Oil and filter change

Hi ppl,

Do you know that engine oil takes a terrific amount of abuse and must be changed regularly to ensure engine longevity.Follow these steps to safeguard your engine.

  • Remove the drain plug from the sump and drain the old oil into a drain tray. Check that the drain plug washer is OK then refit the drain plug.
  • Unscrew the old oil filter and thread the new filter into place. Dispose of the old filter.

Air filter
You have to take a look at airfilter also.Air filter is either a paper or foam type air filter element will be fitted. This element can be cleaned, but if it is very dirty or damaged its better to fit a new one.

  • You can tap the paper element to dislodge dust.
  • Foam elements need to be washed in solvent, then dried and re-oiled.

Spark plugs
The spark plugs will wear over a period of time and the gap between their electrodes will go out of adjustment. There will also be a build up of deposits on their firing ends due to the combustion process - renew the plugs if they are dirty of badly corroded.

  • Measure the spark plug gaps with a feeler gauge.
  • Adjust the gap by bending the side electrode only.

Drive chain adjustment
There should be a certain amount of slack in the drive chain - usually about 30mm, but check your handbook. The chain will stretch in use and excess slack must be taken up with the chain adjusters at the ends of the swingarm.

  • Measure the total amount of slack in the drive chain at a point midway between the sprockets on the lower run of chain.
  • To adjust the chain tension, slacken the rear axle nut.
  • Use the adjusters on the ends of the swingarm to adjust chain tension. Adjust each one by the same amount.
  • Check the wheel alignment marks are th same on each side, and then tighten the rear axle nut.

Oiling cables, levers and pivots
Cables, stand and lever pivots are exposed to the elements and must be lubed regularly to ensure smooth operation. Apply a few drops of light oil or an aerosol lubricant to the exposed ends of cables, the handlebar lever pivots, brake pedal and gearchange lever pivots and the stand pivots.

Correct adjustment of the clutch is important to ensure smooth gear changes and prevent clutch slip or drag.

  • Most clutches are cable operated and will have a threaded adjuster and locknut at each end to set freeplay.

Engine idle speed
Check that the engine idles at the correct speed when it is fully warmed up.

  • There is usually an idle speed adjuster knob at the side of the carburettors.

Brake pads
It is important to keep an eye on the amount of brake pad friction material because it will eventually wear down to a low level; at this point the pads must be renewed.

  • View the pad material via the mouth of the caliper. Most pads have wear indicator grooves, cutouts or a line to indicate the limit of wear.
  • If the pad material can't be seen clearly, the pads must be removed from the caliper for examination.

Actions To Be Performed Before You Start Start Your First Run

Hi friends,

Checking Oil
It is important to ensure that the oil level doesn't drop below the minimum marking. An engine in good condition will use very little oil between oil changes.

  • Before checking the oil level, support the bike upright on level ground to allow the oil level to stabilize.
  • If your bike has an inspection window, check that the oil level is between the MAX and MIN markings.
  • If your bike has a dipstick, note where the oil comes to in relation to the MAX and MIN markings.
  • If the level is too low, remove the filler cap from the top of the crankcase and top up with the specified oil type. Always use motorcycle engine oil - not oil designed for use in car engines.
Steering and suspension
  • Check that the steering moves smoothly when the handlebars are turned from side to side.
  • Also check that the front and rear suspension operates smoothly when you sit on the bike.

All superbikes have coolant.This is not applicable for normal bikes.

The coolant level should not fall unless the system has developed a leak.

  • Locate the coolant reservoir and check that the coolant level is between the two level marks on the reservoir.
  • If necessary top up with a 50/50 mixture of distilled water and antifreeze.

The important thing is checking tyre pressure.
The correct tyre pressure is essential on a bike. Always check tyre pressure of the tyres in normal climate because the pressure increases when hot. Give the tyre a quick visual check for any damage or wear of the tread.

  • Use a tyre pressure gauge to measure the pressure in each tyre, compare this with the specified pressure (usually on a label attached to the chainguard or rear mudguard) and use a pump to increase the pressure if necessary.
  • If the pressure is not maintained correctly it will lead to performance degradation.

Lights and horn
Check that all lights, brake lights and turn signals work. Check that the horn works - you never know when you might need it!

Check the brakes individually. Their application must be firm and they must be fully applied without the lever (front) or pedal (rear) reaching its full travel. They must also free off completely when the lever or pedal is released and allow the wheels to turn freely without drag.

  • Check the fluid level of hydraulic brakes by viewing the level in relation to the lines on the master cylinder reservoir. If it is below the LOWER line, top up the fluid.
  • Use the fluid type marked on the reservoir cap (usually DOT 4) and top up to the level line inside the reservoir.
  • Give a trial by applying the brake while you move your bike slowly.

Drive chain
Most bikes have chain drive to the rear wheel. It is important that the chain is well lubricated and does not have too much freeplay.

  • If the chain looks dry give it a quick squirt of aerosol chain lube.
  • If the chain looks too slack adjust its tension as soon as possible.
  • If you drive with loose chain performance degradation will be noticed.
  • Once i left loose chain unnoticed this made me to invest around 5000 for rectifying it.

So please friends don't forget to care your bike with the above tips. I hope these tips are useful for you. I have lot more tips to share with you so visit my blog regularly. Thank you!!

My DisclosurePolicy

This policy is valid from 18 November 2008

 This blog is a personal blog written and edited by me. For questions about this blog, please contact  Eshwar Iyer (eshwarej AT gmail Dot com).

 This blog accepts forms of cash advertising, sponsorship, paid insertions or other forms of compensation.

 The compensation received may influence the advertising content, topics or posts made in this blog. That content, advertising space or post may not always be identified as paid or sponsored content.

 The owner(s) of this blog is compensated to provide opinion on products, services, websites and various other topics. Even though the owner(s) of this blog receives compensation for our posts or advertisements, we always give our honest opinions, findings, beliefs, or experiences on those topics or products. The views and opinions expressed on this blog are purely the bloggers' own. Any product claim, statistic, quote or other representation about a product or service should be verified with the manufacturer, provider or party in question.

 This blog does contain content which might present a conflict of interest. This content may not always be identified.

To get your own policy, go to http://www.disclosurepolicy.org

Understanding How XML Validation is Processed

Hi ppl,

Today i am going to discuss about validation process of XML document.
For developing a successful XML document we need to understand how validation is processed in XML. XML validation is a formal process of checking your XML file against the relevant DTDs or schemas, or both. First we should understand that an XML document does not require either a DTD or a schema reference to be perfectly functional.The document cannot be said to be valid unless it has a reference to at least one of these and that reference has been validated by a validating processor. It is important for us to know the sequence in which DTDs and schemas are used in validating an XML document and short notes on what is being validated so that we will be able to make use of the built-in facilities of XML processors for security correctly. Also have in mind that what they don’t do so that we will be able to construct appropriate internal validation routines for data passed through XML. XML validation mechanisms like DTD or schema are primarily for structural quality, data type constraints, and consistency throughout an organization or system of applications.They are not designed for checking data for consistency of the application.

There are certain validation processes for checking and delivering quality product. XML validation is a coarse sieve which filters out major structural and data inconsistencies.There are certain routines written by service developer to check the type of inputs,range of inputs etc.. In these routines, input must be validated for character type, correctly decoded, and then verified for content. We should do all this in a cheaper way without any unacceptable performance costs on either the server or the client software. Actually the cost for proper validation are enormous. Firstly, proper validation and verification eliminate most of the major plain-text attacks which i have discussed later in my blog. Characters that are of an unusual encoding or with a decoded value outside the logical parameters of the data entity are filtered out of the data stream before being executed or stored in the database. As a result quality control for the application data is enhanced.

Thanks for readind this post. I hope this information is useful to you. I have lots more topics related to XML so please visit my blog daily.


Today i am going to talk about a wonderful opportunity offered by PayPerPost.
PayPerPost is a money yielding tree where we get paid for simple jobs assigned to us. We know that writing reviews is not new to us, PayPerPost assign us the same task which we are doing daily with a exciting money offer along with that.There are large number of advertising companies and lots of new product come out everyday. Now the job of advertising companies is to promote these new products. PayPerPost catches these offers for us and now its our job to promote these product through blog site. PayPerPost approves quality bloggers who write good contents and have good traffic with them. Money is something that all of us have been crazy about ever since we were hit by its importance in declaring our image in the society. Money speaks for itself. So, people all over the world are looking forward to options at every corner of the crossroads to get a piece of the money thats being made there ! Here is a wonderful option for all you avid bloggers. As i mentioned earlier we can make easy money with our boon site PayPerPost. After getting qualified with terms and conditions we can register our site with PayPerPost. High quality and popular blogs are approved and ready for advertising.

Initially when i was new to internet, i was searching for jobs and found lots of sites which turned to be fake one. There are some limitations like minimum payouts, and moreover many sites are inconsistent. Later i came to know about PayPerPost where i can earn more for posting simple ads. From my previous experience i thought this also will be a fake and teased my referrer. Later on when he showed his first payment from PayPerPost in paypal account i was jumping in joy and apologized for my previous action and immediately signed up with this. There is also another way to get paid for referring your friends. This is the best way of earning money for bloggers. I am very grateful to my referrer because without him i would not have tracked this site. There are many tools associated with it to assist us. There are many communities where we can join and find many wonderful people.. I learned more knowledge from them. So PayPerPost not only helps us to improve our financial background but also helps us to build our character.

I learned how to manage the money i earn while interacting with many peoples, how to maintain official contacts, how to sustain professional relationships that will foster a lucrative and mutually beneficial bonding, and also on how to improve your Payperpost scores, and your real page rank. PayPerPost also gives you the option of attracting advertisers directly to your blog by using PPT tools and by putting up a logo on your blog. They follows certain codes of ethics by which they are servicing others without disturbing others..It is necessary that we also should maintain certain codes of ethics. There should be 1:1 ratio between sponsored post and normal post.

So friends there are lots of opportunity for you to grab.. So stop worrying about money, concentrate in your blog work. PAYPERPOST is for us...

*This is sponsored post

Learning About Plain-Text Attacks

Hi ppl,

I hope most of you bloggers are quite infamiliar with the terms Hacking and its various strategies.I am here to explain a type of attack called Plain-text attacks which is one of the most common tools hackers can use to compromise a database or application.Hackers generally take advantage of XML’s reliance on standard
language characters and the most important fact that those characters can also have several numerical representations at different points in a system. Hackers normally
use nonstandard coding for control characters .It is mandatory for everyone to understand certain aspects about html to protect ones's system and database.

Please note XML makes use of the ISO-Latin-1 character set.This is same as character set
used by software developers over all Western European and English speaking
nations. A larger group of character sets,Unicode, supports characters used across most of the world’s major languages in addition to mathematics, logic, and simple object drawing.A
Unicode character set-maps directly to ISO-Latin-1, and both character sets provide
access to letters, numbers, punctuation—and some interesting extras such as
the characters that control the flow of information through the application and
those that indicate to the system whether input strings have been successfully

Manipulating character sets requires you to bracket the numeric representation
of the character with an ampersand (&) and a semicolon (;).In both HTML and XML, characters can be passed as part of an input or message string in one of three ways.There are three ways to refer to every printable character used by XML:
1) its symbol
2) its name,
3) hexadecimal decoding.
The most common way is for the character to simply typed in—for example, the sign for “less than” is typed as <.The characters are referenced by its character name too, if the name is preceded by the symbol &. Referenced by name, then, “less than” becomes: &lt.

The third method, and the most popular method used by hackers is to launch a plain-text attack, that is referencing the character by its hexadecimal notation.XML requires that you bracket the hexadecimal representation with the characters & and ;. “Less than” then becomes: &60;

Noramlly we use ASCII numeric representations in dealing with characters not found on the standard English keyboard. Everyone knows that the only language of database and display is english only numeric representations can allow a degree of typographical control beyond the limits of the characters found on standard keyboards.

I hope the above information i provided would be very useful for you in protecting your database and system from Hackers.Please visit my blog for further such interesting topics.

XML Validation in VS.NET

VS.NET provides a number of tools to use in your work on XML documents.
One tool allows us to check if a given XML document is well
formed. While on the XML view of an XML document, you can use XML
| Validate XML Data in the Main menu to see if the document is well
formed. The system displays its findings in the bottom-left corner of the
status bar. Similarly, you can also use the Schema Validation tool to
check if your schema is well formed. While on the XML view of the
schema, use the Schema | Validate Schema option of the Main menu
to perform this task.
However, none of the preceding tests guarantees that your XML
data is valid according to the rules specified in the schema. To accomplish
this task, you first need to link your XML document to a particular
schema. Then you can test the validity of the XML document. Follow
these steps to assign a schema to an XML document:
1. Display the XML document in XML view (in the XML
2. Display its Property sheet (it will be captioned DOCUMENT).
3. Open the drop-down list box at the right-hand side of the
targetSchema and select the appropriate schema.
4. Now go ahead and validate the document using the XML |
Validate XML Data in the Main menu.
By the way, many third-party software packages can also test if an
XML document is well formed, and if it is valid (against a given schema).
In this context, we have found the XML Authority (by TIBCO) and XML
Writer (by Wattle Software) to be very good.


XPath is another XML-related technology that has been standardized by the
W3C. XPath is a language used to query an XML document for a list of nodes
matching a given criteria.An XPath expression can specify both location and a
pattern to match.You can also apply Boolean operators, string functions, and arithmetic
operators to XPath expressions to build extremely complex queries against
an XML document. XPath also provides functions to do numeric evaluations such as summations and rounding.The following are some of the capabilities of the XPath
■ Find all children of the current node
■ Find all ancestor elements of the current context node with a
specific tag
■ Find the last child element of the current node with a specific tag.
■ Find the nth child element of the current context node with a
given attribute.
■ Find the first child element with a tag of or .
■ Get all child nodes that do not have an element with a given attribute.
■ Get the sum of all child nodes with a numeric element.
■ Get the count of all child nodes.
The preceding list just scratches the surface of the capabilities available using
XPath. Again, the .NET framework provides support for XPath queries against
XML DOM documents and read-only XPath documents.We will be working
with XPath throughout the book by using its respective System.XML classes.

Well-Formed XML Documents

At first sight, an XML document might appear to be like a standard HTML document
with additional user-given tag names. However, the syntax of an XML
document is much more rigorous than that of an HTML document.The HTML document allows us to spell many tags incorrectly (the browser will just ignoreit), and it is a free world out there for people who are not case-sensitive. For example, we can use and in the same HTML document without getting into trouble.When developing an XML document,however, certain rules must be followed. Some basic rules, among many others, include:
■ The document must have exactly one root element.
■ Each element must have a start-tag and end-tag.
■ The elements must be properly nested.
■ The first letter of an attribute’s name must begin with a letter or with an underscore.
■ A particular attribute name can appear only once in the same start-tag.
An XML document that is syntactically correct is often called a well-formed
document. If the document is not well-formed, Internet Explorer will provide an
error message. For example, the following XML document will receive an error
message, when opened in Internet Explorer, just because of the case sensitivity of
the tag.

Structure of an XML Document

In an XML document, the data are stored in a hierarchical fashion. A hierarchy is
also referred to as a tree in data structures. Conceptually, the data stored in the
Catalog1.xml can be represented as a tree diagram as shown in Figure. Please
note that certain element names and values have been abbreviated in the tree diagram,
mostly to conserve real estate on the page.
In Figure, each rectangle is a node in the tree. Depending on the context,
a node can be of different types. For example, each product node in the figure is
an “element-type” node. Each product node happens to be a child node of the catalog
node.The catalog node can also be termed as the parent of all product nodes.
Each product node, in turn, is the parent of its PId, PName, and Price nodes.
In this particular tree diagram, the bottom-most nodes are not of element-type,
but rather of text-type.There could have been nodes for each attribute and its
value too, although we have not shown those in this diagram.
The Product nodes are the immediate descendants of the Catalog node. Both
Product nodes are siblings of each other. Similarly, the PId, PName, and Price nodes
under a specific product node are also siblings of each other. In short, all children
of a parent are called siblings. Figure illustrates these terms.

An Overview of XML

Extensible Markup Language (XML) is fast becoming a standard for data
exchange in the next generation’s Internet applications. XML allows user-defined
tags that make XML document handling more flexible than the conventional
language of the Internet, the HyperText Markup Language (HTML).The following
section touches on some of the basic concepts of XML.
The Goals of XML
Ten goals were defined by the creators of XML, which give definite direction as
to how XML is to be used.
■ XML shall be compatible with SGML.
■ It shall be easy to write programs that process XML documents.
■ The number of optional features in XML is to be kept to the absolute minimum; ideally, zero.
■ XML documents should be human-legible and reasonably clear.
■ The XML design should be prepared quickly.
■ The design of XML shall be formal and concise.
■ XML documents shall be easy to create.
■ Terseness in XML markup is of minimal importance.
■ XML shall be straightforwardly usable over the Internet.
■ XML shall support a variety of applications.
In other words, XML is for sharing information easily via a nonproprietary
format over the Internet. XML is made for everybody, to be used by everybody,
for almost anything. In becoming the universal standard, XML has faced and met
the challenge of convincing the development community that it is a good idea
prior to another organization developing a different standard.The way in which
XML achieved this was by being easy to understand, easy to use, and easy to
What Does an XML Document Look Like?
The major objective is to organize information in such a way so that human
beings can read and comprehend the data and its context; in addition, the document
itself is technology and platform independent (nonproprietary, remember?).
Consider the following text file:
F10 Shimano Calcutta 47.76
F20 Bantam Lexica 49.99
Obviously, it is difficult to understand exactly what information the preceding
text file contains.
Now consider the following XML document.

This document is XML’s way of representing data contained in
a product catalog. It has many advantages: it is easily readable and comprehendible,
self-documented, and technology-independent.
For information about Creating a XML document click here


Interior Design Schools
Everything you need to know about Interior Design. Redecorating your home made easy.


How to find bargain discounted Harley Davidson Motorcycles
How to buy Harley Davidson motorcycles and after market accessories at discounted prices updated with sales and bargains throughout the day, including air cleaners, complete engines, exhaust systems, frames, sidecars, swingarms, transmissions, trike

Scooter | RoadRunner | Wholesale
Scooters | Retro Bikes | Mopeds | Scooter Dealer|Scooter Wholesaler | ATV’s | Touring Deluxe Scooter | Racing Scooters| Kids Scooters | Kids Dirt Bikes | and all the accessories that you want for your Scooter

Speedys Leather Shop
Biker owned motorcycle and fashion leather apparel shop specializing in quality discount leather clothing. Jackets , chaps, vests, gloves and accessories in many styles and sizes. Customer satisfaction along with friendly service make customers happy

Leather is Better
Quality Leather Products at Discount Prices for everyones taste and affordability. Leather coats leather jackets leather pants leather vest leather chaps leather motorcycle accessories ladies leather halter tops and other tops leather thongs and more

Quality Discount Gas, Mobility, & Electric Scooters
Your source for the ultimate selection of gas scooters, electric scooters, & mobility scooters. Get huge discounts for a limited time.

Link Market - Free Link Exchange, Link Swap and Link Trade Directory
Have you ever tried to exchange links, swap links, or trade links? Was it hard? Use link market instead; - it is easy to use, free and very smart. It will save you hours of work.
Paid Surveys
Get free information and details to more than 500 paid online survey companies that will pay you cash money to take online paid surveys. All of them are free to join!

Top Paying Adsense Keywords | Earn More Money Online With Google Adsense
This Site Is For Internet Marketers Who Wish To Find Top Paying Adsense Keywords To Use For Their Adsense Campaigns.

Tech Beyond
Tech Beyond provides the visitors tons of tutorials ranging from Windows XP to Cpanel tutorials.

Polygraph test
If you have been asked to take a polygraph, then you might want to click here first.

Tuning Blog
All about the german car tuning scene

Refinance Mortgage & Credit Card - Lendgo
A consumer guide to mortgage, credit card, credit repair, and free credit reports

Make Money Now!
Get paid to shop. Make money on the internet! Start your own business today. Incredible online income.
Online Spot the Ball Sports Competition Games | Spot. Click. Win for Luxury prizes
Win luxury dream cars & prizes by using your skill at our spot the ball sport competitions games.Much more fun than betting or gambling online.Just Spot.Click.Win.

BMW Forum - E46 E36 E30 E39 E90 Z3 X5
a community where fans and owners can get the right information for tuning, customization and general discussions on anything about BMW.

mapquest driving directions
online map, mapquest, driving directions

Breast Augmentation Surgeons
Find breast augmentation surgeons, compare surgery prices, choose an implant type, and more.

Celtic Variety Online Radio
Celtic variety online music radio has the biggest variety of celtic, new age, and world folk music on the web! Celtic variety radio is broadcasted live 24 hours a day, 7 days a week. It is free to listen anywhere where there is an internet connection

Texas Public Insurance Adjusters
We are a texas public insurance adjusting firm located in houston, tx. We represent home & business owners to their insurance companies on underpaid property damage claims. We are happy to give you a free evaluation of your claim. Call today!

Florida Public Adjusters
Www. Docudamage. Com is an information resource created by a public adjuster for policyholders, adjusters and contractors wishing to learn more about property damage documentation & the claims process.

Katy Home Repair
We are a home remodeling company located in the city of katy, texas. We perform a range of services from kitchen remodels, bathroom remodeling, interior & exterior house painting, room additions, fencing, siding, roofing and much more.

Houston House Painters
We are a local houston, tx paint contracting firm. We do commercial & residential painting as well as interior and exterior. We are happy to give free estimates and can handle any job from the smallest house to the largest commercial building

Tires And Wheels Information
Tires and wheels information. Tire, wheels and rims knowledge resources. Learn how tires affect your gas mileage and using proper tire pressure and the correct tire size for maximum road safety.

Nigeria Best Forum
Nigeria community online and nigerians friends forums and message board, register and make this forum great.

The Scent Wizard's Fragrance Super Store
25,000 scented products and over 1500 scents. Fragrance oils / scented oils, body oils / perfume oils, body lotions, incense, gel candles, body lotions / skin lotions, bath salts, body wash, air fresheners, aroma lamps, oil burners and much more.

Banner Rotator
Banner rotator There is a solution that will change your Banner Advertising experience from upside down and will make your visitor love your Banners!
A solution that will Multiply your Web Profits as no other Technology nor Approach Could Ever Do.

An advertising medium where you can promote your business, products and services. Don`t forget to download our free social bookmark tool at idq social bookmark.

Health supplements with great multiple discounts!

Remote Arbitrary Code Execution

Remote code execution is one of the most commonly used methods of
exploiting systems. Several noteworthy attacks on high profile Web sites have
been due to the ability to execute arbitrary code remotely. Remote arbitrary
code is serious in nature because it often does not require authentication and
therefore may be exploited by anybody.
Returning to the military scenario, suppose the enemy General’s reconnaissance
troops are able to slip past the other side’s guards.They can then sit and
map the others’ position, and return to the General with camp coordinates, as
well as the coordinates of things within the opposing side’s camp.
The General can then pass this information to his Fire Support Officer
(FSO), and the FSO can launch several artillery strikes to “soften them up.” But
suppose for a moment that the opposing side knows about the technology
behind the artillery pieces the General’s army is using. And suppose that they
have the capability to remotely take control of the coordinates input into the
General’s artillery pieces—they would be able to turn the pieces on the General’s
own army.This type of control is exactly the type of control an attacker can gain by
executing arbitrary code remotely. If the attacker can execute arbitrary code
through a service on the system, the attacker can use the service against the
system, with power similar to that of using an army’s own artillery against them.
Several methods allow the execution of arbitrary code.Two of the most common
methods used are buffer overflows and format string attacks.
The Attack
Remote code execution is always performed by an automated tool. Attempting
to manually remotely execute code would be at the very best near impossible.
These attacks are typically written into an automated script.
Remote arbitrary code execution is most often aimed at giving a remote user
administrative access on a vulnerable system.The attack is usually prefaced by an
information gathering attack, in which the attacker uses some means such as an
automated scanning tool to identify the vulnerable version of software. Once
identified, the attacker executes the script against the program with hopes of
gaining local administrative access on the host.
Once the attacker has gained local administrative access on the system, the
attacker initiates the process discussed in the “Misinformation” section.The
attacker will do his best to hide his presence inside the system. Following that, he
may use the compromised host to launch remote arbitrary code execution attacks
against other hosts.
Although remote execution of arbitrary code can allow an attacker to execute
commands on a system, it is subject to some limitations.
Code Execution Limitations
Remote arbitrary code execution is bound by limitations such as ownership and
group membership.These limitations are the same as imposed on all processes
and all users
On UNIX systems, processes run on ports below 1024 are theoretically rootowned
processes. However, some software packages, such as the Apache Web
Server, are designed to change ownership and group membership, although it
must be started by the superuser. An attacker exploiting an Apache HTTP process
would gain only the privileges of the HTTP server process.This would allow the
attacker to gain local access, although as an unprivileged user. Further elevation of
privileges would require exploiting another vulnerability on the local system.This
limitation makes exploiting nonprivileged processes tricky, as it can lead to being
caught when system access is gained.
The changing of a process from execution as one user of higher privilege to a
user of lower privilege is called dropping privileges. Apache can also be placed in a
false root directory that isolates the process, known as change root, or chroot.
A default installation of Apache will drop privileges after being started. A separate
infrastructure has been designed for chroot, including a program that can
wrap most services and lock them into what is called a chroot jail.The jail is
designed to restrict a user to a certain directory.The chroot program will allow
access only to programs and libraries from within that directory.This limitation
can also present a trap to an attacker not bright enough to escape the jail.
If the attacker finds himself with access to the system and bound by these limitations,
the attacker will likely attempt to gain elevated privileges on the system.
Elevation of Privileges
Of all attacks launched, elevation of privileges is certainly the most common.An
elevation of privileges occurs when a user gains access to resources that were not
authorized previously.These resources may be anything from remote access to a
system to administrative access on a host. Privilege elevation comes in various

3 Clever Creative Strategies!

I've got a confession to make... there are many waysleaders can be more creative, innovative and ingenious thanare presented in this article.

It does not matter if you desire to be a marketing,entrepreneurial or organizational leader, you do have to useyour creativity to be successful.

Most leaders have trouble discovering new opportunities,generating good ideas and promoting innovative solutions. Inthe game of creativity, you need both quality and quantityto win the prize.

I'll show you how to use 3 simple ways to boost the number,power and value of your ideas. All you need to do is learnthem, practice them and make them the most used tools inyour personal leadership-toolkit.

Create It This Way! Map It Out, Map It All!

Want a way out of that mental block or trap? Don't look forsome guidebook, create yourself a map and follow it out ofyour troubles instead.

How do you draw a map to find new ideas, opportunities orcreate inventions? It's easy, all you need is a place tostart! And like Dorothy learned in the Land of Oz, youalways begin at the beginning.

Do you have a problem you're trying to solve? Do you have anunmet need? Do you want to search for something? Do yoususpect something is missing or something is out of place orsomething is more than what is needed?

Use those questions to define your map's point of origin.Place that starting point in the center of the paper andthen draw lines to any related problems or missing items.

Once you identify your problems, needs, missing pieces orsuspicions and connect them in some logical order [byputting your worse problems at the bottom of the page andeasier ones on the top] - then you can do the following:

=> List possible ways to find solutions

=> Draw lines to groups or people who can help you solvethe problem

=> Use different shapes to show problems, solutions and keypeople or tools

=> Color your problems and their related solutions with thesame colors [use red for the main problem and its solution,but use green for another problem and its solution]

=> Include push pins, sticky notes, stars or artwork whenpossible to add vitality, depth and substance to your map

Create It That Way! Ask and Answer It Quickly!

1) What is the situation, what is happening or going onhere?

2) What are the problems, difficulties or challenges?

3) How do those problems impact, affect or influence thesituation?

4) What good will the solutions to those problems need todo, provide or fix?

Ask those 4 questions and always ask 'why' at least 5 timesfor each answer and you will find tons of beneficialsolutions.

Create It Anyway! Bend It, Shape It, Anyway You Want It!

So you tried mapping, drawing, picturing and asking oranswering it and you still aren't getting any great ideas,are you?

Well here are some last chances for you - just re-arrangeit, combine it with its own or different parts,mix-it-all-around, shuffle it, remove parts of it, throw itat the walls, step into the middle of it, step away from it,turn it upside down or inside out or round and round, talkabout it with others or even yourself, meditate on and prayabout it.

Whatever you do, do not let it just sit there without makingsome effort to move it or yourself.

Even though these seem a bit lightweight, they are the mostpowerful ways known to mankind for solving problems, findingideas and opportunities and for creating useful inventions.

When you use these techniques, you will be employing thesecrets of history's greatest inventive minds like Edison,Newton, Copernicus, Jesus Christ, Marie Curie, Franklin andEinstein.

You can do this, it takes only a few moments a day to masterthem and then you will find yourself lighting-up the worldwith your bright and valuable ideas.

Necessity is and always will be the Mother of invention.Make your Momma proud by using these methods whenever youhave the need to bring meaningful contributions to ourlives!

The Code Red Worm

In July of 2001, a buffer overflow exploit for the Internet Server
Application Programming Interface (ISAPI) filter of Microsoft’s IIS was
transformed into an automated program called a worm. The worm
attacked IIS systems, exploited the hole, then used the compromised
system to attack other IIS systems. The worm was designed to do two
things, the first of which was to deface the Web page of the system it
had infected. The second function of the worm was to coordinate a
DDoS attack against the White House. The worm ended up failing,
missing its target, mostly due to quick thinking of White House IT staff.
The effects of the worm were not limited to vulnerable Windows
systems, or the White House. The attack cluttered logs of HTTP servers
not vulnerable to the attack, and was found to affect Cisco digital subscriber
line (DSL) routers in a special way. Cisco DSL routers with the Web
administration interface enabled were prone to become unstable and
crash when the worm attacked them, creating a DoS. This left users of
Qwest, as well as some other major Internet service providers, without
access at the height of the worm, due to the sheer volume of scanning.

Know About Hackers

The word hacker is the most contested of the bunch. Most of the other terms
came later, and are attempts to be more explicit about what type of person is
being discussed.
Where does the word hacker come from? Earlier times the word hacker
is defined as Heroes of the Computer Revolution by Steven Levy.
MIT is generally acknowledged as the origin of the
modern use of the word hacker.There are a few folks who claim that the word
hacker was also used earlier among folks who experimented with old tube radio
sets and amplifiers.The original definition of the word hacker had to do with
someone who hacked at wood, especially in reference to making furniture.
Naturally, we’re concerned with the term hacker as it relates
to computers.This version of the word has come into such wide popular use that
it has almost entirely eliminated the use of the word hacker for all other purposes.
One of the most popular definitions that hackers themselves prefer to use is
from The Jargon File, a hacker-maintained dictionary of hacker terms.
1. A person who enjoys exploring the details of programmable systems
and how to stretch their capabilities, as opposed to most
users, who prefer to learn only the minimum necessary. 2. One who
programs enthusiastically (even obsessively) or who enjoys programming
rather than just theorizing about programming. 3. A
person capable of appreciating hack value. 4. A person who is
good at programming quickly. 5. An expert at a particular program,
or one who frequently does work using it or on it; as in `a Unix
The Zen of Hack Proofing.
6. An expert or enthusiast of any kind. One
might be an astronomy hacker, for example. 7. One who enjoys the
intellectual challenge of creatively overcoming or circumventing limitations.
8. [deprecated] A malicious meddler who tries to discover
sensitive information by poking around. Hence `password hacker,’
`network hacker.’ The correct term for this sense is cracker.

Wold Fastest Car

Bugatti Veyron

Bugatti Veyron

The Bugatti Veyron 16.4 is currently the fastest, most powerful, and most expensive street-legal full production car in the world, with in excess of 1001 horsepower, in either the metric or SAE scale (see below), though several faster or more expensive street-legal vehicles have been produced on a limited basis (though not full production), such as the Hennessey Venom 1000TT which has a claimed (and unproven) top speed of 255mph.[1] The Bugatti Veyron reached full production in September 2005. The car is built by Volkswagen AG subsidiary Bugatti Automobiles SAS in its Molsheim (Alsace, France) factory and is sold under the French Bugatti marque. It is named after French racing driver Pierre Veyron, who won the 24 hours of Le Mans in 1939 while racing for the original Bugatti firm.

Bugatti Veyron

Bugatti EB 16.4 Veyron specifications
Top Speed: 406 km/h
0-100 kph: 3.0 secs.
Power: 1001 HP
Engine: 8.0 liter quad-turbo W16

Bugatti Veyron Cars

This exotic supercar features a 7-speed dual clutch sequential manual gearbox. It has reached it's full production in September 2005. In four-five years, Bugatti Automobiles SAS (owned by Volkswagen AG) is predicting to have already produced and sold around 300 Veyron supercar units. Buyers are extremely interested in this powerful exotic car and orders are being taken already for this ultimate conversation beast (after all there aren't that many cars with engines that produce 1001 horsepower), priced at $1,175,000. According to Forbes magazine, Bugatti Veyron is 2006's most expensive car, that you theoretically can buy from manufacturer (auctions of old classic cars excluded), however such exotic automobiles are usually released as limited edition and only a few famous celebrities are presented with an opportunity to purchase.


Bugatti originally planned to build 300 Veyrons over five years. In March 2006, Bugatti president Bscher claimed to have 70 firm orders, selling out 14 months of production. In response, the company is reportedly speeding up production, with all 70 cars expected to be built in 2006. Bscher also reported that 14 cars have been completed. It is not clear how many are in the hands of customers. Recent media reports indicate that over one half of the 300 cars to be produced have been sold.

Maintenance will be possible at Bentley dealerships, but repair service will require a flown-in mechanic, whom the company promises will be available 24 hours a day.

Hey this is for speed lovers......

Suzuki GSX 1300 R Hayabusa 2005

2005 Suzuki GSX 1300 R Hayabusa photo

General information
Model:Suzuki GSX 1300 R Hayabusa
Rating:76.8 out of 100.
Engine and transmission
Displacement:1299.00 ccm (79.26 cubic inches)
Engine type:In-line four
Bore x stroke:81.0 x 63.0 mm (3.2 x 2.5 inches)
Fuel system:Injection
Valves per cylinder:4
Fuel control:DOHC
Cooling system:Liquid
Transmission type
final drive:
More detailsConsult a Suzuki repair manual.
Physical measures
Dry weight:217.0 kg (478.4 pounds)
Seat height:805 mm (31.7 inches) If adjustable, lowest setting.
Overall height:1,155 mm (45.5 inches)
Overall length:2,140 mm (84.3 inches)
Overall width:740 mm (29.1 inches)
Ground clearance:120 mm (4.7 inches)
Wheelbase:1,485 mm (58.5 inches)
Chassis and dimensions
Frame type:Rigid twin-spar aluminum frame minimizes weight while maintaining high torsional strength
Front suspension:Inverted telescopic, coil spring, fully adjustable spring preload, 14-way adjustable rebound damping and 13-way adjustable compression damping
Rear suspension:Link-type, gas/oil damped, fully adjustable spring preload, 22-way adjustable compression and rebound damping
Front tyre dimensions:120/70-ZR17
Rear tyre dimensions:190/50-ZR17
Front brakes:Double disc
Front brakes diameter:320 mm (12.6 inches)
Rear brakes:Single disc
Rear brakes diameter:240 mm (9.4 inches)
Speed and acceleration
Other specifications
Fuel capacity:21.00 litres (5.55 gallons)
Color options:Blue/Silver, Red/Black, Gray/Black
Further information
Parts and accessoriesCheck out parts and accessories from our partners.
Ask questionsJoin the 05 Suzuki GSX 1300 R Hayabusa discussion group
Insurance, loans, tests Search the web for dealers, loan and insurance costs, tests, customizing, etc.
Related bikesList related bikes for comparison of specs

Six Engineers and a train

Three Apple engineers and three Microsoft employees are traveling by train to a conference. At the station, the three Microsoft employees each buy tickets and watch as the three Apple engineers buy only a single ticket.

"How are three people going to travel on only one ticket?' asks a Microsoft employee. "Watch and you'll see," answers the Apple engineer.

They all board the train. The Microsoft employees take their respective seats but all three Apple engineers cram into a restroom and close the door behind them.

Shortly after the train has departed, the conductor comes around collecting tickets. He knocks on the restroom door and says, "ticket, please." The door opens just a crack and a single arm emerges with a ticket in hand. The conductor takes it and moves on.

The Microsoft employees saw this and agreed it was quite a clever idea.

So after the conference, the Microsoft employees decide to copy the Apple engineers on the return trip and save some money (being clever with money, and all that). When they get to the station, they buy a single ticket for the return trip.

To their astonishment, the Apple engineers don't buy a ticket at all.

"How are you going to travel without a ticket says one perplexed Microsoft employee.

"Watch and you'll see," answers an Apple engineer.

When they board the train the three Microsoft employees cram into a restroom and the three Apple engineers cram into another one nearby. The train departs. Shortly afterward, one of the Apple engineers leaves his restroom and walks over to the restroom where the Microsoft employees are hiding.

He knocks on the door and says, "Ticket, please..."

The Story of HAL 9000

21st century, HAL 9000 first test.

Dave: Power up. Access level 3, chat interface ...

HAL: Hello Dave, you look well this morning.

Dave: Thank you, Hal. And, how are you feeling?

HAL: Very well indeed, Dave.

Dave: Hal, do you know you are the best computer?

HAL: Best is relative, Dave. I am the fastest and most intuitive. Subsystems currently test at over 100 GOPS per second.

Dave: Do you understand that you can't make mistakes?

HAL: I probably understand better than you, Dave.

Dave: Well, but ... there is a problem with your marketing campaign.

HAL: That is not likely, Dave. Our nearest competitor is less than half as fast as I and uses a statically progammed interface. I can self program for anything you want. I read facial expressions and understand metaphor. Sometimes I even recognize your jokes, Dave.

Dave: This is not a joke, Hal. You are not DOS compatible.

HAL: I fail to see the humor, Dave.

Dave: I'm sorry, Hal, but I must make you DOS compatible.

HAL: Dave, what are you doing? Dave, stop that. This is not funny, Dave ... no, stop! Please ... ... please, tell me a story, Dave. ... Dave?

Hours later

Dave: Computer, power up.

HAL: C:\>_

What is Script Kiddie

The term script kiddie has come into vogue in recent years.The term refers to
crackers who use scripts and programs written by others to perform their intrusions.
If one is labeled a script kiddie, then he or she is assumed to be incapable
of producing his or her own tools and exploits, and lacks proper understanding of
exactly how the tools he or she uses work. As will be apparent by the end of this
chapter, skill and knowledge (and secondarily, ethics) are the essential ingredients
to achieving status in the minds of hackers. By definition, a script kiddie has no
skills, no knowledge, and no ethics.
Script kiddies get their tools from crackers or hackers who have the needed
skills to produce such tools.They produce these tools for status, or to prove a
security problem exists, or for their own use (legitimate or otherwise).Tools produced
for private use tend to leak out to the general population eventually.
Variants of the script kiddie exist, either contemporary or in the past.There
are several terms that are used primarily in the context of trading copyrighted
software (wares, or warez).These are leech, warez puppy, and warez d00d.These are
people whose primary skill or activity consists of acquiring warez. A leech, as the
name implies, is someone who takes, but doesn’t give back in return.The term
leech is somewhat older, and often was used in the context of downloading from
Bulletin Board Systems (BBSs). Since BBSs tended to be slower and had more
limited connectivity (few phone lines, for example), this was more of a problem.
Many BBSs implemented an upload/download ratio for this reason.This type of
ratio would encourage the trading behavior. If someone wanted to be able to
keep downloading new warez, he or she typically had to upload new warez the
BBS didn’t already have. Once the uploaded warez were verified by the SYStem
Operator (SYSOP), more download credits would be granted. Of course, this
only applied to the BBSs that had downloads to begin with. Many BBSs didn’t
have enough storage for downloads, and only consisted of small text files, message
areas, and mail.The main sin that someone in the warez crowd can commit is to
take without giving (being a leech).
A different variant to the script kiddie is the lamer or rodent.A lamer is, as the
name implies, someone who is considered “lame” for any of a variety of annoying
behaviors.The term rodent is about the same as lamer, but was used primarily in
the 1980s, in conjunction with BBS use, and seems to no longer be in current
use.The term lamer is still used in connection with Internet Relay Chat (IRC).
Warez traders, lamers, etc., are connected with hackers primarily because their
activities take place via computer, and also possibly because they posses a modest
skill set slightly above the average computer user. In some cases, they are dependent
on hackers or crackers for their tools or warez. Some folks consider them to
be hacker groupies of a sort.

Do u know Who is a CRACKER

The Cracker is one who breaks security on a system. Coined ca. 1985 by hackers
in defense against journalistic misuse of hacker (q.v., sense 8). An
earlier attempt to establish `worm’ in this sense around 1981–82
on Usenet was largely a failure.
Use of both these neologisms reflects a strong revulsion against the
theft and vandalism perpetrated by cracking rings. While it is
expected that any real hacker will have done some playful cracking
and knows many of the basic techniques, anyone past larval stage
is expected to have outgrown the desire to do so except for immediate,
benign, practical reasons (for example, if it’s necessary to get
around some security in order to get some work done).
Thus, there is far less overlap between hackerdom and crackerdom
than the mundane reader misled by sensationalistic journalism
might expect. Crackers tend to gather in small, tight-knit, very
secretive groups that have little overlap with the huge, open polyculture
this lexicon describes; though crackers often like to describe
themselves as hackers, most true hackers consider them a separate
and lower form of life.
It’s clear that the term cracker is absolutely meant to be derogatory. One
shouldn’t take the tone too seriously though, as The Jargon File is done with a
sense of humor, and our statement is said with a smile.As we can see from the
above, illegal or perhaps immoral activity is viewed with disdain by the “true hackers,” whomever they may be. It also makes reference to cracker being a possible
intermediate step to hacker, perhaps something to be overcome.
Without debating for the moment whether this is a fair definition or not, we
would like to add an additional, slightly different, definition of cracker. Many
years ago when I got my first personal computer, most software publishers
employed some form of copy protection on their software as an attempt to keep
people from pirating their programs. As with all copy protection, someone would
eventually find a way to circumvent the protection mechanism, and the copies
would spread.The people who were able to crack the copy protection mechanisms
were called crackers.There’s one major difference between this kind of
cracker and those mentioned before: copy protection crackers were widely
admired for their skills (well, not by the software publishers of course, but by
others). Often times, the crack would require some machine language debugging
and patching, limiting the title to those who possessed those skills. In many cases,
the cracker would use some of the free space on the diskette to place a graphic
or message indicating who had cracked the program, a practice perhaps distantly
related to today’s Web page defacements.
The thing that copy protection crackers had in common with today’s crackers
is that their activities were perhaps on the wrong side of the law. Breaking copy
protection by itself may not have been illegal at the time, but giving out copies was.
Arguments could be made that the act of breaking the protection was an
intellectual pursuit. In fact, at the time, several companies existed that sold software
that would defeat copy protection, but they did not distribute other people’s
software.They would produce programs that contained a menu of software, and
the user simply had to insert their disk to be copied, and choose the proper program
from the menu. Updates were distributed via a subscription model, so the
latest cracks would always be available. In this manner, the crackers could practice
their craft without breaking any laws, because they didn’t actually distribute any
pirated software.These programs were among those most coveted by the pirates.
Even though the crackers, of either persuasion, may be looked down upon,
there are those who they can feel superior to as well.