Visit and Explore Space Universe Virtually with Google Earth Sky 4.2

Google Earth, a popular virtual globe geography and mapping program, shouldn’t actually still be named Google Earth, instead, Google Universe may be a more appropriate name as it now incorporates Google Sky mode component, which allows you to view, visit and explore the cosmos space and the universe virtually and close-up. With the release of Google Earth 4.2, computer users can now tour the outer space and watch the stars and galaxies without firing into the sky in a space shuttle.

Google Sky add-on to Google Earth is developed with partnership from some of the world’s leading observatories such as Sloan Digital Sky Survey, Digital Sky Survey Consortium which obtained photographic data from Oschin Schmidt Telescope on Palomar Mountain and the UK Schmidt Telescope and NASA/Space Telescope Institute, the science operations center for Hubble space telescope, the main source for Google Earth Sky add-on service where public astronomical images as well as color astronomical images of all of the archived data from Hubble’s Advanced Camera for Surveys will be added and shown, together with newly released Hubble pictures will be added to the Google Sky program as soon as they are issued.

According to Google Earth and Maps Team blog, there are 100 million individual stars and 200 million galaxies that can be zoom in to close up view and take a detailed tour in Sky. Google Sky allows users to zoom in to distant galaxies and nebulae, flip up and see the constellations, watch the moviements of the planets, observe the shape of your own zodiac or astronomical sign such as Aries (The Ram), Taurus (The Bull), Gemini (The Twins), Cancer (The Crab), Leo (The Lion), Virgo (The Virgin), Libra (The Scales), Scorpius (The Scorpion), Sagittarius (The Archer), Capricornus (The Sea-goat), Aquarius (The Water-carrier) and Pisces (The Fishes), learn about the lifecycle of a star and different kind of galaxies. Users can also search for stars, galaxies, nebulae and fly through space inside Google Earth, or create and share own imagery, placemarks and more. More importantly, there is additional function that will overlay maps, charts and user guides onto the night sky, describing in detail each identified astronomical objects including famous constellations such as Orion, Andromeda and Cassiopeia.

Source :
| Continue Reading..

Apple iPhone vs. Nokia N95

Perhaps no other cell phone in history has been as anticipated as Apple's iPhone. From the moment it was announced by Apple to the time it was released six months later, the cell phone was a constant topic of rumors and speculation.

Now that it's here, we can report that the iPhone largely succeeds on most fronts, particularly as a music player, but it's hardly the only cell phone with multimedia prowess. The Nokia N95 also offers a raft of music and video features and admirable performance. So which one is better, you ask? Well CNET is here to provide an answer, as we pit the two phones against each other in their first head-to-head match-up.

Let's have a clean fight, fellas. Ding ding!

Round 1: Sexiness
Design and looks count for a lot when you're shopping for a cell phone, so here's where we examine the look, size, feel, and sex appeal of the devices. Our individual judges' ratings are based on a 0-to-5-point scale, which results in a final score of 0 to 15 points per round.

Round 2: Navigation
Do you need the manual to turn it on? Sexiness is one thing, but are the devices easy to use? In Round 2, we examine the design and usability of the devices' navigation controls and keypad buttons.
Round 3: Features
What do these phones offer under the hood? Here, we examine the features in each device and rate which phone offers more

Winner: Nokia N95

Source :

| Continue Reading..

Why buy a genuine Windows Vista when pirated is easier and better?

Recently Microsoft had a 50% price cut for Home Basic and Home Premium Editions of Windows Vista. The price cut is mainly targeted at China which has the 2nd highest software piracy rate in the world after Vietnam. Thanks to thepodest for this post on the blog.

The reason is to compete with pirate software market. Pirated version is better, why buy an expensive genuine copy? I would like to share my thoughts on this.

Consider these facts:

1. Limited number of reinstalltions of Windows Vista.
2. Activation via internet or phone activation.
3. Hardware upgrade problems.
4. It’s expensive.


1. No reinstallations problem.
2. No any kind of activation, easy to install cracks, pre-cracked Windows Vista.
3. Noone cares if your hardware changes.
4. Yeb. It’s free :P

No features are missing with pirated Windows Vista. They are identical. Why buy genuine?

Why buy a real copy of Windows Vista?? Activation is the pain in ass. You can install your pirated copy of Windows Vista many times as you like, with a genuine copy you have to do a phone activation and explain them why you need to reinstall and of course there’s only a limited number times you can do this. Also if you feel like upgrading your hardware with “genuine” copy of Vista installed, think again because you license for Windows Vista might be taken away and having to reactivate since Windows Vista activation system keeps track of your hardware and suspect that you have pirated Vista installed same thing might happen if you install drivers for your hardware.

As you can see pirated gives you more flexibility and easier installation. You see that by buying genuine copy is just having to activate and run into license problems.

Windows Genuine Advantage???? Think again, Windows Genuine Disadvantage sounds right to me.

| Continue Reading..

Stop the Windows Vista Features and Services Harvesting User Data for Microsoft

There is a constant flow of communication between Windows Vista and Microsoft. A collection of features and services across Microsoft's latest desktop operating system exchange data with locations on the Internet, including those belonging to the Redmond company.

Even though end user privacy is yet to have an internationally standardized model built to benefit the consumer, with Windows Vista, Microsoft has striven for a certain degree of transparency. The company did publish an extensive list of all the features associated with the data collection and use practices of Windows Vista, and additional Microsoft services involved in transmitting and serving the information collected from end users to Redmond. The full and printable version of the Windows Vista Privacy Statement, including the supplementary information related to specific items on the platform is available for download here.

However, Microsoft is as transparent as it is translucent, and the list only "focuses on features that communicate with the Internet and is not intended to be an exhaustive list. It does not apply to other online or offline Microsoft sites, products or services." One important aspect to keep in mind is that end users do have a choice in the matter; although Microsoft's perspective is somewhat of a shift from such a scenario, while still having the end users' best interests at heart, of course. "To make Windows Vista work better with the Internet, some features that do not collect personal information are turned on by default. You can choose to disable these features," reads a fragment posted under Your Choices in the Windows Vista Privacy Notice Highlights. Yes, your choices... rather ironic... because since you do have a choice in the matter, the company went ahead and enabled a plethora of features in the operating system designed to support the flow of data between your copy of the operating system and Microsoft.

A couple of months ago, you have been able to read about all the Vista features and services harvesting user data for Microsoft from your machine. Now I am going to take it one step further and revisit the subject. This is nothing more than to provide a response to the feedback asking for methods to stop Vista from harvesting data for the Redmond company. But while doing so, you also have to consider the fact that the data flow between your copy of Vista and Microsoft is indeed beneficial, and that the automatic input that your operating system is providing is used to evolve the company's products and ultimately improve your users experience. "We use the information collected to enable the features you are using or provide the services you request. We also use it to improve our products and services," the company promises in the Vista privacy statement.

Controlling Vista's Communications with Microsoft

Ultimately, it all comes down to control. And Windows Vista brings to the table the means to limit and even isolate the operating system from Microsoft. Of course that taking your Vista machine offline is the best way to cut the operating system off from the Redmond company, but that is no option at all. In fact, there are very few viable scenarios of computers not connected to the Internet, mainly in corporate environments. And it is at the corporate level that Microsoft is providing the necessary resources to control the communication between Vista and the Internet via the options built into features or into the platform, or through server configuration management features. Essentially, Microsoft focuses on Windows Vista Business and Windows Vista Enterprise editions. This because some of the limitations involve making use of Group Policies and tasks not meant for the end user, but for administrators. However, while Windows Vista Starter, Home Basic, Home Premium, and even Ultimate are not specifically addressed, the methods of controlling Vista communications with Microsoft also extend to them.

Windows Vista Activation

Windows Vista Activation is mandatory. And there a single, legitimate way to bypass it. While of course there are documented methods for circumventing the Vista activation mechanism, they are also illegal, and that is not the scope of this article. But skipping the activation process entirely is possible only if you acquire a computer with the operating system preinstalled. In such cases, Vista is intimately connected with the machine's basic input/output system (BIOS). Activation is a general Microsoft anti-piracy measure set in place to bound a product key with the computer hardware running a copy of Vista, and as such cannot be disabled. A Vista copy on a computer not behind a modem will access via port 80 and using HTTP during the activation process. Through a modem, Vista will connect to making use of port 443 and HTTPS.

Microsoft revealed the information that is being transmitted by Vista during activation:

• Request information, that is, protocol information necessary for successfully establishing communication with the activation server.
• The product key and supporting validation data.
• A group of hardware hashes (non-unique numbers generated from the computer's hardware configuration). The hardware hashes do not represent any personal information or anything about the software. They are based on the SHA-1 message-digest hash algorithm, and they consist of a combination of partial SHA-1 hash values of various computer components. The hardware hashes cannot be used to determine the make or model of the computer, nor can they be backward-calculated to determine the raw computer information.
• Along with the hashes, information about the algorithm used for the hashes is sent.
• An XrML license that uses public key encryption.
• The operating system being activated and the version number of the activation software.

With the exception of preinstalled OEM Vista, all other copies of the operating system, be them retail or volume license, have to be activated. For end users, the process is straight forward and completely automated. In corporate environments, the options are activation through Key Management Service (KMS) servers (reactivation required twice a year) or Multiple Activation Key (MAK) through Microsoft activation servers or using a MAK Proxy Activation (each MAK has assigned a limit of activations).

Device Manager and Hardware Wizards

The Device Manager and the hardware wizards in Windows Vista communicate to Microsoft, volunteering your system configuration and the adjacent devices integrated with the operating system. With Vista, Microsoft is offering device drivers through its Windows Update infrastructure. Device Manager is a system management tool providing an overview on the hardware installation and configuration across a system, but also on the interactions between the hardware and the software deployed, as well as a centralized location for handling settings, updates and troubleshooting. In contrast, hardware wizards streamline the process of installing a driver associated with a certain device. In this context, the Found New Hardware Wizard will search the Windows Update Web site, and download and install the necessary drivers if available, but only with the consent of the user. Of course that, if the Automatic Updating feature is installed, Vista will perform the tasks associated with device driver search, download and installation alone, taking the user out of the equation.

Device Manager is tied to the Update Driver Software Wizard, which in its turn is configured by default to search Windows Update. Plug and Play devices will launch the Found New Hardware Wizard. Windows Update device driver searching and prompts can be limited from the Control Panel. Just make your way via Start, Control Panel, System Maintenance, System, Advanced system settings, select the Hardware tab and then Windows Update Driver Settings. Here you can opt for one out of three options:

• Check for drivers automatically.
• Ask me each time I connect a new device before checking for drivers.
• Never check for drivers when I connect a device.

Of course that turning off the automated mechanism set in place in Windows Vista for device driver retrieval and installation could result in a depreciation of user experience and is not recommended, but make no mistake about it, Microsoft will get your hardware configuration in the process.

Dynamic Updates

Ever installed Windows Vista from Windows XP? Well if you did, you have undoubtedly noticed that the Setup for Windows Vista asks you for permission to check online for new Setup files, drivers and other files. Dynamic Update will automatically connect to Microsoft and use updated setup software, new drivers available and high-priority updates to features of the operating system, instead of the resources on the installation media. Dynamic Update sends to Microsoft the exact operating system version and information about network, video, audio, and mass storage hardware for the necessary drivers to be downloaded and deployed. In order to prevent Dynamic Updates from contacting Microsoft, just choose not to use the feature when prompted.

Event Viewer

Event Viewer is a system tool that keeps track of all the hardware and software issues and the security events on your machine, also permitting the users to manage and view event logs. The utility can be accessed by entering Event Viewer in the search box under the Start menu, and pressing Ctrl + Shift + Enter in order to launch it with elevated privileges. Event Viewer will only sent Microsoft information if the user clicks on the Event Log Online Help link that will access the site. "To access the relevant Help information provided by the link in the Event Properties dialog box, the user must send the information listed about the event. The data collected is limited to what is needed for retrieving more information about the event from the Event Log Online Help. User names, e-mail addresses, and names of files unrelated to the logged event are not collected," Microsoft informed.

The Redmond company will receive information related to the company name and software vendor, the date and time, the name and version of the product in the even log, and the ID, source and locale for the specific event. However, the user has to access the Event Log Online Help for Microsoft to receive the data.

File Association Web Service

The File Association Web Service in Windows Vista also whispers in Microsoft's ear. The service is designed to bridge the gap between files with specific name extensions and the default application or the operating system feature used to manage them. Windows Vista creates an automatic association between a file and a program, and stores it locally on the computer. If the operating system has to deal with a file that is not connected with a specific program to open it, Vista will send a query to a Microsoft website. "If you want to limit the flow of information from the file association Web service to the Internet, you can use your firewall to block access to any Web site that contains the following string:" Microsoft reveals.

Help and Support Features

Online Help, Help ratings and feedback and the Help Experience Improvement Program all constitute the support features that Windows Vista has to offer. All the examples enumerated above communicate with Microsoft when accessed by the end user. Windows Help and Support comes with the option to also search online for user queries, in addition to the data that is available on the local system. Via the Help ratings and feedback, users can choose to provide Microsoft with their input while the fully optional Help Experience Improvement Program will transmit to the company customer information related to Help search topics and navigation. Users can simply open Windows Help and Support by typing the words in the search box under the Start menu and from the menu in the upper right hand corner select Settings and then uncheck the "Include Windows Online Help and Support when you search for help" option. Additionally, also take care that the Join the Help Experience Improvement Program box is cleared.

Microsoft informed that in order to "help determine the correct Help topic to display, certain information is collected from the user’s computer and uploaded to a server at Microsoft that hosts the updated Help topics". Following is a list of the information collected:

• The search text string entered by the user (if the user is searching) or the unique identifier for the topic to be displayed (if the user has clicked on a topic link;
• The language/locale identifier, for example, en-us for English (United States)
• The version of the operating system installed, for example, Windows Vista Business
• A standard parameter that specifies that the topic should be downloaded in a compressed form (CAB file) if available, and uncompressed if not;

Plug and Play

According to Microsoft: "Plug and Play in Windows Vista provides the following functionality:

• Detects a Plug and Play device and determines its hardware resource requirements and device identification number (Plug and Play ID).
• Locates an appropriate device driver for newly installed devices.
• Allocates hardware resources.
• Dynamically loads, initializes, and unloads drivers.
• Notifies other drivers and applications when a new device is available.
• Handles stop and start processes for devices during hibernation, standby, and startup and shutdown operations (in conjunction with power management).
• Supports a wide range of device types."

In order to prevent the Plug and Play automatic wizard from accessing Microsoft with information related to the device you want to integrate with Windows Vista, make sure to enable the "Never check for drivers when I connect a device" option in Windows Update Driver Settings in Control Panel, under System Maintenance, Advanced system settings and Hardware.

Make sure to check back in next week for the second part of how to stop Windows Vista features and services from harvesting user data for Microsoft.


| Continue Reading..

Why Microsoft Is Going Open Source

No one would have believed me if I had said five years ago that Microsoft would have a page on its Web site called “Open Source at Microsoft” with the following remarkably sane and reasonable statement on the subject:

Microsoft is focused on helping customers and partners succeed in a heterogeneous technology world. This starts with participating and contributing to a broad range of choices for developing and deploying software, including open source approaches and applications. From thousands of lines of code and scripts on MSDN and TechNet, to open source applications like IronPython, ASP.NET AJAX, SharePoint Learning Kit, and WiX on CodePlex and SourceForge, Microsoft is continually growing the number of products released with open source access.

That's right: Microsoft has released not one but several pieces of code as open source. Moreover, it's submitting some of its home-grown licences to the Open Source Initiative for approval. So what is going on here?

In part, I think that Microsoft's own analysis of its motives is true: we do live in a heterogeneous world of technology, and the creation of Microsoft's open source pages and projects reflects a long-overdue reflection of this fact. It is also testimony to the continuing success of free software. Initially Microsoft obviously hoped it would prove a fashion that would eventually fade way, but as its own FAQ states:

Open source is neither an industry fad, nor a magic bullet.

Another major factor is that Microsoft is clearly keen to try out new development methodologies in the light of the growing failure of its traditional approaches to deliver products anywhere near to their original launch dates (Vista, anyone?). In order to do that, it needs to drop the rather crass Manichean view of "closed source good, open source bad", for something a little more nuanced.

Now, as the opening statement on the Open Source page states, the official line is that there are “a broad range of choices for developing and deploying software, including open source approaches and applications”. This obviously allows Microsoft itself to adopt open source methodologies without appearing hypocritical and ridiculous.

But I think there is another aspect to Microsoft's latest moves that is more worrying. The clue is to be found in the company's submission of its licences to the OSI for approval. Again, this might seem a tremendous victory for the free software world, since it sees Microsoft apparently bending its knee before an open source institution. But its action needs to be seen in the wider context of a new-found enthusiasm for open standards.

It looks increasingly likely that Microsoft's OOXML file format will become an ISO standard alongside the OpenDocument Format. As others are tracking in detail, the way in which this is happening is unsatisfactory, to say the least. The end-result will be two directly competing standards in the area of office file formats. This in itself is unhelpful, since the whole idea of standardisation is have one standard, not lots of them. But it's worse than that. Microsoft's OOXML is nominally open, as standards should be, but in practice its 6000+ pages of documentation mean that nobody except Microsoft will be implementing this standard, which is largely a re-definition of a closed standard as open, without any change of substance.

This, I think, goes to the heart of Microsoft's open source strategy. As well as adopting those aspects of an alternative development model that it finds useful, Microsoft is aiming to blunt the undeniable power of openness by hollowing it out. If OOXML is an open standard, and some of its own software licences become OSI-approved, Microsoft will be able to claim that it, too, is an open standard, open source company. For many busy managers, subject to all kinds of demands – including increasing pressure to “go open source” - the difference between Microsoft's open source and real open source won't matter, in the same way that the difference between Microsoft's open file formats and those of the OpenDocument Format won't really matter. In terms of keeping people happy, what matters for many is the label – the appearance of going open – and Microsoft's moves aim to provide just that.

In many ways this new approach is exactly the reverse of that espoused in the famous first Halloween Document. There, the idea was to “de-commoditise” open protocols by adding proprietary elements. Today, the technique is to pseudo-commoditise proprietary standards by getting them defined as open.

Despite this essentially hostile intent, I believe (and have done for a while) that the power of open source will eventually win out over all of Microsoft's remaining fears and concerns, and that the company will embrace real open source fully for all of its products (at least where it is able to do so for legal reasons). It's just a question of time.

Source :

| Continue Reading..

Rename or Remove Oracle Tablespace

How to Rename or Move Oracle Tablespace Datafile to Another Location?
Oracle database does not provide an easy user interface to rename a datafile of tablespace, nor database administrator can easily move or relocate the datafile to another location or directory that different from original location on creation of database. The rename or move place task has to be performed via Oracle SQLPlus command line interface. However, if the operation is performed when the tablespace which owns the datefile is online, error will occur.

The error message may include the following:

ORA-01511: error in renaming log/data files
ORA-01121: cannot rename database file - file is in use or recovery
ORA-01110: data file : ‘datafile.dbf’

To properly move the datafile around or rename the datafile, follow this guide:

1. Login to SQLPlus.
2. Connect as SYS DBA with CONNECT / AS SYSDBA command.
3. Shutdown the database instance with SHUTDOWN command.
4. Rename or/and move the datafiles at operating system level.
5. Start Oracle database in mount state with STARTUP MOUNT command.
6. Modify the name or location of datafiles in Oracle data dictionary using following command syntax:

7. Open Oracle database instance completely with ALTER DATABASE OPEN command.

If the datafiles that need to be changed or moved do not belong to SYSTEM tablespaces, and do not contain active rollback segments or temporary segments, there is another workaround that does not require database instance to be shutdown. Instead, only the particular tablespace that contains the date files is taken offline.

1. Login to SQLPlus.
2. Connect as SYS DBA with CONNECT / AS SYSDBA command.
3. Make offline the affected tablespace with ALTER TABLESPACE OFFLINE; command.
4. Modify the name or location of datafiles in Oracle data dictionary using following command syntax:

5. Bring the tablespace online again with ALTER TABLESPACE alter tablespace ONLINE; command.

| Continue Reading..

BlogEngine.NET Web Site Template

BlogEngine.NET is a full-featured blogging platform that is a breeze to set up, customize, and use. BlogEngine.NET works with your choice of data source; you may use SQL Server, or you may take the plug’n’play approach using XML files.


* Plug ’n’ Play
BlogEngine.NET is very easy to setup and customize. To make it work, just upload the files to an ASP.NET 2.0 webserver and you’re ready to start writing. No database configuration, just plug’n’play.
* Full Featured
BlogEngine.NET comes with all the features you would expect from a modern blog engine as well as new unique features such as AJAX comments and screenshot trackbacks.
* Web 2.0
BlogEngine.NET features social bookmarks, OpenSearch support, XFN tags, AJAX, Microsummaries, Gravatars, coComments, tag cloud, Google sitemap and other so-called Web 2.0 features.
* Cool Themes
BlogEngine.NET comes with some very cool themes for you to choose from. If you want to modify or create a new theme you can do so easily with just a basic understanding of HTML and CSS.
* XHTML Compliance
All the controls in BlogEngine.NET are 100% XHTML 1.0 compliant. All posts you write automatically becomes compliant thanks to the tinyMCE text editor.
* Extendable
BlogEngine.NET is built from the ground up using nothing but C# and ASP.NET 2.0 all with simplicity in mind. It means that you can write new controls and themes by using the skills you already have as a .NET developer.

Frequently Asked Questions

Q. What are the demands for the web server?
A. The only thing needed to run BlogEngine.NET is a web server that support ASP.NET 2.0 and write permissions on the App_Data folder.
Q. What database is it running on?
A. None. BlogEngine.NET uses XML to store all posts, pages etc. by default. If you prefer to use a database, a SQL Server provider is included. You can find information about how to set up the SQL Server provider on our Wiki. For any other databases, you can write your own provider, which is very easy and simple to do.


* BlogEngine.NET is licensed under the Microsoft Permissive License.

* Download BlogEngine.NET at here.

| Continue Reading..

Windows Vista Suicide

Windows Vista can be completely killed by pressing a simple combination of just two keys. All you need to crush Microsoft's latest operating system and put the much-applauded Wow at an end is two fingers. Thanks to odeeee for this news.

This issue has been reported independently of Microsoft, and the Redmond company has failed to issue any official comment at the time of this article. The immediate question which comes to mind is if the problem is a security vulnerability or a simple bug.

Either way, you too can watch Windows Vista die in front of your eyes. To make matters worse, the key combination is one of the most utilized keyboard shortcuts in Windows. Pressing the Windows key together with "E" will start Computer in Windows Vista. Keeping the two keys pressed will open a large volume of Computer windows. Want to crush Windows Vista? Nothing could be simpler. Just keep the two keys pressed for more than 20 – 30 seconds.

The operating system will begin to behave aberrantly and will continue to open Computer instances flooding the desktop. There is no way to restore Vista to its normal self, outside of a reboot. With Computer windows cascading on your desktop, you will soon find that Task Manager cannot be accessed. The same is valid for additional processes. You will have to restart the operating system in order to restore Vista.

"It took millions of dollars to make Windows Vista secure and stable. While I am happy that Windows Vista is so much stable than Windows XP; there is a bullet proof way to crash WindowsVista. A simple service which loops a thousand times while sending Windows Key + E can be written within ten minutes. Microsoft may have spent millions of dollars for security and stability; it takes two fingers or a simple service to crash Windows Vista down. No matter how bullet proof Windows Vista claims to be, two keys to crash the operating system is a bullet proof approach as well," revealed the author of the crash method on TechTicles.

In its present form, the bug seems to create nothing more than a Denial of Service condition. It remains to be seen if it can be exploited remotely or if it permits code execution. Still, I’d put my money on a bug, rather than on a security vulnerability.

| Continue Reading..

Windows XP SP3

I did a clean install of Windows XP Professional (English, 32bit, Volume License) with Service Pack 2 integrated in a Virtual Machine. After that I installed Windows XP Service Pack 3 Beta build 3180.

The SP3 executable pack is named windowsxp-kb936929-sp3-x86-enu.exe. So there we have the reserved KB article number. The size of the pack is 332 MB.

When installing is replaces and backs up 2,848 files (456 MB) to C:\WINDOWS\$NtServicePackUninstall$

As before it also archives the SP3 itself in C:\WINDOWS\ServicePackFiles\i386 2,921 Files (552 MB)

Lucky harddisk space is not an issue these days....

After installing I noticed nothing new visually yet in the Bootscreen or UI. All I noticed was that Remote Desktop Client was updated to 6.1 and that IE6 said SP3 in aboput screen.

Of course a lot of bugfixes since SP2, I mean 2848 files are renewed, I have no wireless in the VM but I assume WPA2 support is now included and High Def Audio devices are detected without need of a hotfix.

I did a Windows Update for fun, 1 high prio update appeared, the July edition of the Malicious Software Removal Tool. 2 Optionals are .NET 1.1 and .NET 2.0, not .NET 3.0 ?

Download Windows XP SP3

Download Windows XP SP3

| Continue Reading..

Enter your email address:

Delivered by FeedBurner