Category: Microsoft Technologies

A memory leak is an unintentional form of memory consumption whereby the developer fails to free an allocated block of memory when no longer needed. The consequences of such an issue depend on the application itself. Consider the following general three cases:

Case Description of Consequence
Short Lived User-land Application Little if any noticable effect. Modern operating system recollects lost memory after program termination.
Long Lived User-land Application Potentially dangerous. These applications continue to waste memory over time, eventually consuming all RAM resources. Leads to abnormal system behavior
Kernel-land Process Very dangerous. Memory leaks in the kernel level lead to serious system stability issues. Kernel memory is very limited compared to user land memory and should be handled cautiously.

Memory is allocated but never freed.

Memory leaks have two common and sometimes overlapping causes:

* Error conditions and other exceptional circumstances.
* Confusion over which part of the program is responsible for freeing the memory

Most memory leaks result in general software reliability problems, but if an attacker can intentionally trigger a memory leak, the attacker might be able to launch a denial of service attack (by crashing the program) or take advantage of other unexpected program behavior resulting from a low memory condition


Absolutely stunning. The Sixth sense technology.
Guys – must watch!!

Absolutely stunning to see where technology is heading and what the future is gonna look like.

And be proud – the man behind this is an Indian!!

This is just incredible and unbelievable, yet true. Click the URL below and see the demo and find out how things are going to change in the computer world.

See the live demo of Pranav Mistry who shook the world recently on this Sixth Sense Technology.

This is simply a terrific presentation and absolutely astounding!! !!!!

At TED India, Pranav Mistry demos several tools that help the physical world interact with the world of data — including a deep look at his SixthSense device and a new, paradigm-shifting paper “laptop”.

In an onstage Q&A, Mistry says he’ll open-source the software behind Sixth Sense, to open its possibilities to all. MICROSOFT better watch out.

A serious security flaw is found in Internet Explorer 7.0 and Everybody is advised by experts not to use Internet Explorer for any confidential banking transactions until the new patch is released.

The new patch would be released at the earliest and experts adviced everybody to use the browser from their rivals until the patch is released.

The flaw in Microsoft’s Internet Explorer could allow criminals to take control of people’s computers and steal their passwords, internet experts say.

Microsoft urged people to be vigilant while it investigated and prepared an emergency patch to resolve it.

Change IE security settings to high (Look under Tools/Internet Options)
Switch to a Windows user account with limited rights to change a PC’s settings
With IE7 or 8 on Vista turn on Protected Mode
Ensure your PC is updated
Keep anti-virus and anti-spyware software up to date



Dear Friends,

I would like to inform you about the free magazine “testing experience” that has been downloaded 140,000 times in the last 4 weeks.

Please have a look on
Don’t hesitate to contact, if you have any question.

Best Regards


Bhuvan, India’s response to Google Earth, will be launched in March 2009 and will provide high resolution imagery data of the order of five metres which would be of great help for real-time exercises, including disaster management and military operations.

“Google Earth is providing high resolution data in the order of less than a metre. But the data is two to three years old. But Bhuvan will provide the relevant data for any real-time exercise,” SK Pathan, head, Geo Informatics Data Division, Isro, told PTI.

For real-time exercises, the latest data is a guiding force, he said. It can show the topography, altitude and other features of a location. The data could be of use to manage public services, internal security, town planning and infrastructure development activities.

However, it is not yet decided whether the data can be put on the web as it could be misused. Some locations can, however, be blurred or blocked due to security reasons.

From Rediff

Here is a important piece of information, follow the steps and your computer will always remain stay away from Viruses/Spyware’s.

Step 1. Keep your firewall turned on

What is a firewall?

A firewall helps protect your computer from hackers who might try to delete information, crash your computer, or even steal your passwords or credit card numbers. Make sure your firewall is always turned on.

How to turn on your firewall

How to choose a firewall

Learn more about firewalls for your operating system

Step 2. Keep your operating system up-to-date

What are operating system updates?

High priority updates are critical to the security and reliability of your computer. They offer the latest protection against malicious online activities. Microsoft provides new updates, as necessary, on the second Tuesday of the month.

How to update your operating system

Microsoft security updates: Frequently asked questions

Learn about using Microsoft Update

Go to Microsoft Update

Step 3. Use updated antivirus software

What is antivirus software?

Viruses and spyware are two kinds of usually malicious software that you need to protect your computer against. You need antivirus technology to help prevent viruses, and you need to keep it regularly updated.

How to get antivirus software

Get regular antivirus scanning with Windows Live OneCare

Get a free safety scan

Learn about viruses

Step 4. Use updated antispyware technology
What is antispyware software?

Viruses and spyware are two kinds of usually malicious software that you need to protect your computer against. You need antispyware technology to help prevent spyware, and you need to keep it regularly updated.

Get antispyware technology

Use Windows Defender, free antispyware for Windows XP SP2

Learn about spyware