New blog over movies

Today 29th November 2009, I am taking the space to announce my another blog exclusively over movies only, which will separate my next movie reviews from this blog.

I was lucky to get the name from

Hoping that people will love to read.



Google’s Picasa 3.5-Now with Face Detection

The last article was about managing your e-books and now here comes the management of pictures and videos all around scattered all around over PCs. We attend parties, roam around places and have fun moments in schools, colleges n offices and with sophisticated mobile cameras and cheap digital cameras available all over make us end up number of images growing up in our PCs all the time.

We go after the collection, sometimes saving by dates, sometimes saving by occasions, sometimes saving by people’s name and sometimes in the name of places. When we get finished of this all work, there is still remain lots of work of visiting them, editing them, using them in various ways and need of lots of different tools like Photoshop etc. Ever wondered if it was easier? I am sure that you must have heard the name of Google’s Picasa somewhere even if not used yourself.


Firstly introduced to world in October 2002 by Idealab and then owned by Google in July 2004, Picasa now has become one-stop-solution of all your general image collection, editing, distribution and archiving needs. It may be used to arrange the photos to various ways and then provide ways to touch ups, edits and enhancements. Once the images are ready, there are many options for output like traditional slideshows, posters, collages, web albums, blogs and email.

Firstly introduced through Picasa Web Albums (its web version), name tabs (means the face detection technology) is now part of the latest Picasa build as well and you can’t feel how exciting it is without actually going through it.

Picasa scans your computer for photos and videos of almost all the formats and start arranging them automatically. With the latest version now, it also scan all the pics for the faces (obviously takes time and resources) and ask you to name tag them. Once you tagged, it also search all the similar faces and start sending you suggestions to add them under the appropriate names. I was really amazed that how much speedy the process is. On my own PC, in a matter of 2 hours, it got more than 2000 faces under my own name and more than 4000 faces under other people’s name.

The algorithm was good enough to group siblings with similar faces under one group suggestions, if we have not named them separately and once named separately, it was not confusing them next time again like it’s learning things very fast.

Nitish Kumar

As about features, then there are number of features in picasa, which could be categorized as follows:

  1. Organizing Photos and Videos. Using name tags, geo tags.
  2. Face detection technology now makes it simple to organize the photo collection by what matters most in those photos; the people.
  3. Integrity of Google Maps makes it simple to geo tag photos over map.
  4. Creativity unlimited through lots of editing options
  5. Sharing made simple through blogs, Picasa Web Album Upload/Sync and emails

If I go through number of features and details about what Picasa has and what it can do for you, then it will take books, but if you just download it to your PC and start living with it, then it would be a tremendous experience for yourself. I really thank to Google and the technology world, we are living in. 🙂

Other links:

Making an E-Library and Content Server with Calibre

“ I know the name Calibre is a complex-n-typical one and lengthy details about the product might bore you out before you even think about downloading and using it. But I bet, you are missing all the fun of E-Books word, if you are not using it. If you like read/ collect e-books over different interest to your hard drive or more better using Sony E-Book Reader, Amazon’s Kindley or Arnoid, then introduction with this simple yet amazing piece of software going to be a life turning experience for you.”

Many times you must have come across websites having lots of e-books and been impressed with the way, you could search and find e-books of your interests. By collecting from Campus LAN or over own searching efforts from Internet, we could soon obtain Gb of PDF, CHMs and other format e-books, but the part of managing this always growing collection has always been a tedious task (to me at least). Ever wondered, if you would be having such an E-Library of your own? 

Here is an Open Source Solution for the same, a product named Calibre. The simplest use of the software is searching and adding or manually adding books to it and then obtaining a list to navigate and search through. In the process, it takes a folder and saves all the e-book files in it according to its own hierarchy of author name/ owner name etc. As output, it returns us a simple, yet sophisticated enough interface to deal with.


Calibre is primarily an open source e-book cataloging program, which is designed around the concept of logical book, where a single database entry may correspond to a variety of formats. It stores your book catalog as a database entry with easily editable metadata.

The exciting features of calibre could be categorized into six categories:

Library Management: It could sort your e-book collection by Title, Author, Date-Added, Date Published, Size, Rating, Series etc. In addition, it could work out extra searchable metadata like Tags and Comments. You can even export selected subsets of your collection to your hard disk or any external device in a fully customized folder structure.


E-Book Conversion: Calibre supports conversion of lots of E-Book formats to one- another and has supoprt to almost all known e-book formats, which makes it very special for collectors. The full list of supported formats could be found here. The conversion engine itself has many powerful features like generating table of contents, scaling fonts and creating book structures/ chapters etc.

E-book Reader Devices Support: Calibre has a modular device driver design that makes adding support for different e-reader devices easy. It has support for a large number of devices. It supports synching of metadata of the device with the metadata of library. While sending to device, calibre either automatically chooses the best format available or convert the e-book to a format suitable for the device.

Converting News and Blog Entries into E-Book Form: Calibre can automatically fetch news from websites or RSS feeds, format that into an e-book and upload to a connected device.

Comprehensive E-Book Viewer: Calibre has a built-in e-book viewer that can display all the major ebook formats. It has full support for Table of Contents, Bookmarks, CSS, a reference mode, printing, searching, copying etc.


and last but my favourite feature

Content Server for online access to your E-Library: Calibre has a built-in web server that enables others to access your e-book collection using a simple browser from any computer anywhere in the world. It can also email your books and download the news to you automatically. With support for mobile devices, you can always browse and download books from your smartphones and readers like Sony, Arnoid or Kindle etc.


Just think once, how exciting it would be sharing your all –ebook collection over the LAN and even over the internet (if you are making your PC a web server over internet).

So, what are you waiting for? Make a move to manage your digital habits effectively. Its sure going to be your one-stop solution for all your e-book management needs.

Making Squid Server from Scratch: The Dummies Manual

The article is intended to present the simplest yet much effective way to configure Squid Server to restrict internet access for system administrators. Layman Instructions with minimum set of commands makes the Squid deployment easier with help of this article and could provide a great resource for the people configuring Squid Server for the first time.

Most of us should have heard of Squid, mostly while discussing requirements of restricting Internet Usages among clients. Although a requirement for Squid may arise for any few of the following reasons or anything else:

1- To limit bandwidth usages: Squid optimizes data flow between client and server to improve performance and caches frequently-used content to save bandwidth (As data is being accessed locally not through ISP for further requests).

Moreover, Organizations might have limited bandwidth or expensive over some threshold value, so management cannot permit employees to download inappropriate material as it usages precious bandwidth (there are even options to limit the download size through Squid Server, which might be handy for such a scenario).

2- Due to Organizational Policy: Sometimes, organizations might have very strict internet policies regarding offensive materials. For this and for other reasons like controlling distractions, they don’t want their employees gaining access to inappropriate sites.

3- To limit usages as per defined hours: Sometimes, organizations might need to provide internet access to employees during certain working days/ hours only.

4- Monitoring site access patterns: Sometimes, in place of restricting or in addition of restricting internet access, the purpose might be monitoring the usages patterns for further steps to optimize or restrict.

Most special point about Squid is its being open source and vast availability of information and tweaks through forums and blogs. That’s why it’s most preferable solution for any such scenario.

Here I am providing the Step By Step Dummies Manual for implementing a Squid Proxy Server for layman like me, which should be sure helpful for many of us (including myself).

Step-by-Step with the implementation:

1- Base Machine: For my deployment, I chosen CentOS as the Linux installation due to availability and reliability of update sources for the OS itself (its replica OS to Redhat Enterprise versions with almost all features). The Configuration for the machine was 2.66 GHz Core 2 Duo Processor, 1 GB RAM and 160 GB HDD space.

Installation was customized to have 2 GB swap partition, 200 MB boot partition, Squid package checked, Web Server packages checked, SendMail related packages (Squid may be configured to send reports on mail), MySQL/ PHP packages checked (not required for Squid itself, but might be required for reporting software’s later on).

2- Setting Up the services: We need just one service specially Squid, but I will recommend to keep the same server up as an Apache Web Server as well, so that could customize Squid Error Messages with pics or logos.

Here is the basic way:

# chkconfig squid on
# chkconfig httpd on

The above commands will set up the services squid and httpd ON on startup. For later dealing with Squid Service, you can always use the following commands:

# /etc/init.d/squid start
# /etc/init.d/squid stop
# /etc/init.d/squid restart

Although I will come up with firewall and iptables stuff at the later part of this manual itself (as integrating squid and iptables is kind of necessary for any production environment), but for people, who wish to keep them minimal with squid, here is what minimum needed to do with firewall. First check whether port 3128 is opened or not

# netstat –tulpn | grep 3128

If not, then next part would be

# vi /etc/sysconfig/iptables

And append the following line to open up the port 3128 for squid:

-A RH-Firewall-1-INPUT -m state --state NEW,ESTABLISHED,RELATED - m tcp -p tcp --dport 3128 -j ACCEPT

And finally, restart of iptables service (Firewall service)

# /etc/init.d/iptables restart

3- Configuring Squid: Till here, you got Squid services are up and running and now the next and major part remaining is setting up configurations, defining ACLs and setting Access Groups for getting a basic squid configuration running. Except creating a few files for storing domain names to allow/ deny or to store keywords to deny, now most of the part has to be done by editing Squid configuration file squid.conf

# vi /etc/squid/squid.conf

The starting step of playing with squid.conf is setting a hostname for Squid, which is essential for its working. Need to find out visibal_hostname and setting it by putting a name.

visible_hostname squidproxy

Now, first we need to understand the basic requirements and then have to design a policy according to that. So, what your general requirements might be?

1- You may require groups of IP Addresses (different sets), which will have customized web access per requirements/ policy.

2- You may require that few groups might be restricted to only few mentioned sites, few groups might require access for most of the sites (even not documented ones) and few inappropriate ones blocked either domain-based or keywordbased.

3- You may require set of user names/ passwords to access the web along with rules including the above two. (I am not taking this specific one as my case for simplicity reasons).

Although there are numerous Use-Case-Scenario for Squid, but I guess the above ones cover most of the corporate scenarios for basic security administration. So, I am starting with this.

For documentation and readability purpose, you need to name/ remember the various requirement groups first like.IT, Management, Team1, Team2 etc. and then we will proceed further to configure policy for each of the group.

Rest all is about Access Control List definitions. One can limit user’s ability to browse the internet through ACLs. Each ACL defines a particular type of activity, such as an access time or source network, then all ACL statements are linked to http_access statement that tells squid that whether or not to deny or allow the traffic that matches particular ACL.

Squid matches each web access request it receives by checking the http_access list from top to bottom. If it finds a match, it enforces allow or deny statement and stop reading further (that’s why you need to be careful not to put a deny statement above similar allow statement).

Note: The last http_access statement denies all access that’s why we need to keep all of our customization above the same line.

Making Internet Access Policy: First set of rules (template): First you need to start from Access Controls section. At first you need to name a group of IP Addresses and then have to define ACLs for domain-based/ keyword-based site access blocking. I am taking the case of IT Support Web Access, where we need to block a selected list of sites and have to keep rest of the web opened. Although format is given in squid.conf itself, but I am putting the format here as well. There might be two ways to define the address range as given below:

# acl aclname src ip-address/netmask or # acl aclname src addr1-addr2/netmask

In next step, it’s better to keep everything allowed/ denied network, denied sites, denied keywords, so that later updating could be done without touching the squid.conf itself, moreover, backing up configuration would involve backing up those files and squid.conf itself that would be much cleaner and readable than usually squid.conf ended up to be.

Here I am taking first case of management network (just an example for use case).

Requirement is, we have to allow some specific IPs to access internet, some specific sites like orkut, facebook etc might be needed to be blocked, some specific keywords like port, xxx might be needed to be blocked and even you might have some machines in the same IP range that should not be given any internet access at all.

The following snip-set of configuration shows how to do it (acl names itself enough to explain).

# ACLs to define Management Network 
acl management_network src "/usr/local/etc/squid/management/management_network" 
acl management_deny_network src "/usr/local/etc/squid/management/management_deny_network" 
acl management_deny_sites dstdomain "/usr/local/etc/squid/management/management_deny_sites" 
acl management_deny_keywords url_regex -i "/usr/local/etc/squid/management/management_deny_keywords"

Now, the next and final set of configuration entries would be selected domains and keywords denying first and then allowing rest of the web (squid scans top to bottom).

# Allow/deny web access to Management Network 
http_access deny management_deny_network 
http_access deny management_deny_sites 
http_access deny management_deny_keywords 
http_access allow management_network 

Now, most importantly, you need to create these files at respective locations and putting required entries in them.

The profit for this approach is, any newbie could maintain the squid as usual maintenance works asks for adding/ removing IPs and adding/ removing sites and keywords for denying. It will save squid.conf from being messed up again and again by simple requirements, moreover, will keep it clean and readable.

In this way, all the files would be kept outside squid directory for keeping other IT staff not messing with actual squid.conf itself in case of any short term requirement. Now, there is a folder /usr/local/etc/squid and I’ll make folders inside this folder with the names of access groups as required (like in above case, I made a folder named management).

management_network will keep IP addresses to allow. Syntax might be one IP in each line or range like or

management_deny_network will keep IP addresses that should not get any internet access.

management_deny_sites will keep domains to be denied (one domain in each line)

management_deny_keywords will keep keywords, which if are contained in any url then the whole URL should be blocked (like xxx).

More Restrictive Policy for another group of IPs: Second set of rules: Now, consider a requirement, where you have to allow only provided set of domains/ websites and have to restrict rest of the web access i.e. just company mail site/ website.

Again, you will be needed to pick another range of IP addresses and then defining the rules in following way (on the above pattern). Say the network would be MIS network:

# Permission set defined for MIS Network – Nitish Kumar
# —————————————————————
acl mis_network src "/usr/local/etc/squid/mis/mis_network" 
acl mis_deny_network src "/usr/local/etc/squid/mis/mis_deny_network" 
acl misGoodSites dstdomain "/usr/local/etc/squid/mis/misGoodSites"
# —————————————————————

Now, the next and final set of configuration entries would be selected domains and keywords denying first and then allowing rest of the web (squid scans top to bottom).

# Defining web access for MIS Network – Nitish Kumar

# ———————————————————-
http_access deny mis_deny_network
http_access allow mis_network misGoodSites

http_access deny mis_network

# ———————————————————-

Explanation for file names are similar as was in last case. Here misGoodSites file contain the names of those domains, which will be allowed and rest all will be restricted.

In this way, the second kind of requirement is done to restrict the web access in aggressive way, where only intimated sites would be allowed.

Note: In this scenario, you would be receiving request about site not opening in proper manners and of skipping frames/ pics etc. The reason of such issues would be third party domain embedded in the domains we allowed. So, obviously, the frames and pics are being blocked as they are from not mentioned domain. In such a case, you need to find out these third party domains and allowing them in Good site list.

So, here is the simplistic configuration for squid. There might be many use cases and many on-the-fly custom issues as per scenario, which could be worked out easily on the basis of extensive support provided through blogs and forums all over the web.

Rest part of the Squid Management belongs to Internet Connection and Log Management. If Internet Connection is working over Squid server, then it should work over client after configuring proxy configuration IP/PORT in internet options.

As about directories and logs, then cache directory location is /var/spool/squid and log directory location is /var/log/squid and the important log files, while will be needed to be managed later on are store.log, access.log, users.log and cache.log Note that squid can handle maximum size of a log file as 2GB only and after the same squid service will be terminated, so have to take care of that. Although fortunately, logrotate program automatically takes care of purging the data.

Now, with the above part anybody could easily configure a working Proxy Server and happily live with it later on more easier than other squid configuration manuals suggest.

For people asking for more, here are a few more tips and recommendations

Blocking MSN/ Yahoo/ Gtalk Messengers

Sure, most of you will come across such a requirement and trouble with that is leading messenger know that they would face proxy at some places so they already come with ways to bypass the proxy itself, which makes the job a bit difficult. Here is how to accomplish the same task.

First define the list of IP addresses that some smart messengers like MSN or Yahoo could use (like , The below section will go to network definition section.

acl bannedips dst "/usr/local/etc/squid/bannedip"

Now, how to use the rules to block messenger traffic

# No Messenger
# ———————————————————-
acl stopmsn req_mime_type ^application/x-msn-messenger$
acl msngw url_regex -i gateway.dll
http_access deny stopmsn
http_access deny msngw
http_access deny bannedips
# ———————————————————-

No Cache for selected sites in Squid

Caching is good for sites with mostly static content, but it could create lots of session related troubles around sites with more dynamic contents and it might be a better option to choose not caching any data for a particular set of sites. Here is how to implement it:

# Defining list to preventing caching for sites
# ——————————————————————-
acl prevent_cache dstdomain "/usr/local/etc/squid/No_Cache_Sites"
acl prevent_cache_file url_regex -i "/usr/local/etc/squid/No_Cache_Ext"
# ——————————————————————-

The above part needs to put, where network ranges are defined (above other custom rules) and the below part has to be placed where rest of http_access statements are placed (above other custom rules):

# Preventing caching for particular sites
# ———————————————————-
no_cache deny prevent_cache
no_cache deny prevent_cache_file
# ———————————————————-

And now we need to put the domains, which needs not to be cached in No_Cache_Sites file and File extensions not to be cached in No_Cache_Ext file and Squid server will stop caching for mentioned domain/ file extensions  after restarting the Squid.

Need pics/ logo in squid error messages?

What if you wish to customize the error message screen you get from Squid? Sure, you have to reach the error file named ERA_ACCESS_DENIED somewhere in /usr/share/…. and then have to edit with normal HTML. Lots of things could be done with this, but what many people wish to do first, is trying to put some gif or logo in the same error message.

Although I don’t favour putting images in error message as it make it a little heavier than originally it is, but here is the work-around.

Putting the image in same directory as ERA_ACCESS_DENIED file doesn’t work and what you require is making Squid itself a Web Server (that’s why I suggested to keep an installation of Apache over same server) and then referencing the image required through some web-path of the same Squid Server. Also notice that you also needs to allow Squid Server Access to all those PCs, where this error message is expected to appear otherwise, you will get error page without any gif or pics over it.

All Network range could be allowed to access Squid server in the following way

# Permission set defined for Complete Network
# ————————————————————-
acl all_network src
acl GoodSites url_regex -i "/usr/local/etc/squid/GoodSites"
# ————————————————————-

And as per convention, I followed throughout, the above lines will go around section for ACLs defining Network range and the lines given below will go along with rest of http_access statements.

# Defining web access for All Network
# ———————————————————-
http_access allow all_network GoodSites
# ———————————————————-

Outlook and Squid Solved: Requirement of iptables (Firewall)

Why my Outlook not working behind Squid?
How can we use Outlook express or any other mail client behind Squid?
Squid running fine and filtering traffic for http access, but how to use SMTP/POP3 with Squid?

It’s very easy to find people coming up with such queries. I wish to make a clear statement here “Squid has nothing to do with Outlook or SMTP/ POP3 access”. Squid is nothing but a HTTP proxy, which could intercept requests coming over http ports only, not these POP3/SMTP ports.

Disappointed? Don’t be.

Even if it’s not the case of Squid, you could make use of iptables (In built Linux Firewall), which will not only solve the above issue, but will add up more security for your squid.

What is needed to be done with iptables is as given below:

1. First of all, the Linux Box should act as a router to forward all requests coming on port 25 and 100 to outside means IP forwarding required.

2. In next part, as IP forwarding is enabled and any request coming to Box, is going outside, so all ports needs to be secure and controlled.

3. Need to redirect all requests coming to port 80 to port 3128, where squid rules will govern internet access.

4. Need to allow only required ports open on Squid (like 22, 3128, 25, 110, 995, 467).

5. Could be defined that which workstations could be able to make use SMTP/ POP3 through same server.

6. Could be defined that only a few workstations could be able to do ssh to Squid server.

For allowing SMTP/ POP3 connections, your Linux Box (Squid Installation) needs to act as a gateway, which will be entered in Default Gateway entry of client PC. For doing so, one needs to enable IP Forwarding on the same.

It’s disabled by default. For checking the same, you may type the following:

cat /proc/sys/net/ipv4/ip_forward

If output is 1, then nothing to do and if output is 0, then it needs to be ON.

For permanently putting IP Forwarding as ON, you need to change the value of net.ipv4.ip_forward to 1 from 0 in the file

/etc/sysctl.conf. The changes could take affect by either a reboot or by the command

sysctl –p /etc/sysctl.conf

Once you have enabled it, the immediate step is to redirect all traffic of port 80 to port 3128, securing other ports, allowing required ports, allowing ICMP ping, allowing ssh etc. Edit /etc/sysconfig/iptables file and put the following in that.

: PREROUTING ACCEPT [631:109032]
:OUTPUT ACCEPT [276:26246]
-A PREROUTING -i eth0 -p tcp -m tcp –dport 80 -j REDIRECT –to-ports 3128
-A PREROUTING -i eth0 -p tcp -m tcp –dport 80 -j REDIRECT –to-ports 3128
:INPUT DROP [490:62558]
:OUTPUT ACCEPT [10914:7678585]
-A INPUT -i eth0 -p tcp -m tcp –dport 22 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp –dport 3128 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp –dport 25 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp –dport 110 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp –dport 25 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp –dport 110 -j ACCEPT
-A INPUT -d -p tcp -m tcp –sport 1024:65535 –dport 80 -m state –state NEW,ESTABLISHED -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp –dport 10051 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp –dport 10050 -j ACCEPT
-A INPUT -d -p icmp -m icmp –icmp-type 8 -m state –state NEW,RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -s -p tcp -m tcp –sport 80 –dport 1024:65535 -m state –state ESTABLISHED -j ACCEPT
-A OUTPUT -s -p icmp -m icmp –icmp-type 0 -m state –state RELATED,ESTABLISHED -j ACCEPT


In the above, I have enabled ports 22, 25, 110, 10051, 10050 (zabbix), also have allowed ICMP ping and web server (as I will use SARG for reporting of Squid Access) for all.

Now, after this, if you use Squid Server’s IP Address as Default Gateway, then you will be governed by all Squid rules (without putting Squid’s IP Address in proxy setting) and also would be able to sent-receive emails in Outlook (Note that currently, everyone is allowed over port 110, port 22 for all sites).

Task: Enable or allow ICMP ping incoming client request

For people looking for enabling ICMP ping only, use following three command in order.

Rule to enable ICMP ping incoming client request (Assuming that default iptables policy is to drop all INPUT and OUTPUT packets)

iptables -A INPUT -p icmp –icmp-type 8 -s 0/0 -d $SERVER_IP -m state –state NEW,ESTABLISHED,RELATED -j ACCEPT
iptables -A OUTPUT -p icmp –icmp-type 0 -s $SERVER_IP -d 0/0 -m state –state ESTABLISHED,RELATED

Task: Allow SSH from given IP Addresses only

Rule to allow SSH from one given IP Address only (Assuming that default iptables policy is to drop all INPUT and OUTPUT packets on SSH port)

Although there are many other ways to do it, but I am putting the iptables way here

iptables -A INPUT -p tcp -m state –state NEW,ESTABLISHED -s –dport 22 -j ACCEPT
iptables -A OUTPUT -p tcp -m state –state NEW,ESTABLISHED -d –sport 22 -j ACCEPT

It will allow only IP Address of series to SSH the box. Similarly individual IP Address and range could be allowed.

I hope I have provided a complete info for anyone wishing to start with Squid. Requesting you all to put your queries, so that I could make this manual better and covering more and more aspects. Although work perfectly, but iptables part is little messy in my manual. I would welcome, if someone suggest some more flexible ways (preferably file based rules) with easy conventions.

I also recommend using SARG for daily/ weekly/ monthly online reporting as its effective and very easy to use. Here is how to implement it.

So, Enjoy a Happy Safe Browsing by SQUID.

Google Chrome Browser: What’s this and why special?

Chrome takes advantage of new technology from ground up, which runs most of these advance features without using as much memory as old browsers do now. It means that Chrome Browser opens up quickly when you clicked it and so for the tabs. You will fee the performance, when you open up Internet Apps designed for Web 2.0, like Google’s sites and services.

So, here we know, why its attractive to pick up. Let’s see more deeper. It got best all, Tabs, Speed Dials with screenshots, Security Features, themes and yet the simplest interface to compete from any other rivals.

Few days back at 19th November 2009, we got the final news about Google Chrome OS that this project is being open-sourced and the OS will actually come to market by end of 2010. The related video are given below:

The same news ignited me to collect some info around Chrome and special things about it. Before the OS itself, in this article I thought to limit myself to Google Chrome Browser only this time.

You have many browser choices out there, if you have Windows then you see the world from the eyes of Internet Explorer, if its MacOS, then your world get flashlights in face of Safari , if its any flavour of Linux, then you are most likely to get the wing from Firefox and if its mobile then you must have seen Opera.

Due to constant updating features and blazing fast performance than other browsers, we already see Firefox racing in front of the giant Internet Explorer in the market share. I really wonder if there is any place left for a new browser and yet the innovator Giant Google announces a new browser, then there must be some means and strong backing behind the same. The core of this concept is around Web 2.0, Chrome was build up from the ground up for Web 2.0 and the focus always remained on speed, security and reliability throughout the visionary design process.

Basically, Internet apps now days takes more than what we known from long as simple HTML. All the other browser started from simple keeping that HTML in mind and then adding on capabilities and so over the time, browsers were sure bulky and slow as first apps has to load then the browser. You must have noticed that how much time Internet Explorer, Firefox or Safari takes in opening just the first blank page.

“ This all has gone under a big change with, what we calling the Google Chrome Browser. Chrome takes advantage of new technology from ground up, which runs most of these advance features without using as much memory as old browsers do now. It means that Chrome Browser opens up quickly when you clicked it and so for the tabs. You will fee the performance, when you open up Internet Apps designed for Web 2.0, like Google’s sites and services. ”

So, here we know, why its attractive to pick up. Let’s see more deeper. It got best all, Tabs, Speed Dials with screenshots, Security Features, themes and yet the simplest interface to compete from any other rivals.

The Omnibox (New address bar): Its unique feature (although Firefox also have it in a way) is its Omnibox, which we know as Address Bar. In Omnibox, Google Chrome has combined the address bar, the search bar, the search from other sites and a little more. Let’s put the points over some of the features:

1- Link Navigation: The most basic thing of browser to type in address in address bar, has got more wing with added help and suggestions from web, from your history and making to type much lesser keys then ever with its real time suggestions.

2- Web Search: You could type anything to search for in the Omnibox and you get will to the search results of any search provider (Google is default one).


3- Web-History Search: It makes it much easier to search within pages, you already visited. Just type a keywords from middle and it will pick up whole link you visited. Isn’t this cool for most of us?


4- Bookmarks: Google now have provided Bookmark sync through Google Account itself, which enables user to have their bookmarks everywhere they logged in, but even if you are not using that it combines local and google’s bookmarks of yours and provide real time suggestions, while you type in the Omnibox, aiding you at its best to reach out your site.


5- Search out of search engines: This is a feature, right now lesser people know about. You want to search something in YouTube, type in in Omnibox and it will display message like “Press TAB to search”, press tab and you will get “Search ” written in Omnibox and then type in any word after the colon and here you go.

tab searchtab search2

For the people caring about their privacy concerns from these above mention features, there are option to control most of the features, even could have separate profiles with little tweaking. And above all, you have option of incognito windows, opened by Ctrl+Shift+N, in which whatever you do, don’t get recorded in history. Unlike Firefox’s Private browsing, it doesn’t shut off the other opened windows means you could work in normal windows and incognito windows at the same time :).

I am dammn sure that this Omnibox has started changing the way we see browsing for the people, who has started using it. Just give it a few mins and it starts learning your preferences on its own. You open Chrome again and it shows your frequently visited pages with their snapshots within 60 seconds to choose upon like speed dial.

Playing with the TABs: TABs became an integral part of browsing experience with all browsers, even then Chrome found new ways to improve them. With easy drag and drop, you can change the order of TABs and even pull them out for become a new chrome window. Moreover, technically each TAB runs in a separate process, so even if one page crashes, other TABs are safe and in most of the cases, your whole browser doesn’t crashes.

The simplest toolbar: Forget the days, having a tool/menu bar having menus like File, Edit, View, Favourites, Tools etc. You got just easiest thing, the browser. There is an Start Button for easy Bookmarks, Refresh Button, Navigation for Back-n-Forward and a triangular Go button with Page Menu and Settings Men next to it, that’s it.

Page / Settings/ Options Menu: There is just two menu, having it including option to Text Zoom. You have options to make applications shortcut like for Google Docs, Google Sites, Gmail, Google Maps etc (Thanks to built in Google Gears).

Bookmark Bar: Chrome claims to having most happening bookmark system in browsing world right now. Just click on star button and you get easiest options for this one click bookmark. In rest of the things, it got all that arranging in folder and whenever you want to see bookmark bar, then just press Ctrl+B. When your bookmarks grow in hundreds then search is always inbuilt.

Security, sandboxing and safe browsing: Malware and phishing are two main problems that affect users conviction and assurance on the Internet. In the present time, malware is a very important aspect as it is related to stealing passwords and other documents. With SANDBOXING – a new feature prevents malware from installing itself on your computer. Your passwords and documents are at a safer hand – so, why worry.

Google chrome’s task manager: Just like your own CPU, you can now monitor sites that are using most of the memory, downloading the most bytes and interrupting in browsing sites you are working on – so, just eliminate them and work efficiently without any mess. In addition, you can also see plugins that are associated with the tab.

Although there are much to discuss about in world of advanced features with plugins, hidden features etc but that will lengthen this article much more. So, ending just here with the request that if you haven’t tried Google Chrome, then just give it a try and that’s it.

Saving time with keyboard shortcuts

Use these keyboard shortcuts to take some stress off your mouse. Here are a few mostly used shortcut keys for a quick reference (Full list is here).

Ctrl+T Open a new tab.
Ctrl+W Close the current tab.
Ctrl+Tab Cycle through current tabs.
Ctrl+N Open a new window.
Ctrl+Shift+N Open a new incognito window.
Ctrl+Shift+T Open the last tab you closed.
Alt+Home Open your Home page.
Ctrl+L Jump to the Omnibox.
Ctrl+K Search for a word in the
Ctrl+F Find text in an open page.
Ctrl++ Increase the font size.
Ctrl+- Decrease the font size.
Ctrl+0 Restore the normal font size.
Ctrl+B Always show the Bookmarks bar.
Ctrl+H Open your browsing history.
Ctrl+J Load your Downloads page.
Ctrl+X Cut.
Ctrl+C Copy.
Ctrl+V Paste.
Ctrl+P Print the current tab.
Shift+Esc Open the Tab Task Manager.

And at the end for knowing Google’s vision over Chrome, the famous comics is always here. For more interested people, I will recommend reading the book Google Sites and Chrome for Dummies.




Technorati Tags: ,,,,,,,,,,,
Windows Live Tags: ,,,,,,,,,,,

Blogging; Howto, Setup and working with the system

I have wrote earlier that what are the tools required for blogging, but let me summarize again more systematically and a little bit technically (of course few words from ProBlogger). Followings are somewhat necessary steps, which a newbie blogger should take on his mind

Sometimes, we write coz we are afraid of our empty selves.
Sometimes, we write coz we feel afraid that why we are not feeling like writing.
Sometimes, we write coz we just wanted to say something and don’t want to say the same.
Sometimes ….

There might be many reasons, why I am writing this time, there might be many reasons, why one writes or think about writing. Some times back, I wrote an article about writing blog with an obsession that may it inspire few more people to write blogs. May be it was for some, but today I wish to put a little more efforts.

Why to write a blog? I have already written over it and now I am going to re-write a few points and also that what are the tools and easy practices for the same. I will not forget to mention that one push for this article was an article from ProBlogger. I agree from the point made by the author that there are two types of bloggers;

First one, who get into writing due to free flow of thoughts and quick enough to sit down and type on before the thoughts may get mixed up in already messed up life’s little big things.

Second one, who think about writing first and then plan for the same with related materials, make a draft first, think about its salability, think about it marketability, think about theme around it and think about all other minor details, which right now, I don’t even know. 🙂 But the best part is, in all these things, this second category take just a very little time more than the first category.

Obviously, the results are favorable for the second category and the first category sometimes cries that why don’t their authentic thoughts get proper attention than the technical ones. Anyway, I still wish to be termed as one from the first category and even right now wish to write for the first category.

I have wrote earlier that what are the tools required for blogging, but let me summarize again more systematically and a little bit technically (of course few words from ProBlogger). Followings are somewhat necessary steps, which a newbie blogger should take on his mind:

  • Choosing a topic: I know this doesn’t go well with newbies as we want to write but we don’t know what our exact tastes are and at which topics we could attract more people. Note that in start choosing topics might be random, but sooner or later you will be needed to find some central topic for your blog, which will define the theme around your blog, so give a thought about the topic for sure. 
  • Choosing a platform and design: This is about choosing platforms, tools, attractive themes and contents. for a professional view, you could check the ProBlogger Article. But at my blog, thoughts and recommendations are my own and so I recommend WordPress, whole heartedly either you are writing over the free domain or setting up your own domain from the software provided by The reason of recommendation is the level of comfort and available options you could configure, which is also certified by most of the public. After choosing the platform, you need to choose a theme as light as possible, which could loads as fast as possible coz you have only few seconds to impress the person visiting for your link and if most of these seconds will be taken by loading of pages, then you know the answer …. F*** Off.
  • Choosing a name/domain: If you are not planning invest anything in start and just wish to go for it for satisfying your passions of writing, then the second part is irrelevant, but the first part still matters a lot. Choosing the name; It will sure be a crucial step for your blog as its kind of identity, which will be hard to change later on. You need to be specific about naming the blog, so that it could strictly match up with your blog theme today and tomorrow. One more point is about ease of search and easy to market, so that better is if the name contains the central keyword, your blog is going to be all about.
  • A writing tool: Although there are many ways including Microsoft Word, Open Office etc from where you could post articles to your blog without thinking that blogging is something different than making docs in your computer, but when it comes to SEO and marketing things then you come to know that technically how much important it is to have as clean HTML code behind your post as much possible. So, better to use web editor and knowing some basics of HTML as well or if thinking about convenience then Using Windows Live Editor. For me the later option been a joy ride till now, due to availability of so many plugins, about which you could only dream of, if you are on your own with default web editor only.
  • Writing/creating a hundred posts (assuming an average of four posts a week): Although it was not serious thing to me in first sight, but I found it very true, when given some thoughts over it. Sure, habitual and regular writing is what could be foundation of a successful blogging, otherwise, you will come up with a random thought, an article will roar for few days and then you will come to see your own blog after around one month. If even you are not interested and serious about your blog, then who else will be. Be regular, be rich about content and put your efforts as earning first 1000 views is much harder than earning next 1000.
  • Subscribing to big blogs of similar tastes: I will recommend for every blogger to make full use of Google Reader etc to keep a collection of subscriptions and also keep on visiting the same as a daily habit as this provides food for your thoughts. As many things and thoughts you know, as much and as content you could write upon.
  • Registering with digg, stumbleupon, twitter, etc. : It might sound a joke, if someone come up to say that he/ she is not part of all these or don’t even know, but it might be. Why to register with these things? You just want to post some thoughts over web after all not the social networking. But these things are important for giving initial exposure towards your posts. Its better if you are connected to many in these way, so that if you wish to say something, many will be here to take attention.
  • Participating in forums: This requirement is due to the same the reason, PR exercise as I mentioned in earlier para. Moreover, it provides you quick comments and thoughts sometimes.
  • Leaving comments/back links on other blogs: Its like dropping your business card at places and writing names on walls filled with other advertisements, which make your name getting attention. Once, you are seriously in blogging word, you will come to know that how precious these back links are as these back links provide you a share of other’s hard work many times and sometimes, even this little share is too much for a starter.
  • Printing business cards with your blog address/ Telling friends about your blog: Its the basic advertising but it still has worth for everyone. Its like mouth to mouth publicity for your blog and very better if it results in developing a core of followers. Spreading the word on social networks (facebook, etc) is just part of the job. 
  • Understanding the trends and search terms about your posts: Its a very necessary part of the game to deploy webmaster tools from Google, Yahoo, Microsoft etc to know that how your posts are being reached. What are the search terms and what are the back links, so that you could work more and more in a systematic way. After all, its your learning curve, which makes you gain something over others. 
  • Keep targets about your reach: In early days, take it as a play to know hits over your blog every day. Early targets might be 50 per day, then 100 per day and then 1000 per week and so on. Once, you are involved in this game, you automatically get yourself involved in following the other steps to keep the number of hits steady up.

Anyway, leaving from here.. thought to write as was not feeling asleep, so thought to drop in some words about writing.

More about Google wave

Facts about Google wave continues ….

Do you know your Google Wave ID (like mine is is nothing sort of Email ID means no one could send an email over the same address and only waves could be sent over the same.

Do you know Wave uses your regular Google Account’s contact list means if any of your contacts are also using Wave, those people automatically show up in your Wave Contact List.

Do you know the best visible difference between a Wave conversation and Email conversation is that you can add contacts anytime later on and they could follow the conversation fro right there and could read the earlier lines etc. Means not needed to be CC from start if it was case of email.

Do you know even if you don’t have any contacts online in Google Wave, you can go for participating public waves anytime with typing the special query with:public and it will return a firehouse of constantly updating waves like the case of twitters. A better luck would be targeting your query over particular topic like with: public firefox, which will return wave related to firefox only.

Do you know A Wave can show more than one cursor working within a given wave as well, which means active waves with lots of participants could be a treat to watch with multi-colored names typing text before your eyes… live. I guess watching multiple people typing within the same document would be the most new and electrifying experience for most of the people. 🙂

Do you know although not available right now, but Wave will offer a feature that you could stop showing your typing (i.e. blips) means you could complete your typing and then press the button and your sentence; the blip will appear at once. This will be called as Draft Mode and is one of many features, which are not available in preview mode

Do you know Wave is not something completely browser independent. Wave uses recently developed web standards, such as HTML5, to perform a lot of its behind the scenes magic. So, for the richer experience from Wave, you need a browser having full support to HTML5 like Google Chrome, Firefox 3.5+ or Safari 4.

Do you know there are three ways to edit a wave

1. Reply below a Blip.
2. Reply inline within a Blip
3. Edit the existing content of a Blip.

Do you know as of now, Internet Explorer can’t run Google Wave properly as it doesn’t have support to HTML5. Although Google has released an open source browser plugin for bridging the gap. Wave prompts Internet Explorer users to install the same plugin in following way.

GoogleWave for Dummies

Do you know As of in early stages of it, Google Wave is struggling about Mobile devices as most the mobile browsers are not fully supporting to it and one could get it only after avoiding the warning of browser not supported.

Do you know your Wave Contact List is a subset of your Google Account’s exisiting Contacts list and you can add people to your Wave Contacts List only if they already have a Wave Account.

Do you know as of now, there is no way to remove a contact from a wave once added with the exception of bots.

Do you know as in theory Google Profiles are the same as Wave profiles and so you could edit yours to have links, hobbies, photos for the same.

Do you know every time a wave updates, it moves to the top of your inbox and its subject line turns bold. Wave’s instant, real-time notifications are a double edged sword; wonderful when you’re waiting on important updates, terrible when new information you don’t care about distracts you. the achieve and mute buttons can help you clean out your inbox and silence chatty waves one by one.

In the similar ways like emails, waves could be marked read or unread and also could be arranged within folders and subfolders.

Do you know although was available as a privilege to blog posts only, now tags are part of waves as well and playing the same role as was in case of blog posts. Tags provide a more free-form way to file your waves. Unlike folders, you can add as many tags to waves and also unlike folders, anyone participating could see those tags.

Do you know as of now, Wave doesn’t recognize special search characters like square brackets, parentheses, currency symbols, the ampersand, the pound sign and the asterisks. It also doesn’t recognize partial or similar matches, so a search for “travel”  doesn’t find “travels”, “traveler” or “Travle”.

Do you know If your browser has the Google Gears plug-in installed, you can drag and drop files from your computer directly into your wave. (Gears comes with Google Chrome for Windows and its freely available to install on Firefox, Internet Explorer and Safari for Mac).

Do you know If your wave contains multiple images, then an Images button appears next to the Files button on the bottom of that wave. Click the Images button and Choose View as Slide Show to easily flip through the photos at their full size.

Do you know how can we can make a wave public? Here is the trick. Add the wave ID to your contacts list the way you would any other contact (although you will get the warning that user doesn’t has any Google Wave Account but you need to continue anyway). Add the same ID as participant to any of your wave and your wave would be a public wave right then.

Now finally, do you know the keyboard shortcuts with Google wave. Here are some

Navigation Shortcuts
Up/Down Arrows Moves you up and down the blips in a wave.
Home Takes you to the first blip in a wave.
End Takes you to the last blip in a wave.
Space Takes you to the next unread blip in a wave.
Page Up/Page Down Scrolls a panel up and down a page at a time.
Ctrl+Space Marks all blips "read" when focus is on the Wave panel.

Wave Editing Shortcuts
Replies to a blip at the same level of indentation.
Shift+Enter (in view mode) Replies to a blip at the end of a wave. The new blip appears at the same
indentation level, at the very end of the wave.
Ctrl+E Edits a blip.
Shift+Enter (in edit mode) Ends your blip editing session (same as the Done button).
Ctrl+B Bolds/unbolds selected text.
Ctrl+I Italicizes/unitalicizes selected text.
Ctrl+U Underlines/removes underline from selected text.
Ctrl+G Adds color to text via "poor man’s rich text" pop-up, in which you can type a color name (like "blue" or "red") or enter the hexadecimal HTML color code.
Ctrl+K Adds a link.
Ctrl+[n] Makes the current line a heading, where [n] = 1 through 4 for different sized headings.
Ctrl+5 Adds bullets.
Ctrl+6 Removes formatting from text.
Ctrl+7 Left-aligns text.
Ctrl+8 Right-aligns text.

Navigate Image Slide Shows
Space+Right Moves to the next slide.
Shift+Space Moves to the previous slide.
Down / Page Down Moves to the next set of thumbnails.

Rest will come up as I learn more and more about Google Wave.

The Google Wave Book