VisitorZz
Facebook Fanpage
The growth of Facebook even surpised the founder Mark Zuckerburg. We know, facebook has become one of our favourite place to share and display our ideas. But the real facts behind this success social networking site is really amazing. According to Popular Identity Survey, Fb is the second largest ¨nation¨ by population. 6 out of 10 of youth are member in facebook. Let´s see the top 10 facts behind the working of facebook. 1. Facebook claims to have more than 800m active users: almost 13 times the population of the UK. Over half of those log in to the site every single day. 2. In March last year Facebook claimed it was deleting 20,000 profiles daily for infractions of its terms of service including inappropriate images, spam or suspected underage users (Facebook is only available to those who declare themselves to be over 13). 3. The average Facebook user has 130 friends and is connected to 80 community pages, groups or events. 4. There are more than 70 languages used on the website, and content was translated by 300,000 volunteer Facebook users using a specially created application. 5. More than 350m users access Facebook on mobile devices such as iPhones. 6. Facebook employs just over 3,000 staff at offices in Chicago, Dallas, Detroit, New York, Washington DC, Dublin, Hamburg, Hong Kong, Hyderabad, London, Madrid, Milan, Paris, Selangor, Singapore, Stockholm, Sydney, Tokyo and Toronto. 7. Facebook received $500,000 of investment in 2004, $12.7m in 2005 and $27.5m in 2006. 8. In October 2008 the company announced that the 10 billionth user photograph was uploaded. More than 250m new photos are currently being added to the site each day. 9. Around 4bn items are shared on Facebook daily. 10. It is estimated that Facebook saw revenue of $4.3bn last year, mostly from advertising, and profit of $850m. So,, i think,, before you do say or yell out to anyone that,, "" i spend 10 hours per day @ fb's mafia wars"" you would like or prefer to say,, "" yo yo homies,, i do know 10 fascinating facts of fb,,, don't you,,"" lmfao.... |
Free Opener is a very interested application for Windows users because it can be used to open 80+ file formats which means you don't have to install a new software to open a particular files. Download FreeOpener (Size 828kb) Click to Download Free Opener For any query or Frequently Asked Questions: See Post #17 Free Opener supports following file types. Code Files (.vb, .c, .cs, .java, .js, .php, .sql, .css, .aspx, .asp) Web Pages (.htm, .html) Photoshop Documents (.psd) Images (.bmp, .gif, .jpg, .jpeg, .png, .tif, .tiff) XML Files (.resx, .xml) PowerPoint® Presentations (.ppt, .pptx, .pps) Media (.avi, .flv, .mid, .mkv, .mp3, .mp4, .mpeg, .mpg, .mov, .wav, .wmv, .3gp, .flac) Microsoft® Word Documents (.doc, .docx) SRT Subtitles (.srt) RAW Images (.arw, .cf2, .cr2, .crw, .dng, .erf, .mef, .mrw, .nef, .orf, .pef, .raf, .raw, .sr2, .x3f) Icons (.ico) Open XML Paper (.xps) Torrent (.torrent) Flash Animation (.swf) Archives (.7z, .gz, .jar, .rar, .tar, .tgz, .zip) Rich Text Format (.rtf) Text Files (.bat, .cfg, .ini, .log, .reg, .txt) Apple Pages (.pages) Microsoft® Excel Documents (.xls, .xlsm, .xlsx) Comma-Delimited (.csv) Outlook Messages (.msg) PDF Documents (.pdf) vCard Files (.vcf) EML Files (.eml) Free Opener Features: Open and edit DOC/DOCX, XLS/XLSX, CSV files without installing Microsoft® Office. Watch video files including AVI, WMV, FLV, MPG, MOV and MP4 formats. Listen to any music or sound file: MP3, WMV, MID, WAV plus others! View, crop, re-size and print your image files: PNG, JPEG, BMP, GIF, TIFF, ICO, RAW and more! Plus open 80+ other file types quickly and easily for free.. Supported File Types Code Files (.vb, .c, .cs, .java, .js, .php, .sql, .css, .aspx, .asp) Web Pages (.htm, .html) Photoshop Documents (.psd) Images (.bmp, .gif, .jpg, .jpeg, .png, .tif, .tiff) XML Files (.resx, .xml) PowerPoint® Presentations (.ppt, .pptx, .pps) Media (.avi, .flv, .mid, .mkv, .mp3, .mp4, .mpeg, .mpg, .mov, .wav, .wmv, .3gp, .flac) Microsoft® Word Documents (.doc, .docx) SRT Subtitles (.srt) RAW Images (.arw, .cf2, .cr2, .crw, .dng, .erf, .mef, .mrw, .nef, .orf, .pef, .raf, .raw, .sr2, .x3f) Icons (.ico) Open XML Paper (.xps) Torrent (.torrent) Flash Animation (.swf) Archives (.7z, .gz, .jar, .rar, .tar, .tgz, .zip) Rich Text Format (.rtf) Text Files (.bat, .cfg, .ini, .log, .reg, .txt) Apple Pages (.pages) Microsoft® Excel Documents (.xls, .xlsm, .xlsx) Comma-Delimited (.csv) Outlook Messages (.msg) PDF Documents (.pdf) vCard Files (.vcf) EML Files (.eml) |
Notepad Secrets 1. Create a log Open Notepad On the very first line, type in“.LOG” (without quotes) then press Enter for a new line Now you can type in some text if you want, then save the file. Next time when you open thefile, notice its contents. Notepad automatically adds atime/date log every time you open the file. 2.Text becomes unreadable Open Notepad On the very first line, type in“dont eat the donut” (withoutquotes) then save and close the file. Note: the file should have only one line of the text above. Now, open the same file. You’ll notice the text becomes unreadable squares. (try this with different text with the same format and length). Paint Secrets 1. Create a trail image Open Paint, then open an image. Right-click on the image and select “Select All” Now hold the “Shift” key andmove the image around. The image will be drawn with trail. 2. 10x Zoom Open Paint, then open a smallimage. Select the zoom “Magnifier” tool. Windows Paint lists out the zoom options from 1x to 8x, but there is a 10x… After selecting the Magnifier tool, point the mouse right at the border line right under “8x” and left-click. There you go.. the hidden 10x. Other Secrets 1. Where is the relaxing music that you’ve heard during Windows XP Installation? The file is in: C:\Windows\system32\oobe\images\title.wma Game Secrets 1. Solitaire: Instant Win Press Alt + Shift + 2 to instantly win Solitaire: Draw only 1 card (instead of 3) Hold down Ctrl + Alt + Shift then click on unopen cards todraw. 2. FreeCell: Instant Win Hold down Ctrl + Shift + F10 while playing, then click Abort. Now move one card. FreeCell: Hidden Game Modes Go to “Game” menu choose “Select Game” Here you can choose from game mode 1 to 1,000,000. But -1 and -2 will also work (hidden modes) 3.Hearts: Show All Card Warning! this requires a modification on your registry.Be sure you follow the steps carefully. Damage your registry might damage your Windows. Open the “Registry Editor” by: “Start” >> “Run” then type “regedit” and press Enter Expand to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Hearts Right-click on the right panel and create a new String value with the name “ZB” Double-click to open this key “ZB” to edit its value. Then enter “42″ and close the Registry Editor. Start Hearts and Press Ctrl +Alt + Shift + F12 to show all the cards 4. Minesweeper: Stop The Timer When you start to play a newgame, the timer is ticking… Press Windows Key + D to show desktop. Now come back to the game by selecting it from the taskbar. The timer is stopped. 5. Pinball Unlimited Balls: Type bmax at a new game to get unlimited balls (no notification). Extra Balls: Type 1max at a new game to get extra balls. Gravity Well: Type gmax at anew game to activate GravityWell. Promotion: Type rmax at a new game or while playing to get instant promotion and raising rank. Extra points with partial shots: Partially shot the ball just to pass the yellow light bars. There are 6 bars. With the first bar, you’ll get 15,000 points, 2nd: 30,000,… Extra points with partial shots: Partially shot the ball just to pass the yellow light bars. There are 6 bars. With the first bar, you’ll get 15,000 points, 2nd: 30,000,… Test Mode: Type hidden test with a new ball or new game. Now you can use your mouseto drag and move the ball where you want |
Social networking websites like MySpace, Facebook, Twitter, and Windows Live Spaces are services people can use to connect with others to share information like photos, videos, and personal messages. As the popularity of these social sites grows, so do the risks of using them. Hackers, spammers, virus writers, identity thieves, and other criminals follow the traffic. Read these tips to help protect yourself when you use social networks. 1. Use caution when you click links that you receive in messages from your friends on your social website. Treat links in messages on these sites as you would links in email messages. (For more information, see Approach links in email with caution and Click Fraud: Cybercriminals want you to 'like' it.) 2. Know what you've posted about yourself. A common way that hackers break into financial or other accounts is by clicking the "Forgot your password?" link on the account login page. To break into your account, they search for the answers to your security questions, such as your birthday, home town, high school class, or mother's middle name. If the site allows, make up your own password questions, and don't draw them from material anyone could find with a quick search. For more information, see: 3. Don't trust that a message is really from who it says it's from. Hackers can break into accounts and send messages that look like they're from your friends, but aren't. If you suspect that a message is fraudulent, use an alternate method to contact your friend to find out. This includes invitations to join new social networks. For more information, see Scammers exploit Facebook friendships. 4. To avoid giving away email addresses of your friends, do not allow social networking services to scan your email address book. When you join a new social network, you might receive an offer to enter your email address and password to find out if your contacts are on the network. The site might use this information to send email messages to everyone in your contact list or even everyone you've ever sent an email message to with that email address. Social networking sites should explain that they're going to do this, but some do not. 5. Type the address of your social networking site directly into your browser or use your personal bookmarks. If you click a link to your site through email or another website, you might be entering your account name and password into a fake site where your personal information could be stolen. For more tips about how to avoid phishing scams, see Email and web scams: How to help protect yourself.
|
Paste the following link in the address bar of your browse & in place of 'http://mediastar91.tk" type ur url which is to be shortened and hit enter & shortened url will be shown up in the browser after short while
"http://api.adf.ly/api.php?key=f0f5c4636ed34b4cea75de2e4b2eb701&uid=932685&advert_type=int&domain=adf.ly&url=http://mediastar91.tk"
"http://api.adf.ly/api.php?key=f0f5c4636ed34b4cea75de2e4b2eb701&uid=932685&advert_type=int&domain=adf.ly&url=http://mediastar91.tk"
Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing. 1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer. 2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance. 3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives. 4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system. The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for. Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it. Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button. |
6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete. 7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files. 8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel. 9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear. 10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page. 11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.
|
Sometimes we delete the files permanently, and realize that deleting them is like a Blunder... For all those folks, Here is the solution Software called "Kissass Undelete" , can bring those files from the hard disk or your flash drive. Conditions : Only if the data on that drive is not re-occupied(or written). that means the space which was available after the deletion is not been occupied after the deletion. Download Kickassundelete Click Here to download from sourceforge.net . 1) To start searching for the files, Select the drive from the Left panel of the Windows and Click the scan button. the Scan might take upto 10 secs. 2) When the files search has been completed, it will show you the results with the name, typ, size and the last modified date of the searched file. 3) Now you can select the file to be recover. This is an Open source application and available for All Windows OS(Windows XP/Vista/ 7). |
1. Google
google logo font
Google logo uses the Catull font, Catull font has has a calligraphic feel with contrasting stroke weights and distinctive serifs. It is an eye-catching choice for both text and display applications.
2. facebook
facebook logo font
FaceBook logo uses the customized version of Klavika font. Klavika is a flexible family of sans serifs used for editorial and identity design.
3. YouTube
youtube logo font
YouTube logo uses Aleternate Gothic font, Alternate Gothic font is a straight diagonal font, it contains a set of three condensed sanserifs fonts.
4. YAHOO!
yahoo logo font
Yahoo logo uses its own custom designed font, Daniel Gauthier created the font similar to Yahoo's and made it available at DaFont.
5. WIKIPEDIA
wikpedia logo font
Wikipedia logo uses Hoefler Text font, Hoeflter Text is a contemporary serif Antiqua font and was first designed for Apple Computer to demonstrate advanced type technologies.
6. Blogger
blogger logo font
Blogger logo uses the FF Info Display font, FF Info Dispaly font was designed for the signage at Dusseldorf Airport.
7. Windows Live
windows live logo font
Windows Live logo uses the simple Arial font, a contemporary sans serif font. Nothing Designer or unique out here.
8. twitter
twitter logo font
Twitter logo uses the modified version of Pico Alphabet Font, Pico Alphabet can be downloaded and used without any license.
9. LinkedIn
linkedin logo font
LinkedIn logo uses Myriad Pro font, Myriad is a popular font for both text and display composition.
10. Amazon
amazon logo font
Amazon logo uses the ITC Officiana Sans font, ITC Officiana font was designed for office correspondence and business documentation.
11. WordPress
wordpress logo font
WordPress logo uses Mrs Eaves font, Mrs Eaves is a transitional serif font named after Sarah Eaves.
12. eBay
ebay logo font
eBay logo uses Adobe Univers font, Univers font is similar to contemporary and Helvetica fonts.
13. Bing
bing logo font
Bing logo uses combination of ITC Bauhaus and ITC Kabel fonts.
If u find it usefull Do comment
Thanks for reading!!!...
google logo font
Google logo uses the Catull font, Catull font has has a calligraphic feel with contrasting stroke weights and distinctive serifs. It is an eye-catching choice for both text and display applications.
2. facebook
facebook logo font
FaceBook logo uses the customized version of Klavika font. Klavika is a flexible family of sans serifs used for editorial and identity design.
3. YouTube
youtube logo font
YouTube logo uses Aleternate Gothic font, Alternate Gothic font is a straight diagonal font, it contains a set of three condensed sanserifs fonts.
4. YAHOO!
yahoo logo font
Yahoo logo uses its own custom designed font, Daniel Gauthier created the font similar to Yahoo's and made it available at DaFont.
5. WIKIPEDIA
wikpedia logo font
Wikipedia logo uses Hoefler Text font, Hoeflter Text is a contemporary serif Antiqua font and was first designed for Apple Computer to demonstrate advanced type technologies.
6. Blogger
blogger logo font
Blogger logo uses the FF Info Display font, FF Info Dispaly font was designed for the signage at Dusseldorf Airport.
7. Windows Live
windows live logo font
Windows Live logo uses the simple Arial font, a contemporary sans serif font. Nothing Designer or unique out here.
8. twitter
twitter logo font
Twitter logo uses the modified version of Pico Alphabet Font, Pico Alphabet can be downloaded and used without any license.
9. LinkedIn
linkedin logo font
LinkedIn logo uses Myriad Pro font, Myriad is a popular font for both text and display composition.
10. Amazon
amazon logo font
Amazon logo uses the ITC Officiana Sans font, ITC Officiana font was designed for office correspondence and business documentation.
11. WordPress
wordpress logo font
WordPress logo uses Mrs Eaves font, Mrs Eaves is a transitional serif font named after Sarah Eaves.
12. eBay
ebay logo font
eBay logo uses Adobe Univers font, Univers font is similar to contemporary and Helvetica fonts.
13. Bing
bing logo font
Bing logo uses combination of ITC Bauhaus and ITC Kabel fonts.
If u find it usefull Do comment
Thanks for reading!!!...
Technology is a growing worm! it never ends until human race ends. Each day a new thing is invented or created, when it comes to mobile phones every year many upgraded mobile phones comes into market and the outdated phones goes into trash. In America each one alone averaging a new mobile phone purchase or getting new free cell phones at least once in anytwo-year (or less) period of time. Reports said that every year 85% of the mobile phones are thrown in Trash!! Reasons: 1) Cell phones are potentially hazardous waste because they contain lead, mercury, cadmium and arsenic. If thrown in the trash and sent to landfills,environmental contamination can occur from combustion and leaching into soil and groundwater. But when it is recycled , the metals can be put back into circulation, decreasing the need for new metal mining. 2) Some mobile phones also contain a number of materials that can be beneficial to preserve. These materials can include gold, silver, copper, palladium, and a variety of plastics, all ofwhich are valuable materials. Again, throwing your old mobile phones away will lose these materials and require theconsumption of more of them in the future, rather than allowing them to be re-used through recycling. 3) You may not known this but most mobile recycling services actually do a lot more than simply extracting the useful rare earth elements and often re-use functioning, but merely outdated,reducing the need for additional production of newer products 4) Many (myself included) advice to recycle old mobile phones because it helps in obtaining some metals, helps earth by contaminating and also other purposes. 5) By selling them in return you get cash!! and proudness to be an Earth protector. How your mobile phone getsRecycled?? Most phones will be refurbished and re-sold this is the least carbon-intensiveand inexpensive way to recycle phones.If the phone is too old or damaged it can be dismantled and the rare earth metals used in its construction recycled, re-smelted and re-used |
If u find it usefull Do comment
Thanks for reading!!!...
Thanks for reading!!!...
HELLO FRIENDS TODAY i AM GOING TO SHARE THREE WAYS OF FORMATTING AN INFECTED PENDRIVE/VIRUS
WHICH WE ARE UNABLE TO FORMAT DIRECTLY....MAYBE THE FIRST ONE MAY NOT WORK BUT THE SECOND WAY WILL WORK 100%....SO CHECK THEM OUT...
1. PRESS WINDOWS KEY AND GO TO RUN
TYPE cmd AND PRESS ENTER
NOW IN THE DOS WINDOW(BLACK SCREEN) TYPE THE FOLLOWING
"FORMAT F "(here F is the drive letter of my pen drive/memory card and write without quotes)
2. IF THE ABOVE METHOD DOES NOT WORK TRY THIS OUT ..
THIS WILL OBVIOUSLY WORK..
PRESS WINDOWS KEY AND GO TO RUN
TYPE cmd AND PRESS ENTER
NOW IN THE DOS WINDOW(BLACK SCREEN) TYPE THE FOLLOWING
"FORMAT X: /FS:FAT32 /Q /V: PenDrive" (here x is the drive letter of my pen drive/memory card..and write without quotes AND DO NOT GIVE SPACE BETWEEN "V: AND PENDRIVE" HERE I GIVED SPACE BECAUSE IT WAS TURNING INTO A SMILEY)
3. Use a Linux Box
Other solution to the infected pen drive is view the contents of pen drive using a Linux System. As most of the viruses affect Windows PC’s, it is very unlikely that pen drive virus may be effective on any Linux system. When you’
ll view the contents of infected pen drive from Linux Box, you’ll be able to spot the virus and delete it permanently
i.e you can format it in a computer having ubuntu or some other linux based operating system..
HOPE THIS HELPS ALL OF YOU....
If u find it usefull Do comment
Thanks for reading!!!...
WHICH WE ARE UNABLE TO FORMAT DIRECTLY....MAYBE THE FIRST ONE MAY NOT WORK BUT THE SECOND WAY WILL WORK 100%....SO CHECK THEM OUT...
1. PRESS WINDOWS KEY AND GO TO RUN
TYPE cmd AND PRESS ENTER
NOW IN THE DOS WINDOW(BLACK SCREEN) TYPE THE FOLLOWING
"FORMAT F "(here F is the drive letter of my pen drive/memory card and write without quotes)
2. IF THE ABOVE METHOD DOES NOT WORK TRY THIS OUT ..
THIS WILL OBVIOUSLY WORK..
PRESS WINDOWS KEY AND GO TO RUN
TYPE cmd AND PRESS ENTER
NOW IN THE DOS WINDOW(BLACK SCREEN) TYPE THE FOLLOWING
"FORMAT X: /FS:FAT32 /Q /V: PenDrive" (here x is the drive letter of my pen drive/memory card..and write without quotes AND DO NOT GIVE SPACE BETWEEN "V: AND PENDRIVE" HERE I GIVED SPACE BECAUSE IT WAS TURNING INTO A SMILEY)
3. Use a Linux Box
Other solution to the infected pen drive is view the contents of pen drive using a Linux System. As most of the viruses affect Windows PC’s, it is very unlikely that pen drive virus may be effective on any Linux system. When you’
ll view the contents of infected pen drive from Linux Box, you’ll be able to spot the virus and delete it permanently
i.e you can format it in a computer having ubuntu or some other linux based operating system..
HOPE THIS HELPS ALL OF YOU....
If u find it usefull Do comment
Thanks for reading!!!...
Here are the tips and tricks to protect yourself from the keyloggers 1.Enable Your Firewall:- Firewalls donot stop the keyloggers from entering into your PC But hey can help in stopping the keyloggers from sending your information.It is always recommended that you install a good firewall software toprotect your computer from unauthorized access. 2. Use Good Antivirus Software And Avoid Downloading crackedSoftwares :- Use good antivirus softwares likeNorton.They certainly provide a lot of protection against keylogger.Using a special Antispyware program also helps.And avoid downloading softwares which have been cracked.Also avoid using torrentsas much as you can because torrents is the hub of viruses andhome of hackers. :Now Will Discuss How to Fool Keyloggers If you believe that their is a keylogger in your system then you can do the following things to protect yourself 1.Instead of typing your username and password using your keyboard type it using On Screen Keyboard.On Windows Platform it can be opened By typing osk in run. 2.Type 2-3 random characters inyour password field and then select it using your mouse,Now type your real password.This will add the random characters in front of the password recorded by keylogger and the keylogger is fooled by you for sending wrong password. |
Trick to hide files and folders using Command Prompt
The most important thing is that, once hidden with this method, the files/folders cannot be viewed by any search options even if you click "Show All Hidden Files and Folders".
Hiding the most wanted files and folders is very important nowadays and it's really a tedious job too. In order to make this tedious job an easy one, i'm going to deliver you a the trick now.
For Example: You have a folder named "collegephotos" and this folder is stored in (Disk Drive E). You think that it should not be seen by strangers who use your PC.
For that you need to follow the following instructions
Press windowkey+R: Run command dialog box appears.
Now type "cmd" and hit enter. A command prompt window displays.
Now type "attrib +s +h E:\collegephotos" and hit enter.
The folder "collegephotos" will be hidden (Note: It cannot be viewed by any search options)
(To view this folder again, use the same command but replace '+' with '-' on both flags 's' and 'h').
The most important thing is that, once hidden with this method, the files/folders cannot be viewed by any search options even if you click "Show All Hidden Files and Folders".
Hiding the most wanted files and folders is very important nowadays and it's really a tedious job too. In order to make this tedious job an easy one, i'm going to deliver you a the trick now.
For Example: You have a folder named "collegephotos" and this folder is stored in (Disk Drive E). You think that it should not be seen by strangers who use your PC.
For that you need to follow the following instructions
Press windowkey+R: Run command dialog box appears.
Now type "cmd" and hit enter. A command prompt window displays.
Now type "attrib +s +h E:\collegephotos" and hit enter.
The folder "collegephotos" will be hidden (Note: It cannot be viewed by any search options)
(To view this folder again, use the same command but replace '+' with '-' on both flags 's' and 'h').
Gmail is really famous among users of all the email clients available on the web and that is not because it has a cool interface rather it is famous for its reliability and huge space which includes storage space of 6000 megabytes and increasing. Google doesn’t stop here and recently Google announced that users can now buy more online storage for Google services just by paying a little amount. So why not use this online storage space and use it externally probably as a network drive or one of your own computer hard drives. Use Google Storage Space as Google Drive I am going to show different methods by which your can use your Gmail account space as your external hard drive that too free. You will be able to download (or should I say copy) attachments from your Gmail account to your computer just as you would do from a drive on your computer. You can also use this space to upload content direct from your computer and save it online in your Gmail account. 1. GMAIL DRIVE GMail Drive is a Shell Namespace Extension that creates a virtual filesystem around your Google Mail account, allowing you to use Gmail as a storage medium. GMail Drive creates a virtual filesystem on top of your Google Gmail account and enables you to save and retrieve files stored on your Gmail account directly from inside Windows Explorer. GMail Drive literally adds a new drive to your computer under the My Computer folder, where you can create new folders, copy and drag’n'drop files to. With GMail Drive you can easily copy files to your Google Mail Account and retrieve them again. When you create a new file using GMail Drive, it generates an e-mail and posts it to your account. The e-mail appears in your normal Inbox folder, and the file is attached as an e-mail attachment. GMail Drive periodically checks your mail account (using the Gmail search function) to see if new files have arrived and to rebuild the directory structures. But basically GMail Drive acts as any other hard-drive installed on your computer. You can copy files to and from the GMail Drive folder simply by using drag’n'drop like you’re used to with the normal Explorer folders. Because the Gmail files will clutter up your Inbox folder, you may wish to create a filter in Gmail to automatically move the files (prefixed with the GMAILFS letters in the subject) to your archived mail folder. Please note that GMail Drive is still an experimental tool. There’s still a number of limitations of the file-system (such as total filename size must be less than 65 characters). Since the tool hooks up with the free Gmail Service provided by Google, changes in the Gmail system may break the tool’s ability to function. I cannot guarantee that files stored in this manner will be accessible in the future. new type of file sharing utility. Unlike typical file servers (say xDrive) it uses Gmail as backend file server. You can enjoy it simply by hosting a small PHP script in your web site without any database. Gmail file space is more than 2GB, so you can imagine you already have such a big space on internet. However, you will require a Gmail account (If you don’t have any Gmail address, go GmailSwap or ask your friends.). PGD automatically connects Gmail server and fetches list of all attached files and generate downloadable links in a tree like view. * Successfully connects to Gmail and only grabs list of Attachments in Gmail messages. * List of attachments are displayed with inbuilt Javascript engine. You can customize output to any other formats. * 100% compliant to GMAILFS. So you can upload with Windows Gmail Shell extension or Linux GmailFS utilities.. * Supports Multiple Gmail accounts in the same script . * Supports all browsers. * Total size is less than 100 KB. |
Tricks and secret tips for Nokia cellphone Secret tricks for Nokia mobile orcell phone To check the phones Software revision for Nokia Mobile. On the main screen type*#92702689# [*#war0anty#] It will take you to a secret menuwhere you may find some of the information below: 1. Displays Serial Number. 2. Displays the Month and Year of Manufacture 3. Displays (if there) the date where the phone was purchased(MMYY) 4. Displays the date of the last repair - if found (0000) 5. Shows life timer of phone (time passes since last start) To restore Factory Settings for Nokia mobile *#7780# reset to factory settings. Taking picture without getting noticed. Turn on/off the "click" sound made by the camera by selecting the 'Silent' profile or by turning warning tones on/off. Hiding your Mobile/ Cell phone Number Go to: Menu > Tools > Settings >Call > Send My Caller ID > 'Yes', 'No' or 'Set By Network' tofollow the default settings of your home network. It works only with very few network who provide you facilityof “Private Number” Speed Dialing From Simcard contact (not stored in mobile phonebook) Type number followed by # then call. Example: 1# or 2# or 21# like u can do Change closed caller grou p (settings >security settings>user groups) to 00000 and your phone will sound the message tone when you are near a radar speed trap. Setting it to 500 will cause your phone 2 set off security alarms atshop exits. Try this secret trick if you can handle the unexpected. Note: This secret trick wont workwith all phones Models. THE REBOOT TRICK This should work on all software versions of the 6110. 1. Go to the Calendar (Menu-8) 2. Make a note or reminder. 3. Enter some text into the edit box. 4. Hold "Clear" until the whole text is cleared, then press "Back". 5. Press "0". The main screen will now be showing but a space appears on the screen. (you can'tsee it) 6. Enter 4 digits (e.g. 1234). 7. Use the down arrow to move the cursor to the left side of the numbers and the space (Down arrow twice). 8. Now enter 6 digits and press the call button. Wait for a few seconds, the screen should start to flash and reboots. It should also work on other menus like the "Profiles" menu. THE JAMES BOND TRICK If you short-circuit the left middleand right pins on the bottom of the phone with all connections touching each other, the Nokia software hangs! The profile"Headset" will be activated. Before you do this just activate the "Automatic Answer" in the headset profile and set the ringing volume to "Mute". Now you can use your phone for checking out what people are talking about in a room. Just place it under a table in a room and call it. The phone receives the call without ringing and you can listen to what people are saying. NETWORK MONITOR There is a hidden menu inside your Nokia phone. If you want toactivate it, you'll have to re-program some chips inside of your phone. 1. Check your software version.You can only continue if you havev4.33, v4.73 or v5.24. 2. Take apart the phone. 3. De-solder the EEPROM (ATMEL AT 24C64). 4. Read out the data with an EEPROM programmer and save it to a file (Backup). 5. If you have v.33 or v4.73, change the address "03B8" from"00" to "FF". 6. If you have v5.24 then changes the address "0378" from "00" to "FF". 7. Write the new data to the EEPROM and solder it back to the phone, 8. Power on your phone and you should have "Net monitor" enabled. |
Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc
You can get it back:
You can get it back:
Click Start then Run and type "gpedit.msc" without quotes. This opens the group policy editor.
Then go to:
--> Local Computer Policy
--> Computer Configuration
--> Administrative Templates
--> Network
--> QOS Packet Scheduler
--> Limit Reservable Bandwidth.
Double click on Limit Reservable bandwidth.
It will say it is not configured, but the truth is under the 'Explain' tab i.e." By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.It works on Windows XP & Win 2000 as well.
Then go to:
--> Local Computer Policy
--> Computer Configuration
--> Administrative Templates
--> Network
--> QOS Packet Scheduler
--> Limit Reservable Bandwidth.
Double click on Limit Reservable bandwidth.
It will say it is not configured, but the truth is under the 'Explain' tab i.e." By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.It works on Windows XP & Win 2000 as well.
There is a small object that we daily use for transfer important data for here to there, viceversa. Do any one think that how this small object get famous with time going, ya answer is no one but now a day's it used freequently. Friend, now am decide to give you little introduce with this famous object called pendrive.
Easily accessible and common for all, the pen drives make wonderful accessories as computer hardware and have many advantages for their use but no one hope that this tiny device famous rapidly.
After the advent of pen drive it has been more easier to carry files around in an easy and flexible manner. Even the latest DVD players, Over head projectors are supporting an USB port. This technology has almost all revolutionized the tech world from low capacity floppy dives to a simple plug and play 256 GB drives. Some of its interesting facts are given below Know them and share with your friends.
-World’s first Pen drive was called as Thumb drive and it was manufactured by Trek in the year 2000.
-Trek Technology, Netac Technology, M-Systems and Phison Electronics were the four companies which were claiming to be the inventors of USB drives. But both Trek and Netacwon were able to get patents for USB drives.
-Commercially Trek technology and IBM were the first sellers of USB in the market. Trek called it thumb drive where as IBM called it DiskOnKey.
-DiskOnKey was manufactured by M-Systems and they were released into market on 15th December 2000.
-There are three generations for pen drives 2.0 is the most sucessfull era but now 3.0 has already taken its root with still faster read and write speeds.
-Nowadays Pen drives are also being designed for iPads and iPhones too. AirStash is the first usb flash drive for ipad and iphone.
-4GB pen drives were the most sold memory capacity of all times. Even most number of models are being manufactured in 4GB.
-Commercially Trek technology and IBM were the first sellers of USB in the market. Trek called it thumb drive where as IBM called it DiskOnKey.
-DiskOnKey was manufactured by M-Systems and they were released into market on 15th December 2000.
-There are three generations for pen drives 2.0 is the most sucessfull era but now 3.0 has already taken its root with still faster read and write speeds.
-Nowadays Pen drives are also being designed for iPads and iPhones too. AirStash is the first usb flash drive for ipad and iphone.
-4GB pen drives were the most sold memory capacity of all times. Even most number of models are being manufactured in 4GB.
Below is a list of some pen drives which had made some unique stand among most number of models released.
World’s Smallest Pen drive:
EagleTec USB Nano Flash Drive
Manufacturer: EagleTec
Dimensions: This Pen drive is 19 x 15 x 6mm (approx.)
EagleTec USB Nano Flash Drive
World’s Most expensive Pen drive:
White Lake USB Memory Golden Stick
Manufacturer: White Lake
Cost: US$ 3,550
Specifications: This Pen drive is made up of 14 carat gold with 5 diamonds embedded in it.
White Lake USB Memory Golden Stick
World's Largest capacity Pen Drive:
DataTraveler USB Flash Drive
Manufacturer: Kingston Technology
Capacity: 256 GB
DataTraveler USB Flash Drive
World’s fastest (USB 2.0) Pen drive:
Corsair Flash Voyager GT
Manufacturer: Corsair
Read Write Speed: Up to 30MB/s read, and 16MB/s write
Corsair Flash Voyager GT
Worlds fastest and Smallest USB 3.0 Pen drive:
Intelligent Drive U819V
Manufacturer: PQI
Speed: 5 Gbps/sec
Intelligent Drive U819V
World’s Light weight and thinnest pen drive:
MoserBaer super-slim USB flash drive
Manufacturer: MoserBaer
Dimensions: 29.4 x 12.4 x 2.3mm
Weight: 1.3g
MoserBaer super-slim USB flash drive
Pen Drive with Highest Number of years as Warranty:
Corsair Flash Voyager
Manufacturer: Corsair
Warranty: 10 Years
Corsair Flash Voyager
Their are few companies which even give life time warranty but the above mentioned company gives a printed number for years of warranty. so amazing isn't it to know few of the facts of pen drives. If you feel I have missed any thing or if you know any interesting facts about pen drives just share it with ignouist for you | open source as your valuable comment.
Total Pageviews
Connect With Us
Recommend us on Google!
Popular Posts
-
Download Google Chrome 35.0.1916.114 Final - Google Chrome Software
-
Download HelpSmith 5.0.2 Build 14.624 - Advanced Software Help File
-
Download CyberLink Director Suite 2.0 - collection of photo and video editing tools
-
GridinSoft Trojan Killer 2.2.3.9 Trojan removal software and deal with
-
Download Adobe Flash Player 13.0.0.214 Final - Adobe Flash Player
-
Download VSO Video Converter v1.4.0.4 - Convert Film and Video Software
-
CryptoExpert 8.35.14127.4572 software to protect files
-
Video Editing Software Womble MPEG Video Wizard DVD 5.0.1.110
-
Antenna Theory: Analysis and Design, 3rd Edition Constantine A. Balanis CD
-
[Others] LIST OF FREE SMS SITES