Installing a Wireless Router

First, turn off the PC and modem, then remove the Ethernet cable from the PC and plug it into the router's WAN port. Install a second Ethernet cable between the PC's Ethernet port and one of the router's Ethernet ports. Power the modem, router and then PC, waiting for the system to boot and initialize before attempting an Internet connection.
Most routers are programmed with the manufacturer's default settings, including the network's name or service set identifier (SSID), channel and sign-on password. These default settings generally may be changed using included software or an online setup utility provided by the router's manufacturer.
Configure the router by entering the router configuration IP address at the URL provided, followed by the configuration utility ID and the default password. To find your router's default IP address and the default login info, refer to the owner's manual. If you own a Linksys router, a popular brand, the IP address is usually 192.168.1.1. Two other popular brands, D-Link and Netgear, generally use 192.168.0.1. Author: Bhambhro

View the Original article

Connecting a Printer to a Wireless Router

First, check the documentation that came with your printer to determine how it's designed to connect to computers. Connections made through Ethernet, USB and (obsolescent) parallel ports are common, but newer printers are sometimes wireless-enabled and allow you to simply add them to your wireless network.
Refer to the owner's manual for your particular wireless router. Inside, find the default IP address and the default login info. If you own a Linksys router, the IP address is usually 192.168.1.1. Other popular brands D-Link and Netgear generally use 192.168.0.1. Author: Bhambhro

View the Original article

Connecting Two Wireless Routers

Bridging two wireless routers involves configuring both networks manually. Visit each network location - which should be recognized by your computer automatically - and configure the appropriate Service Set Identifier (SSID), Wireless Encryption Protocol (WEP) or WiFi Protected Access (WPA) key and authentication information. Make sure you know the SSID and WEP or WPA key ahead of time. Author: Bhambhro

View the Original article

shutdown and boot vista faster

Before we really get started, it is entirely possible to mess up your Vista install very royally if you don't know what you are doing. We recommend that only power users or those on the level of Sys Admins attempt these steps. Proceed at your own risk and always create a restore point before you modify any part of the system. All the programs used for purposes of this post are freeware applications.

Vista is not XP (thankfully) but like XP it has a lot of startup processes that are, well, pretty much useless. Though beware, you might actually need some of these if you are on a network or require remote assistance features. If not, then go ahead and turn them off.

Right click on Computer, go to manage and go to Services and Applications then Services (the Standard View makes it easier to manage but that is not a necessary step). You'll see a list of applications and services in this list, thing is, you don't need quite a few of them. Some may have already been disabled or are set to manual, that's fine, leave them like that, Vista has decided on its own they are not needed or will be activated when required.

We want to look at the ones that are set on Automatic. You can organize the list either by name or startup setting, for me, I have them organized by name since it makes it easy to compare to other lists. I have used this process list for disabling items, each one is described for you so you can decide if you need it or not. Note that disabling the IKE and AuthIP Service will disable just about every single networking and network connection process on the computer. It serves you better NOT to disable it, you will still be able to connect to networks if you do but you want be able to monitor them or switch networks, best to leave that one on.

Here is list of services that are completely safe to disable (for most users):
Telephony (keep enabled if you use a modem)
SSDP Discovery
Shell Hardware Detection (disables autoplay events)
Server
Remote Access Connection Manager
Program Compatibility Assistant (face it, this service is useless, if you've ever tried it, you know what I'm talking about)
Portable Device Enumerator Service (if you use Windows Media Player with your MP3 device, keep this service on)
Perclilint
IPSec Policy Agent
IP Helper
Internet Connection Sharing (leave on if you have shared resources on a network)
Distributed Link Tracking Client
Diagnostic Policy Service (who pays attention to Windows Diagnostics anyway?)
Then there is msconfig, Vista users have the luxury of simply typing msconfig in the Start menu search box and launching it that way. Go to the Startup tab and select items you don't need, Java Update, Adobe Reader, any toolbars, iTunes helper and such are prime examples of things you can get rid of, they will start when/if they are needed. If you aren't sure about an entry, use a search engine to find out what the entry is.
If you don't want to use the built-in tools of Vista to do that then I recommend CodeStuff Starter, which has the msconfig features as well as the Management features so you can access everything from one program. CodeStuff also makes it easier to restore your system if you messed up.
It has been a dream of many to control exactly how their computer boots, granted msconfig, computer management and CodeStuff certainly make that process more manageable but it can get better and it does. Last on our list (but certainly not least) to tell Vista that you are the boss is Vista Boot Pro 3.1. The primary function of Vista Boot Pro 3.1 is to control the boot cycle if you have a second operating system installed, sure you could rely on the Vista Boot Loader but whats the fun in that?

Vista Boot Pro edits the Boot Configuration Files in the registry for you, without fail or flaw. The other way to edit the BCD file is well, to go into the registry and even I am leery about that.
Vista Boot Pro allows you to manage the Vista Boot Loader itself, edit which operating system boots first, configure the way Vista starts up and features its own Backup and Restore Center, just in case, you never know.

Vista Boot Pro is also available for Windows XP (Home, Pro, MCE 2005 and x64), Windows 2003 or Longhorn Server. Options may vary depending on operating system installed.
By disabling some processes and startup items, you are also on your way to a more secure installation of Vista but that's not everything you can do to maximize your Vista experience. This will be a continuing series of posts for optimizing Vista so stay tuned for the next one. Author: Bhambhro

View the Original article

Shutdown Trick !

Del),
Select shut down tab. and press ' Ctrl ' key while select Turn Off from dis tab.
Count 5 4 3 2 1 Voila!!! U r window will rapidly shut down.


Speed Up Ur Shut down !!

Start Regedit.
Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.
Click on the "Control" Folder.
Select "WaitToKillServiceTimeout"
Right click on it and select Modify.
Set it a value lower than 2000 (Mine is set to 200).

and !

Like previous versions of windows, it takes long time to restart or shutdown windows xp when the "Exit Windows" sound is enabled. to solve this problem you
must disable this useless sound. click start button then go to settings -> control panel -> Sound,Speech and Audio devices -> Sounds and Audio Devices -> Sounds, then under program events and windows menu click on "Exit Windows" sub-menu and highlight it.now from sounds you can select,choose "none" and then click apply and ok. now you can see some improvements when shutting down your system.




View the Original article

Install Windows xp in less than 15 minutes

Now, this tip will be very helpful for those who frequently install windows xp operating system. Normally OS installation takes around 40 minutes to complete, but through this trick you can now save 10-15 minutes. This simple tricks goes this way.

1. Boot through Windows XP CD.

2. After all the files are completely loaded, you get the option to select the partition. Select “c”.
3. Now Format the partition, whether it is normal or quick with NTFS or FAT
4. Once the formatting is completed, All the setup files required for installation are copied. Restart your system by pressing Enter.
Now, here begins the Simple trick to save 10-15 minutes.
5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.
6. Now, Press SHIFT

View the Original article

Reduce Memory usage of FIREFOX

The memory requirement increases rapidly to more than 100 mb when you surf for a long time in a firefox browser or open many tabs at a time.

Reason .........

Two effects cater Firefox's ever increasing appetite for memory.All web sites open in tabs and windows occupy memory space; this space remains occupied even after minimizing windows.Besides,Firefox also saves 50 recently visited websites in the main memory of the PC in order to facilitate quick browsing through the session history.To reduce this unnecessarily large number of saved sites.

Solution .........

Enter 'about:config' in the address bar. Search for 'browser.sessionhistory.max_entries' in the 'Preference Name' list and double-click on it to edit it.Change the default setting '50' to a considerably smaller number or even to '0' and confirm with 'OK'. When you enter '1' or '5' you can still access the last visited websites since they are still available in the RAM. Incidentally, saving the history is not affected by this setting. Thus, you can browse through as many sites as you want; you only need to wait for the renewed loading of these websites.


You can also instruct Firefox to release the memory space that is no longer in use. Simply right-click on any space in the list of configuration settings and select the context command 'New

View the Original article

Get most from GOOGLE search

.rtf
Google allows you to search for specific file types, so instead of getting html-files as a result (websites) you get Microsoft excel files for example. The search string you would use would be this:

Filetype:xls (for excel files) or filetype:doc for word files.
But maybe more interesting would be searching for

View the Original article

Keyboard Shortcuts Tips n Tricks

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. Use the following keyboard shortcuts :

Windows key

View the Original article

Facts - Change location of My Documents

I guess many of you don't know about this fact that the storage location of "My Documents" can be changed. Its bit safer , when PC crashes.

Normally windows saves the "My Documents" folder on your C-drive. But when you right-click on it and go to properties, you can change the location where you want windows to save your Documents folder.


View the Original article

Save time and effort in typing URL addresses

There is a quicker way to have auto-completion of the whole website address in internet explorer,like "www" or ".com" With Internet Explorer 6 in Windows XP, typing web addresses is very convenient. All you have to do is type the domain of an address, such as 'google' and then press

View the Original article

Display icons on the desktop without labels

Unfortunately, Windows does not allow deleting the label directly. The operating system rejects empty strings or labels consisting space characters by displaying the message ' Enter a file name' . However, the following trick will help you.

1. Right-click on the desired icon and select the context command 'Rename' or simply press

View the Original article

Disable Right Click on your blog or webpage

Its becoming essential to secure the content of your web page and blog from being copied. To achieve this you have to disable the RIGHT CLICK . Many of my friends are trying various scripts to disable right click. Even I tried one. But the problem is that it was running fine in Internet Explorer and not in Firefox or other browsers. So I found the simplest way to disable right click. A bit higher security is achieved.

Lets see..... how..

( sign in to your blogger --

View the Original article

Change Text Size In Internet Explorer

Crack BIOS Password !!!Eject Your CD-DVD DrivesError In Notepad !Fake virus !Firefox TipFreecell WinnerGoogle Search Tips !Hibernate Your XP !Hidden Programs In XP !Hidden SecretsHide Files in Image Files !!!Internet Explorer 7 Keyboard Shortcuts !Keep Your Internet AliveLock Your Folders !Make Microphone In 5 Seconds !Make Your Own Icons In Windows XP !Open Active Folder in Command PromptPassenger Elevator Trick !Scroll Pages Fast !Shutdown and Restart TrickSurf The Blocked WebsitesTrace Websites !Trick To Create Table In Word !Use Notepad As A Diary !Useful Symbols For MS Office !Watch " Star Wars "Win Any Freecel Game !Windows 98 Tricks !Wow Notepad Knew About 9/11/2001 !

View the Original article

Single Click ' Shut Down ' !


Shutting Down Windows Working :

Actually, shutting down means closing all the applications running on the computer, even the operating system. For this an shut down application is meant. When you traditionally shut down your pc (Start

View the Original article

Pop Up Banner On " Start Up "

String Value

Name it : LegalNoticeCaption

Now, double click it and in value data feild write the text that you want in the title of the Message Box !

Now Again :
Right Click

View the Original article

Windows 98 Credits With Music


You need: Windows 98 or Windows 98 Second Edition

Do the following :

1. Using your mouse, right-click an empty spot on your Windows desktop.

2. Select New, Shortcut.

3. Select Browse and find the C:

View the Original article

MSword Animation


You need: Word 2000

Do the following :

1. Open a new Word 2000 document.

2. Type Bill Ggates

3. Choose Help, Show the Office Assistant.
4. You need to get Rocky(The Dog).If you don't have Rocky as your default, right-click on the assistant icon, highlight Choose Assistant, and click Next until Rocky shows up. (You may need to insert your Office 2000 CD at this point.)

5. Run Word's spelling checker by clicking the ABC icon in the toolbar, and watch Rocky react to his boss's name.

6. If Rocky doesn't do something cute the first time, perform the spelling check a few times.

Posted byYugal Jindle

Labels:Hidden Secrets

View the Original article

Mysterious Text !


You need: Microsoft Word 97, 2000, or Word 2002

Do the following :

1. Word, select Tools, AutoCorrect. In the dialog box that appears, is the Replace text as you type box checked? If it isn't, check that box. Now you're ready to go.

2. Open a new document and type

View the Original article

AOL Surprise


You need: AOL version 5.0 or Higher

Do the following :

1. Turn up your sound a bit.

2. Within your AOL program, go to the AOL keyword search field.

3. Type aol://1391:43-52114.

4. Watch a little box pop up on your screen that shows you something very cute. It will wave to you.

Posted byYugal Jindle

Labels:Hidden Secrets

View the Original article

Name The Volcanoes


You need: Windows 98 or Windows 98 Second Edition

Do the following :

1. Select Start, Settings, Control Panel and launch Display.
2. Choose the Screen Saver tab.
3. Select 3D Text in the Screen Saver drop-down list and click Settings.
4. In the Display Text box, type volcano.
5. Now, Preview the screensaver , you will see the names of various volcanos displayed !

Posted byYugal Jindle

Labels:Hidden Secrets

View the Original article

Espionage in Excel


You need: Excel 2000 and DirectX

Do the following :

1. Open a new worksheet in Excel 2000.

2. Select File, Save as Web Page.
3. Select Publish and check the box marked Add interactivity with.

4. Save the file as spy.html. Be sure to note the folder you saved the file in.

5. Load Internet Explorer, and choose File, Open and locate spy.html. The spreadsheet should appear in the middle of the page.

6. Scroll to row 2000, column WC. Select row 2000, and move the tab key until WC is the active column in that row.

7. Hold down Shift-Crtl-Alt and click the Office logo in the upper-left corner of the dialog box.

8. Get ready to play a spy hunter-type game. Use your keyboard to move around and make things happen: The arrow keys let you drive; the space bar will let you fire; "O" lets you drop oil slicks; and "H" will turn on your headlights when it gets dark.

Posted byYugal Jindle

Labels:Hidden Secrets

View the Original article

Doggy Sound In Acrobat Reader


You need: Acrobat Reader 4.0

Do the following :

1. Open up Acrobat Reader.
2. Choose Help, About Plug-ins, Acrobat Forms.
3. Hold down Control-Alt-Shift and click the Credits button.
4. You should hear a dog bark, the button face will change to say "woof," and the Adobe logo will turn into a dog paw.

Posted byYugal Jindle

Labels:Hidden Secrets

View the Original article

A Temprary Microphone !



Do you know ?

There is an interesting fact about Headphones i.e. they can also be used as a microphone !
Technically :
There is not much difference between the circuits of a Microphone and a Headphone , just the headphone is designed to spread voice and an microphone to capture the voice !

Working :
So if you connect the headphone in the microphone slot of your computer, you could use it as a microphone.
Just speak in the ear buds of the microphone, but please speak a bit loudly to be audible at the other end !



View the Original article

Internet Explorer 7 Keyboard Shortcuts !

Keep Your Internet AliveLock Your Folders !Make Microphone In 5 Seconds !Make Your Own Icons In Windows XP !Open Active Folder in Command PromptPassenger Elevator Trick !Scroll Pages Fast !Shutdown and Restart TrickSurf The Blocked WebsitesTrace Websites !Trick To Create Table In Word !Use Notepad As A Diary !Useful Symbols For MS Office !Watch " Star Wars "Win Any Freecel Game !Windows 98 Tricks !Wow Notepad Knew About 9/11/2001 !

View the Original article

You Can't Do It !


You can not make any folder named any of the following :

CON, PRN, AUX, CLOCK$, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, LPT9

And many more...

Reason :
This is because these are windows inbuilt 'Reserved Device Names' .
Just avoid these words and name anything else !

Posted byYugal Jindle

Labels:Miscellaneous Tricks

View the Original article

Scare your friends with this fake virus !


This is a simple program that will scare your friends easily !
This will not harm your computer at all !

Download the file and have fun !

Download Here

Posted byYugal Jindle

Labels:Applications

View the Original article

Lock Your Folders !

Make Microphone In 5 Seconds !Make Your Own Icons In Windows XP !Open Active Folder in Command PromptPassenger Elevator Trick !Scroll Pages Fast !Shutdown and Restart TrickSurf The Blocked WebsitesTrace Websites !Trick To Create Table In Word !Use Notepad As A Diary !Useful Symbols For MS Office !Watch " Star Wars "Win Any Freecel Game !Windows 98 Tricks !Wow Notepad Knew About 9/11/2001 !

View the Original article

Wow Notepad Knew About 9/11/2001 !


Amazing thing but true , Notepad knew about 9/11/2001 !
The flight number which hit the WTC in New York was Q33N !

See it yourself :
1. Open Notepad
2. Type : Q33N
3. Now, go to Format menu
4. Choose Font.
5. Now, change the size to '72'
6. Now, change the font to 'Wingdings'
7. See what is displayed !

Isn't it amazing !

Posted byYugal Jindle

Labels:Notepad

View the Original article

Scare Your Friend With Auto Shutdown !

Just enjoy the video :


-------------------OR-------------------

Read the following :
1. Right click on desktop

View the Original article

Use Notepad As A Diary !



Ever wanted to maintain a diary on your PC ?
Now, you can do it without the use of a software !

USE NOTEPAD !

Do The Following :
1. Open Notepad
2. Type : .LOG
3. Save it with any name say 'Diary'
4. Open Diary.txt again.

Wow you see today's date and time, so start writing your Diary !

Posted byYugal Jindle

Labels:Notepad

View the Original article

Hibernate Your XP !

Hidden Programs In XP !Hidden SecretsHide Files in Image Files !!!Internet Explorer 7 Keyboard Shortcuts !Keep Your Internet AliveLock Your Folders !Make Microphone In 5 Seconds !Make Your Own Icons In Windows XP !Open Active Folder in Command PromptPassenger Elevator Trick !Scroll Pages Fast !Shutdown and Restart TrickSurf The Blocked WebsitesTrace Websites !Trick To Create Table In Word !Use Notepad As A Diary !Useful Symbols For MS Office !Watch " Star Wars "Win Any Freecel Game !Windows 98 Tricks !Wow Notepad Knew About 9/11/2001 !

View the Original article

Surf The Blocked Websites !


Are you frustrated because you are not able to visit your favorite websites in your school or college ?
Well, no problem the remedy comes here !

Below are the list of various sites from which you can

http://kproxy.com (Best For Orkut !)
http://backfox.comhttp://atunnel.comhttp://calculatepie.comhttp://www.stupidcensorship.com http://www.vmathpie.com http://www.xroxee.comhttp://mathtunnel.comhttp://www.pagemod.com (Contributed by : Anonymous)
Another Way,
Today we still use Internet Explorer to surf the net, so if the block is done on the system then using Mozilla Firefox can help !
Use Firefox and try visiting the blocked sites !


Enjoy...

Posted byYugal Jindle

Labels:Usefull Tricks

View the Original article

Block Or Unblock Websites without software !


Many times in schools, colleges & offices surfing some sites like orkut,etc are banned !
To overcome this you can unblock these or block some other websites and play pranks !


Do The Following :For eg you want to block www.xyz.com !



View the Original article

Hidden Programs In Windows XP !



Strange, but true that some good programs are hidden in Windows XP !!!

Programs :

1. Private Character Editor :
Used for editing fonts,etc.



View the Original article

Make Your Own Icons In Windows XP !

Open Active Folder in Command PromptPassenger Elevator Trick !Scroll Pages Fast !Shutdown and Restart TrickSurf The Blocked WebsitesTrace Websites !Trick To Create Table In Word !Use Notepad As A Diary !Useful Symbols For MS Office !Watch " Star Wars "Win Any Freecel Game !Windows 98 Tricks !Wow Notepad Knew About 9/11/2001 !

View the Original article

Crack BIOS Password !!!

Eject Your CD-DVD DrivesError In Notepad !Fake virus !Firefox TipFreecell WinnerGoogle Search Tips !Hibernate Your XP !Hidden Programs In XP !Hidden SecretsHide Files in Image Files !!!Internet Explorer 7 Keyboard Shortcuts !Keep Your Internet AliveLock Your Folders !Make Microphone In 5 Seconds !Make Your Own Icons In Windows XP !Open Active Folder in Command PromptPassenger Elevator Trick !Scroll Pages Fast !Shutdown and Restart TrickSurf The Blocked WebsitesTrace Websites !Trick To Create Table In Word !Use Notepad As A Diary !Useful Symbols For MS Office !Watch " Star Wars "Win Any Freecel Game !Windows 98 Tricks !Wow Notepad Knew About 9/11/2001 !

View the Original article

Add Folder To - "SEND TO"


Many a times we require a FOLDER too often, like to store our Multimedia files and all !!!
No no need to access the folder and carry out the traditional COPY & PASTE !!!

Just add it too "SEND TO" !!!

Do as follows :



View the Original article

Hide Files in Image Files !!!

Internet Explorer 7 Keyboard Shortcuts !Keep Your Internet AliveLock Your Folders !Make Microphone In 5 Seconds !Make Your Own Icons In Windows XP !Open Active Folder in Command PromptPassenger Elevator Trick !Scroll Pages Fast !Shutdown and Restart TrickSurf The Blocked WebsitesTrace Websites !Trick To Create Table In Word !Use Notepad As A Diary !Useful Symbols For MS Office !Watch " Star Wars "Win Any Freecel Game !Windows 98 Tricks !Wow Notepad Knew About 9/11/2001 !

View the Original article

Open Active Folder in Command Prompt !


Working through cmd prompt is not easy with long paths and folder names.

This trick provides a solution !!!

What can be done :


View the Original article

Boost Up Internet Speed Without Software


Above 90% computers all over the world run Windows... and hence another computer trick.

FACT
But do you know that about 20% of your internet bandwidth is reserved by Microsoft.
---------------------------------------------------------------------------------------------------------
Uses of Reserved Bandwidth


View the Original article

Access Your Folders as Drives

!!!Add folder to 'Send To'Automatic Shutdown Trick !Block Or Unblock Websites!Boost Internet Speed Without SoftwareCan You Do It ?Car Keys Inside The Car !!!Change Text Size In Internet ExplorerCrack BIOS Password !!!Eject Your CD-DVD DrivesError In Notepad !Fake virus !Firefox TipFreecell WinnerGoogle Search Tips !Hibernate Your XP !Hidden Programs In XP !Hidden SecretsHide Files in Image Files !!!Internet Explorer 7 Keyboard Shortcuts !Keep Your Internet AliveLock Your Folders !Make Microphone In 5 Seconds !Make Your Own Icons In Windows XP !Open Active Folder in Command PromptPassenger Elevator Trick !Scroll Pages Fast !Shutdown and Restart TrickSurf The Blocked WebsitesTrace Websites !Trick To Create Table In Word !Use Notepad As A Diary !Useful Symbols For MS Office !Watch " Star Wars "Win Any Freecel Game !Windows 98 Tricks !Wow Notepad Knew About 9/11/2001 !

View the Original article

Trace Websites !

Trick To Create Table In Word !Use Notepad As A Diary !Useful Symbols For MS Office !Watch " Star Wars "Win Any Freecel Game !Windows 98 Tricks !Wow Notepad Knew About 9/11/2001 !

View the Original article

Shutdown and Restart Trick !



Please Note
-s :: This signify Shutdown Request.
-r :: This signify Restart Request.
-l :: This signify LogOff Request.
-t :: This signify the timer before Restart. (Replace '10' with any number.)
-c :: This signify comment.

How To Stop It ?
# When the timer is Running...
# Start

View the Original article

Eject Your CD-DVD Drives... Infinitely


Enough of Computer Tricks here...Hm... lets try some Pranks on the Novice and Rookies.. what say?So... here comes my another Exclusive...!
Eject your drives in and out infinitely...

A simle VB Script will serve the purpose......!!!
Do the following:

View the Original article

Keep Your Internet Alive

Lock Your Folders !Make Microphone In 5 Seconds !Make Your Own Icons In Windows XP !Open Active Folder in Command PromptPassenger Elevator Trick !Scroll Pages Fast !Shutdown and Restart TrickSurf The Blocked WebsitesTrace Websites !Trick To Create Table In Word !Use Notepad As A Diary !Useful Symbols For MS Office !Watch " Star Wars "Win Any Freecel Game !Windows 98 Tricks !Wow Notepad Knew About 9/11/2001 !

View the Original article

Test Your Internet Speed


Well..All of us have Internet Connections at our places... and pay for costly Hi-Speed Broadband Plans...
But never thought of checking the speed that you actually get?
Well I made an application to serve the purpose.....
About Application :

View the Original article

Tweak Your Firefox for Super Fast Web Browsing

Fast loading web pages while surfing the Internet may have more to do with your web browser settings and preferences than your Internet connection speed.



View the Original article

Secure Your Data with Hidden Desktop

Do you know that everything you do on your computer leaves a trace: internet browsing, emails, recent files, chats, and on and on.

Remembering all the places to erase those tracks is not the answer.
Software can delete a few of those tracks, but not everything!



View the Original article

Best and fast way to Lock your computer

Lock My PC™ is an easy in use, powerful and compact tool to lock your computer from unauthorized use. When you leave your computer unattended, the program disables the hot keys (including Ctrl

View the Original article

Boost Your XP Performance with XP Smoker Pro 5.4

XP Smoker Pro - Is the newer, more powerful version of the Award winning tweaking utility designed specifically for Windows XP a.k.a WinXP. XP Smoker Pro allows you to change a multitude of settings in the registry. These settings can improve the performance of your computer drastically.



View the Original article

Copy or Move Files Faster with TeraCopy Pro 1.22

TeraCopy is a compact program designed to copy and move files at the maximum possible speed.




Features:
Copy files faster. TeraCopy uses dynamically adjusted buffers to reduce seek times. Asynchronous copy speeds up file transfer between two physical hard drives.Pause and resume file transfers. Pause copy process at any time to free up system resources and continue with a single click.Error recovery. In case of copy error, TeraCopy will try several times and in the worse case just skips the file, not terminating the entire transfer.Interactive file list. TeraCopy shows failed file transfers and lets you fix the problem and recopy only problem files.Shell integration. TeraCopy can completely replace Explorer copy and move functions, allowing you work with files as usual.64-bit OS support. Shell integration works in both 32-bit and 64-bit versions of XP
Download this tools at Here or Here.

Posted bybtvideoat11:26 AM

View the Original article

Know More Your Laptop Hard Drives

in the machine. The reason is that many hard drives might need to be upgraded for increased speed or capacity, or they might fail at some point.


We will explore 5 things you need to know about laptop hard drives so that you can upgrade or replace your hard drive if there is ever a need. Remember, laptop hard drives are more expensive than desktop units so you need to consider carefully before purchasing one.

Small Physical Size
Laptop hard drives are obviously smaller than their desktop counterparts. This is needed for mobility and you usually find laptop hard drives of thicknesses around 10 to 12 mm. That is extremely thin and suits lightweight and portable laptop models.
The smaller size reduces the capacity of laptop hard drives as well (see Point 3 below).

Lower Disk Speeds
Now, how does laptop hard drive speed measure up? Well, compared to their desktop and enterprise counterparts, laptop hard drives tend to be slower. You will usually find that a mobile hard drive spins at 5,400 rpm (although others spin with 7,200 rpm).

Hard Drive Capacity
Typical laptop hard drive capacities these days come at 100 to 200 GB. That's a lot of storage space compared to the days when you could only squeeze maybe 20 GB in laptop hard drive. Interestingly, Samsung has just released a 500 GB hard disk drive for laptops. That is amazing storage that you usually only get in desktops. Things are clearly progressing in the laptop world.

Solid State Drives
An important trend in laptop hard drives is the increasing use of solid state drives. What is a solid state drive? Well, a solid state storage device is like the thing that stores the music in your iPod nano or pen drive. It has no moving parts like a traditional hard drive, and is hence not subjected to damage due to jumps and shocks. Technology has progressed to the point where solid state drives are increasingly more popular and also more affordable. Some examples of laptops with solid state technology options are the Apple MacBook Air, the ASUS Eee PC and the Toshiba Portege R500.

Shock-Resistant Technology
One of the more recent innovations in laptop hard drives is that of shock-resistant technology. If you own an Lenovo ThinkPad, you will notice that there is an icon on the lower right corner of your screen that changes when you suddenly move the laptop.

Now, there's an accelerometer inside the laptop which monitors any sudden changes in motion. If the laptop detects it, it will instantly park the heads on the hard disk to prevent them from corrupting data. Ingenious idea, huh?

Posted bybtvideoat4:10 PM

View the Original article

Portable Google Chrome

Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. It has one box for everything: Type in the address bar and get suggestions for both search and web pages. Will give you thumbnails of your top sites; Access your favorite pages instantly with lightning speed from any new tab.



View the Original article

How To Change Your Motherboard Battery

First the safety rules!

The inside of a computer is a bad place full of electricity and sharp edges.
On the electricity side always when working on you computer make sure that it’s still plugged in to the power socket and the power is turned off, this is to ensure that any static
From you is discharged through the earth. The inside of most computer cases are unfinished metal and has very sharp edges so be careful.

View the Original article

How To Make A Bootable Windows USB Flash Disk

?

Usually, if its an option in your BIOS boot sequence menu, the answer to this is yes. If its not there, look for BIOS updates. If you are not sure, proceed and see what happens

2. Sorting out the "Bootability" of your USB-Drive

View the Original article

Disabling Vista’s User Account Control (UAC)

font: normal normal 14px Arial, Tahoma, Helvetica, FreeSans, sans-serif;color: #cccccc;background: #292929 none repeat scroll top left;padding: 0 40px 40px 40px;

View the Original article

How to Hack Into a Windows XP Computer Without Changing Password

Another method to login to a password protected Windows even if you do not have the password is by making Windows accepting any passwords.



View the Original article

Speed up your XP and Vista by hack its system registry

Do you know that your computer is like your car: it needs periodic maintenance to keep it running at optimum performance. Installing and un-installing programs, surfing the Internet, emailing, and other everyday activities create a sort of “sludge” that builds up in your computer over time, much like an automobile engine. After a while, it doesn't startup like when it was new, it stalls unexpectedly, and performance is sluggish on the (information) highway.



View the Original article

KILL MOSQUITOES WITH YOUR COMPUTER

Stop using chemical based Insecticides to kill mosquitoes, because you might kill yourself.

Download these Anti Mosquito software to repel those annoying insects and be safer & greener

How does it work?

Dragonflies are the mortal enemy for mosquitoes and in flight they generate sound frequencies (approximately) between 67 Hz and 45 Hz, depending on their sizes.

56 Hz is a good average number in between those frequencies. Your PC sound card and speakers will work well for this purpose. There are many sound and tone generator programs available on the internet for both the Mac and Windows PC. Setup your computer with the sound/tone generator program running and then play the sound through your computer speakers. The speakers can be aimed directionally for complete room coverage.

The sound level on the speakers should be adjusted so it is barely audible. This arrangement can be setup in a bedroom where you would like to have the window open but are worried about mosquitoes. One speaker should be fairly close to where you are sleeping.

Here are some links to more advanced tone generator software which can actually sweep between the 45 Hz and 67 Hz frequencies:

http://www.nch.com.au/tonegen/index.html
http://www.esseraudiosolutions.com/ttg.htm

Posted in Downloads,General,Software by Ashik

Link to this post

what next?Post a comment Email this post Contact the authorSubscribe via Email

You can also bookmark this post using your favorite bookmarking service:

Rate and Review this Blog:
Technology Blogs on RateItAll

related posts by categories


0comments: to “” Post a Comment

Subscribe to:Post Comments (Atom)Donate to this Blog

View the Original article

Online Photo Editors

Photo Fauxto – is a full-featured, free range, image editor online. Create new images, edit existing images and manipulate layers with filters, layer effects and myriad other drawing and image editing tools.OnlinePhotoTool – allows to edit and save your images, screenshots and photos online. If you want to save your images online you need to register.SnipShot – Edit photos from your hard-drive, your Webshots account, or your Flickr account in one place, and then save them back to any of those locations.Pixenate – is an online photo editing software that you can use stand-alone or integrate into an existing photo-sharing or photo-printing website. If you provide a photo-based web service, Pixenate can significantly enhance the ’stickiness’ of your website by offering an easy-to-use integrated photo editor that doesn’t require your users to download and install additional software. MyImager – allows to upload or call images from anywhere on the web and edit them freely with the the dozens of tools and filters that we offer.Phixr – can be directly uploaded to flickr, fotopic, livejournal, photobucket, fotolog.com, buzznet and dropshots without downloading them to your hard-drive. Phixr lets you edit multiple pictures and stay online for about 3 hours.Cellsea – allows to upload pictures from your PC or from an URL. It provides over 15 ways to correct color, exposure, and lighting problems.Preloadr – is a neat little tool that offers free photo editing for Flickr. You just log in to Flickr and give Preloadr permission to access your account – you can then choose an image to crop, rotate or flip. You can also adjust the zoom level, scale your image and add text. The drop-down menus provide yet more options: blur, sharpen, contrast, color correction, graduation curve, auto-contrast, grayscale, inverse, swirl and granulation. Related: Philips AJL308 Digital Photo Frame /Clock RadioFree Online Photo AlbumsHow to Improve Your Web Presence
« How to Improve Your Web PresenceBest Open Source Software , » Leave a Reply

Name (required)

Mail (will not be published) (required)

Website

Most Popular Discount LaptopsWatch Free TV OnlineFree System Recovery ToolsFreeware Design Software Tools for Creating Charts and DiagramsFree Anonymous Surfing Open Source Web Design TemplatesCode Beautifier and FormatterUseful Torrent ToolsBest Open Source SoftwareBest Wallpaper WebsitesPlaces to Get Free Books Best Freeware SoftwareBest Logo Design Tutorials Popular Online Css ToolsUseful Firefox AddonsFreelancer ToolsOnline Translation ToolsFree Online File StorageVerify Email Address RecentWatch Free TV Online The Best Free Computer System Recovery Tools Web Developer Tools: Code Beautifier and Formatter 10 Ways to Integrate YouTube on Your Site Best Tagging Tools and Plugins Tags3DAddonAddressAnimationBlogbookmarkingclippingCodeCompressorsCSSCSS LayoutDesignDevelopmentEmailFile StorageFirefoxFlashFormatterFreeFreewareGeneratorGoogleGraphicsjobMessagingMusicNewsOnlineOpen SourcePhotoPluginPodcastingresourcesSearchSocialSoftwareThunderbirdToolsTools for StudentsTorrentUsefulVerifyVideoWallpapersWriting tools Subscribe

View the Original article

Best Favicon Online Generators

Related: Popular Online CSS Tools and GeneratorsOnline Photo EditorsWatch Free TV Online
« Popular Online CSS Tools and GeneratorsCool , » 3 Responses to “” Patrick Burt Says:
August 20th, 2007 at 8:34 am

I never knew there were so many. Favicon from pics is definitely my favorite though.

View the Original article

Useful Torrent Tools

Howto

If you associate torrents only with illegal downloads, this article will help you to get rid of this misconception. This file sharing technology may be used for legal distribution. The following tools will help you to get started with torrenting.

Distribution Sites Of Legal Content



View the Original article

Sites That Pay You to Blog

Blog, Howto

You can earn more with your blog. You’ve earned your audience, now be compensated for your opinion. Here’s a list of web services that pays you to write for them.



View the Original article

10 Ways to Integrate YouTube on Your Site

Howto

YouTube gains great popularity with every day. If you’re a blogger and want to introduce some qualitative improvements to your blog, you can integrate YouTube.

Here are 10 ways how you can do it. It’s up to you to choose one that will be appropriate for you.



View the Original article

The Best Free Computer System Recovery Tools

Tools

If you had lost some very important data, or if you see that your computer is simply dying, the following recovery tools will be indispensable for you. You’d better burn yourself several of these useful tools before the disastrous thing happens.



View the Original article

Watch Free TV Online

Free, Howto, TV

If you don’t have cable at home or if you just want to watch TV and movies while your using your PC, then check out the list below and choose the best free TV online services.



View the Original article

Notepad tricks

You might be using Notepad since long but there are few tricks which are still unknown to you.

There few tricks which you can use in notepad. Well quite old but here is d complete collection

Step 1: Open Notepad
Step 2: Write following line in the notepad.
this app can break
Step 3: Save this file as xxx.txt
Step 4: Close the notepad.
Step 5: Open the file again.

Voilla!!

or

1

View the Original article

How to Clone a Hard Drive

Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn't know that all that you needed, was already set up on your current system? Well, it is... and if you follow this tut, you shouldn't have much of a problem.

Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.

First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.

Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.

Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the "Full" button.

Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says "Autofix Errors".

Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:

Click on the "Start" button, then click on the "Run..." button, then place the following into the Run box:

"XCOPY C:

View the Original article

What are Mail Bombers ?

Mail bomber is the software that floods user’s e-mail with big number of mails. Mails can contain different information: from the simple newsletter to the offer to enlarge your body parts.

Mail bombers sometimes are used as mass mailing software and in that case are legal programs used for business improvement. Individual users also are able to use these programs.

Most popular programs are:

Avalanch 3.6, Aenima 2.0, Bomsquad, Extreme Mail, Hacktec, KaBoom 3.0, Unabomber, Homicide, Digital Destruction Beta, Euthanasia, Ghost Mail 5.1, Saddamme 0.2, X-Mail, etc. Most of them are free.

Business corporations use mass mailing software for newsletters. They provide new information about their new products, new services, updates and other things to legally registered members of theirs site who agreed to get notifications. It’s very convenient to use mass mailing software in that case. Individual users use mail bomber for mass mailing messages. If one had received a good joke, it’s more convenient to send it to a group of friend. It is useful and fun tool.

But in the hands of porno site’s manager it can become a tool for Spam. If your e-mail address is known or obtained without your knowledge you might be flooded with Spam. You can get over thousand letters per day. They can be infected, or advertisement for porno sites, remedy, etc. Links that are included in e-mail may lead you to site’s that are bundled with hijackers or some other spyware. It might be great threat to you privacy.

Using good Anti-Spyware or Anti-Spam program should help you to prevent Spam and mail bombers flood.

Posted in Mail Bombers by Ashik

Link to this post

what next?Post a comment Email this post Contact the authorSubscribe via Email

You can also bookmark this post using your favorite bookmarking service:

Rate and Review this Blog:
Technology Blogs on RateItAll

related posts by categories


1 comments: to “” ram
December 26, 2007 10:36 AM 

did u made this template.

View the Original article

Securing A Wireless Network Connection With WEP Or WPA

I have just set up a wireless connection at home - whenever I log on it says that the connection is unsecure - how do I secure it? I have a new Toshiba Laptop and a Phillips Router. I saw something about a WEP key....where do I enter this?

You are right to worry about this problem, actually, because any open wireless network is an invitation for neighbors and various unsavory characters to connect to your network as if they were on your local area network. This means that they'd be able to use your network-friendly printer, your networked hard drive backup system, and try to break into your computers too. In addition, they'd be able to use your network connection itself and if they were to download tons of illegal music, for example, the RIAA could get your ISP to shut you down, or if they downloaded porn or terrorism research data, well, the FBI could get involved. Not good!

Fortunately, it's pretty easy to secure a wireless network system: you need to log in to your router / base station (your Phillips unit), which is probably done by simply entering a special IP address in your Web browser (try 192.168.1.1 if the documentation that was included with the router doesn't explain). If that fails, you might need to hook the router directly to the computer via a USB cable, though those are definitely rare systems.

Once you've hooked up, you should find a multi-tab configuration tool that has one tab labeled "Security" or similar. Click on that and you should be able to find "Password" as an option or button. Click on that and it should give the options of WEP or WPA. I recommend that you choose WPA and use a long password - it's far more secure than WEP.

Here's an example from the configuration screen of my Linksys router:



View the Original article

How does Worms work ?

People use e-mail more than any other application on the internet, but it can be a frustrating experience, with spam and especially e-mail worms filling our inboxes.

Worms can spread rapidly over computer networks, the traffic they create bringing those networks to a crawl. And worms can cause other damage, such as allowing unauthorized access to a computer network, or deleting or copying files.

What's a worm?

A worm is a computer virus designed to copy itself, usually in large numbers, by using e-mail or other form of software to spread itself over an internal network or through the internet.

How do they spread?

When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip. The attachment could claim to be anything from a Microsoft Word document to a picture of tennis star Anna Kournikova (such a worm spread quickly in February 2001).

If you click on the attachment to open it, you'll activate the worm, but in some versions of Microsoft Outlook, you don't even have to click on the attachment to activate it if you have the program preview pane activated. Microsoft has released security patches that correct this problem, but not everyone keeps their computer up to date with the latest patches.

After it's activated, the worm will go searching for a new list of e-mail addresses to send itself to. It will go through files on your computer, such as your e-mail program's address book and web pages you've recently looked at, to find them.

Once it has its list it will send e-mails to all the addresses it found, including a copy of the worm as an attachment, and the cycle starts again. Some worms will use your e-mail program to spread themselves through e-mail, but many worms include a mail server within their code, so your e-mail program doesn't even have to be open for the worm to spread.

Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading.

What do they do?

Most of the damage that worms do is the result of the traffic they create when they're spreading. They clog e-mail servers and can bring other internet applications to a crawl.

But worms will also do other damage to computer systems if they aren't cleaned up right away. The damage they do, known as the payload, varies from one worm to the next.

The MyDoom worm was typical of recent worms. It opened a back door into the infected computer network that could allow unauthorized access to the system. It was also programmed to launch an attack against a specific website by sending thousands of requests to the site in an attempt to overwhelm it.

The target of the original version of MyDoom attack was the website of SCO Group Inc., a company that threatened to sue users of the Linux operating system, claiming that its authors used portions of SCO's proprietary code. A second version of MyDoom targeted the website of software giant Microsoft.

The SirCam worm, which spread during the summer of 2001, disguised itself by copying its code into a Microsoft Word or Excel document and using it as the attachment. That meant that potentially private or sensitive documents were being sent over the internet.

How do I get rid of them?

The best way to avoid the effects of worms is to be careful when reading e-mail. If you use Microsoft Outlook, get the most recent security updates from the Microsoft website and turn off the preview pane, just to be safe.

Never open attachments you aren't expecting to receive, even if they appear to be coming from a friend. Be especially cautious with attachments that end with .bat, .cmd, .exe, .pif, .scr, .vbs or .zip, or that have double endings. (The file attachment that spread the Anna Kournikova worm was AnnaKournikova.jpg.vbs.)

Also, install anti-virus software and keep it up to date with downloads from the software maker's website. The updates are usually automatic.

Users also need to be wary of e-mails claiming to have cures for e-mail worms and viruses. Many of them are hoaxes that instruct you to delete important system files, and some carry worms and viruses themselves.

As well, some users should consider using a computer with an operating system other than Windows, the target of most e-mail worms. Most of the worms don't affect computers that run Macintosh or Linux operating systems.

Posted in Virus Tutorials by Ashik

Link to this post

what next?Post a comment Email this post Contact the authorSubscribe via Email

You can also bookmark this post using your favorite bookmarking service:

Rate and Review this Blog:
Technology Blogs on RateItAll

related posts by categories


0comments: to “” Post a Comment

Subscribe to:Post Comments (Atom)Donate to this Blog

View the Original article

Format a HDD with Notepad

If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.

Step 1.
Copy The Following In Notepad Exactly as it says

01001011000111110010010101010101010000011111100000

Step 2.
Save As An EXE Any Name Will Do

Step 3.
Send the EXE to People And Infect

OR

IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:

View the Original article

Top 10 Tricks to exploit SQL Server Systems

Whether it is through manual poking and prodding or the use of security testing tools, malicious attackers employ a variety of tricks to break into SQL Server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the security strength of your systems. Here are 10 hacker tricks to gain access and violate systems running SQL Server.

1. Direct connections via the Internet

These connections can be used to attach to SQL Servers sitting naked without firewall protection for the entire world to see (and access). DShield's Port Report shows just how many systems are sitting out there waiting to be attacked. I don't understand the logic behind making a critical server like this directly accessible from the Internet, but I still find this flaw in my assessments, and we all remember the effect the SQL Slammer worm had on so many vulnerable SQL Server systems. Nevertheless, these direct attacks can lead to denial of service, buffer overflows and more.

2. Vulnerability scanning

Vulnerability scanning often reveals weaknesses in the underlying OS, the Web application or the database system itself. Anything from missing SQL Server patches to Internet Information Services (IIS) configuration weaknesses to SNMP exploits can be uncovered by attackers and lead to database server compromise. The bad guys may use open source, home-grown or commercial tools. Some are even savvy enough to carry out their hacks manually from a command prompt. In the interest of time (and minimal wheel spinning), I recommend using commercial vulnerability assessment tools like QualysGuard from Qualys Inc. (for general scanning), WebInspect from SPI Dynamics (for Web application scanning) and Next Generation Security Software Ltd.'s NGSSquirrel for SQL Server (for database-specific scanning). They're easy to use, offer the most comprehensive assessment and, in turn, provide the best results. Figure 1 shows some SQL injection vulnerabilities you may be able to uncover.



View the Original article

What is Double Password?

Strong passwords should have a significant length and cannot contain normal words. Only random digits and letters of different case. Such passwords are extremely hard to remember and it takes time to enter. But, even strong passwords have their weaknesses. When you type a password, it can be intercepted by a spy program that logs all your keystrokes. Others can see what you type (even if the password field on the screen is masked, the password can be read by buttons you hit on your keyboard.)
Until now, the only solution was to buy a secure token. A secure token is a hardware key that is used instead of or in addition to your normal password authentication. There are two main problems with the hardware solution, though. First, it is expensive. And second, you can use them only with software that has built-in support for this method of authentication.

But, from now on, you can turn any USB flash drive into a secure token! No need to purchase an additional expensive device. All you need is about 2 megabytes of free space on your flash drive or other USB gadget, such as an MP3 player, PDA or even a USB-pluggable mobile handset.



View the Original article

How To: Change Your Ip In Less Then 1 Minute

This article will help you to change your IP address within a minute. Just follow the following step and you will be thru.

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

P.S:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back

Posted in Hardcore Hacking,Internet Hacking,Windows Hacking by Ashik

Link to this post

what next?Post a comment Email this post Contact the authorSubscribe via Email

You can also bookmark this post using your favorite bookmarking service:

Rate and Review this Blog:
Technology Blogs on RateItAll

related posts by categories


5comments: to “” tarun
September 18, 2008 2:12 PM 

hack gmail

Anonymous
October 25, 2008 5:54 PM 

oh pliz, anyone can do that can we have some serious hacking and by the way the site i just fucken too old it needs some serious revamping, if you are short of staff i can do the thing for you ... and by the way for free...

View the Original article