background

Blazing Fast Full Premium Downloads

Enjoy whole new world of Softwares. Use Premium Features without purchasing One.

@Mediastar91 . Powered by Blogger.

Mediastar91

  • Home
  • Follow
    • Find us on Facebook
    • +1 us on Google+
    • Pin us on PinInterest
  • Contact me
    • Contact us
  • Download Google Chrome 35
  • Download CyberLink Director Suite 2.0

    VisitorZz


    Facebook Fanpage

    Showing posts with label pc tips and tricks. Show all posts



    Mediafire download

    How to stop aplications getting started during phone Boot?

    In c:/system/ there is a folder named "recogs", this folder contains.mdl files will act as a shortcut to the actual application. During system startup all these mdl files will be read and started up. If you edit this file to point to nonexisting file then the application wont startup again. Don't delete the files as they will be recreated next time you open the application manually.

    10 reasons why PCs crash U must Know

    Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

    You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

    1 Hardware conflict

    The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

    For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

    If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

    * Start-Settings-Control Panel-System-Device Manager.

    Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

    Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

    Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

    When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

    To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

    2 Bad Ram

    Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

    But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

    One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

    Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

    EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.


    3 BIOS settings

    Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

    Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

    A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

    Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

    4 Hard disk drives

    After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

    * Start-Programs-Accessories-System Tools-Disk Defragmenter

    This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

    The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

    Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

    * Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

    Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

    Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

    * Start-Programs-Accessories-System Tools-ScanDisk

    Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

    5 Fatal OE exceptions and VXD errors

    Fatal OE exception errors and VXD errors are often caused by video card problems.

    These can often be resolved easily by reducing the resolution of the video display. Go to

    * Start-Settings-Control Panel-Display-Settings

    Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

    If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

    * Start-Settings-Control Panel-System-Device Manager

    Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

    If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

    The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

    Another useful way to resolve video problems is to go to

    * Start-Settings-Control Panel-System-Performance-Graphics

    Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

    Look up your video card's manufacturer on the internet and search for the most recent drivers for it.


    6 Viruses

    Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

    * Start-Settings-Control Panel-Add/Remove Programs

    Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

    A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

    An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

    7 Printers

    The action of sending a document to print creates a bigger file, often called a postscript file.

    Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

    If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.
     
    8 Software

    A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

    The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

    Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

    Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

    Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

    Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

    Remember to restore all the BIOS settings back to their former settings following installation.

    9 Overheating

    Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

    One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

    CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

    10 Power supply problems

    With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

    If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

    It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.
    Anyone who says the Consumer Electronics Show is waning hasn't been packed like a sardine waiting for the Central Hall doors to open at LasVegas Convention Center on the first day of CES.Despite the absence of electronics market leaders like Apple, and the imminent exit of PC heavy hitter Microsoft, CES is still going incredibly strong with more than 2,700 exhibitors in over 1.8 million square feet of space.
    From giant multi-level booths with built-in coffee bars in the LVCC to stand-alone tables in hotel suites up the strip, there are a lot of products on display here at CES. More than we care to count, and many of which we'll have trouble remembering in June. What really matters are the ones we know will help set the tone for the industry in the coming 12 months. If you want to read all that we've written aboutthe show this week, check out our CES page , or allow us to cut through all the noise and break it down for you right here with the best products we've seen at CES.


    BEST TABLET

    Winner: Asus Eee Pad Transformer Prime TF700

    The best tablet at CES is one I've never actually touched. But Asus's Eee Pad Transformer Prime is currently the best Android tablet available, with its quad-core processor, laptop attachment, and now Android 4.0. Plenty of other Android 4.0 tablets are cropping up here at CES, but so far none of them are quite as elegant and well-built as the Transformer Prime. So the new Transformer Prime just announced—which is essentially the existing model, but with a stunningly high-res 1080p screen—is going to remain the benchmark by which other Android tablets are measured. –Sascha Segan
    Runner Up: Ainovo Novo 7 Basic   
    BEST SMARTPHONE

    Winner: AT&T Nokia Lumia 900
    Now this is what we were waiting for. Nokia finally shows off its first high-end Windows Phone 7 device, as the preceding Nokia Lumia 710 was too budget-oriented to inspire much buzz. The LTE-equipped Lumia 900 packs an 8-megapixel camera, Carl Zeiss optics, and a 4.3-inch AMOLED Clear Black display. As part of Microsoft's last CES keynote, the powerful Lumia 900 may be a fitting sendoff and just what the Windows Phone platform needs. –Jamie Lendino
    Runner Up: LG Spectrum


    BEST ULTRABOOK

    Winner: IdeaPad Yoga
    Home to half a dozen Cirque du Soleil shows, Vegas is no stranger to acrobatic contortions, but CES has never seen anything quite like Lenovo's 3.1-pound, touch-screen ultrabook that flips and folds into a tablet and easel. –Eric Grevstad
    Runner Up: Samsung Series 9
    BEST LAPTOP

    Winner: Samsung Series 7 Gamer
    Samsung's first dedicated gaming laptop, the Series 7 Gamer packs an Intel Ivy Bridge Core i7processor and an Nvidia GTX 675 graphics chip. The standout feature: You can alternate between four different performance modes viaa physical switch, so your PC performs to fit your needs whether you're studying at the library or about to hop on for a round of Team Deathmatch in Call of Duty. –Natalie Shoemaker


    BEST DESKTOP

    Winner: Lenovo IdeaCentre A720
    The Lenovo IdeaCentre A720 is a clear indication of where the all-in-one desktop PC is going: ten-finger multi-touch screen, large 27-inch display, and that articulated hinge that lets the screen lie flat or tilt through a wide range of angles. There are times when you'll want to sit down to actually do work rather than just surfing the Internet. You can look up quick info and news on a tablet or smartphone, but sometimes you need a real physical keyboard, mouse, and some undivided attentionto write a manuscript, edit some blueprints, or retouch a photo. That's when you should put down the tablet and use a desktop the get real work done. The IdeaCentre A720 has innovative design, well-thought out ergonomics, and a full feature list to help you finish the job at hand. –Joel Santo Domingo
    Runner Up: HPE h9 Phoenix
    Edited by mjb at 15-1-2012 19:45

    BEST HDTV
    Sony

    Tie: Yet-To-Be-Named 55-inch Samsung and LG OLED HDTVs and Sony's Crystal LED
    These winners are less actual televisions you can buy today, and more signs that we're going to see some changes in HDTVs in the near future. For a few years, OLED displays have promised as the next big step in flat-panel displays. But we haven't seen much progress in organic LEDs outside of small devices like smartphones. Now, Samsung and LG have both unveiled OLED HDTVs with big 55-inch, 3D displays. And Sony's new 55inch Crystal LED panel doesn't use OLED but works in a similar way, with similarly impressive results.
    These aren't game-changing technologies, but like LED-backlit LCDs, they could become the next step in making our HDTVs smaller, lighter, brighter, darker, more colorful, and more environmentally friendly. –Will Greenwald


    BEST HOME THEATER/AUDIO PRODUCT

    Winner: Google TV
    The winner for best home theater gear at CES this year isn't a Blu-ray player or a set-top box. It's a little piece of software you might have heard of called Google TV, but you might have also assumed it was dead . It's seeing a huge launch here at CES. In fact, it's the launch Google TV should have seen here last year.
    Instead of a tepid three products from two companies, four manufacturers have come out with entire lines of Google TV products here at the show. Vizio and LG's high-end smart TVs willuse Google TV, along with Vizio and Sony's new set-top boxes and Blu-ray players. Samsung willget into Google TV, though it hasn't announced specific products yet.
    The smart TV landscape has been fractured, with every major company using its own app ecosystem. With actual support from multiple HDTV manufacturers, Google TV could become the unifying system for connected HDTVs. –WG
    Runner Up: Klipsch Console


    BEST DIGITAL CAMERA

    Winner: Fujifilm X-Pro1
    Even though the Nikon D4 is the most technically impressive—and most expensive—camera to debut here at CES, it's not the best.For my money, that is the Fujifilm X-Pro1, a mirrorless interchangeable lens camera that, from the front, looks like a 1970s-era rangefinder. The 16-megapixel shooter uses a new sensor design that eliminates the low-passfilter, promising to deliver more natural imagesthat don't skimp on sharpness—and don't exhibit moiré patterns.
    The X-Pro1 takes it cues from other mirrorless designs, including the retro-styled Olympus PEN series that ushered in this new digital camera class. But it manages to squeeze an APS-C sensor into its body, which is larger than that ofa Micro Four Thirds camera. It also has a uniqueoptical/electronic hybrid viewfinder, similar to that found on the fixed-lens Fujifilm X100. –JimFisher
    Runner Up: Nikon D4

    BEST GAMING GEAR


    Winner: Razer Project Fiona
    Razer's new gaming tablet is nothing like anything you've seen before. Instead of Android or another tablet OS, Project Fiona run Windows 7, with a Razer shell that incorporates a game library and a touch interface. On either side of the tablet sit hardware controls modeled after the Razer Hydra motion control system. It won't be cheap—Razer is thinking$1,000 if and when it hits the market—but it could easily be the first real example of hardcore gaming in a tablet form factor. –WG
    Runner Up: Razer Naga Hex Gaming Mouse


    BEST PRINTER

    Winner: MakerBot Replicator
    MakerBot Industries has been the most visible face of the personal 3D printing movement; its Thing-O-Matic printer has introduced both geeks and the public (through appearances on shows like The Colbert Report) to the technology of printing physical objects. The MakerBot Replicator can print larger objects than the Thing-O-Matic, up to the size of a loaf of bread. The two-nozzled (dual extruder) version of the Replicator is capable of printing objects in two colors using ABS and/or PLA plastics.
    Priced at $1,749 for the single-extruder model and $1,999 for the dual-extruder version, the MakerBot Replicator comes fully assembled andready within minutes to start printing. At that price it will appeal more to hobbyists than typical households, but its ability to print larger objects, and in different color combinations, has the potential to entice a new wave of experimenters into trying their hands at personalized manufacturing. –Tony Hoffman


    BEST PROJECTOR


    Winner: FAVI A3-WiFi Pico Projector
    Projector makers have been expanding the capabilities of pocket-sized projectors, but the FAVI A3-WiFi goes further. Not only does this pico projector integrate Wi-Fi, it runs Android, uses Google Chrome as a browser, and has a built-in touchpad.
    The FAVI A3 WiFi has a native SVGA resolution (800-by-600 pixels), 8GB of built-in memory, and a SD/SDHC/MMC card reader. Its lithium ion battery lasts for up to one hour between charges, and it has a built-in speaker, plus a USB port lets you connect the A3-WiFi to USB keyboards and mice. The projector can act as a personal media player, and be used for watching online videos or picture slide shows, playing music, displaying eBooks, Web browsing, and playing content from the internalmemory or online.
    We've seen cameras, smartphones, and other devices that incorporate projectors. The FAVI A3-WiFi starts with the projector and integrates other functions. It may not have the convenience of a laptop, but, at up to 100 inches, the image it displays is a lot larger. –TH
    BEST NETWORKING PRODUCT


    Winner: Netgear Media Storage Router with Integrated 2TB Hard Drive (WNDR4700)
    Netgear's Media Storage Router with Integrated2TB Hard Drive is getting a lot of play at CES because when it comes to market, it will be only one of two dual-band wireless routers available that are also full SATA disk drive NAS solutions. The other? Apple's Time Capsule.
    Many higher-end routers offer some NAS functionality by including a USB port on the router's chassis for connecting external USB storage devices. However, using USB drives connected to routers for shared network storage is slow in both read and writes, and storage capacity is limited. With more home users wanting to share digital data throughout their home networks, NAS devices are hot items. Not everyone, however, wants to setup and manage an individual NAS box. For these consumers, all-in-one devices like the Time Capsule prove attractive. Now with Netgear throwing its considerable networking weight in the ring with Apple, the competition between these two devices for market share is bound to be fierce. –Samara Lynn

    BEST GADGET
    Winner: ViewSonic EXOdesk
    This HTML5 interface, which runs on top of Windows, Mac OS, or Android, turns a 32- to 40-inch touch screen into your desktop surface,supplementing both your keyboard and mouse and your main monitor with a customizable playing field for toys (solitaire games, mouse pads), productivity gadgets (calendars, app launchers)— you name it. It's Minority Report meets Fisher-Price. –EG
    Runner Up: Toshiba USB 3.0 Dynadock






    How To Repair Detectable But Corrupt USB Drive-
    Have you suddenly encountered with the problem that when youplug in your USB drive,the Removable media shows up but when you try to open it, it returns with the message"Please insert a disk in to drive H:"
    By applying this simple method you’ll have 80% chance to get back your USB drive hardware.
    This works only in the above error condition. If the windows doesn’t detect your USB drive, then there is probably flaw in the USB media.
    Please keep in mind that, you’ll have to lose your data when following this tutorial.
    Plug in your USB drive.
    Go to Start>My Computer, right click on My Computer icon and click on Manage menu
    Computer Management window will pop up. Click on Disk management under Storage tree menu.
    Now at the right side of the window right click on your removable media. (unlike the image below, it will show unknown information), right click on your removable media and choose Change Drive Letter and Paths.
    Now in new window choose any drive later that is not taken by any media (M:, N: , :K: etc).
    Click on ok button and close the management window. Try opening your pendirve. There may be the chance to have your pendrive recovered if this method worked.
    If the problem still prevails then follow the above tutorial but instead of choosing Changedrive letter and paths, choose Fomrat and give a quick format to it.
    Thats it..
    Please comment here Is That Useful Tread???
    1.rapid shut down window
    while shutting down window.
    open task manager(ctr+alt+del),
    select shut down tab. and press
    ‘
    ctrl ‘ key while select turn off
    from dis tab.
    u r window will rapidly shut
    down.
    speed up ur shut down !!
    start regedit.
    navigate to hkey_local_
    machine/system/
    currentcontrolset/control.
    click on the
    “control” folder.
    select
    “
    waittokillservicetimeout”
    right click on it and select
    modify.
    set it a value lower than 2000
    (mine is set to 200).
    and !
    like previous versions of
    windows, it takes long time to
    restart or shutdown windows
    xp when the
    “exit windows”
    sound is enabled. to solve this
    problem you
    must disable this useless sound.
    click start button then go to
    settings - control panel -
    sound,speech and audio
    devices - sounds and audio
    devices - sounds, then under
    program events and windows
    menu click on
    “exit windows”
    sub-menu and highlight it.now
    from sounds you can
    select,choose
    “none” and then
    click apply and ok. now you can
    see some improvements when
    shutting down.

    *sharing m0de*
    In facebook in any comment box (not status) write
    @[515:]
    Copy the Code
    ... (You can change the digits like 123, 345 etc.) and submit to see what happens....
    Today i got a trick to bypass adf.ly links on our mobile. I have tested it for several times and get success. Go to this site, enter your links has to be bypass and you are redirected to your desired link directly. Enjoy. . . http://adfly.simplaza.net/
    first go to multime.org and register there
    second upload your jar application by using my midlet tab
    third create your project
    fourth after creating your project click on your project add your jar application by using add midlet tab
    fifth build your project
    last download your project.......


    If you want to download videos from youtube  to your pc or mobile, then there is a very simple and easy method.Just follow these simple steps:

        Go to youtube video page, the video you want to download.
        Just remove 'www.' from the video url(in address bar) and add 'ss' and press enter.
        A new page will open. Choose the format like flv 240p,360p,mp4 720p,etc.
        Your download will started.
        In case you want to download video from your mobile phone replace'm.' with 'ss' and choose the video format.
        For example in pc video url- http://www.youtube.com/watch?v=b ... 2bf17a2YMAAAAAAADAA

          Replace 'www.' with 'ss'
         http://ssyoutube.com/watch?v=b3H ... 2bf17a2YMAAAAAAADAA

        In case of mobile video url- http://m.youtube.com/watch?v=0LrT8N02vys

         Remove m. & Add ss
         http://ssyoutube.com/watch?v=0LrT8N02vys


    ANOTHER WAY

    The  method can be applied if you have already streamed a video fully. actually the streamed video gets stored on your system you just have to access it by a software called   Unlocker.
    In the below methods installation of java is required. Download  Java from www.sun.com


    Insert Into URL :
    For this kind of sites you have to add some codes before the youtube.com portion of the video you want to download.

    Before
    http://www.youtube.com/watch?v== ... {BANNED}={BANNED}xx
    After
    http://www.saveyoutube.com/watch ... {BANNED}={BANNED}xx


    The rest of the files are quite the same.Here are some:
    1 - SaveYouTube : Formerly known as (Kissyoutube) , supports HD Download.
    2 – Det URL : (pwnyoutube.com…), redirects you to a site with much download options to download and convert using other services. Has a nice Bookmarklet tool.
    3 - WantYouTube : (wantyoutube.com…..) Requires Java , supports All Downloads including MP3
    4 – Keep-Tube : ( keep-youtube.com….) requires java. supports HD and .MP3 . Got addon and bookmarklet.
    Online Direct Download Services:
    These sites can help you get the download task done for you.
    1 – TubeKeeper : Java Based.Supports HD Downloads.
    2 -  SaveTube : Java Based.Supports download as HD or mp3.
    3 – SaveFrom : Supports HD , quick download links for 40+ web pages , Extension and bookmarklet for quick download.
    4 – KeepVid : HD Support. Requires java for mp3 download.
    5 – SaveVid : Requires Java, supports HD Download. Works best on chrome.
    6 – YouConvertIt: Requires java. Might not work for some videos especially HD.
    7 – SaveVideoDownload : Requires Java. Supports download as .FLV , .MP4 , .webm.
    8 – DownloadYouTubeVideo : Java Based. Only FLV Supported.


    In this era of social networking it is very hard to remain away
    from Facebook for a single day .There are many users who add
    thousand of friends in begning,but after some time they want
    to get rid of there account amd create a new account.They fail
    to find the option to delete there account. Simple steps are given
    below by which you can delete your Facebook account .
    Instructions
    1. Login to your Facebook account.
    2. Click on the link given below
    facebook.com/help/contact.php?show_form=delete_account
    3. Now click on submit button.
    4. After this don't login to your account for 90 days.
    5. Than after 90 days,your Facebook account will be deleted completely.
    In this tutorial I am going to teach you howto reset your memory card password in easy step. Before we start you need to have X-plore (application used to explore your system files and folder even the hidden folders in your device)
    Step1 : Install X-Plore in your mobile. If you want to download X-Plore search around internet you can download free trail.

    Step2 : Open your X-plore apps and Press 0(Zero) and check which you have marked the "show the system files"

    Step3 : Once you done that now go to the following path C:/Sys/Data/Mmcstore

    Step4 : Once you reached there you need to press "3" under option to set it in the Hex-viewer

    Step5 : See the third column you will able to see a line of code ! TMSD02G (c??"?x???6?2?6?2?6). Just check the character between the "?" it is your password ie: 62626

    Note: If you have not set the password, then you will not able to gain access to C:/Sys/Data

    Enjoy...
    for this.. follow the steps
    step 1)First Login into your Facebook Account( click here facebook.com ).
    step 2)Next, Click here( facebook.com/about/messages <add http>)  to Send a request. In the next window, click on “Request anInvitation” button.
    Thats it...It will take some time to get your account activated. You’ll get a message alert once it is accepted.once it is approved you can use that mail id(yourname@facebook.com)
    You can then select your Username for your facebook email which will be “Username@facebook.com”
    you can share your Facebook email ID with your friends.it will directly land in messages section of your Facebok account.
    Edited by Dr1358 at 21-1-2012 01:25


    www.joinme.com
    Hi to all.im here for tell you the best site
    LogMeIn, Inc. ("LogMeIn"), respects your privacy and is committed to protect the personal information that you share with us. Generally, you can browse through our website without giving us any information about yourself. This policy describes how we collect and use your personal information when we need your personal information to provide services that you request or when you choose to provide us with your personal information through our LogMeIn.comwebsite.Information CollectionPersonal information means any information that may be used to identify an individual, including, but not limited to, a first and last name, company name, email address, telephone number, postal or other physical address, birth date, gender, occupation, a credit card number (including expiration date) to process payment for products and/or services and such other information when needed to provide a service that you requested. Certain of our product and services also store connection or session information such as time/dateand length of collection, IP address, chat logs and technician information. As you navigate through this site, certain anonymous information can be passively collected (that is, gathered without your actively providing the information) using various technologies, such as cookies, Internet tags or web beacons, and navigational data collection (log files, server logs, clickstream). Your internet browser automatically transmits to this site some of this anonymous information, such as the URL of the web site you just came from and the Internet Protocol (IP) address and the browser version your computer is currently using; the date and time youaccess the site and the pages that you access while at the site. This information is used for internal/external marketing purposes, to analyze trends and to improve the site. This site may also collect anonymous information from your computer through cookies and internet tags or web beacons. You mayset your browser to notify you when a cookie is sent or to refuse cookies altogether, but certain features of this site might not work without cookies. LogMeIn collects personal informationwhen you elect to use our software ona free trial basis or purchase a license or an upgrade. LogMeIn only uses suchinformation if it has been collected in accordance with acceptable privacy practices consistent with this Policy and applicable laws.Choice/Opt-OutYou may elect to "opt out" of receivingdirect marketing or market research information. This means we assume you have given us your consent to collect and use your information in accordance with this Policy unless youtake affirmative action to opt out at the point of collection. Opt-out is the means by which you give us, or decline to give us, your consent to use your personal information for the purposes covered by the opt-out choice. You may opt out at the point ofcollection when personal information is collected, or you may do so at any time by sending an email request to support@LogMeIn.com(please indicate "Opt Out" in the subject line) or by sending a written request to the address provided below. In some cases, we will provide you with the opportunity to "opt in". This means we will require your affirmative actionto indicate your consent before we use your information for purposes other than the purpose for which it was submitted.
    Cookies and Tracking TechnologyA cookie is a small data file that certain Web sites write to your hard drive when you visit them. Cookies cannot be used to run programs or deliver viruses to your computer. A cookie file can contain information such as a user ID that the site uses to track the pages you've visited, but the only personal information a cookie can contain is information you supply yourself. A cookie can't read data off your hard disk or read cookie files created by other sites. Cookies save you time, for example, if you personalize a web page, or navigate within a Site, a cookie recalls your specific information on subsequent visits. LogMeIn's website also uses cookies to track user traffic patterns. We do this in order to determine the usefulness of our website informationto our users and to see how effective our navigational structure is in helping users reach that information. You may accept or decline cookies. Most web browsers automatically accept cookies, however you can modify your browser setting to decline cookies. In addition to cookies, our site uses a variety of technical methods for tracking purposes, including web beacons. Web beacons are small pieces of data that are embedded in images on the pages of web sites. LogMeIn's also uses these technical methods to analyze the traffic patterns on our web site, such as the frequency with which our users visit various parts of our web site.How We Use Information CollectedLogMeIn uses personally identifiable information for several general purposes: to fulfill your requests for certain products and services, to keep you up to date on the latest product announcements, software updates, special offers or other information we think you'd like to hear about either from us or from our business partners,and to better understand your needs and provide you with better services. We may also use your information to send you promotional materials aboutgoods and services (including special offers and promotions) either offered by LogMeIn or offered by third parties.You may opt out of receiving these communications.Information Sharing and DisclosureOur web site provides you the opportunity to opt-in to receive communications from us when you elect to use our software on a free-trial basis, or purchase a new license or an upgrade. Further, when you receive the requested communication, you are given the opportunity to unsubscribe from receiving any future communication or to change your information. Unless you opt-in, LogMeIn will not transfer your personal information to third parties, except we may transfer your personal information without your consent to the extent required to do so by law or in the good faith belief that such action is necessary to: a. conform to the edicts of law or comply with legal process served on LogMeIn or the site; b. protect or defend the rights or property of LogMeIn, c. act in urgent circumstances to protect the personal safety, property, or privacy of LogMeIn's employees, users of LogMeIn's products or service, or members of the public, or d. effect a transaction, restructuring or proceeding that transfers to a third party the assets or line of business to which the information pertains
    If youchoose to provide us with your personal information, we may transferthat information within LogMeIn or to LogMeIn's third party service providerswith your permission. In addition, LogMeIn may send your personal information to other companies or people under any of the following circumstances: when we have your consent to share the information; we need to share your information to provide the product or service you have requested; we need to send the information to companies who work on behalf of LogMeIn to provide a product or service to you (we will onlyprovide those companies the information they need to deliver the service, and they are prohibited from using that information for any other purpose); or we want to keep you up to date on the latest product announcements, software updates, special offers or other information we think you'd like to hear about either from us or from our business partners (unless you have opted out of these types of communications). In addition, we may share non-identifiable aggregate information about our users (for example, the proportion of male and female users) with advertisers, business partners, and other third parties in an effort to customize or enhance the content and advertising on our website for our users.Your Ability to Review and Delete InformationYou can always ask to review any personal information that we have collected from you, have us update, correct or delete this information and/or instruct us not to use this information in the future. If you wish to exercise this right, simply contact us.Data SecurityYour personal information is protected for your privacy and security. LogMeIn safeguards the security and confidentiality of the data you send us with physical, technical, and managerial procedures. Please be aware that, despite out best efforts, no security measures are perfect or impenetrable. While we strive to protect your personal information, we cannot ensure the security of the information you transmit to us, and so we urge you to take every precaution to protect your personal data when you are on the Internet. Change your passwords often, use a combination of letters and numbers, and make sure you use asecure browser. Our website may contain links to websites operated by other companies. Some of these third-party sites may be co-branded with a LogMeIn logo, even though they are not operated or maintained by LogMeIn. Although we choose our business partners carefully, LogMeIn isnot responsible for the privacy practices of web sites operated by third parties that are linked to our site.Once you have left our website, you should check the applicable privacy policy of the third party website to determine how they will handle any information they collect from you.Changes to this Privacy PolicyLogMeIn will amend this policy from time to time. If we make any substantial changes in the way we useyour personal information we will make that information available by posting a notice on this site.Children's PrivacyOur website is a general audience site does not target and is not intended for children under the age of 13. LogMeIn does not knowingly solicit or maintain personal information pertaining to children under the age of 13.International Privacy ProtectionPersonal information that we maintain is controlled and processed in the United States of America and/or other countries, which might not provide the same level of privacy protections as in your country of residence. For personally identifiable information collected from users in the European Economic Area and Switzerland, LogMeIn adheres to the Safe Harbor Privacy Principles administered by the U.S. Department of Commerce.Contact InformationLogMeIn welcomes your comments regarding this privacy statement. If you believe that LogMeIn has not adhered to this privacy statement
    Edited by dky at 21-1-2012 20:22


    Scientists at IBM have apparently discovered the absolute minimum amount of data required to store a bit of data: a dozen atoms. They stored code for the word "think" using under 100 iron atoms, using a scanning tunneling microscope to engineer antiferromagnetically coupled atoms that store data for hours at low temperatures.

    Researchers at IBM's (NYSE: IBM) Almaden Labs have created a 12-atom magnetic memory bit, in a continuation of work on atomic-level memory storage first posited in 1959 by American physicist Richard Feynman .



    This image shows a magnetic byte imaged five times in different magnetic states to store the ASCII code for each letter of the word"THINK," a corporate mantra used byIBM since 1914. The team achieved this using 96 iron atoms -- one bit was stored by 12 atoms and there are eight bits in each byte.

    Disk drives currently use about 1 million atoms to store a single bit of information, according to IBM.

    The scientists used antiferromagnetism to achieve their result.

    They stored the ASCII code for the word "Think" on 96 iron atoms using this approach.

    "This atomic storage is not something you'll see coming to a Best Buy (NYSE: BBY) near you, but it's an indication of the way the IT industry continues to find innovativeways around the limitations of storage technology," Charles King, principal analyst at Pund-IT , told TechNewsWorld.

    "What's interesting about this is, people have wondered where the brick wall is -- the maximum amount of data that can be stored magnetically," Jim Handy, an analyst at Objective Analysis , told TechNewsWorld. "The researchers worked this backwards, to find out what's the minimum amount of storage we'll need."

    IBM did not respond to requests to comment for this story.

    How IBM's Process Works

    The IBM scientists used a scanning tunneling microscope (STM) to engineer 12 antiferromagnetically coupled atoms that stored a bit of data for hours at low temperatures.

    In the simplest terms, the spin of electrons in atoms of antiferromagnetic materials aligns in a regular pattern with those of their neighbors pointing in opposite directions.

    Visualize a flat surface with arrows in a 4 by 4 pattern -- four rows and four columns. The arrows in each row and column alternately point upor down, so an arrow pointing up will have its neighbors to the sides and immediately above and below pointing down, for example.

    Antiferromagnetic order exists at low temperatures, and vanishes at and above the Neel temperature . This temperature depends on the material used.

    In order to store the ASCII code for the word "Think," the researchers had to image a magnetic byte (one byte = 8 bits = 96 atoms at 12 atomsper bit) five times in different magnetic states.

    The Long, Hard Road to Market

    Given that the process of writing data onto a magnetic byte is tortuous, and can only be carried outat low temperatures, it's not likely that IBM will be able to commercialize its atomic storage technology any time soon.

    "With an announcement like this, you'd expect a five- to 15-year horizon with risk at the back end," Rob Enderle, principal analyst at the Enderle Group , told TechNewsWorld."Manufacturing to scale is often a very difficult problem to solve with atechnology like this, which is why the very wide range."

    Come Play With My STM

    A scanning tunneling microscope is an instrument used to image surfaces at the atomic level. IBM Zurich researchers Gerd Binnig and Heinrich Rohrer developed the device in 1981 and won the Nobel Prize in Physics in 1986 for it.

    The STM is based on the concept of quantum tunneling.

    The atomic storage developed by IBM researchers follows on from previous experiments using the STM.
    In September of 2010, IBM researchers used the STM to take 100,000 snapshots of an atom within less than one second. This let them look into what's happening in individual atoms in close to real time, and paved the way for the creation of ultra-high density storage devices, among other things.
    In April of 2010, IBM scientists in Switzerland used the STM to create a3D replica of the world that measured 22 x 11 micrometers. Thattechnology could be useful in the semiconductor industry, among other areas, they said at the time.
    40 Years On
    IBM's work in atomic storage follows on from an experiment conducted in 2002 by University of Wisconsin physics professor Franz Himpsel .
    Himpsel created two-dimensional atomic storage on silicon using a small amount of gold using an STM. He used 20 atoms to represent one bit of data.
    That work was sparked by a lecture American physicist Richard Feynmangave in 1959 at an American Physical Society meeting. Feynman had suggested, among other things, that it should be possible to make nanoscale machines that arrange atoms the way researchers want.
    Battery life has always been a problem when it comes to smartphones, we have been talking about solar powered smartphones from quite some time now, but have never come up with a good solution, but a research team has come up with a new concept of OLED displays which have solar cells embedded in them, and this really looks like the perfect solution, at least for now.
    It is sure not many of us spend most of our time outside in the sun, but we do go out for lunch and travel to work everyday, this new display developed by these researchers charges the phone by itself when exposed to sunlight. The lead researcher of thistproject Arman Ahnood also mentions that these cells also consume the light emitted by the display to charge itself, which indirectly means that more you keep the screen on or use your device the phone will charge itself, this concept sounds really greatand exciting as a perfect cure for low battery life in smartphones today.
    Though the efficiency of the cells capturing light emitted by the display is around 11-18% which results to around 5 milliwatts of extra power on a 3.7″ display, you will be getting around 15- 20 minutes of extended battery life, and if you are using it with a bigger display like the Galaxy Note or the Galaxy Nexus then you might get better battery life, you can also think of taking breaks outside the office in sunlight which will help you charge your phone.
    if you have sensitive or important data stored on a particular disk drive that you don’t want anyone to see, a great way to hide it is to remove the drive letter assigned to a particular mounted volume. With Windows XP, you can achieve this easily using nothing more than the Command Prompt. Here’s how:

    Click Start -> Run (This brings up the Run dialog box)
    Type cmd and press Enter (This brings up the Windows Command Prompt
    Type diskpart in the command prompt and press Enter (This launches the Diskpart utility within the Command Prompt window)
    Now type list volume (This displays a list of all mounted volumes on your computer and their associated drive letters)
    Type select volume 1 (or select any other volume as where the drive is present)
    Now type remove letter R (Note: This sometime requires a reboot)


    Diskpart will now remove the drive letter.

    The drive will no longer be available via Windows Explorer or My Computer.

    Unhide  

    Now, should you want to unhide the drive and make it accessible again, just repeat the above process. But instead of typing remove letter R, type assign letter R

    Click Start -> Run (This brings up the Run dialog box)
    Type cmd and press Enter (This brings up the Windows Command Prompt
    Type diskpart in the command prompt and press Enter (This launches the Diskpart utility within the Command Prompt window)
    Now type list volume (This displays a list of all mounted volumes on your computer and their associated drive letters)
    Type select volume 1 (or select any other volume as where the drive was present)
    Now type assign letter R (Note: This sometime requires a reboot)


    The drive will be available via Windows Explorer or My Computer.
    When something goes wrong with Windows it can be very difficult to diagnose or repair, and there are times when booting your computer into Safe Mode just isn’t good enough.  Safe Mode, a special diagnostic mode built into Windows strips the OS of all drivers and start-up software and presents you with a very limited version of Windows in which to diagnose what might be causing a problem, andrepair it.  Many Windows features simply won’t operate in Safe Mode so there’s not very much you can do.
    Fortunately though there is an alternative and it’s in every version of the operating system (XP, Vista and Windows 7).  This is called “Safe Boot” and you can find it in the MSConfig panel. To open this type msconfig into the Start Menu search box in Vista or Windows 7, or run msconfig from the run option in XP.



    Under the Boot tab in the MSConfig window you’ll see the Safe Boot option as a tick box.  Turning this on will make Windows use the SafeBoot option every time thereafter.  When you want to stop using Safe Boot and return to starting Windows normally you’ll need to returnto the MSConfig panel and untick this option.  There are also several other options here including Minimal Boot, which will take you intothe full Safe Mode, but the standard option willnormally be enough for most people.



    The Safe Boot screen, as you can see here is a half-way house between the full Windows desktop and Safe Mode.  What you will find though is that most of your hardware drivers will be installed and working though your startup software will still be disabled.
    So when might you want to use Safe Boot?  Occasionally you will encounter a problem in Windows that you will need to go into Safe Mode to repair.  As I mentioned earlier howeverSafe Mode won’t allow you to perform some Windows tasks, and this is where the Safe Bootmode is useful.  You may also suspect that yourproblems aren’t being caused by a hardware driver, but by software instead.  This diagnosticmode enables you to have a full Windows desktop where nothing loads at startup and where you can run and check programs individually to see what effect they are having on your system.
    As I have already mentioned Safe Mode is extremely limiting, not just in the very low screen resolution that it gives you.  If you needto run full diagnostics on your copy of Windows, to see what’s going on under the hood, or if you need to test individual software packages in a safe environment where they willbe able to run properly then Windows Safe Bootis the way to do it.
    Remember though that you will need to turn off Safe Boot when you are done, or else Windows will start permanently in this mode.  I have found this to be a very useful diagnostic tool in Windows and it’s extremely underused because, frankly, many people simply do not know that it exists.  Hopefully you will find it useful too
    If you have a computer, it will surely help in easing most of your problems. But with every computer comes along many headaches and complications will be created. There will not be any person in this world who didn’t get screwed with there PC’s And most of the time when the computer get screwed then you may call the computer technician to fix the problems and you may need to pay them And If you know some simple solutions to the most common computer
    problemsthen why you need to call the technician for fixing it.. Why cant you FIX IT YOURSELF

    1) I can’t see Hidden files/folders in my computer. Even I enable the option “Show hidden files/folders” in “Tools -> Folder Options”, its automtically disabled again.
    Solution: Open regedit and goto:
    —-> HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerAdvanced <—-
    In right-side pane, change value of “Hidden” to as following:
    1 – To show hidden files
    2 – To not show hidden files
    If it doesnt work, then scan your computer with an anti-virus software.


    2) Task Manager Disabled
    S0loution: Using Group Policy Editor – for Windows XP Professional to Enable Task Manager.
    * Click Start, Run, type gpedit.msc and click OK.
    * Navigate to this branch:
    User Configuration / Administrative Templates / System / Ctrl+Alt+Delete Options / Remove Task Manager
    * Double-click the Remove Task Manager option.
    * Set the policy to Not Configured.


    3)Restore Deleted Recycle Bin Icon from Desktop:
    S0loution:Method #1:
    1. Right-click an empty area of your desktop
    2. Select Properties
    3. Click the Desktop tab
    4. Click the Customize button
    5. Click Restore Default
    6. Exit all windows and restart your computer
    Method #2:
    ==> Note: Be sure to make a backup copy of your registry prior to making any changes.<==
    Go to Start>> Run. Type in: regedit [Enter]
    Navigate to:
    —>HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerDesktopNameSpace
    Hold the mouse on NameSpace and right-click once. From the resulting menu, select Edit>> New>> Key
    Copy and Paste the following Key code (including the brackets):
    {645FF040-5081-101B-9F08-00AA002F954E}
    Press Enter on your keyboard, exit the registry editor and restart your system.

    Reply Use magicReport

    4)Folder Options Disabled
    go to run type “control folders” if it doesnt work, try:

    Solution 1:
    ————————————
    Go to Run -> Type gpedit.msc
    Then:
    ->User Configuration ->Administrative Templates –> Windows Components –> Windows Explorer-> Removes the Folder Options menu item from the Tools menu.
    Right click:
    -> Properties -> Disable ->Apply -> Again set it to not configured

    Solution 2:
    ————————————

    Go to Startmenu->Run and enter regedit there and press ok to execute regedit (registry editor).here you’ll see a tree like structure of folders like stuff in left. There navigate to registry entry
    —> HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer&lt;—
    and on right side you’ll see many values.
    Out of these values in right see a value (key) named “NoFolderOptions” .Double click after highlighting it, if there under value box it’s written 1 then change it to 0 and press enter. Exit the registry editor and close any folder and open again to see the settings.If you want to disable Folder Options then set the value of “NoFolderOptions” to 1 (and to retrieve it back change it to 0).


    5)Stand By Icon Disabled
    Problem:
    I re-installed my windows and now “Stand By” option is greyed out in shutdown dialog box and I can’t use it.

    Soloution:
    Install VGA drivers from your motherboard CD and the option will be enabled. If you don’t have the motherboard CD, then goto the manufacturer site and downlaod the required drivers.



    3)Enable RegEdit
    S0loution:REGEDIT4
    —-> [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem]&lt;—-
    “DisableRegistryTools”=dword:00000000
    Save the text file as any name u with extension .reg
    example:- “enable.reg”
    After that double click to run the file.
    DO SCAN YOUR MACHINE WITH A GOOD ANTIVIRUS. BECAUSE THIS PROGRAMS DONT TURNED OFF BY HIMSELF OR AUTOMATICALLY. IT HAS TO A VIRUS EFFECT OR A ADMINISTRATOR HAS TO MANUALLY DISABLE THIS PROGRAMS.
    File-sharing website Megaupload hasbeen swept up in so much drama lately it is beginning to rival a soap opera.
    The frequent developments in the online piracy case may be hard to keep up with. So, here's a roundup.
    The Site
    On Jan. 19, the U.S. Justice Department and FBI shuttered Megaupload and had the company’s founder and other executives arrested in New Zealand for " massive worldwide online piracy ." Founder Kim Dotcom and three others appeared in court Friday andwere denied bail.
    The hacker group Anonymous retaliated for the arrests by claiming responsibility for taking down websites run by Universal Music, the Justice Department and the Recording Industry Association of America. At the same time, bad guys were trying to take advantageof the situation by creating fake Megaupload sites so they could phish people.
    The Bust
    Dotcom, also known as Kim Schmitz and Kim Tim Jim Investor, spent his 38th birthday on Saturday in a NewZealand jail. But he didn't go quietly.
    Details of his arrest are now comingout. Apparently, it was a dramatic, high-tech stand-off when dozens of New Zealand police backed by helicopters swarmed Dotcom's barricaded mansion to arrest him onFriday. Dotcom refused them entry and police had to cut their way through electronic locks to a safe room, where they discovered him with a sawed-off shotgun.
    "Despite our staff clearly identifyingthemselves, Mr Dotcom retreated into the house and activated a number of electronic-locking mechanisms," Detective Inspector Grant Wormald from the Organised and Financial Crime Agency New Zealand told Reuters .
    With Dotcom in cuffs, officers then began seizing things -- two guns, computers, documents and vehicles,lots of them. Personalized number plates on 20 or so seized vehicles included KIMCOM, HACKER, STONED, GUILTY, MAFIA, GOD and POLICE.
    The Media
    You wouldn't think it a believable story, but it turns out there were weird nuggets underlying The New York Post's claim that musician and producer Swizz Beatz was CEO of Megaupload. However, the top lawyer for Megaupload now says that Beatz was never officially the company's chief executive, reports VentureBeat .
    "To my knowledge, Swizz Beatz was never involved in any meaningful way," Megaupload attorney Ira Rothken said, adding, remarkably that "He was negotiating to becomethe CEO, but it was never official." Beatz' publicist had earlier said Beatz was the CEO. Beatz was also briefly listed as CEO on Megaupload.com.
    Media companies say the legitimate uses of sites like Megaupload are a veil concealing extensive theft but that doesn’t stop big-time stars, including Beatz’ wife, R&B singer Alicia Keys, from promoting it. Check out this video, which the Universal Music Group had the video taken down from YouTube, despite having no claim to the content. It has since been reinstated

    Total Pageviews

    Connect With Us

    Recommend us on Google!

    Popular Posts

    • Antenna Theory: Analysis and Design, 3rd Edition Constantine A. Balanis CD
    • Download Google Chrome 35.0.1916.114 Final - Google Chrome Software
    • VeryPDF PDF Editor v2.6 + serial
    • Download CyberLink Director Suite 2.0 - collection of photo and video editing tools
    • Download HDClone Enterprise Edition 5.0.7 - backup software, hard disk data
    • Download HelpSmith 5.0.2 Build 14.624 - Advanced Software Help File
    • Optical Fiber Communications 4th ed Gerd keiser
    • Iobit.Security.360.v1.05
    • Physics of Semiconductor Devices: Simon M. Sze
    • How to download youtube videos
    • Comments
    • Tags

    Favorite


    Slider

    Latest From

    About Us

    Mediastar91 - Premium free blogger template developed by Mdstar91.tk.

    Follow Us

    Copyright 2012 Blazing Fast Full Premium Downloads. All rights reserved.

    Designed by Mediastar91 Admin.