Monday, February 28, 2011

Nokia replaces Symbian with Windows Phone 7, Reveals Concept Phones

       Nokia has finally let Symbian go and announced it’s partnership with Microsoft. With this alliance, Nokia will be manufacturing it’s smartphones with Windows Phone 7 as the Operating System.
        Basically, Nokia’s hardware is partnered with Microsoft’s software.
Former Microsoft exec and current Nokia CEO Stephen Elop has announced this partnership. Also, Microsoft’s Bing and adCenter will provide search and ad services across Nokia devices. While Nokia’s Ovi Maps will be a core part of Microsoft’s mapping services and will be integrated with Bing and Nokia’s content store will be integrated into Microsoft’s Marketplace. Xbox Live and Office will also will also be featuring on new Nokia handsets.

Sunday, February 27, 2011


Hey..............Goooooood Morningggggggggggggg

XP File Sharing and Permissions

File sharing and permissions in Windows XP seem complicated.


Microsoft provides a Knowledge Base article, but reading it is like walking through molasses: It describes in infinite detail a file security system based on a 1-to-5 scale. However, if you look for this 1-to-5 scale anywhere in your security-settings interface, you may come away a little confused. These numbers are nowhere to be found.


Microsoft's 1-to-5 scale means nothing to the individual user and relates in no way to the actual practice of setting your security protocols. Enter the Screen Savers. We are here to explain it to you.


The security settings the user actually sets relate to read access, write access, shared folders, and password protection. These features are available in both Windows XP Home Edition and Windows XP Professional, however the features only work if the operating system is installed with NTFS. FAT32 does not support the file permissions described here.


You can choose to install Windows XP Home using NTFS, but you should use a FAT32 file system if you are dual booting and want to see the contents of your Windows 95, 98, or Me partition from your XP partition. Your file system is not set in stone when you install Windows XP. You always can change your file system from FAT32 to NTFS without losing any of your data; however, the transition is one-way only.


There is no going back to FAT32 from NTFS unless you grab a copy of Partition Magic. Microsoft recommends you install Windows XP Home with FAT32 if you intend to install more than one OS on your computer or if your hard drive is less than 32GB.


If you have Windows XP Home or Professional running NTFS, you can hide files and entire folders from prying eyes. When you set up multiple user accounts on one machine, any user with administrator access can view the documents in another's My Documents folders. To protect a folder, right-click it, choose Properties, the Share tab, and select "make this folder private." No one, not even a fellow system administrator, can access these most secret files.


Every file or folder contained within whichever folder you choose to make private will take on the settings of the parent folder. If the administrator does not have a password to the account, Windows XP will prompt the user to make a password or risk subjecting his or her private work to public scrutiny. No Windows password means no protected files.


A person who logs in as a guest or as a user without administrator privileges cannot see the contents of any other user's My Documents folder, even if the folder has not been explicitly made private. The user with limited privileges can, however, set a password and protect his or her documents from the prying eyes of the administrators. Windows XP is all about privacy.


It is a nice feeling to keep your personal tax documents secure from the passing lookey-loo. It's about time Microsoft made snooping your computer more difficult than snooping your medicine cabinet.


Tuesday, February 22, 2011

A Facebook app that reveals breakups!

A new application on Facebook called the Breakup Notifier sends you an email when the love of your life who is in a relationship with someone else, breaks up.

The app, designed by Dan Loewenherz, allows users to sign up for emails informing them of when their friends' relationship status changes and it's punch line goes like this: You like someone. They're in a relationship. Be the first to know when they're out of it.

"I built a web app that alerts you when people you're interested in break up on Facebook. Typical Saturday night fun," the Daily Mail quoted Loewenherz as saying.

He also built in some 'safety' features -- for instance, if someone's relationship status turns "married", the application warns them that it is perhaps advisable not to use the service.

Perfect for those who are hankering after a special someone, the app means they no longer have to obsessively check that person's status each day.

50 mins on phone can alter brain activity

Spending 50 minutes with a cellphone plastered to your ear is enough to change brain cell activity in the part of the brain closest to the antenna.

But whether that causes any harm is not clear, scientists at the National Institutes of Health said, adding that the study will likely not settle recurring concerns of a link between cellphones and brain cancer.

"What we showed is glucose metabolism (a sign of brain activity) increases in the brain in people who were exposed to a cellphone in the area closet to the antenna," said Dr Nora Volkow of the NIH, whose study was published in the Journal of the American Medical Association.

The study was meant to examine how the brain reacts to electromagnetic fields caused by wireless phone signals. Volkow said she was surprised that the weak electromagnetic radiation from cellphones could affect brain activity, but she said the findings do not shed any light on whether cellphones cause cancer.

"This study does not in any way indicate that. What the study does is to show the human brain is sensitive to electromagnetic radiation from cellphone exposures."

Use of the devices has increased dramatically since they were introduced in the early-to-mid 1980s, with about 5 billion mobile phones now in use worldwide.

Some studies have linked cellphone exposure to an increased risk of brain cancers, but a large study by the World Health Organization was inconclusive.

Volkow's team studied 47 people who had brain scans while a cellphone was turned on for 50 minutes and another while the phone was turned off.

While there was no overall change in brain metabolism, they found a 7 per cent increase in brain metabolism in the region closest to the cellphone antenna when the phone was on.

Experts said the results were intriguing, but urged that they be interpreted with caution. "Although the biological significance, if any, of increased glucose metabolism from acute cellphone exposure is unknown, the results warrant further investigation," Henry Lai of the University of Washington, Seattle, and Dr Lennart Hardell of University Hospital in Orebro, Sweden, wrote in a commentary in JAMA.

"Much has to be done to further investigate and understand these effects," they wrote.

Professor Patrick Haggard of University College London said the results were interesting since the study suggests a direct effect of cellphone signals on brain function.

But he said much larger fluctuations in brain metabolic rate can occur naturally, such as when a person is thinking.

"If further studies confirm that mobile phone signals do have direct effects on brain metabolism, then it will be important to investigate whether such effects have implications for health," he said.

John Walls, a spokesman for CTIA-The Wireless Association, an industry group, said the scientific evidence so far "has overwhelmingly indicated that wireless devices, within the limits established by the FCC ( Federal Communications Commission), do not pose a public health risk or cause any adverse health effects."

Volkow said her findings suggest the need for more study to see if cellphones have a negative effect on brain cells. Meanwhile, Volkow isn't taking any chances. She now uses an ear phone instead of placing a cellphone next to her ear.

"It doesn't mean that there is any risk, but in case there is, why not?"

Monday, February 21, 2011

Search Photos by their Content

Researchers of Penn State has developed a statistical approach called Automatic Linguistic Indexing of Pictures in Real Time or ALIPR which can be a next major step insearching for pictures on Internet.

Technology Used By ALIPR

This technology teaches computers to recognize contents of pictures, such as peoples, landscapes, buildings, parks etc. opposite to the current technology of image-retrieval in which photographs are searched by keywords in the surrounding text such as ALT text. The researchers are hoping that soon this technology can be used for automatic tagging as a part of Internet search engine.

Jia Li - Associate Professor of Statistics at Penn State gives explanation about their approach.

The basic approach is a take a large number of photos (they have started with 60,000), and tag these photos with with a variety of keywords, manually. Let's say, take 100 photos of national parks and tag them with keyword: National Parks, Landscape and Trees.

After that they would build a statistical model which will teach computers to recognize color and texture pattern in these 100 photographs and then assign these keywords to those pictures that seems to contain parks, landscapes and trees. Eventually the process will be reversed so that a internet surfer can use keywords to search the World Wide Web for relevant images.

Problem With Current Image Retrieval Systems

Most of the image-retrieval systems used today, search for keywords in the text associated with the photo or in the name that was given to the photo. But with this technique the surfer often misses appropriate photos and gets inappropriate images.

This new technique of Jia Li can train computers to recognize the semantics of images based on pixel information alone.

Keywords Approach and Accuracy

According to Jia Li- developer of ALIPR says that their approach appropriately assigns to photos at least one keyword among seven possible keywords about 90 percent of the time. But, the accuracy rate really depends on the evaluator. "It depends on how specific the evaluator expects the approach to be," she said. "For example, ALIPR often distinguishes people from animals, but rarely distinguishes children from adults."

Now the team is working on improving the accuracy of ALIPR, but according to Li it is not easy to achieve 100% accuracy. As there are so many images on Internet and they have so much variations that it is not possible for ALIPR to be 100% accurate each time.

Reasons for Inaccuracy

We can understand this by a simple example. Suppose in an image there is a Cat wearing a Red Coat.....then Red Coat will lead ALIPR to tag the photo with words irrelevant to the Cat. There is too much variations in the images that will cause problems for ALIPR. But Li is working on some new ideas to achieve better recognition of image sementics.

Now it is possible to generate electrical energy while soldiers march

A new research in Leeds says that it can be possible now to capture Kinetic Energy that soldiers produce while marching and it can be converted to electrical energy.

This will help soldiers to reduce the weight of their bags up to 10 Kg. as they don't require to carry batteries anymore to charge their electronic equipments.

The cost of this project is around $1.64 million which will be funded by Engineering and Physical Science Research Council (EPSRC) and Defence Science and Technology Laboratory (DSTL).

Most Advanced Microscope of World

Canadian center for Electron Microscopy has developed a new powerful microscope that is world's most powerful microscope till date. According to Gianluigi Botton, Director of Canadian center for Electron Microscopy, says that the power of this microscope can be thought as equivalent to "taking Hubble Telescope and aiming it at atomic level".


Titan

Titan 80-300 Cubed

This powerful microscope named Titan 80-300 Cubed was installed at the University early in the summer, and since then it has been put through its paces to achieve unprecedented resolution.
This microscope is so powerful that it can easily identify atoms, measure their chemical state and even probe the electrons that bind them together.

According to vice-president of Mc Master, Mr. Elbestawi this microscope will make McMaster a hub for a fast growing field.

Really Impressive Microscope

A group of international scientists who visited McMaster were really impressed by the amazing capabilities of this microscope. This microscope can help scientist to discover new things in biological and physical sciencesDean of Engineering David Wilkinson sees the microscope through another lens.




Titan's ability can probe structure of solid materials to the atomic level and this will have an amazing impact on development and commercialization of new technologies from biomedical devices to water quality monitoring and improved energy storage systems.


Titan

Cost of Microscope

This microscope has been build in Netherlands by FEI Company with a cost of about $15 million. This microscope can help to examine everyday products with its Nano details that can improve the efficiency of these products.

What This Microscope Can Do?

This microscope can be used to produce more efficient lighting and better solar cells, to study proteins and drug-delivery materials to target cancers. It will assess atmospheric particulates, and help create lighter and stronger automotive materials, more effective cosmetics, and higher density memory storage for faster electronic and telecommunication devices.

Chandrayaan - I: Proud for India

ndia's first mission to the Moon: Chandrayaan-1 , was successfully launched the morning of October 22 from the Satish Dhawan Space Centre (SHAR) in Sriharikota, India.

The spacecraft was launched into the orbit of earth by PSLV-C11 which is an upgraded version of the Indian Space Research Organization's (ISRO's) Polar Satellite Launch Vehicle. The launch took place at 02:52 Central European Summer Time.


Chandrayaan

With this launch Chandrayaan-1 started its journey to the Moon, which will culminate with a major manoeuvre - the lunar orbit insertion - in about two weeks. Once the spacecraft is orbiting the Moon, further manoeuvres will progressively lower its altitude to the final 100 km-high circular orbit.

Mission of Chandrayaan-1

This spacecraft will eject the 'Moon Impact Probe' to provide information about the lunar surface. After that mission will be continued from orbit. The spacecraft is equipped with 11 scientific instruments for lunar surface study. Three of these 11 instruments were provided by Europe (UK, Germany, Sweden) through ESA.

The European instruments are:

The Chandrayaan-1 Imaging X-Ray Spectrometer (C1XS) for measuring abundance of magnesium, aluminium, silicon, iron and titanium over the surface of the Moon.

The Smart Near-Infrared Spectrometer (SIR-2) to explore the mineral resources of the Moon, the formation of its surface features and the different layers of the Moon's crust.

The Sub-kiloelectronvolt Atom Reflecting Analyser (SARA) to study the way the Moon's surface interacts with the solar wind, and the surface's magnetic anomalies.


Chandrayaan

Collaboration of India and Europe

Indo-European collaboration on space ventures is 30 years old when ESA and ISRO signed a cooperation agreement in 1978. In 1981, an Ariane 1 launcher carried India's first geostationary satellite, Apple. So far, 13 of India's INSAT satellites have flown on Europe's Arianes.

Now with Chandrayaan-1 which is ISRO's first mission beyond Earth orbit, marks the beginning of a new era of collaboration between ESA and ISRO in space science.

According to Prof. David Southwood, ESA Director of Science and Robotic Exploration: "In an era of renewed interest for the Moon on a world-wide scale, the ESA-ISRO collaboration on Chandrayaan-1 is a new opportunity for Europe to expand its competence in lunar science while tightening the long-standing relationship with India - an ever stronger space power".

This mission is a big success not only for ISRO but for whole India. This mission is a milestone in India's space missions and now India is among those very few countries that have launched lunar missions in past.

Is There Robot with Human expressions?????????

Yesssssss  it's NEXI !!!!!!

A latest invention by MIT Media Lab is a new robot that is able to show various facial expressions such as 'slanting its eyebrows in anger', or 'raise them in surprise', and show a wide assortment of facial expressions while communicating with people.

This latest achievement in the field of Robotics is named NEXI as it is framed as the next generation robots which is aimed for a range of applications for personal robots and human-robot teamwork.

DESIGNING

The head and face of NEXI were designed by Xitome Design which is a innovative designing and development company that specializes in robotic design and development. The expressive robotics started with a neck mechanism sporting 4 degrees of freedom (DoF) at the base, plus pan-tilt-yaw of the head itself. The mechanism has been constructed to time the movements so they mimic human speed. The face of NEXI has been specially designed to use gaze, eyebrows, eyelids and an articulate mandible which helps in expressing a wide range of different emotions.

The chassis of NEXI is also advanced. It has been developed by the Laboratory for Perceptual Robotics UMASS (University of Massachusetts), Amherst. This chassis is based on the uBot5 mobile manipulator. The mobile base can balance dynamically on two wheels. The arms of NEXI can pick up a weight of up to 10 pounds and the plastic covering of the chassis can detect any kind of human touch.

CYNTHIA BREAZEAL: HEAD OF THE PROJECT

This project was headed by Media Lab's Cynthia Breazeal, a well known robotics expert famous for earlier expressive robots such as Kismet. She is an Associate Professor of Media Arts and Sciences at the MIT. She named her new product as an MDS (mobile, dextrous, social) robot.


Nexi Robot

FEATURES OF NEXI

Except a wide range of facial expressions, Nexi has many other features. It has self-balancing wheels like the Segway transporter, to ultimately ride on. Currently it uses an additional set of supportive wheels to operate as a statically stable platform in its early stage of development. It has hands which can be used to manipulate objects, eyes (video cameras), ears (an array of microphones), and a 3-D infrared camera and laser rangefinder which support real-time tracking of objects, people and voices as well as indoor navigation.



Forget Windows: Midori is coming

WINDOWS is a name that has ruled the whole computer world since its first launch in November 1985. Since then it is like a trademark of Microsoft Corporation.

With many advanced versions of Windows available today such as Windows XP, Windows Vista, it is the most used operating system in the world. In 2010, Microsoft is going to launch
WINDOWS 2007, but now here is time to experience a yet another technology of operating systems.

Yes, MICROSOFT is working on a new generation of operating systems called
Cloud-Based Operating System and rumors are there that MIDORI will be their first such operating system, which will replace Windows fully from computer map.

WHAT'S THE DIFFERENCE
MIDORI is an offshoot of Microsoft Research's Singularity operating system. In this the tools and libraries are completely managed code. MIDORI is designed to run directly on native hardware (x86, x64 and ARM), will be hosted on the Windows Hyper-V hypervisor, or even be hosted by a Windows process.
MIDORI can be also seen as MICROSOFT'S answer those competitors who are applying "Virtualization" as a mean to solving issues within contemporary computing.

The main idea behind
MIDORI is to develop a lightweight portable OS which can be mated easily to lots of various applications.

IMPORTANCE OF MIDORI

For knowing the importance of
MIDORI you have to think about, how an operating system is loaded on a computer. Actually operating system is loaded onto a hard disk physically located on that machine. In this way, the operating system is tied very tightly to that hardware. As Windows is dependent on hardware, it might face opposition from contemporary ways of working because people are extremely mobile in using different devices in order get diverse information.

Due to this trend installing different applications on a single computer may led to different compatibility issues whenever the machine require updating. The new operating system will solve these problems by the concept of
Virtualizing. This will solve problems such as widespread security vulnerabilities, unexpected interactions among different applications, failures caused by errant extensions, plug-ins, and drivers and many more.

ERIC RUDDER, Senior Vice President, Technical Strategy

The importance of this project for
MICROSOFT can be understood by the fact that company choose Eric Rudder , former head of Microsoft's server and tools business and a key member of Chairman Bill Gates' faction of the company, to handle it.

Amazing Event - Two Planets Collided

Astronomers at UCLA, Tennessee State University and the California Institute of Technology have reported that two terrestrial planets orbiting a mature sun-like star some 300 light-years from Earth recently suffered a violent collision."

Astronomer are now writing a report on this event in December issue of the Astrophysical Journal.

ACCORDING TO ASTRONOMERS:

According to Benjamin Zuckerman, (Professor of physics and astronomy in UCLA), this collision was just like if Earth and Venus collided with each other,". It is the first time that Astronomers have seen such collision.
Co-author of the report and astronomer in Tennessee State University, Dr. Gregory Henry says, "If any life was present on either planet, the massive collision would have wiped out everything in a matter of minutes - the ultimate extinction event." After that collision a massive disk of infrared-emitting dust has encircled the star.

HOW THE REASEARCH CAME OUT:

Zuckerman, Henry and Michael Muno, were studying a star BD+20307 located in the constellation Aries and surrounded by a 1 million times more dust than is orbiting our sun. These astronomers gathered X-ray data using the orbiting Chandra X-ray Observatory and brightness data from one of TSU's automated telescopes in southern Arizona, hoping to measure the age of the star.

They thought that BD+20 307 was relatively young, a few hundred million years old , with the massive dust ring which signals the final stages in the formation of the star's planetary system. But Alycia Weinberger of Carnegie Institution of Washington announced that BD+20 307 is actually a close binary star means two stars orbiting around their common center of mass.

The new spectroscopic data collected after this announcement confirmed that BD+20 307 is composed of two stars, both very similar in mass, temperature and size to our own sun and they orbit about their common center of mass every 3.42 days. Further research also shown that these stars are much more older than estimated before. Instead of few hundred million years these stars are several billion years old.

The planetary collision in BD+20 307 was not observed directly but rather was inferred from the extraordinary quantity of dust particles that orbit the binary pair at about the same distance as Earth and Venus are from our sun. Henry said. "If this dust does indeed point to the presence of terrestrial planets, then this represents the first known example of planets of any mass in orbit around a close binary star."

BD+20 307: THE EARLIER THOUGHTS

Zuckerman and colleagues first reported in the journal Nature in July 2005 that BD+20 307, then still thought to be a single star, was surrounded by more warm orbiting dust than any other sun-like star known to astronomers. The dust is orbiting the binary system very closely, where Earth-like planets are most likely to be and where dust typically cannot survive long. Small dust particles get pushed away by stellar radiation, while larger pieces get reduced to dust in collisions within the disk and are then whisked away.

Thus, the dust-forming collision near BD+20 307 must have taken place rather recently, probably within the past few hundred thousand years and perhaps much more recently, the astronomers said.

NOW THE TWO IMPORTANT QUESTION IS:

After this all research the two most important questions before astronomers are:

1.) How do planetary orbits become destabilized in such an old, mature system?

2) Could such a collision happen in our own solar system?

According to some esteemed astronomers, there is small probability for collisions of Mercury with Earth or Venus sometime in the next billion years or more.


Collision

According to Zuckerman, major collisions have occurred in our solar system's in past. It is believed by many astronomers that our moon was formed from the collision of two planetary embryos - the young Earth and a body about the size of Mars - a crash which created tremendous debris, some of which condensed to form the moon and some of which went into orbit around the young sun. The collision of an asteroid with Earth 65 million years ago, which ultimately resulted in the demise of dinosaurs is also an example of such collision.

FUNDING

This research is federally funded by the National Science Foundation and NASA and also by Tennessee State University and the state of Tennessee, through its Centers of Excellence program.
Where do Your  antivirus rank???????These are topmost antivirus.............

1 BitDefender Antivirus
2 Norton Antivirus  
3 F-Secure Antivirus
4 ESET Nod32 Antivirus  
5 TrendMicro Titanium Antivirus
6 Kaspersky Antivirus 
7 Zonealarm Antivirus 
8 AVG Antivirus
9 McAfee Antivirus  
10 CA Antivirus 

My city....

Do You Know This????????????

1. Tips and Tricks To Increase Speed Of Computer (pc).
Problem:Computers seems to run faster when they have newly installed operating sustems but they keep on slowing with the passage of time.
Solution:
• Use Defragmentation softwares to increase the speed.
• Remove unneccessary programs from startup.
• Remove unwanted installed softwares from computer.
• Use a good antivirus program to protect your computer from viruses,worms and malwares.
• Clean the registry of the computer using a good software.
(Note:Donot edit registry yourself if you are no expert)
2.How to Consume Less Laptop battery And Increase Performance.
• Close unwanted programs running in background becuase these applications usually drain out your battery.Browser tabs use to consume a lot of memory of computer.So always close unnecessary browser tabs.Stop the bluetooth or wifi of the system if they are not required. 3.How to Enhance Gaming Experience On your Computer
Hey!!!!!!!!!!!!!!!!!!!!Exams are over now???????????

Friday, February 18, 2011

Do u Know how to create log file???????

Create a log

  1. Open Notepad
  2. On the very first line, type in ".LOG" (without quotes) then press Enter for a new line
  3. Now you can type in some text if you want, then save the file.
  4. Next time when you open the file, notice its contents. Notepad automatically adds a time/date log everytime you open the file.

Disable Windows XP login prompt


Too tired of logging on every time you turn on your personal computer? The good news is, you can disable the logon prompt and have Windows go straight to your desktop. However, this only works for home computers, which are usually not a member of any domain. In particular, the trick only works for local user accounts.
Now, the question might come up: Why do I need to do this while I can just delete my password? Setting a password for your account increases the security level of your PC. So it is a good practice to configure your account with a strong password, but you don't have to logon every single time by applying this trick.

Some people might get more curious: If I don't have to enter my password to login, that just means everyone can login to my PC? Not really, it is only true if someone comes to your PC, physically turns it on and uses it. Other than that, any access to your PC (i.e. via network, internet, etc...) would be restricted if no/incorrect password is provided.
Steps:

  1. From Desktop, Click on "Start" >> "Run".
  2. Then type in "control userpasswords2" and press Enter.
  3. Select your user account from the list.
  4. Uncheck the box for "Users must enter a user name and password to use this computer."
  5. Click "Apply" and "Ok".
  6. You'll be prompted for password, enter your password and you're all done!.



Jai Bhavani Jai Shivaji





॥ॐ॥ अजुनही बोथट झाली नाही धार शिवबाच्या तलवारीची ,कोणाच्यात हिम्मत नाही मराठ्यांना संपवण्याची ,घासल्याशिवाय धार नाही तलवारीच्या पातिला ,मराठ्यांशिवाय पर्याय नाही महाराष्टाच्या मातीला ॥ॐ॥

Jai Shivaji Maharaj

 Shivaji, the legendary Maratha ruler was born on February 19, 1627. He was the founder of the Maratha Empire, an empire that spread its wings across the breadth of what is now called India. Shivaji was the main driving force behind uniting the Marathas against the Muslim rulers in India. There are many stories attributed to Shivaji, all of which feed on the legend of the Maratha superman from the 17th century. One such, and the most famous of them all, is how he was imprisoned by Aurangzeb and yet managed to make his escape in the baskets of fruits that were sent out regularly by him to the people. The Maratha Empire he set up enjoyed its heydays during his time, spanning a period of over 30 years. The Maratha Empire stretched from the west coast, from the north of Goa to as far as the Punjab in the north. What makes his Empire all the more significant was that it was established right under the noses of the Mughals, Aurangzeb being the ruler during that time. He was respectfully called Chhatrapati.

Saturday, February 12, 2011

Merits (Advantages) Of Mozilla Firefox Browser

Mozilla firefox is an open source browser.It holds 23.81% of worldwide usage share of web browsers, and is just behind internet explorer(IE).IE has managed to stay ahead over firefox due to the fact that IE has been pre installed on the microsoft windows and most users even do not bother to search for some better web browser.In this post we will be analysing the merits and demerits of the firefox browser.
MEIRTS OF FIREFOX BROWSER:


Customizable:Firefox is best known for the freedom it provides to its user for the customization of the browser.User can apply themes of their own taste to the browser.The availability of themes is not at all a problem for firefox users.
Availability Of Plugins:Firefox has the maximum number of plugins as compared to other well known browsers such as google chrome and Internet Explorer.Plugins are easy to install and recieves updates frequently.It has a wide range of plugins like for web development,Search Engine Optimisation (SEO),User Interface etc available for downloads.
Browsing And Downloading Speed: Frefox claims itself to be fastest browser available in the market.We have found this fact to be completely true.With every new version of the browser we have found a significant increase in the speed of the browsing.The Inbuilt download manager of the browser is also capable of downloading at high speeds as compared to the inbuilt download managers of chrome and internet explorer which provides very slow speeds.But we certainly reccomend you to use some special download manager.
Open Source :Firefox is an open source browser.So its code is available to you.If you are a good programmer then you will be able to completely customize according to your needs and certainly this is a huge advantage over internet explorer.
Security:It is the most secure browser currently available in the market.The number of security bugs are far less in firefox browser as compared to other browser.

General Computer (pc) Tips And Tricks

These are general computer tips and tricks that are mostly operating system independent.They are useful on almost all window platforms windows xp,windows vista and windows 7.Below are some Pc tips and tricks.
1. Tips and Tricks To Increase Speed Of Computer (pc).
Problem:Computers seems to run faster when they have newly installed operating sustems but they keep on slowing with the passage of time.
Solution:
• Use Defragmentation softwares to increase the speed.
• Remove unneccessary programs from startup.
• Remove unwanted installed softwares from computer.
• Use a good antivirus program to protect your computer from viruses,worms and malwares.
• Clean the registry of the computer using a good software.
(Note:Donot edit registry yourself if you are no expert)
2.How to Consume Less Laptop battery And Increase Performance.
• Close unwanted programs running in background becuase these applications usually drain out your battery.Browser tabs use to consume a lot of memory of computer.So always close unnecessary browser tabs.Stop the bluetooth or wifi of the system if they are not required. 3.How to Enhance Gaming Experience On your Computer
• Gaming Experience on pc or laptop can be increased by switching the theme of the window to classic view.It frees up a lot of memory of the computer.The steps explained above will also help you to increase your gaming experience.A Software called 3d analyse

Friday, February 11, 2011

Tips And Tricks To Protect Yourself From Hacking

This is my first post on this blog and the indeed the most important one.In this post I will be covering the basic things you should know to protect your computer from getting hacked by some.Remember if you follow these guidelines it will be extremely difficult for a hacker to enter into your pc and to hack your data.As today everything from banking,business,studies etc is online so the threat of being hacked is becoming more and more dangerous.Ok,so listed below are the steps you should follow

youvebeenhacked Tips And Tricks To Protect Yourself From Hacking
Do Not Disclose Your IP Address
This the biggest mistake you could ever do.Never Disclose your IP address to anybody because ip address is the address of your computer.Once the hacker knows the address of your computer it will be easy for him Enter into your home(computer) and steal your accessories ( data and passwords).


Do Not Download any Suspcious Software or Attachments
A lot of people search for cracks and keygens online.Remember this is most exploited method used by the hackers to hack into the pc(personal computer).They usually attach a keylogger or virus with the crack or the keygen.Once you download and install it then your data will be automatically sent to the hacker without your permission.And this might lead to a disaster if you are a online business man because your sensitive information such as paypal account information,e-mail account information can be sent to the hackers.
Use Good Antivirus And Firewall Program

Do not depend upon windows firewall to protect yourself from online hackers.It is always a wise decision to use a good firewall program and do install a good antivirus program.If you dont have enough money right now go for the free antivirus and firewall program but make sure that you have a updated antivirus and a firewall
installed on your computer.


Use Secure Passwords (3D passwords)
Always use 3D passwords to protect your accounts from getting hacked.Your password must contain digits,special symbols like underscore( _ ) and characters.Do not use small passwords.Your password should be at least eight characters long in length.
Always logout From Your Accounts
You should always logout from your accounts instead of closing the browser window directly because whenever you login into your account a cookie is placed by the server into your account and when you logout this cookie is deleted.If you do not logout and the cookie is not deleted the hacker might gain access to this cookie and then he would be able to login into your account from his pc.


Make backup Of Your Data
Some viruses are made to destory your data so it is always advisable to store your data in a backup file.various good data backup programs are available on the internet.

Tricks To Reset Memory card Password In Nokia

f you have a symbian phone and you have forgotten your memory card then you can easily get your password by using this simple trick.This trick works only on nokia symbian phones not on the java phones.Before starting the tutorial on “Tricks To Reset Memory card Password In Nokia” Here are the the requirements
  • X-plore application (You can easily find its trial version for Free)
  • Nokia symbian mobile phone.
The X-plore application is used to view the data files of the phone.
Here Is the step by step tutorial For resetting the password.
1.       Install the X-plore application in your nokia phone.
2.       Now start your X-plore application and press 0(zero) button and select “ show the system files ”.This will make the X-plore application to show your system files.
3.       After completing the above step goto C:/Sys/Data/MmcStore
4.       Now press 3 button from your keypad and you will see options.Now click on the Hex-viewer option.This will make your phone to show files in hexadecimal.
5.       Look at the 3rd Column On the screen you will see a code like ! TMSD02G (c??”?x???6?2?6?2?6)  .Note down the numbers present between the ?.This is your memory card password.Like in this example the password is 62626.
6.       Now you can enter the password and view your memory card files or you can reset  your memory card password to a more memorable password.
Remember you can gain access to C:/Sys/Data/ if and only if you have set a password on your memory card

How To Open Docx Files Without Microsoft Word

This tutorial is for all those people who dont have Microsoft office 2007 and they want to open docx files.Microsoft introduced the docx format with the release of its 2007 office suit.All the files created in Microsoft office 2007 are by default in the format of docx,pptx,xlsx which are not compatible with the 2003 office suite of Microsoft.If you dont want to buy Microsoft office 2007 or you dont want to upgrade your office suite from 2003 to 2007 or 2010 version then in this tutorial you will learn that how we can use alternative freeware utilities to resolve this situation.
We are providing you with Four Solutions to solve this problem

1.Use Microsoft Office compatibility pack
Well this option is for only those user who have Microsoft office 2003 installed on their systems.Microsoft office compatibility pack will convert the docx format into a compatible format that can be easily opened with the Microsoft 2003 office suite.It is available for download directly from Microsoft official website.
2.Download Open Office
Open office is the default office suite for Linux users .It is available for downloading for windows,Linux as well as Mac users.It is available for free and as the name suggests it is also open source.It is also compatible with some other formats.
3.Dev Vicky world 2010 office suite
If you want to go for a very light weight application then go for this software.It is a freeware utility that can be used to open docx files.
4.Use Google Docs to open Docx Files
Google Docs is an online suite to view files on the Internet.You can upload your document into it and view it.Another method that you can use is that you send a gmail email to your own email id with the Docx file attached to it.When you will open this email gmail will give you an option to view this mail.

Hack Administrator Password In Windows 7,Xp And Vista

Most of us might have experienced a situation when we forget our Windows administrator password.And we are not able to login into windows and access our all necessary data and programs.At that time the only solution that comes into or mind is the installation of fresh copy of windows but this will lead to loss of all data and files that are in the windows drive.There is also another way around using which you don’t need to install a fresh copy of windows and without losing any data.We are providing here the method to reset windows administrator password.This tutorial is only for the purpose of recovering your windows 7,xp or vista password.This should be used only when you forgot or lost your password  and not for hacking into somebody else’s system.Using this hack  you can reset your administrator password or leave it blank.
By using this tutorial
1.You donot need to know anything about your old password.
2.You can unlock locked or disabled accounts.
3.Also edit the registry.
The requirements for using this method are:-
1.Blank CD/floppy disk.
2.Access to Internet.
3.Cd or floppy writer
These requirements can be easily fulfilled by spending 15 minutes in cybercafe or at friends computer
Now here is the step by step tutorial with screenshots on how to hack administrator password in windows 7,vista or xp.

1.Download this small utility.
Click Here To Download
2.You will get an zipped file with ISO image in it.Extract his image using winrar or inbuilt windows software.
3.Put your blank cd in CD-ROM and burn this using Nero or any other image burner software.this is most important step and make sure you burn the ISO image properly.
4.Now put this CD in the system whose password is to be reset.
5.Restart your system and when prompted press enter to boot from the CD.
offlinentpassword05upd Hack Administrator Password In Windows 7,Xp And Vista
Note:If you do not get prompt of boot from CD.Then restart you system and press f2 or f6 or f8 or Esc key(anyone of them should work for your system) before the booting of the windows start.Now you will enter into bios and you should change the boot order from here with the first preference as CD-ROM.And again restart your system
6.Now the software will load automatically.It will ask you to select the windows drive and after that provide you with the option of resetting password.

Trick To Bypass Trial Version Limitations In Any Software

Have you ever downloaded any trial version software and it may have expired before you could have tested it for its full capabilties.In this trick I will explain to how you can use the trial version of any software over and again so that you can test the software properly before purchasing its full version.Basically there are two type of restrictions put by the software companies on trial version of softwares.
1.Disable some features of the software
2.Time Bound limitations like 5-days Trial version
This trick can extend only  your time bound limitations hence provide you with the capability to use the trial version of the software for as long as you want.
Another big advantage of this trick is that it will increase your system security.For this trick we will be using a freeware software called sandboxie which very small(500 kb).It would protect your computer from malware andspywares to make changes to your system. Sandboxie runs the softwares in an isolated enviroment so that they cannot make permanent changes to your system.Here is the graphical representation of the programs running with sandboxie in memory.
frontpageanimation Trick To Bypass Trial Version Limitations In Any Software
frontpagelegend Trick To Bypass Trial Version Limitations In Any Software
Now,here is the step by step tutorial with screenshots on Trick To Bypass Trial Version Limitations In Any Software



  1. Goto http://www.sandboxie.com and download the software.
  2. Install and run it.
  3. Click on the Sandbox -> DefaultBox –> Run SandBoxed and then click on Run Any Program
  4. sandboxie111 Trick To Bypass Trial Version Limitations In Any Software
  5. Now a new window will popup.Click on Browse
  6. forefrontiagisa00024 Trick To Bypass Trial Version Limitations In Any Software
  7. Locate the setup of the trial software you want to install.Click on open
  8. forefrontiagisa00034 Trick To Bypass Trial Version Limitations In Any Software
  9. Install the software and run it.You will see # in the software tittle bar.It indicates that the software is running under sandboxie.
  10. forefrontiagisa00072 Trick To Bypass Trial Version Limitations In Any Software
  11. You will get the trial of the software and the trial version will expire after the time bound limitation is over.
  12. To reuse the software again after the trial version is over click on Click Sandbox –>DefaultBox andclick Delete Contents.
(Note icon biggrin Trick To Bypass Trial Version Limitations In Any Software onot let the software expire.Do these steps before atleast 1-day of the trial software is left.otherwise the above trick may not work )
    forefrontiagisa00092 Trick To Bypass Trial Version Limitations In Any Software
  1. This will open up a new window and delete all the files created, Press the Delete Sandbox button to fully clear the contents.
forefrontiagisa00102 Trick To Bypass Trial Version Limitations In Any Software
Now reinstall the software as mentioned above and you will again get the full trial version.
Note:
1.This trick will not work if you have already used the full trial version of the software without sandboxie.
2.Sandboxie may crash if you run very large programs with it

How To Install Windows Xp,Vista And 7 From Usb

You can install any version of windows like windows xp,vista,7,2003,2008 using usb drive.As usb have become very common and affordable these days everbody caaries a usb.This tutorial doesnot uses the command prompt method for installing windows from usb instead I will give you a new and a simpler method to install the windows from the usb drive.For this tutorial we will require the following things
  • Windows Dvd or it’s ISO image
  • Optical drive emulation software( like demon tools)
  • Wintoflash software
  • USB drive (minimum 4 gb)
All the software that we will be using in this tutorial are free and their downloads links are given in the post.
Here is the step by step tutorial with screenshots on How To Install Windows Xp,Vista And 7 From Usb


1.Download and Install Demon tools.Click here to download
(Note:Skip this step if you already have any other optical drive emulation software or Windows Dvd)
2.Mount the windows ISO Image using demon tools.
3.Now Download  Wintoflash Software.Click here to download
4.Extract Wintoflash rar folder and click on Wintoflash.exe.This software doesnot require installation.
5.Now click on Advanced Mode Tab in the Wintoflash window
6.It will give you various options.Select the one that you want to perform.
wintoflash1 How To Install Windows Xp,Vista And 7 From Usb
7.Now it will ask you for the path of your windows.Give the address of the mounted windows drive or the dvd drive(if you have windows dvd) and also give the path of the usb drive .
wintoflash2 How To Install Windows Xp,Vista And 7 From Usb
8.Click on Run.
9.It will warn you that you usb will be formatted continue with it and it will convert your usb into bootable windows usb drive.
10.Restart your computer and change the boot order in your BIOS .

Recover Deleted Data Using FreeUndelete Software


Many times it happens that we accidently delete some important data from our computer.In such cases data recovery softwares are very helpful but most of them are paid softwares.There are only few Free data recovery softwares available on the the internet and one of them is freeundelete.The other one is Recuva on which I have already written a post.
Before you use FreeUndelete or Recuva software I advise you not to transfer any data to that particular drive from which you have to recover data as it can reduce your chances of data recovery.
Now In post I will give you download link for the Freeundelete software and also highlight some of its main features.
Filesystems that are supported by freeundelete Software are:
  • NTFS 1.0 and 2.0 (Filesystems of windows NT,Xp,Vista,2000 and Windows 7)
  • FAT 12,FAT 16,FAT 32 (Windows 98)
Where are the recovered files stored?
The recovered files will be stored at the user specified destination

How To Use Mobile Number Portability (MNP) In India

Mobile Number Portability has already been launched all over India.Now the customers have more freedom and operators have more competition.For those who are unaware about MNP let me give them a brief introduction.
Mobile Number portability allows the customers to change their operator without changing there mobile number.This feature was first rolled in haryana and now it has been rolled all over India.
In this post I will try to answer all the queries of users about Mobile Number Portability.The issues that I am addressing in this post are:-
  • How To Change Mobile Operator?
  • How Long will it take to Switch to new Service Provider?
  • What are the charges of MNP?
  • Is MNP also available for Postpaid customers?
  • Can I migrate from Postpaid to prepaid using MNP?
  • Can I migrate from CDMA to GSM using MNP?
  • How Frequently  I can change my operator?

How To Change Mobile Operator?
To porting your mobile number to another operator you need a Unique Porting Code (UPC).So here is the complete steps of switching your operator
  1. Send a sms to 1900 in the following format
PORT <your Mobile number>
Eg:- PORT 94XXXXXXXX
  1. Now you will receive your UPC from 1901.It will be a 8 digit alphanumeric code along with the expiry date.It automatically gets expired after 24 hours.
  2. Now visit the new operator shop and fill a mobile number portability form there.
You will need to fill the following information
Your Mobile number
Your current operator
The UPC code that You received
  1. You have to submit your Address and ID proof’s.Your photograph and post paid bill (if you have a postpaid connection)
  2. Now purchase the new sim card from the new operator.
  3. Follow their instructions
  4. The maximum charge for this service is Rs 19
How Long will it take to Switch to new Service Provider?
It can switch between 24 hours to 4 days.Don’t worry your old connection will work until you are ported to new number.
The maximum time during which your number will not function is 2 hours and during night (12 pm-5 am).So it won’t affect you much.

4 Websites To Send Anonymous SMS Without Registration


There are a lot of websites on the Internet that provides free sms services but only handful of them allows you to send Sms without registration and anonymously.In this post I will review the services of 4 Sms websites that allows you to send Anonymous messages.
1. Smsti.in
Smsti.in allows you send message of complete 160 words and without any ads.There message service is very fast and you can even check the delivery reports of the sms that has been sent.
They provide their sms services for Indian Mobile numbers only.
2. Seasms.com
Seasms allows you to send messages all over the world.This is the only free Sms service that I found which all allows you to send worldwide messages anonymously.
They also provide 160 character support for SMS.
3.
Spicesms.com
Spicesms allows you to send sms only in India with 130 character support for sms.They service is very fast and sms are delivered instantaneously
4. Bollywoodmotion
Bollywoodmotion is one of the best sms website as you can send sms upto 500 characters long.
They do not include any ads into your message and messages are delivered in real time.This service is available only for Indian mobile numbers
If you know any other sms services that allows you to send messages without registration then do share with us by commenting.
NOTE:- Don’t send abusive messages to somebody using the above site as you can be traced .

Download Full Version Sonic Pdf Creator with Serial License Key


Sonic Pdf Creator is a professional and easy to use software for creating Pdf files.You can also watermark your pdf files and add password protection to your pdf files using Sonic Pdf creator.It also gives you the option for merging or splitting the pdf documents.It is compatible with Windows 98, ME, Windows NT 4.0, 2000, XP, Vista and Windows 7.
Here are some of the features of Sonic Pdf creator
  • Reliable PDF Creation
  • Document security
  • Advanced PDF Editing Features
The actual cost od this software is $74.95 but by using the promotional offer you can download the full version of sonic pdf creator with serial license key for free.
Here is the step by step tutorial on how you can the pdf creator for free.

Trick on How to Convert Firefox into keylogger

Do you want create your own working undectable keylogger and without any programming knowledge.The keylogger can store all the usernames and passwords of mozilla firefox without the user’s consent.
How this Keylogger Works?
Whenever you login into any website using mozilla firefox browser it always ask’s you whether you want to Save password or not for that website.
We will be using a script that will not give the user option to save the password instead it will automatically save the passwords without user’s consent and we will retrieve them later.
Can this be detected by antivirus?
I have scanned it with Mcafee,Norton and Avast and it is totally undetectable.
Does It work on all websites?
It is working on almost all websites like facebook,hotmail,reddit and digg.But this trick somehow failed on Gmail.
Now I will give you the step by step tutorial on how to use this trick
  1. Download this script here
  2. Now go to the following address
If you are Windows user then goto
C:/Program Files/Mozilla Firefox/Components
If you are MAC user then goto
Applications > Right click Firefox > Show Package Contents > Contents/MacOS/Components
  1. Now find a file nsLoginManagerPrompter.js and copy it to somewhere safe location because we will be replacing this file in next step.
  2. Extract the script folder that you have downloaded in first step and copy and paste the nsLoginManagerPrompter.js from the folder to the folder mentioned in step 2.
  3. So now your firefox keylogger is ready.Now Each and every username and password will be automatically saved.
The next step is to retrieve the username and passwords that have been stored in your firefox browser.

Convert Any Document or Web Page to PDF

Somebody just told you that you need to have Adobe Acrobat (Writer) to create a PDF file? Guess what, you can get away from that pricey piece of software if you just need to convert some documents to pdf, without a need of fancy editing the pdf document.
Here's how. Thanks to the BullZip, who provides a Free Pdf printer. With this free tool, you can simply "print out" your document or webpage to a pdf file, just about the same way as you print it out to a printer.

You can visit BullZip.com for more information about the software.
Here the direct link to BullZip downloads page: Downloads
  1. To get started, first follow the link above and download Free Pdf Printer from BullZip, then install it to your computer.
  2. Once you're done, you might need to close the program (or the web browser) which you're currently viewing the document. This helps refreshing the list of available printers on your computer.
  3. Once you get back to the document you want to convert, perform the same steps are you print out the document, i.e. File > Print ...
  4. When you see the Print window pop-up, select "Bullzip PDF Printer" under "Printers", then click "OK".
  5. BullZip PDF Printer will then start to analyze your document and display a new pop-up window, where you can direct it to the location you want to save the pdf file.
  6. Follow the pop-up windows and.. hola! The PDF document is created!

Audio CD versus MP3 CD

Audio CD
While some people are very knowledge about the different types of CD and DVD, some others are still very confused on the different formats. Although more and more people want to enjoy the MP3 technology by making their own MP3 discs for their cars, portable mp3 players, etc... many of them are not sure how to create a MP3 CD and how it is different comparing to a regular audio CD.
To make it simple, an audio CD (Compact Disc Digital Audio) is one that you buy from stores and contains only audio tracks. Audio CDs are compatible with most of current CD-drives, including your CD/DVD drive on your computer, and your car CD player. For little more details, this standard of Audio CDs is called the "Red Book", which was first released in 1980 by Philips and Sony.
The audio tracks are uncompressed digital data (essentially WAV). This explains why you can't fit 100 songs in an audio CD like an MP3 CD because the size of each track is big. Try to plug an audio CD into your computer CD/DVD drive, what you'd see are some files with the names similar to "track01.cda". These are audio tracks, and you can't just open them with your computer like any other computer file. A CDA file simply points to the location of the audio track on the CD. Also, you cannot copy these CDA files to another location with your computer. Why? because they contain no audio data, they are just the "pointer" files. The actual audio data is stored on the CD sectors and cannot be viewable on your computers.
An audio CD normally can hold up to 74 or 80 minutes of audio. So when you create an audio CD from some MP3 files, no matter how big or small your mp3 files are, the CD can only fit in up to 80 minutes of audio.
- Pro: Compatibility. Audio CDs can be played on most CD players/drives.
- Con: Size limit. You can't fit many songs into an audio CD.
Audio Spec

  • The frequency response: from 20 Hz to 20 kHz.
  • Bit rate = 44100 samples/s × 16 bit/sample × 2 channels = 1411.2 kbit/s (more than 10 MB per minute)
  • Sample values: range from -32768 to +32767.
  • On the disc, the data are stored in sectors of 2352 bytes each, read at 75 sectors/s.


MP3 CD
MP3 (or "MPEG-1 Audio Layer 3") is an encoding format for audio data. Not to be confused with "MPEG-3", which is a video standard. MP3 is an audio-specific standard that was introduced in 1991.
Late 1990s, the internet users started to encode more and more audio files using the MP3 format and spread them over the internet. This lead to the creations of many MP3 player software such as WinAmp, Nullsoft, etc... The MP3 format became the most popular audio format for computer because of the advantages of it.
An MP3 file is a compressed audio file. This brings the biggest advantage of the MP3 format: the small size. Although the size of each MP3 file is vary, depending on many factors, an average size of an MP3 file for a music track doesn't go more than 7 MB.
MP3 files are just like any other computer files. You can move them from place to place on your computer, or you can open them using different application software. Once it comes to the idea of making a CD out of these files, it can be a little confusing. Why? apparently, many people think that they're creating an audio CD instead, just because they are expecting a "CD with audio" at the end. In fact, an MP3 CD is not like an audio CD but like an any other computer discs: it contains data files, not audio tracks.
So what makes it a big deal? Many CD-copy software have different selections for "Audio" and "Data". The "Audio" option is for creating a standard CD with audio tracks, while the "Data" option can be used to copy either computer data or MP3 files. Remember MP3 files are just like computer data files!
Now the term "bitrate" might come up while you're playing with MP3, so what is it? Bitrate is the number of bits that are processed per unit of time. Simpler, it defines the compress ratio on the MP3 files. A lower bit-rate would give you a smaller MP3 file, but also.. less quality.

- Pro: Size! A CD with MP3 files can hold up to 700 MB of data/mp3 files. So with an average of 4-5 MB each MP3, you can store up to 160 songs on a CD, that's about 10 times of an Audio CD.
- Con: Compatibility. Although more and more players are compatible with MP3 standard, there are still some that only play audio CDs.

Create a Data File or Mp3 CD/DVD

This trick provides information how to create a data or Mp3 CD/DVD. Creating (or sometimes called "burning") a CD/DVD with just regular files and folder (or "data") is simple and can be done with any burning program.
The method to create an MP3 CD/DVD is actually the same as for data CD/DVD since the mp3 files are considered as normal PC files. So you can follow the steps on this page to create an Mp3 CD.

Detailed Steps
The following sample instructions use Free Easy CD/DVD Burner v1.2. This is a free burning tool with advertising supported, but no spyware or adware. You can download this program from SnapFiles.
  1. If you have not installed a burning program, download the tool above and install it. Make sure you reboot after the installation.
  2. Insert a blank CD/DVD.
  3. Open the Free Easy CD DVD Burner program.
  4. Click on the "Data CD DVD" button on the top.


  5. If you wish to add a folder to the CD, click on the "Add folder to project" under the "Action" menu on the left. This will add the folder AND all its subfolders and files. Or if you wish to add individual files to the CD, click on the "Add files to project"


  6. For folders, the window "Browse for folder" opens. For files, the window "Select your files" opens. Browse to and select the folder/files you want to add and click "OK" or "Open".

  7. The main screen of Free Easy CD/DVD Burner program comes back with the new folder/files added.


  8. Repeat with all folders/files you wish to add.

  9. Once you're done adding all the files and folders. Click on the link "Burn".


  10. The burning process starts and takes a few minutes depending on the size of files/folders you select and the speed of your burner.

How to Operate Mouse Pointer Without Mouse (Magic)

This trick is a user contributed. The information might have been copied and pasted exactly as what user posted.
Proceed at your own risks.


You have Mouse Problem ?? No Problem

I will give you suggestion

Press Left Alt + Left Shift + Num Lock Button + Ok

with the help of Numeric Keypad e.g ( Press and Hold the following Keys )


7   8    9

4        6

1   2    3

Find Product Key for Windows and Office

If you are looking for a way to retrieve the product keys of your MS Windows or MS Office, you are on the right page!
The following is a tool to detect the product keys of Microsoft Windows and Microsoft Office installed on your machine. This tool is free to download at Magical Jelly Bean.
Here's a screenshot


The tool also provides some nice features let you change your Windows product key, or detect the key remotely to another computer.

Create a bootable CD or DVD with or without floppy

With the CD-ROM available on almost every computer nowaday, floppy drives become a history. However, for those who find computers a hobby, might run into a situation when they need to create a bootable CD that works just like the old floppy disk. Unfortunately, to do this, you still need a floppy drive to read your bootup floppy disk. Wait, the good news is, you can just down load a bootable ISO image and burn it to a CD. And even better, we have a copy of an ISO image right here. You can download this image and follow the instructions below, or you can do a web search for more options.
The information on this article will guide you step-by-step how to create a bootable CD/DVD, either using a bootup floppy disk or a boot image file. You will end up having a bootable CD or DVD, with CD-ROM driver supported, that could startup your PC and bring up the command prompt. This is going to be a good starting point, then you can run other utilities such as hard drive ghost, etc..
Many current CD/DVD burning software support the bootable feature. If you already have your favorite burning software, look around to find the bootable option. For this article, I will use the steps and sample screen-shots with the burning tool called Nero.
You will need a boot disk (floppy) or a bootable ISO image to start. If you don't have one, you can download an ISO image here. This boot image is Windows-98 based, which means it uses the Windows 98 bootup sequence, which should do what we need. You can also download different boot disk images from the internet. I've found bootdisk.com has a very good collection.
I assume that you already have Nero installed. Also, it is highly recommended to use a rewritable disc so you can redo the process if you have to.

  1. Launch Nero Burning ROM
  2. At the New Compilation Window, select "CD" from the drop-down menu and select "CD-ROM (Boot)" for CD, (or select "DVD" and "DVD-ROM (Boot)" for DVD)




  3. If you use a bootup floppy disk, insert the floppy disk and select "Bootable logical drive..."


  4. If you use an image file, select "Image File" then click "Browse" to browse to the image.

    At the "Open" Window, browse to the location where you saved the boot image and choose the image you wish to use and click "Open" (you might need to change the "Files of type" to "All Files" in order to see files with different extensions.)


  5. Click "New" at the New Compilation Window.
  6. Nero New Compilation Window disappears and Nero brings up its main screen where you can add more files to the CD/DVD if you wish. For example, adding a "ghost" folder with the file "ghost.exe" as follows.
    Once you're done adding all the files you wish to, click on the "Burn" icon.



  7. At the "Burn Compilation" Window, select "Burn"!

Command Prompt on Right-Click

Many computer users, specially the programmers, need to launch a command prompt window every once in a while to execute some dos/shell commands. The problem is, when a command prompt window launched, the default path is normally the system path or the user profile's path. The users will then have to do all the "cd" commands to change the directories to the path he/she wants.
This trick shows you how to add an option called "Command Prompt" when you right-click on a folder in Windows. With this option, a Command Prompt Window will launch and its current directory will be the path to the folder you've selected.
Use this trick at your own risk.
Here's what you'll get:





The Solution
You can either edit your registry OR download the registry file and apply it on your computer.
Method I. Manually edit the registry:
  1. Start > Run
  2. Enter "regedit" and hit Enter
  3. Expand to "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shell"
  4. Right-click on "shell" and select New > Key
  5. Make sure a new key is created under "shell". Change the name of this key to "Command Prompt"
  6. Right-click on this new key "Command Prompt" and select New > Key
  7. Change the name of this key to "command"

  8. Here's what we should have:

  9. Double-click on the "(Default)" text on the right window to bring up the edit box
  10. Enter this text into the Value Data field:
    cmd.exe "%1"
  11. Click OK and close the registry.
Method II. Download and apply the registry file:
  1. Download this registry file Here
  2. Unzip it to a temp folder, then double-click on the .reg file to add the registry data.