Vous êtes sur la page 1sur 100

We don’t need no

introduction!

Team >>
Publisher
What do you
have to say?

www.think .com/feedback
Note: Your opinion could earn you the next 3 Issues Free
■ editorial

Re-evolution!
1100100~1101001~1100111~1101001~1110100

A nother day…another bit of news.


Some things change, others stay the same…
We began three years ago with dreams of catalysing an interest in com-
puting in India.
In January 2001, we took on the even more daunting task of spear-
heading the digital technology revolution in this country.
Driving towards addressing a new computing environment required a
redefinition of our focus, a redesigned content package, while continuing
our dedication towards the needs of our readers.
Digit is another step on the path of evolution that we have embarked
upon.
A name that best reflects the confluence of people and technology that
our magazine will be about. A magazine that will be dedicated to achiev-
ing the high standards that we will continue to set for ourselves.
We embrace this significant change with a great sense of enthusiasm and
“Digit is another step confidence, and we hope that you will continue to support us with the
on the path of same passion that you’ve shown over the last few years.
Digit will continue to strive to live up to your expectations—with the
evolution that we same focus on quality of content and design that you have come to expect
have embarked upon” from India’s premier technology magazine.

Karan Manral

Assistant Editor
karan_manral@jasubhai.com
CgNTENTS J U N E 2 0 0 1

EDITORIAL 7 DIALOG 26
CONTENTS 10
COLOPHON 16 CONNECT
PULSE 18 SPOTLIGHT
AMD going 4 mobile MP3 toppers: Pentagram 28
XP building a monopoly?
Nokia’s Linux-based consoles FACE-OFF
MIT promotes OpenCourse Should corporates monitor
quicktake: Ken Constable, employees’ Net usage? 30
Vice-President, Dell Asia
Pacific COLUMN
Whois?: GRUB Madhu Kurup on
Hypethesis: Simputer network security 32
tomorrowstechnology:
ModelMaker 3D scanner TECHNOLOGY NEXT
Embedded and real time
operating systems 36 50
E-mail goes vernacular!
DROOLMAAL
PDAs and handhelds 42
RESOLVE
PASSPORT WIRED
Get a .Net certification 44 Remote control your
machine 62
WIDE ANGLE
How satellites affect our UNWIRED
daily lives 48 Sending SMS text messages
through the Net 64
NETRETURNS
Send and receive e-mail in S.O.S.
your regional language 50 Solutions to your
computing problems 70
56
Construct your own Web site
FIRSTHAND
A guide to building TIPS & TRICKS
your Web site 56 Desktop security 79

ON THE COVER

79
TIPS & TRICKS
Unbreachable desktop
security

100 TEST DRIVE-HARDWARE


21 inkjet printers and
16 flatbed scanners

116 TEST DRIVE-SOFTWARE


8 antivirus software and
10 personal firewalls
144
The DirectX8 and GeForce3 experience


10 June 2001
■ contents

Products
reviewed
FIREWALLS
BlackICE Defender 2.5
eSafe Desktop 3
McAfee Personal Firewall 2.1
NeoWatch 2.2
Norton Personal Firewall 2001
PGP Desktop Security 7
Sygate Personal Firewall 4
Tiny Personal Firewall 2.0.13
ZoneAlarm 2.6
ZoneAlarm Pro 2.6

ANTIVIRUS SOFTWARE
Antivir 9x, AVG, eScan,
F-Secure, InoculateIT,
36
Embedded systems and RTOSs
McAfee 5.1, Norton AntiVirus make your dreams a reality
2001, QuickHeal 6.0.1

ACCOUNTING SOFTWARE SELECT INSIGHT Undercover: Agent 001


Account21, ACE, Arthalekha, TEST DRIVE A better gaming dials ‘M’ for mobiles 158
Easy Accounting, EX Next 16 flatbed scanners 100 experience with DirectX8 A-List 159
Generation 1.5, FACT 1.9,
Simply Accounting, Tally EIS 21 inkjet printers 106 and GeForce3 144
5.4, Wings2000, Wings2000 Pro 10 personal firewalls 116 REPORT CARD DIGIT DIARY 161
8 antivirus software 130 Radar: Tested products 152 BACKBYTE 162
16 FLATBED SCANNERS 10 accounting software 135 Reviews: Latest books 157
21 INKJET PRINTERS

Software on CD
ON THE CD
Mindware
DEVELOPERS: AG Win-
dowWatch (Freeware),
Developers Pad (Freeware),
Iraje (Trialware), Virtual Pas- Mindware API MONITOR V1.5 graphics files
cal (Freeware) A software that monitors and
RESOLVE displays API calls made by KOOLMOVES V2.05
GRAPHICS: iBrowser (Free- TROUBLESHOOTING applications Create your own Shockwave
ware), PaintStudio Lite (Free- Basic queries and tweaks on Flash movies and animated gif
ware), Shell Picture (Trialware) registry editing frames using this Web anima-
tion authoring tool
HOME: Kool Karaoke (Free- WORKSHOP
ware), MP3Organiser (Free- Take a class on ‘Connecting HOME
ware), Super CD Cover Maker dual monitors’ using a dual- PCDJ SILVER PLAYER
(Freeware), WordWeb (Free- head monitor card A dual deck MP3 player with
ware) shuffle and auto play functions
Sponsored by
E-PAPERS
IN MAGAZINE: AVG Free Working with PDFs GRAPHICS
(Freeware), AntiVir Personal and e-books ULEAD PHOTOIMPACT 6.0
Edition for Windows 9x/Me Create images for Web pages
and NT/2000 (Freeware), SOFTWARE using various features includ-
NeoWatch (Trialware), DEVELOPERS ing vector 2D and 3D graphics,
Sygate Personal Firewall PYTHON V2.1 visual page layout and one-
(Freeware), Zone Alarm An easy-to-use programming click HTML output.
(Freeware) language with more structure
and support for larger pro- XNVIEW 1.19
INTERNET: Copernic grams, more error checking This software offers support which allows you mix MP3s
2001Basic (Freeware), File- and high level built-in data for 150 different image file for- and match beats song to song
Contd on page 14… types mats to view and convert your with a BPM counter

12 June 2001

■ contents

…Contd from page 12 PERSONAL SENTINEL 1.5 Internet connection, find and ARENA
portal (Freeware), Netup A program that monitors your clean junk and obsolete files, GAMES
(Freeware), Vivian mail Internet surfing for bugs and optimise the system registry AGE OF EMPIRES II: AGE OF CON -
(Freeware) also displays the privacy risk and manage start-up items QUERORS
level of Web sites among a whole lot of other Get into the shoes of Attilla the
OFFICE: BuddyShare (Free- functions Hun and other legendary war-
ware), Direct Connect Client INTERNET riors with this real time strate-
Sponsored by
(Freeware), Encryption Plus MSN EXPLORER V6.10 HEALTH & gy demo
Folders (Freeware), Eudora Microsoft’s integrated desktop VISION
5.1 (Free/Adware), HTMLGen idea, a new Web interface, inte- Protecting yourself from vari- FIFA 2001V3
(Freeware) Perpetual Budget grated support for music and ous computing related health Improved facial animations,
(Shareware) video, support for up to nine hazards advanced realism, authentic
users and more in this Internet team kits and logos are a few
RESOURCES:Adobe Acrobat service and content solution IN PRINT improvements that the latest
Reader (Freeware), Desktop from MSN A LIST version of Fifa 2001 boasts of
Architect (Freeware) Best performing hardware and
DirectX 8.0a (Freeware), WINMX V2.51 software products in different SURGE
Download Accelerator Plus A file sharing program with categories Cool music featuring Avalance,
(Freeware) beta, mIRC 5.9-32 features such as support for Pentagram and also the best of
bit (Shareware), PowerAr- any file type and connections PRICEWATCH movie trailers and mediaware.
chiver 2001(Freeware), to networks based on Napster Computer component prices
Winamp (Full version) Win- and OpenNap protocols for your reference CONNECT
dows Media Player 7 (Free- SITEMAP
ware) IN MAGAZINE WINDOWS 2000 Get fashion inputs, model pro-
Yahoo! Messenger (Free- MCAFEE VIRUS SCAN V5.15 Tutorial for Complete, free course from files, addresses of boutiques on
ware) Protect your PC from viruses end-users www.fashionindia.net
in files, e-mail and active X
UPDATES:AVG 6.0 Free Edi- controls downloaded from the INDIA SITES
tion virus definition (Free- Internet with this thorough MINDMATTERS Indian sites and ISP related
ware), Internet Explorer 5.5 virus protection, detection and E-BOOKS news
(Freeware), Mozilla 0.9 removal system E-commerce Handbook, All
McAfee VirusScan (Free- about PCs and more NEWSLETTERS
ware), MSN Messenger OFFICE Featured this month are
(Freeware), Windows Net- EASYOFFICE FREEWARE WHITEPAPERS newsletters on free graphics
Meeting 3.01 (Freeware) A Word- and Excel-compatible A whole lot of whitepapers on sites
office suite with features such new cellular standards
UTILITIES:CloneCD (Share- as EasyWord for word process- BOOKMARKS
ware),H_menu 4.0 (Free- ing, EasySpreadsheet for basic TIPS & TRICKS Satisfy your thirst for Indian
ware), Macro Angel and advanced spreadsheets and Fun things for Sponsored by arts and crafts with this
(Freeware), MBProbe (Free- a lot more you to do with month’s bookmarks
ware), MemViewer (Free- easter eggs
ware) UPDATES DROOLMAAL
MOZILLA 0.9 Playware DIGITAL WORLD
Playware All new features such as a new Powered by
ARENA: Age of Empires II: cache, image library, help view- GALLERY
Age of Conquerors (Demo), Loads of wallpapers, screen-
Hard Wood Sii savers, themes, and WinAmp Feast your eyes on some spec-
202(Demo),Hwc Setup skins for you to spruce up your tacular handhelds and PDAs
(Demo), Monkey Brains PC with
(Demo), Sierra (Demo), Stunt
GP Demo (Demo),World Cata-
clysm (Demo)

GALLERY:Wallpapers, Win-
dows Screensavers, Win- er and greatly improved SSL
dows Themes, WinAmp Skins and MailNews performance.

SURGE:Music, Trailers, Medi- UTILITIES


aware, WinAmp 2.74 Full, SYSTEM MECHANIC V3.6
Windows Media Player 7 System maintenance utilities
that allow you to tune your

14 June 2001
■ service~ colophon

VOLUME 1, ISSUE 2
◆ How to contact us ◆ Advertisers
Chairman and Publisher Jasu Shah
Associate Publisher and index
Managing Editor Maulik Jasubhai EDITORIAL plete address, telephone number Acer Peripherals . . . . . . . . .113
Assistant Editor Karan Manral
Products for Test/Review and e-mail of the developer. Adobe . . . . . . . . . . . . . . . . . .141
Editorial Send a complete working copy AMD . . . . . . . . . . . . . . . . . . . .149
Writers Manu Khanna, Nilesh Kakade, American . . . . . . . .Back Cover
Anil Patrick R., Rinki Banerji
of the product (not a ‘trial’ or CUSTOMER/ SUBSCRIPTION
Features Editor Sveta Basraon ‘demo’ version) to the Digit SERVICES Power Conversion
Copy Editors Mohan Krishnan, Test Centre. Only products that E-mail: Any queries or problems Amkette . . . . . . . . . . . . . . . . . .57
Shweta Johri, Julian Vongeyer
Thinkdigit.com Aalaap Ghag, Sunil are currently available in the regarding Digit Interactive, sub- Asus . . . . . . . . . . . . . . . . . . . .145
Srinivasan Indian market will be consid- scriptions or other problems BPL Mobile . . . . . . . . . . . . . . .15
Design
Consultant G.V. Sreekumar
ered. The products must have can be mailed to Bull Power . . . . . . . . . . . . . . .53
Art Director Marshall Mascarenhas the complete name of the man- help@jasubhai.com Creative Technologies . . . . . .31
Senior Visualiser V. Jeevanand ufacturer or developer, details Elent Enterprises . . . . . . . . . .78
Senior Designer Shivasankaran C. Pillai, Pager: 9623-987273 at Mumbai
Senior Graphic Artist Solomon Lewis regarding the name of the Epson IndiaPvt.Ltd .Inside Back
Digital Imaging Artist Neeta Wadiker model and its type and the Pager: 9624-329229 at Cover,147
Infographist Jaya Shetty Pune, Hyderabad and Bangalore
Junior Visualiser Shyam Shirsekar
end-user price. Product Epson Singapore Pte. Ltd. . . .69
Senior Photographer Ashesh Shah brochure and a complete speci- Post: If sent by post, please Gates Academy . . . . . . . . . .119
Photographers Rahul Sharma, fication sheet must be includ- mark ‘Customer Service’. In
Mexi Xavier
Gigabyte . . . . . . . . . . . . . . . . .23
Illustrator Mahesh Benkar, Ram ed, along with the name of a case of subscription problems, Intel . . . . . . . . . . . . . . . . . . . . .25
Contributing Illustrator Farzana person to be contacted for please mention the subscription Karma . . . . . . . . . . . . . . . . . .129
Cooper information. particulars.
Test Centre Karrox Technologies . . .13,19,33
Reviewers Marco D’Souza, Ashu Kaveri Powertronics . . . . . . .61
Mehrotra, Dipti Ranade, Varun Singh, DIGIT INTERACTIVE MARKETING SERVICES
Dipayan Choudhury, Aliasgar Pardawala, Maple IT . . . . . . . . . . . . . . .71,73
Rossi Fernandes, Menlyn Noronha, Yatish Contact Ranvijay Singh, Content IT companies whose products Microsoft . . . . . . . . . . . . . . . . .59
Suvarna, Mehul Mehta Co-ordinator, Multimedia have been
Co-ordinator Gautami V. Chalke
Microworld . . . . . . . . . . . . . .133
(cdcontent@jasubhai.com) for declared win-
Multimedia Neoteric Informatique . . . . . .21
Co-ordinator V. Ravi Shankar inclusion of software on Digit ners in a Digit
NetCracker . . . . . . . . . . . . . .121
Designer Kabir Malkani Interactive. A write-up detailing Test can use
Programmers Hemant Charya, Liu Ai NetVarsity . . . . . . . . . . . .108,109
Chin, Babuprasad the features of the software, the Digit Test
Network Associates . . . . . . .139
Content Ranvijay Singh, Vaibhav Kapoor complete loading instructions Centre logo.
Digital Video Bimal Unnikrishnan Network Solution . . . . . . . .39,41
and a letter certi- They must
Production Pinnacle Systems . . . . . . . . . .51
General Manager Shivshankar fying that the address their
Rashi Peripherals . . . . . . . . . .17
Hiremath product is orig- requests for licences, reprints
Controller Nitin Terse
inal must and bulk orders of Digit to Rational software . . . . . . . . . .29
Senior Co-ordinator Vrushali Sonawane Ronaq . . . . . . . . . . . . . . . . . . .35
Managers Harish Suvarna, Shiv accompany the software. The Suneel Yadav, at our Nerul
Hiremath software must also have the com- office in Navi Mumbai. Samsung . . . . . . . . .Inside Front
Senior Executive R. Ganeshan, Cover,8,9,11
Amit S. Navarange
Operations Seagate . . . . . . . . . . . . . . .65,111
Head Sarang Dash SIBM . . . . . . . . . . . . . . . . . . . .47
Assistant Manager Shailesh Iyer
Co-ordinator Sriram Iyer
◆ Sales & Marketing Offices Sparr Electronics . . . . . . . . . .45
Circulation and Logistics Summit Infotech . . . . . . . . .75,77
Head–Circulation & Logistics HEAD OFFICE MUMBAI
Navi Mumbai Rupesh Sreedharan TCS . . . . . . . . . . . . . . . . . . . . .137
Akhilesh Singh
Distribution & Logistics Sandip Maiti Ad Sales Manager Transcend . . . . . . . . . . . . . . .127
Nicholas Kiro, Arup Ghosh, Vice President Bhavesh Thakore VLSI Design & . . . . . . . . . . .120
Sandeep Rane Sales & Client Marketing Clayton Brace
Information Systems Navin Sahani Phone: +91 22 6591849-50, 6591651 Research centre
Co-ordinator Ajit Rodrigues Client Marketing Fax: +91 22 6591592 XPS Cargo . . . . . . . . . . . . . . . .67
Assistants Sunita D’Cunha, Sunil Rakesh Rana SECUNDERABAD
D’souza Ad Sales Support Venu
Marketing HEAD OFFICE:
Brand Manager Louis D’Mello
NEW DELHI Phone: +91 40 7726091, 7811176/7439
EDITORIAL, MARKETING AND
Marketing Services Rajiv Bose Vijay Adhikari Fax: +91 40 7641697
Regional Manager CUSTOMER SERVICE
Marketing Communication Mithun Roy CHENNAI Plot No D-222/2,
International Marketing Koshy Thomas Sahayaraj Prabhu
Ad Sales Manager TTC Industrial Area, MIDC, Shirvane,
Jasmine Taraporevalla Phone: +91 44 8235186-89
Consumer Marketing Arvind Prabhakar Fax: +91 44 8230731 Nerul, Navi Mumbai 400 706
Manager Mou Maiti Rahul Bhardwaj Phone: 022-7629191/9200
Amit Dhume, Abhyuday Mukhopadhyay, Phone: +91 11 6445320-25 PUNE Fax: 022-7615225, 7629223/24
Sandeep M, Nabjeet Ganguli Fax: +91 11 6445321 Sanjay Nepali Printed and published by Jasu R. Shah on
Customer Service Namita Shetty, Phone: +91 20 4482059, 4494572
BANGALORE Tele-Fax: +91 20 4482059 behalf of Jasubhai Digital Media Pvt Ltd, 26
Reema Sadarangani, Jasneet Kaur, S. Saikumar Maker Chambers VI, 2nd Floor, Nariman
Roshan Jeypaul, Ronny Joseph CALCUTTA
Ad Sales Manager Point, Mumbai 400 021, India.
Raghu Pillai Jayanta Bhattacharya Managing Editor: Maulik Jasubhai
Cover Photograph: Colston Julian, Phone: +91 33 2822183, 2827842,
assisted by Bajirao Pawar Kiran Karri Printed at Tata Infomedia Limited,
Phone: +91 80 5098799/830/865/891 2828016
Model: Indranil Prabhadevi, Mumbai 400 025
Tele-Fax: +91 80 5098717 Fax: +91 33 2827673

16 June 2001
■ pulse

NEWS PULSE DIGIT JUNE 2001

hypethesis AMD Going 4 Mobile Beat the Heat,


Simputer
▲ What is it?
This is a simple low cost
Early reports on AMD’s latest
processor (code-named
notebook.
The mobile version of the
Digitally!
mobile computer that has a Palomino) are out. This Athlon 4 will feature AMD’s Carrier, a provider of heating,
320x240 screen, 32 MB processor, which has a 37-mil- PowerNow! technology, which ventilating and refrigeration
RAM and runs on Linux. lion transistor core, will be allows the processor to dynam- systems, has struck a deal with
Input options include a called the Athlon 4 and marks ically change its clock speed IBM to install Java-enabled
screen-based keyboard, a AMD’s first serious perform- and operating voltage depend- chips into Carrier air-condi-
graffiti-style software and ance product for mobile com- ing on the applications and tioners, which will enable the
the Information Markup puting products. demands on the CPU. The owners to remotely set the tem-
Language (IML) that is 1 GHz Athlon 4 will make use perature and switch on or off
(amongst other things) of the PowerNow! technology the cooling devices. IBM will
smart-card aware and XML- to scale from 500 MHz to service the chip and software
based. 1 GHz and run at voltages of within the unit.
▲What’s so great about it? 1.2 V to 1.4 V. The system is designed with
It aims to lower the cost This technolgy is AMD’s the embedded Java serving up
barrier for people who answer to Intel’s SpeedStep the site to any mobile or desk-
would otherwise never be technology, which made the top device via GSM mobile
able to afford access to Pentium III processors wireless networks. So if you’re a
computers. extremely popular with laptop Carrier AC owner, you can
▲Who made it? and notebook manufacturers. access the company’s site, Myap-
It is currently under devel- Also being launched is the pliance.com, and pay a fee to
opment by the Simputer Athlon 4 will initially come mobile Duron, which is based check your unit on the Web.
Trust and will be licensed to in four speeds: 850 MHz, 900 on the Morgan core. This will Alternatively, fault codes
manufacturers to produce MHz, 950 MHz and 1 GHz for constitute AMD’s value and diagnostic alerts can be
under their own Simputer mobile computers. solution for mobile computers. sent directly from the AC to the
GPL. Find them at: According to AMD, Com- The desktop version of the service technicians via e-mail or
www.simputer.org paq will probably become the Athlon 4 is expected go up fax; they can check your unit on
first PC manufacturer to offer against the Pentium 4 some- the Web site and tell you what
the Athlon 4, in its Presario time later this year. the problem is.

Microsoft XP: Building another


monopoly?
Is XP the latest bully on the block? It doesn’t Microsoft counters that it is simply trying to
SNAPSHOT seem so at first glance. Microsoft’s upcoming improve its product with new features that con-
operating system will provide users with an sumers demand, and that its rivals are trying to
The first computer bug
Internet chat program, a new security program, do the same thing: expand into new markets.
discovered by Admiral
a DVD player and software to burn personal Companies like Symantec and RealNetworks,
Grace Hopper, was a moth
CDs. MSN Messenger will install and load which make software that
caught in the computer
automatically every time XP is run. might be affected by this
relay switch, causing errors!
But this has led to com- product bundling, claim
plaints alleging that that the new Microsoft
Damage worth millions of
Microsoft is using the same applications are rudi-
pounds caused as more
product-bundling strategy that mentary and not the best
than 12,000 Dell comput-
had given rise to the antitrust in their categories.
ers affected by
case involving the company’s Microsoft’s view is that if
the Funlove virus anti-competitive practices people don’t find the new fea-
such as bundling the Internet tures in XP compelling enough to
Source: Data Fellows, Explorer browser with the Windows 98 OS. upgrade, they can choose not to.
www.cs.yale.edu ➜
◆ Red Hat Linux chucks Netscape for Mozilla browser ◆ IBM to make supercomputers ◆ AMD introduces new powerful mobile

18 June 2001
■ pulse

quicktake Redalert
Ken Constable, Vice President, Dell Asia Pacific
Vengeance gone VBS.VBSWG2.Z@mm
Dell Computer has entered the direct model, the latest tech- wrong This is an encrypted
VBScript worm that sends
Indian market. Dell’s speciality nology is available to the cus- The first person to be charged itself to all recipients in your
lies in directly delivering cus- tomer so there is an for cyber crime in the country, Microsoft Outlook address
tom-built PCs to specific cus- investment protection. If a new is the 16-year old son of a book. Rated as 4 (severe) by
tomer orders. technology is announced from retired Indian Air Force offi- Symantec, it arrives as an
▲ What type of business is Dell Intel today, just give us a call. cer, who was arrested by the attachment, with the subject
looking at in India? We will make sure New Delhi police for creating as Mawanella and the mes-
The policy of that the technology is a porn site featuring the class- sage, ‘Mawanella is one of
Dell worldwide is available to you today. mates and teachers who made the Sri Lanka’s Muslim Vil-
to go direct—the This also reduces fun of him at school. lage’. If no Microsoft Outlook
secret of Dell's suc- costs. Constantly teased in school, application is installed, the
cess. We are cur- ▲ What advantages do this Standard XII student qui- worm displays the message
rently looking at Dell machines have etly found a way to hit back. He ‘Please Forward this to
the SME market, over assembled PCs? created a pornographic site everyone’. The worm creates
which is a bigger All Dell machines Amazing-gents.8m.net (taken a copy of itself, called
Ken Constable
chunk of the pie. are built in the Dell down now) that ran a warning mawanella.vbs, in the Win-
VICE PRESIDENT
Two products are factory. No one out- that ‘girls should enter at their dows\system folder. To
Dell Asia Pacific
being launched side the factory can own risk’. remove this worm using
in the desktop segment and tamper with it. Our design is His plan backfired when a Norton Antivirus (NAV), run
two products in the laptop unique. You can open the girl in class complained to her LiveUpdate to get the most
segment. We sell directly to machine and take out the father about her being fea- recent virus definitions. Start
the people through our Web components without a screw- tured in the malicious Web NAV and run a full system
site www.dell.co.in or through driver. In laptops there are spe- site. The boy has been sen- scan, making sure that NAV
our toll free number 1600-33- cial stress points designed to tenced by a juvenile court to is set to scan all files. Delete
8046. Our sales representative protect the internal compo- 14 days’ judicial custody at a any files detected as
will provide assistance in nents. The PCs have a single juvenile remand home in VBS.VBSWG2.Z@mm.
selecting a product keeping button with an ‘e’ written on it Delhi. Clearly not the best of
the price factor in mind. In the that provides online help. ways to take revenge. Sub 7 2.2 Beta
First discovered in Decem-
ber 1999, this Trojan has
been consistently updated
by the author. With each
Nokia playing with Linux consoles revision, updates, are added
to the DAT files. Sub 7 2.2
Nokia has announced its plans form-independent OpenGL sys- made the hardware an open beta offers the usual access
to introduce a Linux-based tem. This would also give Nokia design so anyone else can to the user’s data via the
home entertainment console. access to a large existing base make a clone or compatible Internet. By default, the Tro-
The Media Terminal product. This makes it look jan uses TCP port 27374. It
will be able to func- like Nokia plans on using is normally distributed as a
tion as a video game the Open Source approach Win32 PE exe dropper that
player, MP3 digital for both the hardware (x86 may be disguised as a JPG
music player, Web architecture) and the soft- or BMP picture. When run,
browser, digital TV ware on this device. this dropper installs two
recorder and digital TV Whether this is a viable files into the Windows fold-
set-top box. It will solution, only time will tell. er: the main server exe files,
compete with Sony’s The company plans to normally called msrexe.exe,
Playstation and release the device in and a loader program nor-
Microsoft’s Xbox in Europe this summer and in mally called run.exe, win-
what’s becoming an increasing- of gaming software titles and the US late this year or in early dos.exe or mueexe.exe. Do
ly crowded space. game development expertise. 2002. a full scan of the system
The development platform Rickard Nelger, head of the Visit www.nokia.com/multime- with McAfee or NAV and
for the games on this device will Nokia Home Communications dia/mediaterminal.html for more follow the instructions to
probably be the popular plat- group, says that they have information and pictures. remove the file.

chips in competition with IBM ◆ Intel challenges Sun with telecommunications server ◆ AOL and CompUSA announce alliance

20 June 2001
■ pulse

realitybites
MIT Promotes Open Course
he industry doesn’t have a pricing
“T problem—it has an operating
expense problem” The bottom
It’s a natural marriage of
American higher education
nation of professional staff
and teaching assistants who
Michael Dell, CEO Dell Com- line—what we and the capabilities of the will put materials for more
puters, while predicting a drop really need is World Wide Web, said MIT than 500 courses on the Web.
in revenue. more customers President Charles Vest, Of course, students who do
to pay for it! announcing that the Massa- the course on the Web will not
chusetts Institute of Technolo- receive a degree, which is
gy (MIT) will make the reserved only for the on-
materials for nearly all its campus students who enroll at
courses freely available on the MIT with $26,000 as annual
f we’re not able to quickly resolve Internet over the next 10 tuition fee.
“I these issues, it will be necessary for
Congress and the (United States) Copy-
years.
Located in Cambridge,
OpenCourseWare would
work more in terms of teach-
right Office to step in.” Massachusetts, MIT is a pri- ing and training young stu-
Heck, if we’re
Rob Glaser, RealNetworks vate research university with dents and faculty in
lucky we could
CEO, speaking about the more than 900 faculty and developing countries where
get a patent or
resemblance between their roughly 10,000 undergraduate information and the develop-
two out of this
MusicNet subscription service and graduate students. ment of infrastructure and
and Napster Roughly 2,000 courses will institutions are sorely needed.
be offered for free via MIT’s
new OpenCourseWare pro-
gram. The initiative is estimat- thermometer
ed to take the best part of a
do not question the right of the decade and is projected to cost Hot
“I Open Source software model to com-
pete in the marketplace…companies and
in the region of $100 million.
It would involve incorpo-
XML
Everyone who’s
And there’s going
individuals should be able rating lecture notes, syllabi, anyone is evan-
to be trouble if
to choose either model.” exams, simulations and gelising it
you pick Open
Craig Mundie, of Microsoft streaming video lectures for AMD
Source
referring to his earlier speech nearly all of the research uni- With the intro-
criticising the Open Source versity’s 2,000 courses. It will duction of the
model begin with a two-year pilot Athlon 4, they’re
program involving a combi- getting a foot into
the mobile PC,
high-performance

thumbnail workstation and


multiprocessor
server markets.
PATTERN OF INTERNET USAGE
User statistics show the popularity of certain Web sites based on the percentage of users access- Cold
ing these sites from home as well as the workplace. 3G-delaying
launch
Handsets report-
edly lose their
connection when
a caller moves
into a new
Source: cyberatlas.internet.com

mobile ‘cell’.
Visual Basic
Almost 3 million
VB programmers
have shifted to
the other plat-
forms.


◆ MS monopoly anticipated with launch of Windows XP in October ◆ ‘Cheeseworm’ repairs broken Linux systems ◆ XBox video

22 June 2001
■ pulse

Phone-y videos Yahoo! changes its mind in hurry


As if there weren’t enough their cell phones. Never underestimate the ular portal would have none of
things to do on the mobile Japan’s NTT DoCoMo, a power of your audience. Espe- it. “The very real danger is that
phone already! Along with the world leader in advanced cially if the innocence of their our children will have the very
usual phoning, e-mail check- mobile phone systems, is children is at stake. Web portal real possibility to be exposed to
ing, Web-browsing and SMS already offering low-quality Yahoo! learnt this the hard way. pornographic material,” a state-
sending, get ready to transfer video via its popular iMode Under pressure to develop ment from the California-based
and receive film-quality photo service. It plans to launch its Capitol Resource Institute
and video images along with third generation mobile sys- said.“This is not appropriate
your calls. tems this quarter, which and must not go unchal-
Sarnoff, a privately held promise to deliver broadcast lenged.”
unit of SRI International (for- quality video via phones. Faced with a barrage of
merly, the Stanford Research With these initiatives in customer complaints and

Illustrations: Farzana Cooper


Institute), has designed a low- place, mobile phone users boycott threats, Yahoo! soon
power, 1.2x1 inch BLINC digi- worldwide are expected to changed its tunes. Two days
tal camera that can enable switch over to using broad- after Mallett took the
mobile phone users to cast-quality video networks, ‘enabler of commerce’ stand,
exchange high-resolution pho- ushering a new era of mass Yahoo! announced that it
tos and video images over market video-making. would no longer
sell adult-related
products in its

metrics new sources of revenue, Yahoo!


succumbed to offering a broad
selection of adult material,
Web site’s shopping, auctions
and classifieds areas.
Moral of the story: Don’t

10,00,000 including porn videos and mess with parents.


DVDs, through its popular


shopping service.
people will be employed in IT services “We’re hard and fast on
being the largest enabler of Whois?
commerce on the Web,” said Jeff GRUB IT
The IT-enabled services industry will grow to
Mallett, Yahoo!’s president and ▲ What is it?

$17 billion chief executive officer.“We have It is a real-time open source


chosen to offer adult-oriented software free for download-
content as part of that,” he ing from www.grub.org.
added. ▲ What does it do?
Source: Nasscom estimates for 2008
But parents visiting the pop- This distributed crawling
client creates an infrastruc-
ture providing constant URL
tomorrowstechnology update status information
for almost all Web pages on
ModelMaker 3D Scanners the Internet.
▲ What does it offer?
The ModelMaker, a handheld laser scanning sys- line of laser light scans the surface of the The distributed crawler net-
tem, enables users to capture 3D and colour object, following the surface profile of the work used with GRUB can
data from complex object. Images trapped by enable Web sites, content
3D models. This is the CCD sensors are used providers and individuals to
useful for anima- for simultaneous and precise notify others when changes
tion, virtual reality measurement of multiple occur in the content. No
and product styling points. wonder, it’s your real-time
applications. The initial challenges lay search engine! The database
It uses laser in capturing the different is accessed by GRUB users
stripe triangula- positions of the object and via XML feed that enables
tion technique to merging together the scans them to make changes on
scan real-life collected from different their Web pages and update
images. A thin red angles at a good speed. the database accordingly.

game console launching in November ◆ DigitalTV makes its approach ◆ New subscription service launched by Napster

24 June 2001
■ pulse~ dialog

ver the past couple of weeks since we announced the launch


I DIG IT! O of Digit we have received an incredible amount of feedback
from our readers—via e-mail, telephone calls and most of all,
Wow! You guys are really bold. You guys really amaze me. Every now and then
you try new things that attempt at changing the world. Keep it up! our Web site. Some have enthusiastically embraced the new mag-
With best wishes. azine and others just want the old one back.
S.Prashanth, Via e-mail This is a pretty accurate reflection of the way we ourselves feel
about the launch of Digit.
I was a little upset to know about the change in the name but after going through
Each of us, whether it was those who joined up to be a part of
the details on the Web site, I am very happy to welcome Digit to my family. Now
we expect a lot more. all that CHIP came to mean to us as readers, or others who have
Srinath Thakari, Via Web site made producing this magazine their mission, will look upon the
past few years with more than a little nostalgia.
I have been reading CHIP since the very first issue (April 1998). It’s so good that However, Digit is a name that best reflects the convergence of
I still read it although I am now a hardcore software professional. The new name
people and technology that our magazine is about. We look for-
and look suit the best computer magazine in India.
Sajid Hossain,Via Web site ward to this change with a great sense of enthusiasm, and hope
that you, our readers will support us in our mission, which is to
I have been reading CHIP right from the first edition and I have seen the improve- create India’s premier technology magazine.
ments. I am sure that you will continue to deliver the same kind of quality con-
tent in the future.
Sagar, Via Web site

The change of name to Digit came to me as a surprise, but reading that the con-
tents and quality of the articles will remain the same reassured me. I hope the
same is true for the CD. I loved CHIP India and will love Digit too. After all, what’s
in a name?
Pankaj Nagar, Via Web site Web awar
ds
First of all, let me commend you on the excellent choice of name—Digit. Cool, short
ditched?
What will
and snappy. Sounds just sophisticated enough to make it seem young and at the happen to
CH IP-Dishn the
same time not a new kid on the block. et Web Aw
This was on ards?
e of the fore
Dhruv,Via Web site Web awar most
ds that al
P.S. I hope your first magazine cover is kick-ass and mind blowing. fanatics wer l Net
e looking ou
a kind of Fi t for—
lmfare awar
Dear CHIP…er…Digit, the Netizen ds for
s. Are you
planning to still
When I saw your advertisement stating that CHIP is being discontinued, I was go ahead w
If so, when? ith it?
heart broken because it was the only magazine that was just right.
SANDEEP,
Then I learnt about Digit. It’s about time you came up with a better name!
Via Web site
Sushir, Via Web site

Man, this rocks. Same stuff + new stuff = Digit!


Yes, we are still planning to go ahead with
Aditya Pandya, Via Web site the Web Awards in 2001. You will be able
to see information about the Awards up
CHIP was a trendsetter that captured the hearts and imagination of everyone. on our Web site in the near future.
Discontinuing CHIP is a shock, but after going through the publisher’s note, I am
reassured. Let’s hope that Digit will exceed the high mark set by CHIP.
Mihir, Via Web site
Bettureavrleft,oanr dw orse?ge in the name of CHIP. What doa
now the chan Digit really
Dear Sir, First Go for worse)? Is
r better or
ange next (fo gy to gain
you want to ch business strate
When I saw the ad in The Times of India I was quite surprised to learn of Digit.
IP or is it the same old
CH
Nevertheless, the name CHIP shall always remain in our hearts. We breathlessly step ahead of
await the new digital experience. attention? MIT
RA AND SU A strategy to gain attention? Not real-
Z. Sheery Joshua, Via e-mail ARNAB MIT ly. We think we already had yours.
Via Web site ‘Digit’ seems to better reflect the spir-
it of the magazine.
Cite the sit PS: May be the two hardware and
e
Does Digit ha
ve a new Web
three software comparison tests in
this issue are a more acceptable
SUNDAR site of its ow
AND ABH n? Yes, you can now visit our new change.
Via Web site IJI
Web site for Digit at
www.thinkdigit.com

26 June 2001
Yeh con ha
i!
The actual tr
uth is that C DIGIT WHO?
India, and w HIP will be
ill be in the republished
con game! market soon in
. Digit is just Somehow, I am not happy with Digit. CHIP sounded better and I will miss it big
ANIRUDD a
HA AND SA time.
Via Web site RANSH
A Shetty, Sriram, Via Web site

CHIP is the best computer magazine in the market. Please do not stop it
The fact is that we created all the Antonia Paes, Via Web site
content here for Indian audi-
ences. Digit is here. Right now! I don’t understand what is happening to my CHIP. I feel like a mother who has
lost her child.
Tadikonda Srinath, Via Web site

What’s the logic behind this name change when it already sounds so good and
is so popular? This is really a shock. Come on guys it’s more than just a name to
most people. Me included.
and then
Whyundenrsotandwyo?ur rationale in basicuralowly nusseintug pa atbranthe time of the maging-
d name Prasanth, Via Web site

I don’t start with yo do


hy didn’t you at you were
dumping it. W sh ee r no ns ense to say th I personally feel that there was no need to create this confusion. Continuing the
? It’ s
in April 1998 p) are useless. name CHIP would have been better.
azine launch (the German grou
an d they Guru Murthy, Via Web site
everything
AR
SUNIL KUM
Via Web site ‘What’s in a name?’, you may ask? Call it brand loyalty or anything else, I per-
sonally prefer CHIP. It was a part of a global IT information revolution that spread
across several countries through all continents. Somehow the name Digit does-
When CHIP started out in 1998 we quickly realised that for
n’t seem to carry the same charm. I would like to see CHIP again. Or maybe even
the magazine to fulfill the needs of its readers, we had to pro-
vide content that was relevant to our Indian audiences. A large CHIP v2.0.
part of the popularity of the magazine over the last three years Arnab Mitra, Via e-mail
could be attributed to this decision.
Extending this further, since January we have a magazine I know things change as life goes on and CHIP also had to change, as it was no
that has moved from being restricted to only computing, to longer associated with Vogel. But fond memories die hard. The memories of being
one that covers the larger realm of digital technology. The name a part of the CHIP revolution (as a reader of course) will remain.
‘Digit’ seems to be better suited to this new product. Riyaz, Via Web site
Also, at no point have we referred to our relationship with
Vogel as ‘useless’. The changes are simply a reflection of the dif-
ferences that exist between our objectives today and our ideas
on what content is suitable.

You’ve lost er a w a la D igit?tion for Rs 1,450 when CHIP swasof Difirgistt


I am a it
Congolese do
M fered a three-year subscrip ibers. Can new subscriber new Goof Ups
You of early subscr CDs with this
ria with a ke ctor based in as one of the ue giving two
en interest Nige-
in your mag launched. I w so, are yo u going to contin
zine. Howev fers? Al
er, I was us a- expect such of price? Notice any goof-ups? Write to
earlier CHIP ed more to
the agaz ine? W hat will be the goof@jasubhai.com
magazine w m
cepts, philo ith its con- IVID
sophy and
structure. N SANKAR, N
with Digit, w ow, eb site
on’t there be Via W
the American a conf
magazine, an lict with
previous ph d won’t the We do have a completely new sub-
ilosophy ge
DAMIEN K t lost? scription offer. Look for it inside this Send your letters marked
APANGA
Via Web site issue of Digit. Your issue of Digit will ‘Readers Letters’ to the Digit
come with two CDs and will be avail- office:
able to newsstand buyers for Rs 100 D-222/2, MIDC, TTC Industrial
Estate,
Om Sagar Building, Nerul,
Navi Mumbai 400 706
CHIP as it was published in India was quite distinct from Phone: 022-7629191/9200;
any other edition elsewhere. If you have been reading it for Fax: 022-7629224
the last few months you will find that the same editorial phi- E-mail:
losophy, concepts and structure remain. readersletters@jasubhai.com

27
■ connect~ spotlight

TOP of the Charts


The spotlight this month focuses on Pentagram, the first Indian band to
top the MP3.com Asia charts
JULIAN VONGEYER AND ANIL PATRICK R. samplers (one an Akai and the other an SP808),
entagram isn’t just another Indian rock guitars, keyboards and drums.

P band. It stands head and shoulders above


other Indian rock hopefuls, and one reason
for this is that the band members have
always done a lot of experimenting with their
music and sound. Their most recent achieve-
Pentagram first tasted success with wins in
three big competitions, the most prominent being
Livewire. This was followed by a record deal with
Plus Music leading to the release of the album,
We’re Not Listening in 1996, which became the
ment has been to bag the top spot in the fastest selling Indian rock album. The band fol-
“We decided to MP3.com Asia charts. lowed this up with two music videos called The
The band believes that the Internet has a real- Ignorant One and Yoo, which got good exposure
focus on the ly wide reach as a medium, and MP3.com has on music channels. MTV’s Artist of the Month
served them well in meeting their objective of and the Channel V award for Best Live Band were
Internet and the reaching out to a wider audience rather than just the next two honours conferred upon the band.
rock enthusiasts. Barely a week after they were In 1999, Pentagram got involved in a bit of
computer uploaded onto the site, all five songs, which were controversy. Their single, The Price of Bullets
previewed under various genres such as Drum which also featured Javed Akhtar and Shankar
generation, who and Bass, Electronica, etc, reached the number Mahadevan, was refused airplay by the music
one slot in their respective categories. This channels. The track was based on the Kargil war,
are very achievement has made Pentagram the first Indi- and the video was considered too violent and
an band to top the MP3.com Asia charts. graphic to be aired. Not to be deterred, the band
important for us” Pentagram comprises five members—Shiraz put the tracks up on the Internet, which led to it
being featured in Rolling Stones magazine.
Topping the MP3.com Asia charts has now
focused even more attention on the group, with
a lot of publicity from the media and a number
of offers including one from a Russian band that
sent them a couple of songs to remix.
“We have decided to focus on the Internet
and the computer generation who are a very
important aspect for us right now and for the
future,” says Randolf. The band members also
feel that putting up songs on free sites such as
MP3.com makes for a good business strategy as
it arouses public interest in the album. Howev-
er, what’s more important to the band than
being number one on the charts is the number
of people that are logging on to the site to listen
to the tracks—an average of 50 people a day.
And, of course, being the first Indian band to
achieve this only adds to the jubilation. “Being
the first Indian band to top the charts felt good.
Pentagram: Papal (bass), Vishal (vocals), Shiraz (drums), Randolf (guitar), Clyde (effects) Being number one in all of Asia is a good thing.”
However, the band members insist that top-
on drums, Vishal on vocals, Clyde on effects, ping the MP3.com Asia charts wasn’t all that big
Papal on bass and Randolf on guitar. Shiraz, a deal. “By 1998 and 1999 we were pretty well
Clyde and Vishal started the band in 1993, and known in the country and this has just gotten us
were joined by the other two in 1994. into the news again. We had done cassettes and
They shifted from traditional rock towards CDs and we just thought that it was time to get
progressive alternative pop and electronica in an some music flowing on the Internet as well,
effort to improve themselves and break the bar- which is why topping the MP3 Asia charts is nice
riers of traditional rock music. The group uses but not such a big thing for us as it is for the fans
minimal gear to record their songs—a couple of and people who like our music.”

28 June 2001
■ connect~ face-off

Do we need ‘Big Brother’ watching us?


Should corporates monitor employees’ Net usage? Anil Patrick R. speaks with representatives of
Bharat Petroleum and Dishnet DSL on whether it violates the individual’s right to privacy
onitoring employees’ Yet another problem is chat- s a pioneering company enough channels open for effi-

M Internet usage should be


enforced by every organ-
isation. This is highly
beneficial for smooth opera-
tions. If an organisation is pro-
ting, which is a major waste of
time and bandwidth. Employ-
ees can get so addicted to chat-
ting that work is completely
neglected. Chatting is com-
A providing Internet access,
we believe that monitoring
employees’ Internet access
is not an ethical practice. We do
not monitor Internet usage by
cient communication and con-
stant learning will there be
efficient employees.
If Internet usage is moni-
tored, what is the difference
viding Internet access to pletely off limits in our organ- employees for various reasons. between this revolutionary
employees, it is solely for work isation. Similar is the case when Reading an employee’s medium and the old channels
purposes. If an employee uses employees use the company’s e-mail is just like opening and of communication? Tracking
the Net for personal reasons, it e-mail facility for personal pur- reading one of his letters. Every what your employee does on
is a waste of available resources. poses. The endless chain of for- individual has a right to priva- the Internet is just like tapping
warded e-mail can crash the cy and this basic right is com-
Anil Kumar Kaushik mail server and this is some- promised when an organisation Sanjeev Panicker
Chief Manager, IS (Communication thing every organisation can do gets involved in monitoring. Manager - Human Resources
Projects), Bharat Petroleum Corporation DishnetDSL

“The individual’s
“If an employee privacy is
uses the Internet compromised when
for personal an organisation
purposes, it is a monitors the Net
waste of available usage of its
resources“ employees“

What do you think? Come, speak your mind at www.yahoo.co.in


There are several aspects to without. We have enforced Yet another big issue is that into a phone line to overhear a
this issue. Productivity of the scanning of e-mail for unwant- of trust. An organisation can conversation. Would all the
employee suffers when he ed content to avoid such prob- attain success only if there advocates for Internet monitor-
browses the Internet for pur- lems. If an employee is found exists complete trust between ing in offices indulge in tapping
poses other than work. Surfing to have misused the facility, he the management and the employees’ phone lines as well?
of sites with sexually explicit is warned. employees. Our employees are I don’t think so. Then why
content is a major problem, Security is a major problem the essence of our organisa- should we monitor what our
which can completely disrupt as well. When Internet usage is tion. If we monitor Internet colleagues are doing on the
employee morale and destroy not monitored, it is possible usage, we are breaking that Net? This type of ‘Big brother is
productivity. that confidential internal infor- bond of trust. Our employees watching!’ scenario only tends
Downloading of objection- mation could be leaked out. understand how to use the to demoralise employees. It also
able material and illegal soft- Other problems such as virus- Internet judiciously, and we tends to breed a tendency to
ware can cause severe es and internal hacking don’t want to question their break the system. Let the Inter-
bandwidth problems. It can attempts are also possible. integrity by monitoring their net be what it is—the best and
also lead the organisation into All these factors made us Net usage. cheapest method of access to
major legal hassles. We have enforce monitoring of Internet The Internet has ushered in information. There is no need
monitoring software to ensure usage by employees. We believe an era of efficient and cheap to put constraints on the basic
that no unwanted sites are vis- that it is a highly beneficial access to information. Knowl- human right to communica-
ited by employees. practice for the organisation. edge is power. Only if there are tion and information.

www.y aho o.c o.in Catch ‘em live on Yahoo!


Sanjeev Panicker on June 10 at 4 pm and Anil Kumar Kaushik on June 20 at 4 pm

30 June 2001
■ c o n n e c t ~ column

madhu m. kurup
Are all your eggs in one basket?
amiliarity breeds contempt. It also
F breeds virus and hacker attacks.
Which is why diversity is the name
of the game in network security
Normal is boring. Sometimes, though, normal ety of versions as well. With so much diversity,
can be more dangerous than just plain boring. we should be safe, right? But given the virus
Security depends on the attacker being as mini- attacks that routinely cripple the Windows world,
mally aware of your information as possible. we realise the effects of having an OS based on a
Highly diverse, dissimilar systems are likely to common family with similar security issues. Love
pose greater difficulty for an attacker than a stan- Bug, Melissa and the KaK virus extracted a dev-
dard, normal and expected configuration. From astating price in terms of the damage they caused.
a security standpoint, being average is more than The fact that Microsoft routinely creates software
just being mean (pun unintended). Using simi- that allows malicious external code to be execut-
lar application software, operating systems or ed via an e-mail client is inexcusable; the rate at
even configurations is a probable cause for secu- which these e-mail viruse spread is an even more
rity issues. Thanks to the Internet, now we are serious cause for concern.
much more closely connected than we actually Another example of the implications of a Win-
believe or understand ourselves to be. This con- dows bug comes from a newly discovered exploit
nection implies that problems in one configura- that affects IIS 5.0 servers. This bug is estimated to
tion can migrate to another with ease. affect over a million servers world-wide. How
The foremost tool used to externally analyse many of these servers are likely to be patched in
your machine is nmap (www.insecure.org/nmap). time to avoid automated tools that hunt for such
Nmap is a port scanner that can tell you exactly servers is yet to be known. However, if you read
which OS and what services are operating on a the relevant Microsoft Security Bulletin, you will
given machine. Once an attacker is able to obtain find that if you had not retained the defaults but
information regarding the configuration of the had customised your IIS setup instead, this prob-
machine, the situation changes. If the scan lem could have been avoided. The rate at which
reveals the machine to be of a default or well- these infections spread reveals that monoculture,
known configuration, scripts are usually avail- especially in an office or in an organisation, is a
able to attack it. These problems are not specific fertile breeding ground for an attack.
to just the Windows or just the Unix world, they So, then, the Unix world is much safer, right?
are occurring with increasing frequency in both. Well, not really. Linux is humorously described
True, one would assume that there’s a fair as the Unix de-fragmentation tool. And, for far
degree of diversity in the Windows world—after too long, most new users seem to think that Red
all, Windows is available as 3.1, 95, 98, CE, ME, Hat is Linux and vice versa. The outbreak of the
NT, 2K, XP (with some of these in Home, Pro- Ramen, Li0n and Adore (www.nipc.gov/warnings/
fessional Server and Data Center variants). If that alerts/2001/01-010.htm) worms indicates that Linux
isn’t enough, you may or may not have applied usage is also beginning to show a lack of diversi-
the various service packs supplied by Microsoft. ty. These worms make use of the fact that
Hang on, we aren’t done yet—the IIS Web Serv- machines are typically installed using the default
er, IE and Outlook Express are available in a vari- Red Hat install—something that installs ➜

32 June 2001
■ c o n n e c t ~ column

unwanted software. It may be far easier to set


up a safe server using Linux, but that does not
explain the success of these worms.
Purists may object that most vulnerabil-
ities occur in applications and not neces-
sarily in the operating system. That is
true—but what about cross-platform
applications that are
now in vogue?
Apache can now run
on BSD, Mac’s OS
X, Linux and just
about every other
platform out there. In
a famous hack sometime
ago, a bunch of clever hack-
ers attacked apache.org to show that
a mis-configured Apache server can lead to seri- Illustration: Soloman Lewis
ous security vulnerabilities. Ken Thompson’s
famous compiler hack (www.acm.org/classics/sep95/) the patches (from
again goes to show that one piece of software (in http://windowsupdate.microsoft.com/) for
this case, GCC) being used everywhere can lead to your current setup? Use some of the available
system-wide vulnerabilities. freeware firewalls to mask your identity. For the
If there is gloom about the state of diversity in Linux world, do not use the default install—cus-
computer systems, is there a flip side? Using tomise each machine based on its requirements.
numerous little known, obscure and out-of-date Use a hardening script like Bastille Linux
software does not automatically guarantee (www.bastille-linux.org/) to kill known security issues.
security. The goal is to use the right software for Turn off services that you do not need.
One very interesting possibility is the IP-Per-
sonality Patch (http://ippersonality.sourceforge.net/)
Ken Thompson’s famous available for Linux Kernel 2.4. This patch makes
your machine look like any other operating sys-
compiler hack shows that tem to external scanners—so you can make your
Linux machine pretend to be an OS/2, Windows,
using one piece of software FreeBSD or Sun Solaris box! This way, you can
everywhere can lead to have your cake and eat it too! You can use a pop-
ular distribution (and the attendant benefits)
system-wide vulnerabilities while pretending to be a rare, and therefore dif-
ficult to attack, platform.
A heterogeneous network in an office or
the right job. Tailor each configuration to a par- organisation will need more work and mainte-
ticular need; don’t assume that the default is right. nance. It may also need more resources and per-
Don’t use one setup or configuration because it sonnel. But in the larger perspective, if you want
may seem easy to administer or maintain. Securi- a more reliable and fault tolerant setup, then
ty is a trade-off between functionality and safety. diversity is strength. Learn to mix and match
Understand the need for diversity in the context OSes, software and resources. Depending on
of the systems that you are in contact with. your needs, use different configurations wherev-
Yes, there are advantages to a software or er justified. Try to introduce an awareness of
operating system being used by a large number where each software has a particular niche in
of people. Widespread use results in better test- which it is most suited. Apart from learning
ing and detection of potential problems. In com- about different software and how they interact,
munities that can react quickly to problems (for this will expose you to potential overlaps
example, the Linux community solved the Ping- between software—something that is useful
Of-Death bug in two hours), the widespread use from a security perspective. More importantly,
of software implies that it can quickly become learning how to use different software keeps you
safer. So, is there a middle path to choose? from becoming normal and ordinary—and nor-
For the Windows world, the simplest option mal is boring, right?
would be to not upgrade unless you absolutely
need to. If your current browser displays pages Madhu Kurup works for the data engineering group at
decently, do you really need that new version? the Yahoo! Software Development Center, Bangalore.
Especially if you have been diligently applying all He can be contacted at madhumkurup@yahoo.com

34 June 2001
■ connect~ t e c h n o l o g y n e x t

Fantasies embedded
Embedded systems ANIL PATRICK R. using your modem. Read on to find out what
doctor is configuring a cardiac pacemaker these technologies have in store for you.
and real time
A
operating systems
are fast achieving
ubiquity, blurring the
inside his patient’s chest while sitting 200
kilometres away. Another person is travel-
ling in a driver-less car that takes him from
Mumbai to New Delhi using its in-built naviga-
tion program. Impossible? Not really. Advances
How ‘real’ is real time?
When it comes to real-life situations like con-
trolling a traffic signal or a steel furnace, the OS
has to respond immediately. Imagine the plight of
in technology have taken place at such speed that a driver if his car’s anti-skid mechanism refuses to
lines between these fictitious scenarios are likely to be translat- respond the moment he jams his brakes. This is
science fiction and ed into reality within the next couple of years. where RTOS comes in. Real time operating sys-
Real Time Operating Systems (RTOS) and tems are those that respond to inputs immedi-
hard reality embedded systems are two among the several ately (see box, ‘What is an RTOS?’).
technologies that will play a major role in mak-
ing these concepts possible. First stop—embedded technology
You may say these technologies have been Why use a hammer when a gentle touch would
around for a long time and there have been no do? This is the basic idea behind all the appliances
such dramatic developments. But what you may that make use of embedded systems. They are
not know is that RTOS and embedded systems pre-programmed to perform a dedicated or nar-
are the unsung heroes of much of the technolo- row range of functions as part of a larger system,
gy you use today—the video game you play, or usually with minimal end-user interaction. For
the CD player or the washing machine you use example, an entire operating system like Win-
employ them. Without an embedded system and dows 98 is not required for controlling a car’s
an RTOS, you would not even be able to go online valve that has only certain types of movements, or

36 June 2001
Imagin: Neeta Wadiker

in real time
a washing machine, which uses only specific were unimaginable in the past. The second fac-
cleaning routines. tor was the emergence of several integrated soft-
Embedded systems are used in navigation ware environments, which simplified the
tools like global positioning systems (GPS), development of these applications. The third
automated teller machines (ATMs), networking factor was the coming together of embedded
equipment such as routers and switches, digital systems and the Internet, which made possible
videos and cameras, mobile phones, aerospace the networking of several embedded systems to
applications, telecom applications, etc. Even toys operate as part of a large system across net-
make use of embedded systems (see box, ‘What works—be it a LAN, WAN or the Internet. This
goes into an embedded system?’). convergence of embedded systems with the
Embedded systems are usually low in cost and Internet is going to transform the way we live.
are easily available off the shelf for most applica-
tions. They usually have low design risks, since it In the driving seat
is easy to verify the designs using evaluation There are several tasks in which real time OSes
boards. The easy availability of good design tools beat their desktop counterparts hands-down. A
(many of them in the freeware domain) and soft- common application of embedded systems in
ware engineers have been two key factors in the real world is in automobiles because these
fuelling the growth of embedded systems. systems are cheap, efficient and problem-free.
Embedded systems have received a major Almost every car that rolls off the production
shot in the arm over the past two or three years line these days makes use of embedded technol-
due to three factors. The first was the develop- ogy in one form or the other. RTOSs are pre-
ment of standard run-time platforms like Java, ferred in this area due to their fast response times
which enabled their use in myriad ways that and minimal system requirements.

37
■ connect~ t e c h n o l o g y n e x t

Most of the embedded systems in automo- built-in management functions. And they will
What is an RTOS? biles are rugged in nature, as most of these sys- also be connected to the Internet in most cases.
tems are made up of a single chip. Other factors Real time OSes will work wonders when it
A real time operating system aiding their use are the low costs involved, ease comes to intelligent houses. The huge advantage
(RTOS) is an OS that guar- of development, and the fact that embedded they have over desktop OSes is their low cost.
antees a certain capability devices can be networked to act as sub-modules This factor alone can keep desktop OSes out of
within a specified time con- in a larger system. No driver clashes or ‘system the running, but there are other reasons as well.
straint. There are two types busy’ conditions happen in these systems. Their An intelligent house may have more than 50 dif-
of RTOSs—hard and soft. compact profiles enable them to fit easily under ferent devices in it. Imagine the cost of licensing
Consider an automated the cramped hood of a car. that many copies of Windows 2000! Also, RTOSs
assembly line that makes Embedded systems can be used to implement are capable of being inter-networked, which
use of robots for assembling features ranging from adjustment of the sus- enables co-ordinated functioning between
a ceiling fan. The robot will pension to suit road conditions and the octane devices at a scale that is unimaginable if desktop
be required to place the ball OSes are used. Imagine getting
bearings of the fan at the W indow scalded while having a hot show-
precise moment when each
Fuel quality er—all because of an OS ‘freeze’
GP defroster monitoring
fan reaches a specific posi- or ‘crash’. Ouch!
tion at a certain time inter-
val. In a hard RTOS, if the
Fuel The doctor will see you now
calculation could not be
injec- Imagine a time when body trans-
performed for making the plants like cardiac pacemakers
Automat
ball bearing available at the
ic
will be able to monitor and man-
right time, the OS would ter-
AB Traction age themselves remotely. These
minate with a failure. For a systems will be so compact that
soft RTOS, the assembly line Embedded systems in a car the patient wouldn’t even be
would continue to operate aware that they are embedded in
even though the fan is miss- content in the fuel to antilock braking systems his body. Another point in favour of RTOSs is
ing ball bearings. This is bad (ABS) and security systems. Speaking of things their stability, instantaneous response and effi-
because the productivity of nearer home, the ‘computer chip’ that controls ciency. No OS crashes or delays in responding, as
the whole assembly line is fuel injection in a Hyundai Santro or the one is the case with most desktop OSes. After all,
lost. Generally used OSes that controls the activation of air bags in the which patient can rest easy with the thought of
like Microsoft’s Windows recently launched Fiat Siena Weekend is noth- his life literally hanging by a thread due to the
2000 or IBM’s OS/390 can ing but an embedded system. Right from brakes time taken by the OS to load!
be considered as RTOSs to automatic traction control to air bags and Embedded technology advances are pointing
since they satisfy some con- fuel/air mixture controls, there may be up to 30- towards the use of pacemakers that can be trans-
ditions of an RTOS. Howev- 50 embedded systems within a present-day car. planted in or near the heart itself. The pace-
er, they do not meet all the And this is just the beginning. maker will be able to monitor parameters like
requirements of an RTOS. blood pressure, blood flow, pulse rate, tempera-
In general, an RTOS has Home is where the chip is ture, etc, using microsensors planted in various
the following features: How would you like to live in a house that recog- parts of the body. This capability will enable the
■ Multitasking nises your fingerprints and opens the front door pacemaker to automatically vary its operation to
■ Process threads that can automatically? Imagine a fridge that checks your suit the changing body conditions. It will also
be prioritised food supplies and places orders to replenish transmit data using wireless transmission, thus
■ A sufficient number of them; or intelligent lights and air conditioners enabling a doctor to constantly monitor its oper-
interrupt levels that adjust their settings automatically according ation. In most cases, wireless transmission is
RTOSs are usually to the light and heat available at various times of likely to be done by a transmitter implanted near
employed in small embed- the day. What about a microwave oven that can the surface of the skin. In case any abnormality
ded operating systems that send a message to your PDA saying that the cake is detected, the doctor will be able to take reme-
are packaged as part of you kept to bake is done? These are all possible dial action even from a remote location.
microdevices like micro- in the near future. In fact, many of these devices
processors. have already made their debut using embedded Wired wearables
The major difference systems for controlling them and the Bluetooth A mobile phone in the form of a ring or a ear-
between embedded sys- technology for communication. ring? What about cool sunglasses, with stream-
tems and RTOSs is that Homes of the future will employ embedded ing video displays built into them? All these can
embedded systems are technology devices to become ‘intelligent’. An soon be a reality. Embedded systems have a small
basically platform-less sys- intelligent house is essentially a network of smart footprint and consume very little power, which
tems, that is, they do not devices, which could be a fridge, TV, microwave makes them ideal for wearable computing appli-
use any operating system, oven, washing machine or any of the numerous cations. The minimal system requirements of
whereas RTOSs work on domestic appliances that we use at home. They these devices ensure that the hardware is almost
specific OSes. will be able to optimise themselves or report microscopic.
maintenance problems to technicians using IBM is already working on the prototype of ➜

38 June 2001
■ connect~ t e c h n o l o g y n e x t
Infographics: Mahesh Benkar

Pacemak
What goes into Senso
an Embedded
System?
An embedded system is W ireless trans-
any device controlled by
instructions stored on a
chip. These devices are
Transmit
usually controlled by a
microprocessor that exe-
cutes the instructions Senso
stored on a Read Only
Memory (ROM) chip. Doct Patie
One of the most popu-
lar Real Time Operating
Systems (RTOS) in use Embedded systems can completely change the way pacemakers operate
today is QNX (pronounced
‘queue nicks’). It is used for
everything from medical a mobile phone that can be worn as jewellery. unit or laser transceiver fixed in front of it to
instrumentation and moni- The components of the phone will be distrib- determine the distance and relative speed of any
toring nuclear reactors, to uted among different pieces of jewellery—ear- vehicle in its path. The ACC computer (what else
traffic lights and industrial ring, necklace, ring and bracelet. but an embedded system or a grouped system of
process control. In fact, it is The phone is likely to have Bluetooth capa- embedded systems) constantly controls the
so widely used that we use bility built into it. The earrings will have embed- throttle and brakes of the car. This helps to make
devices having QNX several ded speakers and will act as the receiver. The sure that the set cruise speed or adapted speed of
times a day without being necklace will have embedded microphones that traffic at that time is not exceeded.
aware of it. will act as the mouthpiece users can talk into. Another revolution is the way Internet serv-
QNX makes use of a IBM calls the ring part of the phone the ‘decoder ices will be integrated into the car. So when you
micro kernel as opposed to ring’. Light emitting diodes (LEDs) will flash to drive past your mechanic’s, you will be remind-
OSes such as Windows and indicate an incoming call. The ring will also have ed that your engine oil needs a refill, and when
UNIX, so system level func- features that will enable it to be programmed to you cross the city limits, the toll will automati-
tions such as device drivers flash different colours for a particular user or to cally get deducted from your bank account. And
are not part of the system. indicate the importance of a call. A video graph- while passing the shopping mall, your PDA,
The kernel contains a mini- ics array (VGA) will be built into the bracelet,
mum number of features which will display the name and phone number
for implementing basic sys- of the caller. The bracelet will also integrate the
tem calls. These include keypad and dialling functions in it. IBM plans
message passing along to incorporate voice recognition technology for
with other interprocess dialling a number. The phone may also have fea-
communication, interrupt tures to indicate new e-mail.
handling support, and
other features. The other Don’t keep your eyes on the road
functions of the operating Embedded systems can also make driver-less
system are provided vehicle control a reality. Major automobile man-
optionally and modularly ufacturers are already engaged in work on these
through processes that concepts. One such technology is Adaptive
communicate mostly Cruise Control (ACC) from Ford. A mobile phone that you can wear as jewellery
through message passing. ACC allows cars to keep safe distances from
Message passing is a two- other vehicles on busy highways. The driver can which is connected to the Net via the car, will
way asymmetric synchro- set the speed of his car and the distance between inform you about a new sale. In fact, the auto-
nised exchange of data his car and others. When traffic slows down, matic toll deduction concept is already in effect
between two processes in ACC alters vehicle speed using moderate brak- in several countries around the globe.
the OS. It is called asym- ing. This ensures that a constant distance is All these application areas are just tiny drops
metric because one of the maintained between cars. As soon as traffic in the big ocean of embedded systems technol-
processes must be a becomes less, ACC moves up to the desired ogy. These proverbial ‘Davids’ are all set to con-
‘sender’ and the other must cruise speed that has been set by the driver. The quer a world that is forbidden territory for the
be a ‘receiver’ for passing driver can override the system anytime he wants popular desktop OS ‘Goliaths’. So wait with
to take place. to by braking. bated breath for the fireworks to come. They are
Each car with ACC has a microwave radar sure to blow your mind.

40 June 2001
■ connect~ droolmaal

SIZ E it up!
MOHAN KRISHNAN regular software such as Word
and Excel. Others have even cov-

Y
ou can’t just call them per- ered personal entertainment with
sonal digital assistants any built-in MP3 players and support
longer. Most PDAs now offer for watching movie clips. Here’s a
Internet connectivity and look at some next-generation
come with pocket versions of your handhelds.

➜ HP Jornada 720

PDA Powerhouse
A convenient PDA that also provides Internet connectivity, the HP
Sony Clie PEG N-710C Jornada 720 sports a 206 MHz processor with 32 MB SDRAM and
Pure Entertainment also offers 2D graphics acceleration. There’s an in-built 56K
The Sony Clie is not just a PDA, it’s also a personal enter- modem, and also USB support. It weighs 510 grams and comes
tainment organiser, with an in-built MP3 player, audio with the Pocket Office suite. The 6.5-inch colour display is capable
software and a high-resolution reflective TFT colour of 65,536 colours and a maximum resolution of 640x240 pixels.
display (320x320 pixels) screen that can even be used You can also record notes using the built-in voice recorder.
for watching movie clips. The 33-MHz Motorola Web site: www.hp.com/jornada
Dragonball VZ processor with the Palm OS forms
the basic framework for this device.
Web site: www.sonystyle.com/micros/clie

Compaq iPAQ Pocket PC


Psion Revo Plus

Packed to Perfection
It’s light, quite light, at just 178.6 grams, but with a 206 Mobile Internet Organiser
MHz Intel RISC processor under its hood, the At 200 grams, this mobile organiser doesn’t weigh you down
Compaq Pocket PC promises to zip even though its loaded with features. Revo Plus comes with an
through e-mails, schedules, MP3 files ARM 710 core running at 36 MHz. It includes standard features
and digital photos. Standard Pocket PC such as a calculator, scheduler, alarms, etc, and you can specify
versions of office suites are available, as different alarms that will set off at the appropriate times. Colour
also support for 4,096 colours at 12-bit display is still missing in the 4800x160-pixel resolution. You get
(240x320 pixels). e-mail as well as WAP connectivity with this PDA.
Web site: www.compaq.com/products/IPAQ Web site: www.psion.com/revoplus

42 June 2001

Ericsson Communicator Platform
All-round Communication
The Ericsson Communicator Platform is based on
EPOC. It has an in-built GPS receiver for positioning
information and works on GSM technology. Inter-
net is accessible through WAP as well as HTML.
There’s also an in-built Bluetooth chip for wireless
connectivity with other devices. The Communica-
tor comes with a colour touch-screen and the
interface is designed for easy accessibility.
Web site: www.ericsson.com

Nokia 9210 Communicator ➜


Talk Mobile
The Nokia 9210 Communicator uses the EPOC (from
Symbian) platform and 3G technology for much of its
mobile functions. The Communicator provides up to
4,096 colours and comes with word processing,
spreadsheet and presentations software. Other fea-
tures include mobile e-mail, WAP and mobile multi-
media. This sleek gadget weighs in at 244 grams.
Web site:
www.nokia.com/phones/9210/index.html

Visor Edge

Palm m505 Spring it On


Palm Time Its USB cradle makes synchronising
An LCD screen with support for 65,000 colours, expansion the Visor Edge quite a simple task. It
card slots and the Palm OS 4.0—these are some of the best also has the Springboard expansion
features of the m505. If you have slot, which allows you to add devices
access to data-enabled mobile and change the very nature of your
phones, you can also use the handheld. The Visor Edge runs on
connectivity software to get onto the Palm OS, so you can install all
the Net, use SMS or access the popular software for the Palm
e-mail. You also get Pocket OS. There is a 33 MHz Motorola
software to aid you with Dragonball VZ processor with
standard document applica- 8 MB RAM.
tions. Web site:
Web site: www.palm.com/ www.handspring.com/
products/palmm505 products/visoredge

43
■ connect~ passport

SEE SHARP

If you, like Microsoft, Illustration: Mahesh Benkar


MANU KHANNA experience when they work with the Web for both
he last time Microsoft did something from personal and business applications.
believe that .Net is
going to change the
face of computing,
get a certification in
T ‘scratch’ was in 1990 when it launched a new
‘ghost’ operating system which, unlike its
predecessors (the DOS family), could be
operated by a device called the ‘mouse’. This ghost
OS was Windows 3.0. Since then, Microsoft has
The story so far
Necessity is the mother of invention, and so it
is in this case. .Net is an invention that was
fuelled by the idea of making distributed com-
just been improving (still improving!) its OS by puting the next ‘Giant Leap in Technology’ after
this platform and join adding more features to make it more user- the Internet.
friendly. In the distributed computing model, compo-
the revolution Finally, 11 years later, Microsoft has launched nents and objects belonging to one application
.Net, which, if all goes well, is going to change the can be located on different computers as long as
way computer users go about their work. Simply they are connected via LAN or over the Internet.
put, .Net is a new operating system platform that For example, a spreadsheet application could
aims to take users to the next generation of the have the Main Editor on one computer in India,
Internet. It plans to do so by conquering the defi- an Organisational Chart Object on a second
ciencies of the first generation, which is the pres- computer in the US and a Standard Deviation
ent-day Net, and by giving users a more enriched Object on a third machine in England. Sure, that ➜

44 June 2001
■ connect~ passport

sounds cool. Wait, there’s more. Some distrib- known as MCSE, is a networking course where-
uted computing systems would be such that each in a student is imparted training on installing,
What is available? of these three computers could actually be run- configuring and administering the Windows
Following are the courses ning a different operating system! 2000 operating system.
that have been released by To put it in a nutshell, .Net plans to erase the On the other hand, the Microsoft Certified
Microsoft to its training part- boundaries that exist between applications and Solutions Developer or MSCD is a program-
ners across the world. the Internet. Instead of interacting with an ming course and deals with developing cus-
Course 1905: Building XML- application or a single Web site, .Net will con- tomised software and solutions for the business
based Web Applications nect the user to an array of computers and or SoHo community. For example, after com-
Description: Training on services that will exchange and combine objects pleting the MCSD course one could use MS SQL
how to structure and vali- and data. or Visual Studio to develop inventory control
date data in a document by software for, say, a large production house. After
using document type defini- Big deal! What do I get out of it? this certification the student can also administer
tions (DTDs). Thanks to the unpredictable ‘blue screens’ and and manage databases with the SQL knowledge
Course 1913: Exchanging a million other shortcomings that have been an that he/she has acquired.
and Transforming Data integral part of all its software products, .Net is also a programming course and to a
Using XML and XSLT Microsoft has always been criticised. But still, certain extent can be called the successor to
Description: Techniques for Microsoft products are the obvious choice for MCSD. Till now Microsoft has not announced a
exchanging and transform- new computer users. In fact, most home, SoHo replacement for the current MCSD track. How-
ing data using XML and and even enterprise users don’t know of any OS ever, it might do so in the future. So the best bet
XSLT. Best practices for using other than Windows. Even today, it’s virtually for someone who is interested in getting a pro-
XML and XSLT by giving impossible for most people to name a word gramming-based certification is to go in for .Net
compelling examples of the processor other than MS Word. So, in .Net’s rather than MCSD.
best ways to solve real- The reason for this is
world problems. quite simple: if and when
Microsoft disbands MCSD,
the demand for MCSD pro-
The demand for .Net fessionals is going to
professionals is going to increase decline. In such a scenario,
by leaps and bounds once most MCSD professionals
Microsoft releases the first .Net- will end up spending huge
based operating system amounts of money and,
Jitendra Nair more importantly, time to
Karrox Technologies upgrade their skills to the
.Net platform.

case as well, Tools of the trade


people are likely As with most certification programmes, there is
to accept it with no fixed minimum requirement that has been
open arms. laid down for the .Net certification. According
According to to Jitendra Nair, vice president (Software Edu-
Nua Internet cation Division) of Karrox Technologies,
Surveys, by the end of last year, the number of “Though Microsoft hasn’t defined any fixed
people connected to the Internet was 407.1 criteria for .Net exams, we at Karrox believe
million. To develop software that is stored that at the very least the student should be a
online for so large a community, a massive graduate as it becomes easier for him or her to
number of programmers would be required— comprehend the technology that is being
something that Microsoft knows it cannot imparted.”
handle by itself. Therefore, it has introduced a This isn’t all. The .Net platform will be used
certification programme to enable people to develop Web-enabled e-commerce and
other than its own employees to use its source m-commerce applications, which will incorpo-
code to develop applications for .Net. Once rate XML as an industry standard interface for
you complete this certification, you will exchanging information. So the minimum
become a certified professional in this requirement for taking the exam would be to
platform. acquire a thorough knowledge of XML and also
of WinForms, C#, ADO.NET and ASP.NET.
So is MCSE/MCSD Dead? It is also recommended that you have knowl-
No it isn’t. Microsoft has broadly bifurcated its edge about software servers that facilitate
training and certification into networking, creation of distributed and scalable applications.
applications and development. The Microsoft These include BizTalk Server (for B2B
Certified Systems Engineer course, popularly applications), Commerce Server 2000 (for B2C

46 June 2001
applications), IIS 5.0 Web Server, Exchange 2000 up. Nair adds, “The initial intent is there. Com-
(messaging server), SQL 2000 (database panies are ready to absorb .Net professionals. Try it out!
server), etc. The demand is going to increase by leaps and
bounds once Microsoft releases the first .Net- Here is a glossary of some
The Facilitators based operating system, which it should by the of the technical terms
Going by the requirements, you are probably end of 2001.” C#: Pronounced as ‘C
getting a fair idea of the scope and vastness of Employment avenues aside, another issue of sharp’, this is a simple,
the .Net platform. But don’t think that this is concern is the remuneration that will be object-oriented, and type-
something you can’t do on your own. You can. offered. This is because we Indians have this safe programming language.
The only things required are dedication and a really bad habit of going and doing the same C# is firmly planted in the C
lot of hard work. Once you think you are ready, course that our neighbour did. As a result of and C++ family tree of lan-
you can walk up to the nearest Microsoft Pro- this, 1,000 job seekers might line up for 50 guages. C# aims to combine
metric Institute one fine day and crack the exam. vacancies. Because of this excess supply in rela- the high productivity of Visu-
In case you think you can’t, there are people tion to demand, those who finally do get the al Basic and the raw power
and institutes that can help you. In India, jobs will end up working for half to one-fourth of C++.
Microsoft has tied up with various institutes to of what a .Net professional would get in the US. ASP.NET: A revolutionary
provide training to people who are interested in This has happened in the past with jobs relat- new programming frame-
.Net certification. One such institute is Karrox ed to MCSE/MCSD, Java certification, etc, and work that enables the rapid
Technologies. It is offering .Net as part of a com- it just might happen again. development of powerful
prehensive modular career program called In any case, if your basic programming con- Web applications and servic-
K-Map that spans four semesters. Karrox is not cepts are clear, then you should be able to decide es. Part of the emerging
the only one. NIIT and APTECH are also offer- whether or not .Net certification is the thing Microsoft .Net platform, it
ing .Net certification courses. for you. provides the easiest and
Visit www.microsoft.com/downloads and download most scalable way to build,
That’s it then the software (if you have lots of bandwidth, that deploy and run distributed
Now comes the all-important question—what is) along with the documentation. Play around Web applications that can
about job prospects? .Net is still in its nascent with the software and let that help you make up target any browser or
stage in India. Still, one thing is certain. Sooner your mind about whether or not to go in for the device.
rather than later, the demand is going to build .Net certification.

1/2 Page H. AD

47
■ connect~ wideangle

On my wavelength… sn’t it strange that satellites that were developed for spying and
Graphic images of impending storms,
instant reporting of events from
remote corners of the world, receiving
I other defence needs during the Cold War are now affecting our
daily lives? So much so that we don’t leave our house for a trip
to the nearest hill station before seeing the latest weather report
beamed down to us by our ‘friend from up above’—the INSAT IIB
satellite.
quality radio broadcast even when you
are on the move…welcome to the When disaster strikes
Jan 2001: Devastating earthquake rocks Gujarat
world of satellites Predicting earthquakes is an extremely complex task due to
the challenges involved in tracking the minute shifting of the
earth’s tectonic plates, which collide to cause earthquakes. These
measurements are difficult to record because the plates move just
a few millimetres every year.
Seismologists at the California Institute of Technology and the
Japanese Geographical Survey Institute (GSI) are now hoping to
use Global Positioning Systems (GPS) to accurately predict an
earthquake a few hours before it actually strikes, thus preventing
the loss of thousands of lives.
Solar-powered receivers and antennas are placed in quake-
prone regions. They transmit their positions through signals,
which are sent out every 30 seconds or so, to two or more satel-
lites in orbit. Researchers and scientists use the results to try and
predict when the stress building between plates is likely to culmi-
nate into an earthquake in a particular region.

GPS locks into air traffic


November 1996: Midair collision over India. Over 300 feared dead
The exponential growth in the sheer volume of air traffic over
the last decade has led to a number of new challenges for the exist-
ing air traffic control infrastructure. Managing the progress of
each individual aircraft is currently done by tracking them using
a combination of high-frequency radio and radar networks.
Boeing has put forward an audacious plan that proposes to
replace radar with GPS-based satellite tracking. GPS receivers can
pinpoint their location with a great degree of precision by trian-
gulating signals from any of the 24 NAVSTAR satellites that orbit
the earth. This really precise information can then theoretically be
used to reduce the separation between aircraft and plan more
direct routes to a destination.
Plans include using a constellation of 16 satellites in a 12-hour
medium earth orbit (MEO) at the same altitude as the NAVSTAR
GPS satellite system. Such a large network would help ensure that
any airplane or air traffic control terminal is within the view of at
least two satellites, so that in the event of a satellite failure, an adja-
Illustrations: Mahesh Benkar cent satellite can ensure seamless service.

48 June 2001
The US-based FAA and cargo airlines such as take off—like the Iridium telephone communi-
UPS and FedEx are already testing the feasibili- cations network.
ty of GPS-based alternatives, which can help One new service that has begun to take off all
increase safety and efficiencies in controlling air- over the world is satellite radio. Radio has been
craft arrivals and departures. Using new digital an extremely popular medium since before
tools, pilots would be able to get precise infor- World War II. Even in the age of television and
mation from their cockpit displays about their the Internet, radio continues to be popular
position, the positions of other planes and maps amongst a wide range of audiences. Traditional-
of a particular airport and its runways. This ly, the problem areas for radio have been the
would be enabled by a combination of satellite quality and range of the broadcast. Despite the
positioning technology and digital datalinks popularity of thousands of stations that have
between aircraft. adopted the Internet as a medium for streaming
If Boeing and the others can convince the scep- music to listeners all over the world, these issues
tics that this system has to be adopted, it will have not been resolved completely.
become necessary for each and every one of the Satellite radio promises to deliver a solution
world’s 14,000-plus commercial jets, military and to both of these problems. It is probably the first
private aircraft to have a costly receiver installed. significant advancement in radio since the
The likelihood of this happening in the immedi- arrival of FM more than 30 years ago. It offers
ate future seems remote, but over the long run listeners access to their favourite programmes
satellites may be the only way to enable aircraft to while on the move, when they are out of range
fly more safely, ease congestion, and prevent flight of conventional radio stations. Picture this: stat-
delays that seem to be an everyday occurrence. ic free CD quality music from your favorite sta-
tion, beamed to you in your car, home, or
The new radio personal stereo—anywhere in the world. This
Most of the applications for satellites have tradi- is going to be possible because digital technol-
tionally been centred around communication, ogy is actually being incorporated into the radio
whether you consider the extremely successful receiver set itself.
services for consumers like television broadcast- Sirrus, XM Radio and Worldcast are the pio-
WorldSpace
ing, moderately successful ones like satellite- neers that are looking to bring satellite radio to becoming a Radio
based Internet access, or ones that just did not consumers all over the world. All of them will Star?
probably use proprietary chipsets in their
receivers that will allow them to decipher the In India, US-based broad-
encrypted broadcast signal. The signal itself will caster, WorldSpace, first test-
be transmitted via a network of two or three launched its radio services
satellites and several ground-based repeating in Bangalore in September
stations. 2000. The company claims
These services are targeted primarily at car that the response has been
radio listeners, who will have access to a large quite positive. WorldSpace is
selection of channels. The receivers are already offering several models of
being offered by car manufacturers in the US, satellite radio receivers,
including Ford, BMW and DiamlerChrysler, as ranging from Rs 4,400 to
options on their newer models. Users will have to Rs 9,990.
pay a monthly subscription charge for the service, They have signed up
which will include many commercial-free chan- with Radio Mid-Day and
nels. However, several of the larger manufacturers AIR, in addition to other
of consumer electronics like Hitachi, Panasonic popular international broad-
and JVC have introduced digital receivers for the casters. WorldSpace also
home device markets. creates some original pro-
grammes, including modern
Future scope rock and contemporary pop
Although a large number of people are already hits as well as broadcasts
Car Watcher dependent on satellites, mostly for communica- for children and adults.
Beware, all car thieves! tion, these ‘eyes in the sky’ are now going to make Music, education and
US-based Seaguard Electronics and Direct- an impact on our everyday lives in a more sig- entertainment programmes
ed Electronics have developed Valet Car Com nificant manner. What kind of help will these in a multitude of languages
II, a system designed to provide a Web- satellites render unto humankind in the future? that include English, Hindi,
enabled theft tracking system that can be Even Nostradamus would have been hard- Tamil and Telugu are
accessed from any PC connected to the Inter- pressed to answer this question. But what is cer- beamed by the AsiaStar
net. So if your Maruti gets stolen, just use this tain is that we shall continue to become satellite to subscribers
cyber ‘valet’ to track down the missing car. increasingly dependent on these sentinels that across Asia.
orbit our planet.

49
■ connect~ netreturn

Photograph: Jiten Gandhi, Imaging: Solomon Lewis


E-MAIL, DESI ISHTYLE !
Epatra.com
Regional language ANIL PATRICK R.
ired of hearing your grandma complaining Epatra is one of the best Indian sites offering
e-mail and chat are
here to enhance your
Internet experience.
T about how difficult it is for her to read your
angrezi e-mail? Don’t fret, for help is at
hand in the form of various
sites offering e-mail in regional languages. Yes,
you can now send e-mail in Indian languages
regional language e-mail services. It currently has
11 regional languages on its menu—Hindi,
Marathi, Gujarati, Punjabi, Malayalam, Assamese,
Bengali, Tamil, Telugu, Kannada, and Oriya.
Registration is easy, after which you can start
So log on and reach like Hindi, Marathi, Gujarathi, Bengali, firing e-mail in any (or all) of the 11 languages.
out…language is no Malayalam, etc. Epatra also has features like chat in regional lan-
Check out what technology has in store for guages, kamna cards, discussion forums, news,
bar! people who are more comfortable communi- etc (see box: ‘Get that Epatra Going’). To help you
cating in their mother tongue. compose your message in the regional language,
epatra has a typing assistant that shows you the
Regional language e-mail sites correct combination of English characters to get
Some of the major Indian sites offering these the regional language character.
facilities are www.epatra.com, www.mailjol.com, www.red-
iff.com, www.mail.sify.com, www.jagran .com, etc. Mailjol.com
A US-based site, www.langoo.com, offers e-mail Mailjol is similar to epatra and also features 11
in Indian as well as several international languages. It is easy for even a novice to figure
languages. All these sites offer Hindi and out the interface. Download and install the
some even offer up to 12 or more regional software component, and you are ready to go.
languages. The main difference in features between
Bookmarks on These sites make use of a technique called mailjol and epatra is that in mailjol, you just
transliteration for conversion of English char- have to click on regional language characters
sites dedicated to Indian art
Check out
acters to regional language fonts (see box: from a table for them to appear in the message.
‘Transliteration’, for more details on how it It also features a typing assistant similar to the
Playware works). one on epatra. ➜

50 June 2001
■ connect~ netreturn

Jagran—Hindi special
In case you need to send only Hindi e-mail,
Transliteration check out this site. www.jagran.com offers the option
The easiest way to write a of sending mail only in English or Hindi. Regis-
message in a regional lan- tration is simple. The page will look unreadable
guage is to type out the when you log on for the first time, but this is rec-
words using the Engish tified after you download the required fonts by
alphabet. For example, Aap selecting the option, Download Hindi Font, and
kaise hain? (How are you?). then installing it.
Sites that offer the facility of One option for sending e-mail in Hindi using
sending e-mail in regional Jagran is the Phonetic Style, which is the same as
languages will then convert transliteration and allows you to type the letter
this message into the ver- in Hindi using English equivalents. You could
nacular script. check the Show/Hide keyboard option when
This process of convert- you’re composing a Hindi e-mail. This brings up
ing characters from one par- a Hindi keyboard below the mail being com- Langoo.com: view it in the language you want
ticular script to another is posed. Positioning the cursor on each alphabet
called transliteration. In our will give you the English equivalent of the Hindi native language (provided, of course, it’s sup-
case, it would be the con- alphabet. Above the Hindi keyboard is a dynam- ported by the site). In fact, the whole site can be
version of the English (also ic guide showing the different Hindi equivalents viewed in your native language instead of in
known as Roman or Latin) based on the first alphabet you type. English.
script to Hindi or Telugu or The best part about Langoo is that it does not
another regional language Langoo.com—a global view require you to install any new fonts, and using it
script, and vice versa. It If you’re looking for something more than just is child’s play. The language can be changed at
should be clearly under- an Indian language e-mail site, you must visit your whim. Hindi, Punjabi, Tamil, Farsi, Gujarati
stood that transliteration is www.langoo.com. This US-based site offers an and Urdu are the Indian languages currently
not the same as translation. impressive array of Indian and foreign lan- available on Langoo. A help list on English char-
In transliteration, only the guages. In addition to Indian languages such as acter equivalents for the regional language char-
characters are converted to Hindi, Tamil, etc, langoo.com also features Chi- acters is available under the text box where you
another script. There is a nese, French, Arabic, Russian, Greek and a whole type in your message. This is a very useful feature
strong possibility that factors host of other languages. This is one of the best when compared to epatra and rediff, where the
such as pronunciation, sites for sending regional language messages and alphabet usage lists appear only when you type in
meanings, accents, etc., the options offered are sure to make you linger the first alphabet.
would change if translitera- on at the site to check them all out. So what are you waiting for? Select your lan-
tion methods are not prop- You can even chat and send e-cards in your guage, register, and start Langooing.
erly designed and used.
A transliteration can
either be applied to a string Get that Epatra Going
of text in one go, or can be
used incrementally for a typ- Click on the Sign Up link on the home page to Select the
ing and buffered output. For get the registration form. language in
example, let’s consider that Fill in the form and click the ‘Register me’ but- which you want
you want to have the word ton at the bottom of the page. This takes you to to write your e-
‘Hello’ transliterated to the next page along with a prompt, asking if mail. Click Go,
Hindi. For the Hindi equiva- you want to download and install HlInstall.exe.
lent, you may have to type Click on the ‘Run program from current loca-
in ‘Helau’. This is the string tion’ option and press OK. The font will be auto- and start typing
of characters that gives the matically installed on your system. your mail.
Hindi script equivalent of Now go As you type the
Hello after transliteration. to the bot- first letter of an
Different transliteration tom of the alphabet, a help
schemes have different Web page table pops up,
string combinations. and log on
Most transliteration using your showing the cor-
schemes work reasonably password. rect combination
well with Hindi, but are not This takes of English charac-
as efficient with other you to the ters required to
regional languages. Inbox. Select the Compose option on the left- get the desired
hand side of the page to start composing your regional language
e-mail. character.

52 June 2001
Downloading and Installing Fonts
Except for langoo.com, most sites that employ transliteration New Font.
require special fonts to be installed on the PC for proper font dis- In Add Fonts, select the
play. These fonts have to be downloaded from the site. The directory into which you
process of installing these fonts is simple enough, but it can be unzipped the font, and select
quite a pain on a dial-up connection. the font name. Click OK, and
To install the fonts, browse through these
steps after you have downloaded the font.
Many of the fonts will be in zipped format. the font will be installed on
Unzip the fonts, using an unzipping utility like your PC.
WinZip 8.0, to a particular In most cases, the fonts
directory. may not be clear or may not
Now go to Start > Settings > be displayed properly. Well,
Control Panel, and select Fonts. the only solution to this is to
Click File, and select Install install them again.

Problems that may crop up their e-mail, which enables the recipients of
Most of the problems that may crop up when these mail to download the fonts directly from
using regional e-mail services are related to the the site. And do read the FAQ section of the site
fonts. At times, the fonts may not be clear or may as it will provide you information on rectifying
not be displayed properly. In such cases, try the problems that you will encounter.
installing the fonts again (see box: Downloading So now you can make your e-mail as person-
and installing fonts). Problems may also arise at al as you would a handwritten letter in your
the receiver’s end. He/she will not be able to view mother tongue. And no more worries about
the e-mail properly if the required fonts are not postal or courier delays either. Reach out and say
loaded. Most of the services include a link on what you feel—anytime you feel like it!

1/2 page H. AD

53
■ connect~ firsthand

Photograph: Mexy Xavier Imaging: Ram

WELCOME TO MY HOME
Build it exactly the RINKI BANERJI ical, and can become a rather interesting endeav-
hat a wonderful home you have!”You our. On your personal Web page, you can upload

“W
way you’ve always
wanted to and watch
the world admire
your dream work.
hear these words and beam with
pride. Ever wondered about having
another home that could make you as
proud? Your very own Web site can have its
doors open 24 hours a day to visitors from all
photographs of yourself and your loved ones. Tell
the world what an interesting and eventful life you
lead, by maintaining a personal diary that folks
from across the world can peek into around the
clock. Professional sites, on the other hand, are
over the globe. centred on a business proposition. As Atul Garg,
We’re talking about an MBBS student who has built his own site
Make it your dream home… (w w w.atulrg.com) says, “Personal Web sites help
constructing your Once you have decided what your site is going to you gain an identity on the Internet, while profes-
own Web site be about, whether it will be a professional Web site sional sites help you make money.” Irrespective of
or a personal Web page, you might be fretting the purpose of your site, there are certain elemen-
about the labour and expense it might entail. tary issues that you will have to deal with when
Think again! It’s actually simple, usually econom- you go about building your very own Web site. ➜

56 June 2001
■ connect~ firsthand

Set Your Sights on Them


Domain suppliers www.register.com you’ll get it as www.geocities.
www.Directi.com Offers domain name registration online for com/myname. Geocities assists you
Offers domains for Rs 575. The site is also prices ranging from $35 to $299. through the entire process, right from cre-
credited with having a standardised http://domain.ncst.ernet.in ating your title and page designs (with
process for domain registration. For registering India-specific domain page builders and page wizards) to
www.Vsplash.com names ending with .co.in uploading your site through a file manager.
This domain name provider facilitates International domain name registrars www.tripod.com
domain registration at prices ranging from w w w.domain-supplier.com, w w w.domain- Tripod provides 50 MB of free space and
Rs 399 to Rs 599. namesco.com, w w w.webdeveloper.com, has introduced new multimedia add-ons
www.Net4domains.com w w w.netcolony.com, to enhance the interactivity of your site.
Offers domains for Rs 525. The site also w w w.getyourdomain.com www.homestead.com
provides banner exchanges, business serv- Site builders This is a very user-friendly site builder with
ices, hosting, corporate mailing, etc. www.geocities.com easy tools and a site building software that
www.123domainregistry.com Log on and surf through the instructions can be downloaded and used for design-
Offers real-time domain registration servic- for building your dream Web site. If you ing your Web pages and then uploading
es for Rs 425 with 5 MB of free Web space. seek a domain name from geocities.com, them.

Location, location, location! make your choice—some of these free Web space
On the Internet your Web site address becomes providers can be quite unreliable and a lot of
your identity. You can choose to use the URL them have shut down services recently. You
(Universal Resource Locator) provided to you by might end up staring at a blank page instead of
your Web host, which might go like www.servi- your dream cyber abode.
ceprovider.com/yourname. But if you are look- “The netfirms subdomain account of one of
ing for a unique identity then your first move my friends got permanently deleted when he did
should be to register your own domain name. not access it for nearly two months because he
There are several sites that offer these servic- had other urgent matters to attend to,” says
es, allowing you to register either online with an Anup.
international credit card or via a longer paper- Also, the free Web hosts might not be able to
driven application process which allows you to provide you with some of the features that are
pay by cheque or demand draft. important for your site.“I purchased the domain
You would have to cough up anywhere name from net4domains.com and secured 25
between Rs 500 and Rs 1,000 to get your domain MB of free Web space. However, they do not
name registered. You need to first make sure that offer e-mail forwarding services for subdomain
the name you have in mind has not already been accounts and all mail needs to be forwarded to
taken. Most of these sites (like w w w.register.com) another e-mail address belonging to me. Besides,
provide a search facility that helps you to settle you can’t upload any file bigger than 1 MB,
on a unique name for your cyber abode. Simply which is a problem for me,” says Anup.
hook on to the site and enter the domain name If you don’t want to avail of free Web space
you want in the search box to check if it is because of the uncertainties and the strings
available. attached, you can buy server space from an Inter-
“When we were looking to register our net Service Provider. Net4domains has packages
domain, we found a plethora of tempting offers ranging from Rs 850 for a 2 MB student account
from various sites. We finally zeroed in on for one year to an economy pack which costs
net4domains, which registered our domain Rs 5,500 for 15 MB annually. Hosting on a serv-
name for Rs 575 for a period of two years,” says er located in another country (mostly the US and
Anup Nair, who owns an e-consultancy site. Canada) can cost less and is usually a more reli-
able solution due to the higher bandwidth avail-
Where do I host it? ability in those countries.
Once you’ve decided on your domain name you
need to look for a place to host your site. This Looking for an architect?
means getting hard disk space on a computer Now that you’ve got a name and place for
that is always connected to the Internet. your site, you can either outsource the entire
There are a plethora of sites such as geoci- development process to a pro-
ties.com and homestead.com offering free Web fessional Web developer
space to users. These offer anything between 25 or employ your musty
and 50 MB of free space. But you would do well gray cells to read up on
to consult your friends and colleagues before you the basics and then ➜

58 June 2001
■ connect~ firsthand

build your own site. Professionals could charge


Working with up to Rs 50,000 to design a fairly comprehensive
site. This usually includes the cost of the design-
FrontPage ing and programming involved.
Microsoft FrontPage is a If you decide to do this all by yourself then
Web designing software that creating your own Web site will entail a major
offers a WYSIWYG (what- investment of your time, energy and patience.
you-see-is-what-you-get) A lot of the free Web hosting services offer
effect. Start with a new file you Web-based wizards that can help you build
from File > New. Give an your site. All the options for page designing,
attractive heading, say, ‘Wel- hosting, and uploading are available through
come to my Web Abode’. simple clicks. If you have created your own Flash
Select the text and right- or JPEG files, you can add your own look to the
click to set the theme for standard design templates available on the sites
the page. Select from vari- of these free Web space providers.
ous effects such as banners, Doing this all by yourself would involve
artsy, blends, blueprint learning how to use a host of designing applica-
effects, etc. The Modify but- tions such as Macromedia Dreamweaver,
ton allows you to change Microsoft Frontpage, Adobe Photoshop, Macro-
the graphics, colours and media Fireworks, Adobe Imageready and Macro- “Designing is not just about using sophisti-
text. Next, list the topics you media Flash. Most of these applications can take cated applications—you have to use them the
wish to cover about your a while for newcomers to get a hang of. right way and for a genuine purpose. The site
business, say, company his- Be careful that you don’t go overboard with should have the right ‘look and feel’ to be able to
tory, achievements, mission those fancy images or you may end up with a page hold the visitor’s attention,” says Sunando Baner-
statement, sister concerns, that downloads at a snail’s pace. You need to con- ji, who works at Netguru.com.
company news, and services sider the space your site would occupy and the
offered. You can create links size of each page. You can optimise your graphics Launch pad
for every topic by selecting it images by using the ‘Save for Web’ option in most Now that your Web site is ready, you need to
and right-clicking for the imaging software. The GIF and JPEG formats are upload it onto the World Wide Web. For free
hyperlink option. All you most popular for simple graphics on the Web. Web site providers such as Geocities.com and
need to do is enter the Ensure that the images and the content are freeservers.com, you can simply upload the files
name of the file for the link appropriately designed for your site.“I had to work using their Web-based file manager. It allows you
to the page where the a lot on the logo for my site. In fact, it took me a to browse for the files on your hard disk that can
details are provided. whole week to get that formal look that is so cru- then be uploaded to the server by clicking a sin-
Using tables helps to cial for a business-oriented Web site,” says Anup. gle button.
organise the elements on A more efficient solution could be using one
your Web page and facili- of the numerous FTP clients that allow you to
tates downloads. Just Using CuteFTP transfer files via a Windows Explorer-like inter-
choose the Table > Insert face. In fact, Windows 98 allows you to use
Table option from the menu The entire process involves typing in your Explorer to transfer files via FTP.
bar. Enter the number of host name (ftp.yourhostname.com), user ID However, a dedicated FTP client would offer
rows and columns for your and password with the host where your Web you a lot of features such as the resume function
table. The Insert menu offers site resides, and then dragging the index.html that can be quite useful. CuteFTP is one of the
plenty of options such as (main page) and all other relevant files and simplest and most popular applications for
components (hit-counters, folders from your local disk to your space on uploading files onto the Net but others like FTP-
hover button, marquee, ban- the server. After you have all the relevant files pro and WS_FTP are quite proficient too. “FTP-
ner-ad manager, scheduled ready to be uploaded, you simply have to pro is a very user-friendly and reliable FTP client
pictures, etc), forms (check- click on the option indicated by an up-arrow and I have been using it for quite a long time
boxes, text fields, radio but- sign to transfer your files from your local disk now,” offers Sunando.
tons, scrolling text box, to your server on the Web.
drop-down menu, etc), and Spreading the word
advanced features such as Once your site is up and running, you will
plugins, ActiveX controls, probably want to publicise it by registering your
Java applets, etc. It is easy to domain name with the more popular search
embed Flash files in your engines such as yahoo.com, altavista.com,
document. Create your .swf google.com, webcrawler.com, lycos.com, and
and .html files and then infoseek.com. You can submit your site to these
copy and paste both the files search engines for free. Log on to
in the page field of your w w w.searchengines.com/urlsubmission.html for
html editor. more information about search engines on the
Net. The other option is to use software such as

60 June 2001
The Right Ingredients
You can enhance your site with interactive features. Links such
as ‘Contact Us’, ‘About Us’, ‘Disclaimer’, etc, give the user a gener-
al idea of your Web site and can induce him to either surf
through it or out of it.
The ‘Contact Us’ link should include your official e-mail
addresses where the user can post his queries and complaints,
and offer feedback on your content, products or services. Never
display your postal address on your site—it can be misused.
The ‘About Us’ link should offer company details and a brief
description of what your Web site offers.
The ‘Disclaimer’ notice is a legal document that limits your
responsibility for the content, products or services offered
through the site.

Submitta, which allows you to save time by submitting your site to


a number of different search engines.
Other ways of increasing traffic to your Web site could include a
co-branding arrangement with other popular sites, advertising in
popular chat rooms that will provide links to your site, or just simply
1/2 page
Ver Ad
e-mailing your Net buddies to check out your site. You can also use
services such as SmartClicks (w w w.smartage.com) that allow you to
exchange banners with other members of a huge network.

What else can I add to the site?


Other than the basic Web pages that make up your site, there are sev-
eral other elements that you can include to make it more interesting.
Add a free search engine (using metatags) or maybe a chat room or
message board (look at the ones offered by w w w.beseen.com) that
provides people a forum to interact. Another important feature that
you would want to add is a Web counter that would help you track
the popularity of your Web site. Most of the Web hosting services
offer basic counters and search features as free features.

Keeping it ship-shape
Just remember that Web site maintenance is a very essential chore.
After all, you don’t let your brick-and-mortar home run to seed.Your
cyber abode will require some looking-after as well. Be prompt when
it comes to maintaining your Web site.
The more complex your site gets, the more difficult it will be to
maintain it. You need to be diligent and resourceful to tackle those
frustrating times when your ISP fails you, when you have problems
using your FTP client, or (God forbid!) the server crashes. Updat-
ing your site on a regular basis and maintaining consistency in your
content are the surest ways to attract visitors and keep them hooked
to your site.

Put out the welcome mat


Well, as you can see, making Web sites is not really a big deal. As
long as you are clear about certain key issues such as whether to go
in for a free domain or buy it from free domain name providers;
the kind of facilities you want your site to have; how you want to
promote your site to increase traffic, etc.
So get a head start with this new exciting venture. And get ready
for the muhurat of your very own cyber home.

Have insights to share on creating your own Web site?


Write all about it to readersletters@jasubhai.com

61
ALISAGAR PARDAWALA which means the program as well as its source
hat if someone were to give you a magic code are obtainable for free.

W wand and say, “Wave this wand three


times over any computer in the world and
it will magically turn into the PC you have
at home.” Well, no such wand exists. But if you
are really in need, there is a substitute—in the
The software is extremely easy to install and
use. There are two components in the package:
WinVNC is the software that has to be set up on
the remote machine and VNCviewer is the soft-
ware that is used on the local machine.
form of PC-controlling programs and services. VNC’s performance is excellent. It runs quite
The aim of a PC controlling suite or service smoothly even from a dial-up connection and
is to allow a person sitting at one machine (the makes it extremely easy to make and break con-
local machine) to access another machine nections. So you can start a task, terminate the
somewhere else (the remote machine). Once connection, and then come back later to check
connected, the mouse and keyboard of the local if the task is complete.
machine can be used to control the desktop,
applications, services and configuration of the
remote machine.
Imagine how useful this can be if you want a
technician to solve your computer problems
Two Web-based without having to pay you a visit, or if you’re
abroad and need to access files lying in your PC Use the VNCviewer to connect to the remote
applications, at home or at the office. machine
GoToMyPC and VNC, Virtual Network Computing (VNC) VNC is quite good for accessing a machine
let you control your AT&T’s VNC is one of the most popular PC- over a LAN, but you can also use it to access
controlling software around, and that is not nec- machines over the Internet. To do this, you
PC from any other essarily because it’s free. It is completely would have to know the unique static IP address
computer that is platform-independent, so while the local of the machine you wish to access. Good points
machine runs on Windows, the remote machine apart, VNC is not perfect. It does not have the
linked to the Net can have a different architecture, say Unix. VNC facility to directly transfer files between the
is available under the GNU Public License, remote machine and the local machine.

Control kar, yaar!


Setting up WinVNC
Step 1: Download the package from
www.uk.research. att.com/vnc/download.html. Run the
Setup program to install WinVNC on the
remote machine. When you run WinVNC for
the first time, you will be asked to set a pass-
word. The program will then run as an appli-
cation in the system tray. The machine is now
ready to accept connections.

Step 2: Copy the VNCviewer program on to the


local machine and run it as an application. You
will be prompted for the host name. If you are
not on the LAN, you will have to enter the
unique IP address of that machine. Click OK,
and you will be prompted for the password
you set.
Voila! A window opens, showing the con-
tents of the remote machine. The remote
machine will now respond to the local
machine’s mouse and keyboard.
Photographs: Rahul Sharma Imaging: Ram

62 June 2001
Vital Stats Should I go in for
GoToMyPc GoToMyPC?
Price: $19.95 per month
Web site: www.gotomypc.com This, of course, depends on
Download size: 1.35 MB for the server, 200 the kind of use you would
KB for the viewer have for a service like this and
Platforms: Windows 9x/NT/2000 whether you are willing to pay
for it. There are lots of useful
Virtual Network Computing things that GoToMyPC allows
Price: Free you to do. The draw mode
Web site:
GoToMyPC with the MacOS desktop lets you draw anything on the
www.uk.research.att.com/vnc/download.html
remote machine’s desktop
Download size: 978 Kb
Platforms: Windows 9x/NT/2000, Linux, Unix, Expertcity had originally started GoToMyPC with the mouse. The in-built
Sun Solaris to help out its technical support team, so that it chat applet lets users talk.
could remotely help customers with their prob- These could be immensely
lems, without having to go on-site. But then, real- useful to technicians in high-
Accessing VNC using a Java-enabled browser ising its potential, it made GoToMyPC a public lighting areas of the screen
As an alternative to using the VNCviewer, you service for anyone who wanted to connect to his and indicating things to the
can also access the remote PC from any stand- or her PC from anywhere. Until May this year, customer without being physi-
alone Web browser that supports Java, like Inter- Expertcity was offering the free beta version of cally present.
net Explorer. All that’s needed is the machine GoToMyPC. But now the company has decided A unique feature is the
name/IP address and the port (by default, this is to charge a monthly fee of $19.95 for a single user. support for two-way file
set at 5800). transfers. GoToMyPC does
Set it up now not use the conventional
GoToMyPC Step 1: Log on to gotomypc.com. Register to set method of transferring cap-
Expertcity’s GoToMyPC allows you to control up your account. You will need to give your cred- tured video from the remote
your PC from a remote location anywhere in the it card information after which the GoToMyPC machine to the local
world, as long as you have an Internet connec- software will be downloaded and will assign the machine. Actually, it uses a
tion and a Web browser. What sets GoToMyPC remote PC an access code, user name and pass- compression algorithm that
apart from other PC-controlling software is that word, which is chosen by you. efficiently transfers data.
it is a service instead of a specific software. One of the biggest disad-
The best part of this Web-based service is that, Step 2: From the local machine, log on to goto- vantages of GoToMyPC is
unlike with most other services, you do not need mypc.com. Hit the connect button next to the that it is dependent on the
a permanent IP address for the computer you nickname of the remote machine. A tiny 200-KB speed of your Net connec-
wish to have control over. Simply register with the plugin will be downloaded automatically. This tion. Even at 56 Kbps, there
service and download a very small client program plugin lets you connect via your Web browser can be up to a 30-40 second
that rests in your system tray. Since a static IP to the remote machine on which the GoToMyPC lag between the two
address is not required to use this service, it software has been installed. machines. Also, it only sup-
is ideal for people who need to access The remote machine will ports the Windows platform,
their PC but don’t know the technical respond to the local though plans are underway
properties of the network to which machine’s monitor, key- to release a cross-platform
it is connected. board and mouse. version.
Another consideration is
security. Even though it pro-
vides 128-bit encryption, it is
not as secure as software
such as Symantec’s
pcAnywhere. So companies
that have highly sensitive
data might not want to go in
for this service.
On the other hand, it is a
boon for people who have
round-the-clock access to
the Net at their workplace
and need to access their
machines regularly from
home or while they’re on the
move.

63
■ resolve~ unwired

Everyone’s getting on ANIL PATRICK R. would you rather use your trusted instant mes-
f ‘expensive teeny-weeny messages that yup- senger (IM)? Both these services have their pros
to the SMS
bandwagon—here’s
how you can join in
the fun!
I pies send back and forth on their mobiles’ is
what you think SMS (Short Message Service)
refers to, then you’re only partly correct. You
can easily send an SMS text message to your
friend’s mobile even if you don’t have one. And
and cons. Web sites offer features such as track-
ing whether or not your SMS has been delivered.
However, there is always the risk of your cell
phone number being marketed. IMs are gener-
ally more secure when it comes to this aspect.
the story doesn’t end with text messages on However, most of them do not have tracking
mobiles! features—you have to rely on providence with
most IMs.
Getting on the SMS highway
Get the basic information on the required tools. SMS via e-mail
For this, check out the box, ‘SMS Funda Pack’. Nowadays, most cellular operators allow e-mail
Okay, now that you have the basics right, you can messages to be sent to users. The usual e-mail
choose how you want to send the SMS. Do you address of the user is in the form,
want to send the message from a Web site or number@provider.com. For example, if you want

Imaging: Ashwin Boricha

THE LONG
and
SHORT
of it

64 June 2001
■ resolve~ unwired

to send an SMS to an Orange mobile number, Sending SMS using IMs


say, 982017XXXX, all you have to do is send an In case you haven’t noticed, many IMs such as
SMS Funda Pack e-mail to 982017XXXX@maxtouch.co.in. The MSN Messenger and ICQ offer SMS messaging
Hold on for a moment biggest problem here, of course, is that you services. MSN Messenger offers SMS services as
before sending that SMS! would need to know the mobile service provider standard, but the person to whom you want to
First ensure that the cell of the recipient as well as his e-mail address in send an SMS has to have an MSN passport and
number of your friend is in order to successfully send your message. enable the option for you (or anyone else) to
the international cellular send messages to his mobile. All that you then
number (more accurately, SMS via Web sites have to do is to right-click on the name and
SMSC number) format. This Another alternative is to use Web sites that pro- select Send a message to a Mobile device.
format includes a two-digit vide free SMS messaging facilities. Some of the To enable other people to send SMS via MSN
number that you have to add free SMS Web services that offer these facilities Messenger to your mobile, go to Tools, select
before the mobile phone are www.mtnsms.com, www.hooya.com, www.voices- ‘Send a Message to a Mobile Device’, and then
number to which the SMS tream.com, and www.blueskyfrog.com. MTNSMS is click on ‘Edit my Paging Settings’ or ‘Setup my
has to be sent. For Indian absolutely free, with no strings attached (see box, Pager Address’, depending on the version of
SMSCs, you have to type +91 ‘MTNSMS–Swift and Simple’). VoiceStream and MSN you are using. Register your mobile device,
followed by the mobile num- BlueSkyFrog have limitations in the form of after which you will be sent the authorisation
ber. Some of the SMSC num- points for using their service. For additional code. Enter the code and then proceed to per-
bers of Indian mobile SMS services such as ring tones, you have to pay sonalise your settings using the Phone prefer-
services will look like the fol- for additional points. ences. Fill in the numbers and click on ‘Go to
lowing after conversion:
BPL Mobile:
+919821000005 Operation of SMS Web Services
MAXtouch India:
+919820005446 Short Message Service (SMS) is defined as the location. If the status is inactive, SMSC stores
Essar Cellphone: transmission of short text messages to and from the message for a specified period of time.
+919811009998 a mobile phone, fax machine, or an IP address. When the device is active, the HLR sends an
Tata: +919848001104 These plain text messages have a maximum limit SMS notification to the SMSC, which then tries
Command: of 160 alphanumeric characters, and cannot have to deliver the message.
+919830099990 images or graphics. SMSC uses a Short Message Delivery Point
If you plan to use free Let’s consider that a message has been sent to Point format for transmission of the message
SMS Web services, certain from a Web site or application that offers SMS to the serving system. The system contacts the
requirements need to be services. The message is routed by the service mobile and if it responds, SMSC tries to deliver
met. First of all, you should to the user’s cellular network. It is received by a the message. When the message is received by
have a PC with Internet Short Message Service Centre (SMSC), which the user, it is categorised as ‘sent’ and is not
access. It also helps if you directs the message to the recipient’s cell sent again.
have a mobile phone as phone. And if you have a mobile, the moment you
many of the sites require The SMSC sends an SMS request to the receive an SMS message, you get two short
you to have a mobile phone Home Location Register (HLR) to find the roam- beeps (or any other sound that you may have
for registration. ing customer. Once the request is received by pre-configured), to indicate that you have
HLR, it responds to the SMSC with the sub- received an SMS message. So, go ahead and
scriber’s status (active or inactive) and roaming read that message.
Infographic: Jaya Shetty

Whitepapers on
Wireless Technologies
check out
Mindware

66 June 2001
■ resolve~ unwired

voila! Your friends and colleagues can now send


messages to your mobile using MSN Messenger.
MTNSMS—Swift and Simple MSN Messenger also allows you to send news,
MTNSMS, one of the foremost Web sites offering Web to mobile SMS services, is sports updates, etc, to a mobile phone for free.
very simple to use. Log on to www.mtnsms.com and register. Sending SMS with ICQ is really easy. All you
Click on the join us button for the registration form. need to do is click on the ICQ SMS icon below
In the registration form, the ICQ tool bar. ICQ offers three options for
fill in details such as your sending SMS to your friends—via ICQ, Web, or
1 e-mail ID and personal e-mail. Select the preferred mode and start send-
information (see Fig 1); the ing out your messages.
mobile number field can
be left empty. Clicking on More than just SMS
the smiley button ensures There are free Web services on the Internet that
that your confirmation offer news, sports updates, free icons, logos, and
code is mailed to your e- even horoscopes (see box, ‘Operation of SMS Web
mail address, on receiving Services’). And, of course, SMS chat. You also
which you can start firing have free Web services that enable you to down-
off your SMS messages. load ring tones (yes, you can get the theme of
Sending an SMS using Mission Impossible as your ring tone to replace
MTNSMS is very simple that monotonous beep).
(see Fig 2). Select the For free ring tones, logos, horoscopes, etc,
smsxpress link at the bot- there are several sites such as www.texer.com,
tom of the page if you’re in www.boltblue.com, and www.yourmobile.com, although
2 a hurry. Type the mobile some of these sites require you to register. You
number to which you want need to have an Internet-enabled cell phone for
to send an SMS message downloading ring tones directly. It’s also possi-
in the mobile text box. ble to download the tone directly to your PC and
Ensure that the number is transfer it via the infrared port of your PC to the
in the international format. cell phone. In order to do this, though, both your
You can convert Indian cel- cell phone and PC should have infrared ports.
lular numbers to this for- So are you ready to get those services going?
mat by adding +91 before
the number. For example, The hidden thorns
if the mobile number is Other than getting addicted to SMS (and it is
3 982017XXXX, in the inter- highly addictive!), there are some other points
national format it to be considered. A major limitation is that SMS
becomes +91982017XXXX. allows only a maximum of 160 characters in a
Enter the message in message, and sometimes even less. If a message
the text box. Take care that is longer than 160 characters, it is sent as multi-
the message does not ple messages, which might involve a loss in
exceed 160 characters— transit.
the counter will help you Whenever you use a Web site to send an SMS,
4 while doing this. Press the you essentially provide the site with your cell
smiley and your SMS is phone number. This could make you a target for
sent. spam.
Tracking your e-mail Cellular phones provide advertisers an
can be done using the opportunity to contact people with location-
track it here link in the and user-sensitive advertisements. With wireless
page that comes next (see Internet becoming increasingly popular, adver-
Fig 3). tising on mobile devices is going to become
You can see all the widespread two or three years down the line and
messages you send as well as the messages that you forward to other numbers in you may well be bombarded with advertise-
your message outbox (see Fig 4). ments on everything under the sun.
This is a worst-case scenario, though, and
there’s no need to get paranoid now. Most of
MSN Mobile’, which will take you to the MSN these advertisements are likely to be of the ‘opt-
Mobile Alert Settings page. Select the Add but- in’ type, which means the user will be offered the
ton next to Instant Messages, which will take you option of receiving or rejecting them. No adver-
to the Instant Message Alerts page. Select the tiser would want to have a user filing a case
‘User & Device information’ link to fill in your against him for spamming. So set your worries
mobile number and other information, and aside and get onto the SMS bandwagon.

68 June 2001
■ r e s o l v e ~ s.o.s.

Troubleshooting
Troubleshooting Problems with installing Windows Me, printer not being
FAQs and tips for registry editing
check out detected, converting PDF files to word, configuring a modem in
Mindware Linux...solutions to these and other problems

Applications Windows
Voice error Me doesn’t install
Whenever I open IBM ViaVoice 98, it gives me Whenever I try to install Windows Me on my
the following error, ‘VOICEPAD caused an Windows 98SE, setup runs well till ten per cent
invalid page fault in module MFC42.DLL’. How of it is complete but then it shows the following
do I get rid of this message? message, ‘Setup cannot copy the files to your
Kovid, system. error-Suo325.’
via e-mail Ibadat,
via e-mail
This error could occur because the
mfc42.dll file is missing, corrupted or it’s This problem arises when a corrupted
the wrong version. This file is required by .cab file has been copied to the hard disk.
many applications and usually most appli- This corruption can be caused either by a
cations come along with their own copy of virus or by failing hardware, but the most
the file, which is placed in the likely reason is a scratched, dirty or dam-
Windows\System folder, thus causing aged CD-ROM. Try cleaning the CD-ROM
problems for other applications. Disabling existing DNS servers in Kppp or replace it. Also make sure that your PC
To fix this problem, the file required by is not infected by a virus. If this does not
Voice Pad should be placed in the ViaVoice help, you need to check the possibility of
directory. You should follow these steps: failing hardware.
Make sure that you can see all the files (hid-
den as well as system) in your system. Then Linux
rename mfc42.dll in C:\Windows\System to Of native and swap partitions
mfc42.dll.old. Reboot the system before this I recently upgraded my system to a 20 GB
step to ensure that no program is using this HDD. I have five disk partitions that contain
file. Next, reinstall ViaVoice. Now you will 3.99, 3.65, 3.65, 3.65 and 3.64 GB, respectively.
find a new copy of mfc42.dll file in C:\Win- I would like to install Red Hat Linux 6.2 in the
dows\System. Copy this file to the Configuring wvdial last partition of 3.64 GB. But when I run the
viavoice\bin directory. Finally, rename the Linux setup and allocate swap and native par-
mfc42.dll.old file back to mfc42.dll in to avoid confusion later on. Use the com- titions, it says, ‘Boot Partition too big’ and does
C:\Windows\System. This should get rid of mand ln -s /dev/ttyS0 /dev/modem. not allocate the native partition, although it
the error. Now you could use any one of the does allocate the swap partition. What should
diallers that are available in Linux. One of I do?
Linux the best utilities is Kppp, which is very easy Hariharan,
Modem in Linux to configure. Those who like command via e-mail
How do I go about configuring a modem in Linux line utilities could use wvdial. To configure
Red Hat 7.0? wvdial, you need to use the command wvdi- This is a common problem when the
Aji, alconf /etc/wvdial.conf. You have a host of con- hard disk size is too big. The error occurs
via e-mail figuration options for wvdial. You should when the boot partition falls outside the
see the man pages for wvdial for more 1024 cylinder area of the hard disk. You
Configuring a modem under Linux is information. Also note that if you are using should try the following. Delete all the par-
pretty much the same as it is in Windows. utilities like wvdial you will have to set the titions that you have made for Linux, that
All you need to know is which port it is DNS server to that of your ISP. This can be is, swap partitions. Then make a /boot par-
installed on. done using netconf. This can be avoided if tition of around 10-16 MB of Ext2 type.
A point to note is that COM1 in Win- you are using Kppp, as it has the option of Now go ahead with making all the other
dows is ttyS0 in Linux, COM2 is ttyS1, and accepting your ISP’s DNS server in its con- partitions, namely, the /Linux Ext2 type
so on. Once you figure this out, you should figuration, with your current DNS server and the swap partitions. This should solve
symlink this device to /dev/modem, so as being disabled. the problem. ➜

70 June 2001
■ r e s o l v e ~ s.o.s.
Hardware place without the formatting getting lost? one or more bad sectors on the hard disk.
Printer problems in Win Me Arun Sinha, The error ID is DEFRAG005 when Disk
I am using Windows Me. The problem is that via e-mail Defragmenter is unable to write to a sector
when I connect my printer on the USB port, and when it is unable to read from a sector,
Windows does not detect it. If I use the Add You cannot convert .pdf files directly the error ID is DEFRAG006. To fix the
New Hardware wizard, it still does not detect it. to .doc files. However, you can use tools
Please tell me what to do. such as BCL Drake (available at
Anoop, www.zdnet.com/downloads/). This tool allows
via e-mail you to convert .pdf files to .rtf files. If this is
This problem occurs if the printer was an online document, you can also convert it
previously installed, or if an install was to html format, using the Adobe PDF con-
attempted and did not finish for some rea- version form available at
son. In this case, when you attempt to rein- http://access.adobe.com/simple_form .html.
stall the driver, the ‘Add New Hardware
Wizard’ does not appear again. Windows
To solve the problem, you need to unin- Defrag will not read Editing the Scandisk.ini
stall the printer first. Download and exe- I have a Pentium 90 MHz PC. I have been expe-
cute the USB supplemental uninstaller riencing trouble with the Disk Defragmenter in problem, you need to run Scandisk with
from the manufacturer’s site. This will Windows 95. After checking the drive for errors, the Thorough option enabled, as you have
uninstall the printer from your system. a message comes up that says, ‘Windows could already done. Since you have not found any
After the system restarts, you will be able to not access part of this drive, ID No. bad sectors and the problem is not yet
install your printer successfully. DEFRAG006’. It also suggests using Scandisk, fixed, you need to configure Scandisk to
which I did with the Thorough option enabled. detect disk timeouts and check each clus-
Applications Scandisk could not find any errors on the disk. ter five times while performing a surface
From .pdf to .doc What could be the problem? scan. To do so, you need to do the follow-
To convert .pdf format files to Word document Rupak Ranjan Roy, ing:
files, I use the Copy & Paste method. The prob- via e-mail Use Notepad to open the Scandisk.ini
lem is that the formatting gets lost. This is espe- file, present in the Windows\Command
cially troublesome when tables are involved. Is This error occurs when Disk Defrag- folder. Create an [Environment] section in
there any way in which this conversion can take menter is unable to read from or write to the file, if the section does not already exist,
and then add the following lines to the sec-
tion, if they don’t already exist:
Windows fixfun /a ScanTimeOut=On
Unwanted affection This will scan the files on your hard NumPasses=5
I work on a network and of late, many of the drive and repair any file found to be Save and then close the Scandisk.ini file.
applications on my system do not work. My infected with the virus. Instructions for Restart the computer in MS DOS mode
system has also become slow and crashes removal, for all versions of Windows, are and then click Yes.
often. I scanned my system with an antivirus also available at www.symantec.com/avcen- Type the following line:
software, and found that the system is infect- ter/venc/data/fix.dos.funlove.4099.html scandisk C:
ed with the Funlove virus. How do I get rid of Then press [Enter] to run Scandisk.
it? You should run a surface scan when
Vinay Raj, Scandisk prompts you to do so, and repair
via e-mail any errors that it finds. You can then start
your PC normally and run Disk Defrag-
W32.Funlove.4099 is a menter. This should solve your problem.
virus that works on a net-
work and affects .exe, scr and Hardware
.ocx files on Windows 95, BIOS updates
98, Me, NT and 2000 sys- I have a computer with a P-III 800 MHz proces-
tems. It corrupts most of the sor and an ASUS CUV4X motherboard, with
Windows applications and Windows 98SE installed. I get an error some-
causes the system to crash times that says, ‘BIOS Data Update Not Correct
often. To get rid of this virus, Cpuid 000000586’. Please tell me what it means
you need to download the and how to fix it.
virus removal tool that is Rajesh,
available at via e-mail
www.symantec.com/avcenter/Fixfun.exe
You need to copy this file to a DOS This message is from the BIOS Update
bootable floppy, and then run the tool as data file located in the motherboard BIOS.
follows: To make sure your PC does not continue to
Illustrations: Farzana Cooper
display this message, you must run the ➜

72 June 2001
■ r e s o l v e ~ s.o.s.
BIOS update utility. You need only run this the user.
program once. This utility will load the You can disable the option completely,
correct data file for the steppings of the but there is no way you can disable it from
processor so that the correct data file is only wiping off the applications. However,
available. If you do not have access to the here is what you can do. You can get Win-
Update utility program, then it is possible dows Me to take a snapshot of the system
to update your system BIOS from the Asus just before you install an application, and
site (www.asus.com). if it works fine, take another one after the
installation.
Applications
No icon, no access! Internet and communications
I downloaded and installed TweakUI from Modem queries
download.com. It was working nicely till I I have a 28.8 Kbps internal modem. When I dou-
removed its icon from the Control Panel. Now, ble-click on ‘modem’ in the system tray to see
since there is no TweakUI icon in Control Panel, Check the TweakUI box to make it show its data transfer rate, it gives the number of bits
I can’t run it, nor can I do or undo any changes, up in Control Panel or bytes received and sent. My questions are
as I just don’t have access to it. Uninstalling and as follows:
reinstalling did not work. Windows 1. When I am browsing any site without
Donnir, Wipeouts sending any data to it, the modem lights still
via e-mail Windows Me has an excellent facility called blink, indicating some bytes are being sent.
System Restore. However, when I opt to restore Please tell me what this information is about?
Icons in Control Panel are controlled my system to any previous date, the computer 2. Though the maximum speed of the
by the .cpl files. TweakUI allows you to wipes out any programs or applications that modem is 28.8 Kbps, sometimes the data trans-
hide these icons from the Control Panel. might have been installed after the restore date. fer rate is large such that it reaches 11500 bps
The problem is that it does not prevent Is there any way to disable this wiping out of (that is 11.5 Kbps) and sometimes as low as 2
you from hiding its own icon. applications installed after the ‘restore date’? KBps. How is this possible?
However, here’s what you can do to Doc Lawrence, Manty,
fix this problem. Go to Start > Find > Files and via e-mail via e-mail
Folders. Here, enter *.cpl and click OK.
You should get a list of cpl files. The System Restore feature actually The modem light blinks as there is
Find TweakUI and right-click it. You restores the system to the last snapshot some data transfer that is taking place on
should find an option, ‘Open With taken by Windows Me. It deliberately does your machine. If the page you are brows-
Control Panel’. Selecting this option not install the applications that were ing contains ads that change dynamically,
will open TweakUI. Then click on the installed after this time, because they data transfer takes place when these ads
Control Panel tab and click on the might have caused the system to crash. load.
TweakUI checkbox. This should solve the Windows Me takes these snapshots at This could also be due to an instant
problem. some intervals, or at the time specified by messenger that is running, a download in
progress, or even some backdoor or a
virus. You can use the command, netstat, in
Windows server is down or unavailable for some DOS to check what ports are being used in
Unsent mail reason, your SMTP server cannot verify your machine.
I am unable to send any messages through the address and may reject the relay. If Secondly, you have the date transfer
Outlook Express. My default mail handler is this is the case, the message will be sent rate wrong as you are mistaken between
cal2.vsnl.net.in. I receive the following error when the receiving server is again avail- the bauds, bits and bytes of the modem.
message, ‘The message could not be sent able. You actually cannot do anything Your modem speed could either be said to
because one of the recipients was rejected about the error as this is usually a prob- be 28.8 kilo bauds per second or 28.8 kilo-
by the server. Subject’, Account: lem with the ISP. bits per second.
‘cal2.vsnl.net.in’, Server: ‘cal2.vsnl.net.in’, A baud is the number of signalling ele-
Protocol: SMTP, Server Response: ‘550 ments that occur each second. This is
<my_email_address>... Relaying denied’, approximately equal to the number of bits
Port: 25, Secure(SSL): No, Server Error: per second. Now, 1 kilobit in communica-
550, Error Number: 0x800CCC79’. tion terms would be 1024 bits (2^10),
A.G. Krishnan, while a byte equals 8 bits.
via e-mail Your data transfer speed reaches speeds
of 11500 bits per second, that is 11.5 Kbps
This error, which is usually ran- to 2 Kilobytes per second, which translates
dom, means that your SMTP server as 16 Kbps. Hence, the data transfer that is
is checking whether the recipient taking place is not from a minimum of 2
name actually exists before sending KBps to 11.5 Kbps, but from a minimum
your mail. If the recipient’s mail of around 11 Kbps to a maximum of 16
Kbps.

74 June 2001
■ r e s o l v e ~ s.o.s.
Windows Reboot the system. Windows should box that will ask for the source and the des-
Driving slow detect the Primary IDE channel. Don’t tination of the file you are extracting. This
My computer, with Windows 95 installed, has allow Windows to reboot, and let it detect should solve the problem.
become very slow. When I run my computer in the Secondary IDE channel. Now continue
safe mode and open the system icon in the Con- to boot into Windows 95 and then reboot Windows
trol Panel, in the Performance tab, I see the fol- from the Shutdown menu. If this too does Added options
lowing errors: not work, you should format the hard disk When I right-click on Start, I can see the options
1. “Compatibility mode paging reduces overall and repartition using fdisk. Open, Explore, and Find in the context menu.
system performance. Windows was unable to Can I add more options to this context menu,
identify a real-mode driver or memory-resident Windows which can open applications?
program loaded in your Config.sys or Autoex- Truant files Satish and Sanju,
ec.bat file. I have a Pentium II 333 MHz, 48x CD-ROM sys- via e-mail
You will see another message that lists the tem. When I try to play VCDs through Windows
name of the driver or program causing the prob- Media Player 7, it displays an error message, ‘A Yes, you can add your own options in
lem. Because Windows could not identify the device attached to the system is not function- this context menu. To do so, open Win-
driver or program, it has switched to MS-DOS ing’. When I try to enter into MS-DOS prompt dows Explorer. Go to View > Folder Options >
compatibility mode to ensure the program will from Windows 98, I get a similar error message File Types. Here, click on Folder and click
run. and another which says, ‘The object that MS- Edit. Now click on New and specify a name
However, this slows down overall performance. DOS prompt refers has been unaccessible or for the action that would appear in the
To improve performance, remove the program removed’. What may be the error? How can I menu. Also specify the program that would
or driver causing the problem, or contact its overcome it? execute this action. Click OK, and close.
manufacturer for an updated version.” Sivapadmanaban, You will now see your own option in the
2. “Drive X: using MS-DOS compatibility mode via e-mail context menu.
file system. This problem often occurs on more
than one drive. Usually it is caused by a driver Internet and communications
in Config.sys that Windows doesn’t recognise, Clear URLs
and is related to the problem ‘Compatibility When you click on the drop-down button in
mode paging reduces overall system perform- Internet Explorer’s address bar, you can see a
ance.’
If you also see that problem, see the Help for
that problem first. If you only see this message
on one drive, that drive is using an MS-DOS
compatibility (real-mode) driver, which may
slow down access to that drive.
Contact your hardware manufacturer to see if
an updated driver is available for your drive. If
not, the drive may work more slowly than is opti- Deleting select URLs from Internet Explorer
mal, but you can still use it.”
Munish, list of all the URLs that you have visited. Is it pos-
via e-mail sible to selectively clear URLs from this drop-
Specifying the source and destination for down list? I do not want to get rid of all the URLs
Windows 95 uses the MS-DOS com- the damaged or missing files by doing a Clear History.
patibility mode when it is not using 16 or Gaurav,
32-bit disk access drivers. To fix the prob- via e-mail
lems, you could try the following: It seems that you have a damaged or
Go to Start > Run. Type regedit and click missing Vgafull.3gr file or Winoa386.mod You can edit the registry to do this, or
OK. In Registry Editor, click on Edit > Find. file in the Windows\System folder. To solve use software that allows you to do so. How-
Type noide and click on Find Next. Delete the problem, you should rename these two ever, backup your registry before editing it.
all the entries that you find. Reboot the files (use the Find tool) and extract the cor- Here’s what you should do: Go to Start > Run.
machine. rect files using WinZip or System File Type regedit and click OK. Go to
If this does not work, go to Start > Settings Checker. HKEY_Current_User\Software\Microsoft\
> Control Panel > System. In the Device Manag- To open the System File Checker, go to Internet Explorer\Typed URLs\.
er tab, check if the Primary and Secondary Start > Run and type sfc; click on OK. Select Here, you will find many URLs. Just
IDE channels have any conflicts (exclama- the ‘Extract one file from installation disk’ select the ones that you do not need and
tion marks next to them). Select Standard radio button and type out the file you want delete them. Make sure that your IE is not
IDE/ESDI Hard Disk Controller and click to extract. running. Exit the registry and restart Win-
Remove. Clicking on Start will bring up a dialog dows. The URLs should be gone.

DO YOU NEED HELP? Send an SOS to sos@jasubhai.com


Or write in to DIGIT, D-222/2, Om Sagar Bldg, MIDC, Nerul-400 706

76 June 2001
■ resolve~ t i p s & t r i c k s

tri
Contents

&
WINDOWS OS

tips
Windows 9x/Me
Creating security policies..........................2

ck Forcing users to enter password............2


Installing Critical Updates ........................2
Disabling sharing.........................................2
Unbinding NetBIOS to TCP/IP ................3

s
Enabling file extensions ............................3
Scraping past security................................3
Changing default locations ......................3
Windows NT/2000
Restricting guest access ............................4
Encrypting and securing files...................4
Watching your shares-I ..............................4
Watching your shares-II.............................4
BROWSER PROTECTION
Internet Explorer 5 and 5.5
Deleting cookies..........................................5
Working around cookies ...........................5
Disabling Windows Scripting Host.........5
Disabling AutoComplete...........................5
Deleting History items ...............................5
Filtering content...........................................5
Disabling Java...............................................6
Changing settings of restricted zone.....6
Netscape Navigator
Changing your security level....................6
Clearing the Location Bar .........................6
Managing cookies .......................................6
Setting privacy options ..............................6
Manage your Usernames and
Passwords......................................................6
Encrypt passwords......................................7
SAFETY IN E-MAIL AND CHAT
Disabling archiving of postings...............7
1
Avoiding newsgroup spams ....................7
Encrypting messages..................................7
Blocking messages using filters..............7
Password protection ..................................7
Changing the Internet Zone.....................7
Hiding IP address in ICQ...........................8
Spoofing your IP in mIRC .........................8
Using a proxy server ...................................8
Keeping a spam address ..........................8
PC SECURITY
Locking Internet access
in ZoneAlarm ................................................8
E-mail protection in Norton.....................8
Importance of Live Updates ....................8
Illustration: Mahesh Benkar Scanning all downloads ...........................8

UNBREACHABLE SECURITY Tips & Tricks


Denial of Service attacks, mail bombing, ping flooding...if these terms All about Easter Eggs, check out
scare you, then it’s time to take a few protective measures Mindware

79
■ resolve~ t i p s & t r i c k s
WORKING WITH WINDOWS
There’s no understating the fact that most likely you are going to be working with one Windows operating system or the other.
So, getting to know the OS is quite important

Windows 9x/Me oft/Windows/CurrentVersion/Run. In


The most popular operating system is not the right-hand pane, right-click and
that security conscious, but you can cer- choose New String Values, and rename it
tainly tweak it to gain more control as FixLogon. Finally, open the FixLogon
entry you’ve just created (by double-
Creating security policies clicking on the right-pane of the Registry
You can get a higher level of security with Editor window) and specify the follow-
your Windows machine if you create ing command as its Value
user profiles on your PC. Go to Control data: rundll.exe user.exe,
Panel, double-click the Users option and EXITWINDOWS. Reboot your
follow the wizard to create a new user for Make users enter PC to save the changes. If
the computer. a password on you want to restore the
If you are using Windows 95, you Windows startup old setting, delete this key.
have to select the Passwords option to go
to the User Profiles tab. Enable users can unauthorised user. Click OK when you Installing Critical Updates
customise the preferences and restart the are finished. The settings you choose A feature that often goes unnoticed in
computer. In the login window, type in are the ones a person will find when he Windows (and other applications too) is
your name and password, and Windows logs in with a new name or hits Cancel the update utility. Microsoft uses the term
will prompt you for creating a new at the login prompt. This can be a very ‘Critical’ updates for patches and bug fixes
profile. stripped down version of Windows related to your operating system, though
with no access to many of the settings sometimes these may be for other appli-
or folders. cations too. While you can go and indi-
vidually download the updates from
Forcing users to enter password Microsoft’s Web site, you can do the entire
during login thing in a faster manner by just clicking
2 Unlike Windows NT/2000, the login on the Start menu and selecting Windows
window in Windows 9x/Me can be easi- update. This ensures that you get the
ly bypassed by pressing the [Esc] key or entire database of updates in some cen-
by clicking Cancel. So, it’s possible that a tral location. It’s not necessary that you
third person who turns on your PC can install each and every update, especially if
gain access to your personal informa- you have not been facing any problems.
tion. To prevent this from happening, And the latest updates for Outlook
You can specify rights for individual users first make sure that the user profiles are Express have made it extremely restrictive.
created and enabled for each user, and But, do select the updates that fix any
Now, with user profiles created, you that the ‘Include Start Menu and Pro- exploits to your browser or operating sys-
can use the System Policy Editor to gram Groups in User Settings’ option in tem and install them.
restrict access to new users (or those the Control Panel is enabled for each
who just hit the Cancel button at the user. Disabling sharing
login menu). Before using Policy Edi- Reboot the PC in Safe Mode by hit- If your machine is part of a network, you
tor, back up your registry and other ting the [F8] key during Startup and need to configure it for file and print
password files. Restart the computer, choosing Safe Mode from the Boot sharing so as to enable other people on
and at the login prompt, press Cancel. Options. This is very important because the network to access your shared folders
This represents a setting for an unau- if something goes wrong, you can always and printers, and to allow you in turn to
thorised user. Start the Policy Editor by reboot your computer in the safe mode access their resources. But most intru-
typing poledit in the Run menu. Go to and rectify the problem. sions are done using this exploit to gain
File > Open Registry and double-click on Type regedit.exe in Start > Run. Find the access to your machine.
Local Users. Check or uncheck the var- following key in the Registry: On the other hand, if you have a stand-
ious options to restrict access by an HKEY_USERS/Default/Software/Micros alone machine, then there’s no reason

Ad will come

80 June 2001
unbound to TCP/IP and you no longer object, which is basically a wrapper for
have to worry about your file shares OLE data. Double-clicking on the scrap
being accessed over the Net. file launches any program that may have
been defined in the properties of the
Enabling file extensions scrap object. The scrap object icon is
By default Windows Explorer hides file quite similar to the icon for a text docu-
extensions for known file types, and this ment, and even if Windows Explorer is
includes the .vbs extension which is also configured to show all extensions, it hides
used to create many of the malicious the .shs extension that is associated with
scripts. Therefore, it’s quite possible that a scrap document. So, you can easily end
you might receive an attachment in your up opening an e-mail attachment, say,
e-mail with the actual file name as good- goodstuff.txt.shs (which only gets dis-
image.jpg.vbs, but since the .vbs is a played as goodstuff.txt), and invoke a
known file extension, it gets hidden and malicious command (such as opening
you perceive the file name as goodim- some file or running the format com-
age.jpg and since .jpg files are non-exe- mand) associated with that scrap object.
cutable you open it. This could cause the To prevent this, you have to modify
Disable file sharing Visual Basic Script to execute whatever some settings in the registry. Back up
code is written in it (provided you have your registry before you proceed. Type
why file and print sharing feature should Active Scripting enabled). To regedit in the Run menu, and go to
be enabled. To disable it, open Control HKEY_CLASSES_ROOT\ShellScrap.
Panel and double-click on the Network Locate the NeverShowExt value in the
icon. You will see a list of installed pro- right-hand pane and then delete this
tocols, including ‘File and Print Sharing value. Adopt a similar procedure for the
for Microsoft Networks’. Click on File value under HKEY_CLASSES_ROOT\
and Print Sharing, then click Remove, DocShortcut. Now, all that’s left to do
and finally click OK. Reboot your PC to is change the icons for the scrap object
save the changes. so that they don’t resemble the text
icon. Go to Windows Explorer > Tools, click
Unbinding NetBIOS to TCP/IP on the File Types tab and select the .shs
3
By default, NetBIOS is bound to TCP/IP extension. Click on Advanced, and then
protocol, and therefore it is possible for on Change Icon. Browse to the pifm-
outside intruders to access your file gr.dll file, and select one which presents
shares. You can prevent this by unbind- the warning signals or the dynamite or
ing NetBIOS to TCP/IP. Firstly, you need shield, so that you know there’s danger
to have NetBEUI installed along with associated with such file extensions.
TCP/IP. (Install NetBEUI from the Pro-
tocols options in the Network Configu- Changing default locations
ration menu). Now, select the Dial-up Uncheck the option to hide known file Many intrusion attempts and malicious
Adapter that you use to connect to the extensions Web sites look at specific directories for
Internet, and click on Properties. Go to certain files. This is done on the
the Bindings tab, and uncheck all the prevent this from happenning, go to the assumption that the software will usual-
boxes except for the TCP/IP Dial-up Explorer Window, select Tools > Folder ly be installed in the default locations.
Adapter. Click OK. Now, select TCP/IP > Options, click on the View Tab and For example, Windows will most prob-
Dial-up Adapter, and click on Properties. uncheck the ‘Hide file extensions for ably be in C:\Windows and other appli-
Ignore any warning messages, and click known file types’ option. cations will be within the C:\Program
the Bindings tab. Uncheck all the boxes Files folder.
present here, and click OK. You will get Scraping past security Wherever possible, don’t use the
another warning message, but click No What happens when you try to paste, default folder and change it to some
at this juncture. Close the Network prop- say, the contents of your Word document other name. This will make the task of
erties menu and restart the machine. into the Explorer folder? You get what is whoever is trying to pry into your sys-
This will result in NetBIOS being known as a scrap document or scrap tem all the more difficult.

Ad will come

81
■ resolve~ t i p s & t r i c k s

Windows NT/2000 folders selectively—it ensures that only


Windows NT/2000 offer a more secure the person who knows the exact name of
environment, though a few exploits can the folder can access it. Open Windows
let other users gain access to your Explorer and click on the folder you want
machine. Here’s how to plug those holes to share. Now right-click on it and choose
Sharing to display the properties window
for that particular folder. Click on the
Restricting guest access check box against ‘Share this folder’. In the
Unauthorised users can access your Share Name option, put any name and
Win2K PC by specifying Guest in the add the ‘$’ sign at the end. For example,
logon window. To disable the Guest you can give the share name ‘DOCS$’.
account, open Users and Passwords from Now, if you want your boss to read a
Encrypt drives for greater security

Watching your shares-I


If you have kept some important docu-
ments for, say, your boss in one of your
shared folders, then someone else who
isn’t supposed to read that can open it if
you haven’t set the right permissions.
Unlike Windows 95/98, Windows 2000
allows you to close the files that have
been opened by unauthorised users
without unsharing the folders that con-
tain them. To do this, right-click on the
My Computer icon on the desktop and
choose Manage. In the window that
$ is the key!

4 No Guests please! document in that folder, just tell him to


access it using the Run menu and not
the Control Panel. Click on the through Network Neighborhood because
Advanced button twice to display the folders that are shared using the ‘$’ tech-
Local Users and Groups window. In the nique can only be accessed through a Win-
left pane, double-click on Users. Here, dows command line like the Run menu.
right-click on Guest and choose Proper- In the Run menu your boss will have
ties. Once there, disable all options by Close unwanted network connections to type \\machine name\DOCS$. To check
clicking in the check box against each. whether you have done this correctly,
opens, click on Shared Folders and then
Encrypting and securing drives on Open Files. In the right pane you
In Windows 2000 or NT, if you are using should now be able to see all the files
the NTFS file system for a drive, you can from your machine that have been
restrict access to selected users. To secure opened by various users. Simply right-
your drive, right-click on the NTFS par- click on the file that you want to close
tition and choose Properties to display and choose Close Open File.
the Drive Properties. Click on the Secu-
rity tab and then click on the Add button Watching your shares-II Access $ folders using command line
to display the ‘Add Users, Computers or The above method is quite effective, but
Groups’ window. In the upper part of the the unauthorised user can again open type \\machine name with and then with-
window, click on the users you want to the same file if he wants to, because the out the folder name. In the first case, you
allow access to and press Add. Repeat this folder that contains the file is still shared. will see the folder while in the second
if you want to add more than one user. Use the following method to share case, you will not.

Ad will come

82 June 2001
BROWSER PROTECTION
Your browsing activity and the configuration you have selected can, to a large extent, define the security levels that you enjoy.
Configure it right for safe surfing

Internet Explorer 5 and 5.5 actions and applications it allows or guess your passwords. When the Auto-
Internet Explorer is the most popular blocks. It is better to click Custom Lev- Complete function is active, some sites,
browser and therefore majority of the els, and then select to prompt for cook- search engines and entry fields retain the
exploits are targetted towards it. So, you ies that are stored on your computer and words you’ve entered, so anyone who
definitely need to be more cautious per-session cookies. This allows you to uses the browser after you and visits that
control which sites you want to allow site can see the entries you made.
Deleting cookies cookies. Remember though, that some To turn off this feature, in the Inter-
Many Web sites drop little files onto your sites may not work properly if cookies is net Options dialog box, click the Con-
system that let them keep track of your disabled. In addition to this, you should tent tab. Next, click the AutoComplete
passwords, and the date and time of your also disable ActiveX, since this can pose button in the Personal Information sec-
visits. To get rid of these files, delete the a serious security hazard. tion to display the AutoComplete Set-
contents of the Cookies folder and the tings window. Uncheck the ‘Forms’ and
Temporary Internet Files folder in your Disabling Windows Scripting Host ‘Usernames and Passwords on Forms’
Windows directory (but not the folders Internet Explorer installs Windows boxes.
themselves). This will remove all traces Scripting Host by default, and this is
of your surfing pattern. You could also used to run VB scripts that may contain Deleting History items
use a third-party cookie cleaning soft- viruses or Trojans. To remove Windows The History folder stores a record of all
ware such as Cookie Crusher. Scripting Host, go to Control Panel > the Web sites you’ve visited. This is very
Add/Remove Programs > Windows Setup. Select convenient, but then your boss, friend,
Working around cookies Accessories and from there uncheck or colleague can easily find out what
Adjust IE’s security settings to keep ran- Windows Scripting Host. You can also you’ve been surfing. Here’s what you
dom Web sites from sending cookies to go to the Folder Options in Windows can do to get rid of unwanted URL his-
your hard drive or uploading ActiveX Explorer, and select the .vbs file type and tories: in Internet Options under the
Controls. To do this, select Internet remove it. General tab, find the History section
Options from the Tools menu, and click and click the Clear History button.
on the Security tab. Slide the bar under Disabling AutoComplete Repeat this before you close the brows-
5
‘Security level for this zone’ up or down The AutoComplete feature may be use- er. Set the ‘Days to keep pages in Histo-
to increase or decrease the security level. ful while filling out forms and user- ry’ to 1. This will not only keep IE neat
Each level (High, Medium, Medium- names, but it also allows other users to and tidy, but will also act as a cushion if
Low, and Low) lists exactly which know your username and then probably you forget to clear.
If you don’t want to clear your entire
History folder, you can choose to remove
single pages. To do this, click the Histo-
ry button on your IE toolbar to open the
History window frame. Right-click on
the file you want to dump and select
Delete from the pop-up window.

Filtering content
Certain sites on the Internet are certain-
ly not appropriate for children. You can
use a separate software program for fil-
tering content, but IE also has some
built-in filtering tools. To configure
these, click the Content tab from Inter-
net Options. Next, click the Enable but-
ton under Content Advisor and adjust
Adjust security settings to block cookies Tame Auto-Complete to ensure privacy the slider in each of the four categories:

Ad will come

83
■ resolve~ t i p s & t r i c k s
Language, Nudity, Sex, and Violence. The Click Remove Cookie to zap the cookie
Description box at the bottom details from your PC.
what each level allows. Click OK to acti-
vate the Advisor. Setting privacy options
It’s advisable to be discreet when you’re
Disabling Java signed on to Netscape 6 Instant Messen-
Java and JavaScript applets can take con- ger. To ensure privacy, click Tasks, Instant
trol of your browser and you should
therefore exercise caution in surfing
unknown and potentially questionable
sights. Both Java and JavaScript can be
disabled from within the browser, but Lock out hacker, cracker attacks
you will miss out on a lot of serendipi-
tous cyber experiences if you surf with
JavaScript turned off. The best course, Clearing the Location Bar
then, would be to toggle between these Most of us mere mortals occasionally
settings according to the perceived secu- visit Web sites or perform searches that
rity threat. we don’t want anyone else to know
Chat with no one but your friends
Changing setting of restricted
zone Messenger, and then select the Preferences
The default settings of Internet Explor- icon. Under Instant Messenger, select Pri-
er for Restricted Sites has Active Scripts vacy. Choose either the ‘Block all users
enabled, which sounds a bit of a from connecting’ button or the ‘Block the
contradiction. To modify this settings, users listed below’ button, and type in the
in Internet Explorer, go to Tools > Options screen names of the people you want to
> Security and select Restricted Zones. avoid chatting with. Click OK.
Click on Custom Level and then go
to the Active Scripting option and Manage your Usernames and
6 disable it. Hide visited sites Passwords
Netscape’s Password Manager stores and
Netscape 6 about. But then anyone can see the last
The latest release of Netscape might be dozen URLs you entered into the Loca-
quite sluggish and not that popular, but if tion bar by clicking the little down arrow
you are a Netscape fan, certain safety on the right side of the window.
measures are still in order To clear the list, select Edit > Preferences
> Navigator > History. Finally, in the Histo-
Changing your security level ry dialog box, click on Clear Location
Skittish about sending unencrypted infor- Bar.
mation, such as your name, phone num-
ber, or address across the Web? Managing cookies
Thankfully, Netscape 6 warns you The History folder isn’t the only place
before it sends information through an where Netscape records your surfing
unencrypted fill-in form. To enable this habits. Many Web sites drop cookies
feature, select Tasks Privacy And Security onto your system. To clear them, select
in Security Manager, and click the Appli- Tasks > Personal Managers > Cookie Manager. A
cations tab. Then check the ‘Sending pop-up window will appear with a list of
unencrypted information to a site’ box. the cookies already on your PC. Get warnings from Netscape
From this dialog box, you can also set Select a cookie to see its name, the
Netscape 6 to raise a red flag before you domain name the cookie came from, its automatically enters your login infor-
enter or leave a site that does not support path, whether it’s secure or not, its expi- mation for password-protected Web
encryption. ration date, and the data it is storing. sites. To start using the Password

Ad will come

84 June 2001
Manager, click Edit, Preferences, and Tools > Personal Manager > Password words in the above manner is that any-
then choose Password Manager in the Manager, and finally View Saved Pass- one who uses your computer will have
Advanced section. Next, click the Enable words. From the same configuratio access to your saved passwords, for
Password Manager check box in the pop- menu, you can also choose to encrypt instance your bank account. Netscape 6
up dialog box. the data that is stored on your hard disk, allows you to store all your passwords
The next time you visit a site that so that others don’t have access to it. behind a master password. To do this,
requires you to log in, you’ll be prompt- select Tasks > Privacy and Security > Password
ed to create a master password. To see a Encrypt Passwords Manager and finally the Change Personal
list of all your stored passwords, select The problem with saving your pass- Security Password option.

SAFETY IN E-MAIL AND CHAT


Your personal privacy is quite often at stake while chatting on the Net or posting at newsgroups. A little protection can safeguard your
identity on the Net

Disabling archiving of postings Outlook Express, go to Tools > Options,


When you post to a newsgroup, your click on the Security tab and check the
post is not only accessible to millions of option for encrypting all outgoing
users, it gets archived also with a site messages.
such as DejaNews. That means you can
still be ‘hunted’ down after many years. Blocking messages using filters
If you don’t want your messages to be All e-mail clients allow you to define
archived, type the following text in your mailing rules for sorting mail. This fea-
header, x-no-archive: yes. You can also ture can also be used to block spam mail,
remove messages that have already been or mail from certain users. Start the fil-
archived by DejaNews. Information tering process, and select to delete mes-
about archival and removal can be found sages which have some text string in the
on the site. e-mail address or text like ‘Iloveyou’ in
Make your zip files password protected
7
Avoiding newsgroup spams
There are many bots which automatical-
ly retrieve e-mail addresses from news- Password-protecting by using
group posting and then bombard you compression
with spam. To prevent such spamming, If you must send e-mail attachments,
while at the same time ensuring that you make sure they arrive safely. You can add
get a response to your posting, use an a level of security by compressing attach-
e-mail address which contains removal ments with WinZip or a similar pro-
instructions for the correct e-mail gram, and by adding a password so that
address. You can for example use an only the intended recipient can decom-
e-mail address such as press the file. Click the Password button
abc@removethishotmail.com. Use Rules to control Outlook Express or use the Options menu in WinZip to
assign a password.
Encrypting messages the subject field. In Outlook Express, if
If you regularly send confidential infor- you have received an unwanted message, Changing the Internet Zone
mation, then it’s a good idea to encrypt you can just go to the Message menu and You can change the secure content zone
all your outgoing messages. You can use select Block Sender. The Block Sender in your e-mail client (Outlook or Out-
a freeware tool such as PGPfreeware for option can be quite useful when you get look Express) to that of Restricted sites.
this. PGPfreeware encrypts your mail junk e-mail from some list servers. This creates a more secure environment
and enables you to send online decryp- Unsubscribing to these may often not though it might be a little less function-
tion keys to the recipients, and integrates work, and only serve to tell them that al. To change the zone, in Outlook, go to
with Outlook Express and Eudora. In yours is a genuine e-mail address. Tools > Options > Security. Select Zone from

Ad will come

85
■ resolve~ t i p s & t r i c k s
the drop-down menu, and select Spoofing IP in mIRC cookies. Another such tool is InterMute
Restricted Sites. For changing the Zone When you are chatting in an IRC chan- (www.intermute.com/), which blocks pop-
in Outlook Express, go to Tools > Options > nel, anyone can just give the command ups as well.
Security, and select the Restricted Sites /whois <yournickname> to get your IP
option. address. Keeping a spam address
To spoof your IP address, you can use When filling up registration forms at
Hiding IP address in ICQ the command, /mode <yournick> +x (or +z) sites or when you have to provide your
Since ICQ works by establishing a direct depending on the channel. Alternative- e-mail address at public places, you
connection, you should ensure that your ly, you can work through a proxy server should use an e-mail address that you
IP address is not visible to other users. or an anonymiser. have specially created for that purpose
Select the option to hide your IP address and don’t give out your personal e-mail
(though a determined user can easily Using a proxy server address.
bypass this security option), and ensure The best possible solution for absolute Also, see to it that you reveal the bare
that other users need authorisation before privacy is to surf using a proxy server. minimum in the forms, and give false
they can connect to you. You can even You could, for instance, use Internet information as far as possible (unless you
select to remain invisible to most users Junkbuster Proxy (www.junkbusters.com/ are in a shopping site, and require deliv-
and not publicise your details on the Web. ht/en/ijb.html), which can selectively block ery of a product).

PC SECURITY
You can secure your PC by using firewalls and antivirus programs and configuring them correctly. A few tips towards this end

Next, check the High Security option.


Locking Internet access in This will stop all Internet activity if the Importance of LiveUpdates
ZoneAlarm machine remains idle for more than 20 By default, LiveUpdate is configured to
If your office has an always-on Internet minutes. look for updates every time you connect
connection, use ZoneAlarm’s Internet to the Internet irrespective of whether or
Lock feature to protect your machine E-mail protection with Norton not updates have been released. This can
in your absence. To enable this, right- Antivirus be very annoying. You can change the
8 click on the ZoneAlarm icon in the sys- If you are using an e-mail client to access default setting to download updates only
tem tray and choose ‘Restore your POP mail account(s), then you when a newer version is available. To do
could set up Norton AntiVirus to scan this, browse to the LiveUpdate menu
all incoming mail. To do this, start Nor- under Internet in the Norton AntiVirus
ton AntiVirus and open the Options Options dialog box. By default, the ‘Apply
window. In the left pane, browse down updates without interrupting me’ option
to the E-Mail Protection sub-menu is checked. Change the default option by
under the Internet menu. ticking the check box against ‘Notify me
Next, select the e-mail accounts you when updates are available’ and press OK.
want scanned before the mail is down-
loaded on to your hard disk. Finally, Scanning all downloads in
from the Action tab, specify the action to FlashGet
be taken in case a mail is infected by a You can set up your download manager
virus and press OK to complete the con- to scan files before they are downloaded.
figuration. To configure FlashGet, start FlashGet
If you have Norton Personal Firewall, and open the Options window from the
Use the Lock icon to block Internet access then you can also block ActiveX controls Tools Menu. Once there, click on the File
and other cookies. A unique feature of Manager tab and tick the check box
ZoneAlarm Control Centre’. Then click Norton is that it can also block adver- against the ‘Use virus scanner to scan the
on the Lock tab. The Internet Lock is tisements and HTTP referrers (wherein downloaded files’ and browse to the
disabled by default. Click on Enable. a site comes to know where you are com- folder where your antivirus program is
Now specify a delay time of 20 minutes. ing from). stored.

Ad will come

86 June 2001
■ select~ t e s t d r i v e

Photograph: Rahul Sharma

IN TEST: 16 FLATBED SCANNERS

THROW A SCANNER
IN YOUR WORKS ALIASGAR PARDAWALA today’s scanners are sleeker and smaller than
Choose one from ith innumerable free Web services and their predecessors, so you don’t have to allot half
among our
recommendations
and liven up your
W ‘get-your-Web-site-up-in-five-minutes’
software, the need for affordable imaging
solutions is very apparent. The good news
is that a plethora of such solutions are now avail-
able and you can choose from among them
of your desktop space to your new scanner.

Speed test
The speed of each scanner was first tested using
a simple text document created in the lab, which
reports and depending on your application. contained both text and a company logo.
presentations with With a scanner, you can port all those birth- This document was previewed using the
day and family photos over to your personal Twain drivers that came with each scanner, and
distinctive images Web site. Apart from working with just images, the timing was logged using a stopwatch. Here,
if you buy a scanner with OCR capabilities, you we logged the duration between the moment the
can also scan documents and text from newspa- Preview button was pressed and the moment the
pers and magazines. image appeared in Photoshop.
The latest scanners offer a host of features The fastest preview was generated by the
such as Scan-to-Web and Scan-to-e-mail. The Epson 1640 SU, which uses Twain 5 drivers
Scan-to-Web function enables you to post developed by the same vendor. The scanner took
More Info on images to your Web site at the touch of a button, only 5.58 seconds to preview the document at
the test process and the while the Scan-to-e-mail feature allows you to 300 dpi in true colour. The other impressive per-
products tested, check out e-mail an image directly—you don’t have to sep- formers in the preview test were the Microtek
arately import it into your e-mail client. ScanMaker 3600, which took 8.58 seconds, and
Mindware
Apart from the enhanced functionality, the Epson 1240U Photo (9.31 seconds).

100 June 2001


TEST PROCESS Ability to differentiate
between highlights (RGB)
We ran a battery of tests that evaluated a range of characteristics
of the scanners besides just the image quality. We considered four Ability to differ-
factors in determining the performance of each scanner: entiate
between shad-
Contrast between ow (dark) areas
darker and lighter (RGB)
areas of leaves
Wrinkles between
the eyes

Detail on the
fabric

Specular shine on Distingushing between


the bracelet different shades of grey

■ Image Quality: and subtle variations in colour, hue, brightness, and resolution.
Since the prime ■ Resolution: To determine the maximum resolution at which
function of a scan- each scanner could pick out the finer details, we used a resolution
ner is to pick up target that consisted of five squares forming bar patterns, created
images and con- at different dpi ratings.
vert them into dig- ■ Speed: We logged the time taken to scan a range of different
Detail in flowers ital format, image images, and at different resolutions and colour depths. Additional-
quality is one of the ly, the time taken to scan text documents and photographs in full
most important parameters for evaluating flatbed scanners. Two colour and gray scale modes was also logged.
reference images were used to test the image quality—the IT8.7 ■ Features: We also considered build quality, ability to scan trans-
colour card, which is a standard image used worldwide for colour parencies, documentation, buttons for one-touch scanning opera-
correction and calibration, and an A4-size photograph that tions, and provision for upgrading to an Automatic Document
helped determine the accuracy of the scanner in picking out details Feeder.

The preview speed depends a lot on the tech- done at 300 dpi in full colour mode and subse- Contents
nology used, the implementation of the optics quently in gray scale mode, using the maximum TEST PROCESS . . . . . . . . .100
used in the scanner, and the software that con- bit-depth offered by the scanner. FLATBED SCANNERS . . . . .100
trols these scanning elements. In gray scale mode, the HP ScanJet 5300C Acer ScanPrisa 640BU
Next, we scanned the document in black- emerged the winner with a timing of 13.5 sec- Acer ScanPrisa 640U
and-white (line-art) mode and then in gray scale onds. The Umax Astra 2400S, which is a SCSI Acer ScanPrisa 1240UT
mode at 200 dpi. The document was scanned scanner, came in second by clocking 15 seconds. Epson 1240U Photo
directly to Photoshop from the Twain drivers of The fastest scanner in full colour mode was Epson 1640SU
the respective scanners. the Epson Perfection 1640SU. It scanned the test HP Scanjet 5300C
The HP ScanJet 5300C was the best among photograph in just 25.31 seconds. The first run- HP Scanjet 6350C
Microtek Scanmaker 3600
the pack in this test—it took just 8.31 seconds to ner-up was the Umax Astra 3400 with a timing
Microtek Scanmaker X6
scan the document in black-and-white mode, of 31 seconds. This scanner, however, gave an Mustek 1200CUB
and 9.25 seconds for the scan in average performance in the other tests. The UMAX Astra 3400
gray scale mode. In black- results indicated that the Epson Perfection UMAX Astra 3450
and-white mode, the 1640SU is the best suited for office UMAX Astra 2000p
HP ScanJet 5300C applications because of its UMAX Astra 2400S
scanned the image, speed in scanning the pho- UMAX Astra 4000U
opened Photoshop tograph, although it was UMAX iA101
and displayed the image not quite as fast in BOXES
in the application in just 9 scanning the text USB or SCSI? . . . . . . . . . . . . .102
How Much Colour Depth? . .102
seconds. This impressive per- document.
Scanning Transparencies . . .103
formance could be primarily The Umax Astra An Eye for Detail . . . . . . . . . .104
attributed to HP’s proprietary Twain 3400 is the perfect SCORE BOARD . . . . . . . . .104
drivers. buy if you are looking DECISION MAKER . . . . . . .103
The final speed test was conducted for an inexpensive CONCLUSION . . . . . . . . . .105
using the test photograph. The scanning was HP ScanJet 5300C scanner for home use.

101
■ select~ t e s t d r i v e

USB or SCSI?
Almost all low-end scanners use a par-
allel port with a pass-through for a
printer to also connect to the computer.
This provides an inexpensive way to
connect both the printer and the scan-
ner to the computer. The downside to
this is that speed is compromised and
the other external Zip drives that need
the parallel port cannot connect to the
scanner. USB devices have been very
successful in the market and you
should opt for a USB connection over a
parallel connection since it offers
increased plug-n-play support, greater
reliability and better flexibility. as the fastest scanner in the speed test and togram function in Photoshop was used to
A high-end scanner usually comes the quality of the scans was also quite determine the standard deviation of the
with a SCSI connector. This is because impressive. The Epson Perfection 1640SU red, green and blue colour values. The cri-
SCSI connectors can handle a lot of came in a close second. terion was the same: a value of 2 or high-
data—a feature that is needed when er meant that the scanner had successfully
dealing with large files. SCSI connectors Image quality evaluation using IT8 card detected the colour variations. Although
usually ship with their own card and This is one of the most comprehensive tests none of the scanners scored below 2, many
the SCSI connector of a scanner is likely to evaluate the performance of imaging of them failed to pick up the green tones
to be incompatible with other SCSI equipment. It was used to evaluate the abil- accurately.
cards. ity of the scanners to differentiate between The HP ScanJet 6350C recorded the
If you are buying a low-end scanner fine nuances in colour and luminosity.
with a resolution of less than 600 dpi, To ascertain the scanner’s ability to dis-
then opt for a USB device, while if you tinguish tonal resolution in gray scale How Much Colour Depth?
need a high-end scanner, a SCSI con- areas, a set of 22 different blocks were
nector is a good choice. observed to check for blending between Colour/bit depth is often wrongly asso-
adjacent blocks. This test determines the ciated with the number of colours a
accuracy of the scanner in reproducing the scanner can pick up. The bit depth is
It would be unfair to omit mentioning various colour blocks in the IT8 card. actually the number of levels of colour
the Epson 1240U Photo, which wasn’t far First, we checked if the scanner could that a scanner can distinguish between.
behind in any of the tests but couldn’t accurately pick up the 22 different shades The extent of brightness values that a
make it to the ranks of the top three. of colour. In order to log the most accu- scanner captures (also called the
Although it took more time than expected rate values, we used the histogram func- dynamic range) depends upon two fac-
(84 seconds) for scanning the test photo- tion in Photoshop. We scanned the IT8 tors—the sensor and the analog-to-digi-
graph in full colour mode, it logged above- card onto Photoshop using the maximum tal converter (ADC). For photos, the
average results in all the other speed tests. optical resolution and bit-depth offered by minimum depth needed is 24-bit, that
Overall, the HP ScanJet 5300C emerged the scanner in full colour mode. We select- is, 8-bits per colour or gray shade.
ed an area that comprised 50 per cent each However, even high-end 24-bit scan-
of two adjacent blocks and ascertained the ners often reduce the number of bits
standard deviation using Photoshop’s his- from 8 to 6. This means that the image
togram option. If the reading was greater does not have a 24-bit depth and so
than or equal to 2, then it implied that the quality suffers. Also, the 6-bit colours
scanner had differentiated between the tend to gather around the mid-tones,
two blocks. All the scanners but one passed leading to deterioration in quality of the
this test by differentiating between adja- shadows and highlights. As the bit-
cent blocks right up to block No 22. The depth increases, the output quality of
exception was the Mustek 1200CUB, the scanner should also increase. How-
which could only detect differences among ever, some manufacturers use a 24-bit
the first 21 blocks. scanner with a 10-bit ADC instead of an
The next test performed using the IT8 8-bit ADC. This improves image quality
card was the colour uniformity test. In this to such an extent that it may even be
test, seven coloured blocks in the A row better than a 30-bit scanner. However,
were selected in Photoshop. These were you would need 30 bits or more for
the lightest blocks in the row with very fine scanning slides or films.
variations among them. Again the his-

102 June 2001


lowest RGB tone readings (4.31, 3.11, and being 11.65, 6.48 and 6.3, respectively. This 3600. The Umax AstraNET iA101 turned
4.35 respectively), while the Acer Scan- implies that the ScanPrisa 640U’s CCD in the poorest performance—the standard
Prisa 640U registered the best combined (charged couple device) is of very high deviation score for red was a dismal 0.47.
RGB value, with the individual readings quality since it is wholly responsible for the The Acer ScanPrisa 640U also recorded
detection of variations in colour tones. poor readings in these tests.
In the last test in this series, we evalu-
ated the tone detection in the shadow and Resolution test
Scanning Transparencies bright areas of the IT8 card. We selected This test evaluates the ability of the optics
If you want to scan transparencies, the area from block 1 to block 4 (F1-F4) used in the scanner to detect the smallest
slides or negatives, you have to place for detecting variations in the shadows, possible details on the target document.
the original between the light source and block 9 to block 12 (F9-F12) to test We used a resolution card containing five
and the sensor so that light passes the detection of tones in the bright areas. blocks, each of which is made up of very
through it before it reaches the sensor. Two blocks were selected, for instance, F1 fine lines that are created at a particular
But most consumer-level transparency resolution. The first block was of 120 ppi
scanners place both the light source (points per inch) while the fifth block was
and the sensor on one side. Due to of 2400 ppi. The scan was done both in full
this, the sensor can actually pick up colour and gray scale modes, and at
light as it reflects off the original. In the maximum optical resolution
such cases, you will need a transparen- and bit-depth. It was then convert-
cy adapter (TPA), which is nothing but ed to 8-bit mode in order to
a backlight to replace the cover of the use Magic Wand, which
scanner. Not all scanners support TPAs, doesn’t work on the
and the adapter costs between Rs directly scanned image.
4,500 and Rs 13,500. Some high-end The tolerance was kept
scanners come packed with the TPA. at 8 as opposed to the
An alternative method is to have a default value of 32. The indi-
slide-out tray so that there is no glass vidual scans were checked to
surface between the original and the ascertain the scanner’s ability to
sensor. This reduces what are called Microtek ScanMaker 3600 pick up a particular resolution. All the
Newton Rings. The downside is that scanners passed the third block effortless-
these scanners cost around Rs 36,000. ly in gray scale mode, but many of them
Yet another option is to go in for a and F2. The maximum area was selected failed to detect even a single line in the
slide or transparency (4x5) scanner. and the standard deviation of the individ- fourth block (1200 ppi). The Microtek
These scanners focus on a small area ual RGB values was noted down for both ScanMaker 3600 and the Umax Astra 3400
and provide a high optical resolution the shadow and bright regions of the IT8 failed to detect even the second block in
for enlarging small negatives or slides. card. Many of the scanners had problems full colour mode.
But good slide scanners are expensive, in detecting the green tone and scored less The winner in this test was the Umax
costing between Rs 40,000 and Rs than 2. The scanner that did well in this Astra 4000U, which detected all the indi-
90,000. test was the HP ScanJet 6350C. It logged vidual lines in the fifth block. This scanner
The feature that you need to consid- impressive results in the detection of red returned above-average results in the other
er for scanning negatives or slides is tones in the shadow region, but performed tests but could not make it to the top three.
optical density (OD). The higher the poorly in detecting the green tone, as did The only other scanner that matched this
OD, the better the scanner. The OD is all the other scanners that we tested. performance was the Epson Perfection
usually associated with the colour The scanners that gave consistent read- 1240U Photo. Although it could not detect
depth. For instance, the OD of a 24-bit ings in all the three tests were the HP Scan- the fifth block in full colour mode, it man-
scanner is generally less than that of a Jet 5300C and the Microtek ScanMaker aged to do so in gray scale mode.
36-bit scanner. But scanners with the
same colour depth can have different
optical densities.
Decision Maker
Most scanners today have an OD of
about 2.9, which is sufficient for scan- Performance Acer ScanPrisa 640U
ning normal pictures. Slides and trans-
parencies scan better with an OD of at
Budget
least 3.2, and negatives need an OD of Price HP Scanjet 6350C
3.4. An easy way of differentiating
between a good scanner and a con-
sumer-level device is to look at the
Performance Epson Perfection 1640SU
packaging—a consumer-level scanner Mid-range
will never have the OD printed on its Price HP Scanjet 6350C
specs sheet.

103
■ select~ t e s t d r i v e

Specifications
SPECIFICATIONS
Manufacturer Dealer Phone E-mail Price Max. Max. Light source Scanning
Resolution Resolution element
(Optical) (Interpolated)

AceR ScanPrisa 640BU Acer Peripherals 022-5705230 pankajpamani@acercm.com.tw Rs 6,700 600x1200 19200x19200 Cold cathode fluorescent CCD

AceR ScanPrisa 640U Acer Peripherals 022-5705230 pankajpamani@acercm.com.tw Rs 5,500 600x1200 19200x19200 Cold cathode fluorescent CCD

AceR ScanPrisa Acer Peripherals 022-5705230 pankajpamani@acercm.com.tw Rs 16,000 600x1200 19200x19200 Cold cathode fluorescent CCD
1240UT
Epson 1240U Photo Epson India ltd 080-5321266-70 sheetal@eid.epson.co.in Rs 19,500 1200x2400 9600x9600 White cold cathode fluo- ColorMatrixCCD
rescent lamp line sensor
Epson 1640SU Epson India ltd 080-5321266-70 sheetal@eid.epson.co.in Rs 22,500 1600x3200 12800x12800 White cold cathode fluo- Color MatrixCCD
rescent lamp line sensor
HP Scanjet 5300C Hewlett Packard (I) ltd 011-6826000 princy_bhatnagar@hp.com Rs 12,499 1200x2400 9600x9600 Dual cold-cathode CCD
flourescent
HP Scanjet 6350C Hewlett Packard India ltd 011-6826000 princy_bhatnagar@hp.com Rs 26,499 1200x2400 999,999 Dual cold-cathode CCD
flourescent
MICROTEK Scanmaker Microtek International 491 3986/87/ info@compuageindia.com Rs 4,550 600x1200 9600x9600 Cathode fluorescent CCD
3600 Ltd. 88/89/90 lamp
MICROTEK Microtek 491 3986/87 info@compuageindia.com Rs 7,250 600x1200 9600x9600 Cathode fluorescent CCD
Scanmaker X6 International Ltd. /88/89/90 lamp
Mustek 1200CUB Integra Micro Systems 8207208/8215179 mumbai@integramicro.com Rs 9,000 600x1200 19200x19200 Cathode fluorescent CCD
Pvt. Ltd. lamp
UMAX Astra 3400 Neoteric Infomatique 022-4172600 sales@neoteric-info.com Rs 5,550 600x1200 9600x9600 Cold cathode lamp CCD
UMAX Astra 3450 Neoteric Infomatique 022-4172600 sales@neoteric-info.com Rs 9,950 600x1200 9600x9600 Cold cathode lamp CCD

UMAX Astra 2000p Neoteric Infomatique 022-4172600 sales@neoteric-info.com Rs 3,900 600x1200 9600x9600 Cold cathode lamp CCD
Cold cathode lamp
UMAX Astra 2400S Neoteric Infomatique 022-4172600 sales@neoteric-info.com Rs 18,000 600x2400 9600x9600 CCD
UMAX Astra 4000U Neoteric Infomatique 022-4172600 sales@neoteric-info.com Rs 17,000 1200x2400 9600x9600 Cold cathode lamp CCD
UMAX iA101 Neoteric Infomatique 022-4172600 sales@neoteric-info.com Rs 6,500 600x1200 9600x9600 Cold cathode lamp CCD

Test photograph evaluation


An Eye for Detail This was a real-world test wherein we
printed a full A4-sized photo in the high-
The feature to look out for in scanners is for scanning line art and detailed images, est quality mode using photo paper. Here,
resolution. Basically, this means the opti- you will need a scanner with an optical we looked out for the overall reproduction
cal resolution, or the information the resolution of 600 dpi. Some film and slide of the image and compared it with the
scanner has actually acquired, and the scanners offer a resolution of 1200 dpi. original one in terms of colour reproduc-
interpolated resolution, which is the reso- However, it is advisable not to scan at tion, tones of the image and the hues in
lution attained after applying several the maximum resolution your scanner sup- specific portions. A total of 11 results were
enhancements to the image. If you are ports because the quality of the image suf- logged in this test.
looking for greater detail in the docu- fers when it is passed through an image One scanner that really stood out in
ment/picture, then you should go in for a editing software. Also bear in mind that each of these 11 tests was the Epson Per-
scanner with a higher optical resolution. quality at a given resolution differs in the fection 1640S.
However, if you just want to enlarge the case of scanners offering different maxi- The Umax Astra 4000U also performed
photos, then a higher interpolated resolu- mum resolutions. For example, an image impressively, but lost out in its reproduc-
tion is what you need. scanned at 300 dpi would look clearer if tion of the finer details. The Microtek
For images with few details, an optical scanned from a 1200 dpi scanner than if ScanMaker 3600 turned in the poorest
resolution of 300 dpi will be sufficient. But scanned from a 300 dpi scanner. results, and the ScanMaker X6 was also
disappointing.

104 June 2001


OTHERS
Color A/D Scan Area Scanning Scanning Physicial Dimensions Weight Interface TP Bundled Software Overall
Density Converter surface (DxWxH) - cms Adaptor Grades
(in inches) method
(LxB) cms

48-bit Yes 8.5x11.7 F/B 8.5x11.7 19x12x3.5 8.8lb USB No Ulead PhotoExpress,ABBYY FineReader OCR soft- B+
ware,Presto! PageManager
48-bit Yes 8.5x11.7 F/B 8.5x11.7 19x12x3.5 8.8lb USB No Ulead PhotoExpress,ABBYY FineReader OCR soft- B+
ware,Presto! PageManager
48-bit Yes 8.5x11.7 F/B 8.5x11.7 18x12x3 8.8lb USB No "ABBYY FineReader,Presto! PageManager,ScanButton B
software,Ulead PhotoExpress"
42-bit Yes 8.5x11.7 F/B 8.5x11.7 269x435x93mm (W.D.H) 2.8kg USB Yes PageManager,ScanButton software,Ulead A-
PhotoExpress "
42-bit No 8.5x11.7 F/B 8.5x11.7 17.4x11.4x3.8 4.5 kg USB Yes Adobe PhotoDeluxe, ScanSoft Textbridge Pro OCR; A-
ArcSoft PhotoPrinter, ArcSoft Panorama Maker.
36-bit Yes 8.5x11.7 F/B 8.5x11.7 19.9x11.9x4.1 8.1 lb USB No Adobe PhotoDeluxe, ScanSoft Textbridge Pro OCR; B+
ArcSoft PhotoPrinter, ArcSoft Panorama Maker.
36-bit No 8.5x11.66 F/B 8.5x11.66 19.6x12.3x7.6 12.7 lb USB/SCSI 2 No HP PrecisionScan,PhotoDeluxe,Hemera PhotoObject A-
gallery, Hemera NetGraphics, Internet DesignShop
42-bit Yes 8.5x11.7 F/B 8.5x11.7 290x100x440 - USB No HP PrecisionScan, HP Scanjet Copy utility,Hemera B
PhotoObject Gallery, WebShop Designer 5.0.
36-bit No 8.5x11.7 F/B 8.5x11.7 11.5x3.2x17.3 11 lb SCSI No Adobe PhotoDelux,PhotoImpact, Caere B
OmniPage,Caere PageKeeper,Trellix Web.
48-bit No 8.5x11.7 F/B 8.5x11.7 16.1x10.6x1.4 4.2 lb USB No MICROTEK Scansuite, PhotoImpact,Kai's B
PhotoSoap,Caere PageKeeper,Caere OmniPage
42-bit Yes 8.5x11.7 F/B 8.5x11.7 18.2x11.6x2.6 - USB No Ulead Photo Express, Text Bridge OCR B
42-bit Yes 8.5x11.7 F/B 8.5x11.7 18.2x11.6x2.6 - USB TP Adobe Photo Deluxe,Caere OmniPage, NewSoft B+
cover Presto! PageManager, NewSoft Vistashuttle.
36-bit Yes 8.5x14 F/B 8.5x14 21.4x13x4.1 9.9 lb Parallel No Adobe Photo Deluxe,Caere OmniPage, NewSoft B+
Presto! PageManager, NewSoft Vistashuttle.
42-bit No 8.5x14 F/B 8.5x14 21.4x13x4.1 9.9 lb SCSI No B+
42-bit Yes 8.5x11.7 F/B 8.5x14 21.4x13x4.1 9.9 lb USB No Adobe Photo Deluxe A-
Yes F/B 8.5x11.7 18.2x11.6x2.6 - USB No MGI Photo Suite III, OCR, Mailpack B+

CONCLUSION Perfection 1640SU was the clear winner. The HP ScanJet 6350C was also a note-
After putting all the scanners through our Due to its high price tag, this scanner is not worthy performer, delivering excellent
speed and image quality tests, we came up the best option for most home users, but it quality both in the photo and the combi-
with a set of choices for virtually any appli- is definitely a very viable option for the document tests, and at very impressive
cation. demanding office user speeds.
In terms of sheer who is looking for the In the budget category, the Acer Scan-
speed as well as overall best scanning solution Prisa 640U turned in an excellent per-
performance, the Epson in the sub-Rs 30,000 formance and is an ideal buy for home
price range. users who are looking for both quality and
speed at an affordable price.
The runner-up in this range was the
Umax Astra 3450, with its high cost being
the only drawback of this scanner.
With the steady advancement of optical
technology coupled with declining prices,
scanners are rapidly penetrating the home
segment. For all you imaging buffs out
there, the future of imaging looks really
Acer ScanPrisa 640U Epson Perfection 1640SU clear and sharp!

105
■ select~ t e s t d r i v e

IMAGING WITH
INK

Photograph: Rahul Sharma

106 June 2001


IN TEST: 21 INKJET PRINTERS

For ardent fans of the world of ink


and paper, vivid colours and
breathtaking resolutions are now
within reach, with a plethora of
inkjet printers to choose from
More Info on
MENLYN NORONHA
the test process and the
rom stunning greeting cards to your hous-

F
products tested, check out
ing society’s newsletter, today’s inkjet print-
Mindware
ers are capable of some of the most realistic
images and sharp text printouts today.
Printer technology has not really witnessed
as drastic a change as that seen in other realms of Contents
computing such as 3D graphics processing, but
it has seen a very significant drop in terms of the TEST PROCESS . . . . . .107
technology available for a given price. INKJET PRINTERS . . . .110
Until about six months ago, for instance, 1440 Budget Printers
dpi printing was imaginable only in the profes- Canon BJC 1000SP
sional printing segment, and home and SoHo Canon BJC 2100SP
users had to be content with a 600 dpi resolu- Canon BJC 3000
tion. However, today’s printing technology lets Canon BJC 5100
even home users enjoy full colour printing at Canon BJC7100
high densities, and at prices that put inkjet-print- Canon BJC 50G
ing technology within the reach of most home EPSON Stylus Colour 680
users. HP DeskJet 840C
HPDeskJet 930C
TEST PROCESS HP DeskJet 950C
The test system consisted of a Celeron 466- LEXMARK Z12
based computer with 128 MB SDRAM, a LEXMARK Z22
440BX-based motherboard, and a 20 GB Sea- LEXMARK Z32
gate U8 IDE hard disk. Since the performance of LEXMARK Z42
the printers also depends on the interface, we LEXMARK Z52
configured the parallel port to operate using the Wipro eMerge e7460
ECP+EPP mode. The USB ports were also Mid-range Printers
enabled on the system to support printers that EPSON Stylus Colour 880
EPSON Stylus Photo 870
featured this interface.
HP DeskJet 970Cxi
We loaded Windows 98 SE on a cleanly for-
HP DeskJet 990Cxi
matted system and mapped the image of the
Kodak PPM 200
drive with the OS and all the drivers loaded. This
BOXES
image was restored after each printer was tested
Printers, Then
so as to eliminate any interference from previ-
and Now . . . . . . . . . . . 110
ously loaded printer drivers.
Inkjet Maintenance . . . 112
Each of the printers was subjected to a range
SCORE BOARD . . . . . . 114
of tests that evaluated their performance on two
DECISION MAKER . . . 114
basic parameters—printing speed and image
CONCLUSION . . . . . . . 115
quality. For ascertaining the print speed, we used
a sample document file that consisted of five ➜

107
■ select~ t e s t d r i v e

Printers, Then and Now


Inkjet printers penetrated the home seg- Today, most of these printers use either reservoir. The piezo element oscillates
ment only a few years back. Vendors such thermal or piezoelectric technology. when subjected to electrical voltage. To
as HP and Canon developed inkjet-print- Thermal technology: This is the technolo- generate an ink drop, a current is applied
ing technology in the 1980s, but the pre- gy used in the Canon and Hewlett-Packard to the piezo element. The element flexes
vailing prices were beyond the reach of range of inkjet printers. Here, heat is used and in doing so, it shoots a drop of ink out
most home users. to fire ink onto the paper. The ink is actu- of the nozzle. The process helps to main-
Working with these printers was also ally squirted onto the paper, and this tain control over the shape and size of the
an expensive affair due to the cost of the process is initiated by heating the ink to ink droplet. The tiny fluctuations in the
ink used, the ink wasted during printing, create a bubble until the pressure forces it crystal allow for smaller droplet sizes and
and the overall expenditure involved in to burst and hit the paper. The bubble hence higher nozzle density.
maintaining these printers. Dot matrix then collapses as the ink cools, and the The speeds of printers using either of
printers then were really slow and noisy resulting vacuum draws ink from the these two technologies have increased
and had many other disadvantages, but reservoir to replace the ink that was eject- tremendously over the years. You can now
inkjet printers came into the scene and ed. Tiny heating elements are used to choose from among various types of print-
changed all that. With advancements in eject ink droplets from the print head’s ers, and can also print in multiple modes
technology, these printers became nozzles. (such as economical mode and best quali-
increasingly efficient, and as sales vol- Piezoelectric technology: This is a propri- ty mode). So the next time you take an
umes picked up, the prices too started etary Epson technology wherein a piezo inkjet printout, think of the amazing tech-
steadily declining. crystal is placed at the back of the ink nology that makes it possible.

sample letters, each having text combined fine nuances. It printed the text document in gray
with a graphic logo. The time taken to We also considered features such as scale mode in 55 seconds, which was the
print out this sample file in black-and- build quality, thoroughness of the docu- fastest time logged in this mode. The run-
white and gray scale modes was logged. mentation, bundled software, etc, with ners-up (in gray scale mode) were the Lex-
The image quality test consisted of two points being awarded for each feature. mark Z42 (61 seconds) and the Canon BJC
tests that were run using two separate sam- Based on the price, two categories 2100SP (88 seconds).
ple prints. The first document was a com- emerged: budget printers priced You may well wonder why
bination of text, vector graphics and below Rs 15,000, intended for you would ever need to print
photos. The output of this document was home use, and mid-range a document in gray scale
evaluated to determine the printer’s per- printers costing more mode. Well, if you have
formance in terms of its ability to reproduce than Rs 15,000, used used colours in a docu-
converging lines, concentric circles, high more in offices. ment and just need a
contrast text on a dark background, and the printout to proof it, you
finer details in the original document. Speed could take the printout in gray
To evaluate the performance of the For comparing the scale mode and save your
printer in handling photographic prints, speed of the printers, expensive colour cartridge for
we used an actual A4-sized photograph the text document was the final printouts.
that featured many variations in hue and printed in normal Lexmark Z52: Sturdy and fast In the image document test in
brightness, and also had many details and draft mode (or normal mode, the winner was the
black-and-white mode) on plain paper, Epson Stylus Color 880 with a print speed
and then again using gray scale mode. We of 31 seconds, followed by the Canon BJC
Printing Speed then printed the image document in both 5100 (43 seconds) and the Epson Stylus
(5-page document in seconds) gray scale and normal colour modes on Color 680 (62 seconds). If you need a
plain paper. We logged the time taken for printer to execute volume-printing tasks
each of these printouts to determine the in colour, go for the Epson Stylus Color
printer’s performance in each of the two 880.
modes. In the final speed test, wherein the
The Lexmark Z52 clocked the fastest image document was printed in gray scale
time of 36 seconds for printing the five- mode, the Epson Stylus Color 680
page text document in normal mode, fol- emerged as the winner with a timing of 44
lowed by Hewlett-Packard’s DJ 990Cxi (42 seconds. Three printers came in a close
seconds) and the Epson Stylus Color 880 second—the Lexmark Z52, the Epson Sty-
(60 seconds). So if the bulk of your print- lus Color 880, and the Epson Stylus Photo
ing applications at home or office involves 870, with all three clocking 63 seconds. So
text documents, the Lexmark Z52, with its if you regularly proof images and want to
combination of speed and excellent print conserve your colour cartridge, you have
quality, is the best choice. a choice of four printers. ➜

110 June 2001


■ select~ t e s t d r i v e

Image quality bars with 10 levels of colour saturation minute details even from such a small
When you consider buying a printer, the to determine each printer’s ability to cap- image. The joint winners here were the
image quality it offers is sure to be upper- ture the colour variations. The winner in Hewlett-Packard DJ 990Cxi and the
most on your mind. If the test of a printer this department was the Hewlett- Kodak PPM 200, with the Epson Stylus
is in its ability to print image documents Packard DJ 990Cxi—it was able to accu- Color 880 and three other HP printers los-
that are faithful to the original, then its rately reproduce 59 of the 70 coloured ing out narrowly.
ability to print documents with text and boxes. The same Finally, we determined the printer’s
images combined may be considered the vendor’s DJ ability to pick up small font sizes by observ-
acid test. We divided the image 930C came a ing the reproduction of the text printed in
quality test into two close second four different font sizes. This is a relevant
parts: by flawlessly feature if you want to print multiple pages
The combi-docu- picking up 56 in a single sheet: You would then have to
ment: This docu- of the 70 depreciate the font size and would want
ment, as mentioned boxes, while your printouts to still be readable.
earlier, contained both the Epson Sty- All the Lexmark printers barring the
high-resolution images lus Photo 870 Z12, as well as HP’s 990Cxi, 970Cxi, 930C,
as well as text, which took third place and 950C, were able to print three of the
were combined in a by picking up 55 font sizes. Others that matched this per-
manner that would com- boxes. formance were the Kodak PPM 200, the
prehensively test the print- The next sec- Epson Stylus Photo 870, and the Canon
er’s image reproduction tion we observed BJC 7100.
capabilities, including its ability to was the black box We then aggregated the scores achieved
replicate the finer details of the with the yellow by each printer. The overall winners were
HP DeskJet 990Cxi: High in quality
original. but also in price text. Here again, the Canon BJC 7100, and Hewlett-
The Flower-Woman photo: the Hewlett- Packard’s DeskJet 950C, 840C and 930C.
This was the second part of the Packard printers The other impressive performers were the
test procedure wherein the image (see took the top positions and were followed Lexmark Z52, the Hewlett-Packard DJ
image in the Scanner comparison test) con- closely by the Epson Stylus Color 880 and 990Cxi, and the Kodak PPM 200.
tained several minute details, such as the the Kodak Personal Picture Maker 200.
wrinkles on the woman’s forehead, details The Lexmark range fared the poorest, with Image quality (Flower- woman)
in the clothing, contrast and sharpness in all the outputs displaying a splurge of We concluded the image quality test by
the flowers, etc that would put the printer black without even a tint of the yellow observing the printouts of the Flower
to the test. colour of the text in the original. Woman photo, and this was the most cru-
We also considered a passport-sized cial part of the test as the image contained
Image quality (combi-document) photograph of the flower-woman to deter- numerous minute details.
We used photo quality inkjet paper, and mine the printer’s ability to pick out We checked for faithful reproduction
the document was printed in photo or
high-resolution mode as opposed to the
normal or draft mode that was used in the
speed test. We observed the four-colour
Inkjet Maintenance
checkered box in the output to evaluate the Here are a few tips on maintaining your can be done from the toolbox or the
colour depth and the sharpness of the inkjet printer: monitoring software that gets installed
checks. Only five printers passed this test Aligning/calibrating the print head: This along with the printer drivers. Generally, a
without any errors—the Epson Stylus is one of the most important tasks to be test pattern is printed while the cleaning
Color 870, the Epson Stylus Color 880, the performed after installing a new printer or process is on, and this can help you
Canon BJC 5100, the Canon BJC 7100, a new cartridge. If the print head is not determine whether a particular cartridge
and the Wipro Emerge e7460. Seven of the calibrated properly, it may result in abnor- is out of ink.
printers displayed an almost flawless per- mal or bad print quality. The newest Checking for paper jams: This is a fre-
formance—for instance, the HP DJ 930C range of printers from Hewlett-Packard quent problem with inkjet printers, and
lost a point for pixelation in the black have an automatic calibration process could happen because of dust collecting
checks, while the Epson Stylus Color 680 wherein the print head is calibrated auto- in the paper path. You have to clean the
lost a point for uneven checks. matically after the printer is installed or printer regularly, especially the area near
The concentric circles image, which when the printer detects a cartridge the paper output tray. Check for bits of
had lines drawn from the centre to the cir- change. paper and even stapler or paper pins that
cumference of the outermost circle, was Cleaning the print head: If you could cause paper jams and eventually
checked for accuracy of reproduction. The encounter problems while printing, such damage the printer’s assembly. It is a
Epson Stylus Photo 870 secured the high- as abnormal linings, bandings, uneven ink good practice to use a blower or vacuum
est score allocated for reproducing this fea- flow, or missing colours, the printer noz- cleaner once in a while to remove dust
ture, while the others lost out because of zles are probably clogged with excess from the parts that are not accessible with
jagged lines or non-uniform colouring. dried ink that needs to be cleaned. This your bare hands.
Next, we observed the seven coloured ➜

112 June 2001


■ select~ t e s t d r i v e

Specifications

Manufacturer Model Dealer Phone E-mail Price Resolution Interface Input buffer

BUDGET RANGE
Canon BJC 1000SP CRR Centre* 011- 6806572 brijesh@canon.co.in Rs 3700 720 X 360 Parallel 10 KB
Canon BJC 2100SP CRR Centre 011- 6806572 brijesh@canon.co.in Rs 4000 720 X 360 Parallel/USB 54 KB
Canon BJC 3000 CRR Centre 011- 6806572 brijesh@canon.co.in Rs 6500 1440 X 720 Parallel/USB 128 KB
Canon BJC 5100 CRR Centre 011- 6806572 brijesh@canon.co.in Rs 9500 1440 X 720 Parallel 4 MB
Canon BJC7100 CRR Centre 011- 6806572 brijesh@canon.co.in Rs 13000 1200 X 600 Parallel 256 KB
Canon BJC 50G CRR Centre 011- 6806572 brijesh@canon.co.in Rs 15000 720 X 360 Parallel/ IRDA 32 KB
EPSON Stylus Colour 680 Epson Singapore P.Ltd 080-5321266 sheetal@eid.epson.co.in Rs 8000 2880 x 720 Parallel / USB 32 kb
Hewlett-Packard DeskJet 840C HP India 011-6826000 princy_batnagar@hp.com Rs 8499 600 X 1200 Parallel / USB 2 Mb
Hewlett-Packard DeskJet 930C HP India 011-6826000 princy_batnagar@hp.com Rs 10990 2400 x 1200 Parallel / USB 4 MB
Hewlett-Packard DeskJet 950C HP India 011-6826000 princy_batnagar@hp.com Rs 11499 2400 x 1200 Parallel / USB 4 MB
LEXMARK Z12 T.V.S Electronics 044-2325506 ap.aditya@tbg.tvse.co.in Rs 4295 1200 x1200 Parallel / USB NA
LEXMARK Z22 T.V.S Electronics 044-2325506 ap.aditya@tbg.tvse.co.in Rs 4495 1200 x1200 Parallel / USB NA
LEXMARK Z32 T.V.S Electronics 044-2325506 ap.aditya@tbg.tvse.co.in Rs 5495 1200 x1200 Parallel / USB NA
LEXMARK Z42 T.V.S Electronics 044-2325506 ap.aditya@tbg.tvse.co.in Rs 8695 2400 x1200 Parallel / USB NA
LEXMARK Z52 T.V.S Electronics 044-2325506 ap.aditya@tbg.tvse.co.in Rs 10995 2400 x 1200 Parallel / USB NA
Wipro eMerge e7460 Wipro Pheripherals Ltd 080-6397418 helpdesk.mumbai@wepindia.com Rs 4500 (Only colour cartridge) 600 x 600 USB 512 KB

MID-RANGE
EPSON Stylus Colour 880 Epson Singapore . Ltd 080-5321266 sheetal@eid.epson.co.in Rs 19000 2880 x 720 Parallel/USB 256 kb
EPSON Stylus Photo 870 Epson Singapore P. Ltd 080-5321266 sheetal@eid.epson.co.in Rs 19500 1440 x 720 Parallel/USB 256 kb
Hewlett-Packard DeskJet 970Cxi HP India 011-6826000 princy_batnagar@hp.com Rs 19990 2400 x 1200 Parallel/USB 4 MB
Hewlett-Packard DeskJet 990Cxi HP India 011-6826000 princy_batnagar@hp.com Rs 24499 2400 x 1200 Parallel/USB 8 MB
Kodak PPM 200 Summit Infotech 011-6517995 vkalyan@summitindia.com Rs 18000 1200 x 1200 USB NA

*CRR Centre —Cannon Reseller Response Centre

of details such as the colour of the trast quality, were the Lexmark Z52 and the feature. Printers that printed even when
woman’s teeth and the wrinkles on her fore- Hewlett-Packard DJ 990Cxi. the lid was open incurred penalty points,
head, and looked out for signs of dithering since it is not safe to print with the lid
or graininess in the print. Three printers Features open, especially if there are children
performed exceptionally well here—the We considered features such as build qual- around. Most of the Lexmark models
Epson Stylus Color 880, the Epson Stylus ity, documentation, bundled software, printed even when the lid was kept open.
Photo 870, and the Kodak Personal Picture accessories offered with the standard pack- Dual-side printing facility was offered only
Maker 200. Those that narrowly lost out, age, the type of power connector provided, by the HP printers, with some models
primarily due to dithering and poor con- etc., with points being allocated for each offering it as an optional feature. But
although the Canon BJC 2100SP and the
Lexmark Z52 don’t posses this mecha-
Decision Maker nism, the software manipulates the entire
process by first printing alternate pages
and then flashing an online message that
Performance Lexmark Z52 prompts you to reverse the sides and place
the pages in the input tray in the correct
Budget sequence.
Features Canon BJC-3000 The printers from Lexmark, Epson and
Canon display an online print status win-
dow that helps you keep track of the print
Performance Epson Stylus Color 880 jobs that have been fired.
Mid-range The Lexmark Z52 emerged as the most
Features HP 990 CXi feature-rich printer, followed by the
Canon BJC-3000, the Hewlett-Packard
970Cxi and the Lexmark Z42.

114 June 2001


TECHNICAL DETAILS
Rated print Paper Cartridges included Rated black Rated color Printing technology Weight (Kg) Physicial Dimensions Users Power Overall
speed capacity cartridge life cartridge life (DxWxH) - cms Manual Cord Grades

4 PPM 50 Pages Black & Colour 600 Pages 100 Pages Bubblejet Ink On Demand 2.2 Kg 360mm x 174mm x 160mm Yes Yes B
5 PPM 50 Pages Black & Colour 1800 Pages 130 Pages Bubblejet Ink On Demand 2.4 Kg 370mm x 191mm x 164mm Yes Yes B+
9 PPM 50 Pages Black & Colour 500 Pages 280 Pages Bubblejet Ink On Demand 3.7 Kg 418mm x 3.6mm x 169mm Yes Yes A-
10 PPM 130 Pages Black & Colour NA NA Bubblejet Ink On Demand 5.3 Kg 498mm x 279mm x 222mm Yes Yes B+
8 PPM 130 Pages Black & Colour 900 Pages 320 Pages Bubblejet Ink On Demand 6.4 Kg 467mm x 313mm x 218mm Yes Yes A-
5.5 PPM 30 Pages Black & Colour 170 Pages 40 Pages Bubblejet Ink On Demand 900 Grams 302mm x 112.5mm x 49mm Yes Yes B
3.8 PPM 100 Pages Black & Colour 600 PAGES 300 PAGES Epson Micro piezo 4.1 Kg 450mm x 547mm x 259mm Yes Yes A-
5 PPM 100 Pages Black & Colour NA NA HP Thermal Inkjet 5.66 Kg 18" x 7" x 14" Yes Yes B
7.5 PPM 100 Pages Black & Colour NA NA HP Thermal Inkjet 5.7 Kg 440mm x 196mm x 400mm Yes Yes B+
8.5 PPM 100 Pages Black & Colour NA NA HP PhotoRet lll Clr Layering 5.94 Kg 440mm x 196mm x 370mm Yes Yes B+
3 PPM 100 Pages Colour Cartridge Only NA NA Thermal Inkjet 1.8 kg 296mm x 373mm x 678 mm Yes Yes B
3.5 PPM 100 Pages Colour Cartridge Only NA NA Thermal Inkjet 2.4 kg 319.8mm x 447mm x 495.6mm Yes Yes B
3.5 PPM 100 Pages Black & Colour NA NA Thermal Inkjet 2.4 kg 319.8mm x 447mm x 495.6mm Yes Yes B+
5 PPM 100 Pages Black & Colour NA NA Thermal Inkjet 4 kg 287mm x 444mm x 521mm Yes Yes B+
7 PPM 100 Pages Black & Colour NA NA Thermal Inkjet 4 kg 287mm x 444mm x 521mm Yes Yes A-
2 Pages 100 Pages Black only (Printer avaliable NA NA Thermal Inkjet 5.4 Kg 404mm x 476mm x 211mm Yes Yes B
with Colour and Black Cartridge)

4.6 PPM 100 Pages Black & Colour 900 Pages 300 Pages Epson Micro piezo 5.6 Kg 450mm x 546mm x 269mm Yes Yes A
8.8 PPM 100 Pages Black & Colour 540 Pages 220 Pages Epson Micro piezo 5.6 Kg 470mm , 613mm x 302mm Yes Yes A-
10 PPM 150 Pages Black & Colour NA NA HP Thermal Inkjet 5.9 Kg 431.8” x 196.8” x 431.8” Yes Yes A-
13 PPM 150 Pages Black & Colour NA NA HP Thermal Inkjet NA 431.8” x 431.8” x196.8” Yes Yes A-
NA NA Color & Black NA NA Thermal Inkjet 2.6 Kg 463mm x 234mm x 195mm Yes Yes A-

CONCLUSION quality and so you wouldn’t let pricing breathtaking. This was especially apparent
It’s clear that there can be no outright win- constrain your choice. in the photograph printout, where the
ner for all uses—your application and In the performance category, the details in the various sections of the photo
your budget will determine the best print- Epson Stylus Color 880 with its faithful came through brilliantly. Also, with very
er for you. If you are what we could term reproduction of fine details and colour robust build quaity and righ features, this
as the ‘average home user’, you would want gradations emerged the clear winner. printer is a very good choice for the
to strike a balance between performance While the printer performed well in the demanding office user who needs the best
(both in terms of speed and image quali- speed tests, it really shone in image quali- in printing technology.
ty) and price. If you are a graphics profes- ty prints, where the level of details and the The Canon BJC 3000, with its com-
sional, you can’t possibly compromise on ability to faithfully reproduce col ors was mendable print quality, bagged our Best
Value award as it offered good perform-
ance at a very good price point, making it
an ideal choice for the home user who’s
interested in printing stationary, cards etc
without spending too much.
With the price for a given technology,
speed, and resolution declining rapidly
over the recent past, inkjet printers are now
well within the reach of the home user. If
you are still deliberating on the pros and
cons of buying your first printer or upgrad-
ing to a new one, an evening of window
shopping will help you make the decision,
for you are sure to find a product that fits
Epson Stylus Color 880: Good performance Canon BJC 3000: Value for money your requirements and your budget.

115
■ select~ t e s t d r i v e

IN TEST: 10 PERSONAL FIREWALLS

Protect your PC from security


breaches with a personal firewall.
A look at the best of these
MOHAN KRISHNAN
lain paranoid or simply stupid? Either way,

P you are capable of wreaking havoc on your


system. A little bit of sanity and patience, on
the other hand, can get you a perfect system
working to its optimum. The same logic can be
applied to personal firewalls. Today, you have a
number of options to choose from in this cate-
gory—some paid, some free. And depending on
your outlook and skill, you can configure your
firewall such that you are totally cut off from the
rest of the world, or the entire world has access
to your hard disk contents.
What exactly does a personal firewall do? A
firewall, to put it very simply, acts as a filter
between you and your network connections
(including Internet connectivity). It wards off
intrusion attempts, Trojans and other malicious
attacks. Personal firewalls are meant for the
home user or for the desktop user in a net-
worked corporate environment. They aim to
block simple attacks, unlike the enterprise-level
firewalls that the corporate world uses at the
server or router end. These are more complex
and are geared towards keeping the server up all
the time and protecting the entire network.
But do you really need a personal firewall?
Broadband, increase in security attacks, bugs in
everyday software, etc, would seem to suggest so
but then again, you might think that behind the
Imaging: Neeta Wadiker

116 June 2001


anonymity of a dynamic link of a dial-up con-
nection or the firewall of a network, you are Porting Problems: How Firewalls Work
pretty safe. Firewalls basically work by acting as a and these port numbers can be seen
This may be true to some extent for intrud- filter between your Internet connec- as a door to the outside world. Some
ers aren’t exactly searching for your particular tion and your application. At a very doors are closed, some are open, so
machine. But when the reviewers at Network basic level, you can grant or block access to certain services or protocols
Computing (India) conducted a surprise scan rights for different applications to gain (HTTP, FTP) depends on the open/
through some VSNL dial-up IP pools in Mum- access to the Internet. But this is just closed nature of ports. Firewalls again
bai, they found that 89 out of around 2,000 IP one part of the working and is related act as gatekeepers and, as per your
addresses were ailing from Back Orifice infec- to your access to the Net. Firewalls rule-set, show a port as open or closed
tion. In addition, around 24 NetBus infections also work in a reverse manner by for communication. Hence, you can
were identified. Another test they conducted blocking access to outside traffic, thus block ports that you don’t use or even
involved nuking and pinging (see Glossary) the managing to ward off attacks. This is block common ports used by Trojans.
very same pool of IP addresses using two differ- done by monitoring the ports and the Using firewalls, you can also block
ent DoS (Denial of Service) tools. They succeed- protocols that the outside application protocols, so restricting access to Net-
ed in around 50 per cent of the cases. is trying to use. The main protocols BIOS will prevent computers on your
Now if your’s was one of the machines under used for Internet access, TCP and UDP, network from accessing your shared
attack, you must have wondered what you did use port numbers to distinguish folders. Firewalls often use a combina-
wrong to suddenly find your machine crashing. between different logical channels on tion of ports, protocols, and applica-
So you see, it is not necessary for a person to actu- the same network interface card. tion-level security to give the best
ally know you, or your IP address, to gain access There are 65,536 logical ports possible results.
to your machine. If your machine is infected or
prone to exploits, then even beyond the anonymi-
ty of a dynamic IP address, your PC can be (version 3.02 beta) were used to scan the Test
hacked. A personal firewall, therefore, is one of Bench. With both the scanners, the machine was
the methods you can use to deny access to such first scanned before installing any firewall and
intrusions. So, let’s get personal with the firewalls. then scanned after the firewall was installed.
Apart from these port scanners, we tried More Info on
TEST PROCESS accessing SubSeven Server on the Test Machine the test process and the
The Test Bench in which the firewalls were using the SubSeven client. At the same time, we products tested
installed consisted of a Pentium 266 MHz also used certain application exploits such as Software
processor with 64 MB RAM. The operating sys- those for ICQ. To test the ability of the firewall NeoWatch, Sygate and ZoneAlarm
tem in test was Windows 98SE. TCP/IP and Net- to detect ActiveX exploits, we went to certain Mindware
BEUI protocols were installed on the Test Bench sites that, using ActiveX controls or Java applets,
and File and Print Sharing was also enabled uploaded certain files or read certain files from
before installation of the firewalls. The security the local machine.
level in IE 5.5 was medium with prompt before We also created a test HTML page with an
using any Java applets or ActiveX controls. ActiveX control embedded that installed the
To gauge the application-level filtering fea- Thing Trojan on to the machine. We then tried
tures of the firewalls, we installed certain stan- opening the HTML page using IE and noted the
dard software that try to access the Net. Using behaviour of the firewall. Apart from these spe-
these software, we tried to send files as well as cific tools, we also tried nuking the Test Machine
download files from a testing machine. Apart (sending continuous packets of data). The abil-
Contents
from these software, a popular Trojan, SubSeven ity of the firewall to detect and ward off such TEST PROCESS . . . . . .117
2.2 server, was also installed on the Test Bench. intrusion attempts was noted. PERSONAL FIREWALLS117
Testing tools: Using a test machine, we ran cer- In all, we tested 10 personal firewalls for their BlackICE Defender 2.5
tain port scanners on the Test Bench. The *nix- features and performance. And since getting the eSafe Desktop 3
based port best out of your personal firewall requires McAfee Personal Firewall 2.1
scanner, Nmap patience and learning, ease of use or configura- NeoWatch 2.2
(version 2.53), tion settings were accorded the same importance Norton Personal Firewall
and Windows as the actual features and performance. The fea- 2001 (version 2.5)
NT/2000 based tures and performance as measured against the PGP Desktop Security 7
Retina Scanner price gives the value for money for the firewall. (Evaluation version)
The best firewall is therefore the one that has the Sygate Personal Firewall 4
maximum features and gives the best perform- Tiny Personal Firewall 2.0.13
ance at a price that is easily affordable. ZoneAlarm 2.6
Know who is ZoneAlarm Pro 2.6
intruding into Star performers GLOSSARY . . . . . . . . .118
your computer What makes for a good performing firewall? The SCORE BOARD . . . . . .126
with BlackICE answers are simple—the ability to ward off all CONCLUSION . . . . . . .128
Defender intrusion attempts, control applications that can

117
■ select~ t e s t d r i v e

Glossary access the Internet, prevent malicious scripts applets was a grey area with all the firewalls
or controls from stealing information or (except Norton to some extent). Sites man-
TCP: Transmission Control Protocol is the uploading files and prevent Trojans and age to exploit the vulnerabilities in Inter-
method used to transfer information other backdoors from running as servers. net Explorer, Outlook Express and other
between two connected computers over Port scans: The good thing with most of software to steal information or upload
a network or the Internet. In a TCP the firewalls we tested was that they didn’t files. Therefore, even if firewalls do not
implementation, the protocol divides the show up any ports as open in the Nmap and recognise such malicious sites, they should
information into smaller packets, and Retina scans. If at all there was an open be able to warn you when data is being
also at the same time ensures that the port, it was port 139, which is related to retrieved or written to your machine.
packets reach the other side safely. sharing files over networks. The one soft- We were able to easily upload a .hta file,
UDP: User Datagram Protocol is a con- ware that showed up more open ports was which runs a ‘Hello World’ message, to the
nectionless transport protocol, which eSafe desktop. It showed port 139, port Test Bench without the firewalls detecting
means that you do not need to have a 6699 (the port used by the Napster applica- any warning. Only Norton stopped the
connection established between the tion), and other such ports as open. Black- loading of a malicious Java applet on
host and the remote machine before ICE Defender was the most informative in
starting transfer of data. terms of identifying the port scan attempts,
ICQ, for instance, is an application and even recognised the Nmap scans and
that uses the UDP protocol. UDP, how- the actual commands that were being sent.
ever, doesn’t ensure that the packets Intrusion attacks: The differences came up
reach easily, though it is faster. when we tried the application level or OS
ICMP: Internet Control Message Protocol level exploits. Firewalls such as Sygate, Tiny
carries control messages that are used to and eSafe showed up the blue screen
acknowledge and respond to connec- momentarily when we tried an IGMP
tions. For example, the ping command flooding. Others such as Norton Personal
uses this protocol. Firewall, ZoneAlarm and NeoWatch
IGMP: The Internet Group Management became unstable with packet flooding
Protocol is an extension of the IP proto- attacks. However, such intrusion detection
col and a standard for IP multicasting. It attempts had no effect on ZoneAlarm Pro, PGP Desktop wards off most intrusion
is used to inform local routers about the and the Network Associates products— attempts
presence of a member of a multicast McAfee Personal Firewall and PGP Desk-
group. If a host is part of a multicast top Security. These two, in fact, managed another site. We were also able to config-
group, then it is also more prone to to do quite a bit of load balancing by ignor- ure eSafe Desktop to block the .hta file
IGMP flooding. ing such attacks totally, to the extent that we from being uploaded. eSafe employs the
Packet sniffer: Packet sniffing refers to did not even come to know that we were method of selective file-sharing or ‘sand-
monitoring data that is passed over a being flooded with packets. We faced no box’. So for each application, you can spec-
network. You have specific software that problem with exploits targeted at software ify the directory rights (or even file rights)
allow you to sniff the packets that travel such as ICQ or mIRC, and the firewalls in terms of read, write, execute, delete, etc.
and retrieve information from it. were able to ward them off easily. For instance, you can specify that Internet
RATs/Backdoors: Remote Administra- Malicious Web sites: Detection of mali- Explorer will have no read rights over the
tion Tools are a method of controlling cious ActiveX controls, scripts or Java Windows Desktop and System directory,
remote machines using the IP address.
Trojans such as SubSeven and BackOri-
fice are RATs in that sense as you can
control a remote machine if the Trojan is
Scanning through Web Sites
installed in it. Before you start the firewall hunt, you The ASP site of Network Associates
Normally, these Trojans have a server can get your machine diagnosed online Mcafeeasap.com, also gives a free trial to
part and a client part. The server is using Web sites that offer this service. check your system for vulnerabilities
installed in the remote machine and lis- These Web sites normally scan your using PGP CyberCop scanner. The only
tens on a particular port. Using the machine using some commercial port problem here is that you have to register
client, you can connect to the server on scanner to see if there are any ports open first before availing of this facility. There
that port, and then control the machine and report the same to you. are other Web sites which offer a paid
in any way you want. You can even Remember though, that if you are service, and this is more useful if you
enable packet sniffing using some RATs. scanning from a dial-up access, this may have your own Web site or domain
DoS/Nukes/Flooding: Denial of Service take some time. And you cannot be name. Some of the sites offering audit
attacks prevent a target machine from beyond a gateway or a proxy which hides through the Web are:
accessing a network resource. A simple your IP address if you want your machine www.symantec.com
form of a DoS attack is by sending large scanned. www.grc.com
packets of data to a single machine, Symantec’s site even offers to scan www.mcafeeasap.com
thereby making it unstable or even your machine for Trojans and analyses www.securityspace.com
crashing it. the privacy features of your computer. www.automatedscanning.com

118 June 2001


and will have rights only to the Temporary when we tried running the SubSeven serv-
Internet Files and Cookies directory. er and sending it through. None of the
This effectively stops many ActiveX firewalls allowed access to the SubSeven
controls and malicious scripts that down- Trojan when we started the server with the
load files to areas such as the Desktop or firewall running.
Startup menu. Besides specific applica- However, when we made the connec-
tions, you can even create a sandbox for all tion to the SubSeven server first and then
generic applications. For example, no started the firewall, quite a few were found
application will have rights over the root wanting. Norton, ZoneAlarm and
folder. This is quite an innovative concept; NeoWatch allowed the SubSeven client to
no other firewall employed this concept. issue commands such as opening the
SubSeven Trojan detection: Since we were CD-ROM, or hiding the Start menu. Other
testing the firewalls using SubSeven 2.2, commands such as packet sniffing didn’t
which is the latest version and doesn’t even work with the first two, though NeoWatch Block a range of protocols with McAfee
show up in the processes list, we didn’t allowed even these commands. This is a
really expect the firewalls to detect this ver- major security breach because if a Trojan but they lacked protection against mali-
sion. But surprisingly, BlackICE immedi- can start its activities before the start of the cious Web sites. Interestingly, if you can get
ately detected the SubSeven 2.2 Trojan firewall then it can bypass many restric- eSafe Desktop to work properly and tweak
tions. Firewalls that were based on creating its settings, you might get the best protec-
application-level rules didn’t face a prob- tion including protection against Trojans
lem because these were able to detect that and malicious sites. With its concept of
some application was trying to connect to sandboxes, you can virtually guard all your
the Internet. main system files. You can also manually
None of the firewalls we tested were specify ports that should be blocked for
good in all respects. Norton Personal Fire- both inbound and outbound connections.
wall, with support for blocking ActiveX The problem is that we faced a lot of diffi-
and Java applets, could have been a good culties in getting eSafe to work. Configuring
all-round performer but for its failure in this software is also not that simple and
the SubSeven Trojan test. ZoneAlarm Pro requires thorough knowledge of each appli-
The feature-rich Norton Personal Firewall and BlackICE Defender performed well, cation and port, so this is not something

1/2 page AD

119
■ select~ t e s t d r i v e

Security in Cable Space Performance Parameters


Are you more prone to security breach- Firewall Port scanning Intrusion detection Script protection Trojan Detection
es if you are on a cable modem net- BlackICE ✔ ✔ ✘ ✔
work or DSL network? Conventional Defender
logic would seem to think so. While eSafe Desktop Partial Blue screen Yes (through con- ✔
cable modems and DSL still assign you cept of sandboxes)
a dynamic IP address, the fact of the McAfee Personal ✔ ✔ ✘ ✔
matter is that because you are in the Firewall
‘always on’ state, you have the same IP NeoWatch ✔ Highly unstable ✘ Partial
address for a longer duration of time. Norton Personal ✔ Slightly unstable Partial Partial
This gives a person who wishes to gain Firewall 2001
access to your machine more time to PGP Desktop ✔ ✔ ✘ Partial
work towards it. Again, if you are shar- Security
ing a cable modem, as most people Sygate Personal ✔ Blue screen ✘ ✔
are prone to, then your machine is on Firewall
the same network as the others you Tiny Personal ✔ Blue screen ✘ ✔
are sharing the cable modem with, and Firewall
it’s possible that they can gain access ZoneAlarm ✔ Slightly unstable ✘ Partial
to any shared folders that you might ZoneAlarm Pro ✔ ✔ ✘ ✔
have. Apart from the general precau-
tions that are valid for all computer
users, as a cable modem/DSL user you that can just work out of the box. Preset security levels: All firewalls nor-
should also take the simple precaution mally start off with prescribing different
of logging off the cable/DSL connec- Filtering capabilities security levels that you can use. These lev-
tion when you are not using the Inter- Since filtering is the mainstay of all fire- els normally range from low, or not block-
net. walls, there were a number of parameters ing any traffic, to medium and high
on which we tested the filtering capabilities security. With the highest security, you are
of the firewall. normally off the network and will not be
able to connect to the Internet. Depend-
ing on the firewall, you might have three to
four preset levels. These are a good aid for
a new user who is not familiar with the
network protocols or ports.
However, if you want to understand
exactly what these presets do, you aren’t in
luck. Most firewalls don’t give any infor-
mation on the ports or protocols that are
blocked, and you can just forget about cus-
tomising the preset levels. Two firewalls
stand out in this respect—PGP Desktop
and ZoneAlarm Pro. Both of them offer a
description of the protocols that are being
1/4 page AD blocked and even allow you to customise
the settings. PGP’s settings are based on
whether your computer acts as a client or
a server, while ZoneAlarm Pro allows you
to have different customised (or preset)
settings for the local zone (your LAN) and
the Internet zone.
Blocking ports and protocols: Very few
firewalls just block a port—they usually
combine it with specific protocols that
have to be blocked on that port. Norton
has a comprehensive feature as far as
granting permissions for different proto-
cols are concerned. You can even specify
the services that will be allowed on those
protocols and, if you desire, the range of
addresses that can use these protocols.
Norton also monitors specific HTTP

June 2001
Breaking the Firewall
Is a personal firewall the solution to all dependent on you and the rules you cre-
your security problems? Certainly not, as ate. If a suspicious application tries to
many reports would seem to suggest. For access the Internet, your firewall will most
instance, there’s a utility specifically tar- likely give a warning. Now, if you choose
geting ZoneAlarm and ZoneAlarm Pro that to allow this application access, then
stops ZoneAlarm if it is running, and pre- don’t blame the firewall if the application
vents it from starting. Called ZoneMutex , turns out to be a Trojan. That’s the main
this is just a small terminate-and-stay-resi- loophole most cracks for firewalls work
dent (TSR) program. Previous versions of around. It’s the belief that if you are pre-
ZoneAlarm were also prone to an Nmap sented with an application that sounds
scan which was done using port 67 as the familiar (say Explorer.exe or Iexplore.exe), Block protocols in ZoneAlarm Pro
identified port (nmap –g67 –sS <IP address>). you are most likely to give access to this
eWeek magazine also reported another application. It’s therefore possible for a McAfee was a bit different in terms of
crack for BlackICE Defender that allowed Trojan to rename itself as a known appli- the protocols that it supported. While
to get past the firewall. The same crack cation and gain access to the system. most firewalls restricted themselves to
was supposed to work with other fire- Regularly monitor the activities of your TCP and UDP, or added IGMP and ICMP,
walls such as Norton also. firewall and use the NetWatcher utility McAfee had support for allowing or block-
Remember that the effectiveness of a that comes with Windows to check out ing RIP (Routing Information Protocl),
personal firewall is to a great extend your shares. ARP, PPTP, etc. In terms of customising
and ease of use, the simplest to use to block
ports and protocols were ZoneAlarm Pro
ports, and you can add other ports to traffic you want blocked, and then the and Tiny.
monitor. ports on which the firewall will listen to Application-level security: The simplest
Tiny and ZoneAlarm Pro use the con- block the traffic. eSafe or BlackICE had the way a firewall works is by restricting or
cept of blocking certain protocols on a same features, but the difference was that granting permission to applications to
range of ports. In both of these, you can you had to manually enter the information access the Internet. The first time an appli-
select the protocol and the direction of for each port. cation tries to access the Internet, the

1/2 page AD

121
■ select~ t e s t d r i v e

firewalls open up a response box which and the Pro version have separate settings
you can use to allow or disallow that for the local network. In eSafe, the person-
application, and also tell the firewall to al firewall module doesn’t allow blocking
remember this rule for future reference. Network Neighbourhood, but in the
This is a very important feature because it Administrator module, under the privi-
is the best way of knowing if some leges for the user, you can cut off access to
unknown application (or Trojan) is trying local networks.
to access the Internet. In some firewalls, Other features: Different firewalls came
application-level filtering was bundled with many other utilities that added to the
along with the feature to block ports or feature list. Norton and eSafe have the pri-
protocols. Sygate was the best in this fea- vacy or protection of confidential infor-
ture. After you use an application for the mation feature. Here, you can specify
first time and create a rule to allow it, you confidential information that you do not
can specify the IP addresses that this appli- want transmitted to any Web site or non-
cation can use, the range of ports that are Sygate is the easiest to configure secure site. So, you can easily enter some
allowed, and even schedule a period-range digits of your credit card, and block this
during which the application can be run. host name. In some firewalls, you can cut information from being passed. Norton also
ZoneAlarm Pro also offers some features off access to the Internet using the IP allows you to block referrer logging, that is,
related to application-level filtering in address range, or by setting the security sites you visit will not know where you came
terms of ports and protocols that are relat- level to the highest. ZoneAlarm Pro has a from. You also have the provision to block
ed to the application. You can also specify single icon that allows you to immediately cookies. Some firewalls also come with pass-
whether the application has access to the stop access to the Internet. word protection features. Tiny is the only
local zone or Internet zone, and whether Into the Network Neighbourhood: one that has a remote administration utili-
the application can act as a server to other Intruders don’t just exist in the Internet ty. eSafe also ships an antivirus package
programs trying to connect to it. space—they could be people who are sit- along, while PGP has features relating to
Blocking IP addresses and Web sites: ting next to you in a cyber cafe or in office digital signatures and protection for VPNs
Although it is not traditionally part of a and sharing the same network connection. (Virtual Private Networks).
firewall’s job, most firewalls nowadays So, firewalls should ideally also protect you Among the various firewalls, it is evi-
sport this feature. They can be used to from intrusions coming from the local net- dent that ZoneAlarm Pro and Norton Per-
block access to malicious Web sites or as a work, and even deny certain computers sonal Firewall 2001 have the maximum
content filtering tool. They can even access to files shared on your PC. Most fire- number of features.
restrict access to machines in the local net- walls didn’t sport this feature, and even if
work. Most firewalls just ask you to speci- they did, it didn’t work properly and we Ease of use
fy the IP addresses that have to be banned. could easily access shares on the Test A firewall may perform well and have loads
Norton allows you to ban IP addresses or Bench. eSafe, Norton, ZoneAlarm and of features, but if it is difficult to configure
host names (including subnets) in con- ZoneAlarm Pro were the only ones that and access the features, then all the good
junction with the protocol. PGP works in allowed disabling of file sharing to banned qualities are of no use. Ease of use is there-
a similar fashion. ZoneAlarm Pro has a computers on the local network. In Nor- fore an important criterion in choosing a
separate module that allows you to create ton, you could do that by restricting pro- firewall, and we looked at factors such as
a restricted zone based on IP address or tocols to local addresses, while ZoneAlarm interface, configuration and reporting to
judge the firewalls.
Configuration: With most firewalls, you
Tracing back the Intrusion could start working out of the box using
just the default setting, without having to
If you are facing a number of intrusion Zone Labs, and also monitors the informa- configure anything. This is true especially
detection attempts, then if you have the tion that is sent, so you can even keep in the case of application-level firewalls.
time and inclination, you can take some your identity a secret. You should report Here, every time an application tries to
proactive measures. Most firewalls tell you such attacks as it helps security organisa-
the IP address of the machine that made tions build a database of places from
the intrusion attempt. A firewall such as where intrusion attacks are being made,
NeoWatch also comes with the NeoTrace and try to ensure that they don’t happen
utility that allows you to backtrace to again. If you get the IP address, even you
where the intrusion attempt came from, can report the intrusion to the ISP from
and also report the intrusion to its Web where the attack came or to the domain-
site. NeoTrace basically performs a trace hosting provider. The ISPs and Domain
route operation on the IP address to find space providers normally have a policy
out where the address originated. You can wherein their IP addresses cannot be
do the same using the command tracert <IP used for such intrusion activities, and can
address> in your DOS prompt. ZoneAlarm therefore remove the offender from their
also allows you to report an intrusion to network.
Filter the results in NeoWatch

124 June 2001


access the Internet, you are presented with different users based on the Windows
the option of allowing or blocking it. Even login. But every time you change some
for configuring other parameters such as configuration for the firewall, you have to
ports or protocols to block, you normally again assign the configuration to the par-
have a tabular or drop-down menu to ticular user for the changes to take effect.
select the options. Strangely enough, quite a few firewalls
If, however, you need an example of do not give the configuration option in the
how a great software can be killed by bad main toolbar itself. Instead, you have to
configuration parameters, don’t look navigate through some menus. In the case Tiny is one of the free personal firewalls
beyond eSafe. Getting this software to of Norton, you have to go through two lev-
work was a big difficulty. The software els, whereas Tiny has two separate windows occurred. But if you keep a high security
gave an ‘illegal operation’ error on two for ‘status’ and ‘administration’. ZoneAlarm level, be prepared for friends or colleagues
machines due to problems with the and ZoneAlarm Pro are quite good in that putting up a No-honking Zone sign near
Winsock implementation. Finally, we had respect with icons for different options you in protest.
to format our Test Bench again and load arranged in the main window itself. Keeping track: Event logs are the best way
eSafe before other applications to get it Danger signs: Personal firewalls do their to keep track of the activity in your disk.
working. Yes! All set, we thought… but no, work in the background while you are Basically, alerts are created on the basis of
that was just the beginning of the prob- involved with some other application. The the rules you have created, and most fire-
lems. icon in the taskbar is probably the only walls allow you to log these alerts to a file.
Try installing any software, and eSafe way you come to know that the firewall is While McAfee has an activity log feature
still alive. But then, how do you know in its menu, the log file was one of the
when you are being attacked? worst, filled with hex-dump and http
One way is to have a pop-up menu for headers of Internet activity that are of no
every intrusion detected. But imagine use. Sygate kept the best logs. It had event
being disturbed every 30 seconds with an logs in four categories: Security logs (noti-
alert screen just because somebody hap- fication of all intrusions), System logs
pened to access your shared folder in the (basic system information relating to the
local network. Alternatively, these firewalls starting of Sygate), Traffic logs (details of
indicate through flashing signs in the the network and Internet traffic) and
taskbar what kind of attack you are under. Packet logs (information on the packets
The icons that Sygate used were among transmitted, along with the hex-dump).
the most intuitive and were clearly visible All these details were given in neatly tabu-
even in the taskbar. Down and up arrows lated format, along with details of the local
were used to denote inbound and out- and remote host and the ports on which
Supressing alerts in ZoneAlarm Pro bound traffic, respectively, and red signals the connection was made. Just don’t keep
denoted blocked traffic or intrusion detec- the file size for the packet logs too high,
comes up with a number of messages that tion. Even with Norton, you could make since it puts quite a bit of load on the
are plain irritating. You cannot stop the out an alert from the way the icon flashed. system.
eSafe engine without deselecting the ZoneAlarm had these bright yellow colour Even Norton had many logging
option in the Windows system configura- flashes that were hard to miss, although options, but you can’t exactly make out the
tion, which means that you have to restart they didn’t tell you about the nature of the fine distinctions between the different
the machine. Again, eSafe employs the attack. Some firewalls also allowed you to logs. BlackICE and Norton also provided a
good concept of user rights, wherein you send an alert to an e-mail address or play graphical representation of the intrusion
can have different firewall settings for an audible sound when an intrusion attempts in terms of the history of the

Reading the Warning Signals

Firewall Configuration ease Intuitive Taskbar Sounding alerts Log file format Filtering logs Graphical
icons representation
BlackICE Defender Partial ✘ ✔ Average ✘ ✔
eSafe Desktop ✘ ✘ ✔ Average ✘ ✘
McAfee Personal Firewall ✘ ✘ ✘ Poor ✘ ✘
NeoWatch ✔ ✘ ✔ Good ✔ ✘
Norton Personal Firewall 2001 ✘ ✔ ✘ Good ✔ ✔
PGP Desktop Security ✘ ✘ ✔ Average ✔ ✘
Sygate Personal Firewall Partial ✔ ✔ Good ✔ ✔
Tiny Personal Firewall ✘ ✔ ✘ Average ✘ ✔
ZoneAlarm ✔ ✔ ✔ Average ✘ ✔
ZoneAlarm Pro ✔ ✔ ✔ Average ✔ ✔

125
Specifications
DETAILS OF THE FIREWALLS
Firewall BlackICE Defender eSafe Desktop 2 McAfee Personal NeoWatch 2.2 Norton Personal PGP Desktop Sygate Personal Tiny P
2.5 Firewall 2.1 Firewall 2001 2.5 Security 7 Firewall 4 wall 2
(Evaluation)
Performance
Blocking port Yes Partial Yes Yes Yes Yes Yes Yes
scans
Intrusion blocking Yes Blue screen Yes Highly unstable Slightly unstable Yes Blue screen Blue s
Trojan Detection Yes Yes Yes Partial Partial Partial Yes Yes
Features
Preset levels 4 3 3 5 3+3* 6 3 3
Port blocking Yes Yes No No Yes (with protocol) No No Yes (w
Protocol blocking Yes (with port No Yes No Yes
blocking) Yes No Yes
Application level No Yes (with sandbox) Yes No Yes (with protocol) No Yes Yes (w
security
IP address filter Yes No No Yes Yes (with protocol) Yes (with protocol) Yes Yes (w
Blocking Web sites No Yes No No Yes No No No
Restricting file Yes Yes Yes No No
sharing Yes Yes No
Privacy feature No Yes No No No
Ease of use Yes No No
Configure from Partial No No Yes No
main menu No No Partial
Intuitive taskbar No No No No No
icons Yes No Yes
Sounding alerts Yes Yes No Yes No Yes Yes No
Filtering logs No No No Yes Yes Yes Yes No
Graphical repre- Yes No No No Yes No Yes Yes
sentation
Contact & Network ICE Aladdin Knowl- Network Associ- NeoWorx Symantec (Con- Network Associ- Sygate Tiny S
Developer edge Systems ates (Phone: tact: Tech Pacific, ates (Phone: Technologies
9821019104, E-mail: 022-5960227, 9821019104, E-mail:
annette_castelino adil@techpacin- annette_castelino
@nai.com) dia.com) @nai.com)
Web site Networkice.com Esafe.com Nai.com Neoworx.com Symantec.com Nai.com Sygate.com Tinyso
Price $40 (approx) Free for personal $29 $40 $50 $60 Free for personal Free f
use use use
Rating B B+ B B- B+ B+ B+ B

* Levels for Security and Privacy ** Levels for local zone and Internet Zone
■ select~ t e s t d r i v e

attacks and the packets that were blocked


or filtered. With BlackICE, you could even Safety Measures
filter the logs in terms of their severity, while
other software such as Sygate allow you to ■ Disable File and Print Sharing if you are the Running Tasks. To turn off a specific
view logs of last 24 hours, last week, etc. not going to be on a network. application, you have to edit the registry.
Both ZoneAlarm and ZoneAlarm Pro ■ Update your antivirus signature files ■ Regularly check the event logs of your
logged the results to a text file, but in the regularly…don’t be lazy about it. Use a antivirus software or personal firewall.
Pro version you had an option to suppress specialised Trojan cleaner if necessary. ■ Disable ActiveX and Java and uninstall
logs for common events such as accessing ■ Regularly apply security patches to your Windows Scripting Host if not required.
shares. However, ZoneAlarm restricts the software (especially Windows and IE). ■ Turn off macros in Microsoft Word and
maximum alerts at a time to 500, after ■ Don’t open e-mail attachments if you Excel or keep macro protection on.
which you have to clear the old alerts to don’t know what they contain. ■ Use the command netstat -a to check
receive the new ones. ■ Don’t allow unknown applications the open ports in your machine. Check
access to the Internet or to your machine. the open ports against the common list
Pricing, support and documentation Use the System Information utility (Start > of Trojan ports to see if Trojans are listen-
The last parameter under consideration Accessories > System Information) to check for ing to some ports.
was support, documentation and price.
There are firewalls that are free for per-
sonal use. This means you can use them at CONCLUSION As we said earlier, even in the realms of
home, but using it in office would require To say that there is a proliferation of secu- anonymity, you can be at risk. And if you
you to purchase a license. Among the 10 rity-related products these days is an are not worried about spending around
firewalls tested, eSafe, Tiny, Sygate and understatement. Major players such as Rs 2,000, then you should definitely go in
ZoneAlarm are free for personal use. The Symantec or Network Associates have a for a paid personal firewall. ZoneAlarm
price of the other firewalls ranged from range of suites for the same target audi- Pro wins easily when compared to the
$30 to $50 (approximately Rs 1,400 to Rs ence, each with slightly varying features. other firewalls.
2,300), though PGP was pretty expensive For instance, apart from Norton Personal It did well in all the parameters—its
at around $60 (approximately Rs 2,700). Firewall, Symantec also has Norton Inter- performance was good barring the lack of
This is because PGP also includes support net Security and Norton Internet Security support for ActiveX controls, it had very
for digital signatures and VPN. Family Edition, which extends the firewall good features that were highly customis-
What is the difference between a free ver- feature to include blocking of ads, parental able and more than anything else, using
sion and a paid one, you may well ask? Apart controls, etc. ZoneAlarm Pro is not at all difficult.
from the fact that the firewalls are only free The nearest competition comes from
for personal use, there is a noticeable differ- Norton Personal Firewall 2001 (version
ence between the paid software and the free 2.5). The only area where Norton didn’t
ones, as evident in ZoneAlarm and fare that well was in the SubSeven Trojan
ZoneAlarm Pro. The Pro version has every- detection test. Otherwise, in terms of fea-
thing that the free version lacks and even tures it was more than a match for
performs better in the intrusion detection ZoneAlarm Pro with its inclusion of pri-
tests. There’s no instability with ping flood- vacy features as well.
ers and IGMP attacks and there are a num- But using Norton isn’t as simple and
ber of feature enhancements that allow you that’s another area where it lost out. A new
to customise almost every feature. version of the Norton Personal Firewall
However, eSafe really gives you value for (version 3.0) has been released, and it’s
money. It ships with an antivirus and a sys- quite possible that this version is better
tem monitoring utility, and can be tweaked than the one we tested, with enhanced per-
with a bit of difficulty to give very good per- formance features.
formance. However, if you want to use a firewall
Apart from Tiny, the other firewalls just for personal use, and have a problem
came with some documentation and help with the price, then you can easily use one
files. Even NeoWatch had only online sup- of the free firewalls. Here, it’s a toss-up
port. McAfee had one of the most illustra- between ZoneAlarm and eSafe Desktop. If
tive guides, while the products from Zone you can configure eSafe properly, you will
Labs started off with a tutorial. NeoWatch Similarly, McAfee has McAfee Inter- get much better performance out of it than
and ZoneAlarm also featured reporting of net Guard Dog (also in a Pro version), what ZoneAlarm will give. Add to this the
intrusion attempts to the developers for which essentially does the same. The feel- fact that eSafe comes with its own antivirus
information. ing of paranoia, especially in cases of scanner, which can be quite useful.
All the firewalls also offered a feature e-commerce transactions and given the However, don’t expect a personal fire-
to update the software—in some cases number of defacements of Web sites are wall to be a cure for all your problems.
this was automatic and in other cases the primary reasons for such a large There are a lot of precautions you have to
you had to manually update from the number of new software to emerge in take beyond installing a firewall before you
Web site. this category. are truly in the safety zone.

128 June 2001


Imaging: RAM

How you wish you ROSSI FERNANDES AND YATISH SUVARNA programs that can be used to monitor or even
could get rid of ikes, what is that weirdly named file on your control the functioning of the infected computer.

those viruses on
your machine. A
look at the top
Y hard drive? Is it a game? Is it a joke? Guess
again—you’re infected by a virus! With the
advent of broadband Internet connectivity,
DVDs and the ubiquitous CDs and floppy disks,
there exist many potential ports through which
So remember that the next time your kid sis-
ter downloads that new game from the Internet
or one of the guys at work accesses a new Flash-
enabled Web site, your home computer or office
network could be subject to virus threats. The
malicious files and content can enter your com- consequences of having a virus in your system
antivirus software puter. Add to that backdoors or certain sections in could be anything—from an annoying message
for your needs applications that developers keep open either wil- on your monitor, to a full-blown failure and cor-
fully or for development work. Potentially harm- ruption of your data, operating system and appli-
ful files can be placed on your computer through cations. So long as there is software, there will
these ports. Once this happens, there are always be a certain breed of people who are intent
on wreaking havoc on computers for no appar- sheet. We also looked at
ent reason. Hundreds of new viruses are put out aspects such as availability
in the wild every year. Starting to feel panicky? of regular updates. Based
One of the best approaches to battle this scourge on the weightage assigned
is to face the problem head-on with the help of to the various parameters,
antivirus (AV) software. we reached the final score.

TEST PROCESS Detecting the deadly viruses


The antivirus comparison test was done on a Whether a virus is detected
system running a P-III 700 processor with or not is the most important
64 MB of RAM. The hard drive used had a performance criterion. We
capacity of 5.7 GB. The operating system on the tested the detection rates by
test bed was Microsoft Windows 98SE, which two methods—detection of
was loaded with all the drivers. We took an 7,400 viruses in an uncompressed format, and
image of this system before running the tests on detection of 4,700 viruses in a compressed file.
each of the AV packages. This disk image was The viruses were a mix of actual signature files
restored after each package was tested. and infected files. In the case of infected files, we
A good antivirus should be able to find also looked at the ability of the antivirus software
present-day viruses and detect code that could to clean the viruses. Another thing we did was to
be potentially harmful. And, of course, it should check the ability of the virus scanners to detect
be able to successfully remove the malicious por- the 10 most common viruses. More Info on
tion of an infected file while leaving the data Most of the virus scanners performed well in
the test process and the
intact. The emphasis of this test was more on the detecting viruses in the uncompressed format, products tested
detection feature, since an antivirus software will except for QuickHeal, which was able to detect
usually clean the files it detects (or an update to an abysmal 57 per cent of the viruses. The other Software
the definition files will be able to do that). virus scanners detected around 90 per cent of Antivir, AVG, McAfee
To run the antivirus software through their the viruses. Antivir came out the best, with a check out
paces, we took a collection of around 7,400 98.26 per cent detection rate, followed closely by Mindware
viruses along with some of the popular Trojans InoculateIT. All the virus scanners were able to
that are floating around. This collection was cal- detect and clean the 10 common viruses.
culated to put a lot of strain on the antivirus The differentiation among the virus scanners
software. Most of the viruses used were exe and was quite noticeable when we looked at the
com infecting viruses along with some boot sec- detection rates for viruses in compressed files.
tor viruses, including a mix of actual signature Three of the eight virus scanners (QuickHeal,
files and infected files. The col- eScan, and McAfee) actually buckled under the
lection also included Trojans strain and crashed while attempting to detect
and macro viruses in the viruses in compressed files. Apart from AVG,

BUSTERS
archive. InoculateIT and Norton, even the others didn’t

Contents
TEST PROCESS . . . . . . . . . .131
ANTIVIRUS SOFTWARE . . .131
There were two main virus scanning tests, perform well, with F-Secure detecting only about
Antivir 9x
which included the main uncompressed file 2 per cent of the viruses in the compressed files.
AVG
scanning test and the compressed virus scan-
eScan
ning test that we ran on each of the antivirus Time for scan
F-Secure
software packages. In this comparison test, we Do you shy away from doing a full system scan
InoculateIT
only evaluated antivirus software targeted for on a regular basis because just the thought of the
McAfee 5.1
personal use or a small networked environment. hours it will take puts you off? Consider a soft-
Norton AntiVirus 2001
We did not look at enterprise-class antivirus ware such as InoculateIT, which has a good
QuickHeal 6.0.1
protection suites or client-server based antivirus detection rate, and is able to scan the hard disk
TABLE:Antivirus
applications. (of a 1 GB partition) in 6 minutes flat. To a large
Specifications . . . . . . . . . . . . 134
The overall score for each software was decid- extent, the scanning time is dependent upon the CONCLUSION . . . . . . . . . .134
ed by logging the various features, performance options that you have selected. Pure detection is
rates, ease of use and test results into a spread- faster, but if you select options for cleaning,
■ select~ t e s t d r i v e

during the boot e-mail, etc. With Norton, you can specify
process, so there is the auto-protect feature to work even
an increase in boot- when you just access a folder and don’t
up time. If you are a necessarily double-click on the executable.
performance freak, You can also specify the file extensions that
you will want this you want to be checked apart from the
difference to be default ones.
minimised even Even QuickHeal has standard features
while you get maxi- like scanning inside compressed files (.ZIP,
mum protection. ARJ) apart from other features such as
With a 35-second scanning inside compressed executable
time difference, files, heuristic scans, etc. There is also a File
Norton certainly Integrity option to recover a file from
increased the boot- unknown virus infection. The other fea-
prompting, or performing quarantine, then up time considerably. On the other hand, tures include live database updates, online
the time taken increases. That’s probably Antivir made just a 3-second difference. protection presence and a Virus List con-
one of the reasons why Norton took as Therefore, if you happen to use taining virus information. A variety of
much as 48 minutes for the entire scanning power- and resource-hungry applications scanning configurations, such as the pos-
process, while McAfee took 54 minutes. It such as image-editing or 3D authoring sibility of including and excluding specif-
also seemed very strange that QuickHeal software, then remember that the heavier ic file types, etc, generating scan reports,
took 51 minutes for a scan, considering that antivirus software will definitely slow scheduled scanning and rescue informa-
its detection rate was quite low. down your other applications while it is tion, is also available.
There is hardly any difference if you running. If your main focus is using your F-Secure has an option wherein the
scan for all files (including compressed application, you might do better to go in network administrator can configure glob-
files). Again, InoculateIT took just 4 min- for an antivirus package that is a lesser al security policies for the company and
utes to scan the partition with the com- strain on the system, even if it compro- automatically update different servers
pressed files. Admitted, InoculateIT is fast, mises on some functionality. within the company with the predefined
but then it didn’t actually manage to clean security policy. InoculateIT was a disap-
the infected files very thoroughly. Norton, Features pointment. After having done so well in its
which had a good cleaning rate too, man- All the software should offer standard fea- detection capabilities, it lost out on the fea-
aged the scan in 40 minutes. Three of the tures such as options for boot sector scans, tures count.
software crashed at varying points while scanning before startup, creating emer-
scanning within compressed files. gency diskettes, scanning within com- Ease of use
pressed files, etc. Feature-rich scanners will Understanding the configuration and
Eating up resources also include options for scheduled scan- interface is quite important if you want to
It’s important that your virus scanner ning, network scanning, scanning within get the best out of your antivirus software.
does not eat up a lot of your system e-mail, heuristic scanning, etc. This is especially true of the auto-protect
resources. Otherwise, if you do a full- Norton 2001 was one of the most fea- option if a virus is detected. Most antivirus
system scan, you will have no option but ture-rich antivirus software. It provided software offer options such as automatic
to sit twiddling your thumbs for the 30- for script blocking (preventing viruses cleaning, prompt for response, delete if the
odd minutes it takes to scan. Even the such as Melissa), task-based scanning, virus cannot be repaired, etc. If you con-
auto-protect feature shouldn’t hog mem- scanning before you download, scanning figure this beforehand, the virus scanner
ory, else your other applications may will work in the background without
become slow. unduly disturbing you.
We used a utility called Cache Manag- In this respect, Norton offers a number
er to evaluate how resource-hungry these of configurable options, including graph-
software were and how much system ical alerts. McAfee and QuickHeal provide
memory was consumed while these pro- some customisation features as well. One
grams were running in the system tray. of the simplest to use was F-secure with its
F-secure took up the most system totally integrated single-point menu and
resources—9.3 MB of the available RAM icons. McAfee uses the concept of panels
in the system. Next came eScan with 4.6 wherein the options are lined up in one
MB. One of the leanest programs was pane and clicking on them gives you mul-
AVG, which just ate 2 MB of system tiple options.
resources. However, the lightest of them Reporting features are equally impor-
as far as resources are concerned was tant if you want to understand the nature
QuickHeal, which consumed only 1 MB of the antivirus attacks you are facing
of RAM. and which files they are originating from.
Another aspect we analysed was the dif- All the antivirus software allow you to
ference in boot-up time. Antivirus McAfee sports a cool interface and is rich create logs of your scan. These logs are
software normally checks your machine in features automatically generated when a virus is ➜

132 June 2001


■ select~ t e s t d r i v e

Specifications
The Antivirus Details
Name Antivir 9x AVG eScan F-Secure InoculateIT McAfee 5.1 Norton AntiVirus QuickHeal 6.01
2001
Contact Free AV Grisoft Microworld Crystal Solutions Computer Associates McAfee N&N Systems and Cat Computer
Software Services Pvt Ltd Softwares Services
Price - - Rs.1800 Rs.2500 - Rs 1,200 Rs 1,600 Expree-Rs.500
Standard -Rs.1800
Phone number - - 022-8265701 022-5093111 - - 022-4444601 020-6122173
Fax number - - 022-8344750 022-5093112 - - 022-4465097 020-6122173
Web site www.free-av.com www.grisoft.com www.mspl.net www.f-secure.com http://antivirus.cai.com www.mcafee.com www.symantec.com www.quickheal.com
E-Mail - - vig@mspl.net - - - info@bom.nandn.com cat@vsnl.com
Features
E-mail checking NO YES YES NO NO YES YES YES
DOS bootup check NO YES NO NO NO YES YES YES
Browsing virus scan NO NO NO NO YES - proxy YES YES YES
Download scan NO NO NO NO NO YES YES YES
Script blocking NO NO NO NO NO YES YES NO
Compressed File YES YES YES YES YES YES YES YES
Scanning
Performance
Viruses detected 98.96% 90.59% 92.39% 92.38% 97.12% 91.08% 89.09% 57.11%
(uncompressed)
Viruses detected in 23.57% 92.87% crashed 2.23% 92.06% crashed 85.44% crashed
compressed files
Time taken to scan 0.06 seconds 0:04 seconds crashed 0:40 seconds 0:04 seconds crashed 0:34 seconds crashed
compressed viruses
Resource (MB of 2.5 2 4.6 9.3 3.5 4 4.5 1
RAM used)
Boot up time 3 22 19 22 7 15 35 9
difference
Rating B B+ B- C+ B+ B+ A- B-

detected or cleaned. F-Secure has a log definitions. There is no concept of pro- Among the viruses that were tested, Inoc-
that opens up as an HTML page in your gressive updates—that is, if you update ulateIT, AVG and Antivir are really coack-
browser. Norton has one of the best your virus definition files for a particular ages that you can look forward to for
interfaces, while McAfee comes a close week, the next time you update, you general system security, Antivir has a good
second. should just be given only the new virus virus definition set, and had the maximum
definition files. detection rate. Inocu-
Get the update Some software also give you options lateIT also had quite a
Even if the antivirus software gives good for what you want to update. You can good detection rate,
detection rates, there’s no way the software choose just to update the rescue disk, and it did
can keep track of the new viruses coming the virus definition files, or well in checking for
up every day. The only way to be up-to- even the scanning engine. F- viruses within com-
date is by regularly installing updates to Secure offers you even more pressed files.
the signature or virus definition file. The options wherein you can AVG had a problem
software normally allows for automatic select the categories of defi- in cleaning some of the
updation of files or you can download the nition files (macro, boot sec- infected files and
updates from the Net. Earlier, while updat- tor, etc) that you want to therefore lost out on that count. In
ing the definition files, you had to manu- update. You can select the spite of impressive features, McAfee
ally stop the auto-protect feature, copy the automatic update feature or failed in detecting viruses within
definition files to the directory where the even schedule updates, but compressed files.
software is installed, and then restart the for that you have to be The best all-round performer
machine. Now, you can dispense with this online at the time you have was Norton AntiVirus 2001 . Good
manual process. The antivirus program scheduled the update, and detection and cleaning rates, excellent
updates the file on its own without even with a dial-up line this might features and Live Update options truly
asking for a restart. not always be possible. Norton even sup- make it the best performer. True, it’s a bit
In McAfee, updating your virus defi- ports a feature wherein you can send a resource-hungry, but what the heck, you
nitions can be a bit time-consuming suspicious file for scanning at their can compromise that much to keep your
because sometimes the entire scanning research labs. system bug-free.
engine is updated instead of just the virus CONCLUSION

134 June 2001


■ select~ t e s t d r i v e

IN TEST: 10 ACCOUNTING SOFTWARE

G ACT
LAN C I N
BA Photograph: Rahul Sharma

MITUL MEHTA ate, that the interface would be simpler, or that


Accounts in a big he sheer thought of keeping accounts can it wouldn’t be so darn difficult to figure out how
mess? Whip them
into shape with
financial accounting
T make even the biggest business stalwart
dizzy, considering the tedious nature of the
work and the enormous effort that goes into
maintaining account books and preserving
them for the 10 years required by the law. Little
the whole thing worked?
Over the years, software developers have
been trying to keep the customer satisfied by
making fundamental changes to make their
software more user-friendly. They have also
software wonder that most people have switched over to been trying to zoom in on the specific needs of
using computers for this purpose. different types of users, because in practice,
Of course, who hasn’t wished that financial these software have to cater to a large variety of
accountancy programs would be easier to oper- customers, from home and SoHo (small office ➜

135
■ select~ t e s t d r i v e

home office) users to medium and


large enterprises. End-user Talk
This comparison test focuses on
software created for the SoHo and We talked to several people who have used
small business segment. While Tally all kinds of accounting software on the job
has always been a hot favourite and found that many big companies prefer to
of this segment, the past year has use Oracle as their main database and
seen competition heating up with accounting software because it allows them
newer and better accounting software to do live updating of accounts and calcula-
being launched, offering you more tions with ease. Others told us that their com-
choices. panies used custom-made software to satisfy
their needs. However, there are others, such
TEST PROCESS as JM Waghela, who have been using
To determine the overall performance accounting software such as Tally since a long
of the accounting software, we evaluat- time. Tally has been a long-time favourite with
ed a range of characteristics. These includ- the accountancy community. People like
ed the type of features the software using it because of its simple interface, and
incorporated, whether it offered value for money also because they are so familiar with all its
and whether it provided adequate help for a per- aspects by now.
son to be able to work with it smoothly and Although old habits die hard, we decided
without hassles. to introduce Waghela to some other account-
Features, rather than technical specifica- ing software. He found Wings 2000 Pro really
tions, form the core of a test such as this. We interesting and easy to use. So much so that
made a note of features such as inventory when we asked him which one he preferred,
control, management information systems, he picked Wings 2000 Pro!
multilingual support and security, and gave
points for each of them to help us compare the
products. feature was well-supported by DOS-based
Cost is an important consideration. A prod- applications like ACE and Easy Accounting. But
uct may be cheaper but may have only a single they were no match for Windows-based pack-
user license, which would be beneficial for a ages such as Simply Accounting, which comes
home user, but not for a SoHo user who has with a Crystal Report writer that gives users
more than one computer. The software should complete freedom to create and design reports
be able to balance efficiency and features with a of their choice.
suitable price. Regarding MIS reports, most of the packages
tested provided a basic level of reporting such as
Features accounts receivable/payable, cash/bank book,
The packages we tested contained a host of fea- and ageing analysis of debtors/creditors/stocks.
Contents tures, from a simple data entry screen that even Tally has the distinction of providing the maxi-
a novice can understand to printing MIS reports mum number of financial reports. It gives users
TEST PROCESS . . . . . . . . . .136 that only top managers and CFOs require to the option to use ratio analysis to determine, at
ACCOUNTING SOFTWARE 136 make important business decisions. any point, the company’s working capital, oper-
Account21 Some of the features we gave more weightage ating cost, return on investment, return on
ACE to were inventory control, security, support for working capital, etc. Simply Accounting stands
Arthalekha graphics in the form of graphs and charts and out because of its ability to present reports
Easy Accounting MIS support for accounting as well as for graphically as well.
EX Next Generation 1.5 inventory. Like housekeeping is important in every
FACT 1.9 Out of the packages we tested, only two were aspect of life, so it is with these packages. A lot
Simply Accounting DOS-based. The rest were 32-bit applications of data input takes place and maintaining that
Tally EIS 5.4 running on MS Windows with a graphical user data in a healthy format is essential. It is impor-
Wings2000 interface. tant that the software allows you to back up data
Wings2000 Pro A convenient feature for new users is tem- not only on floppy disks, but on other available
BOXES plates. FACT, Tally and Wings, all have good media as well. And if the package can support
End-user Talk . . . . . . . . . . .136 templates. Simply Accounting even has a tem- export and import of data, that is a definite
Curb Piracy! Go for Free plate for creating and selecting a type of compa- plus point.
Software . . . . . . . . . . . . . . .138 ny, where you get to choose from at least 50 Once again, Account 21, Tally, FACT and
Selecting the Package . . .139 different types of businesses. The DOS-based Wings scored over the others. Account 21 even
SCORE BOARD . . . . . . . . . .140 packages lacked this feature. has a proprietary explorer that allows users to
DECISION MAKER . . . . . . .140 Document designing is another feature of view complete details at a glance, and even
CONCLUSION . . . . . . . . . . .140 interest, because not all default reports and make changes if required. While Simply
documents will suit your requirements. This Accounting does allow you to take backups on ➜

136 June 2001


■ select~ t e s t d r i v e

any media, export and import can only shelling out all that extra money for a lead- regular features, they also incorporate
be done from the MS Access database ing software if you’ll never use half of its other features that a mid-sized business
management application. hi-fi features. So first identify the software would require. Features such as an excel-
Another feature we checked out was that fulfils your needs, and then see if the lent graphical user interface, MIS report-
whether the application allows viewing a price tag is justified. ing facility and multi-user facility makes
screen in full-screen mode. We found that Of the software we tested, Wings2000 them complete financial accounting
Tally, Simply Accounting and Arthalekha is absolutely free and it provides some packages.
had the option of being viewed on the full really decent features that would satisfy
screen, whereas the others were most home users. But Security
limited to being viewed only in the default when it comes to We are all extremely cautious about who
size specified by the application. advanced features, it should know how much about our mone-
Arthalekha has the dis- falls flat and that’s tary transactions. For a businessman, it is
tinction of being complete- where software like extremely necessary to have total control
ly multi-lingual. At the Tally, FACT and Sim- over how he wants his accounts to be han-
main menu itself, there is a ply Accounting score. dled. Many financial accounting packages
toggle button that allows If you have a low- allow you to hide or completely disable
you to switch between end machine such as a certain features depending on who is using
Hindi and English. While 486, a DOS-based pro- the package. You can create multiple users,
Wings Pro also provides gram is the way to go. and define rights regarding which features
multi-lingual support, it While ACE and Easy they can use.
does so at the report level Accounting provide fea- Besides multi-user security, encryp-
and not at the menu level. tures such as graphical tion is another way to keep your data
representation of your safe. We gave higher scores to software
Value for money data and password facility, that support data encryption and multi-
While price is undoubted- their prices are a bit steep. ple users.
ly an important factor, it And although your journal, Simply Accounting, FACT, Arthalekha
should not take prece- ledger, bank and cash details are all and Accounting21 provide intensive
dence over the quality of looked after, you might still miss the GUI security features. However, they have an
the software. So the key is to that you’ve become used to with Windows. open database format, which means that
keep the price factor at the back Account21 would suit a small busi- files created are not saved in the encrypt-
of your mind and first look out for features nessperson, with features such as multi- ed format. Tally was the only one that
you need. Ask yourself what you want out currency, reminder letters to debtors and provided encryption support.
of the financial accounting software. Is it good security options, although you EX, which uses the MS Access data-
just the usual ledger journal and voucher would have to pay more for a multi-user base, provides almost no security for the
entries that need to be taken care of? Or version. database, but it has multi-user security
do you want advanced features such as Wings2000 Pro, FACT, Tally, and EX wherein certain features can be disabled
inventory control, MIS, multi-user pass- Next Generation, all fall in the small-to- for a particular user. Tally, FACT,
word facilities, etc? There is no point in medium office segment. Apart from the Wings2000 Pro, Simply Accounting and
Account21 also provided multi-user
accounting features, whereas DOS-based
Curb Piracy! Go for Free Software programs like ACE and Easy Accounting
only provided the usual single-user pass-
One key factor that most people tend to over, many companies provide free word facility.
ignore is to install an original licensed updates, excellent after-sales services
copy of the software. It is a misconcep- and lumpsum discounts on forthcoming Help and Documentation
tion that is propagated by local vendors products to bonafide registered cus- Help and documentation comes in vari-
who blatantly say, “Tell us which software tomers. And then there's the small mat- ous forms and media—from manuals to
you want, we’ll install it for you.” ter of piracy being illegal. Does it still PDF and HTML files. The aim of help files
All software has to be purchased and sound like a waste of money to buy and documentation is to get the user to
nothing comes free of charge. Even the original software? learn and gain expertise of the software in
most popular of all operating system soft- If you would still rather not spend the the shortest time possible.
ware—MS Windows—has to be bought. money, you can go in for free accounting Tally EIS 5.4 has a really interesting
Pirated software is a major reason for packages such as Wings. A professional manual. The manual has a lot of screen-
the malfunctioning of the software, lead- version of the package is also available, shots of the screens that you would come
ing it to crash frequently, and it is you which you can purchase if you are satis- across while working on Tally.
who have to suffer in the end. So fied with its working and require It is well-categorised with the tasks
installing a cheap and pirated version of advanced user options. Many open arranged in appropriate groupings.
the software is not exactly the right source packages are also available. There are sets of instructions on how to
move if you want to have a trouble-free Accounting applications come built into do particular tasks. The quality and
and stable working experience. More- Linux and its other variants. quantity of help given allows a new user
to do exactly what he needs by just

138 June 2001


■ select~ t e s t d r i v e

Selecting the Package


Selecting accounting software is indeed a needs, because it’s not just about the umentation, so novice users don't feel lost.
tough job. With so many new features money you spend to buy these packages. ■ The interface should be simple and
being added in every upgraded version, it There is an enormous amount of work configurable. Also make sure that it is a
tends to be a bit confusing to figure out that goes into entering the data, which is single entry package—no double entry
which accounting software would be the worth more than the cost of the software. should be required to update reports.
most appropriate for you. If something goes wrong with the data, or ■ Check for tiny but important details
A home user should generally be look- the year-end reports don’t get done the such as whether document numbering
ing for taxation, banking capabilities, etc, way they’re supposed to be, the situation and date range are set up automatically or
whereas a small-time businessman should at work could become really messy. manually, whether there is support for an
be looking not only for these features, but Here are some of the things to keep in accounting period of more than a year,
also for product costing, inventory control, mind before buying accounting software: and whether you can back up not just on
MIS, etc. The install size should not be too large or floppies but on other available media too.
So you should understand your current heavy on the system. ■ The package should have housekeep-
requirements and identify your future ■ There should be adequate help and doc- ing and maintenance features.

looking through the list of tasks in the Wings2000 Pro and Wings2000 Net. archive of templates for allowing users to
index. Arthalekha, on the other hand, has a bare get their work done by simply answering a
DOS-based ACE has hardly any docu- minimum of help provided, which is in the set of questions. It stands
mentation on the software itself. However, form of the Windows help format. apart with its Web-like
a pretty detailed manual is included with Not much accounting ter- feel and distinctive look.
it. The manual starts off by giving some minology is explained; On the other end of
tips to prevent you from getting into trou- the emphasis is on the spectrum are Tally,
ble. The installation procedure is also shortcut keys. FACT and Wings2000
explained well. Simply Accounting Pro, with advanced fea-
Easy Computing’s help comes in the has a very nice on- tures and also a complex
form of a small manual, which explains screen help file that is interface that a new user
the lengthy procedure of copying all the well categorised. It also would definitely find
files and starting installation. The quality explains a lot of difficult.
of the manual isn’t too impressive— accountancy jargon. Account 21 has fol-
there’s not even a clear index that you can Compared to the other lowed the generic menu
refer to. packages, it comes out appearance. The sub-
FACT’s manual comes in the form of a tops with its compre- menus have colourful icons
Word document. There is a really well- hensive documentation depicting each entry type. This
designed index, but an HTML or PDF for- and easy-to-use help. can be a little confusing initially, but
mat document with links would have been once you get used to it, you should have
a better option for browsing through the Ease of use no problems.
help document. Even after spending a lot of The DOS-based packages are straight-
Wings2000 Pro’s manual is probably money on an accounting package, if forward and uncomplicated.
the biggest amongst all the accounting you’re uncomfortable using it, then it Other accounting software, such as
packages. It has been created for all three might end up lying on your computer Arthalekha and Wings 2000 Pro, provide
versions of Wings—Wings2000 Plus, without you ever doing any quality work multilingual support. Arthalekha even
on it. Hence the software needs starts up with a Hindi interface and shows
to be user-friendly and have an up your preferred language once you
inviting look and feel. change the settings.
Most of the products have We also checked out whether it was
the standard international drop- easy to enter data into the program or
down menu style that makes it whether it was a complicated procedure
convenient for first-time users, wherein one had to switch through
barring Tally and Simply numerous windows.
Accounting, which have their Simply Accounting leads here as well.
own style of menus. By and With a neat interface and design, it saves
large, the design and layout you a lot of time and energy.
were also clear and easy to The data entry screen in Simply
understand. Accounting is also very well designed and
Simply Accounting is really a there is even the option of customising its
software for beginners. The appearance by choosing from among the
EX Next Generation: combines features with functionality software comes with a huge five skins available. ➜
140 June 2001
■ select~ t e s t d r i v e

Specifications
Accounting Software: How They Fared
Details Tally EIS 5.4 Simply Account21 Wings2000 Easy Arthalekha ACE FACT 1.9 Wings2000 EX Next
Accounting Accounting PRO Generation 1.5
Contact Software at Simply Soft Topsys Wings Infonet Support Modular Coral Vedika Wings Infonet Tata Consul-
Work Technologies Solution P. Ltd. Systems Infotech Ltd. Soff'wares Software tancy Services
Price Rs 22,000 Rs 5,992 Rs 12,950 Free Rs 9,995 Rs.5,000 Rs 9,500 Rs 14,500 Rs 18,000 Rs 9,500
Phone 022-6437209 080-2384900 080-5274343 040-3211458 011-5745596 020-4223510 033-2375091 022-5006490 040-3211458 022-8774081
Fax 022-6432275 080-2384905 080-5295046 040-3237318 011-5350473 020-4225896 033-2373298 033-2400824 040-3237318 022-8777441
Email info@software- enquiry@sim- topsys@vsnl. info@wings20 easy@satyam. modular@giasp info@coralin- info@vedi- info@wings200 jaideep_mud-
at-work.com plysofttech.com com 00.com net.in n01.vsnl.net.in dia.com ka.com 0.com holkar@mum-
Website www.software- www.simplysoft- www.wings20 www.arthalekh www.coralin- www.vedi- www.wings200 bai.tcs.co.in
at-work.com tech.com/ 00.com a.com dia.com ka.com 0.com www.tcs.com
Rating B B+ B A- B- B+ B B+ B+ B+

CONCLUSION a splendid feature-list at an extremely rea-


Managing Personal Finances So which one is the best? While all these sonable price.
software provide utility, some of them lack On the small-and-medium business
What if you are not comfortable with all certain features while some surpass the front, Account21, Tally, FACT, Wings Pro,
the accounting terms? What you need others in terms of Ex Next Generation were all very useful,
is a personal accounting software that implementation and in terms of
takes care of things such as your daily and ease of use.
savings and budgets, keeps track of the Of course, like we
balances in your bank accounts, man- said earlier, it
ages you stocks portfolio and even depends on what
helps you with a bit of tax-planning if your needs are.
necessary. From our
Two such software that do all of this analysis, we con-
quite well and are also popular are clude that
Quicken 2001 and Microsoft Money. Wings2000 gives you
With their year 2001 versions, they even the best value—it’s free
have many sophisticated features. Unfor- and it fulfils the com-
tunately, both these products are cus- mon home user’s
tomised more towards the Western needs. While no help or
market, and hence many of the options tutorials are provided
and features these software use (curren- with the basic software,
cy, for example), may not exactly be to these can be bought sep-
your liking. Features that you might arately in the form of a
want to use are the bill reminder facility book for a small sum.
and the cash-flow balance statement Home or office users who don’t need high- features and functionality, they were neck-
that Quicken and Money provide. end features will be more than satisfied and-neck. Among them, FACT is the most
with Simply Accounting, which boasts of feature-rich—it gives users complete
inventory control and also provides very
robust reporting capabilities with highly
defined and complex levels and rules. The
Decision Maker others lost out because they lacked in
totality of features and supported less
Basic needs Wings2000 accounting tasks as compared to FACT.
So FACT emerges the winner with very
Home users advanced features, and that too at a rea-
Advanced needs Simply Accounting sonable price. When it comes to taking
care of all that expenditure and going that
extra step to create reports, manage bal-
Performance FACT 1.9
ance sheets and even plan your tax struc-
Office users ture, opting for an accounting package like
Price EX Next Generation FACT is probably the best step that you
can take to bring sanity to your financial
management.

142 June 2001


■ select~ insight
Imaging: Ram

...to the ‘real’ side of MARCO D’SOUZA


ou get thrilled by the spectacular lens flare you never thought possible.
the virtual world.
DirectX8 and
GeForce3 are getting
Y effects picked up off chrome bumpers in
today’s trailblazing games, but you crave for
more.
When the Porsche 911 GT3 blasts off at the
starting line, you want to see that cloud of smoke
More than ever before, manufacturers of 3D
graphics processors are getting together with cre-
ators of the software that drives these cards and
creating advanced products that enhance your
gaming experience.
together to give you rise from the spinning wheels. You want to see the Two such products are nVidia’s latest 3D
a gaming experience expression on your opponent’s face when he’s graphics processor, GeForce3, and the newest ver-
about to get ‘fragged’. You want to feel like you’re sion of graphics API DirectX. So what makes
you won’t forget in a really there. DirectX 8.0 tick? And what makes GeForce3 so
hurry Well, the marriage of next-generation graph- special? Here’s an insight into the two technolo-
ics APIs and 3D accelerator cards promises to put gies and how they tie up to usher in the next gen-
you splat in the middle of all the action in ways eration of 3D graphics. ➜

144 June 2001


■ select~ insight

GEFORCE3
What Makes DirectX Graphics hardware has really matured over the
past couple of years. The performance capabili-
Tick? ties of today’s 3D accelera-
DirectDraw: Allows direct tors let game developers
access to areas in the dis- truly display their artistic
play adapter’s video memo- skills. The emphasis
ry and hardware buffers for undoubtedly is on realism.
tasks such as page flipping You want to be able to see
(used while creating anima- the ripples on that stream
tions to display one screen when you’re walking through the fantasyland of
while the next is being cre- your favourite role-playing game, and manufac-
ated). Allows programs to turers such as nVidia have been consistently
make full use of the colour churning out the hottest gaming hardware to
decompression capabilities bring these effects to life.
of various types of hardware nVidia products usually score both in terms The Programmable Pixel Shader will let you see
and not be dependent on a of sheer performance and their use of innovative combined effects like reflective bump mapping
specific type of hardware. technologies. So does the GeForce3 carry on the
Direct3D: Allows access to tradition, or is it just another graphics card special effects, such as morphing, animation,
the advanced features that churned out from the assembly lines with the deformation and environmental effects, which
handle 3D functions such as mandatory increase in specifications? Let’s take can be applied to vertices. This gives program-
triangle creation, scaling and a look at some of its features and then decide. mers a high amount of flexibility in what can be
transforming 3D images. done to the 3D objects in the game.
This component is scalable, The nfiniteFX engine Effects such as fog, lens effects and water
allowing part or all of the One of the major enhancements in GeForce3’s refraction are now possible. Also, effects such as
3D rendering pipeline technology is the ability to allow game develop- wrinkles and stretch marks can be created on the
access to more advanced ers to specifically program certain parts of this faces of characters in games, objects can morph
features such as z-buffering graphics processor, allowing it to deliver custom into other elements, and mechanical processes
and anti-aliasing. special effects. These technologies are collective- such as gear trains can be simulated accurately.
Direct Input: Implements ly referred to by nVidia as the nfiniteFX engine. This will mean more natural animations for
support for analog and digi- Two important components of this new archi- next-generation game characters.
tal input devices, offering tecture are the Programmable Vertex Shader and Programmable Pixel Shader: Like the Pro-
increased responsiveness the Programmable Pixel Shader. grammable Vertex Shader, this feature allows
and sensitivity. Programmable Vertex Shader: In any 3D application developers to take one step further
DirectSound: Offers direct model, the vertex is the most basic element. This towards creating life-like 3D scenes and effects.
access to the audio sub-sys- is the point at which the polygons in a 3D model This technology has been around since the
tem. Enables features such meet, so any changes in the position and other GeForce2 was launched. It was then known as
as low-latency mixing characteristics of a vertex can change the appear- the nVidia Shading Rasteriser or NSR. Using it,
(where multiple audio ance of the 3D model. Until now, vertices could effects such as reflections, bumps, fog and tex-
sources are used with the be assigned to perform a very limited number tures could be applied at the pixel-level in a
soundcard) and hardware of operations in the 3D application. However, scene. The GeForce3 processor takes this to a
acceleration for high sam- with the GeForce3 there are a number of custom much higher level by allowing up to eight tex-
pling rates when many ture operations in a single pass. This is coupled
audio streams are used, like with the ability to handle four textures at a
in the new breed of games time. The GeForce3 can combine these opera-
that have surround-sound. tions to produce breathtaking special effects
DirectPlay: The networking such as reflective bump mapping and realistic
component, which provides textures with environmental effects such as fog
access to devices over a net- and mist. Since these effects are processed in
work—independent of the parallel, it does not affect the frame rates in
hardware, protocols and games, but it certainly makes games look a
networking services that are whole lot better!
used.
DirectMusic: Part of the Lightspeed Memory Architecture
direct sound sub-system nVidia graphics cards have always been notori-
that streamlines the repro- ous for problems with their memory band-
duction of music such as width. As 3D processors keep getting faster,
MIDI playback in applica- even though exotic memory like DDR is used,
tions and games that are performance is hit at higher resolutions
written to use it. The Programmable Vertex Shader will allow you because of the graphics card’s memory archi-
to see wrinkles on faces in real-time tecture. ➜

146 June 2001


■ select~ insight

The XBox... a Taste of Things to Come


The first time the GeForce3 made its appear- was code-named NV20 and it was one of the
ance was not on a graphics card. Instead, it most powerful graphics sub-systems available
made its debut in Microsoft’s gaming console— for 3D computer graphics.
the XBox. Boasting of steroidal specifications,
this gaming console promised gameplay like
nothing before it. At that time, the GeForce3

Specifications of the XBox


CPU 733 MHz
Graphics processor (NV20) 250 MHz core
Total memory 64 MB
Memory bandwidth 6.4 GBps
Polygon performance 125 million poly
gons/sec
Pixel fill rate 4.0 Gigapixels/sec Gear up for the next generation of gaming with
Storage sub-system 5X DVD, 8 GB HDD Microsoft’s XBox

Until now, the easiest way to counter this HRAA (High Resolution Anti-Aliasing)
problem was to add more memory and pump This is another feature that was incorporated to a
up the memory’s frequency. However, with the lesser extent into the GeForce2 as well. Aliasing is
GeForce2 Ultra’s memory clocking at 460 MHz the appearance of undesirable jagged edges in a
with bandwidths of up to 7.3 GBps, something 3D model when there are not enough pixels to
else had to be done to alleviate the memory represent it. The GeForce3 uses a process called
bottleneck. So the GeForce3 uses a couple of Quincunx Sampling to minimise these ‘jaggies’
innovative approaches to access and use its by interpolating pixels between the jagged edges.
onboard memory. It does so by internally increasing the resolution
Splines: In the past, graphics applications used of the game and then scaling it down to the
to send raw triangle data to the graphics card, required resolution. This feature is hardwired into
which in turn would process this data and churn the GeForce3; enabling HRAA to make edges and
it out into displayable graphics. lines in 3D games appear smooth.
Nowadays, the complexity of the
3D elements in games reaches Lossless Z-compression
high levels and there are times One of the most important components of the
when individual 3D elements are 3D processor is the Z-buffer. This is the area
often composed of hundreds of where the 3D processor stores depth information
thousands of polygons! about a scene. The graphics processor uses this
So instead of relying on raw information to know which 3D objects lie in the
triangle data to define complex foreground and which are in the background.
3D surfaces, they are now defined Since this information is extensive in typical 3D
by a number of control points, games, it takes up a lot of memory bandwidth. To
also known as splines. This optimise the memory bandwidth, GeForce3
results in a significantly lower implements a form of lossless compression of this
load on the memory bandwidth Z-buffer data and therefore allows the memory
and greater efficiency is obtained, to be used more efficiently.
especially when working with
complex 3D elements. Z-Occlusion Culling
Crossbar memory controller: When a 3D object is hidden by another object in
Another enhancement to the the foreground, there is in fact no need to draw
memory architecture is the cross- that hidden part because it won’t be visible to
bar memory controller. The the viewer. If this approach is used, the infor-
GeForce3 uses four memory con- mation needed for drawing this object does not
trollers that interact with each have to passed to the graphics processor. The
other and the GPU. Therefore, GeForce3 uses this technique of only processing
smaller chunks of information graphical information that will eventually be
can be accessed and processed drawn in the scene. This results in a significant
A scene without antialiasing (above) and with it from many parts of the memory increase in the efficiency of the graphics proces-
(below). Notice the reduction in jaggies simultaneously. sor’s throughput. ➜

148 June 2001


■ select~ insight

DIRECTX 8.0 able to simulate far more realistic effects


The Games to Firstly, what is DirectX? DirectX is an Applica- when dealing with objects in skin and cloth and
tions Programming Interface or API. This the deformations that are associated with it.
Look Out for! software is incorporated into Microsoft’s oper- Using this feature, developers will be able to
Everglade Rush: This futur- ating system and it provides a bridge over impart a different ‘feel’ to each of their games
istic hovercraft racing simu- which applications and games can access the by making the 3D objects in each behave and
various features that are supported by multi- react differently.
media hardware such as 3D accelerators, Programmable Pixel Shaders: Tying in with the
soundcards, input devices such as joysticks, etc. feature that is implemented in the Pixel Shader
If a particular 3D graphics card can support a used in cards such as the GeForce3, game devel-
plethora of radically new features, it would opers will now be able to create combined effects
amount to nothing if the API does not support such as bump maps with reflections and tex-
these functions. tures. This would make effects such as water rip-
The primary aim of DirectX was to create a ples and corrugated metallic surfaces more
set of tools and interfaces that provides pro- realistic than ever.
lation taps the power of the grammers with the building blocks necessary for Multi-sample Rendering: In this feature, multi-
GeForce3 and coupled with developing applications that run independent of ple instances of a 3D scene can be rendered in
the new features in DirectX the hardware upon which these programs are different frame buffers and are then displayed in
8.0, it features very impres- run. This allows developers to concentrate more the manner desired by the application creator.
sive textures and lighting effort on the features of the application without This would allow for effects such as anti-aliasing,
effects as seen in its pre- bothering about hardware issues. motion blur, depth of field, soft shadows, etc.
release images. Prior to DirectX, software creators had to Volumetric Textures: This feature ties in with
develop products to work well on a variety of the Programmable Pixel Shader feature. Here,
Dronez: This is an RPG that hardware configurations and there was no real textures will be assigned one more dimension,
is set in a 3D world and it standard for doing this. DirectX provides what is giving that extra sense of realism.
features some very impres- called a Hardware Abstraction Layer (also N-Patches: This allows the complexity of a
known as the HAL), which makes use of soft- model to be increased to greater levels. It does
ware drivers to communicate with the applica- this by using special curves called Bezier curves
tion and the hardware. to increase the smoothness in the curved areas
So if software developers write a code to work of the 3D model. N-Patches could allow a rela-
with DirectX, they don’t need to worry about tively simple model to appear much more
which hardware platforms it can run on, as all detailed.
hardware that supports DirectX will run the Texture compression: Textures are one of the
software. biggest elements used in 3D scenes, and they
DirectX provides control to a set of tools that are often the cause of the bottlenecks associat-
sive and breathtaking effects control low-level functions such as 2D graphics ed with the graphics card’s memory. DirectX
in terms of the complexity acceleration, sound generation mixing and 8.0 has incorporated support for texture com-
and the animations of the reproduction, and support for input devices pression. Compressing all those large texture
3D models used. such as the mouse and joystick. files will increase the efficiency of the memory
All these low-level functions are supported bandwidth, resulting in very significant
Independence War 2: This by various components that together make up increases in performance and greater visual
space war takes detail to an the foundation of DirectX: Microsoft Direct- quality.
altogether higher level Draw, Microsoft Direct3D, Microsoft DirectIn- Matrix Palette Skinning: Much like vertex skin-
put, Microsoft DirectSound, Microsoft ning, MPS is a feature that allows far more real-
DirectPlay and Microsoft DirectMusic. ism in transforming objects that are skinned
with textures. Used to generate effects such as
So what’s new in DirectX 8.0? wrinkles in cloth or skin, this method provides
At first glance, you’ll find that the new features greater fluidity than vertex skinning as there are
supported here are strikingly similar to those more control points used here.
that have been implemented in the GeForce3.
In fact, nVidia has licensed many of its tech- The verdict?
where the models boast of nologies to Microsoft for the development The GeForce3 coupled with DirectX 8.0 prom-
polygon counts that near a of DirectX 8.0. Little wonder that as of now, ises games that are going to greatly blur the
hundred thousand! These, GeForce3 is the only graphics processor that dividing line between games and movies. It looks
along with some very is fully DirectX 8.0 compliant. Let’s take a like the catchword for the next generation of
impressive lighting and par- look at what new features have been added to graphics accelerators is not just pure frame rates,
ticle effects such as gunfire DirectX 8.0. but also realism. So the next time you gun the
and explosions, are brought Programmable Vertex Shaders: This feature 500 bhp engine in that Lamborhgini racing sim-
to life with the GeForce3 will allow programmable control over the ulation, the visual quality of the game and its
and DirectX 8. transform and lighting portion of the graphics special effects might be so intense that you might
processor. Using this, game developers will be actually smell the burning rubber!

150 June 2001


■ select~ r e p o r t c a r d

HARDWARE

Radar
A PC from Dell, a 17-inch monitor, motherboards, a CD-writer
More Info on and a hard disk drive among other hardware devices
the hardware products tested.
Check out
Mindware

Acer CD-RW 1208A verdict B +


It’s all write
Acer CD-RW 1208A
SPECIFICATIONS:
Performance
T his internal CD-writer from
Acer is built on Acer’s Seam-
less Link Technology, which
Interface: IDE
Features: 12x write, 8x
rewrite, 32x read
Build Quality
Value for Money
speed; 4 MB buffer Features
ensures that there is no buffer Benchmarks: OVERALL
under-run. The burn process SiSoft Sandra: 1161
kbps sequential read,
failed for one CD because the + 4 MB in-built buffer
359 kbps random read,
drive was slightly jerked during - Not stable
170 ms average
Price: Rs 13,500
the burning process. It has a access time; 1346 in
Contact: Acer Peripherals
Play/Skip button for playing CD WinBench 99;
Phone: 022-5705230
7 minutes 5 seconds to
conventional audio CDs. Fax: 022-570535
write 650 MB of data
E-mail: pankajpamani@acercm.com.tw
at 12x
Web site: www.acer.com

For your eyes only ViewSonic E70F SPECIFICATIONS: verdict A -


Interface: 15-pin D-Sub ViewSonic E70F
Features: Max resolu- Performance
tion 1280x1024 pixels at
T his is a Full Flat Square Tube
17-inch monitor with a 16-
inch effective diagonal view-
60 Hz; anti-static, anti-
reflection screen coat-
Build Quality
Value for Money
Features
ing; CD with drivers
able area and a 0.25 mm and screensavers OVERALL
diagonal pitch. It is not capable Benchmarks: Anom-
alies along upper right + Highly configurable OSD
of higher resolutions at higher edge of screen in the - Audible clicking sound when
refresh rates, making it unsuit- screen geometry tests. changing from normal to text mode
able for working with graphics. Slightly blurred raster Price: Rs 14,500
along lower left and Contact: Roop Electronics
The display is feature-packed right edges of screen Phone: 022-6631921 Fax: 022-6103919
with a wide variety of image, while displaying con- E-mail: sales@rooponline.com
colour and geometry controls. vergence test pattern. Web site: www.viewsonic.com

Maxtor DiamondMax VL 40 verdict A -


Power with speed SPECIFICATIONS:
Maxtor DiamondMax VL 40 Hard Disk
Hard Disk Interface: IDE
Features: 5400 rpm Performance

T he DiamondMax VL series of
hard drives from Maxtor
comes in capacities of 10.2 GB
rotational speed, 2 MB
SDRAM cache buffer
buffer with an Ultra
Build Quality
Value for Money
Features
ATA/100 compatible
to 40.9 GB. The one we tested OVERALL
interface
was a 20.4 GB hard drive. In Benchmarks:
spite of the fact that this is a SiSoft Sandra: 28 MBps + High data transfer speeds
5400-rpm drive, it delivered sequential read, 5 MBps - No details of jumper settings on the
random read, 10 ms hard drive
impressive performance in all average access time Price: Rs 4,800
the tests. Its aggressive pricing 15500 in High End Disk Contact: Karma Distribution
makes this drive suitable for WinMark 99; 5190 in Phone: 9810437872 Fax: 011-6420452
Business Disk Win- E-mail: naresh@karmasg.com
home users. Mark 99 Web site: www.esysdistribution.com

152 June 2001


■ select~ r e p o r t c a r d

verdict A -
Ticket to the movies AOpen 1640 PRO DVD-ROM SPECIFICATIONS:
Interface: IDE AOpen 1640 PRO DVD-ROM
Features: 16x DVD/40x
nstead of a tray, this drive Performance
I features a slot-in mechanism
that can be easily used in the
CD-ROM drive; slot-in-
mechanism; supports
CD formats like
Build Quality
Value for Money
CD/DVD, CD-R/RW, Features
horizontal or vertical positions. DVD-R/RW; incorpo-
Its digital servo mechanism, OVERALL
rates DDS, an internal
CAV technology and Dynamic buffer of 512 KB, bun- + Slot-in mechanism
Damping System (DDS) helps it dles PowerDVD 2.55 - Does not support DMA
Benchmarks: Price: Rs 5,950
withstand vibration and also SiSoft Sandra: 3235 Contact: Yogi Comp
helps minimise errors by sequential read, 865 Phone: 022-8806582
improving stability and accura- random read, 102 ms Fax: 022-8806582
average access time; E-mail: shailz@yogicomp.com
cy of the data read. 1900 in CD WinBench 99 Web site: www.yogicomp.com

A good bargain Kranion KP2A693A verdict B +


Motherboard SPECIFICATIONS:
Socket Type: Slot1 or
KRANION KP2A693A MOTHERBOARD
Performance
A low-budget motherboard that
also delivers quality perform-
ance. Supports both Slot1 or
Socket 370
Chipset: VIA693A
Features: Five PCI
Build Quality
Value for Money
slots, one ISA slot, Features
Socket 370 based processors, one AGP 4x slot and
which makes it useful for one AMR slot; support OVERALL
upgrading your processor in the for both Slot1 or Sock- + Dual socket motherboard
et 370 based proces- - Only two memory banks for DIMM
future. Its dual-inline memory
sors Price: Rs 3,000
module banks support up to 256 Benchmarks: Contact: Cerebra Integrated
MB of memory. This is a disad- 1480 in 3D Mark2001, Technologies
vantage as there is no space for 21.8 in Content Cre- Phone: 080-3474934 Fax: 080-3755492
further upgradations. ation E-mail: cerebra.smt@cerebracom-
puters.com

Anything but dull Dell Dimension 4100 verdict A -


SPECIFICATIONS: Dell Dimension 4100
Features: 1 GHz P-III, Performance

A new entrant in the Indian


market, this brand has some
very striking features and spec-
128 MB RAM, 20 GB
HDD, nVidia GeForce2
GTS w/32 MB video-
Build Quality
Value for Money
Features
card, Intel i815 mother-
ifications. It excels in graphics board, Creative OVERALL
and audio applications, which SoundBlaster Live!
soundcard, Harman/ + Fault indicators on the motherboard
puts it in the serious gamer’s
Kardon speaker system + Machine can be customised
sights. The company has a toll- according to your need
Benchmarks:
free number for ordering any 33.5 in Business Win- Price: Rs 81,999 (configuration specif-
Dell product and also for solv- stone 99, 29.3 in ZD ic, local taxes extra)
Content Creation, 6579 Contact: Dell Computers
ing after-sales problems. Phone: 1600338044 (toll free)
in 3DMark 2000, 122.8
fps in Quake III Web site: www.dell.com

Steady and stable


A Open AX3S Pro SPECIFICATIONS: verdict A -
Motherboard Inteli815 chipset, 133
MHz bus speed A Open AX3S Pro Motherboard

T his board proved to be very


stable during the tests. It has
a highly identifiable gold-plated
Socket Type: Socket
370
Features: Bundles with
Performance
Build Quality
Value for Money
two software CDs, Features
heat sink installed over the including the drivers
north bridge. The motherboard for the main board and OVERALL
also features the capability of Norton Antivirus 6.0
+ Good facilities for over-clocking
Benchmarks: 2336 in
varying the bus speed and the + Good package with detailed manuals
3DMark 2001; 125.9 fps
processor core voltage in Price: Rs 7,000
in Quake III (normal
Contact: Yogi Comp
steps, which makes it easier to mode) and 94 fps (high
Phone: 022-8806582
quality); crunched
overclock. Fax: 022-8806582
through all 21 filters in
E-mail: shailz@yogicomp.com
116 seconds in the
Web site: www.yogicomp.com
Photoshop test

154 June 2001


SOFTWARE

Radar
The latest software in the market for editing photos, logging PC activity,
More Info on encryption and more
the software products tested.
Check out
Mindware

Photo Finish Digital Grafia verdict B -


DIGITAL GRAFIA
Ease of use
A very basic photo editing
software, but a bit confusing
for the beginner. It has some
Features
Performance
easy-to-use filter effects. It
Value for money
allows you to save images in OVERALL
SPECIFICATIONS:
PSD format also, but you can Install size: 6.53 MB + Feature-rich
work with layers in the drawing Features: provides + Only 6.53 MB installation
mode and not in the paint layers in drawing - Confusing to use
Price: Rs 21,000
mode. Lacks the power to be mode; filters and Contact: New Oriental Imaging Pvt Ltd
used for industrial strength masking facility in Phone: 022-768 0551 Fax: 022-7631088
photo-editing. paint mode E-mail: oclcom@bom5.vsnl.net.in
Web site: www.orientalimaging.com

In the Frame Easy Peg verdict B -


EASY PEG
Ease of use

S upports viewing of JPEGs,


bitmaps and PNG formats
and also has some good effects
Features
Performance
Value for money
to enhance your photographs. OVERALL
SPECIFICATIONS:
It supports viewing of AVI and Download size:
MPEG videos and you can also 1.63 MB + Easy to use
extract frames from them. It Features: Supports + Small download size
viewing of JPEG, + Feature-rich
has an impressive colour - Videos can only be viewed in 200x
bitmap, PNG, Avi and
palette and you can increase or MPEG files; features 200 window size
decrease any of the red, green include thumbnail cre- Price: Freeware
ator, screen capture Web site: www. Hnm-freeware.com
or blue channels.

PC Longer PC Activity Pro verdict B -


PC ACTIVITY PRO
Ease of use
A general purpose, easy-to-
use software that runs in
the background and lets you
Features
Performance
monitor the programs that you
Value for money
run. An irritating thing about OVERALL
this software is that you need + Records all your PC activities
to reboot every time you SPECIFICATIONS: + Not resource hungry
Features: Logs all your - Requires a reboot on change of
change its settings. Overall, a activities such as start- settings
very expensive package that is up, shutdown time; - Extremely expensive
not worth investing so much encrypts your log files; Price: Shareware, $149.95 registra-
maintains record of tion fee (approximately Rs 6,898)
money. sites visited Web site: www.softsecurity.com

155
■ select~ r e p o r t c a r d

Safety First Secure IT 2000 verdict A -


Secure IT 2000

I t can encrypt almost any type


of file on any type of media, be
it Zip disks or tape drives. You
Ease of use
Features
Performance
could e-mail the encrypted file Value for Money
in a self-extracting file format OVERALL
to anyone irrespective of + Extremely high encryption algorithm
whether they have Secure IT level (448 bit)
2000; all that the person + Very easy to use
Price: Rs 3,250
requires is the right key and SPECIFICATIONS: Contact: Secure Soft India
that his machine should be run- Features: 448-bit Phone: 022-4452393 Fax: 022-4453371
ning on a Windows platform. encryption algorithm, E-mail: info@secure-soft.com
built-in file shredder Web site: www.secure-soft.com

Paper Saver Fine Print 2000 verdict A -


Fine Print 2000

P rint one, two, four and up to


eight pages in a single page
with this software. Its configu-
Ease of use
Features
Performance
ration is like that of your printer Value for Money
driver. You can save your print- OVERALL
ing job, so you can print later + Saves paper and ink
without bothering to locate the + Can save your printing job
documents. You can manually + Lets you print on both sides of
SPECIFICATIONS: paper
print on both sides of the paper OS support: - Expensive
if your printer does not support Win98/ME/NT/2000 Price: Shareware, $39.95 (approxi-
dual-sided page printing. Installation size: mately Rs 1,838)
1.66 MB Web site: www.fineprint.coms

Server Choice E-Serv verdict B +


E-Serv
Ease of use
It allows you to configure your
machine as a Web, proxy,
mail, news or ftp server. After
Features
Performance
Value for Money
the installation process, the
SPECIFICATIONS: OVERALL
default address is the name of
Features: Options to
the machine itself, and you can + Feature-rich software
configure your
access the features through a - Difficult to use for a beginner
machine as a Web, Price: Rs 4,500 (12-user), Rs 5,500 (25-
Web interface. On the client or user)
proxy, mail, news or ftp
node machine, the software Contact: True Software Solutions
server; the proxy serv-
allows you to share mailboxes Phone: 011-5535158
er allows both http or E-mail: info@truesoft.net
and also messenger services.
ftp connections Web site: www.truesoft.org

Child-safe Web Krowser verdict B +


Krowser

I f you want to screen out cer-


tain Web sites from your Net-
savvy kids, this may be a good
Ease of use
Features
Performance
tool to use. But Krowser uses Value for Money
predefined criteria, so it is not OVERALL
completely foolproof. Once + Very small download size
installed, it automatically dis- - Doesn’t protect you from all objec-
ables the default browser and tionable Web sites
SPECIFICATIONS:
Price: Freeware
you have to use this as the Features: A database
Contact: Pitara Kids network
of about 4,000 Web
default browser. It is protected Phone: 022-6389755
sites has been
by an administrative password. E-mail: khanna@pitara.com
reviewed for their
Web site: www.pitara.com
content

156 June 2001


■ select~ r e p o r t c a r d

Reviews
Introducing .Net
Arena
For game reviews
check out,
Mindware
Dotty about .Net
On the Stands
T he name says it all. It is tar-
geted more towards profes-
sional programmers and Laws relating to
developers and calls for a Information Tech -
higher level of expertise and nology
knowledge of technologies The book takes an in-depth
such as COM, COM+, ASP and Publisher: Shroff Publishers look at the various legislative
& Distributors
VB. It is geared towards telling Contact: Computer Book-
laws surrounding IT
you what .Net is all about and shop and covers such topics
what it can do for you. It Phone: 022-2070989 as legislation from for-
includes chapters on topics Fax: 011-3259790 eign countries and also
E-mail: cbsbom@
such as .Net overview, what’s giasbm01.vsnl.net.in the latest develop-
new in Visual Basic.NE and Price: Rs 300 ments on Taxation of
so on. Rating: Electronic Commerce.
Contact: Vikas Publishing
Phone: 040-4742324
E-mail: asialaw@
satyam.net.in
Syntax errors Beginning Programming for Dummies Price: Rs 400

The Silicon Valley


T his book takes a look at pro-
gramming concepts in a sim-
plistic and humorous manner. It
PC
Here, you are provided with
teaches you to program a com- information on various
puter in the most convenient aspects of Information Tech-
way possible and at the same nology starting from
time with a view to enjoying it. the very basics. It con-
It is divided into seven parts tains chapters on sub-
and also provides you with jects such as
information on a few program- Contact: IDG Books Integrated circuit
ming careers. For an insight Phone: 011-3260877 chips, computer moth-
into programming at a begin- Fax: 011-3259790 erboards and other IT-
E-mail: idgbooks@vsnl.com
ner’s level, you would probably Price: Rs 199
related issues.
want to start with this book. Publisher: Equation Meridan
Rating:
Contact: Computer Bookshop
Price: Rs 320

Hacking Exposed: Network Security CGI & Perl in easy


Whack the hacker steps
Secrets and Solutions
E very IT company faces the
danger of hacker attacks and
protection from such possibili-
This book is part of an ‘In easy
steps’ series of com-
puter books that pro-
ties is what this book looks at. It vides you with
looks at the world of network easy-to-understand
security, its vulnerabilities and Publisher: Tata-McGraw- instructions on vari-
also how to protect yourself. Hill ous computing and
You have different scenarios Contact: Computer Book- programming topics.
shop
highlighted and other informa- Phone: 022-2070989 This particular book
tive chapters on topics such as Fax: 011-3259790 looks at a step-by-step intro-
footprinting, hacking Win95/98 E-mail: cbsbom@ duction on how to write Perl
and Me, firewalls and more. A giasbm01.vsnl.net.in scripts.
Price: Rs 395
very handy book for system Contact: IDB Books
Rating:
Price: Rs 165
protection.

157
■ select~ r e p o r t c a r d

UNDERCOVER

Dial ‘M’ for...


Illustration: Mahesh Benkar

They’re getting sleeker all the time. And no undercover agent is complete
without one. So Agent 001 decides to get himself one of the latest models
ustin Powers has one. Nathan Hunt flaunts provider, which also sells unbranded phones

A a couple of sleek ones when he’s off on his


impossible missions. And James Bond has a
new one every time I see him! So I decided
it was high time I got myself one as well. A
mobile phone, that is. Why, what did you think
under its brand name. Alcatel is known in the
market for its looks and features, especially in
the latest models such as the Alcatel 701 series. I
chanced upon some of these, but they were quite
expensive.
I was talking about? Ericsson phones were pricey too, especially
Last month, I was on the prowl in some the ones I saw in some of the official shops in
Mumbai suburbs, looking for the perfect little Andheri. I also saw some smashing Sony and
gadget to accompany me on my missions. Samsung phones. They were sleek. They were
I found out pretty soon that Nokia phones WAP-enabled. Their prices touched Rs 20,000 in
Do some research are the hot favourites. One of the cheapest and
coolest models is the Nokia 3310, known for its
the black market. Sigh!
I’d like to say two words about the black mar-
beforehand to figure compact size and its price tag. This can be any-
where between Rs 7,500 and Rs 13,000, depend-
ket before we go any further—caveat emptor.
Nokia, Samsung and Ericsson appear to be the
out which features ing on where you buy it. An authorised dealer in
Colaba, Mumbai, offered it to me for Rs 11,500.
most popular trio in the black market, although
you’ll never hear it from those guys. They just
and options you Another vendor promised me, “Woh-ich maal,
bina dabba, sevan five.” (The same model, with-
try to sell you whatever they have. So you’ll hear
a lot of stuff like, this is the latest maal (he plans
require and the price out the packaging, for Rs 7,500). When I asked
for something similar but cheaper, I was told
to overcharge you), that he has sold three of
these since morning (slow-moving product,
you are willing about the Nokia 3210. This doesn’t have the
vibration option that the 3310 has, so it costs
maybe defective), or that this is his last piece in
stock (wants to dispose of old stock before
to pay between Rs 5,500-6,500.
This phone happened to be unavailable at
arrival of a new model).
Another thing that is prevalent is the
most shops I asked at. Many vendors offered me ‘exchange phenomenon’. I kept bumping into
a substitute. “Arey! Triumph yaa Alcatel le lo. people who were trying to exchange their old
Sasta padega.” (Go for Triumph or Alcatel, they’ll phones for newer ones. If the deal goes off well,
be cheaper.) Triumph is a mobile service the buyer gets some discount on the new phone
he’s buying, while the seller gets a phone he can
resell as new to an unsuspecting victim.
“Arey, naya maal hai yaar!” (It’s a new piece)
What to Look Out for shopkeepers would protest, as I suspiciously
opened up the back panel of phones, trying to
Be careful about the following points ■ Try dialling through the phone and check whether it was old.
while buying a cell phone: speaking into it to check for any recep- A word of advice: If you are tired of your old
■ Check the cell phone for any damage. tion problems. phone, you could jazz things up a bit by going in
Try to see if any scratches are visible ■ If possible, test the various features of for skins and add-ons made by the company
on the panel or on the screen of the the mobile to ensure that the piece is itself. These are available for most phones and
handset. working perfectly. cost between Rs 350-550.
■ It is probable that you might end up ■ Choose a good mobile service One thing’s for sure, vendors in the black
buying a used mobile. The best place to provider that has an established setup market are not the best people to ask for recom-
check this is the inside of the mobile in your area of residence or work. Also mendations. So do some research beforehand to
where the battery is placed. These find out about all the schemes being figure out what type of phone you want, which
parts are not easy to replace unlike the offered by the service provider to pick features and options you require, and the price
front panel or body, which are easily the one that suits you best. you’re willing to pay. I finally bought the Nokia
replaceable. The final word: buy from authorised 3310, so that is one mission accomplished. Next
■ Check the battery power. You might dealers. You will not only get a genuine target: a BMW like Agent 007’s.
be sold a cell phone with inactive bat- product but also better and more reli-
Want to share insights with others on the things to look for
teries or ones that are nearly dead. able service. when buying a cell phone? Write in to
readersletters@jasubhai.com to share your experiences

158 June 2001


■ select~ r e p o r t c a r d

A-List
A listing of the best products in different hardware and software categories
ho’s in, who’s out? The competition’s hot, reviews. Based on these tests, the best products

More Info on
W but only the winners get to this page—a list-
ing of the best performing hardware and
software that have been tested till date in differ-
have been listed here (detailed reviews on Digit
Interactive-Mindware). As different products get
reviewed over the months, the top products
ent categories. might find themselves slipping out of the charts
the top five products tested in each Every month, at the Digital Media Test & and replaced by the latest entrants in the market.
category. Check out Research Centre, we carry out a series of com- So, keep your ears sharp and eyes open and keep
Mindware parison tests as well as individual product yourself abreast of the latest cool products.

HARDWARE Phone: 022-8260258 motherboard, 128 MB RDRAM and Phone: 022-8806582


Monitors (14- & 15-inch) Fax: 022-8190766 cabinet) Fax: 022-8806582
Sony CPD-E100 Price: Rs. 32,000 Price: Rs 5,950
+ Good features and performance Hard disks (SCSI)
– Not for professionals Speakers Seagate Cheetah 18XL - CD drives
Contact: Rashi Peripherals Creative SoundWorks ST318404LW - 18GB ASUS CD-S500
Phone: 022-8260258 DTT3500 + Blazingly fast + Good performance
Fax: 022-8190766 + True Dolby Digital-compliant – Heats up quite a lot – Slightly inferior build quality
Price: Rs 14,800 sound Contact: Rashi Peripherals
Contact: Compuage Infocom Phone: 022-8260258
Monitors (17-inch) Phone: 022-4913986 Fax: 022-8190766
ViewSonic PS775 Fax: 022-4919069 Price: Rs 3,000
+ Very good image quality Price: Rs 31,000
+ Support for high resolution CD-RW drives
Contact: Roop Electronics Soundcards Seagate Cheetah 18XL- Plextor W1210TA
Phone: 022-6631521 SoundBlaster Live! ST318404LW-18GB + High write and rewrite speeds
Fax: 022-6103919 Platinum 5.1 + 2 MB buffer
Price: Rs 24,000 + Dolby Digital AC-3 Contact: ACI Contact: Zeta Technologies
compliant Phone: 022-8595830 Phone: 022-4102277
Monitors(19- & 21-inch) + High quality sound Fax: 022-8595831 Fax: 022-4102277
Sony CPD-G500 processing Price: Rs 18,000 Price: Rs 13,500
+ Truly flat 21-inch screen; support Contact: Compuage Infocom
for nearly every type of image Phone: 022-4913986 Hard disks (IDE)
Contact: Rashi Peripherals Fax: 022-4919069 IBM Deskstar 75GXP
Phone: 022-8260258 Price: Rs 13,500 DTLA-307075 - 75GB
Fax: 022-8190766 + 10,000 RPM; good data transfer
Price: Rs 87,900 Motherboards + 1 MB buffer
ASUS P4T Contact: Wales Technologies
Graphics card + Fits into any ATX cabinet Phone: 022-3828100
ASUS V7700 GeForce 2 + Good feature list Fax: 022-3828200
GTS Ultra Contact: Rashi Peripherals Price: Rs 19,500
+ Blazingly Fast; DDR memory Phone: 022-8260258
Contact: Mnemonic Systems Fax: 022-8190766 DVD drives
Price: Rs 17,500 Aopen 1640 Pro DVD
+ 16x DVD speeds; 512 KB cache Epson Stylus Color 880
Processors + Good build quality
Pentium 4 - 1.4 GHz – Does not support DMA Inkjet Printers
+ Fastest processor available in Contact: Yogi Comp Epson Stylus Color 880
India + Very quiet; good results
Contact: Ockam Systems Contact: Epson India
Phone: 022-6234798 Phone: 022-8257286
Fax: 022-6704503 Fax: 022-8267287
ASUS V7700 GeForce2 GTS Ultra Price: Rs 37,000 (kit including Price: Rs 19,000

159
Laser Printers External Storage Devices Phone: 022-2850193 CD-burning software
Samsung ML-5200A IOMEGA 2GB Jaz Fax: 022-2850198 Easy CD Creator 5 Platinum
+ Good text printing with effortless + Very good price per MB; hard- Price: Rs 3,600
USB connectivity disk-class performance
– Average print speeds Contact: Neoteric Infomatique SOFTWARE
Contact: Samsung Phone: 022-4172600 Operating systems (Linux)
Phone: 011-6932517 Fax: 022-4163679 SuSE Linux 7.0
Fax: 011-6932607 Price: Rs 18,000 + Simple to install; many bundled
Price: Rs 23,500 applications
Handhelds Contact: G. T. Enterprises
Scanners HP Jornada 680E Phone: 080-6606093
Epson Perfection 1640SU + Power 133 MHz processor Fax: 080-6671407
+ Colour screen Price: Rs 1,800
Easy CD Creator
Contact: Hewlett-Packard
Phone: 011-6826000 Operating systems (Windows) + Very fast writing speed
Fax: 011-6826030 Windows 2000 Contact: www.roxio.com
Price: Rs 39,000 Professional Price: Rs 3,600 (approx)
+ Very stable
MP3 players – Heavy on system requirements Voice recognition
Creative NOMAD Jukebox Contact: Integrated Business Dragon NaturallySpeaking
Epson Perfection 1640SU + Excellent sound quality; onboard Solutions v5.0 (Preferred Edition)
audio processing; USB interface Phone: 022-8214701
+ Transparency unit included as – Has moving parts Fax: 022-8328240
standard accessory Contact: Compuage Infocom Price: Rs 8,400
+ Fast image scanning Phone: 022-4913986
– Too bulky (4.5 kgs) Fax: 022-4919069 Page layout
Contact: Epson India Price: Rs 32,000 Corel Ventura 8
Phone: 080-5321266/70 + Many bundled features and tools
Fax: 080-5581799 Keyboards Contact: Integrated Business
Price: Rs 22,500 ACER Ergo Solutions
+ Ergonomic design Phone: 022-8214701
PCs Contact: Acer Peripherals Fax: 022-8328240
Dell Dimension 4100 Phone: 022-5705230 Price: Rs 35,000
Fax: 022-4705235
Price: Rs 4,000 Web authoring Dragon Naturally Speaking
Macromedia
Gaming peripherals Dreamweaver 4 + Impressive speech recognition
Microsoft SideWinder + Extensive feature support – High on system requirements
Force Feedback Pro Contact: Integrated Business Contact: HCL Infosystems
+ Highly customisable Solutions Phone: 011-4526518
Dell Dimension 4100 Contact: Mnemonic Systems Phone: 022-8214701 Fax: 011-4526579
Phone: 022-8010871 Fax: 022-8328240 Price: Rs 17,995
+ Customisation possible Fax: 022-8051761 Price: Rs 13,000
– Too compact for expansion Price: Rs 8,750 Accounting Software
Contact: Dell Computers Antivirus FACT 1.90
Phone: 1600338044 Toll free Pointing devices Norton Antivirus 2001 + Exhaustive feature list
Fax: 1600338046 Toll free Microsoft Intellimouse Eye + High detection rate – No security for database
Price: Rs 81,999 + Very smooth; resilient to dirt + Good script blocking capability Contact: Vedika Software
Contact: Microsoft Corporation – Resource hungry Phone: 022-5006490
Laptops Contact: N & N Systems Fax: 033-2400824
Zenith 21A Corpo - Phone: 022-3680512/17/18 Price: Rs 14,500
rate Notebook Fax: 022-3680513
+ Feature packed Price: Rs 1,600
+ Excellent performance
– A little bulky Zenith 21A Firewalls
Contact: Zenith ZoneAlarm Pro 2.6
Computers + Good performance
Phone: 022-8377300 – No protection against ActiveX
Fax: 022-8364859 controls
Price: Rs 1,25,000 Contact: www.zonelabs.com
Price: Rs 2,000 (approx)

160 June 2001


■ digit diary

Gyaan with Kyan!


f we were to pinpoint one factor that explains And when he’s not arming himself with the

I
The Test Centre has a the enthusiasm and charged atmosphere latest computer fundamentals and program-
unique visitor this that’s the hallmark of this organisation, then ming languages, he’s studying for his first board
it would probably be the fact that we have exams, coming up next year.
summer. He’s here to some of the youngest professionals, with an Oh! Did we mention that Kyan is just 14
learn, but he sure is average age of about 22 years. And every once years old?
in a while, this age limit gets pushed a notch Before you, like many legal eyes in the office,
teaching us a thing or lower. start accusing us of promoting child labour, let
two Meet Kyan. One of the newest arrivals at the us make it clear that Kyan is here to spend his
Test Centre, this young man is probably one of summer vacations, before he gets back to his
the most qualified people around the office. books and his studies.
And how is the Test Centre reacting to the
presence of someone so young? When
they’re not teaching him the finer
nuances of benchmarking moth-
erboards and graphics cards,
they are playing pranks on
him. Like carrying him about
upside-down. In his turn,
Kyan manages to get back at
the Big Bad Boys by chang-
ing the settings on his oppo-
nents’ computers when
they’re not around.
He gives the confirmed
gamers a run for their money in
the Quake Arena. The only person
he still hasn’t beaten is Rossi, one of
the finest Quakers around the office—and
before Kyan’s arrival, the youngest at 19.
Don’t let his size fool you for his sense of
humor and his wit does in fact belie his age.
Aliasagar, who’s usually the quiet one in the
Kyan has been reading JDM magazines since Test Centre is driven to defending himself in
the beginning and has always wanted to work one of the verbal battle of taunts that he regu-
with us. He has the distinction of having suc- larly has with Kyan. With one of the sharpest
cessfully completed his MCSE and an e-com- minds around, this is one kid who’s destined to
merce course. He is fluent in Web go places, but for the time being, he’s doing a
programming languages such as Javascript, good job of juggling his schoolwork with his
HTML, etc, and he’s got his own Web site to other intellectual pursuits. No wonder, then,
prove that. that he’s sometimes called Gyaan!

Starring Live!
April saw a lot of activity at Jasubhai Digi- issue and preparing for the presenta- By the morning, we had things sort-
tal Media. The reason: the third annual tion! One day to go and we still couldn’t ed but sound was still a problem. So we
day celebrations with a day-long agenda find the time to prepare for it. Till we hit hit upon another simple idea. While the
of team presentations, entertainment and upon a simple idea. Why not do a live rest of the team ‘performed’ in front of
fun. Competition was severe as every presentation of the issue-closing? What the camera, Karan, our assistant editor,
team wanted to leave an impression. All followed was a mad adventure. Some- filled in the audience three floors below
the teams took time out from their hectic one russled up a Webcam and the night with what was happening.
schedules to come up with ideas and was spent in experimenting with it. In We had a blast doing the presenta-
rehearse for their presentations. the process we recorded the antics of tion, but the icing on the cake was that
We were between the devil and the some unsuspecting victims in their no one believed that it was actually
deep blue sea—caught between closing dare-devilry before the camera. being relayed live from another floor!

161
■ backbyte

Confused Samsung’s sinking!


This advertisement has a RETRO
state of mind! number of ‘irresistible
offers’ on display. But have Office Suites
One of our readers you heard of a 17-inch The first popular word processor for micro-
received the strangest of ‘Samsung Sinkmaster? computers was Electric Pencil written by
You’ll have to be cautious Michael Shrayer. The same was available in
December 1976. Shrayer decided to write
while watching Titanic on
the manuals for the programs in the same
this one!
program itself, and thus the concept of
Contributed by: Arun word processing came about. The first
electronic spreadsheet written for the per-
sonal computer was VisiCalc with the
development starting in 1978.

e-invites. While the event


Assured Connectivity?
itself was pretty ordinary,
what was extraordinary was
If you’re thinking
of getting an
Internet connec-
‘Page not found’ is passe
the location. If you look tion from MTNL You know how utterly exasperating it is when you type
closely you’ll see why this then you would in a particular URL and come up against a dead end.
invite merits a place in definitely want to And that lousy ‘Page not found’ message doesn’t help
backbyte!! think again. The either! But one of our readers came across a link where,
Contributed by: Cybug Bug- chances of getting surprisingly, the
connected aren’t
proof, via e-mail same message
really all that
high! According will put a smile

Long lost to this advertisement MTNL offers 9.9 per cent assured
connectivity!
Contributed by: Jayesh Bindra, Indore
on your face!
Contributed by:
Anubhav Mehro-
tra, via e-mail

Readers Rants
Designer tooth Bandwidth flow!
siblings? crowns anyone? Exasperated with the current bandwidth speed that you
get? Well who isn’t! But here’s a spoof site we came across
You know how every per- Have you ever wished you had an ‘Uncle Scrooge’ type of that offers a rather novel but extraordinary solution to the
son in this world is sup- grin, so you could flash a dollar sign everytime you problem. You can connect your PC to your water tap for an
posed to have a look alike smiled? Well, all praise to the almighty Web, you can even always-on Internet connection with unlimited access and
somewhere else (or some avail of this. Just logon to www.rongrant.com and choose download speeds. Shocked? Don’t be, it’s just an April fool’s
jazz like that!)? Well, the joke. But for more laughs check out www.dutchwater.com.
same appears to be true for Taken from the Net
the Apple iMac as well. See
the resemblance?
It’s all relative
Want to get rid
of your trouble-
some relatives?
Your chance to
BACKBYTE! Well now you
don’t have to lie
Highlight the lighter side of your way around
computing. Mail your contributions them. Here are
to Backbyte some really use-
Digit, Plot D-222/2, ful options which
TTC Industrial Area, MIDC, should solve all
Shirvane, Nerul, from dozens of designer samples for tooth crowns which your relative problems for good. You can choose from
Navi Mumbai 400 706 you can have made for you. This should put a sparkle in moving your relatives, to deleting them to even renaming
or send e-mail to your smile! them!
backbyte@jasubhai.com Taken from the Net Contributed by: Sajal Kayan, via e-mail

162 June 2001

Vous aimerez peut-être aussi