Thursday, December 30, 2010

Most Popular site for Movie Download

Best movie sites in India

In India one can avail a variety of services by the Consultants. Consultants in India offer a wide array of services like placement, recruitment, Education, Business, immigration,Finance etc. Each kind of consultancy have their respective agenda and function,say the the placement consultancies provide jobs for the job seekers. The list below will give the names of the best consultants in India:
Popular Categories


List Of Best movie sites in India : : 

It is one of the top movie sites of India. Just click to get your favorite movie. It is the one stop destination for the movie lovers. It offers movies in various categories like Bollywood , Hollywood , Kollywood , Live Radio etc. Check out the best movies in this movie site.

IMDb :


It is one of the major movie sites of India. The Internet Movie Database is the ultimate destination for the movie freaks in India. Browse the wide options like the Tops at the Box Office , Coming soon movies, New DVDs of the week etc. This movie site is visited by about 57 million movie lovers.

It is one of the leading movie sites of India . You can view all types of movies like Hindi Movies , Telugu movies , Malayalam Movies , Kannada Movies etc. Just browse the mouse over the preferred movie category and enjoy. This site many options for the user.


It is one of the most popular movie sites of India. Download movies or watch movies through this movie site. Browse the hot movies , Hindi Movie , Hindi movie trailers ,dvd movies etc in this movie site. It offers full entertainment for the movie lovers in India.
Popular Categories


This movie site in India satisfies all your whims related to movies. All kinds of movies like Hollywood , Bollywood , Lollywood , Kollywood , Tollywood is just awaiting the single click of a mouse. Watch out what is the latest and the hottest thing happening in the movies through this site. :

This movie site offers ample tools for the movie freaks. Check out the sections like Movie Index , Recent Movies in Bollywood , Tollywood through this site. You can also view the comments on the latest movies and write comments also. Watch out for the latest movies in all the Indian states in this movie site

You can view movies online through this site. The ideal movie site for Bollywood movies is You can also see the Bollywood news in this site. Search for the desired movie and then watch it online. You can also download music videos through this site. :

In this movie site , you can get all information related to movies . Check out the director and cast of any Bollywood movie. You can also watch the comments about the movies and post comments in the site. It is very interesting for those who love movies. :

It encompasses a wide range of movie options . Browse the sections like Hindi , Malayalam , Tamil, Bengali , English and many other movies in this site. You can also check out the most popular movies according to years. Visit the site to satisfy your urge for movies.

ApnaView :

This site offers not only movies but also music videos in various languages. You can watch Hindi movies or Punjabi movies or any other movie online through this site . So just click in and take pleasure of the movies.

Linux reset forgotten root password

You can reset forgotten root password under Linux by booting system into single user mode or emergency mode (also known as rescue mode)

My boot loader is GRUB (see LILO boot loader below)

)Following is the procedure to reset root password if you are using GRUB as a boot loader:
  1. Select the kernel
  2. Press the e key to edit the entry
  3. Select second line (the line starting with the word kernel)
  4. Press the e key to edit kernel entry so that you can append single user mode
  5. Append the letter S (or word Single) to the end of the (kernel) line
  6. Press ENTER key
  7. Now press the b key to boot the Linux kernel into single user mode
  8. At prompt type passwd command to reset password:
You need to mount at least / and other partitions:
# mount -t proc proc /proc
# mount -o remount,rw /

Change the root password, enter:
# passwd
Finally reboot system:
# sync
# reboot

Most Toppest Free Software Downloading sites

Free Software downloading sites

Free Software Downloads and Software Reviews -

Freeware World Center - NONAGS -

SnapFiles - software reviews, download freeware and free trial programs - Download Free Software

The Linux Alternative Project -

Windows and OS X Software Alternatives | Linux App Finder

Open Source Alternative - Find Open Source Alternatives to commercial software

Incoming Call Issue in Vtigercrm using Elastix(Solved )

General approach to fixing Vtiger CRM incoming calls pop-up is to compare Logs and AsteriskClient.php logic. It appears some values may not match or get lost due to Asterisk configuration or version. Not so importaint why - more importaint to make it working as it is.

Initial steps

1. Have Vtiger installed
2. Setup php.ini value for 30 seconds or similiar value (but not 600 seconds) - this will save your time waiting for logs to appear on screen and enable you to make changes faster. Restart webserver to apply changes (if necessary).

Start catching:

Catching done mainly by analyzing logs. So in order to do it lets approach to logs.
1. See how event logs looks like when you make no calls.
2. See how events logs looks like when you make calls.
3. Understand how AsteriskClient.php analyze this log and make pop-ups (not) pop-up.

1. See how event logs looks like when you make no calls.

- Start AsteriskClient.php by putting in your web browser similiar address
like http://vt-test.xx/cron/modules/PBXManager/AsteriskClient.php
Browser will behave like it keep opening this address with empty screen but keep waiting till php-script AsteriskClient.php will be stopped by webserver (you remember we changed php.ini value max_execution_time to 30 seconds to make this happen faster).

- Make no calls
- See what events log looks like

This sceen must be something like this - this is how your log looks like when you make no calls:

Right state

Wrong state

It means either you have manager.conf (in Asterisk) either Vtiger PBXManager configured wrong here:

So we need to achieve Right state - as described above. Only when you have Right state - it worth to continue.

2. See how events logs looks like when you make calls.
Now, after php-script is stopped and you have Right state on screen, make it run again (can just click refresh in browser) and make call to your Asterisk number. You must hear the ring, wait few seconds and denie call (hungup). Now wait till php-script AsteriskClient.php in your browser will stop and show Calling log. This may look something like this:

In this time I was calling from SIP-client 3898276589 to 008220773653 (associated with 8220773653). This is only one call done. When you have dozens of calls this turns to real mess. Now If you saw such log - you can continue to analize.

3. Understand how AsteriskClient.php analyze this log and make pop-ups (not) pop-up.
Actually popup not appear but 1 main reason - AsteriskClient.php "loose" some data necessary to generate window. This happens due to some Asterisk call manager syntax differences (i assume) from version to version. So to make it working - you need to change AsteriskClient.php the way not to "loose" this data.

For the moment I assume you don't see popup. So now is time to have a look at AsteriskClient.php and try to understand why popup not appeared. This quite non linear and intuitive process of working with log and with php-code. Result you saw in previour article regarding Vtiger popup. Now just some tips:
- Assume AsteriskClient.php "sees" the same log as you see on the screen Calling log. It analyzes only this data - not more not less.
- try to understand logic of AsteriskClient.php and check where it loose some data by putting php-command "echo" with some text info or variables like this.

- have a look at Log and this part of code:

 Similiar values marked by similiar color. So main task to analyze whole login of AsteriskClient.php and compare it to your Log - may be some values have different names or may be you don't have them at all, but wothout them AsteriskClient.php not pass your request further to so wanted pop-up.



Wednesday, December 29, 2010

Basic Linux Commands

mkdir - make directories

Create the DIRECTORY(ies), if they do not already exist.
 Mandatory arguments to long options are mandatory for short options too.
 -m, mode=MODE  set permission mode (as in chmod), not rwxrwxrwx - umask
 -p, parents  no error if existing, make parent directories as needed
 -v, verbose  print a message for each created directory
 -help display this help and exit
 -version output version information and exit

cd - change directories
Use cd to change directories. Type cd followed by the name of a directory to access that directory.Keep in mind that you are always in a directory and can navigate to directories hierarchically above or below.

mv- change the name of a directory
Type mv followed by the current name of a directory and the new name of the directory.
 Ex: mv testdir newnamedir 
pwd - print working directory
will show you the full path to the directory you are currently in. This is very handy to use, especially when performing some of the other commands on this page

 rmdir - Remove an existing directory 
 rm -r
Removes directories and files within the directories recursively.

chown - change file owner and group

chown [OPTION] --reference=RFILE FILE
Change the owner and/or group of each FILE to OWNER and/or GROUP. With --reference, change the owner and group of each FILE to those of RFILE.

 -c, changes like verbose but report only when a change is made
 -dereference affect the referent of each symbolic link, rather than the symbolic link itself
 -h, no-dereference affect each symbolic link instead of any referenced file (useful only on systems that can         change the ownership of a symlink)
  change the owner and/or group of each file only if its current owner and/or group match those specified here.  Either  may  be  omitted,  in which case a match is not required for the omitted attribute.
-no-preserve-root do not treat `/' specially (the default)
-preserve-root fail to operate recursively on `/'
-f, -silent, -quiet  suppress most error messages
-reference=RFILE use RFILE's owner and group rather than the specifying OWNER:GROUP values
-R, -recursive operate on files and directories recursively
-v, -verbose output a diagnostic for every file processed
The  following options modify how a hierarchy is traversed when the -R option is also specified. If more than one is specified, only the final one  takes effect.
-H     if a command line argument is a symbolic link to a directory, traverse it
-L     traverse every symbolic link to a directory encountered
-P     do not traverse any symbolic links (default)

chmod - change file access permissions
chmod [-r] permissions filenames
 r  Change the permission on files that are in the subdirectories of the directory that you are currently in.        permission  Specifies the rights that are being granted. Below is the different rights that you can grant in an alpha  numeric format.filenames  File or directory that you are associating the rights with Permissions
u - User who owns the file.
g - Group that owns the file.
o - Other.
a - All.
r - Read the file.
w - Write or edit the file.
x - Execute or run the file as a program.
Numeric Permissions:
CHMOD can also to attributed by using Numeric Permissions:
400 read by owner
040 read by group
004 read by anybody (other)
200 write by owner
020 write by group
002 write by anybody
100 execute by owner
010 execute by group
001 execute by anybody

ls - Short listing of directory contents
-a        list hidden files
-d        list the name of the current directory
-F        show directories with a trailing '/'
            executable files with a trailing '*'
-g        show group ownership of file in long listing
-i        print the inode number of each file
-l        long listing giving details about files  and directories
-R        list all subdirectories encountered
-t        sort by time modified instead of name
cp - Copy files 
cp  myfile yourfile
Copy the files "myfile" to the file "yourfile" in the current working directory. This command will create the file "yourfile" if it doesn't exist. It will normally overwrite it without warning if it exists.

cp -i myfile yourfile
With the "-i" option, if the file "yourfile" exists, you will be prompted before it is overwritten.

cp -i /data/myfile
Copy the file "/data/myfile" to the current working directory and name it "myfile". Prompt before overwriting the  file.

cp -dpr srcdir destdir
Copy all files from the directory "srcdir" to the directory "destdir" preserving links (-poption), file attributes (-p option), and copy recursively (-r option). With these options, a directory and all it contents can be copied to another dir

ln - Creates a symbolic link to a file.

ln -s test symlink
Creates a symbolic link named symlink that points to the file test Typing "ls -i test symlink" will show the two files are different with different inodes. Typing "ls -l test symlink" will show that symlink points to the file test.
locate - A fast database driven file locator.

slocate -u
This command builds the slocate database. It will take several minutes to complete this command.This command must be used before searching for files, however cron runs this command periodically  on most systems.locate whereis Lists all files whose names contain the string "whereis". directory.
more - Allows file contents or piped output to be sent to the screen one page at a time

less - Opposite of the more command

cat - Sends file contents to standard output. This is a way to list the contents of short files to the screen. It works well with piping.

whereis - Report all known instances of a command

wc - Print byte, word, and line counts
bg jobs Places the current job (or, by using the alternative form, the specified jobs) in the background, suspending its execution so that a new user prompt appears immediately. Use the jobs command to discover the identities of background jobs.
cal month year - Prints a calendar for the specified month of the specified year.
cat files - Prints the contents of the specified files.
clear - Clears the terminal screen.
cmp file1 file2 - Compares two files, reporting all discrepancies. Similar to the diff command, though the output format differs.
diff file1 file2 - Compares two files, reporting all discrepancies. Similar to the cmp command, though the output format differs.
dmesg - Prints the messages resulting from the most recent system boot.
fg jobs - Brings the current job (or the specified jobs) to the foreground.
file files - Determines and prints a description of the type of each specified file.
find path -name pattern -print
Searches the specified path for files with names matching the specified pattern (usually enclosed in single quotes) and prints their names. The find command has many other arguments and functions; see the online documentation.
finger users - Prints descriptions of the specified users.
free  - Displays the amount of used and free system memory.
ftp hostname
Opens an FTP connection to the specified host, allowing files to be transferred. The FTP program provides subcommands for accomplishing file transfers; see the online documentation.
head files - Prints the first several lines of each specified file.
ispell files - Checks the spelling of the contents of the specified files.
kill process_ids
kill - signal process_ids
kill -l
Kills the specified processes, sends the specified processes the specified signal (given as a number or name), or prints a list of available signals.
killall program
killall - signal program
Kills all processes that are instances of the specified program or sends the specified signal to all processes that are instances of the specified program.
mail - Launches a simple mail client that permits sending and receiving email messages.
man title
man section title - Prints the specified man page.
ping host - Sends an echo request via TCP/IP to the specified host. A response confirms that the host is operational.
reboot - Reboots the system (requires root privileges).
shutdown minutes
shutdown -r minutes
Shuts down the system after the specified number of minutes elapses (requires root privileges). The -r option causes the system to be rebooted once it has shut down.
sleep time - Causes the command interpreter to pause for the specified number of seconds.
sort files - Sorts the specified files. The command has many useful arguments; see the online documentation.
split file - Splits a file into several smaller files. The command has many arguments; see the online documentation
sync - Completes all pending input/output operations (requires root privileges).
telnet host - Opens a login session on the specified host.
top - Prints a display of system processes that's continually updated until the user presses the q key.
traceroute host - Uses echo requests to determine and print a network path to the host.
uptime - Prints the system uptime.
w - Prints the current system users.
wall - Prints a message to each user except those who've disabled message reception. Type Ctrl-D to end the message.

Tuesday, December 28, 2010

Network Topology

Computer network topologies can be categorized in the following categories.
• bus
• star
• ring
• mesh
• Tree.
Hybrid networks are the complex networks, which can be built of two or more above mentioned topologies

Bus Topology
Bus topology uses a common backbone to connect all the network devices in a network in a linear shape. A single cable functions as the shared communication medium for all the devices attached with this cable with an interface connector. The device, which wants to communicate send the broadcast message to all the devices attached with the shared cable but only the intended recipient actually accepts and process that message.
Ethernet bus topologies are easy to install and don’t require much cabling and only a main shared cable is used for network communication. 10Base-2 and 10BaseT are two popular types of the Ethernet cables used in the Bus topology. Also, Bus network works with very limited devices. Performance issues are likely to occur in the Bus topology if more than 12-15 computers are added in a Bus Network. Additionally, if the Backbone cable fails then all network becomes useless and no communication fails among all the computers. Unlike in the Star topology in which if one computer is detached from a network then there is not effect on the other computers in a network.

Ring Topology
In ring Network, every computer or devices has two adjacent neighbors for communication. In a ring network, all the communication messages travel in the same directory whether clockwise or anti clockwise. Any damage of the cable of any cable or device can result in the breakdown of the whole network. Ring topology now has become almost obsolete.
FDDI, SONET or Token Ring Technology can be used to implement Ring Technology. Ring topologies can be found in office, school or small buildings.

Star Topology
In the computer networking world the most commonly used topology in LAN is the star topology. Star topologies can be implemented in home, offices or even in a building. All the computers in the star topologies are connected to central devices like hub, switch or router. The functionality of all these devices is different. I have covered the detail of each networking devices in the separate portion of my website. Computers in a network are usually connected with the hub, switch or router with the Unshielded Twisted Pair (UTP) or Shielded Twisted Pair Cables.
As compared to the bus topology, a star network requires more devices & cables to complete a network. The failure of each node or cable in a star network, won’t take down the entire network
as compared to the Bus topology.
However if the central connecting devices such as hub, switch or router fails due to any reason,then ultimately all the network can come down or collapse.

Tree Topology
Tree topologies are comprised of the multiple star topologies on a bus. Tree topologies integrate multiple star topologies together onto a bus. Only the hub devices can connect directly with the tree bus and each Hub functions as a root of a tree of the network devices. This bus/star/hybrid combination supports future expandability of the computer networks, much better than a bus or star.

Mesh Topology
Mesh topology work on the concept of routes. In Mesh topology, message sent to the destination can take any possible shortest, easiest route to reach its destination. In the previous topologies star and bus, messages are usually broadcasted to every computer, especially in bus topology. Similarly in the Ring topology message can travel in only one direction i.e clockwise or anticlockwise. Internet employs the Mesh topology and the message finds its route for its destination. Router works in find the routes for the messages and in reaching them to their destinations.The topology in which every devices connects to every other device is called a full Mesh topology unlike in the partial mesh in which every device is indirectly connected to the other devices.

Topologies are the important part of the network design theory. A better network can be built if you have the knowledge of these topologies and if you know the difference between each topology. Similarly you should have the knowledge of each network device so that you can properly use them according to your network needs. A misconfiguration network can result in a waste of time and energy as well as a lots of troubleshooting methods to resolve the issue. So the basic understanding of the network topologies and network devices is a must to build a good network.

How to Hide a shared folder in Windows XP

If you want to hide a shared folder from the network users, right click the folder and click sharing and security and give a shared name of a folder plus $ sign e.g. e books$. In this way network users will not be able to see the shared folder on the network. For you to see the hidden shared folder, map the drive and type in the path including the $ sign in the folder box.

How to Setup Roaming Profiles in Windows 2000

The TCP/IP component in the Windows operating systems is considered a core component so it cannot be easily uninstalled. Using the following commands with the certain switch you can however achieve the same results and by uninstalling and reinstalling the TCP/IP components.

netsh int ip reset [logfile]
Logfile is the name of the file that is used to records the actions by the netsh command.
netsh int ip reset iplog.txt is used to create the iplog.txt in the current directory.

Caution: Be very careful while using these commands because they can directly damage your system.

How to Setup Roaming Profile in Windows 2000/2003

Roaming profiles are saved on the network server. If you want your users to access their own roaming profiles then you need to open Active directory users and computers, right click on the user, then properties and then profile tab. In the profile tab type the UNC path of the user you made on the server like this \\servername\profiles\%username%. Profiles folder should be in the root of the C Drive. Make sure you have created the profiles folder on the C drive and shared it with the same name as the name of the folder. Next time when the user will log on from the client computer, his/her local profile will be saved in the folder same as the user name and this folder will be created in the profiles folder.

How to Install IIS in Windows XP

Windows XP Professional edition has the built-in IIS. Internet information server is used to host the website on your own computer and these sites can be accesses from all over the world. IIS has great administrative features but it supports only 10 concurrent connections of the clients at a time.

1. Click start>settings>control panel>Add remove program

2. Click Add remove windows components.

3. Click on Internet information services > Details.

4. In the IIS check the boxes SMTP and World Wide Web and you can also check FTP if you want to setup it.

5. In Windows components selection, make sure that you have selected IIS and you may need to insert the CD of Windows XP Professional during the installation.

How to setup Xbox Network Connections

Following is the simple configuration methods of Xbox network connectivity.

1. Go to the settings of Xbox Dashboard and then network settings. You will see IP address, DNS and some other settings.

2. Click IP settings. You can select to obtain the IP address and other settings automatically from the DHCP server or router.

3. Go to the previous menu and set obtain the DNS settings from the Router or DHCP server automatically

How to Setup Workgroup and Computer Name in Windows XP

Computer name is the unique identifier of the computer in the network. If you want to setup the computer name and the workgroup in the Windows XP then follow these steps.

1. My Computer>Right Click>click on Properties>

2. Assign unique computer name.

3. Assign the same workgroup name as of the other computers.

4. You will be prompted to restart the computer


1. Cable Problem: Cables that connect different parts of a network can be cut or shorted. A short can happen when the wire conductor comes in contact with another conductive surface, changing the path of the signal. Cable testers can be used to test for many types of cable problems such as:
Cut cable, incorrect cable connections, Cable shorts, Interference level, Connector Problem

2. Connectivity Problem: A connectivity problem with one or more devices in a network can occur after a change is made in configuration or by a malfunction of a connectivity component, such as hub, a router or a Switch.
3. Excessive Network Collisions: These often lead to slow connectivity. The problem can occur as a result of bad network setup/plan, a user transferring a lot of information or jabbering network card.
NB: A jabbering Network card is a network card that is stuck in a transmit mode. This will be evident because the transmit light will remain on constantly, indicating that the Network card is always transmitting.

4, Software Problem: Network problems can often be traced to software configuration such as DNS configuration, WINS configuration, the registry etc.

5. Duplicate IP Addressing: A common problem in many networking environments occurs when two machines try to use the same IP address. This can result in intermittent communications.