tag:blogger.com,1999:blog-49165974897203284562024-03-13T05:56:41.736+05:30Computer trickscomputer trickzhttp://www.blogger.com/profile/06747006054943898428noreply@blogger.comBlogger160125tag:blogger.com,1999:blog-4916597489720328456.post-3947628652190979482011-06-25T20:14:00.004+05:302011-06-25T20:15:50.940+05:30Home Syringe and Needle Disposal<div dir="ltr" style="text-align: left;" trbidi="on"><div style="margin: 5px 3px;"><b><span style="font-family: Times New Roman; font-size: small;"><br />
</span></b></div><div style="margin: 5px 3px;"><span style="color: black; font-family: Times New Roman; font-size: small;">Provides for the safe disposal and destruction of syringes, needles, and other sharps in a home setting. There are approximately 3.7 million insulin-using diabetics in the U.S.A. alone as well as other home-bound patients with a wide range of other conditions. This category highlights some of the most safe and practical ways for individuals to dispose of this trash, including needle disintegration, pick-ups, drop-offs and even mailing home sharps to a medical waste incinerator.</span></div><span style="font-size: large;"><a href="http://www.postmedical.com/prod_voyager_features.html">diabetes needles</a></span><br />
<span style="font-size: large;"><br />
</span><br />
<span style="font-size: large;"><a href="http://www.postmedical.com/prod_leaktight_overview.html">sharps container</a></span><br />
<div style="margin: 5px 3px;"><br />
</div></div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-68244073828185931832011-06-25T09:21:00.000+05:302011-06-25T09:21:01.376+05:30Twimates-way to increase your social network<div dir="ltr" style="text-align: left;" trbidi="on">Twimates is a new site launched recently , this site has indescribably possibilities. Your social networking can be moved to next level using this site.<br />
<a href="http://www.twimates.com/images/logo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="82" src="http://www.twimates.com/images/logo.png" width="320" /></a>Here are a few things you can do<br />
* make other's follow you on twitter<br />
* make other's listed in your facebook fan page<br />
* make your site famous by luring visitors<br />
what else now they are expanding their horizon to youtube and digg.<br />
Now why are you waiting for create an account now<br />
<span style="font-size: large;"><b><i>here's the link </i></b><b style="color: red;"><a href="http://www.twimates.com/invite/6679">twimates</a></b></span><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
</div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-90481766347215182342011-06-19T18:02:00.001+05:302011-06-19T18:08:15.472+05:30i will se my website<div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: x-large;">Guys , am willing to sell my website.This site is ad sense optimized and is paged in all famous search engines , If you like my website you can contact me on gmail. my gmail id is <span style="color: red;">whiteshark.aru@gmail.com </span></span><br />
<span style="font-size: x-large;"><span style="color: red;"><br />
</span></span><br />
<span style="font-size: x-large;"><span style="color: red;"> </span></span></div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-9160439552836260022010-12-22T13:40:00.000+05:302010-12-22T13:40:47.457+05:30Nokia n9 phones a complete review<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7jk4dUXoEqagGXZFzIDryAm0chhLc6uhTju4ydelBmYv5fjkba295Ch9yWmbyHs2gySKHYigc83t4qS-Pwaxz05uA5SqXwdCELyB9ppSaz8DXZ1yFvSGhQSdTvi5red_nqOIvJybNLX7L/s1600/nokia-n9-buffalo.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="235" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7jk4dUXoEqagGXZFzIDryAm0chhLc6uhTju4ydelBmYv5fjkba295Ch9yWmbyHs2gySKHYigc83t4qS-Pwaxz05uA5SqXwdCELyB9ppSaz8DXZ1yFvSGhQSdTvi5red_nqOIvJybNLX7L/s320/nokia-n9-buffalo.jpg" width="320" /></a>Nokia N9 Review<br />
<br />
<br />
Nokia N9 – The Nokia N9 is not yet launched in India. This phone is expected to launch in October of 2011. Nokia N9 is a very attractive slim phone with QWERTY Keyboard and 4 inches touchscreen. Nokia N9 provide 8 mega pixel high quality camera of 8 mega pixel. Which is capable of capturing very clear pictures. This phone runs on Symbian ^3 based Operating System. Other features are given below. Nokia N9 Price and Technical Specification –<br />
<br />
Nokia N9 Photos<br />
<br />
<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZPuMKLfgka-_eWPFLkGmEN6IXdfLw28OQ2H10hzWr_RfQRiqG4dzjVjsLcfYFA6O0S64_kdGAlpPWdisUo-pLM3-yEcW670QPozsguihsv3b_w8qy501iWQfSVCZiJo5AorZ4sX5hJMi8/s1600/Nokia-N9-300x225.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZPuMKLfgka-_eWPFLkGmEN6IXdfLw28OQ2H10hzWr_RfQRiqG4dzjVjsLcfYFA6O0S64_kdGAlpPWdisUo-pLM3-yEcW670QPozsguihsv3b_w8qy501iWQfSVCZiJo5AorZ4sX5hJMi8/s1600/Nokia-N9-300x225.png" /></a></div><br />
<br />
Nokia N9 Specification -<br />
<br />
Camera & Display<br />
<br />
* Camera – 8.0 Mega Pixel, Resolution 3264×2448 pixels, Auto focus, Video, Geo tagging, LED Video light, Face & Smile detection VGA Secondary Camera for Video call, Dual LEd flash<br />
* Screen Display – 4.0 inches, 360×640 pixels<br />
* Color – Super AMOLED Capasitive Touch Screen with 16M color<br />
<br />
Special Features<br />
<br />
* QWERTY Keyboard<br />
* Accelerometer sensor (Auto-rotate)<br />
* Proximity sensor (Auto turn-off)<br />
* Touch sensitive controls<br />
* Dolby Digital Plus via HDMI<br />
* Tv out Via Composite & HDMI<br />
* Anodized aluminum casing<br />
* Multi-touch input method<br />
* Scratch-resistant surface<br />
* Voice Command, Document Viewer<br />
* Photo & Video editor, Flash Lite v4.0<br />
* Audio, Video Recorder & Playback<br />
* MP3, MP4 player<br />
* MP3, WAV Ring tones, Vibration<br />
* 3.5 mm Head Phone Jack<br />
* Speaker Phone, Downloadable Games<br />
* Stereo FM radio with RDS & FM Transmitter<br />
<br />
Message Support<br />
<br />
* SMS, MMS, Email, Push Email<br />
* Instant Messaging<br />
* T9 Input Method<br />
<br />
Connectivity<br />
<br />
* Connectivity Options – Bluetooth v3.0, Micro USB v2.0, Wi-Fi 802.11 b/g/n, GPS<br />
* Data Modes – 3G, GPRS, EDGE, WAP 2.0/xHTML, HTML, RSS feeds Internet Browsing<br />
<br />
Memory<br />
<br />
* Internal Memory – No<br />
* Expandable Memory- 32GB Micro SD/card slot<br />
* Phone Book – Unlimited Contacts, Photo Call.<br />
* Call Records – 30 days<br />
<br />
Battery Power<br />
<br />
* Standard Li-Ion Battery<br />
* Battery Life – N/A<br />
* Battery Talk Time – N/A<br />
<br />
Mobile Size and Looks<br />
<br />
* Size – N/A<br />
* Weight – N/A<br />
* Body Colors – VariousUnknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-64379916534145348942010-12-14T16:56:00.000+05:302010-12-14T16:56:02.748+05:30Ways to protect and locate your iPad<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRB7GRToC2ClCDUysPHuKWYjE8o9z5UwIbTK0t8rCrf2fkcgMYnSfbgH0MPsW714B6E-TEgzsVxhWs2DhslgX76YdUnQzJEmGQIxCeuyFCljed6TcnsaKshPxiQG4vhEjRT5Joolrh-0g6/s1600/ipad_touch_mock_up.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="242" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRB7GRToC2ClCDUysPHuKWYjE8o9z5UwIbTK0t8rCrf2fkcgMYnSfbgH0MPsW714B6E-TEgzsVxhWs2DhslgX76YdUnQzJEmGQIxCeuyFCljed6TcnsaKshPxiQG4vhEjRT5Joolrh-0g6/s320/ipad_touch_mock_up.jpg" width="320" /></a></div>If you are like me , then there is a good possibility to loose your iPad . But now there is a way to find the iPad you lost using the mobileme service, and thus you can control your iPad with it. This service is also helpful if someone have stolen your iPad. Here i will illustrate the step by step way to recover your ipad using this feature<br />
<br />
<b>1</b>. First the most important thing is to make sure " find my iPad" feature is enabled in your iPad.<br />
<b>2</b>.Then if it's active go to me.com account<br />
<b>3</b>. now select "Find my iPhone " option available in the left pane<br />
<b>4</b>.There a map showing your iPad location will be visibleUnknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-75924053141454380392010-12-04T23:02:00.003+05:302010-12-04T23:06:25.628+05:30How to add orkut badges in orkut profileOrkut had added a new badge addon for orkut users. It helps orkut users to flaunt how active they are . There are for start 8 badges.<br />
<b><br />
</b><br />
<b> Early user </b> : For users who have been using orkut for more than 5 years<br />
<br />
<b>Millionaire community</b> : For users who own a community with more than a million users<br />
<br />
<b>Graduate </b> : For user's who use most of orkut features<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMwwGlFLYedL4YCOXr8lKVM-huHoeunFiOJOoiPfJUSuQgPMNGKULtN2EQ084CrWWmKgW1FIZ-39w0TkFlUPJsSR2VCwQY9F1hc9N0RbHLbMYKn_EniraZF3Ct8UP_K6znPeCsz9K5SpcA/s1600/orkut_badges.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="135" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMwwGlFLYedL4YCOXr8lKVM-huHoeunFiOJOoiPfJUSuQgPMNGKULtN2EQ084CrWWmKgW1FIZ-39w0TkFlUPJsSR2VCwQY9F1hc9N0RbHLbMYKn_EniraZF3Ct8UP_K6znPeCsz9K5SpcA/s200/orkut_badges.png" width="200" /></a><b>Master </b> : For user's who have mastered most of orkut features<br />
<br />
<b>Promoter </b> : For user's who have created promotion which<br />
was seen by alot of users<br />
<br />
<b>Trend setter </b> : For user's who have got lots of comments<br />
from other users<br />
<br />
<b>Super User </b> : For users who have helped many in orkut forrum<br />
<br />
<b>Strong contributor</b> : For users who have helped orkut make it better for users<br />
<br />
These are the 8 badges now available you can add the badges from the profile menu. In profile menu there is a new tab add badges . Use that to add the badges that are for you.See the pictures below to see how to add badges in profile.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwbR-kJAMsSVvVl7-UDJsW3GBeRB7ZLrXVe3t6cpJ51uFj1pQF3vgKWEW-BjWZ52XeBIiE0a47OT1uA-IgA48ZEl4GQDC6GSEKYEl_e3bDA5Sc7McsXokEZ0C80iP7qxjO40WmCQEXGPOx/s1600/untitled.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="117" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwbR-kJAMsSVvVl7-UDJsW3GBeRB7ZLrXVe3t6cpJ51uFj1pQF3vgKWEW-BjWZ52XeBIiE0a47OT1uA-IgA48ZEl4GQDC6GSEKYEl_e3bDA5Sc7McsXokEZ0C80iP7qxjO40WmCQEXGPOx/s400/untitled.jpg" width="400" /></a></div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT8JjFSW2jF76GR1BKEJrxk2b37Jm8O1FCDKetHh5ESkUSXODUa7cKzXsHHQWlIhPvaGUQavC2NbvQf8-Hgj2etQOV8l-NqQE9ZeoyW_MtmmN-a10tGhhrV5OQcqXN91_PmkzctPlHr2rQ/s1600/222.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT8JjFSW2jF76GR1BKEJrxk2b37Jm8O1FCDKetHh5ESkUSXODUa7cKzXsHHQWlIhPvaGUQavC2NbvQf8-Hgj2etQOV8l-NqQE9ZeoyW_MtmmN-a10tGhhrV5OQcqXN91_PmkzctPlHr2rQ/s320/222.jpg" width="320" /></a>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-54714148118112294822010-12-04T22:24:00.004+05:302011-06-16T23:08:28.506+05:30God mode enable control panel in computer desktop<div dir="ltr" style="text-align: left;" trbidi="on"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVd7L2lO6L4AP9d2fA3ZOX_qctd_CCSZUXf00HCm8BKDznwQfESA5Uy3RMs8bnWj4r1fD0BUecsk9Xh8-gOpsSSR7pHDn8f9eKHqJExJWna9r4D8vXg3pC-fFBQBBuqVx7cXIGWP_4B6BM/s1600/index.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="254" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVd7L2lO6L4AP9d2fA3ZOX_qctd_CCSZUXf00HCm8BKDznwQfESA5Uy3RMs8bnWj4r1fD0BUecsk9Xh8-gOpsSSR7pHDn8f9eKHqJExJWna9r4D8vXg3pC-fFBQBBuqVx7cXIGWP_4B6BM/s320/index.jpg" width="320" /></a><span style="font-size: large;"><b>windows 7</b></span> has become the number one operating system by par. Its really user friendly and comes with alot of userfriendly addons. And in windows you can create a folder in god mode.<br />
God mode is actually creating a master control panel listing all the options in your desktop, Its a great tool for any computer users<br />
You can create god mode folder by following the steps below :-<br />
<br />
1. Create a new folder (right click your mouse click new--> folder ) preferably you can create<br />
colder in desktop itself for ease of use.<br />
<br />
2.Rename the folder as: <br />
<i><b>godmode.{ED7BA470-8E54-465E-825C-99712043E01C}</b></i><br />
(right click mouse in the folder-->rename)<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ_MiedHQnSVVuJy_Y3y8aalTHfuP6tB722jXTy7iLvLbKVn1cYub774Bg-81S9eHuAs8dHb2_iqQWbxevABX8IE2uTtrb4FAy4NmKRa33riT6u2GCVScdlVjoWzXF7j8dOAcP8-4jxMOI/s1600/images.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ_MiedHQnSVVuJy_Y3y8aalTHfuP6tB722jXTy7iLvLbKVn1cYub774Bg-81S9eHuAs8dHb2_iqQWbxevABX8IE2uTtrb4FAy4NmKRa33riT6u2GCVScdlVjoWzXF7j8dOAcP8-4jxMOI/s1600/images.jpg" /></a></div><br />
3.After that the folder icon will change and you can have dozens of control options. <span style="font-size: large;"><b></b><br />
<span style="font-size: x-large;"><b><a href="http://www.abctaxis.co.uk/">Crawley minicabs</a></b></span><br />
</span></div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-936106219381777332010-12-03T16:22:00.001+05:302010-12-03T21:58:43.811+05:30DDoS attack wilileaks struggling<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAy5M7XzI6ukn-uzLAdEc_IbXNboHMY-Tu-vPcbMUmKcJKzwttgYVowRDxiJjt8e-D9zc4iHxcwBE3RKJ2w4VOaFAz1peaAFTPsPfxyJGR2_em7WYwJAqAjSXsmQSUh-5faIxGOPw6gZsu/s1600/sitenew.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAy5M7XzI6ukn-uzLAdEc_IbXNboHMY-Tu-vPcbMUmKcJKzwttgYVowRDxiJjt8e-D9zc4iHxcwBE3RKJ2w4VOaFAz1peaAFTPsPfxyJGR2_em7WYwJAqAjSXsmQSUh-5faIxGOPw6gZsu/s1600/sitenew.jpg" /></a></div><br />
WikiLeaks has been struggling to fend off a DDoS attack ever since it started leaking secret embassy cables, and now it lost one more ally: its DNS services provider, EveryDNS.net.<br />
<br />
According to a statement from EveryDNS.net, the services were terminated as the DDoS attack on WikiLeaks started to be a threat to the service itself and its other users.<br />
<br />
“EveryDNS.net provided domain name system (DNS) services to the wikileaks.org domain name until 10PM EST, December 2, 2010, when such services were terminated (…) The interference at issues arises from the fact that wikileaks.org has become the target of multiple distributed denial of service (DDOS) attacks. These attacks have, and future attacks would, threaten the stability of the EveryDNS.net infrastructure, which enables access to almost 500,000 other websites,” the statement read.<br />
<br />
This has effectively wiped WikiLeaks off the internet, which is now completely inaccessible. WikiLeaks has confirmed this on its Twitter account, putting emphasis on the fact that EveryDNS.net is a U.S. company. “WikiLeaks,org domain killed by US everydns.net after claimed mass attacks,” the tweet readUnknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-8914074478836502842010-12-03T09:05:00.001+05:302010-12-03T09:06:12.243+05:30vpn masters a review<div class="separator" style="clear: both; text-align: center;"><a href="http://www.vpnmaster.com/images/ban3.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="http://www.vpnmaster.com/images/ban3.jpg" width="182" /></a></div>VPN masters is a great site emerging in the cyber world .They are committed for qualities.Top class services,top class support are their specialities.They are experts in vpn technologies and they value your privacy very much. <a href="http://www.vpnmaster.com/">Buy VPN accounts</a> now itself.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-90006930079353809612010-12-02T23:21:00.002+05:302010-12-25T07:10:19.821+05:30Prizelive hack a new site for earning money and free gifts<div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEim7Fd_SVBpeMo-FDpzMu_rIx4smy5TThWEb28Kl5xyShFZlvJhM4l81DNQDF9mLhifizhLw5lpUf3TpXHcW30mEycY5TdsxNHSNBQkvi145BT13pvFGIonnxDMKQ-IwiOaI5EC5rkegEgx/s1600/prize_hack.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="113" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEim7Fd_SVBpeMo-FDpzMu_rIx4smy5TThWEb28Kl5xyShFZlvJhM4l81DNQDF9mLhifizhLw5lpUf3TpXHcW30mEycY5TdsxNHSNBQkvi145BT13pvFGIonnxDMKQ-IwiOaI5EC5rkegEgx/s320/prize_hack.jpg" width="320" /></a></div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkhuqidZN7PhZBPTIGVyaDq5GboY9BDmJMBTTTFfCKEDT5pSJ4-Tddphu3srQ7K0vZL2-mfZk95wtx3noR4Lqst_Yaro5X3whXctmmRVlnpP0wJxUnK0vH0QZTAROpEGT2-SUfkWeaCE0g/s1600/prize_trick.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkhuqidZN7PhZBPTIGVyaDq5GboY9BDmJMBTTTFfCKEDT5pSJ4-Tddphu3srQ7K0vZL2-mfZk95wtx3noR4Lqst_Yaro5X3whXctmmRVlnpP0wJxUnK0vH0QZTAROpEGT2-SUfkWeaCE0g/s1600/prize_trick.jpg" /></a><br />
Prizelive is a new site for earning money from internet.You get paid for signing up on the site and doing daily surveys in it.The site also offers money for playing games. " Isnt that exciting...!<br />
Well then to make it more exciting,We have found a glitch in the site with which you can get bypass the surveys and earn alot of money in quick time.<br />
First you have to sign up with prizelive. Thenin the daily survey option click on each survet\y one at a time. In the URL there will be something lik "ptid=19 , change that to ptid=23. Then exit out of the survey. you are done. then clear your cookies,and move to next daily survey.<a href="http://forumbuzzr.com/">forums</a><br />
Enjoy big earnings from the site...Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-91696345651957798602010-11-29T10:45:00.000+05:302010-11-29T10:45:41.575+05:30blog softwares and hosting for newbies<a href="http://rsstoblog.com/images/rsstoblog-large4.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="320" src="http://rsstoblog.com/images/rsstoblog-large4.jpg" width="307" /></a>Blog software or so called blog ware or blogging software are special software designed to create bolgs in most efficient way semi automatically. They help in creating , editing new blog posts and moderating comment management system. Most of the blog software are free and open sourced which you can download from internet.And there are some which are offered by developers itself like wordpress. Which are either free or for a fee..Gawker Bespoke software , wordpress , and blogsnith are most widely used blog software.<br />
<br />
For blog hosting for a newbie its better to start with hosgator's hatching plan.i suggest this one because its very much affordable and as your revenue increases you can upgrade your plan to " baby plan " which in turn helps you in hosting multiple websites.And always remember to have coupon tickets to get discount .<br />
Enjoy blogging....Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-64262149306201760782010-11-25T22:28:00.000+05:302010-11-25T22:28:32.845+05:30Google gmail notifier download and working issues<a href="http://www.lif3.com/wp-content/uploads/2009/11/Google-Wave-Notifier.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="182" src="http://www.lif3.com/wp-content/uploads/2009/11/Google-Wave-Notifier.jpg" width="320" /></a>google gmail notifier is a new application of google for gmail users which notify you with a pop up when a new meail has arrived to your mail id . You can access then from your system tray always. When you have unread messages in mail it shows then along with the sender's name subject etc , all without you browsing into your mail id. It is also compatible with windows 7 and are ready for download.<br />
<br />
And along with it popularity some are facing some problems with it.If you try to connect and get an error like " "Cannot connect to your Inbox. Service Temporarily unavailable."<br />
check if your POP3 and IMAP is enabled pn your gamil account. If the problem still persist check if your HTTPS is always enabled on the general tab of your settings, if yes turn it off.because most times gmail notifier fail to work when HTTPS is turned on. Also you can try google talk lab edition too..<br />
<a href="http://www.google.com/talk/labsedition/">google talk lab edition</a>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-26816891442354941752010-11-25T22:01:00.000+05:302010-11-25T22:01:04.280+05:30Facebook login problems and phishing issues<a href="http://tothepc.com/img/2010/05/facebook-login-problem.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="216" src="http://tothepc.com/img/2010/05/facebook-login-problem.png" width="320" /></a>Facebook has turned out to be the biggest social networking site in internet now.And thus tons of people are facing login problems in facebook these days. So i thought of wroiting a post for helping those who are having login issues.<br />
Mainly these login issues are caused either by your mistakes or login errors. Always remember your facebook password, And if you think the password you entered is right then it may be due to the cookie problem in your computer, try to enable the cookie in your browser. Always remember to sign out of your account before you move out of facebook .<br />
If you think your password has been stolen then try to recover it using the recovery option in facebook. passwords are generally stolen by hackers using phishing. Phishing is the method of sending a fake login page inorder to make users unknowingly give away their passwords These days phishing is very common in facebook, many are giving the complaints to us that their account has been hacked . As its said prevention is better than cure. So better never login with your facebook account in any suspicious siteUnknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-31974798032590981002010-11-24T09:02:00.000+05:302010-11-25T15:19:27.709+05:30ICICI bank account phishing email link<div class="separator" style="clear: both; color: #660000; text-align: center;"><b><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiik9Ub1ob6c0PQUKA8QYJMIHWC_Wvmp9aByzg0JnDJhLdan6do2v31QAY566rDureet6rmafw9j4Z6iJ7obqNljk01xTXMcX9ZtmzJDtsOUCsmVnUxceChyphenhyphenBPLPG0dQBTP0K9mXPp4DzGc/s1600/phishing_icici.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="phishing link" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiik9Ub1ob6c0PQUKA8QYJMIHWC_Wvmp9aByzg0JnDJhLdan6do2v31QAY566rDureet6rmafw9j4Z6iJ7obqNljk01xTXMcX9ZtmzJDtsOUCsmVnUxceChyphenhyphenBPLPG0dQBTP0K9mXPp4DzGc/s320/phishing_icici.jpg" title="icici email hack" width="320" /></a></b></div><div style="color: #660000;"><b>ICICI Bank phishing email on high in internet . yes lately emails acting themselves as ICICI representatives and manipulating users data has been flooded on internet.. They send you a link which is said to be from ICICI bank .They are phishing emails from hackers. </b><b>These mails are from "alert@icici.com" And there will be an attatchment in the mail as "ICICI-SECURITY.html" . Its a spam mail and will steal your account details. So if you get a mail like that dont open it or click on the links that they have given.When you open the download link provided you will go to a page with ICICI bank logo,its a phishing link and the moment you click it you be directed to the following site </b><b> "www * bonusatm * com / w1nw1n / hexx*php"</b></div><div style="color: #660000;"><b>So be cautious while you surf the email</b></div><div class="separator" style="clear: both; color: #660000; text-align: center;"><b><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEZma1HOSBndZnH_ucaw6-WuYJSwtmTU1O-_5LhoKen0PvdjC8jigbe1Z9nPOf9gFMDvIvdDfm2hdTXgZiblTLi3o-t2D1zE0DcWRTUcVk8HnoTkT2BVDOM6qkzxtzFgsa_mE67M4_1EAS/s1600/icici_fake_mail.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="387" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEZma1HOSBndZnH_ucaw6-WuYJSwtmTU1O-_5LhoKen0PvdjC8jigbe1Z9nPOf9gFMDvIvdDfm2hdTXgZiblTLi3o-t2D1zE0DcWRTUcVk8HnoTkT2BVDOM6qkzxtzFgsa_mE67M4_1EAS/s640/icici_fake_mail.jpg" width="640" /></a></b></div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-81064534652116466882010-11-24T06:47:00.000+05:302010-11-24T06:47:09.148+05:30what are proxy chaining http and browser chaining<div style="color: red;"><span style="font-size: large;"><b>Proxy Chaining</b></span></div><br />
Proxy chaining is merely connecting to more than one proxy and then to your intended destination. You can use as many proxy servers as you can or want. The more you have, the more anonymous you will be. Remember, it doesn’t matter how many proxies you chain together, you will never be 100% anonymous. Let’s look at an example…<br />
<br />
[User]>>>>>[Proxy1]>>>>>[Proxy2]>>>>>[Proxy3]>>>>>[Proxy4]>>>>>[Destination]<br />
<br />
<a href="http://www.proxyserveragent.com/IMAGES/PROXY-SERVER-AGENT.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://www.proxyserveragent.com/IMAGES/PROXY-SERVER-AGENT.jpg" /></a>The example shows that for a proxy chain to be created, the user must first connect to Proxy1. Once the user is connected to Proxy1, from Proxy1, the user will connect to Proxy2, from Proxy2, the user will connect to Proxy3, from Proxy3, the user will connect to Proxy4, from Proxy4, the user will then connect to the intended destination (web page, Unix server, ftp server, etc.). All together we have 4 proxies in this example. Each proxy is a link in the chain. If the user would be scanned while on the proxy chain in the example, the IP address or domain of Proxy4 would appear on the scan. Now the problem with proxies is they tend to “die out” in a few weeks or less. It all depends. So if Proxy2 were to cease functioning, the chain wouldn’t work. You would need to get rid of Proxy2 and just use Proxy1, Proxy3, and Proxy4 or find another proxy to take Proxy2’s place. This is why proxy chaining can be a real pain if you are using them just to surf the net. If one dies, you have to figure out which one is the one not working, so you have to go through each one to check them or until you find the one that isn’t working.<br />
Proxy chaining is a necessity if you plan on using proxies to execute a “hack”. If you are attempting to gain unauthorized remote access to any server, whether it is through telnet, ftp, or http, chaining is a must. As I said, you will never be 100% anonymous no matter what you do online so it is possible that you still can be tracked even if u chain proxies. Chaining just makes it a lot hard to track someone. To make it even harder, its best to use foreign proxies because if someone wanted to trace you, they would need to get logs of your use of each proxy from each proxy administrator. This could take quite a while or even never at all if one of the proxy’s, or all for that matter, belong to an admin in a country that isn’t too fond of the country you are located in. The longer it takes for the authorities to subpoena the logs of your usage of a single proxy from that proxy’s administrator, the more chance that the other proxies that you used in the chain will have their logs deleted by the time anyone gets to the server administrators of those proxies. So when attempting to do any kind of “hack”, it’s best to use at least five or six proxies in a chain<br />
<br />
<br />
<br />
<div style="color: red;"><span style="font-size: large;"><b>HTTP Chaining</b></span></div><br />
HTTP chaining is basically chaining a proxy server in your browser’s address bar. Example:<br />
<br />
http://*proxy.magusnet*.com/-_-http://www.*google*.com<br />
<br />
Notice how the above proxy and destination (yahoo) are seperated by a (-_-) If you wanted to make a chain out of this you would simply add another proxy ex. ( http://*proxy.server1.*com/-_-http://*proxy.server2.com*/-_-http://*www.destination*.com)<br />
<br />
Another way to use proxys in your address bar is by adding the proxy IP or domain then the port number. Example…<br />
<br />
http://anon.free.anonymizer*.com:80/http:*//www.*google*.com<br />
<br />
Notice how the above proxy and destination server are seperated this time by a (/) forward slash instead of a (-_-) dash, underscore, dash. To make a chain out of this you would again simply add another proxy ex. ( http://proxy1*:80/http*://*proxy2:80/proxy3:80*/http*://www.*yahoo*.com)<br />
<br />
Remove * <br />
<br />
<br />
<br />
<div style="color: red;"><span style="font-size: large;"><b>Browser Chaining</b></span></div><br />
To browser chain is fairly easy. I’ll use Internet Explorer as an example since I believe it is the browser that most people have and use. First you need to find the Internet Options. You can do this by either finding the Explorer icon on the desktop, right click on it, then press properties or if you have a browser window already opened if you are online then you can go to Tools (or sometimes its View) and press Internet Options. Now that you have the Internet Options window up you can now go to the Connections tab, then go to the first Settings button (not LAN Settings, the one above it) and click it. Now you should be in the Settings box. Put a check in the box where it says to Use a proxy server. Now if you wanted to surf using one proxy you would merely put the proxy in the Address: space and put the proxy’s port number in the Port: space. To use a chain here you would put in a proxy along with a “:” colon then the port number followed by a space separting the next proxy then a “:” colon then the port number then a space and so on. The last proxy you add should have its port number placed inside the Port: space. If you did it, then it should look like this exactly…<br />
<br />
Address: 213.234.124.23:80 121.172.148.23:80 143.134.54.67 Port: 80<br />
<br />
***Notice that each proxy:port is separated by a space and that the last proxy has its port number placed in the Port: space. Do not check the box marked “Bypass proxy server for local addresses”. Press OK when you see that everything is in working order***Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-10344437930023061002010-11-24T01:07:00.000+05:302010-11-24T01:07:49.950+05:30Everything you needed to know about proxy servers in internet<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFB4sSNKLOeuwAFGqRDL4aZD-b2mZKZjxTEa02BDaDTHFzfGJN6tFD0LjSozqKsTrEzYAZYamvgf6Eerg6WBjtFORhnNAABfQUGt-8jrb0y2vWSTZBbPBw3aasCMxT4haXbFBUYBpZ1BfA/s1600/proxy_sites_list.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="216" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFB4sSNKLOeuwAFGqRDL4aZD-b2mZKZjxTEa02BDaDTHFzfGJN6tFD0LjSozqKsTrEzYAZYamvgf6Eerg6WBjtFORhnNAABfQUGt-8jrb0y2vWSTZBbPBw3aasCMxT4haXbFBUYBpZ1BfA/s320/proxy_sites_list.jpg" title="list of proxy sites"
alt="proxy sites list" width="320" /></a><span style="font-size: small;">A proxy is a server that acts as a gateway between your computer and your destination (website, IRC chat, etc.). These proxy receive requests from users to view, for example, a web page in internet. The proxy will then forward the request to the internet, find your requested page, then send the web page back to you, the user. Most proxies come with a cache (sounds like “cash”) feature that saves former websites that were visited on that proxy. Think of cache as a proxy’s storage room. Each site that you make the proxy visit, it saves in its own storage area (cache). So if the user or someone else requests the same site again later on, the proxy will go back into its cache, find the web page and send it back to the user. This saves time because the proxy doesn’t have to go search the Internet for the web page. It just pulls the site out of its cache.<br />
<br />
The use of proxies to stay anonymous is a favorite thing to do among people on the Internet who are either paranoid or just security conscious. The anonymity factor comes from the proxy’s ability to hide your true Internet address. For example, if I were to run a scan on your computer right now, I would get the Internet address that was given to you by your ISP (internet service provider), but if I were to scan you while you were using a proxy, then I would get the Internet address of the proxy server. Basically the whole proxy picture looks like this…<br />
<br />
[User]>>>>>[Proxy]>>>>>[Web Pages]</span>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-44620210966461776302010-11-24T00:56:00.000+05:302010-11-24T00:56:39.316+05:30How to see infrared rays using mobile camera<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjv6z_TNC7241a9o7cL5V0OcKMxp6MiHP_6PACbn41Hal2qG0uohHOAm-RMl7TzLDlgQJY5jpv6QhTZpyNNJjA81pvKcEtdnfQju5oUHJpc6MlgKFhehXSsn0yLbAH8eXb8Cs_hSlpfhiFM/s1600/nokia_mobile.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjv6z_TNC7241a9o7cL5V0OcKMxp6MiHP_6PACbn41Hal2qG0uohHOAm-RMl7TzLDlgQJY5jpv6QhTZpyNNJjA81pvKcEtdnfQju5oUHJpc6MlgKFhehXSsn0yLbAH8eXb8Cs_hSlpfhiFM/s1600/nokia_mobile.jpg" /></a>Did you know you can see infrared rays using your mobile cameras? well in fact you can.. For seeing infrared rays all you need is a remote control , a camera mobile set. First turn on the camera of your mobile set , then see the end of the TV remote with your camera while you press any button on the remote, that is use the end of the remote which you face towards the TV while using it. The infrared rays coming out of the TV remote makes a beam of beautiful coloured rays<br />
<br />
enjoy it guys...<br />
<br />
<br />
<br />
<span style="color: red;"><b> See the end of the TV remote with your camera while u press any button on the remote [The end of the remote which u face towards the TV while using it</b></span>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-28132224752891812552010-11-23T16:42:00.000+05:302010-11-23T16:44:24.172+05:30Protect computer from virus easily<div class="separator" style="clear: both; text-align: center;"><a href="http://www.howtovanish.com/images/computer-virus.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="252" src="http://www.howtovanish.com/images/computer-virus.jpg" width="320" /></a></div>Computer viruses are deadly. They often spread without any apparent contact and can be a nuisance, or even worse, fatal to your computer. Individuals who create these viruses, estimated at 10-15 new ones a day, are the electronic version of terrorists. Their goal is to inflict havoc and destruction on as many people as possible by disabling, stealing, damaging, or destroying computer and information resources. Often, they have no specific target in mind, so no one is safe. If you access the internet, share files or your computer with others, or load anything from diskettes, CDs, or DVDs onto your computer, you are vulnerable to viruses.<br />
<br />
Fortunately, there are good guys working just as hard as the hackers to develop cures for viruses as quickly as they send them off into cyberspace. And there are many things you can do to keep your computer from catching viruses in the first place.<br />
<br />
Defining Viruses:<br />
<br />
A virus is a small computer program that can copy and spread itself from one computer to another, with or without the help of the user. However, viruses typically do more than just be fruitful and multiply, which is bad enough in itself because it hogs system resources. Anything else viruses are programmed to do, from displaying annoying messages to destroying files, is called their payload. Often, they cannot deliver their payload until an unsuspecting user does something to make the virus execute its programmed function. This could be as simple as clicking on an innocent looking file attachment with the .exe (executable) extension.<br />
<br />
Catching a Virus:<br />
<br />
Most viruses are spread through e-mail attachments because it's the easiest way to do it. Although Macintosh, Unix, and Linux systems can catch viruses, hackers are particularly keen on exploiting the security weaknesses in anything Microsoft, particularly Microsoft Outlook and Outlook Express. Because of the popularity of this software, hackers get maximum bang for their buck, and they probably get some satisfaction from continually reminding Microsoft that being big doesn't mean you're perfect.<br />
<br />
Solution 1: Anti-virus Software<br />
<br />
Your first line of defense is to install anti-virus software. To be extra safe, also install firewall software, which is now included in some anti-virus packages. This software can scan all of your drives for viruses and neutralize them. Here are some features to consider when evaluating anti-virus software.<br />
<br />
- Compatibility with your operating system - Make sure the software works with your system, particularly if you are using an older operating system like Windows 98.<br />
<br />
- Firewall software - If it's not included, find out if it's available. If you must, buy it from another vendor.<br />
<br />
- Automatic background protection - This means your software will constantly scan behind the scenes for infections and neutralize them as they appear. This provides some peace of mind.<br />
<br />
- Automatic, frequent updates - Because new viruses appear every day, you'll want regular updates. It's even better if they occur automatically when you connect to the internet. If automatic updating isn't included, you'll have to check the vendor's website and download updates yourself. This is vitally important, because you will not be protected from new viruses if your software is out of date.<br />
<br />
- Disaster recovery - Software with a recovery utility to help you get your system back to normal after a virus attack is always good to have.<br />
<br />
- ICSA certification - The International Computer Security Associatioin has standards for the detection rates of anti-virus software. Make sure your software has the ICSA certification.<br />
<br />
- Technical support - It's a good idea to select a package that offers free technical support, either online or through a toll-free number. If you're ever felled by a virus, you may need it. Some anti-virus software vendors are Symantec Corporation (Norton AntiVirus), McAfee Corporation (McAfee VirusScan), Trend Micro Inc. (PC-cillin), and Zone Labs Inc. (Zone Alarm Suite).<br />
<br />
Solution 2: The Virus Scan<br />
<br />
If you receive a particularly juicy attachment that you're dying to open, save it on your Windows desktop and run your anti-virus software on it first. To do this, click once gently on the file on your desktop ... don't actually open it ... then right click and choose Scan with (Name of Anti-Virus Software) to activate a virus scan.<br />
<br />
If it's infected, your anti-virus software may neutralize it, or at least tell you the attachment is too dangerous to open. On the other hand, don't feel guilty if the very thought of saving a potentially damaging file anywhere on your system is enough to quell your eagerness to open it and make you delete it immediately.<br />
<br />
Solution 3: Delete first, ask questions later.<br />
<br />
When in doubt about the origin of an e-mail, the best thing to do is delete it without previewing or opening it. However, some viruses, such as Klez, propagate by fishing in people's address books and sending themselves from any contact they find to another random contact. You can spread a virus just by having people in your address book, even if you don't actually e-mail them anything. They'll receive it from someone else in your address book, which really makes life confusing. Because of the proliferation of porn on the internet, e-mail viruses often tempt victims by using sexual filenames, such as nudes.exe. Don't fall for it.<br />
<br />
Solution 4: Beware of virus hoaxes<br />
<br />
E-mails warning you about viruses are almost always hoaxes. You may be tempted to believe them because you typically receive them from well-meaning friends, who received them from friends, etc. These e-mails themselves usually aren't viruses, but some have actually fallen into the hands of hackers who loaded them with viruses and forwarded them merrily on their way as a sick joke.<br />
<br />
The proliferation of e-mails about virus hoaxes can become nearly as bad as a real virus. Think about it, if you obey an e-mail that tells you to forward it to everyone in your address book, and they THEY do it, and this goes on long enough, you could bring the internet to its knees. If you ever want to verify a virus warning, your anti-virus vendor may have a list of hoaxes on it website. It's in the business of providing the fixes, so it will know which viruses are real.<br />
<br />
Solution 5: Beware of filename extensions<br />
<br />
The extension of a filename is the three characters that come after the dot. Windows now defaults to hiding filename extensions, but it isn't a good idea. Just being able to see a suspicious extension and deleting the file before opening it can save you from a virus infection.<br />
<br />
To see filename extensions in all your directory listings, on the Windows XP desktop, click Start button | Control Panels | Folder Options | View Tab. Clear the check box for Hide extensions of known file types. Click Apply | OK. System files will still be hidden, but you'll be able to see extensions for all the files you need to be concerned with. Viruses often live on files with these extensions - .vbs, .shs, .pif, .Ink - and they are almost never legitimately used for attachments.<br />
<br />
Solution 6: Disable the .shs extension<br />
<br />
One dangerous extension you can easily disable is .shs. Windows won't recognize it and will alert you before attempting to open an .shs file. The extension is usually just used for "scrap object" files created in Word and Excell when you highlight text and drag it to the desktop for pasting into other documents. If this isn't something you ever do, or you have Word and Excell 2000 or later, which allow you to have 12 items on the Clipboard, click the Start button | Control Panel | Folder Options | File Types tab. Under Registered file types, scroll down and highlight the SHS extension. Click Delete | Yes | Apply | OK.<br />
<br />
Solution 7: Dealing with double extensions<br />
<br />
When you turn on your extensions in Windows, you'll be able to detect viruses that piggy-back themselves onto innocent looking files with a double extension, such as happybirthday.doc .exe. NEVER trust a file with a double extension - it goes against Nature.<br />
<br />
Solution 8: Beware of unknown .exe files<br />
<br />
A virus is a program that must be executed to do its dirty work, so it may have an .exe extension. Unfortunately, this is the same extension used by legitimate program files. So, don't panic if you find files named Word .exe or Excel .exe on your system - they're your Microsoft software. Just don't EVER open any file with an .exe extension if you don't know what the file's purpose is.<br />
<br />
Solution 9: Watch out for icons<br />
<br />
Viruses in attachment files have been known to assume the shape of familiar looking icons of text or picture files, like the wolf in the hen house. If you recieve an unexpected attachment, don't open it without first running it through your anti-virus software.<br />
<br />
Solution 10: Don't download from public newgroups<br />
<br />
What better place for a hacker to lurk and stick his virus than in the middle of a crowd? Sooner or later, someone's bound to download it and get the virus going. Don't download files and programs from newsgroups or bulletin boards, or open attachments sent from strangers in chatrooms ("Let's exchange pictures!") without first scanning with your anti-virus software.<br />
<br />
Solution 11: Avoid bootleg software<br />
<br />
This may seem like a no brainer, but sometimes that tiny price tag on a popular but expensive package can be too good to resist. Resist it! Likewise, be careful about accepting application software from others. You don't know where it's been, and what may have started out as a perfectly clean package could have become infected during installation on someone else's infected computer by virus.<br />
<br />
Solution 12: Protect macros in MS Word, Excel, and Powerpoint<br />
<br />
A common type of virus uses macros. Macros are sets of stored commands that users can save as shortcuts to perform long functions in just a few keystrokes. A macro virus may perform such mischief as changing file types from text files or spreadsheets into templates, locking up keyboards, and deleting files. Word, Excel, and PowerPoint come with macro virus protection. To make sure yours is activated, open each application, then click Tools menu | Macro | Security. On the Security Level tab, make sure Medium or High is selected. Clcik OK. If you are already infected with a macro virus, you may find that the steps of this procedure are unavailable becasue the virus has disabled them. In that event, run a virus scan on your system to see if your anti-virus software can kill the virus.<br />
<br />
Solution 13: Use passwords<br />
<br />
If you share your computer, it's a good idea to assign everyone a password. Passwords should be a combination of letters and numbers no less than eight characters long, and preferably nonsensical. Never write passwords and stick them anywhere near the computer. To assign passwords in Windows XP, click the Start button | Control Panel | User Accounts. Follow the prompts to assign/change passwords.<br />
<br />
Solution 14: Update application software<br />
<br />
Microsoft constantly issues patches for the security holes in its operating system and applications software. however, don't be lulled into complacency if you have Windows Update automatically checking things for you. Update checks for patches to repair bugs in the operating system, not for security problems.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-28111434558295373632010-11-23T16:31:00.000+05:302010-11-23T16:32:12.109+05:30Rotate the screen of nokia phones<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7U55bwP-NIyqWgB_KXMKiNt6BKgodrawjIEP8qWGx6pQQFCqlySSA7-p7EBNnwgpANonS549p0xS0lUJpT1ylkXCiDakpbANObNcJ4ApqAed7H4W9efpfk0zzN2aEpYpzFf4w6YcEpU4I/s1600/nokia1650nokia2360phone.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7U55bwP-NIyqWgB_KXMKiNt6BKgodrawjIEP8qWGx6pQQFCqlySSA7-p7EBNnwgpANonS549p0xS0lUJpT1ylkXCiDakpbANObNcJ4ApqAed7H4W9efpfk0zzN2aEpYpzFf4w6YcEpU4I/s200/nokia1650nokia2360phone.jpg" width="187" /></a>This is just a simple trick to rotate the screen appearance of nokia phones.. Its a cool trick for everyone to try and have some fun.Rotate nokia mobile phone from landscape view to portrait<br />
view and also from landscape view to portrait view. Interested then its easy just use the following<br />
codes in your nokia mobile phone.<br />
<br />
<br />
Codes:<br />
*#5512# will turn towards Right<br />
*#5513# will turn upside down<br />
*#5514# will turn towards left<br />
*#5511# will turn Your screen back to normal.<br />
<br />
Tested on the Following Nokia Models:<br />
1200 1208 8209 1600 1650 2310 2600<br />
<br />
If you know any other good secret codes, please share it with us..<br />
<br />
Enjoy..Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-65660080002025962352010-11-18T11:41:00.000+05:302010-11-18T11:41:42.563+05:30How to superhide folders without softwares<a href="http://www.lisisoft.com/imglisi2/1/7/17291-folder-vault.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="211" src="http://www.lisisoft.com/imglisi2/1/7/17291-folder-vault.jpg" width="320" /></a>It is a 100% safe and free method to hide a file or folder from others in your system without<br />
using any application.For this ,open dos prompt and type:<br />
For Hide:<br />
X:\> attrib +a +r +s +h foldername /s /d [enter]<br />
For unhide:<br />
X:\> attrib -a -r -s -h foldername /s /d [enter]<br />
X= x is location for our folder in hard disk.<br />
Limitation:<br />
If hide protected operating system option is uncheck in folder option, victim can see ur filesUnknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-3622947602858416562010-11-16T19:21:00.000+05:302010-11-16T19:21:11.242+05:30how to put picture in orkut status<a href="http://www.piyushshekhar.com/wp-content/uploads/2010/08/orkut-new-look.gif" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="171" src="http://www.piyushshekhar.com/wp-content/uploads/2010/08/orkut-new-look.gif" width="320" /></a>Steps to reproduce:-<br />
<br />
1)Upload the picture you want to put up in your status message as your profile display picture or community.<br />
<br />
2)Once done with uploading, right click the mouse on your profile/community image and choose "Copy image URL"<br />
<br />
3)The image URL you copied will be something like this<br />
<br />
http://img1.orkut.com/images/mittel/1287595130/43323325/gq.jpg<br />
<br />
Now you got to add the string "img/smiley/" in the middle to the above URL you have generated after orkut.com/<br />
<br />
Adding "img/smiley/" to the above URL after orkut.com/<br />
<br />
http://img1.orkut.com/img/smiley/images/mittel/1287595130/43323325/gq.jpg<br />
<br />
4)Now code your link with HTML so as to display it.<br />
<br />
HTML Code=<img src="http://img1.orkut.com/img/smiley/images/mittel/1287595130/43323325/gq.jpg"><br />
<br />
5)Copy paste the above green code in your status message<br />
<br />
<b>Do like this <br />
if u want to put any pic<br />
<br />
example -<br />
you want to keep your dp in status <br />
<br />
just copy link location from [ page info]<br />
<br />
then made a slight change <br />
<br />
<span style="color: red;">Before</span><br />
<a href="http://img1.orkut.com/images/medium/1288">http://img1.orkut.com/images/mediu<wbr></wbr>m/1288</a>827151/273100834/gq.jpg<br />
<br />
<span style="color: red;">After</span><br />
<a href="http://img1.orkut.com/">http:/<wbr></wbr>/img1.orkut.com/</a><span style="color: red;">img/smiley</span>/images/medium<wbr></wbr>/1288827151/273100834/gq.jpg<br />
<br />
<br />
<span style="color: red;">img/smiley</span><br />
<br />
Ad<wbr></wbr>d this part to the link only </b>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-11264709694285678232010-11-15T22:30:00.000+05:302010-11-15T22:32:32.211+05:30How to Add a Clickable Image in Static FBMLWhen adding an image in the FBML box, I’ve found that the best place to host images is Photobucket. Using Flickr or Facebook photos caused issues for me. If it works for you, stick with it. The maximum width for an image in the FBML tab is 520px.Get the desired photos from photobucket.<br />
<br />
<a href="http://t0.gstatic.com/images?q=tbn:ANd9GcThGRsL-gnB-6GRPT68bBMFwQNQ4k3BUKUeQCL5Zowyq45eyOh6Gg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://t0.gstatic.com/images?q=tbn:ANd9GcThGRsL-gnB-6GRPT68bBMFwQNQ4k3BUKUeQCL5Zowyq45eyOh6Gg" /></a>There is no maximum height, but think of it as a landing page by keeping the scrolling to a minimum. Ask yourself: do you want users to scroll down to get the message or do you want to get the main point across once they’ve landed on your page?<br />
<br />
<br />
Upload your image to your Photobucket account. Copy the direct URL to the image you intend to use in your FBML box. Next, you want to use this code:<br />
<br />
< a href=” http: / /xxxxx” mce_href=”http: // xxxxx” target=”_blank”>< img src=” http: //yyyyy” mce_src=”http://yyyyy” width=”##px” height=”##px” border=”0″ alt=” “>< / a><br />
<br />
Without Spaces<br />
<br />
Replace the xxxxx with the target URL. Replace the yyyyy with the direct link to your uploaded Photobucket image. Replace the ## with your width and height in pixels.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-68841531135340868972010-11-15T22:24:00.000+05:302010-11-15T22:24:46.905+05:30How to customize facebook pages<a href="http://lh6.ggpht.com/_Jb96aCwot8Y/TN-ezA_ijNI/AAAAAAAAAcA/JUtRZGAnd3k/nsstaticfbmladdtomypage.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;" target="_blank"></a>How can you help your brand stand out from the competition and increase the relevancy of your Facebook page?<br />
<br />
The answer: Static FBML. This thread will share what you need to know to conduct a Facebook page makeover.<br />
__________________________________________________<br />
<br />
What Is Static FBML?<br />
<br />
FBML stands for Facebook Markup Language, which is a subset of HTML.<br />
<br />
Static FBML is a Facebook application that allows Facebook page administrators to create custom tabs on their Facebook pages. This application is only available for Facebook pages, not for personal profiles or Facebook groups.<br />
__________________________________________________<br />
<br />
Adding Static FBML to Your Facebook Page<br />
<br />
You can add Static FBML in four easy steps.<br />
<br />
1: Make sure you are an administrator of the Facebook page so you have the ability to edit.<br />
<br />
2: Go to the Static FBML application.<br />
<br />
3: Click “Add to my Page.”<a href="http://lh6.ggpht.com/_Jb96aCwot8Y/TN-ezA_ijNI/AAAAAAAAAcA/JUtRZGAnd3k/nsstaticfbmladdtomypage.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;" target="_blank"><img alt="" src="http://lh6.ggpht.com/_Jb96aCwot8Y/TN-ezA_ijNI/AAAAAAAAAcA/JUtRZGAnd3k/nsstaticfbmladdtomypage.jpg" /></a><br />
<br />
<br />
<br />
<br />
4: A window will appear that contains a list of the Facebook pages for which you are an administrator. Click “Add to Page” to add the application.<br />
<div></div>Static FBML is now added to your page.<br />
<br />
Before you add content to your FBML tab, you should have an idea the image or video size you need so these components fit in the space provided.<br />
<br />
<br />
<br />
<b>Setting Up Static FBML as a Tab[/]<br />
<br />
To set up your FBML tab, click on “Edit Page” under your Facebook page logo/avatar located on your wall.</b><br />
<b><div><a href="http://lh5.ggpht.com/_Jb96aCwot8Y/TN-fS27GS5I/AAAAAAAAAcE/_LM9zdb6_ic/nsstaticfbmleditpage.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;" target="_blank"><img alt="" height="178" src="http://lh5.ggpht.com/_Jb96aCwot8Y/TN-fS27GS5I/AAAAAAAAAcE/_LM9zdb6_ic/nsstaticfbmleditpage.jpg" width="200" /></a></div></b><b> Scroll down to the “Applications” section and locate the FBML app and click “Application Settings” (see below). Make sure that the “Tab” setting is “added”. You now have an FBML tab.</b><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<b><div></div><div></div><div></div><div><a href="http://lh3.ggpht.com/_Jb96aCwot8Y/TN-fb9KMZZI/AAAAAAAAAcI/YgXlZF6-FNg/s640/nsstaticfbmlappsettings.jpg" target="_blank"><img alt="" src="http://lh3.ggpht.com/_Jb96aCwot8Y/TN-fb9KMZZI/AAAAAAAAAcI/YgXlZF6-FNg/s640/nsstaticfbmlappsettings.jpg" /></a></div></b><br />
<b>To the left of application settings you will see an “Edit” option on your FBML. This is where you will ultimately paste your HTML code. You can also add a “box title.” The box title becomes the name of your tab.<br />
<br />
Please note that your FBML box must be coded for a maximum width suitable for a tab. The maximum width for an FBML tab is 520 pixels.</b><br />
<br />
<br />
<b><br />
</b><br />
<span style="font-size: large;"><b>Adding Content to Your Static FBML Tab</b><b> </b></span> <br />
<br />
<br />
<b> </b><br />
Now it’s time to edit and add content. To begin, click on “Edit Page” located under your Facebook page logo. Scroll down to the “Applications” section and locate the FBML app, but this time click “Edit.” The FBML tab will be empty.<br />
<br />
This is the area where you can name the FBML tab and add HTML code. Please note that FBML does not work with all HTML code. For example, JavaScript does not work. You’ll need to experiment.<br />
<br />
If you scroll down to the bottom, you can add additional FBML tabs.<b> </b><br />
<b><br />
</b><b> </b><b></b>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-1405612972856547602010-10-27T23:25:00.000+05:302010-10-27T23:25:48.781+05:30Computer Cases: The Basics for you<div class="separator" style="clear: both; text-align: center;"><a href="http://computerworld.name/wp-content/uploads/2007/06/case-2dmods-2d4-resize.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="318" src="http://computerworld.name/wp-content/uploads/2007/06/case-2dmods-2d4-resize.jpg" width="320" /></a></div>A computer case (also known as the computer chassis, box or housing) is the enclosure that contains the main components of a computer. chassis are usually contructed from steel, aluminum or plastic although other materials (such as wood and perspex) have also been used in chassis designs.<br />
<br />
Size and Shape of Computer chassis<br />
<br />
chassis can come in many different sizes or "form factors". The most common form factor is ATX, although small form factor chassis are becoming popular for a variety of different uses.<br />
<br />
chassis are often said to come in "towers" (such as mini tower, mid-sized tower and full-sized tower)", "desktops", "pizza boxes" (also called flatbed or (horizontal) and "slim desktops" that uses the LCD like housing. Tower chassis are taller and typically have more room while desktop chassis are more compact and are more popular in business environments.<br />
<br />
Small form factor chassis are a variety of chassis that are coming more and more common. Companies like Shuttle computers and AOpen have been producing such chassis and Mini-ITX is the most common motherboard designed for these chassis. Apple Computer recently announced its Mac Mini computer, which is around the size of a CD-ROM drive.<br />
<br />
Computer chassis Functions<br />
<br />
chassis usually come with room for a power supply unit, several expansion slots and expansion bays, wires for powering up a computer and some with built in I/O ports that must be connected to a motherboard.<br />
<br />
Motherboards are screwed to the bottom of the chassis, its I/O ports being exposed on the side of the chassis. Usually the power supply unit is at the top of the chassis attathed with several screws. The typical chassis has four 5.25" and three 3.5" expansion bays for devices such as hard drives, floppy disk drives and CD-ROMS. A power button (and sometimes a reset button that can be turned-on and off using a remote control) are usually located on the front to turn the computer. LED status lights for power, hard drive activities are often located near the power button which are powered from wires that connect up to the motherboard. Some chassis come with status monitoring equipment such as chassis temperature or processor speed monitor which appear on an LCD on the side.<br />
<br />
A panel on the side, covers up and protects the inside of the computer when being used, which usually slides on and held with a screw. Most chassis require a large amount of screws to put together. Recently there has been a move to "screwless" chassis, where chassis are held together with other methods than screws.<br />
<br />
The Many Looks of Computer chassis<br />
<br />
Traditional designs were beige in color and were rectangular (often referred to as "beige box"), but they have evolved in style in recent years, especially after the introduction of the iMac in 1998. Beige box designs are now typically found on budget machines.<br />
<br />
The term "chassis modding" refers to the artistic styling of otherwise rather functional and plain computer encasings. There is an increasing demand for more functional and radical designs on computer chassis and in the future computer chassis may look very different from now. Companies such as Alienware are known for unusual chassis.<br />
<br />
Stickers are a common appearance on chassis. These often include the computer manufacturer's logo and the computer's specifications (CPU, RAM, Hard drive, etc). Other stickers include the operating system (such as "Designed for Windows XP") and processor (such as the famous "Intel Inside" sticker).Unknownnoreply@blogger.comtag:blogger.com,1999:blog-4916597489720328456.post-49358941492375166952010-10-10T22:11:00.000+05:302010-11-22T22:21:55.016+05:30How to lock a folder without a software<div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"></div><a href="http://i46.tinypic.com/2a65zde.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><br />
</a><br />
Steps:<br />
<br />
1- make a new folder ( name it as you like )<br />
<br />
2- inside this folder make a ( TXT ) file & copy inside it this (the entire thing)<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.solidblogger.com/wp-content/uploads/2010/09/Lock_Folder_Without_Software4.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://www.solidblogger.com/wp-content/uploads/2010/09/Lock_Folder_Without_Software4.jpg" /></a></div><br />
Code:-<br />
<br />
Quote:<br />
Quote: cls<br />
@ECHO OFF<br />
title Folder Private<br />
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK<br />
if NOT EXIST Private goto MDLOCKER<br />
:CONFIRM<br />
echo Are you sure you want to lock the folder(Y/N)<br />
set/p "cho=>"<br />
if %cho%==Y goto LOCK<br />
if %cho%==y goto LOCK<br />
if %cho%==n goto END<br />
if %cho%==N goto END<br />
echo Invalid choice.<br />
goto CONFIRM<br />
:LOCK<br />
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"<br />
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"<br />
echo Folder locked<br />
goto End<br />
:UNLOCK<br />
echo Enter password to unlock folder<br />
set/p "pass=>"<br />
if NOT %pass%== password here goto FAIL<br />
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"<br />
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private<br />
echo Folder Unlocked successfully<br />
goto End<br />
:FAIL<br />
echo Invalid password<br />
goto end<br />
:MDLOCKER<br />
md Private<br />
echo Private created successfully<br />
goto End<br />
:End<br />
<br />
3- After u copy the Commanding go to line 23 (or try using shortcut- CTRL+F and type password to locate the line) u will find this word : password here (Change it with any password u like.) is :<br />
<br />
eg: if NOT %pass%== narnia1234 goto FAIL<br />
//so ur password here becomes narnia1234 .//<br />
<br />
4- After that go to â?˜save asâ?™ & name this file as "locker.bat "<br />
<br />
5- Now back to the folder & u will find a ( LOCKER ) commanding.<br />
(locker.exe)<br />
<br />
6- Double Click on it & u will find a new folder (Private )<br />
<br />
7- Ok ,, now copy what u want in this "private Folder" & after that come out of the folder, and Double click on locker again. It will open and ask if you want to lock your folder? Y/N ?<br />
<br />
8- Type Y. your private folder will dissapear.<br />
<br />
9- If you want to UNLOCK your folder ,go to (locker) & type your pass and you will see your private folder.<br />
<br />
it not only hides the folder, but incase, u unhide all files... and try opening it without entering password, it'l take u to the control panel...<br />
<br />
Also, if u want to store files on your Pen-Drive, u can use this script. No Software Required<br />
<br />
Incase u delete your Locker file (just in case), then u can make a new one (but with the same password) and open it from that.<br />
<br />
Alternatively, u can keep this locker file somewhere else, and when u want to open ur folder, only then bring it back to that place ..Unknownnoreply@blogger.com