Monday, August 20, 2012

How to Change Folder Background Win7


  1. First we have to unhide the protected operating system files.
    Goto any folder.
    Then Organize --> Folder and Search Options --> View (second tab)
    Select "Show hidden files, folders and drivers".
    then uncheck "Hide protected operating system files (Recommended)".
     
  2. Then a file called "desktop.ini" will visible (that file may not be there too). If the "desktop.ini" is not at there then you will have to create it by yourself (just create a file and rename it to "desktop.ini" ).
     
  3. Then enter the following code to the "desktop.ini" file.
    [AveFolder]
    IconArea_Image=E:\images\listening_music-1366x768.jpg


  1. At that code " E:\images\listening_music-1366x768.jpg" is the the path & the name of the image you are going to set as your folder background.
     
  2. After applying the image your folder names may not be clearly visible for you. So you can change the folder font color by adding the following code for the "desktop.ini" file (you can change the color by changing the TestR, TextG and TextB values. given values are the corresponding values for WHITE).
    TextR=255
    TextG=255
    TextB=255

  1. Furthermore you can enable the "shadow text" feature by adding the following code to "desktop.ini" file.
    ShadowedText=1
     
That is how it happens and now you are OK... :D :D
Good luck....!!

Tuesday, April 3, 2012

Comparison and contrast on TCSEC, CC, SSE-CMM and ISO27001


TCSEC, CC, SSE-CMM and ISO27001 are well-known security evaluation schemes.
  • TCSEC - Trusted Copmuter System Evaluation Criteria
  • CC - Common Criteria
  • SSE-CMM - System Security Engineering Capability Maturity Model

Below table gives a brief comparison among those security evaluation schemes. First six facts shoes the similarities among those schemes while the rest shows the differences.



Description
TCSEC
CC
SSE-CMM
ISO 27001
1
Applicable to all industry sectors
ü   
ü   
ü   
ü   
2
Policy
ü   
ü   
ü   
ü   
3
Documentation
ü   
ü   
ü   
ü   
4
Level of trust
ü   
ü   
ü   
ü   
5
Accountability
ü   
ü   
ü   
ü   
6
Access control policy
ü   
ü   
ü   
ü   
1
Internationally recognized
û   
ü   
ü   
ü   
2
Comprehensive set of controls
ü   
û   
ü   
ü   
3
Emphasis on prevention
ü   
û   
û   
ü   
4
A technical standard
ü   
ü   
û   
û   
5
Product or technology driven
ü   
ü   
û   
û   
6
Process driven
ü   
ü   
û   
ü   
7
An equipment evaluation methodology
û   
ü   
û   
û   
8
Different classes of security
ü   
ü   
û   
û   
9
Assurance
ü   
ü   
ü   
û   
10
Functional requirements
ü   
ü   
ü   
û   
11
Plan-do-check-act cycle possible
û   
û   
û   
ü