Wednesday, September 29, 2010

Microsoft Failed to Run Windows Live Blog Service for It's User

Microsoft, a Giant software company has realized that they are not capable to provide ALL service to ALL Internet User.

Operating System like Windows XP, 2000, 2003 or 2008 comes with built in web browser and  a 'link to 'Windows Live Service' which include Web Search, Instant Messaging,  An Email account ( and many more. Most popular service of Windows Live is Instant Messaging & Email.

Microsoft is such a company who like to serve all kind of possible service to it's customer. But it seems they realized that online is not their place to grow and control the market. The sign of this realization reflect their current announcement to migrate Windows Live Blog to WordPress.Com, which is another pioneer company proving scalable blog service. Wordpress.Com get over 250 million page view per month and it growing.

Though Microsoft told on their blog posting that to give user greater experience on blog, it is clear that Microsoft is unable to provide smooth blog service to 30 million windows live user.

This is a milestone for Microsoft that they are attaching themselves with another company.

As we looked at customers’ blogging needs and what different companies were providing, we were particularly  interested in what is doing. They have a host of impressive capabilities – from a scalable platform and leading spam protection, to great personalization and customization. WordPress powers over 8.5% of the web, is used on over 26 million sites, and is seen by over 250 million people every month. Not only that, Automattic is a company filled with great people focused on improving blogging experiences. So rather than having Windows Live invest in a competing blogging service, we decided the best thing we could do for our customers was to give them a great blogging solution through - Posted by Dharmesh Mehta, on Windows Team Blog 

'Automattic' is a company which run WordPress.Com is really a self depended company who develop the Blogging software Wordpress, which is an open source product also run to host people's blog for free. WordPress is a product, which you can use on your own hosting site to create a website with just few click of mouse. A lot of WordPress Templates  & WordPress Plug-in out there which can use to customize your own site running WordPress as Core Engine. If you don't want to spend money on hosting, just visit and signup for an account. You will get an URL like .

Let's see how Automattic the author of WordPress.Com can handle their new 30 Million customer who used to blog on Windows Live blog platform.

Windows Live + Wordpress.Com Image Copyright to it's respective owner.

Posted by:

Noor Ahamed Bauani
Chief Technology Advisor
Dhaka Wireless
An IPv6 Ready ISP in Bangladesh, Need an IPv6 Connectivity? Just Knock us!
HP: +880-1818-BAUANI (SMS Only, No Direct Call Please)

Tuesday, September 28, 2010

See How Bill Teardown Apple's iPod Touch 4th Generation (2010)

See the work of Bill Detwiler, who Teardown a brand new 4th Generation iPhone / iPod which was released on 2010. We all know iPhone is such a device which come with compact casing. Even the battery of device can't remove from it. 

As with the iPod Shuffle and Nano, the Touch isn't designed to be easily disassembled. In fact, I found it to be the most difficult to take apart.
To disassemble the iPod Touch, you'll need a Phillips #00 screwdriver, a thin metal blade, plastic spudger, or iPod case opening tool, and a hair dryer or heat gun. -- 

Click here to see the series of picture (about 65 image) from a full functional device to part it as small as possible. 

Global IPv6 Deployment Monitoring Survey 2010 Results Available

The Number Resource Organization (NRO) recently announced the outcome of the 2010 Global IPv6 Deployment Monitoring Survey.

Approximately 1600 respondents from 140 economies participated in the survey, with 310 of those participants from the APNIC region. The findings reveal IPv6 deployment continues to gather momentum, with the majority of organizations surveyed taking steps toward IPv6 deployment, as the IPv4 address pool continues toward rapid depletion.

The survey was funded by the European Commission and conducted by GNKS Consult and TNO. The survey was prepared and carried out by TNO/GNKS in close collaboration with RIPE NCC, APNIC, ARIN, AfriNIC, and LACNIC.

The full research report is available at:  
To view the NRO announcement, please visit: 

APNIC would like to thank the participants and supporters of this
important survey. 

Announced by: 

APNIC Secretariat                                
Asia Pacific Network Information Centre (APNIC)
PO Box 2131 Milton, QLD 4064 Australia 
Level 1, 33 Park Road, Milton, QLD
Email: secretariat AT apnic DOT net
Tel: +61 7 3858 3100
Fax: +61 7 3858 3199

Saturday, September 25, 2010

Bangladesh Income Tax Fair 2010 by NBR

National Board of Revenue (NBR), Bangladesh has arranged Income Tax Fair 2010, for the first time in Bangladesh. 

This Income Tax Fair 2010 will held both in Dhaka and Chittagong City from 26 to 30 September 2010. 

Event Venue In Dhaka Has been Selected to: 
Institution of Diploma Engineers
Kakrail, Dhaka
From 26 to 30 September 2010

Event Venue In Chittagong will be: 
MA Aziz Stadium
From 26 to 30 September 2010

Officials of Bangladesh Board of Revenue (NRB) arranged this event to make awareness about the Income Tax among the people of Bangladesh. As per NRB's Source In this Fair there will be different type of stall to inform about Tax System of Bangladesh and why and how a citizen will submit his income report and how the tax is calculated. NRB Officials hopes that from this event they will receive a significant amount of new tax payer which will increase NRB's Revenue and control of money earn by illegal way. Though NRB hasn't clearly announce how they will control the black money. Making the awareness of Income Tax and Increase of Tax Payer will be the main focus, said an Official, who don't want to disclose his name. 

This event is open to all and any visitor can ask NRB official about any type of query related to Income Tax. NRB Officials has also take initiative to remove the barrier from peoples mind about the Income Tax. As per NRB Officials lot of people want to pay tax, but they do not pay tax as they think this is a critical process. Officials hope that by visiting the event people will understand the process and how easy to be a tax payer. 

This type of Income Tax Fair is first time in Bangladesh. So NRB took few more initiative to make the event attractive. SmartQ, a visitor management system will use on both Venue, so that the SmartQ system will give token to the citizen who will come this fair for tax related services.

The token will be routed to different tax officials for serving and the numbers will be displayed at the central display board. The system will give report to the management on the visitors. This is the first kind of technology display in this kind fair told Business Automation Limited the Technology Partner of this event. 

You are Invited on this Income Tax Fair 2010 
National Board of Revenue (NBR), Bangladesh

Friday, September 24, 2010

Linux Articles: Linux Server with 64bit Kernel Contain Exploit Vulnerability Which Might Gives Hackers a Back Door to Your Box

Linux Server with 64bit Kernel Contain Exploit Vulnerability Which Might Gives Hackers a Back Door to Your Box:

Recently different Linux Distribution including CentOS, RedHat, Ubuntu, Debian and other popular distribution for 64bit server contain high-profile vulnerability on Kernel which might give Hackers a Back Door to take control of the server. Specially if the machine is a online and sheared by others is in high rick.

Users of 64-bit distributions of Linux need to patch to prevent attacks using an aggressively exploited flaw.

Most of Operating System vendor is aware about this vulnerability and working to issue a patch / fix.

See the RedHat Security Team's work plan on this URL:

As this vulnerability is directly related to Operating System's Core 'Kernel', it might take longer time to fix as the Kernel Security Teamis also working on it.

If you are running a 64bit Machine, you must have to keep an eye on your box to see if there is anything wired happening on box and also keep track on your vendor's website to get the status of issuing patch or advice.

As this vulnerability is related to 64bit machine, most Linux user don't need to be worry about it. But to be safe, check again that your system is not 64 bit.

To see more information check the URL bellow:

Hope to post update on the issue cve-2010-3081 here, as soon I get any info.

Noor Ahamed Bauani
Freelance ICT Consultant from Bangladesh
Expert on Complex IPv4 & IPv6 Internet Routing

Wednesday, September 22, 2010

Understand Routing and Convert Your Linux Box as a Powerful Router

I found some Router Setup Information on a website which I found very user friendly. You can access this Router Setup on a Linux Box Here, Though it is too Old, but still Interesting as basic routing system hasn't change since above article wrote.

The article started with the paragraph bellow:

If you are unfamiliar with how networking routing is done, you should read The CTDP Networking Guide. This section contains some information contained in that guide. Information about how routers and routing works is included in The CTDP Networking Guide, but that information is not included in this section. This section only explains how to set up routing and routing tables.

Mean, the article is not for newbies, but it describe in very easy language. If you have knowledge on basic computer programing and know a little about Routing (Packet Transmission on Computer Network), you will easily convert a Linux box to a basic router. Writer of article made it easy to understand using the House Number, Street Address, Town or City and the Outside the City by calling every packet of Computer Network Data Transmission Packet. This is a good idea to make people understand how a router works. See a few of example bellow from his article:

In everyday terms this is similar to a basic decision process. Imagine you are holding a letter. If it is addressed to you, you keep it, if it is addressed to someone in your town, you drop it in the local slot at the post office, but if it is addressed to someone out of town, you would drop it in the out of town slot.

I have a wish to expand this article with more easy example so that a very new person who is newcomer on Packet Switching Network can understand how basic network works. A lot of friend of mine requested me to explain the routing system of a Computer Network (Either Internet or a Intranet, which called Local Area Network or LAN). If anyone can understand how a computer talk with each other, I believe he/she can easily understand the basic routing system, what is gateway, why a gateway is used in network etc.

From the article above, I got inspired to write an article for those who asked me to write one. At this moment, I am working with another project but adding this to my 'to do' list so that I can write the article as soon as possible. I used few of quote from that article as I don't belive 'Bookmarking' as it vanished too earlier.

Anyway, at this moment, I am very much busy with my IPv6 Project and Other Online Project which will allow people to use some useful network utilities for free. But I must write an article on basic routing system (At least Data Packet Routing on Ethernet Network).

 Don't forget to punch me if I forget to return here;)

Noor Ahamed Bauani
Chief Technology Advisor
Dhaka Wireless
An IPv6 Ready ISP in Bangladesh, Need an IPv6 Connectivity? Just Knock us!
HP: +880-1818-BAUANI (SMS Only, No Direct Call Please) A Popular Micro Blog Website Hacked So Don't Use The Web Interface to Tweet Till Fixing From Authority Issued a very popular micro blog website has been hacked by hackers exploiting a mouseover flaw. You are suggested to not use this popular service and third party software till the fix issued by authority of Twitter.Com, Twitter Inc the owner and maintainer of this popular service.

Zdnet Blog, a popular and trusted technology related information portal published this hacking indecent and  advice user not to use Twitter's Website and recommends to use third party software to Tweet till any fix released by Twitter.Com

Twitter’s Web site is being run over by hackers exploiting a mouse over flaw. 
Sophos has detailed the flaw and recommends that you use third party software to Tweet. Indeed, I found out the hard way that Twitter’s site is a mess right now. Also added Hopefully Twitter will shut down this loophole as soon as possible - disallowing users to post the onMouseOver JavaScript code, and protecting users whose browsing may be at risk. - Sophos from Znet Blog Posting

It seems that only Twitter's website has been hacked but you can still tweet your messages via different 3rd party software like iPhone's Twitter Interface or Other 3rd Party Twitter Software

See this Image of Twitter.Com Screenshot by Zdnet

I should stop writing this article in details and speeding the information to safe the innocent user from identity thief.

Posted by:
Noor Ahamed Bauani
Freelance ICT Consultant from Bangladesh
Expert on Complex & Customize Internet Routing both for IPv4 and IPv6
HandPhone: +880-1818-BAUANI (SMS ONLY PLEASE)

Update: Twitter.Com Issued an Patch to Fix Their Hacked Website. Hacker Used a Mouse Over Javascript Flow to Installed his Code on this popular website. - By Official Status Report of Twitter.Com

Sunday, September 19, 2010

Software Freedom Day Celebrated in Bangladesh

As most of the FOSS advocates are aware yesterday (3rd saturday of september) was Software Freedom day. The day was celebrated by more than 800 groups/lugs/organization around the world and Bangladesh was no exception.

Bangladesh Linux Users Alliance(BLUA) and Bangladesh Open Source Network celebrated the day in separate events.

Those events were somewhat successful with their own sets of merits and demerits. Its a good thing that people's interest in this arena is increasing every year. We hope to celebrate the day even larger scale in upcoming years.....

Information above was taken from Mailing List of Ubuntu Bangladesh.

Thursday, September 16, 2010

2 /8 IPv4 address gone now having only 5.5% left

The IANA allocated two IPv4 blocks (49/8 and 101/8) to the Asia-Pacific registry(APNIC).

The IANA IPv4 pool has just 5.5% free. If you exclude the 5 block final-allocation reserve, the pool is at 3.5% (just 9 /8s).

If you haven't already started your IPv6 deployment, you're already behind.

Source: Two More Gone; IPv4 address space now at 5.5% - Living with IPv6:

Posted by:

Noor Ahamed Bauani
Chief Technology Advisor
Dhaka Wireless
An IPv6 Ready ISP in Bangladesh, Need an IPv6 Connectivity? Just Knock us!
HP: +880-1818-BAUANI (SMS Only, No Direct Call Please)

Wednesday, September 15, 2010

সফটওয়্যার ফ্রিডম ডে'র আড্ডাতে আপনি আমন্ত্রিত

আগামী শনিবার সফটওয়্যার ফ্রিডম ডে উদযাপন উপলক্ষ্যে লিনাক্স ব্যবহারকারীদের নিয়ে আমরা একটা আড্ডার আয়োজন করতে যাচ্ছি।  অবশ্য শুধু লিনাক্স ব্যবহারকারীরাই নয় বরং যারা লিনাক্সের 'ল' ও জানেনা তারাও আমন্ত্রিত সেখানে।  সেখানে কোনো টেকনিকাল প্যাকপ্যাকানি হবে না, কেবলই আড্ডা হবে, নির্জলা আড্ডা - কোন বদ্ধ রুমে নয় বরং খোলা আকাশের নীচে প্রাঞ্জল আড্ডা!  অন্যভাবে মিলনমেলাও বলা যায় এই আড্ডাকে।

আড্ডার সময়সূচী ও তারিখ নীচে দেয়া হলঃ

     সময়ঃ বিকাল ৪টা
     তারিখঃ শনিবার, ১৮ই সেপ্টেম্বর
     স্থানঃ ছবির হাট, চারুকলা ইন্সটিটিউটের উল্টোদিকে
     যোগাযোগঃ ০১৭১৩ ২৭ ১৭ ৩৭ (এঞ্জেল)

যারা আসতে আগ্রহী তারা দয়া করে এই পোস্টে জানিয়ে যাবেন, যাতে আমরা উপস্থিতির ব্যাপারে একটা সম্ভাব্য ধারনা পেতে পারিঃ

আশা করছি জমজমাট একটা আড্ডা হবে সবার সাথে! 

Tuesday, September 14, 2010

Google Advance Search Option Can Help Hackers/Crackers Find Sensitive Information Around Internet

Do you even thinks that Google Search Can be a tools for Hacker / Crackers / Criminal to find Sensitive information from World Wide Web?!

Yes, this is true. In my point of view, Google is not responsible for this type of work. In a way a knife can kill a man, again same knife can help a man survive on operative table. The thing is how you use your tool.

Google Advance Search is a way where you can find a lots of way to get information from any organization or any website where the website owner is not aware what kind of information his website is giving out to people.

A lot of example can be found on blog post: We Hackers where few technique shows how Google Can be Abused by an unethical hacker community.

The .inurl:. syntax restricts the search results to those URLs containing the search keyword. For example: .inurl: passwd. (without quotes) will return only links to those pages that have "passwd" in the URL.
Similarly, if one has to query for more than one word in an URL then in that case .allinurl:. can be used instead of .inurl. to get the list of URLs containing all those search keywords in it.
allinurl: etc/passwd
will look for the URLs containing .etc. and .passwd.. The slash (./.) between the words will be ignored by Google.
The above example is one of millions advance search Technic to find sensitive information from via Google Search. 

To avoid this type of attack on your website, robots.txt can help you. See the Google robots.txt or Google webmaster guide to know how to protect your site's sensitive part from thousand of unexpected eyes but serving to your expected visitors. 

There is nothing shortcut in learning. You have to read, read and read to understand the system. The Webmaster Guide is your handbook to secure your site and make your site visible in search result in better position. 

Ahamed Bauani
Expert on Complex & Customize Internet Networking
Both on IPv4 & IPv6

Sunday, September 5, 2010

IPv6 Deployment Growth Report by Hurricane Electric (

The global IPv6 routing table has passed 3000 IPv6 prefixes (approximately 3200 prefixes after filtering out bogons and prefixes longer than /48s, approximately 3400 raw prefixes seen).

There are now over 3046 IPv6 glue records in the TLD zone files.  The addition of IPv6 glue records at the TLD level is a good gauge of hosting infrastructure IPv6 growth, since it indicates operational commitment on the part of individual nameserver operators.

Of the Alexa top 1 million most popular websites on the Internet, the number running IPv6 for their main website has increased to 2143.

Of the 35684 networks in the world running BGP, the number running IPv6 has increased to 2487, or 7 percent.


* IANA IPv4 Address Run Out

There are now an estimated 274 days left until IANA IPv4 address run out and the depletion rate appears to have accelerated slightly.

Get our IPv6 statistics and IPv4 exhaustion widget here (it's free!):

* Hurricane Electric Updated Network Map

Updated Network Map:

Hurricane Electric now has over 6000 BGP sessions with over 1500 IPv4 and IPv6 networks at 45 different exchange points in North America, Europe, and Asia.

* New Reports

Hurricane Electric has added three new interesting reports to the Internet analysis site.

The DNS report shows which TLDs (com, net, etc) have IPv6 nameservers, IPv6 glue in the root, and the number of domains with A and AAAA records for zones that we have access to, plus detail reports breaking down the
types of addresses used for those records (with examples).

DNS Report:

The Bogon Routes report shows global IPv4 and IPv6 route announcements that appear to be bogons by origin and prefix, with the type of bogon.

Bogon Routes:

The Multi Origin Routes report shows IPv4 and IPv6 prefixes that are originated by more than one network.

Multi Origin Routes:

Source & Copyright to Hurricane Electric

Report Posted by:

Noor Ahamed Bauani

Labels / Category

2013 (1) 3G (4) Adsense (2) AKTEL (2) Amateur Radio (3) APNIC (5) Bajaj Discovery (1) Bajaj Pulsar (1) Bangla News (5) Bangladesh (29) Bangladesh Computer Market (1) Bangladesh Cricket (2) Bangladesh earthquake (3) Bangladesh Educational Board (1) Bangladesh Energy (4) Bangladesh ICT (15) Bangladesh Internet Service (15) Bangladeshi Credit Card (3) Bangladeshi News Site (3) Bank in Bangladesh (7) Bank of Bangladesh (10) Banking in Bangladesh (10) BGMEA Bulding (1) Big File Download (3) blackhat (1) BLOG (6) Bogon (3) bot (2) BTCL (3) BTRC (14) BTTB Internet (10) BTTB Submarine Cable (9) Byke Hijack (1) Cacti (1) Call Block (1) Carbon Credit (1) CentOs (2) CentOs Bangladesh (2) Charity (2) Chrome (2) Computer Booting (1) Credit Card (10) Credit Card in Bangladesh (8) Crime (3) CyberCrime (11) Cyclon (1) DDoS (8) Dengue (1) Denmark (1) Dhaka earthquake (5) DNS (3) DNSSEC (2) Domain (9) DoS (4) dot bd domain (3) Dot CO.CC (2) Download (4) Drive not opening on click (1) DV Lottery 2010 (2) E-Learning (1) earthquake (5) EARTHQUAKE BANGLADESH (2) EARTHQUAKE DHAKA (2) earthquake in Bangladesh (5) earthquake in Dhaka (5) Email (7) Email Full Header (3) Email Sender Identify (4) Entertainment (2) Fake Email Sender (5) Firefox (8) FTP (1) Funny (4) GMail (4) Google (18) GPRS Settings (1) GrameenPhone (1) HAM (4) Health (3) Hobby (1) IGW (3) IIG (3) India (1) Indian ICT (1) Indian IT (1) Internet (19) Internet Mail (1) Internet Security (9) iPhone (3) iPhone Bangla (2) iPhone Bangladesh (2) iPhone in Dhaka (2) iPod (1) IPv4 Allocation (8) ipv6 (10) islam (4) ISOC (3) Linux Articles (6) Metal News (1) Microsoft (4) Microsoft buy Yahoo (1) Mirror Server (1) Mobile Phone (3) Mobile Phone Internet (1) Mobile Phone News (3) Mobile Phone Operator (6) Mobile Phone User (3) Mozilla (8) Mozilla Firefox (8) Myself (1) Mystery (1) Netcraft (4) Network Monitoring (4) neverBot (2) News Site (1) Nokia (3) Oil Price (2) Online Security (7) Paypal in Bangladesh (6) Personal View (1) Phishing (2) Pigeons (1) Postfix (7) PSTN (2) RANGS Bulding (1) Relay Host (2) robot.txt (1) robots.txt (2) Scour (2) (2) Second submarine cable (3) Sendmail (4) Share Market (4) Smart Relay (3) SSC Result (1) SSC Result 2008 (1) Stock Market (3) Technology (1) Ubuntu (4) UCB (5) UCBL (5) URL Redirect (2) Virus (3) Virus Infected Windows (3) Virus Information (3) Warid (2) Web Spider (3) Webhosting (6) Wimax (4) Windows (1) Windows Problems (1) Wireless Internet in Bangladesh (5) Yahoo (4) Yahoo Sold (1)

Share it