones.
minimised even Even QuickHeal has standard features
while you get maxi- like scanning inside compressed files (.ZIP,
mum protection. ARJ) apart from other features such as
With a 35-second scanning inside compressed executable
time difference, files, heuristic scans, etc. There is also a File
Norton certainly Integrity option to recover a file from
increased the boot- unknown virus infection. The other fea-
prompting, or performing quarantine, then up time considerably. On the other hand, tures include live database updates, online
the time taken increases. That’s probably Antivir made just a 3-second difference. protection presence and a Virus List con-
one of the reasons why Norton took as Therefore, if you happen to use taining virus information. A variety of
much as 48 minutes for the entire scanning power- and resource-hungry applications scanning configurations, such as the pos-
process, while McAfee took 54 minutes. It such as image-editing or 3D authoring sibility of including and excluding specif-
also seemed very strange that QuickHeal software, then remember that the heavier ic file types, etc, generating scan reports,
took 51 minutes for a scan, considering that antivirus software will definitely slow scheduled scanning and rescue informa-
its detection rate was quite low. down your other applications while it is tion, is also available.
There is hardly any difference if you running. If your main focus is using your F-Secure has an option wherein the
scan for all files (including compressed application, you might do better to go in network administrator can configure glob-
files). Again, InoculateIT took just 4 min- for an antivirus package that is a lesser al security policies for the company and
utes to scan the partition with the com- strain on the system, even if it compro- automatically update different servers
pressed files. Admitted, InoculateIT is fast, mises on some functionality. within the company with the predefined
but then it didn’t actually manage to clean security policy. InoculateIT was a disap-
the infected files very thoroughly. Norton, Features pointment. After having done so well in its
which had a good cleaning rate too, man- All the software should offer standard fea- detection capabilities, it lost out on the fea-
aged the scan in 40 minutes. Three of the tures such as options for boot sector scans, tures count.
software crashed at varying points while scanning before startup, creating emer-
scanning within compressed files. gency diskettes, scanning within com- Ease of use
pressed files, etc. Feature-rich scanners will Understanding the configuration and
Eating up resources also include options for scheduled scan- interface is quite important if you want to
It’s important that your virus scanner ning, network scanning, scanning within get the best out of your antivirus software.
does not eat up a lot of your system e-mail, heuristic scanning, etc. This is especially true of the auto-protect
resources. Otherwise, if you do a full- Norton 2001 was one of the most fea- option if a virus is detected. Most antivirus
system scan, you will have no option but ture-rich antivirus software. It provided software offer options such as automatic
to sit twiddling your thumbs for the 30- for script blocking (preventing viruses cleaning, prompt for response, delete if the
odd minutes it takes to scan. Even the such as Melissa), task-based scanning, virus cannot be repaired, etc. If you con-
auto-protect feature shouldn’t hog mem- scanning before you download, scanning figure this beforehand, the virus scanner
ory, else your other applications may will work in the background without
become slow. unduly disturbing you.
We used a utility called Cache Manag- In this respect, Norton offers a number
er to evaluate how resource-hungry these of configurable options, including graph-
software were and how much system ical alerts. McAfee and QuickHeal provide
memory was consumed while these pro- some customisation features as well. One
grams were running in the system tray. of the simplest to use was F-secure with its
F-secure took up the most system totally integrated single-point menu and
resources—9.3 MB of the available RAM icons. McAfee uses the concept of panels
in the system. Next came eScan with 4.6 wherein the options are lined up in one
MB. One of the leanest programs was pane and clicking on them gives you mul-
AVG, which just ate 2 MB of system tiple options.
resources. However, the lightest of them Reporting features are equally impor-
as far as resources are concerned was tant if you want to understand the nature
QuickHeal, which consumed only 1 MB of the antivirus attacks you are facing
of RAM. and which files they are originating from.
Another aspect we analysed was the dif- All the antivirus software allow you to
ference in boot-up time. Antivirus McAfee sports a cool interface and is rich create logs of your scan. These logs are
software normally checks your machine in features automatically generated when a virus is ➜
Specifications
The Antivirus Details
Name Antivir 9x AVG eScan F-Secure InoculateIT McAfee 5.1 Norton AntiVirus QuickHeal 6.01
2001
Contact Free AV Grisoft Microworld Crystal Solutions Computer Associates McAfee N&N Systems and Cat Computer
Software Services Pvt Ltd Softwares Services
Price - - Rs.1800 Rs.2500 - Rs 1,200 Rs 1,600 Expree-Rs.500
Standard -Rs.1800
Phone number - - 022-8265701 022-5093111 - - 022-4444601 020-6122173
Fax number - - 022-8344750 022-5093112 - - 022-4465097 020-6122173
Web site www.free-av.com www.grisoft.com www.mspl.net www.f-secure.com http://antivirus.cai.com www.mcafee.com www.symantec.com www.quickheal.com
E-Mail - - vig@mspl.net - - - info@bom.nandn.com cat@vsnl.com
Features
E-mail checking NO YES YES NO NO YES YES YES
DOS bootup check NO YES NO NO NO YES YES YES
Browsing virus scan NO NO NO NO YES - proxy YES YES YES
Download scan NO NO NO NO NO YES YES YES
Script blocking NO NO NO NO NO YES YES NO
Compressed File YES YES YES YES YES YES YES YES
Scanning
Performance
Viruses detected 98.96% 90.59% 92.39% 92.38% 97.12% 91.08% 89.09% 57.11%
(uncompressed)
Viruses detected in 23.57% 92.87% crashed 2.23% 92.06% crashed 85.44% crashed
compressed files
Time taken to scan 0.06 seconds 0:04 seconds crashed 0:40 seconds 0:04 seconds crashed 0:34 seconds crashed
compressed viruses
Resource (MB of 2.5 2 4.6 9.3 3.5 4 4.5 1
RAM used)
Boot up time 3 22 19 22 7 15 35 9
difference
Rating B B+ B- C+ B+ B+ A- B-
detected or cleaned. F-Secure has a log definitions. There is no concept of pro- Among the viruses that were tested, Inoc-
that opens up as an HTML page in your gressive updates—that is, if you update ulateIT, AVG and Antivir are really coack-
browser. Norton has one of the best your virus definition files for a particular ages that you can look forward to for
interfaces, while McAfee comes a close week, the next time you update, you general system security, Antivir has a good
second. should just be given only the new virus virus definition set, and had the maximum
definition files. detection rate. Inocu-
Get the update Some software also give you options lateIT also had quite a
Even if the antivirus software gives good for what you want to update. You can good detection rate,
detection rates, there’s no way the software choose just to update the rescue disk, and it did
can keep track of the new viruses coming the virus definition files, or well in checking for
up every day. The only way to be up-to- even the scanning engine. F- viruses within com-
date is by regularly installing updates to Secure offers you even more pressed files.
the signature or virus definition file. The options wherein you can AVG had a problem
software normally allows for automatic select the categories of defi- in cleaning some of the
updation of files or you can download the nition files (macro, boot sec- infected files and
updates from the Net. Earlier, while updat- tor, etc) that you want to therefore lost out on that count. In
ing the definition files, you had to manu- update. You can select the spite of impressive features, McAfee
ally stop the auto-protect feature, copy the automatic update feature or failed in detecting viruses within
definition files to the directory where the even schedule updates, but compressed files.
software is installed, and then restart the for that you have to be The best all-round performer
machine. Now, you can dispense with this online at the time you have was Norton AntiVirus 2001 . Good
manual process. The antivirus program scheduled the update, and detection and cleaning rates, excellent
updates the file on its own without even with a dial-up line this might features and Live Update options truly
asking for a restart. not always be possible. Norton even sup- make it the best performer. True, it’s a bit
In McAfee, updating your virus defi- ports a feature wherein you can send a resource-hungry, but what the heck, you
nitions can be a bit time-consuming suspicious file for scanning at their can compromise that much to keep your
because sometimes the entire scanning research labs. system bug-free.
engine is updated instead of just the virus CONCLUSION
G ACT
LAN C I N
BA Photograph: Rahul Sharma
135
■ select~ t e s t d r i v e
any media, export and import can only shelling out all that extra money for a lead- regular features, they also incorporate
be done from the MS Access database ing software if you’ll never use half of its other features that a mid-sized business
management application. hi-fi features. So first identify the software would require. Features such as an excel-
Another feature we checked out was that fulfils your needs, and then see if the lent graphical user interface, MIS report-
whether the application allows viewing a price tag is justified. ing facility and multi-user facility makes
screen in full-screen mode. We found that Of the software we tested, Wings2000 them complete financial accounting
Tally, Simply Accounting and Arthalekha is absolutely free and it provides some packages.
had the option of being viewed on the full really decent features that would satisfy
screen, whereas the others were most home users. But Security
limited to being viewed only in the default when it comes to We are all extremely cautious about who
size specified by the application. advanced features, it should know how much about our mone-
Arthalekha has the dis- falls flat and that’s tary transactions. For a businessman, it is
tinction of being complete- where software like extremely necessary to have total control
ly multi-lingual. At the Tally, FACT and Sim- over how he wants his accounts to be han-
main menu itself, there is a ply Accounting score. dled. Many financial accounting packages
toggle button that allows If you have a low- allow you to hide or completely disable
you to switch between end machine such as a certain features depending on who is using
Hindi and English. While 486, a DOS-based pro- the package. You can create multiple users,
Wings Pro also provides gram is the way to go. and define rights regarding which features
multi-lingual support, it While ACE and Easy they can use.
does so at the report level Accounting provide fea- Besides multi-user security, encryp-
and not at the menu level. tures such as graphical tion is another way to keep your data
representation of your safe. We gave higher scores to software
Value for money data and password facility, that support data encryption and multi-
While price is undoubted- their prices are a bit steep. ple users.
ly an important factor, it And although your journal, Simply Accounting, FACT, Arthalekha
should not take prece- ledger, bank and cash details are all and Accounting21 provide intensive
dence over the quality of looked after, you might still miss the GUI security features. However, they have an
the software. So the key is to that you’ve become used to with Windows. open database format, which means that
keep the price factor at the back Account21 would suit a small busi- files created are not saved in the encrypt-
of your mind and first look out for features nessperson, with features such as multi- ed format. Tally was the only one that
you need. Ask yourself what you want out currency, reminder letters to debtors and provided encryption support.
of the financial accounting software. Is it good security options, although you EX, which uses the MS Access data-
just the usual ledger journal and voucher would have to pay more for a multi-user base, provides almost no security for the
entries that need to be taken care of? Or version. database, but it has multi-user security
do you want advanced features such as Wings2000 Pro, FACT, Tally, and EX wherein certain features can be disabled
inventory control, MIS, multi-user pass- Next Generation, all fall in the small-to- for a particular user. Tally, FACT,
word facilities, etc? There is no point in medium office segment. Apart from the Wings2000 Pro, Simply Accounting and
Account21 also provided multi-user
accounting features, whereas DOS-based
Curb Piracy! Go for Free Software programs like ACE and Easy Accounting
only provided the usual single-user pass-
One key factor that most people tend to over, many companies provide free word facility.
ignore is to install an original licensed updates, excellent after-sales services
copy of the software. It is a misconcep- and lumpsum discounts on forthcoming Help and Documentation
tion that is propagated by local vendors products to bonafide registered cus- Help and documentation comes in vari-
who blatantly say, “Tell us which software tomers. And then there's the small mat- ous forms and media—from manuals to
you want, we’ll install it for you.” ter of piracy being illegal. Does it still PDF and HTML files. The aim of help files
All software has to be purchased and sound like a waste of money to buy and documentation is to get the user to
nothing comes free of charge. Even the original software? learn and gain expertise of the software in
most popular of all operating system soft- If you would still rather not spend the the shortest time possible.
ware—MS Windows—has to be bought. money, you can go in for free accounting Tally EIS 5.4 has a really interesting
Pirated software is a major reason for packages such as Wings. A professional manual. The manual has a lot of screen-
the malfunctioning of the software, lead- version of the package is also available, shots of the screens that you would come
ing it to crash frequently, and it is you which you can purchase if you are satis- across while working on Tally.
who have to suffer in the end. So fied with its working and require It is well-categorised with the tasks
installing a cheap and pirated version of advanced user options. Many open arranged in appropriate groupings.
the software is not exactly the right source packages are also available. There are sets of instructions on how to
move if you want to have a trouble-free Accounting applications come built into do particular tasks. The quality and
and stable working experience. More- Linux and its other variants. quantity of help given allows a new user
to do exactly what he needs by just
looking through the list of tasks in the Wings2000 Pro and Wings2000 Net. archive of templates for allowing users to
index. Arthalekha, on the other hand, has a bare get their work done by simply answering a
DOS-based ACE has hardly any docu- minimum of help provided, which is in the set of questions. It stands
mentation on the software itself. However, form of the Windows help format. apart with its Web-like
a pretty detailed manual is included with Not much accounting ter- feel and distinctive look.
it. The manual starts off by giving some minology is explained; On the other end of
tips to prevent you from getting into trou- the emphasis is on the spectrum are Tally,
ble. The installation procedure is also shortcut keys. FACT and Wings2000
explained well. Simply Accounting Pro, with advanced fea-
Easy Computing’s help comes in the has a very nice on- tures and also a complex
form of a small manual, which explains screen help file that is interface that a new user
the lengthy procedure of copying all the well categorised. It also would definitely find
files and starting installation. The quality explains a lot of difficult.
of the manual isn’t too impressive— accountancy jargon. Account 21 has fol-
there’s not even a clear index that you can Compared to the other lowed the generic menu
refer to. packages, it comes out appearance. The sub-
FACT’s manual comes in the form of a tops with its compre- menus have colourful icons
Word document. There is a really well- hensive documentation depicting each entry type. This
designed index, but an HTML or PDF for- and easy-to-use help. can be a little confusing initially, but
mat document with links would have been once you get used to it, you should have
a better option for browsing through the Ease of use no problems.
help document. Even after spending a lot of The DOS-based packages are straight-
Wings2000 Pro’s manual is probably money on an accounting package, if forward and uncomplicated.
the biggest amongst all the accounting you’re uncomfortable using it, then it Other accounting software, such as
packages. It has been created for all three might end up lying on your computer Arthalekha and Wings 2000 Pro, provide
versions of Wings—Wings2000 Plus, without you ever doing any quality work multilingual support. Arthalekha even
on it. Hence the software needs starts up with a Hindi interface and shows
to be user-friendly and have an up your preferred language once you
inviting look and feel. change the settings.
Most of the products have We also checked out whether it was
the standard international drop- easy to enter data into the program or
down menu style that makes it whether it was a complicated procedure
convenient for first-time users, wherein one had to switch through
barring Tally and Simply numerous windows.
Accounting, which have their Simply Accounting leads here as well.
own style of menus. By and With a neat interface and design, it saves
large, the design and layout you a lot of time and energy.
were also clear and easy to The data entry screen in Simply
understand. Accounting is also very well designed and
Simply Accounting is really a there is even the option of customising its
software for beginners. The appearance by choosing from among the
EX Next Generation: combines features with functionality software comes with a huge five skins available. ➜
140 June 2001
■ select~ t e s t d r i v e
Specifications
Accounting Software: How They Fared
Details Tally EIS 5.4 Simply Account21 Wings2000 Easy Arthalekha ACE FACT 1.9 Wings2000 EX Next
Accounting Accounting PRO Generation 1.5
Contact Software at Simply Soft Topsys Wings Infonet Support Modular Coral Vedika Wings Infonet Tata Consul-
Work Technologies Solution P. Ltd. Systems Infotech Ltd. Soff'wares Software tancy Services
Price Rs 22,000 Rs 5,992 Rs 12,950 Free Rs 9,995 Rs.5,000 Rs 9,500 Rs 14,500 Rs 18,000 Rs 9,500
Phone 022-6437209 080-2384900 080-5274343 040-3211458 011-5745596 020-4223510 033-2375091 022-5006490 040-3211458 022-8774081
Fax 022-6432275 080-2384905 080-5295046 040-3237318 011-5350473 020-4225896 033-2373298 033-2400824 040-3237318 022-8777441
Email info@software- enquiry@sim- topsys@vsnl. info@wings20 easy@satyam. modular@giasp info@coralin- info@vedi- info@wings200 jaideep_mud-
at-work.com plysofttech.com com 00.com net.in n01.vsnl.net.in dia.com ka.com 0.com holkar@mum-
Website www.software- www.simplysoft- www.wings20 www.arthalekh www.coralin- www.vedi- www.wings200 bai.tcs.co.in
at-work.com tech.com/ 00.com a.com dia.com ka.com 0.com www.tcs.com
Rating B B+ B A- B- B+ B B+ B+ B+
GEFORCE3
What Makes DirectX Graphics hardware has really matured over the
past couple of years. The performance capabili-
Tick? ties of today’s 3D accelera-
DirectDraw: Allows direct tors let game developers
access to areas in the dis- truly display their artistic
play adapter’s video memo- skills. The emphasis
ry and hardware buffers for undoubtedly is on realism.
tasks such as page flipping You want to be able to see
(used while creating anima- the ripples on that stream
tions to display one screen when you’re walking through the fantasyland of
while the next is being cre- your favourite role-playing game, and manufac-
ated). Allows programs to turers such as nVidia have been consistently
make full use of the colour churning out the hottest gaming hardware to
decompression capabilities bring these effects to life.
of various types of hardware nVidia products usually score both in terms The Programmable Pixel Shader will let you see
and not be dependent on a of sheer performance and their use of innovative combined effects like reflective bump mapping
specific type of hardware. technologies. So does the GeForce3 carry on the
Direct3D: Allows access to tradition, or is it just another graphics card special effects, such as morphing, animation,
the advanced features that churned out from the assembly lines with the deformation and environmental effects, which
handle 3D functions such as mandatory increase in specifications? Let’s take can be applied to vertices. This gives program-
triangle creation, scaling and a look at some of its features and then decide. mers a high amount of flexibility in what can be
transforming 3D images. done to the 3D objects in the game.
This component is scalable, The nfiniteFX engine Effects such as fog, lens effects and water
allowing part or all of the One of the major enhancements in GeForce3’s refraction are now possible. Also, effects such as
3D rendering pipeline technology is the ability to allow game develop- wrinkles and stretch marks can be created on the
access to more advanced ers to specifically program certain parts of this faces of characters in games, objects can morph
features such as z-buffering graphics processor, allowing it to deliver custom into other elements, and mechanical processes
and anti-aliasing. special effects. These technologies are collective- such as gear trains can be simulated accurately.
Direct Input: Implements ly referred to by nVidia as the nfiniteFX engine. This will mean more natural animations for
support for analog and digi- Two important components of this new archi- next-generation game characters.
tal input devices, offering tecture are the Programmable Vertex Shader and Programmable Pixel Shader: Like the Pro-
increased responsiveness the Programmable Pixel Shader. grammable Vertex Shader, this feature allows
and sensitivity. Programmable Vertex Shader: In any 3D application developers to take one step further
DirectSound: Offers direct model, the vertex is the most basic element. This towards creating life-like 3D scenes and effects.
access to the audio sub-sys- is the point at which the polygons in a 3D model This technology has been around since the
tem. Enables features such meet, so any changes in the position and other GeForce2 was launched. It was then known as
as low-latency mixing characteristics of a vertex can change the appear- the nVidia Shading Rasteriser or NSR. Using it,
(where multiple audio ance of the 3D model. Until now, vertices could effects such as reflections, bumps, fog and tex-
sources are used with the be assigned to perform a very limited number tures could be applied at the pixel-level in a
soundcard) and hardware of operations in the 3D application. However, scene. The GeForce3 processor takes this to a
acceleration for high sam- with the GeForce3 there are a number of custom much higher level by allowing up to eight tex-
pling rates when many ture operations in a single pass. This is coupled
audio streams are used, like with the ability to handle four textures at a
in the new breed of games time. The GeForce3 can combine these opera-
that have surround-sound. tions to produce breathtaking special effects
DirectPlay: The networking such as reflective bump mapping and realistic
component, which provides textures with environmental effects such as fog
access to devices over a net- and mist. Since these effects are processed in
work—independent of the parallel, it does not affect the frame rates in
hardware, protocols and games, but it certainly makes games look a
networking services that are whole lot better!
used.
DirectMusic: Part of the Lightspeed Memory Architecture
direct sound sub-system nVidia graphics cards have always been notori-
that streamlines the repro- ous for problems with their memory band-
duction of music such as width. As 3D processors keep getting faster,
MIDI playback in applica- even though exotic memory like DDR is used,
tions and games that are performance is hit at higher resolutions
written to use it. The Programmable Vertex Shader will allow you because of the graphics card’s memory archi-
to see wrinkles on faces in real-time tecture. ➜
Until now, the easiest way to counter this HRAA (High Resolution Anti-Aliasing)
problem was to add more memory and pump This is another feature that was incorporated to a
up the memory’s frequency. However, with the lesser extent into the GeForce2 as well. Aliasing is
GeForce2 Ultra’s memory clocking at 460 MHz the appearance of undesirable jagged edges in a
with bandwidths of up to 7.3 GBps, something 3D model when there are not enough pixels to
else had to be done to alleviate the memory represent it. The GeForce3 uses a process called
bottleneck. So the GeForce3 uses a couple of Quincunx Sampling to minimise these ‘jaggies’
innovative approaches to access and use its by interpolating pixels between the jagged edges.
onboard memory. It does so by internally increasing the resolution
Splines: In the past, graphics applications used of the game and then scaling it down to the
to send raw triangle data to the graphics card, required resolution. This feature is hardwired into
which in turn would process this data and churn the GeForce3; enabling HRAA to make edges and
it out into displayable graphics. lines in 3D games appear smooth.
Nowadays, the complexity of the
3D elements in games reaches Lossless Z-compression
high levels and there are times One of the most important components of the
when individual 3D elements are 3D processor is the Z-buffer. This is the area
often composed of hundreds of where the 3D processor stores depth information
thousands of polygons! about a scene. The graphics processor uses this
So instead of relying on raw information to know which 3D objects lie in the
triangle data to define complex foreground and which are in the background.
3D surfaces, they are now defined Since this information is extensive in typical 3D
by a number of control points, games, it takes up a lot of memory bandwidth. To
also known as splines. This optimise the memory bandwidth, GeForce3
results in a significantly lower implements a form of lossless compression of this
load on the memory bandwidth Z-buffer data and therefore allows the memory
and greater efficiency is obtained, to be used more efficiently.
especially when working with
complex 3D elements. Z-Occlusion Culling
Crossbar memory controller: When a 3D object is hidden by another object in
Another enhancement to the the foreground, there is in fact no need to draw
memory architecture is the cross- that hidden part because it won’t be visible to
bar memory controller. The the viewer. If this approach is used, the infor-
GeForce3 uses four memory con- mation needed for drawing this object does not
trollers that interact with each have to passed to the graphics processor. The
other and the GPU. Therefore, GeForce3 uses this technique of only processing
smaller chunks of information graphical information that will eventually be
can be accessed and processed drawn in the scene. This results in a significant
A scene without antialiasing (above) and with it from many parts of the memory increase in the efficiency of the graphics proces-
(below). Notice the reduction in jaggies simultaneously. sor’s throughput. ➜
HARDWARE
Radar
A PC from Dell, a 17-inch monitor, motherboards, a CD-writer
More Info on and a hard disk drive among other hardware devices
the hardware products tested.
Check out
Mindware
T he DiamondMax VL series of
hard drives from Maxtor
comes in capacities of 10.2 GB
rotational speed, 2 MB
SDRAM cache buffer
buffer with an Ultra
Build Quality
Value for Money
Features
ATA/100 compatible
to 40.9 GB. The one we tested OVERALL
interface
was a 20.4 GB hard drive. In Benchmarks:
spite of the fact that this is a SiSoft Sandra: 28 MBps + High data transfer speeds
5400-rpm drive, it delivered sequential read, 5 MBps - No details of jumper settings on the
random read, 10 ms hard drive
impressive performance in all average access time Price: Rs 4,800
the tests. Its aggressive pricing 15500 in High End Disk Contact: Karma Distribution
makes this drive suitable for WinMark 99; 5190 in Phone: 9810437872 Fax: 011-6420452
Business Disk Win- E-mail: naresh@karmasg.com
home users. Mark 99 Web site: www.esysdistribution.com
verdict A -
Ticket to the movies AOpen 1640 PRO DVD-ROM SPECIFICATIONS:
Interface: IDE AOpen 1640 PRO DVD-ROM
Features: 16x DVD/40x
nstead of a tray, this drive Performance
I features a slot-in mechanism
that can be easily used in the
CD-ROM drive; slot-in-
mechanism; supports
CD formats like
Build Quality
Value for Money
CD/DVD, CD-R/RW, Features
horizontal or vertical positions. DVD-R/RW; incorpo-
Its digital servo mechanism, OVERALL
rates DDS, an internal
CAV technology and Dynamic buffer of 512 KB, bun- + Slot-in mechanism
Damping System (DDS) helps it dles PowerDVD 2.55 - Does not support DMA
Benchmarks: Price: Rs 5,950
withstand vibration and also SiSoft Sandra: 3235 Contact: Yogi Comp
helps minimise errors by sequential read, 865 Phone: 022-8806582
improving stability and accura- random read, 102 ms Fax: 022-8806582
average access time; E-mail: shailz@yogicomp.com
cy of the data read. 1900 in CD WinBench 99 Web site: www.yogicomp.com
Radar
The latest software in the market for editing photos, logging PC activity,
More Info on encryption and more
the software products tested.
Check out
Mindware
155
■ select~ r e p o r t c a r d
Reviews
Introducing .Net
Arena
For game reviews
check out,
Mindware
Dotty about .Net
On the Stands
T he name says it all. It is tar-
geted more towards profes-
sional programmers and Laws relating to
developers and calls for a Information Tech -
higher level of expertise and nology
knowledge of technologies The book takes an in-depth
such as COM, COM+, ASP and Publisher: Shroff Publishers look at the various legislative
& Distributors
VB. It is geared towards telling Contact: Computer Book-
laws surrounding IT
you what .Net is all about and shop and covers such topics
what it can do for you. It Phone: 022-2070989 as legislation from for-
includes chapters on topics Fax: 011-3259790 eign countries and also
E-mail: cbsbom@
such as .Net overview, what’s giasbm01.vsnl.net.in the latest develop-
new in Visual Basic.NE and Price: Rs 300 ments on Taxation of
so on. Rating: Electronic Commerce.
Contact: Vikas Publishing
Phone: 040-4742324
E-mail: asialaw@
satyam.net.in
Syntax errors Beginning Programming for Dummies Price: Rs 400
157
■ select~ r e p o r t c a r d
UNDERCOVER
They’re getting sleeker all the time. And no undercover agent is complete
without one. So Agent 001 decides to get himself one of the latest models
ustin Powers has one. Nathan Hunt flaunts provider, which also sells unbranded phones
A-List
A listing of the best products in different hardware and software categories
ho’s in, who’s out? The competition’s hot, reviews. Based on these tests, the best products
More Info on
W but only the winners get to this page—a list-
ing of the best performing hardware and
software that have been tested till date in differ-
have been listed here (detailed reviews on Digit
Interactive-Mindware). As different products get
reviewed over the months, the top products
ent categories. might find themselves slipping out of the charts
the top five products tested in each Every month, at the Digital Media Test & and replaced by the latest entrants in the market.
category. Check out Research Centre, we carry out a series of com- So, keep your ears sharp and eyes open and keep
Mindware parison tests as well as individual product yourself abreast of the latest cool products.
159
Laser Printers External Storage Devices Phone: 022-2850193 CD-burning software
Samsung ML-5200A IOMEGA 2GB Jaz Fax: 022-2850198 Easy CD Creator 5 Platinum
+ Good text printing with effortless + Very good price per MB; hard- Price: Rs 3,600
USB connectivity disk-class performance
– Average print speeds Contact: Neoteric Infomatique SOFTWARE
Contact: Samsung Phone: 022-4172600 Operating systems (Linux)
Phone: 011-6932517 Fax: 022-4163679 SuSE Linux 7.0
Fax: 011-6932607 Price: Rs 18,000 + Simple to install; many bundled
Price: Rs 23,500 applications
Handhelds Contact: G. T. Enterprises
Scanners HP Jornada 680E Phone: 080-6606093
Epson Perfection 1640SU + Power 133 MHz processor Fax: 080-6671407
+ Colour screen Price: Rs 1,800
Easy CD Creator
Contact: Hewlett-Packard
Phone: 011-6826000 Operating systems (Windows) + Very fast writing speed
Fax: 011-6826030 Windows 2000 Contact: www.roxio.com
Price: Rs 39,000 Professional Price: Rs 3,600 (approx)
+ Very stable
MP3 players – Heavy on system requirements Voice recognition
Creative NOMAD Jukebox Contact: Integrated Business Dragon NaturallySpeaking
Epson Perfection 1640SU + Excellent sound quality; onboard Solutions v5.0 (Preferred Edition)
audio processing; USB interface Phone: 022-8214701
+ Transparency unit included as – Has moving parts Fax: 022-8328240
standard accessory Contact: Compuage Infocom Price: Rs 8,400
+ Fast image scanning Phone: 022-4913986
– Too bulky (4.5 kgs) Fax: 022-4919069 Page layout
Contact: Epson India Price: Rs 32,000 Corel Ventura 8
Phone: 080-5321266/70 + Many bundled features and tools
Fax: 080-5581799 Keyboards Contact: Integrated Business
Price: Rs 22,500 ACER Ergo Solutions
+ Ergonomic design Phone: 022-8214701
PCs Contact: Acer Peripherals Fax: 022-8328240
Dell Dimension 4100 Phone: 022-5705230 Price: Rs 35,000
Fax: 022-4705235
Price: Rs 4,000 Web authoring Dragon Naturally Speaking
Macromedia
Gaming peripherals Dreamweaver 4 + Impressive speech recognition
Microsoft SideWinder + Extensive feature support – High on system requirements
Force Feedback Pro Contact: Integrated Business Contact: HCL Infosystems
+ Highly customisable Solutions Phone: 011-4526518
Dell Dimension 4100 Contact: Mnemonic Systems Phone: 022-8214701 Fax: 011-4526579
Phone: 022-8010871 Fax: 022-8328240 Price: Rs 17,995
+ Customisation possible Fax: 022-8051761 Price: Rs 13,000
– Too compact for expansion Price: Rs 8,750 Accounting Software
Contact: Dell Computers Antivirus FACT 1.90
Phone: 1600338044 Toll free Pointing devices Norton Antivirus 2001 + Exhaustive feature list
Fax: 1600338046 Toll free Microsoft Intellimouse Eye + High detection rate – No security for database
Price: Rs 81,999 + Very smooth; resilient to dirt + Good script blocking capability Contact: Vedika Software
Contact: Microsoft Corporation – Resource hungry Phone: 022-5006490
Laptops Contact: N & N Systems Fax: 033-2400824
Zenith 21A Corpo - Phone: 022-3680512/17/18 Price: Rs 14,500
rate Notebook Fax: 022-3680513
+ Feature packed Price: Rs 1,600
+ Excellent performance
– A little bulky Zenith 21A Firewalls
Contact: Zenith ZoneAlarm Pro 2.6
Computers + Good performance
Phone: 022-8377300 – No protection against ActiveX
Fax: 022-8364859 controls
Price: Rs 1,25,000 Contact: www.zonelabs.com
Price: Rs 2,000 (approx)
I
The Test Centre has a the enthusiasm and charged atmosphere latest computer fundamentals and program-
unique visitor this that’s the hallmark of this organisation, then ming languages, he’s studying for his first board
it would probably be the fact that we have exams, coming up next year.
summer. He’s here to some of the youngest professionals, with an Oh! Did we mention that Kyan is just 14
learn, but he sure is average age of about 22 years. And every once years old?
in a while, this age limit gets pushed a notch Before you, like many legal eyes in the office,
teaching us a thing or lower. start accusing us of promoting child labour, let
two Meet Kyan. One of the newest arrivals at the us make it clear that Kyan is here to spend his
Test Centre, this young man is probably one of summer vacations, before he gets back to his
the most qualified people around the office. books and his studies.
And how is the Test Centre reacting to the
presence of someone so young? When
they’re not teaching him the finer
nuances of benchmarking moth-
erboards and graphics cards,
they are playing pranks on
him. Like carrying him about
upside-down. In his turn,
Kyan manages to get back at
the Big Bad Boys by chang-
ing the settings on his oppo-
nents’ computers when
they’re not around.
He gives the confirmed
gamers a run for their money in
the Quake Arena. The only person
he still hasn’t beaten is Rossi, one of
the finest Quakers around the office—and
before Kyan’s arrival, the youngest at 19.
Don’t let his size fool you for his sense of
humor and his wit does in fact belie his age.
Aliasagar, who’s usually the quiet one in the
Kyan has been reading JDM magazines since Test Centre is driven to defending himself in
the beginning and has always wanted to work one of the verbal battle of taunts that he regu-
with us. He has the distinction of having suc- larly has with Kyan. With one of the sharpest
cessfully completed his MCSE and an e-com- minds around, this is one kid who’s destined to
merce course. He is fluent in Web go places, but for the time being, he’s doing a
programming languages such as Javascript, good job of juggling his schoolwork with his
HTML, etc, and he’s got his own Web site to other intellectual pursuits. No wonder, then,
prove that. that he’s sometimes called Gyaan!
Starring Live!
April saw a lot of activity at Jasubhai Digi- issue and preparing for the presenta- By the morning, we had things sort-
tal Media. The reason: the third annual tion! One day to go and we still couldn’t ed but sound was still a problem. So we
day celebrations with a day-long agenda find the time to prepare for it. Till we hit hit upon another simple idea. While the
of team presentations, entertainment and upon a simple idea. Why not do a live rest of the team ‘performed’ in front of
fun. Competition was severe as every presentation of the issue-closing? What the camera, Karan, our assistant editor,
team wanted to leave an impression. All followed was a mad adventure. Some- filled in the audience three floors below
the teams took time out from their hectic one russled up a Webcam and the night with what was happening.
schedules to come up with ideas and was spent in experimenting with it. In We had a blast doing the presenta-
rehearse for their presentations. the process we recorded the antics of tion, but the icing on the cake was that
We were between the devil and the some unsuspecting victims in their no one believed that it was actually
deep blue sea—caught between closing dare-devilry before the camera. being relayed live from another floor!
161
■ backbyte
Long lost to this advertisement MTNL offers 9.9 per cent assured
connectivity!
Contributed by: Jayesh Bindra, Indore
on your face!
Contributed by:
Anubhav Mehro-
tra, via e-mail
Readers Rants
Designer tooth Bandwidth flow!
siblings? crowns anyone? Exasperated with the current bandwidth speed that you
get? Well who isn’t! But here’s a spoof site we came across
You know how every per- Have you ever wished you had an ‘Uncle Scrooge’ type of that offers a rather novel but extraordinary solution to the
son in this world is sup- grin, so you could flash a dollar sign everytime you problem. You can connect your PC to your water tap for an
posed to have a look alike smiled? Well, all praise to the almighty Web, you can even always-on Internet connection with unlimited access and
somewhere else (or some avail of this. Just logon to www.rongrant.com and choose download speeds. Shocked? Don’t be, it’s just an April fool’s
jazz like that!)? Well, the joke. But for more laughs check out www.dutchwater.com.
same appears to be true for Taken from the Net
the Apple iMac as well. See
the resemblance?
It’s all relative
Want to get rid
of your trouble-
some relatives?
Your chance to
BACKBYTE! Well now you
don’t have to lie
Highlight the lighter side of your way around
computing. Mail your contributions them. Here are
to Backbyte some really use-
Digit, Plot D-222/2, ful options which
TTC Industrial Area, MIDC, should solve all
Shirvane, Nerul, from dozens of designer samples for tooth crowns which your relative problems for good. You can choose from
Navi Mumbai 400 706 you can have made for you. This should put a sparkle in moving your relatives, to deleting them to even renaming
or send e-mail to your smile! them!
backbyte@jasubhai.com Taken from the Net Contributed by: Sajal Kayan, via e-mail