How to stop aplications getting started during phone Boot? In c:/system/ there is a folder named "recogs", this folder contains.mdl files will act as a shortcut to the actual application. During system startup all these mdl files will be read and started up. If you edit this file to point to nonexisting file then the application wont startup again. Don't delete the files as they will be recreated next time you open the application manually. |
VisitorZz
Facebook Fanpage
10 reasons why PCs crash U must Know Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications." You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening? 1 Hardware conflict The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device. For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself. If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route: * Start-Settings-Control Panel-System-Device Manager. Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it. Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it. Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty). When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity. To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs. 2 Bad Ram Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing. But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked. One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged. Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble. EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes. |
Another useful way to resolve video problems is to go to * Start-Settings-Control Panel-System-Performance-Graphics Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device). Look up your video card's manufacturer on the internet and search for the most recent drivers for it. 6 Viruses Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to * Start-Settings-Control Panel-Add/Remove Programs Here, look for the Start Up Disk tab. Virus protection requires constant vigilance. A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer. An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com). 7 Printers The action of sending a document to print creates a bigger file, often called a postscript file. Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance. If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.
|
Anyone who says the Consumer Electronics Show is waning hasn't been packed like a sardine waiting for the Central Hall doors to open at LasVegas Convention Center on the first day of CES.Despite the absence of electronics market leaders like Apple, and the imminent exit of PC heavy hitter Microsoft, CES is still going incredibly strong with more than 2,700 exhibitors in over 1.8 million square feet of space. From giant multi-level booths with built-in coffee bars in the LVCC to stand-alone tables in hotel suites up the strip, there are a lot of products on display here at CES. More than we care to count, and many of which we'll have trouble remembering in June. What really matters are the ones we know will help set the tone for the industry in the coming 12 months. If you want to read all that we've written aboutthe show this week, check out our CES page , or allow us to cut through all the noise and break it down for you right here with the best products we've seen at CES. BEST TABLET Winner: Asus Eee Pad Transformer Prime TF700 The best tablet at CES is one I've never actually touched. But Asus's Eee Pad Transformer Prime is currently the best Android tablet available, with its quad-core processor, laptop attachment, and now Android 4.0. Plenty of other Android 4.0 tablets are cropping up here at CES, but so far none of them are quite as elegant and well-built as the Transformer Prime. So the new Transformer Prime just announced—which is essentially the existing model, but with a stunningly high-res 1080p screen—is going to remain the benchmark by which other Android tablets are measured. –Sascha Segan Runner Up: Ainovo Novo 7 Basic
|
How To Repair Detectable But Corrupt USB Drive- Have you suddenly encountered with the problem that when youplug in your USB drive,the Removable media shows up but when you try to open it, it returns with the message"Please insert a disk in to drive H:" By applying this simple method you’ll have 80% chance to get back your USB drive hardware. This works only in the above error condition. If the windows doesn’t detect your USB drive, then there is probably flaw in the USB media. Please keep in mind that, you’ll have to lose your data when following this tutorial. Plug in your USB drive. Go to Start>My Computer, right click on My Computer icon and click on Manage menu Computer Management window will pop up. Click on Disk management under Storage tree menu. Now at the right side of the window right click on your removable media. (unlike the image below, it will show unknown information), right click on your removable media and choose Change Drive Letter and Paths. Now in new window choose any drive later that is not taken by any media (M:, N: , :K: etc). Click on ok button and close the management window. Try opening your pendirve. There may be the chance to have your pendrive recovered if this method worked. If the problem still prevails then follow the above tutorial but instead of choosing Changedrive letter and paths, choose Fomrat and give a quick format to it. Thats it.. Please comment here Is That Useful Tread??? |
1.rapid shut down window while shutting down window. open task manager(ctr+alt+del), select shut down tab. and press ‘ ctrl ‘ key while select turn off from dis tab. u r window will rapidly shut down. speed up ur shut down !! start regedit. navigate to hkey_local_ machine/system/ currentcontrolset/control. click on the “control” folder. select “ waittokillservicetimeout” right click on it and select modify. set it a value lower than 2000 (mine is set to 200). and ! like previous versions of windows, it takes long time to restart or shutdown windows xp when the “exit windows” sound is enabled. to solve this problem you must disable this useless sound. click start button then go to settings - control panel - sound,speech and audio devices - sounds and audio devices - sounds, then under program events and windows menu click on “exit windows” sub-menu and highlight it.now from sounds you can select,choose “none” and then click apply and ok. now you can see some improvements when shutting down. *sharing m0de* |
In facebook in any comment box (not status) write
@[515:]
@[515:]
Copy the Code
... (You can change the digits like 123, 345 etc.) and submit to see what happens....Today i got a trick to bypass adf.ly links on our mobile. I have tested it for several times and get success. Go to this site, enter your links has to be bypass and you are redirected to your desired link directly. Enjoy. . . http://adfly.simplaza.net/ |
first go to multime.org and register there second upload your jar application by using my midlet tab third create your project fourth after creating your project click on your project add your jar application by using add midlet tab fifth build your project last download your project....... |
If you want to download videos from youtube to your pc or mobile, then there is a very simple and easy method.Just follow these simple steps: Go to youtube video page, the video you want to download. Just remove 'www.' from the video url(in address bar) and add 'ss' and press enter. A new page will open. Choose the format like flv 240p,360p,mp4 720p,etc. Your download will started. In case you want to download video from your mobile phone replace'm.' with 'ss' and choose the video format. For example in pc video url- http://www.youtube.com/watch?v=b ... 2bf17a2YMAAAAAAADAA Replace 'www.' with 'ss' http://ssyoutube.com/watch?v=b3H ... 2bf17a2YMAAAAAAADAA In case of mobile video url- http://m.youtube.com/watch?v=0LrT8N02vys Remove m. & Add ss http://ssyoutube.com/watch?v=0LrT8N02vys ANOTHER WAY The method can be applied if you have already streamed a video fully. actually the streamed video gets stored on your system you just have to access it by a software called Unlocker. In the below methods installation of java is required. Download Java from www.sun.com Insert Into URL : For this kind of sites you have to add some codes before the youtube.com portion of the video you want to download. Before The rest of the files are quite the same.Here are some: 1 - SaveYouTube : Formerly known as (Kissyoutube) , supports HD Download. 2 – Det URL : (pwnyoutube.com…), redirects you to a site with much download options to download and convert using other services. Has a nice Bookmarklet tool. 3 - WantYouTube : (wantyoutube.com…..) Requires Java , supports All Downloads including MP3 4 – Keep-Tube : ( keep-youtube.com….) requires java. supports HD and .MP3 . Got addon and bookmarklet. Online Direct Download Services: These sites can help you get the download task done for you. 1 – TubeKeeper : Java Based.Supports HD Downloads. 2 - SaveTube : Java Based.Supports download as HD or mp3. 3 – SaveFrom : Supports HD , quick download links for 40+ web pages , Extension and bookmarklet for quick download. 4 – KeepVid : HD Support. Requires java for mp3 download. 5 – SaveVid : Requires Java, supports HD Download. Works best on chrome. 6 – YouConvertIt: Requires java. Might not work for some videos especially HD. 7 – SaveVideoDownload : Requires Java. Supports download as .FLV , .MP4 , .webm. 8 – DownloadYouTubeVideo : Java Based. Only FLV Supported. |
In this era of social networking it is very hard to remain away
from Facebook for a single day .There are many users who add
thousand of friends in begning,but after some time they want
to get rid of there account amd create a new account.They fail
to find the option to delete there account. Simple steps are given
below by which you can delete your Facebook account .
Instructions
1. Login to your Facebook account.
2. Click on the link given below
facebook.com/help/contact.php?show_form=delete_account
3. Now click on submit button.
4. After this don't login to your account for 90 days.
5. Than after 90 days,your Facebook account will be deleted completely.
from Facebook for a single day .There are many users who add
thousand of friends in begning,but after some time they want
to get rid of there account amd create a new account.They fail
to find the option to delete there account. Simple steps are given
below by which you can delete your Facebook account .
Instructions
1. Login to your Facebook account.
2. Click on the link given below
facebook.com/help/contact.php?show_form=delete_account
3. Now click on submit button.
4. After this don't login to your account for 90 days.
5. Than after 90 days,your Facebook account will be deleted completely.
In this tutorial I am going to teach you howto reset your memory card password in easy step. Before we start you need to have X-plore (application used to explore your system files and folder even the hidden folders in your device) Step1 : Install X-Plore in your mobile. If you want to download X-Plore search around internet you can download free trail. Step2 : Open your X-plore apps and Press 0(Zero) and check which you have marked the "show the system files" Step3 : Once you done that now go to the following path C:/Sys/Data/Mmcstore Step4 : Once you reached there you need to press "3" under option to set it in the Hex-viewer Step5 : See the third column you will able to see a line of code ! TMSD02G (c??"?x???6?2?6?2?6). Just check the character between the "?" it is your password ie: 62626 Note: If you have not set the password, then you will not able to gain access to C:/Sys/Data Enjoy... |
for this.. follow the steps step 1)First Login into your Facebook Account( click here facebook.com ). step 2)Next, Click here( facebook.com/about/messages <add http>) to Send a request. In the next window, click on “Request anInvitation” button. Thats it...It will take some time to get your account activated. You’ll get a message alert once it is accepted.once it is approved you can use that mail id(yourname@facebook.com) You can then select your Username for your facebook email which will be “Username@facebook.com” you can share your Facebook email ID with your friends.it will directly land in messages section of your Facebok account. |
Edited by Dr1358 at 21-1-2012 01:25 www.joinme.com Hi to all.im here for tell you the best site LogMeIn, Inc. ("LogMeIn"), respects your privacy and is committed to protect the personal information that you share with us. Generally, you can browse through our website without giving us any information about yourself. This policy describes how we collect and use your personal information when we need your personal information to provide services that you request or when you choose to provide us with your personal information through our LogMeIn.comwebsite.Information CollectionPersonal information means any information that may be used to identify an individual, including, but not limited to, a first and last name, company name, email address, telephone number, postal or other physical address, birth date, gender, occupation, a credit card number (including expiration date) to process payment for products and/or services and such other information when needed to provide a service that you requested. Certain of our product and services also store connection or session information such as time/dateand length of collection, IP address, chat logs and technician information. As you navigate through this site, certain anonymous information can be passively collected (that is, gathered without your actively providing the information) using various technologies, such as cookies, Internet tags or web beacons, and navigational data collection (log files, server logs, clickstream). Your internet browser automatically transmits to this site some of this anonymous information, such as the URL of the web site you just came from and the Internet Protocol (IP) address and the browser version your computer is currently using; the date and time youaccess the site and the pages that you access while at the site. This information is used for internal/external marketing purposes, to analyze trends and to improve the site. This site may also collect anonymous information from your computer through cookies and internet tags or web beacons. You mayset your browser to notify you when a cookie is sent or to refuse cookies altogether, but certain features of this site might not work without cookies. LogMeIn collects personal informationwhen you elect to use our software ona free trial basis or purchase a license or an upgrade. LogMeIn only uses suchinformation if it has been collected in accordance with acceptable privacy practices consistent with this Policy and applicable laws.Choice/Opt-OutYou may elect to "opt out" of receivingdirect marketing or market research information. This means we assume you have given us your consent to collect and use your information in accordance with this Policy unless youtake affirmative action to opt out at the point of collection. Opt-out is the means by which you give us, or decline to give us, your consent to use your personal information for the purposes covered by the opt-out choice. You may opt out at the point ofcollection when personal information is collected, or you may do so at any time by sending an email request to support@LogMeIn.com(please indicate "Opt Out" in the subject line) or by sending a written request to the address provided below. In some cases, we will provide you with the opportunity to "opt in". This means we will require your affirmative actionto indicate your consent before we use your information for purposes other than the purpose for which it was submitted. |
Cookies and Tracking TechnologyA cookie is a small data file that certain Web sites write to your hard drive when you visit them. Cookies cannot be used to run programs or deliver viruses to your computer. A cookie file can contain information such as a user ID that the site uses to track the pages you've visited, but the only personal information a cookie can contain is information you supply yourself. A cookie can't read data off your hard disk or read cookie files created by other sites. Cookies save you time, for example, if you personalize a web page, or navigate within a Site, a cookie recalls your specific information on subsequent visits. LogMeIn's website also uses cookies to track user traffic patterns. We do this in order to determine the usefulness of our website informationto our users and to see how effective our navigational structure is in helping users reach that information. You may accept or decline cookies. Most web browsers automatically accept cookies, however you can modify your browser setting to decline cookies. In addition to cookies, our site uses a variety of technical methods for tracking purposes, including web beacons. Web beacons are small pieces of data that are embedded in images on the pages of web sites. LogMeIn's also uses these technical methods to analyze the traffic patterns on our web site, such as the frequency with which our users visit various parts of our web site.How We Use Information CollectedLogMeIn uses personally identifiable information for several general purposes: to fulfill your requests for certain products and services, to keep you up to date on the latest product announcements, software updates, special offers or other information we think you'd like to hear about either from us or from our business partners,and to better understand your needs and provide you with better services. We may also use your information to send you promotional materials aboutgoods and services (including special offers and promotions) either offered by LogMeIn or offered by third parties.You may opt out of receiving these communications.Information Sharing and DisclosureOur web site provides you the opportunity to opt-in to receive communications from us when you elect to use our software on a free-trial basis, or purchase a new license or an upgrade. Further, when you receive the requested communication, you are given the opportunity to unsubscribe from receiving any future communication or to change your information. Unless you opt-in, LogMeIn will not transfer your personal information to third parties, except we may transfer your personal information without your consent to the extent required to do so by law or in the good faith belief that such action is necessary to: a. conform to the edicts of law or comply with legal process served on LogMeIn or the site; b. protect or defend the rights or property of LogMeIn, c. act in urgent circumstances to protect the personal safety, property, or privacy of LogMeIn's employees, users of LogMeIn's products or service, or members of the public, or d. effect a transaction, restructuring or proceeding that transfers to a third party the assets or line of business to which the information pertains |
Edited by dky at 21-1-2012 20:22 Scientists at IBM have apparently discovered the absolute minimum amount of data required to store a bit of data: a dozen atoms. They stored code for the word "think" using under 100 iron atoms, using a scanning tunneling microscope to engineer antiferromagnetically coupled atoms that store data for hours at low temperatures. Researchers at IBM's (NYSE: IBM) Almaden Labs have created a 12-atom magnetic memory bit, in a continuation of work on atomic-level memory storage first posited in 1959 by American physicist Richard Feynman . This image shows a magnetic byte imaged five times in different magnetic states to store the ASCII code for each letter of the word"THINK," a corporate mantra used byIBM since 1914. The team achieved this using 96 iron atoms -- one bit was stored by 12 atoms and there are eight bits in each byte. Disk drives currently use about 1 million atoms to store a single bit of information, according to IBM. The scientists used antiferromagnetism to achieve their result. They stored the ASCII code for the word "Think" on 96 iron atoms using this approach. "This atomic storage is not something you'll see coming to a Best Buy (NYSE: BBY) near you, but it's an indication of the way the IT industry continues to find innovativeways around the limitations of storage technology," Charles King, principal analyst at Pund-IT , told TechNewsWorld. "What's interesting about this is, people have wondered where the brick wall is -- the maximum amount of data that can be stored magnetically," Jim Handy, an analyst at Objective Analysis , told TechNewsWorld. "The researchers worked this backwards, to find out what's the minimum amount of storage we'll need." IBM did not respond to requests to comment for this story. How IBM's Process Works The IBM scientists used a scanning tunneling microscope (STM) to engineer 12 antiferromagnetically coupled atoms that stored a bit of data for hours at low temperatures. In the simplest terms, the spin of electrons in atoms of antiferromagnetic materials aligns in a regular pattern with those of their neighbors pointing in opposite directions. Visualize a flat surface with arrows in a 4 by 4 pattern -- four rows and four columns. The arrows in each row and column alternately point upor down, so an arrow pointing up will have its neighbors to the sides and immediately above and below pointing down, for example. Antiferromagnetic order exists at low temperatures, and vanishes at and above the Neel temperature . This temperature depends on the material used. In order to store the ASCII code for the word "Think," the researchers had to image a magnetic byte (one byte = 8 bits = 96 atoms at 12 atomsper bit) five times in different magnetic states. The Long, Hard Road to Market Given that the process of writing data onto a magnetic byte is tortuous, and can only be carried outat low temperatures, it's not likely that IBM will be able to commercialize its atomic storage technology any time soon. "With an announcement like this, you'd expect a five- to 15-year horizon with risk at the back end," Rob Enderle, principal analyst at the Enderle Group , told TechNewsWorld."Manufacturing to scale is often a very difficult problem to solve with atechnology like this, which is why the very wide range." Come Play With My STM A scanning tunneling microscope is an instrument used to image surfaces at the atomic level. IBM Zurich researchers Gerd Binnig and Heinrich Rohrer developed the device in 1981 and won the Nobel Prize in Physics in 1986 for it. The STM is based on the concept of quantum tunneling. The atomic storage developed by IBM researchers follows on from previous experiments using the STM.
|
Battery life has always been a problem when it comes to smartphones, we have been talking about solar powered smartphones from quite some time now, but have never come up with a good solution, but a research team has come up with a new concept of OLED displays which have solar cells embedded in them, and this really looks like the perfect solution, at least for now.
It is sure not many of us spend most of our time outside in the sun, but we do go out for lunch and travel to work everyday, this new display developed by these researchers charges the phone by itself when exposed to sunlight. The lead researcher of thistproject Arman Ahnood also mentions that these cells also consume the light emitted by the display to charge itself, which indirectly means that more you keep the screen on or use your device the phone will charge itself, this concept sounds really greatand exciting as a perfect cure for low battery life in smartphones today.
Though the efficiency of the cells capturing light emitted by the display is around 11-18% which results to around 5 milliwatts of extra power on a 3.7″ display, you will be getting around 15- 20 minutes of extended battery life, and if you are using it with a bigger display like the Galaxy Note or the Galaxy Nexus then you might get better battery life, you can also think of taking breaks outside the office in sunlight which will help you charge your phone.
It is sure not many of us spend most of our time outside in the sun, but we do go out for lunch and travel to work everyday, this new display developed by these researchers charges the phone by itself when exposed to sunlight. The lead researcher of thistproject Arman Ahnood also mentions that these cells also consume the light emitted by the display to charge itself, which indirectly means that more you keep the screen on or use your device the phone will charge itself, this concept sounds really greatand exciting as a perfect cure for low battery life in smartphones today.
Though the efficiency of the cells capturing light emitted by the display is around 11-18% which results to around 5 milliwatts of extra power on a 3.7″ display, you will be getting around 15- 20 minutes of extended battery life, and if you are using it with a bigger display like the Galaxy Note or the Galaxy Nexus then you might get better battery life, you can also think of taking breaks outside the office in sunlight which will help you charge your phone.
Recently appeared in the list of requests to add friends in Yahoo Messenger IDs of strange. They usually suggest a female presence at the other endof wire and are denied categorically by cautious users. BitDefender experts warn that behind such an ID can hide a new threat to users: Trojan.YIMBot.K worm. This is quite polite and usespassed away recently the head of Apple, Steve Jobs. The Cupertino company would offer free MacBook laptop memory and you are invited to join a website to get one. Bot can wear a short conversation on Yahoo Messenger quite convincing and is able to ensure that you have antivirus with updates to date. The link that sends you to a page with offers of work from home. From here things get very dangerous for the user. A powerful antivirus should warn users that the page in question is dangerous and block access. We recommend caution when you add in the list of IDs Messenger unknown
if you have sensitive or important data stored on a particular disk drive that you don’t want anyone to see, a great way to hide it is to remove the drive letter assigned to a particular mounted volume. With Windows XP, you can achieve this easily using nothing more than the Command Prompt. Here’s how:
Click Start -> Run (This brings up the Run dialog box)
Type cmd and press Enter (This brings up the Windows Command Prompt
Type diskpart in the command prompt and press Enter (This launches the Diskpart utility within the Command Prompt window)
Now type list volume (This displays a list of all mounted volumes on your computer and their associated drive letters)
Type select volume 1 (or select any other volume as where the drive is present)
Now type remove letter R (Note: This sometime requires a reboot)
Diskpart will now remove the drive letter.
The drive will no longer be available via Windows Explorer or My Computer.
Unhide
Now, should you want to unhide the drive and make it accessible again, just repeat the above process. But instead of typing remove letter R, type assign letter R
Click Start -> Run (This brings up the Run dialog box)
Type cmd and press Enter (This brings up the Windows Command Prompt
Type diskpart in the command prompt and press Enter (This launches the Diskpart utility within the Command Prompt window)
Now type list volume (This displays a list of all mounted volumes on your computer and their associated drive letters)
Type select volume 1 (or select any other volume as where the drive was present)
Now type assign letter R (Note: This sometime requires a reboot)
The drive will be available via Windows Explorer or My Computer.
Click Start -> Run (This brings up the Run dialog box)
Type cmd and press Enter (This brings up the Windows Command Prompt
Type diskpart in the command prompt and press Enter (This launches the Diskpart utility within the Command Prompt window)
Now type list volume (This displays a list of all mounted volumes on your computer and their associated drive letters)
Type select volume 1 (or select any other volume as where the drive is present)
Now type remove letter R (Note: This sometime requires a reboot)
Diskpart will now remove the drive letter.
The drive will no longer be available via Windows Explorer or My Computer.
Unhide
Now, should you want to unhide the drive and make it accessible again, just repeat the above process. But instead of typing remove letter R, type assign letter R
Click Start -> Run (This brings up the Run dialog box)
Type cmd and press Enter (This brings up the Windows Command Prompt
Type diskpart in the command prompt and press Enter (This launches the Diskpart utility within the Command Prompt window)
Now type list volume (This displays a list of all mounted volumes on your computer and their associated drive letters)
Type select volume 1 (or select any other volume as where the drive was present)
Now type assign letter R (Note: This sometime requires a reboot)
The drive will be available via Windows Explorer or My Computer.
When something goes wrong with Windows it can be very difficult to diagnose or repair, and there are times when booting your computer into Safe Mode just isn’t good enough. Safe Mode, a special diagnostic mode built into Windows strips the OS of all drivers and start-up software and presents you with a very limited version of Windows in which to diagnose what might be causing a problem, andrepair it. Many Windows features simply won’t operate in Safe Mode so there’s not very much you can do.
Fortunately though there is an alternative and it’s in every version of the operating system (XP, Vista and Windows 7). This is called “Safe Boot” and you can find it in the MSConfig panel. To open this type msconfig into the Start Menu search box in Vista or Windows 7, or run msconfig from the run option in XP.
Under the Boot tab in the MSConfig window you’ll see the Safe Boot option as a tick box. Turning this on will make Windows use the SafeBoot option every time thereafter. When you want to stop using Safe Boot and return to starting Windows normally you’ll need to returnto the MSConfig panel and untick this option. There are also several other options here including Minimal Boot, which will take you intothe full Safe Mode, but the standard option willnormally be enough for most people.
The Safe Boot screen, as you can see here is a half-way house between the full Windows desktop and Safe Mode. What you will find though is that most of your hardware drivers will be installed and working though your startup software will still be disabled.
So when might you want to use Safe Boot? Occasionally you will encounter a problem in Windows that you will need to go into Safe Mode to repair. As I mentioned earlier howeverSafe Mode won’t allow you to perform some Windows tasks, and this is where the Safe Bootmode is useful. You may also suspect that yourproblems aren’t being caused by a hardware driver, but by software instead. This diagnosticmode enables you to have a full Windows desktop where nothing loads at startup and where you can run and check programs individually to see what effect they are having on your system.
As I have already mentioned Safe Mode is extremely limiting, not just in the very low screen resolution that it gives you. If you needto run full diagnostics on your copy of Windows, to see what’s going on under the hood, or if you need to test individual software packages in a safe environment where they willbe able to run properly then Windows Safe Bootis the way to do it.
Remember though that you will need to turn off Safe Boot when you are done, or else Windows will start permanently in this mode. I have found this to be a very useful diagnostic tool in Windows and it’s extremely underused because, frankly, many people simply do not know that it exists. Hopefully you will find it useful too
Fortunately though there is an alternative and it’s in every version of the operating system (XP, Vista and Windows 7). This is called “Safe Boot” and you can find it in the MSConfig panel. To open this type msconfig into the Start Menu search box in Vista or Windows 7, or run msconfig from the run option in XP.
Under the Boot tab in the MSConfig window you’ll see the Safe Boot option as a tick box. Turning this on will make Windows use the SafeBoot option every time thereafter. When you want to stop using Safe Boot and return to starting Windows normally you’ll need to returnto the MSConfig panel and untick this option. There are also several other options here including Minimal Boot, which will take you intothe full Safe Mode, but the standard option willnormally be enough for most people.
The Safe Boot screen, as you can see here is a half-way house between the full Windows desktop and Safe Mode. What you will find though is that most of your hardware drivers will be installed and working though your startup software will still be disabled.
So when might you want to use Safe Boot? Occasionally you will encounter a problem in Windows that you will need to go into Safe Mode to repair. As I mentioned earlier howeverSafe Mode won’t allow you to perform some Windows tasks, and this is where the Safe Bootmode is useful. You may also suspect that yourproblems aren’t being caused by a hardware driver, but by software instead. This diagnosticmode enables you to have a full Windows desktop where nothing loads at startup and where you can run and check programs individually to see what effect they are having on your system.
As I have already mentioned Safe Mode is extremely limiting, not just in the very low screen resolution that it gives you. If you needto run full diagnostics on your copy of Windows, to see what’s going on under the hood, or if you need to test individual software packages in a safe environment where they willbe able to run properly then Windows Safe Bootis the way to do it.
Remember though that you will need to turn off Safe Boot when you are done, or else Windows will start permanently in this mode. I have found this to be a very useful diagnostic tool in Windows and it’s extremely underused because, frankly, many people simply do not know that it exists. Hopefully you will find it useful too
| |
|
File-sharing website Megaupload hasbeen swept up in so much drama lately it is beginning to rival a soap opera.
The frequent developments in the online piracy case may be hard to keep up with. So, here's a roundup.
The Site
On Jan. 19, the U.S. Justice Department and FBI shuttered Megaupload and had the company’s founder and other executives arrested in New Zealand for " massive worldwide online piracy ." Founder Kim Dotcom and three others appeared in court Friday andwere denied bail.
The hacker group Anonymous retaliated for the arrests by claiming responsibility for taking down websites run by Universal Music, the Justice Department and the Recording Industry Association of America. At the same time, bad guys were trying to take advantageof the situation by creating fake Megaupload sites so they could phish people.
The Bust
Dotcom, also known as Kim Schmitz and Kim Tim Jim Investor, spent his 38th birthday on Saturday in a NewZealand jail. But he didn't go quietly.
Details of his arrest are now comingout. Apparently, it was a dramatic, high-tech stand-off when dozens of New Zealand police backed by helicopters swarmed Dotcom's barricaded mansion to arrest him onFriday. Dotcom refused them entry and police had to cut their way through electronic locks to a safe room, where they discovered him with a sawed-off shotgun.
"Despite our staff clearly identifyingthemselves, Mr Dotcom retreated into the house and activated a number of electronic-locking mechanisms," Detective Inspector Grant Wormald from the Organised and Financial Crime Agency New Zealand told Reuters .
With Dotcom in cuffs, officers then began seizing things -- two guns, computers, documents and vehicles,lots of them. Personalized number plates on 20 or so seized vehicles included KIMCOM, HACKER, STONED, GUILTY, MAFIA, GOD and POLICE.
The Media
You wouldn't think it a believable story, but it turns out there were weird nuggets underlying The New York Post's claim that musician and producer Swizz Beatz was CEO of Megaupload. However, the top lawyer for Megaupload now says that Beatz was never officially the company's chief executive, reports VentureBeat .
"To my knowledge, Swizz Beatz was never involved in any meaningful way," Megaupload attorney Ira Rothken said, adding, remarkably that "He was negotiating to becomethe CEO, but it was never official." Beatz' publicist had earlier said Beatz was the CEO. Beatz was also briefly listed as CEO on Megaupload.com.
Media companies say the legitimate uses of sites like Megaupload are a veil concealing extensive theft but that doesn’t stop big-time stars, including Beatz’ wife, R&B singer Alicia Keys, from promoting it. Check out this video, which the Universal Music Group had the video taken down from YouTube, despite having no claim to the content. It has since been reinstated
The frequent developments in the online piracy case may be hard to keep up with. So, here's a roundup.
The Site
On Jan. 19, the U.S. Justice Department and FBI shuttered Megaupload and had the company’s founder and other executives arrested in New Zealand for " massive worldwide online piracy ." Founder Kim Dotcom and three others appeared in court Friday andwere denied bail.
The hacker group Anonymous retaliated for the arrests by claiming responsibility for taking down websites run by Universal Music, the Justice Department and the Recording Industry Association of America. At the same time, bad guys were trying to take advantageof the situation by creating fake Megaupload sites so they could phish people.
The Bust
Dotcom, also known as Kim Schmitz and Kim Tim Jim Investor, spent his 38th birthday on Saturday in a NewZealand jail. But he didn't go quietly.
Details of his arrest are now comingout. Apparently, it was a dramatic, high-tech stand-off when dozens of New Zealand police backed by helicopters swarmed Dotcom's barricaded mansion to arrest him onFriday. Dotcom refused them entry and police had to cut their way through electronic locks to a safe room, where they discovered him with a sawed-off shotgun.
"Despite our staff clearly identifyingthemselves, Mr Dotcom retreated into the house and activated a number of electronic-locking mechanisms," Detective Inspector Grant Wormald from the Organised and Financial Crime Agency New Zealand told Reuters .
With Dotcom in cuffs, officers then began seizing things -- two guns, computers, documents and vehicles,lots of them. Personalized number plates on 20 or so seized vehicles included KIMCOM, HACKER, STONED, GUILTY, MAFIA, GOD and POLICE.
The Media
You wouldn't think it a believable story, but it turns out there were weird nuggets underlying The New York Post's claim that musician and producer Swizz Beatz was CEO of Megaupload. However, the top lawyer for Megaupload now says that Beatz was never officially the company's chief executive, reports VentureBeat .
"To my knowledge, Swizz Beatz was never involved in any meaningful way," Megaupload attorney Ira Rothken said, adding, remarkably that "He was negotiating to becomethe CEO, but it was never official." Beatz' publicist had earlier said Beatz was the CEO. Beatz was also briefly listed as CEO on Megaupload.com.
Media companies say the legitimate uses of sites like Megaupload are a veil concealing extensive theft but that doesn’t stop big-time stars, including Beatz’ wife, R&B singer Alicia Keys, from promoting it. Check out this video, which the Universal Music Group had the video taken down from YouTube, despite having no claim to the content. It has since been reinstated
Do you know that about 20% of your internet bandwidth is reserved by Microsoft ?!
Uses of Reserved Bandwidth
> Windows Automatic Updates rely on this reserved bandwidth.
>Fast loading Microsoft Websites
> Sending Error Reports
> Online Help support in Microsoft Office
But this can be recovered back...
------------------------------------
The Remedy
>Start >> Run
> Type gpedit.msc
>This opens the Policy Editor
> Now, Local Computer Policy >> Computer Configuration
>Then, Administrative Templates
>> Network > Now, click on QOS Packet Scheduler
>Now, on Right hand side
>Double Click Limit reservable bandwidth
> Now in Setting Tab
NOTE=>It says : Not Configured
Reality : The Explain Tab says "By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection" > So, on Setting Tab select Enabled
>Now, change Bandwidth limit (%) to 0 (Zero)
NOTE=>Misconcept : This don't means that you won't be able to communicate with Microsoft or any its services !
Actually : This reserved Bandwidth is only to accelerate Microsoft internet
connections more than other connections !
> Click OK.
Uses of Reserved Bandwidth
> Windows Automatic Updates rely on this reserved bandwidth.
>Fast loading Microsoft Websites
> Sending Error Reports
> Online Help support in Microsoft Office
But this can be recovered back...
------------------------------------
The Remedy
>Start >> Run
> Type gpedit.msc
>This opens the Policy Editor
> Now, Local Computer Policy >> Computer Configuration
>Then, Administrative Templates
>> Network > Now, click on QOS Packet Scheduler
>Now, on Right hand side
>Double Click Limit reservable bandwidth
> Now in Setting Tab
NOTE=>It says : Not Configured
Reality : The Explain Tab says "By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection" > So, on Setting Tab select Enabled
>Now, change Bandwidth limit (%) to 0 (Zero)
NOTE=>Misconcept : This don't means that you won't be able to communicate with Microsoft or any its services !
Actually : This reserved Bandwidth is only to accelerate Microsoft internet
connections more than other connections !
> Click OK.
I often accept many unkown friend requests, one day i get into a big problem from a unkown friend of mine. He start abusingme .Then i do some research work and icome to know about this facebook trick and with the help of this PC Trick i cameto know that the unknown one is my own friend and he just make a fake ID on facebook.
Anyways here’s is the facebook trick of doing it:
First you got to find out the IP address of that User.
To Do so we will be using “ netstat ” command in windows for this pc trick . Ifyou want to know the IP address of a specific person on facebook or orkut or any chat service, there is only one way: Just invite or ping him for a chat and while chat is ON open ‘ Command Prompt ‘ on your PC (Start >Run>cmd).
Note: before trying this make sure you close all the other tabs in your browser. and only facebook is open. also if possible delete all the history and cache from your browser.
Now the next step that you have to do for this facebook trick is opens the command prompt Type the following command and hit Enter .
netstat -an
And you will get all established connections IP addresses there. Note down all the suspicious IP’s
The Next PC Trick is to tracethat user using his IP address.
To do this facebook tricks we will be using IP tracer service . For this Go to the following address : http://www.ip-adress.com/ip_tracer/
and paste the IP address in the box that says “ lookup this ip or website ”. and it will show you the location of the user.
It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “ click for big ip address location ” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you. Use this facebook trick if you are in a problem with some unkonown friend.
Anyways here’s is the facebook trick of doing it:
First you got to find out the IP address of that User.
To Do so we will be using “ netstat ” command in windows for this pc trick . Ifyou want to know the IP address of a specific person on facebook or orkut or any chat service, there is only one way: Just invite or ping him for a chat and while chat is ON open ‘ Command Prompt ‘ on your PC (Start >Run>cmd).
Note: before trying this make sure you close all the other tabs in your browser. and only facebook is open. also if possible delete all the history and cache from your browser.
Now the next step that you have to do for this facebook trick is opens the command prompt Type the following command and hit Enter .
netstat -an
And you will get all established connections IP addresses there. Note down all the suspicious IP’s
The Next PC Trick is to tracethat user using his IP address.
To do this facebook tricks we will be using IP tracer service . For this Go to the following address : http://www.ip-adress.com/ip_tracer/
and paste the IP address in the box that says “ lookup this ip or website ”. and it will show you the location of the user.
It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “ click for big ip address location ” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you. Use this facebook trick if you are in a problem with some unkonown friend.
For Real Windows Newbie's here you go...
CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)
CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)
-------------------------------------------------
First off nearly
all of the Run Commands Correspond to a particular Control Panel Item
or a Utility, Tool or Task that can be accessed through Windows. There
are, however, tools and utilities that I bet you never knew you had
that can be accessed through the Run feature. The main reason most
people don't use the Run feature is because they don't know the
Commands. So, to solve that problem, I decided to put together the
following listing, which lists 101 Run Commands and what they
correspond too...
To Access…. Run Command
Accessibility Controls
access.cpl
Add Hardware Wizard
hdwwiz.cpl
Add/Remove Programs
appwiz.cpl
Administrative Tools
control.exe admintools
Automatic Updates
wuaucpl.cpl
Bluetooth Transfer Wizard
fsquirt
Calculator
calc
Certificate Manager
certmgr.msc
Character Map
charmap
Check Disk Utility
chkdsk
Clipboard Viewer
clipbrd
Command Prompt
cmd
Component Services
dcomcnfg
Computer Management
compmgmt.msc
Date and Time Properties
timedate.cpl
DDE Shares
ddeshare
Device Manager
devmgmt.msc
Direct X Control Panel (if installed)*
directx.cpl
Direct X Troubleshooter
dxdiag
Disk Cleanup Utility
cleanmgr
Disk Defragment
dfrg.msc
Disk Management
diskmgmt.msc
Disk Partition Manager
diskpart
Display Properties
control.exe desktop
Display Properties
desk.cpl
Display Properties (w/Appearance Tab Preselected)
control.exe color
Dr. Watson System Troubleshooting Utility
drwtsn32
Driver Verifier Utility
verifier
Event Viewer
eventvwr.msc
File Signature Verification Tool
sigverif
Findfast
findfast.cpl
Folders Properties
control.exe folders
Fonts
control.exe fonts
Fonts Folder
fonts
Free Cell Card Game
freecell
Game Controllers
joy.cpl
Group Policy Editor (XP Prof)
gpedit.msc
Hearts Card Game
mshearts
Iexpress Wizard
iexpress
Indexing Service
ciadv.msc
Internet Properties
inetcpl.cpl
Java Control Panel (if installed)
jpicpl32.cpl
Java Control Panel (if installed)
javaws
Keyboard Properties
control.exe keyboard
Local Security Settings
secpol.msc
Local Users and Groups
lusrmgr.msc
Logs You Out Of Windows
logoff
Mcft Chat
winchat
Minesweeper Game
winmine
Mouse Properties
control.exe mouse
Mouse Properties
main.cpl
Network Connections
control.exe netconnections
Network Connections
ncpa.cpl
Network Setup Wizard
netsetup.cpl
Nview Desktop Manager (if installed)
nvtuicpl.cpl
Object Packager
packager
ODBC Data Source Administrator
odbccp32.cpl
On Screen Keyboard
osk
Opens AC3 Filter (if installed)
ac3filter.cpl
Password Properties
password.cpl
Performance Monitor
perfmon.msc
Performance Monitor
perfmon
Phone and Modem Options
telephon.cpl
Power Configuration
powercfg.cpl
Printers and Faxes
control.exe printers
Printers Folder
printers
Private Character Editor
eudcedit
Quicktime (If Installed)
QuickTime.cpl
Regional Settings
intl.cpl
Registry Editor
regedit
Registry Editor
regedit32
Removable Storage
ntmsmgr.msc
Removable Storage Operator Requests
ntmsoprq.msc
Resultant Set of Policy
rsop.msc
Resultant Set of Policy (XP Prof)
rsop.msc
Scanners and Cameras
sticpl.cpl
Scheduled Tasks
control.exe schedtasks
Security Center
wscui.cpl
Services
services.msc
Shared Folders
fsmgmt.msc
Shuts Down Windows
shutdown
Sounds and Audio
mmsys.cpl
Spider Solitare Card Game
spider
SQL Client Configuration
cliconfg
System Configuration Editor
sysedit
System Configuration Utility
msconfig
System File Checker Utility
sfc
System Properties
sysdm.cpl
Task Manager
taskmgr
Telnet Client
telnet
User Account Management
nusrmgr.cpl
Utility Manager
utilman
Windows Firewall
firewall.cpl
Windows Magnifier
magnify
Windows Management Infrastructure
wmimgmt.msc
Windows System Security Tool
syskey
Windows Update Launches
wupdmgr
Windows XP Tour Wizard
tourstart
Wordpad
write
==============
ENJOY
This tricks will be very helpful for those who frequently install windows xp operating system. Normally OS installation takes around 40 minutes to complete, But through this trick you can save 10-15 minutes.
Use this step by step guide....
1. Boot through Windows XP CD.
2. After all the files are completely loaded, you get the option to select the partition. Select “c”.
3. Now Format the partition, whether it is normal or quick with NTFS or FAT
4. Once the formatting is completed, All the setup files required for installation are copied. Restart your system by pressing Enter.
Now, here begins the Simple trick to save 10-15 minutes.
5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.
6. Now, Press SHIFT + F10 Key -> This opens command prompt.
7. Enter “Taskmgr” at the command prompt window. This will open Task Manager.
8. Click the Process Tab, here we find a process called Setup.exe -> Right Click on Setup.exe -> Set Priority -> Select High or Above Normal. Initially it will be Normal.
Thats it, no more work to do. Relax and see how fast the installation process....Enjoy and repl
Use this step by step guide....
1. Boot through Windows XP CD.
2. After all the files are completely loaded, you get the option to select the partition. Select “c”.
3. Now Format the partition, whether it is normal or quick with NTFS or FAT
4. Once the formatting is completed, All the setup files required for installation are copied. Restart your system by pressing Enter.
Now, here begins the Simple trick to save 10-15 minutes.
5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.
6. Now, Press SHIFT + F10 Key -> This opens command prompt.
7. Enter “Taskmgr” at the command prompt window. This will open Task Manager.
8. Click the Process Tab, here we find a process called Setup.exe -> Right Click on Setup.exe -> Set Priority -> Select High or Above Normal. Initially it will be Normal.
Thats it, no more work to do. Relax and see how fast the installation process....Enjoy and repl
Hey .....
Again back with something interesting for us
YES Now you can call worldwide unlimited using your pc\mac\laptop\notebook\tablet\smart phones
i used this trick for calling from pc to mobile
Lets start guys ..... follow the steps given below
1. Install Yahoo messenger,incase you don’t have it (go for the latest one which have voice support)
2. Sign into your yahoo messenger.
3. Configure your microphone and headset(don’t use speakers as it cause disturbances)
4. Inside your Yahoo messenger dial 18003733411 and press enter(as shown in figure).
5.Now a small window pops up like the one shown below.
6. An operator greets you with a recorded welcome message along with an advertisement and asks you to select one of the Free411 service.Just hear the services options until they say the last one as “Free Call”.When you hear this,don’t press any number on your keyboard and instead SAY “Free call” loudly on your microphone connected to your PC.
7. After this voice message is detected by their system ,they will run a short advertisement of their sponsor and make sure you don’t press any number at this time.
WAIT UNTIL YOU HEAR THIS MESSAGE “Please dial the phone number country code first,don’t forget to dial 1 for north america”
8. After you hear this message ,immediately dial the destination number of your choice along with the country code.(eg for north america it’s 1 and for india it’s 91)
9. Your call will get connected and you can talk for 7 minutes continuous for free.When it gets disconnected, repeat the same procedure again.You can make multiple and unlimited calls with this service.
It was never easy to make a free international call like this before.
So what’s the catch?
10. FREE411 service toll-free number is based in USA.This company gets paid for the advertisements from sponsors.
11. Are there any limits on the number of call which we can make?
No.There is no limit on the number of free calls which can be made through this system.
So enjoy this trick to make free international and local calls and make sure you don’t abuse the system.
Again back with something interesting for us
YES Now you can call worldwide unlimited using your pc\mac\laptop\notebook\tablet\smart phones
i used this trick for calling from pc to mobile
Lets start guys ..... follow the steps given below
1. Install Yahoo messenger,incase you don’t have it (go for the latest one which have voice support)
2. Sign into your yahoo messenger.
3. Configure your microphone and headset(don’t use speakers as it cause disturbances)
4. Inside your Yahoo messenger dial 18003733411 and press enter(as shown in figure).
5.Now a small window pops up like the one shown below.
6. An operator greets you with a recorded welcome message along with an advertisement and asks you to select one of the Free411 service.Just hear the services options until they say the last one as “Free Call”.When you hear this,don’t press any number on your keyboard and instead SAY “Free call” loudly on your microphone connected to your PC.
7. After this voice message is detected by their system ,they will run a short advertisement of their sponsor and make sure you don’t press any number at this time.
WAIT UNTIL YOU HEAR THIS MESSAGE “Please dial the phone number country code first,don’t forget to dial 1 for north america”
8. After you hear this message ,immediately dial the destination number of your choice along with the country code.(eg for north america it’s 1 and for india it’s 91)
9. Your call will get connected and you can talk for 7 minutes continuous for free.When it gets disconnected, repeat the same procedure again.You can make multiple and unlimited calls with this service.
It was never easy to make a free international call like this before.
So what’s the catch?
10. FREE411 service toll-free number is based in USA.This company gets paid for the advertisements from sponsors.
11. Are there any limits on the number of call which we can make?
No.There is no limit on the number of free calls which can be made through this system.
So enjoy this trick to make free international and local calls and make sure you don’t abuse the system.
Here is the list of codes with their Numbers.
[[111659588135]] = 1
[[102176039824199]] = 2
[[118083491542512]] = 3
[[344036656758]] = 4
[[117843884904684]] = 5
[[110894878924218]] = 6
[[485442320306]] = 7
[[124190004289231]] = 8
[[170053109680118]] = 9
[[144557425588042]] = 0
To create a numerical value of colourful number copy the codes of numbers and make sure to insert single space between the each numeric code. Here is the code for 143 you can try with this example...♦♦
[[111659588135]] [[344036656758]] [[118083491542512]]
enjoy ur colorfull chating !!
Bangalore: Scandals of any kind are sensational, whichever field they are in, and the field of technology has had its share of them. The most recent of scams in the dotcom world, involving Kim Schmitz, (also known as Kim Dotcom) -- the founder of Megaupload, caused ripples that reached far and wide especially because while Megaupload at its peak was estimated to be responsible for 4 percent of all internet traffic. Here are some of the most unforgettable scams of technology:
1. Kim Schmitz, a former hacker, was previously known to be responsible for insider trading, and selling stolen calling cards obtained from hackers. SOPA-PIPA protestors opposed the shut-down of the Megaupload site, citing censorship, but U.S. authorities contacted officials in New Zealand (where Schmitz was staying), in order to extradite him because he allegedly copied and distributed music, videos, and other copyrighted content without obtaining authorization, a “scheme” that earned him more than $175 million without authorization. Reuters reported sources claimed the German national had a luxurious lifestyle, stating the installation of underwater speakers and a custom ladder in a pool that contained imported spring water.
2. Bernard Ebbers, the founder of WordCom, the second largest long-distance phone in the United States in the year 2000, was found guilty of falsely inflating the company’s returns and stock-price, thus resulting in an $11 billion dollar accounting fraud and consequent plunge that was destructive to investors. He was convicted of conspiracy and securities fraud in 2005, when he was 65 years old, and received a 25 year sentence.
Data Source: Silicon India
1. Kim Schmitz, a former hacker, was previously known to be responsible for insider trading, and selling stolen calling cards obtained from hackers. SOPA-PIPA protestors opposed the shut-down of the Megaupload site, citing censorship, but U.S. authorities contacted officials in New Zealand (where Schmitz was staying), in order to extradite him because he allegedly copied and distributed music, videos, and other copyrighted content without obtaining authorization, a “scheme” that earned him more than $175 million without authorization. Reuters reported sources claimed the German national had a luxurious lifestyle, stating the installation of underwater speakers and a custom ladder in a pool that contained imported spring water.
2. Bernard Ebbers, the founder of WordCom, the second largest long-distance phone in the United States in the year 2000, was found guilty of falsely inflating the company’s returns and stock-price, thus resulting in an $11 billion dollar accounting fraud and consequent plunge that was destructive to investors. He was convicted of conspiracy and securities fraud in 2005, when he was 65 years old, and received a 25 year sentence.
Data Source: Silicon India
Washington: Doubling the amount of sunlight that a solar cell converts into electricity may be possible just by tweaking its tiny parts.
The technology can boost solar cell efficiency by a maximum of 45 percent, said Vladimir Mitin, professor of electrical engineering at the University at Buffalo who led the study.
He and his colleagues have shown that embedding charged quantum dots into photovoltaic cells can improve electrical output by enabling the cells to harvest infrared light, and by increasing the lifetime of photo-electrons.
The idea had been proposed 10 years ago but intensive efforts in this direction, until now, met with limited success, which the team from the university has overcome, the journal Nano Letters reports.
The team included Mitin, Andrei Sergeev and Nizami Vagidov, faculty members in electrical engineering department, besides Kitt Reinhardt of Air Force Office, nanofabrication expert Kimberly Sablon of US Army Research Lab, according to a statement.
Through the varsity's Office of Science, Technology Transfer and Economic Outreach (STOR), Mitin and colleagues have filed provisional patent applications to protect their technology.
"Clean technology will really benefit the region, the state, the country. With high-efficiency solar cells, consumers can save money and providers can have a smaller solar field that produces more energy," Mitin said.
Total Pageviews
Connect With Us
Recommend us on Google!
Popular Posts
-
Download Google Chrome 35.0.1916.114 Final - Google Chrome Software
-
Download HelpSmith 5.0.2 Build 14.624 - Advanced Software Help File
-
Download CyberLink Director Suite 2.0 - collection of photo and video editing tools
-
How to download youtube videos
-
GridinSoft Trojan Killer 2.2.3.9 Trojan removal software and deal with
-
Download Adobe Flash Player 13.0.0.214 Final - Adobe Flash Player
-
Download VSO Video Converter v1.4.0.4 - Convert Film and Video Software
-
Antenna Theory: Analysis and Design, 3rd Edition Constantine A. Balanis CD
-
Video Editing Software Womble MPEG Video Wizard DVD 5.0.1.110
-
CryptoExpert 8.35.14127.4572 software to protect files