Thursday, June 28, 2012

Teamcenter 9 - What's New

Document Management
  • Microsoft Office and Adobe PDF Markup Management
  • Attribute Synchronisation with Microsoft Office applications

Lifecycle Visualization

  • Visualization Cacheless Search engine for spatial & attribute filtering in large product structures
  • Performance enhancement with Cacheless Search
  • Visual Navigation leveraging Spatial Search with Visual Reporting
  • "Assembly-Level-Simplified-JT" support throughout all of the main Teamcenter applications and clients (including Mobility client)
  • 3D measurement and Visual Report enhancements

Project Management

  • Consolidation of schedules with Master/Sub Concept
  • Master scheduling w/cross schedule dependencies
  • Milestone propagation
  • "Execution View" to view/confirm executed work
  • Schedule Task analog to Inbox Task

Thin Client/Stylesheets

Thin Client
  • Thin Client with compelling interaction, extensibility and improved sustainment (stylesheets, summary page, table renderung)
  • Reuse the stylesheets from Portal Client
  • Implementation of actions, attachements (files and documents), affected items, reference documents

Platform Extensibility Services

  • BMIDE supports live update of LOV values
  • Supports load of LOV values through command utility
  • Displays lists of values (LOVs) based on a Teamcenter project

Improved Installation & Upgrade

  • Improved administration tools, diagnostics and error reporting
  • Improved look and feel
  • More intuitive
  • Fewer required responses
  • Auto-zipping of logs which can be easily attached to an IR
  • Log files can be easily reviewed in your HTML browser of choice
  • Silent Mode enhancements in TEM

General Information

Teamcenter Systems Engineering
  • Systems Engineering & Requirements Management:
    • Integrated diagramming with standard tools (Visio, Matlab/Simulink & SysML)
    • Functional and logical system modelling with traceability
    • Requirements Management features in Office Client
  • Visual Issues:
    • Capture Visual Issues in Teamcenter
    • Manage Visual Issues in Teamcenter as a part of formal change process
  • Manufacturing Process Management:
    • Enhanced EBOM - MBOM replication
    • Assembly work instructions as lightweight, animated 3D PDF document
  • Mechatronics
    • Firmware & Design Component Management
    • New EDA PCB
    • Wiring integrations, e.g. Zuken

Wednesday, June 27, 2012

VMware Workstation 8

Quote:
VMware Workstation is powerful desktop virtualization software for software developers/testers and enterprise IT professionals that runs multiple operating systems simultaneously on a single PC .  
With support for over 200 operating systems including Windows 7, Windows Server 2008 R2 and over 20 other versions of Windows, along with Redhat, Ubuntu, OpenSuse and 26 additional versions of Linux. VMware Workstation delivers the broadest guest platform support for running multiple operating systems at the same time on your PC.

Essential features such as virtual networking, live snapshots, drag and drop and shared folders, and PXE support make VMware Workstation the most powerful and indispensable tool for enterprise IT developers and system administrators.

FEATURES:-

* Run applications in Linux, Windows 7, Windows XP Mode and over 200 other operating systems all simultaneously on the same PC with no rebooting.
* Evaluate and test new operating systems, applications and patches in an isolated environment.
* Create virtual machines with up to 8 virtual processors or 8 virtual cores.
* 2 TB virtual disks and up to 32 GB of memory per virtual machine.
* Protect your virtual machines from prying eyes with 256-bit AES encryption and smart card authentication.
* Snapshots are useful when you need to revert your virtual machine to a prior, stable system state
* Installing virtual machines without re-partitioning
* Running a virtual machine in windows desktop core operating system and full screen
* Sharing files and applications by different virtual machines through the use of virtual network
* Running a client-server and Web applications on a single PC
* Starting on the same PC multiple virtual computers and modeling of network
* Demonstrate complex software applications on a single laptop in a repeatable, reliable manner
* Rich integration with Visual Studio, Eclipse, and the SpringSource Tool Suite make it incredibly easy to debug applications on multiple platforms
* Easily restore or share archived test environments, reducing repetitive configuration and set-up time
* Run VMware vSphere 4 and ESXi in a virtual machine for experimenting, testing, training, and demonstrating the power of vSphere
* OpenGL 2.1 support for Windows 7 and Windows Vista guests
* Get shared folders and drag and drop convenience.
* Supports Flip 3D and Aero Peek to show live thumbnails of your virtual machines
* Print from virtual machines without mapping network printers or installing printer drivers
* Comprehensive Windows 7 support, including Easy install, 3D Graphics Support, live thumbnails, desktop preview, and XP mode.
* Install and run VMware vSphere 4 and VMware ESXi as a guest OS.
* AutoProtect makes it easy to go back in time when things were good, with automatic hourly, daily, or weekly snapshots.
* Remote Replay Debugging makes it easier to analyze and to debug hard-to-reproduce software defects.
* Streamline computer-based training by allowing students to always start from a "clean" state and experiment with multiple operating systems, applications, and tools in secure, isolated virtual machines
* Also allows the testing of live CDs without first recording them onto physical discs or rebooting the computer
* Includes the ability to designate multiple virtual machines as a team which administrators can then power on and off, suspend, and resume as a single object

INSTALLATION REQUIREMENTS

When you install Workstation, the installer performs checks to make sure the host system has a processor that meets the following requirements. You cannot install Workstation if the host system does not meet these requirements.
  • 64-bit x86 CPU
  • LAHF/SAHF support in long mode
You can use CPU-Z or a similar utility to determine if the host system CPU is 64-bit capable. CPU-Z shows EM64T (Intel) or AMD64 (AMD) if the processor is 64-bit capable.
If you plan to install a 64-bit guest operating system in a virtual machine, the host system must have one of the following processors. Workstation will not allow you to install a 64-bit guest operating system if the host system does not have one of these processors.
  • AMD CPU that has segment-limit support in long mode.
  • Intel CPU that has VT-x support. VT-x support must be enabled in the host system BIOS. The BIOS settings that must be enabled for VT-x support vary depending on the system vendor. See VMware KB article 1003944 for information on how to determine if VT-x support is enabled.

Download:-

Serial Keys:-
>>>>>>>>>>>>>>>>>>>Serials by www.another-bloodyblog.blogspot.com<<<<<<<<<<<<<<<<<<
HC05Y-A1H42-HZCT8-XU37H-3AZMD
MA2G0-F0L11-HZN31-P0AN2-2AT7U
NY2WN-8AK0K-DZVJ8-AA3QH-93TJY
5F4KR-4C186-4ZGT9-NH8N4-13ELD
5F6D9-DP3D3-HZXX8-289QK-93GQQ
4A426-A03D0-WZDZ1-ML350-CCZQY
1C4VR-D2KE2-7ZU70-VACNH-9227Z
4U4QD-0K11Q-TZ7N1-GJ17M-0C9N4
NU40Q-4J1EQ-TZ388-XR85P-9215G
JF4PL-DHJ9J-6ZVV1-X2AN0-22DM6
MG4GG-8P25P-FZ6J8-XJ8N2-1CX5M

VMware Workstation v8.0.0 Build 471780:
MD5SUM(¹) 4cab6130e142e71443af911bd0d01a70
SHA1SUM(¹) 773d4dec3eca5714bc0cb50ceae8e7813c4ed912 

Monday, June 25, 2012

Device manager not opening?

Solution is here........


1. Start- run- cmd 
2.Type 
            %windir%\system 32 &press enter 
3.Type 
            Regsvr32 msxml.dll &prs enter?
4. Type
            Regsvr32 msxml2.dll & press enter
5. type
            regsvr32 msxml3.dll &press enter
6. Exit and restart computer(recommended but not mandatory).



InputDialog Validation

To create a input dialog,

InputDialog fileNameDialog = new InputDialog(shell, "Rename Item", "New Name:", "", new validator());

The last parameter in the InputDialog is the object "new validator()".

class validator implements IInputValidator {
          public String isValid(String newText) {
                        if (newText==null)
return "Error Caused!";
                       }
         }

The error message is displayed while disabling the "ok" button as shown below,
   
                  

Set Error Message for a TextField

To set an error message while validating a text field,
setErrorMessage("Project already exists in the workspace");
To clear the Error message,
setErrorMessage(null);

Secure Yourself

Computer security has been defined as; “The concept of attaining a secure computing environment by mitigating the vulnerabilities associated with computer use.” This statement is applicable to Computers, Web Servers, Networks and even Mobile Devices.

A range of measures may be taken to ensure the security of these aspects of computing, and the following guide will briefly address them. This guide will not hold your hand through everything described. Much of the guide is personal opinion. Keep in mind I do not simply recommend one program for each angle of infection and attack. These are the tips i suggest for a total computer security.
Install and use Anti Virus Program(s)
You need to use antivirus software to protect your own computer, and to prevent your computer from being infected or being used to gain infections to infect others, if you use the internet and don’t take responsibility, you’re going to get infected. If you don’t care about getting infected then look at the financial side of things your system most likely costs around $500 – $1000 and that is just going to be a waste from a stupid infection which you could of easily prevented by using a simple anti virus.
Another-BloodyBlog.blog.com recommends the following anti-virus software:
             

Install and use a firewall program
A firewall is a program that blocks all the information coming through the internet to your network. It will prevent harmful information and software from coming through your private network. A firewall is extremely vital for any home connection, and especially in big workplaces where there are several connections to the internet. This is usually the reason why they limit it to around 20 connections to the FTP server.
Another-BloodyBlog.blog.com recommends the following firewall software:         
                   
Use strong passwords
Using strong passwords is extremely vital when browsing the net, there is many ways they can hackers can get your password, but the best way to avoid it is not using a common word, or if the hacker knows some information about you he’ll try and guess your password, so you should use something only you know. It doesn’t need to be very long although that is a always recommended a strange word that only you know will do, you could always use generated passwords too but this will only work on certain websites.
Take care when downloading and installing programs
This is the most common way of infecting people. ONLY download a program if you trust the person. I have experienced being infected by this and it’s really common, most files you download that are infected, if you went ahead and downloaded a program and you weren’t sure if it was safe just quickly run a scan on your anti virus and see if there is harmful software or not, try your spy net if again nothing is found it means there is no infected file or the file is FUD (Fully Undetectable). So if you are downloading a program from a forum wait for an OK from an experienced user and go ahead with it if he seems satisfied but that doesn’t 100% mean it’s not, just be careful.
Keep Your System Up To Date
Keeping your system patched and software updated is extremely important. Companies release updates and patches for software to fix any exploits and vulnerabilities, this means if you’re running on an unpatched version, you are vulnerable.
A great website to check whether your software is up to date is www.secunia.com. This scans your system to see whether any software is out of date, if software is, then it provides you with the links to update it.
Once things like Java have been updated, you should always delete the old version. This is because malicious exploitation could still be acted upon.
Reading Emails
While reading emails you should be careful, don’t open attachments unless you know what it is, even if the email is by a friend.
The bigger risk though is phishing emails. A lot of emails can look legit, when they’re not. Even if it says, for example “sent by support@jagex.com” that doesn’t cut the risk of it being a phishing email.
Remember that banks don’t ask you to update your details via email, that games usually don’t either. When clicking a link outgoing from an email ALWAYS remember to check the address in the top of your browser.
Make backups of important things
I’m sure everyone has important files on their PCs. That is why you should back them up, on an additional hard drive, USB or even an online service such as Amazon Cloud.
This ensures that if for example your computer got stolen, broke or something restricts your access to the hard drive. You won’t have to worry, as you have some back ups.
Encrypt Your Files
Encryption of your files protects them, whether someone intrudes your PC online or off, they won’t be able to access those files.
Some good file encryption programs you may want to look into are BitLockerTrueCrypt.

Malware!!!


Malware has been a big problem today. Malware is short form of malicious software. A malware is a software designed to infect a computer system without owner being informed. Thousands of people have been victims of malware. In this article I will discuss all the types of malware, and give you an example of a Windows Trojan in use. The reason I will use Windows is because malware is very rare in Mac and Linux computers.
Types of Malware Software:
Computer Viruses – A computer virus is a malicious software that is developed to infect a computer. It is designed to spread from one computer to another and to damage a computer hardware, software and files. Once the virus infects a computer, it replicates or reproduces itself. Viruses are like parasites because they need a host to attach themselves to in order to infect a computer.
Worms – A worm is different from a virus because it doesn’t need a person to be able to spread and infect systems. Worms most often take advantage of known bugs in computers to spread. Computer worms are major threats to large networks.
Trojan Horse – A trojan horse is a malicious software that appears to do one thing, but actually does another. It is mostly used to control the victims computer rather than infecting or destroying files on it. Some trojans may be relatively “harmless” to your system, but other trojans pose a far greater effect to your computer. A trojan horse can monitor your internet connection, grab your email addresses, access passwords and more.
Keloggers – A keylogger is a hardware or software device that monitors each keystroke a user types on a specific computer’s keyboard. Once installed, this device will automatically load from the start-up and start capturing each and every keystroke that was typed on the computer. Any person with a basic knowledge of computer can use keylogger. You can check my post “What is Keylogger Software?” for more information related to keyloggers.
Remote Administration Tools – A Remote Administration Tool (also called as RAT) is s a software used to take control of a computer from a remote location. RATs can be used either for legal or illegal purpose. Once the software is installed on a computer the administrator can do almost anything on the remote computer.
Adware and Spyware – Adware (Advertising-supported software) is any software application in which advertising banners are displayed while the program is running. On the other hand, a Spyware is software that sends information from the user’s computer without their knowledge. Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited etc.
Adware and spyware can bring the computer system to its knees. They are detrimental, lowering the performance of the computer. The victim of these nasties might need to replace data, and might lose unique files.
How Malware Works
To show you an example of a malicious program, I will use a well known Windows Trojan,ProRat. ProRat opens a port on infected computer which allows the client to perform various operations on the infected computer. Once ProRat is installed on a computer it’s almost impossible to remove it. In the following video I will show you the procedure that a hacker will take to gain control over the victims computer using Prorat.

Saturday, June 23, 2012

Internet to Shut Down On July 9 2012



Due to the Operation Ghost Click on 11/09/11 millions of computers over the world was affected by dns malware. To assist victims affected by the DNSChanger malicious software, the FBI obtaineda court order authorizing the Internet Systems Consortium to maintain temporary clean DNS servers. This solution was temporary, providing additional time for victims to clean affected computers and restore their normal DNS settings.

Why Internet Would Be ShutDown On July 9.?

As I told you earlier the clean DNS severs was temporary. The clean DNS servers will be turned off on July 9, 2012, and computers still affected by DNSChanger may lose Internet connectivity at that time.The FBI is seeking information from individuals, corporate entities, and Internet Services Providerswho believe that they have been victimized by malicious software (“malware”) related to the defendants.

What This Malware Does.?
This malware modifies a computer’s Domain Name Service (DNS) settings and thereby directs the computers to receive potentially improper results from rogue DNS servers hosted by the defendants.


Are You Affected.?



Go to the site bellowDns-ok.Us
If your computer have been infected with DNS changer malware you would have seen a red background. Other wise bellow message
 “DNS Resolution = GREEN”