16 August 2008

USB Hacks:Prevent Users From Writing to USB



If you have windows XP with SP2, then you can disable the writing option to USB drives. This trick is very useful if you have virus in your computer and want to copy files from a USB Drive but don’t want to transfer virus to the USB. Follow the given steps to disable the USB writing option:

To edit the computer registry, first you should log onto your computer with administrative rights.

First click on Start button and type “Regedit” in Run option.

Here locate the location to:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control

Here in right side panel, click right to create a key with the name “StorageDevicePolicies”.

Now in left side panel, select “StorageDevicePolicies” key, again right click to create new DWORD value then label it “WriteProtect”. Set its value to “1″. But again to enable writing, set its values to “0″.

Now close the registry editor and restart your computer after any changes to go into effect.

Background Image for USB Window

Wouldn’t it be nice to have a background image for the USB window upon connection of your USB storage device? This simple, quick USB hack will show you how to create a background image.




To perform this simply copy the following information in notepad:

[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
Attributes=1
IconArea_Image=your background picture

Change: the IconArea_Image= to the name of your jpeg file…I did: ericbana.jpg

Next, save the code above as desktop.ini

Last: place the ini file and the jpg file in the root of your USB drive.

I used ERIC BANA image for example.you can use your pics too..

Refresh or reconnect your device and …bamb…USB background image done. Tip: The image will repeat so when creating the jpeg be sure to leave plenty of white space in your image file.so customize ur pic pixels..

24 July 2008

Shutdown the computer remotely

This is will show you how to shutdown a computer (from your own) remotely. there is no need to send a file sneak on their computer or have any contact with them. This requires little or no DOS skills.



step 1Find their computer name
first type "net view"
next find you target in the list (by the way the target needs to be on your network)
congratz you've found your target.

by the way its also easier if u can sneak a peek at their computer for a minute. if you can click start right click my computer click properties then go to computer name. but thats only if theres alot of computers like in an office or a school.



step 2Shutdown -i
go to run and type cmd. this will bring up command promt or DOS. type shutdown -i and a dialog should come up


step 3Type
type the computer name. then change warning time to 2 seconds and type a message if you want.



step 4Done
Click ok and your done

How to enable & disable USB ports



A desktop computer equipped with a CD writer or a DVD burner is a rare sight in most companies. But a much larger security threat is posed by the open USB ports where mischievous office workers can just plugin the Flash Pen Drive, External Hard Disk or their iPod music player and transfer corporate data or even copy licensed software to their memory sticks in seconds.

Also, USB keys are not just a popular way to sneak data out from companies, unhappy employees may use USB ports for delivering trojans or spyware into the company networks.

Now some smart admins disable usb drive by changing the BIOS settings and then lock the BIOS using passwords. Some not so-smart admins fix tapes over the USB ports to prevent employees from inserting any USB device into their computer.

However, both these approaches can prove to be counter-productives as your staff can no longer use USB keyboards, wireless mouse, digital cameras, camcorders, scanners, printers or even USB microphones to their computers.

So a more reasonable option for sysadmins is to disable write access to USB port so that data files cannot be written to the mass storage device. The USB thumb drive will be read-only.

Open the Windows Registry and open the following key
HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Control\StorageDevicePolicies

Now add a new DWORD called WriteProtect and put the value as 0 to disable write privileges to the USB port. To reverse the step, either delete the WriteProtect REG_DWORD or toggle the value to 1 which will enable the port.

Remember that the above trick works only with Windows XP SP2.

If you like to go a step further and disable users from connecting USB storage devices to their computers, here's the trick:

Open registry and navigate to the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet \Services\UsbStor

Now in the right pane, double-click Start and type 4 in the Value data box (Hexadecimal) and quite the registry editor. To enable the USB storage devices, change the Start value back to 3.

No matter how good the protection tricks are, determined people always find workarounds. Here are some of the tricks that may render the above methods unusable:

» Employee may boot computer using a LiveCD like Knoppix or Ubuntu so the USB drives are again available to him for writing.

» They could open the computer chasis, take the battery out to reset the BIOS settings.

» Some may even invest in a PS2 to USB port converter.

» If he manages to get admin access for a temporary period (like installing software), he may undo the registry edits.

The cat-mouse game will never end. USB drives will remain a headache for the sysadmins for some time. However, Windows Vista will make life much simpler for IT administrators. There's a new Policy in Vista that allows USB keyboards or mouse to be used but not any USB devices.

19 July 2008

NASSCOM LIST

NASSCOM
Top 20 IT Software and Service Exporters FY07-08
1 Tata Consultancy Services Ltd.
2 Infosys Technologies Ltd.
3 Wipro Technologies Ltd.
4 Satyam Computer Services Ltd.
5 HCL Technologies Ltd.
6 Tech Mahindra Ltd.
7 Patni Computer Systems Ltd.
8 I-flex Solutions Ltd.
9 Mphasis an EDS company
10 Larsen & Toubro Infotech Ltd.
11 CSC in India
12 Aricent
13 Syntel Inc.
14 Prithvi Information Solutions Ltd.
15 Hexaware Technologies Ltd.
16 Polaris Software Lab Ltd.
17 NIIT Technologies Ltd.
18 Sonata Software Ltd.
19 Mastek Ltd.
20 Genpact India Pvt. Ltd.
Footnote: This list does not include some companies whose corporate headquarters are located
outside India, but have significant India-centric delivery capabilities, and have not shared their Indiacentric
revenue figures. Had they been ranked based on their India revenues, companies such as
Accenture, Cognizant, HP, and IBM and would have also appeared in this ranking.

10 July 2008

Memory Installation

Since it's a lot harder to work on a motherboard when it's sitting inside a case, we might as well install the memory before we slip the mobo into our enclosure. These days, most systems run their memory in dual-channel configurations using pairs of memory modules. Motherboards are typically equipped with four DIMM slots, two of which correspond to each memory channel, so you'll want to check your motherboard's manual to determine which slots correspond to which memory channel. Be sure to install at least one memory module per channel.

Once you've figured out which slots to populate, sliding memory modules into place is a snap. Like processors, modules are keyed so they only fit into DIMM slots one way. Orient your modules accordingly, and apply even pressure along their top edge to seat them into the DIMM slots. If the module rocks back and forth as if on a central pivot point, you've got it turned around the wrong way.

If you're running fancy-pants memory modules with ginormous heat spreaders, like those pictured above, you may run into clearance issues with larger aftermarket processor heatsinks. Unless the heatsink's orientation can be changed to provide additional clearance for the DIMM slots, you'll have to settle for lower profile memory modules or a less extravagant CPU cooler.

When memory modules are seated correctly, retention tabs located at the ends of the DIMM slots should swing up into their upright and locked position, ready for take-off. If these tabs aren't completely locked, you should be able to flick them into place easily with your finger.
Preparing the enclosure
We're done with the motherboard for the moment, and must now prepare the enclosure for its arrival. Time to break out the screwdriver, folks.

The first thing we need to do is remove the enclosure's side panels. With some cases, only the left panel needs to be removed or even can be removed. However, if your enclosure has removable panels on both sides, we recommend taking both off. The additional access will come in handy when we clean up wiring within the case.

Most modern enclosures hold their side panels in place with thumbscrews or mechanical latches, so you probably won't even need a screwdriver to remove them. And if you need instructions on how to use a screwdriver, well, perhaps assembling a system from scratch is a little ambitious.

Removing the case panels gives us access to the enclosure's internals—most importantly, the panel on which the motherboard will set. The motherboard doesn't rest directly on the metal panel, though; that would create all sorts of short circuits. Instead, the motherboard sits atop a series of posts that separate it from the case.

Motherboard posts should come bundled with your case, and they can be screwed directly into the motherboard tray with your bare hands. Making sure they're tight.

When screwing posts into the motherboard, be sure that they line up with the board's mounting holes; posts that don't line up can make contact with solder points on the underside of the board, creating short circuits. We recommend using at least six mounting posts for a standard ATX motherboard, but to be on the safe side, you might as well use as many as there are mounting holes on your board.


Once the posts are in place, fish the I/O shield out of your motherboard box. Most cases already come with a generic I/O shield, but chances are it won't line up properly with your motherboard's port cluster. If your case has a generic shield, pop it out and toss it. The I/O shield that comes with your motherboard should easily snap into place.

Before moving on, we're going to save ourselves some hassle by bending back the metal tabs on the inside of the I/O shield. In the picture above, these tabs can be seen above the PS/2, Ethernet, and Firewire ports. Bending these tabs back will ensure that they don't catch on the motherboard ports when we slide it into the system.

We're now all set up to install the motherboard into the case, but before doing that, it's worth filling in a few other components that will be easier to install in an otherwise empty enclosure.

First among these is our system's hard drive. These days, it seems every case manufacturer mounts hard drives slightly differently, but the enclosure we've busted out today takes a simple approach. Hard drives slide neatly into internal 3.5" bays—with the drive ports facing out, of course—and are held in place by screws. Depending on your enclosure, you may need to secure the drive with screws on both sides; it's a good thing we removed the right-side case panel.

Which internal drive bay ends up housing the system's hard drive is up to you, but I prefer to have drives sitting in lower rather than higher bays. Heat rises, and we might as well put the drive in the coolest part of the case that we can. If you're running a system with multiple hard drives, try not to stack them in bays directly on top of one another. If possible, leave an empty bay between drives to allow air to flow freely between them.

Next up is our system's optical drive. This goes in one of our enclosure's external 5.25" bays, and in traditional cases, it's held in place by screws. Of course, these screws are slightly different from the ones that hold the hard drive in place—you know, because it would be entirely too convenient for the same screw type to be used throughout. All the screws you need should come with the case, and as a rule, ones with finer threads are used to secure optical drives and the motherboard, those with coarser threads and small heads secure hard drives, and those with coarse threads and large heads are reserved for case panels and expansion cards.

If you're going to be running a single optical drive, check to make sure that its jumper is set to Master or Single Drive. This should be the drive's default position, and you don't need to change it unless you plan on running a second optical drive off the same cable. Drives with SATA interfaces are a little more convenient, since they don't have these jumpers and won't need to be configured in this way.

You'll notice that we're installing the optical drive in the case's highest 5.25" drive bay. Optical drives aren't used frequently, so we're not so concerned with whether they're in the coolest possible bay. Instead, I like to mount optical drives as high as possible in tower enclosures to make them easier to reach when the case is sitting on the floor.

If you want to kick it old-school, now would be the time to install a floppy drive in one of the enclosure's external 3.5" bays. Same drill as with the optical drive, except with fewer choices; most cases only have one, maybe two external 3.5" bays. Those inclined to join the 21st century will probably have replaced the aging floppy drive with a zillion-in-one media card reader that slides into the same slot.

Assembling the core

The CPU lies at the core of the modern PC, making it an appropriate place to start our build. For this first step, you'll of course want the processor, and also your system-to-be's motherboard.

This particular assembly guide features an Intel processor with a LGA775 socket, so certain steps won't be applicable to systems using AMD processors based on Socket AM2. Socket AM2 isn't hard to figure out, though; processor installation instructions typically come bundled with both the processor and the motherboard.

After laying the motherboard out on a clean work surface, remove the plastic cover that shields the LGA775 socket's pins from harm. Be careful not to bend or otherwise disturb these pins—they need to line up just right with contact points on the base of the CPU.


With the plastic guard removed, you'll easily be able to unclip the lever that holds the socket's CPU retention mechanism in place. Flip this retention bracket back on its hinges to expose the socket in full.

Modern CPUs are keyed to ensure that they can only be inserted into a socket one way, just like a puzzle piece, so you should have no problem dropping your processor into the socket. LGA775 processors, for example, have little indents along opposing edges that line up with protrusions in the socket. If your CPU struggles to slide smoothly into the socket, chances are you've got it oriented the wrong way.

Once the processor is sitting comfortably in the socket, flip the retention bracket back down and use the lever to clamp it into place. This secures the CPU to the motherboard.

With the processor installed, we can move onto the application of thermal compound. Some folks like to apply thermal paste before dropping the processor into the motherboard, but I find that tends to be a little messier without making things any easier.

Before slathering thermal compound all over our processor's exposed cap, it helps to make sure that cap is nice and clean. Gently brush the cap with a Q-Tip dipped in rubbing alcohol to rid it of any dust or oils that it may have picked up from your grubby carefully manicured fingers during the installation process.


Next, we apply thermal compound. Most retail processors that come packaged with coolers will already have thermal compound applied to the base of the heatsink. If yours does, you can skip this step and proceed directly to heatsink installation. However, we recommend applying thermal compound yourself. Thermal compound works best as a very thin layer between the CPU and heatsink, and most heatsinks that come with paste pre-applied use a thicker layer than is optimal.

You really only need a small dab of thermal compound to ensure complete coverage for the CPU. The dollop pictured above is more than enough, and it's best squeezed onto the center of the processor's metal cap.



Next, spread the thermal compound over the processor, ensuring complete and even coverage. Some thermal compounds come with plastic spreaders, but you can also use a credit card or even a finger wrapped in a plastic bag. What you want to end up with here is a relatively smooth layer that's just thick enough to completely cover the processor.

Don't worry about getting a little paste on the CPU retention bracket; it won't do any harm there. You will want to clean up any compound that makes its way onto the motherboard or its surface-mounted components, though. A Q-Tip dipped in rubbing alcohol should do the trick.

Once the processor is glazed with compound, we can turn our attention to the heatsink. If you've elected to do your own thermal compound application, you'll want to make sure that the heatsink's base is scrubbed clean. Rubbing alcohol usually gets the job done, but some heatsinks are slathered with particularly gooey, clingy, or otherwise uncooperative thermal interface materials. It may be necessary to break out more noxious substances, such as nail polish remover, to restore the base of the heatsink to a bare metal shine.

Be careful not to mar the base of the heatsink when removing any thermal compound that may cover it. Some heatsinks need to be scraped clean of thermal compound, and it's best to scrape with something plastic rather than a metal tool that will gouge the heatsink's surface.


With our system's processor blanketed by a thin veil of thermal compound and our heatsink's base scrubbed clean, it's time to mate the two together. Before dropping the heatsink into place, ensure that all four of the heatsink's plastic retention posts are rotated clockwise into their installation position. Next, place the heatsink on top of the CPU, lining up the four retention posts with corresponding holes in the motherboard.

When the posts are lined up, depress the black plastic tabs one by one to lock the heatsink into place. You should hear an audible click as each post locks into place.

Since the area around a modern motherboard's CPU socket is often crowded with tall capacitors, heatsinks, and elaborate heatpipe arrays, I find it's best to depress the retention post that's least accessible first. The post directly opposite that one should be next, followed by the remaining two in whichever order you desire.


After locking the heatsink into place, plug its fan into the appropriate header on the motherboard. The CPU fan header is usually right next to the socket, but if you can't find it, your motherboard manual should have a map highlighting its location.

Note whether the heatsink you're using features a fan with a three- or four-pin header. That information will come in handy when we jump into the BIOS to configure fan speed control, since some motherboards can't auto-detect fan types.

How to build a PC

A step-by-step guide to enthusiast system assembly
The best thing about being a PC enthusiast—beyond, of course, the never ending joy of serving as the personal support technician for friends and family—is being able to assemble a system from the ground up with the perfect mix of components for a given budget. That mix of components will vary depending on your needs, but with today's market so rich with high-performance hardware at affordable prices, it's easy to spec a custom system that will blow the doors off pre-built boxes from major PC vendors.

Users new to building systems from scratch need more than just a shopping list, though. There's an art to assembling a rig from bare components. Building a PC can be a daunting task for a newbie who has never put a system together before. For those folks, a step-by-step guide covering the basics of system assembly is given below. Keep reading to know how to build a PC from scratch.

Getting started
Before diving into assembly, you'll want to gather a few supplies and find a large, clean work area that preferably isn't teeming with static electricity. As far as tools are concerned, you shouldn't need more than a Philips head screwdriver; one that holds screws in place with a magnetic tip is ideal. We'll also be using rubbing alcohol, Q-Tips, and zip ties. Everything else that you need should be included with the various components you've gathered to put into the system. Yes, you'll need those components, too.

Prior to removing any of the components from their packaging, you'll want to take the precaution of grounding yourself by touching a large, metal object like a table base, filing cabinet, or your PC's case—whatever's nearby—in order to discharge any static electricity you may be carrying with you. Static electricity can be harmful to PC components. Some folks prefer to use an anti-static wristband in order to keep themselves grounded.

08 July 2008

Sony Ericsson Naming Explained


Thanks to whoever added some detailed Sony Ericsson naming info on Wikipedia. Just as the last two letter of BMW models indicate the vehicle’s displacement, there’s a story behind each Sony Ericsson name.
The most common format uses a total of five (or six) characters, eg. K750i. This format begins with a capital letter to denote the series of the phone (K750i). This is then followed by three numbers (K750i).

The first number indicates the sub-series of the phone, the second indicates the amount of progression from the previous release, i.e. K700i to K750i, and the third number is always either a ‘0′ or ‘8′ and the letter ‘8′ is used either to show a variation of the phone destined for a different market without a feature , or it is used to separate phones which have identical specifications but the designs are different. Examples:

* The W888 is a W880i without 3G
* The K610i and K618i.

Finally, the lowercase letter at the end of the model name describes the market for which a product is intended; these are:

* a for the Americas,
* c for China,
* i for an international version

There is also an ‘im’ suffix used for branding i-mode phones. Often the last letter is left out to describe the phone generically with no region specific branding.

Acer intros breadbox-sized X1200 desktop


Acer intros breadbox-sized X1200 desktop, AMD, Vista, GeForce, Acer, Aspire, Athlon aceraspirex1200-lgToday Acer has introduced breadbox-sized X1200 desktop in the market. Acer gave the US a rare minute addition to its Aspire desktop schedule. The X1200 is just in excess of a foot long at its largest dimension but fits in desktop machinery and expansion that would normally be unreasonable in its size. Up to a 2.6GHz Athlon 64 X2 is complemented by a GeForce 8200 for incorporated graphics as well as a PCI Express 2.0 slot that allows devoted video or other peripherals. Every system also fits 4GB of memory.

The all-black chassis also finds room for expansion that is left out even on larger systems, including a total of nine USB ports on the front and back, a 14-in-1 card reader, and FireWire.

Acer is distribution three dissimilar trim levels depending on tastes. A base edition ships with a 2.5GHz Athlon 64 X2, a 320GB hard drive, a DVD burner, and Windows Vista Home Premium in 64-bit form for $450; upgrading to the 2.6GHz processor adds $10 to the price, while a version of the same system with a 22-inch LCD and a 500GB drive boosts the price to $700.

06 July 2008

SwissMemory Pocket Knife with Laser

SwissMemory Pocket Knife with Laser

What you see above is a combination of Swiss knife, USB flash drive and a laser/ The product is named as SwissMemory Pocket Knife with Laser. It offers Swiss Army knife, 1GB or 2GB USB drive and a laser.

This tool is priced at $148 for 2GB version and $105 for 1GB version. If you don’t want the knife, you can get the version with only USB Flash and laser for $140 and $97 respectively.

Samsung Yepp U4 Music Player

Samsung Yepp U4 Music Player

Samsung is going to release its Yepp U4 Digital Audio Player (DAP). The official website shows only “Coming Soon” for this new music player and no much information are available right now, but we can expect a small screen.

Wrist MP3 Player

Introducing the wrist MP3 player designed for runners. Designed to be everything you wanted in an MP3 player, with the benefit of you not even knowing it’s there. On the surface of the player, an OLED is housed underneath a layer of polycarbonate. On the outer edge of the player is a jog wheel (with bumps), which is a tactile sensitive ring that can be rotated in either direction. This jog wheel controls the tracking of the song or the volume. The user can switch between volume and tracking mode via the button on the outside.

There is no headphone jack. The player would use Bluetooth headphone, eliminating the tangled mess of wires that conventional headphones have but adding to the sensation that you feel like you aren’t even wearing a music player.


Memory Infinite, Like Linking Rubber Bands

Memory Infinite has a USB male connector at one end and a female connector at the other, providing an “add up” concept for USB finger discs. By connecting one Memory Infinite with another to, you can grow the space you need. The user can choose to combine or separate Memory Infinites to share files and if you build a chain long enough, you can wear it. When plugged into a computer, the daisy chain appears as one unified USB drive.


Memory Infinite by Vicky Wei

Geeky Gambling

Snap! It’s a USB flash drive that looks like a domino but the disguise serves a purpose. Each white dot denotes 1 gig of memory used. Not sure how useful that is but at least you’ll be ready for an imprompt street corner game of dominos.


This Thumb Drive Has Real Buzz…

One of the biggest issues with USB peripherals is the protruding nature of any design. From a Bluetooth adaptor to the tiniest of Flash Memory Drives, they all stick out like a sore thumb(drive). This issue with these protrusions is not just aesthetics, but function. USB peripherals are constantly being accidentally ripped out, knocked off or jammed into your computer causing not only damage to the external item but the computer’s USB plug itself. Serbian designer Damjan Stankovic, believes that flexibility in design can solve this problem. His “USBee” Flash Memory Drive won the first prize at the MS Industrial USB Competition held by the Serbian Design Community forum DizajnZona™. Ergonomically designed to bend at life’s will in any direction, this USB flash drive features a vented housing for cooling(I did not realize these needed cooling), and a detachable protective cap that snaps onto the back end of the device when not in use. No word yet if this will go into production, so all claims of memory capacity are a moot point.

Because it can squeeze into really tight spaces between the computer and any other object it cannot cause any physical damage to your PC that happens when the USB is accidentally knocked over.

The electronics are located in an aluminum shell which is covered in yellow silicon/rubber. The bottom part of the USBee has breathing holes within the silicone so that the aluminum can dissipate through and keep device cool.

02 July 2008

100 Portable apps for USB Stick(both Mac and Win)


This stuff can be installed on any portable drive, i.e. USB thumbdrive, PDA or an iPod. You can use them at work, school, or any other place where you can plugin your device. Check them out, you can either scroll-down for relevant category, i.e office software, email tools, messengers, games, etc. or get a ‘all-in-one’ package (all essential tools) . While there are more apps for windows users, I tried to include a mac version for each essential tool. All free. Enjoy!

What is a portable program ? : A portable program is a piece of software that you can carry around with you on a portable device and use on any other computer. It can be your email program, your browser, system recovery tools or even an operating system. The coolest part about it, is that all of your data and settings are always stored on a thumbdrive so when you unplug the device, none of your personal data is left behind.

  1. Portable Office Software
  2. Portable Email/Calendar/ToDo Programs
  3. Portable Text and Voice Messengers
  4. Portable Media Tools (Audio / Video)
  5. Portable Graphics Viewers and Image Editors
  6. Portable Browsers and Web Tools (FTP, Feedreaders, Torrent clients…)
  7. Portable Security Software
  8. Portable Games
  9. Other Portable Utilities
  10. Portable Developer Tools (Techies Only)
  11. All-In-One Packages
  12. Portable Operating Systems (’HowTo’ Articles)
  13. USB ThumDrive Tips

Portable Office Software

Portable Email/Calendar/ToDo Programs

Portable Text and Voice Messengers

  • All-in-One (Yahoo, MSN, ICQ, etc.): Gaim [Win, 6.9 mb], Miranda IM [Win, 1.2 mb], Adium [Mac, 15.5mb], Trillian [Win]
  • iChat [Mac] - requires locally installed iChat
  • Newspeak [Mac, 1mb] - Newspeak Cocoa IRC client
  • Skype - exlpains how to make skype portable

Portable Media Tools (Audio / Video)

  • Audacity [Win (2.4 mb), Mac (5mb)] - simple audio editor and recorder
  • VLC [Win (9.3 mb), Mac (24 mb)] - powerful media player that plays almost all popular audio and video formats
  • K-Lite Mega Codec Pack with Media Player (resource unaccessible) - another powerful media player for playing all conceivable formats
  • iShout [Mac, 7mb] - record and listen to your favorite internet radios.
  • CocoaJT [Mac, 8.7mb] - stream live TV programs from major broadcast channels.

Portable Graphics Viewers and Image Editors

Portable Browsers and Internet Tools (FTP, Feedreaders, Torrent Clients…)

Portable Security Software

Portable Games

Other Portable Utilities

  • 7Zip [Win, 1.1 mb] - file archiver and compressor, supports 7z, ZIP, GZIP, BZIP2, TAR, RAR and more
  • Registry Tweaker [Win, 1.52mb] - registry tweaking tool
  • Restoration [Win, 229kb] - handy program for recovering deleted (or formatted) files
  • YamiPod [Win] - powerful iPod manager (copy mp3/AAC files to and from your iPod, import/export playlists, search for songs, remove duplicates,..). More iPod tools
  • Drive Manager [Win, 1191 kb] - quick summary for each local and removable drive.
  • PStart - lets you organize and create menu-like list for quicker access to your portable programs.
  • SyncPAppX - script that syncs preferences between portable and local applications.
  • RQ Money - handy utlity to manage your credits and debts
  • SIW - a system analysis tool that tells you almost everything you need to know about a computer, i.e. hardware, configuration settings, etc.
  • WinAudit - one more analysis tool
  • Convert [Win, 155 kb] - fast metric unit conversion tool (distance, temperature, volume, time, speed, mass…)
  • UK Calender [Win, 321kb] - straightforward calendar with ToDo and reminders
  • CPU-Z [Win] - provides detailed info about your processor and other components
  • Country Codes [Win, 1358 kb] - a small database of country codes and additional information for all countries.
  • TreePad Lite [Win, 866kb] - personal database program, lets you store all your notes, emails, bookmarks, etc. into one well-structured file
  • StartupList [Win, 158 kb] - displays all items that are in any way related to your computer startup and are executed without any user interactions
  • eTextReader [Win, 279kb] - read plain text files provided by Project Gutenberg in a book-like manner.
  • Index Your Files [Win, 640kb] - provides an easy way to create index databases (of specified folders and drives) for quick file/term search
  • RockXP [win, 768kb] - handy utility for retrieving Win XP’s product key
  • WhoisThisDomain [Win, 42kb] - view owner and registration info for any domain name
  • Converter - portable unit convertsion utility
  • Portable Developer Tools (Techies Only)
  • Nvu [Win (7.3 mb), Mac (12 mb)] - easy-to-use webpage editor. Simpler alternative to Dreamweaver and Microsft Frontpage
  • Server2Go - apache webserver (no configurations needed)
  • InstantRails[Win, 60mb] - contains Ruby, Rails, Apache, and MySQL, all preconfigured and ready to run.
  • Putty [Win, 0.9 mb] - lightweight telnet and SSH client
  • Follow-Me IP - displays your external IP address
  • XAMPP [Win, 25/17 mb] - integrated server package of Apache, mySQL, PHP and Perl. Just Unzip and Run
  • HTTP File Server [Win] - simple and easy-to-use file server for personal file sharing.
  • CurrPorts [Win, 46kb]- lets you view a list of ports that are currently in use, along with applications that use them
  • FTP Servers: Quick’n Easy FTP Server [Win, 355kb], PureFTPdManager [Mac, 10.9mb]

All-In-One Packages

  • PortableApps Suite [Win, 89.5mb] - includes 7 programs for essential needs (office, email, IM client, etc.) + cool Startup manager and backup utility
  • FSuite [Mac, 668.3mb] - over 30 useful tools in one file (Office, Graphic, Audio, Video, Internet, Developer Tools and Games)

Portable Operating Systems (’HowTo’ Articles)

USB ThumDrive Tips

That’s mainly it… In case you’re looking for something that wasn’t mentioned above, there are a couple of resources you may want to check out. These are Portablefreeware.com and Tinyapps.org

1 Awesome Gmail Tip


Let’s say that your email address is ‘GeorgeBush@gmail.com’, basically everything sent to any of the following email addresses will be forwarded to your primary email.

  • GeorgeBush@gmail.com
  • G.eorgeBush@gmail.com
  • Ge.orgeBush@gmail.com

  • GeorgeBus.h@gmail.com
  • GeorgeBush@googlemail.com
  • G.eorgeBush@googlemail.com
  • Ge.orgeBush@googlemail.com

  • GeorgeBus.h@googlemail.com

And that’s not all, you can place as many dots as you want, it can be even something like ‘G.e.o.r.g.e.B.u.s.h@gmail.com’ and you’ll still get it on ‘GeorgeBush@gmail.com’

Additionally, I just also found out that you can embed random text to your email ID using ‘+’ sign. That is to say ‘GeorgeBush+anythingyouwant@gmail.com’ can be used as your email address, as well.

Ok I got it. Now what ?

1. One email for every purpose

Instead of using different email addresses for various purposes (work, school, friends, etc.) you can use different variations of your Gmail and filter incoming mails by ’sent to’ address. For instance, all incoming mail sent to ‘Name.Surname@gmail.com’ can be put to folder ‘work’, messages sent to ‘NameSurname@gmail.com’ can be put to ‘friends’, ‘N.ameSurname@gmail.com’ can be used for newsletters, and so on.

2. Track/Block spammers

When signing up for some website, say thatwebsite.com, you can add thatwebsite to your Gmail user ID (eg. GeorgeBush+thatwebsite@gmail.com). This way you can block your subscription whenever you want and even identify those websites that distribute your email address to spammers.

21 June 2008

Believe it or not

1. Coca-Cola was originally green.
2. The most common name in the world is Mohammed.
3. The name of all the continents ends with the same letter that they start with .
4. The strongest muscle in the body is the tongue.
5. There are two credit cards for every person in theUnited States
6. TYPEWRITER is the longest word that can be made using the letters only on one row of the keyboard.
7. Women blink nearly twice as much as men!
8. You can't kill yourself by holding your breath ..
9. It is impossible to lick your elbow.
10. People say "Bless you" when you sneeze because when you sneeze, your heart stops for a millisecond.
11. It is physically impossible for pigs to look up into the sky.
12. The "sixth sick sheik's sixth sheep's sick" is said to be the toughest tongue twister in the English language.
13. If you sneeze too hard, you can fracture a rib. If you try to suppress a sneeze, you can rupture a blood vessel in your head or neck and die.
14. Each king in a deck of playing cards represents great king from history.Spades - King DavidClubs - Alexander the Great,Hearts - CharlemagneDiamonds - Julius Caesar.
15. 111,111,111 x 111,111,111 = 12,345,678,987,654,321
16. If a statue of a person in the park on a horse has both front legs in the air, the person died in battle. If the horse has one front leg in the air, the person died as a result of wounds received in battle. If the horse has all four legs on the ground, the person died of natural causes.
17. What do bullet proof vests, fire escapes, windshield wipers and laser printers all have in common?Ans. - All invented by women.
18. Honey is the only food that doesn't spoil.
19. A crocodile cannot stick its tongue out.
20. A snail can sleep for three years.
21. All polar bears are left handed .
22. American Airlines saved $40,000 in 1987 by eliminating one olive from each salad served in first-class.
23. Butterflies taste with their feet .
24. Elephants are the only animals that can't jump.
25. In the last 4000 years, no new animals have been domesticated.
26. On average, people fear spiders more than they do death.
27. Shakespeare invented the word 'assassination' and 'bump'.
28. Stewardesses is the longest word typed with only the left hand.
29. The ant always falls over on its right side when intoxicated.
30. The electric chair was invented by a dentist.
31. The human heart creates enough pressure when it pumps out to the body to squirt blood 30 feet.
32. Rats multiply so quickly that in 18 months, two rats could have over million descendants.
33. Wearing headphones for just an hour will increase the bacteria in your ear by 700 times.
34. The cigarette lighter was invented before the match .
35. Most lipstick contains fish scales.
36. Like fingerprints, everyone's tongue print is different

Incredible Facts

This freaked me out. check itand let me know what you think.

1) New York City has 11 letters
2) Afghanistan has 11 letters.
3) Ramsin Yuseb (The terrorist who threatened to destroy the TwinTowers in 1993) has 11 letters.
4) George W Bush has 11 letters.

This could be a mere coincidence, but this gets more interesting:
1) New York is the 11th state.
2) The first plane crashing against the Twin Towers was flight number11.
3) Flight 11 was carrying 92 passengers. 9 + 2 = 11
4) Flight 77 which also hit Twin Towers, was carrying 65 passengers.6+5 = 11
5) The tragedy was on September 11, or 9/11 as it is now known. 9 + 1+ 1 = 11
6) The date is equal to the US emergency services telephone number911. 9 + 1 + 1 = 11.

Sheer coincidence..?! Read on and make up your own mind:
1) The total number of victims inside all the hi-jacked planes was 254. 2 + 5 + 4 = 11.
2) September 11 is day number 254 of the calendar year. Again 2 + 5 + 4= 11.
3) The Madrid bombing took place on 3/11/2004. 3 + 1 + 1 + 2 + 4 = 11.
4) The tragedy of Madrid happened 911 days after the Twin Towersincident.

Open Microsoft Word and do the following:
1. Type in capitals Q33 NY. This is the flight number of the firstplane to hit one of the Twin Towers.
2. Highlight the Q33 NY.
3. Change the font size to 48.
4. Change the actual font to the WINGDINGS

What do you think now?!?!.......

Microsoft Crazy Facts

1 :
Nobody can create a FOLDER anywhere on the computer named as "CON".
This is something pretty cool...and unbelievable. ..

Explanation for 1:

In windows the folder name and the special system variables share the same interface, so
when you create a folder with a system variable name it will consider that folder already
exist!!
these special system variables are available irrespective of path
You cannot create a folder with these names also:
CON, NUL, COM1, COM2, COM3, LPT1, LPT2, LPT3,COM1 to COM9 and LPT1 to LPT9....
CON means console, COM1 means serial port 1, LPT1 means parallel port 1

2:
This is something pretty cool and unbelievable. ..
At Microsoft the whole Team, including Bill Gates, couldn't answer why this happened!
Try it out yourself...
Open Microsoft Word and type
=rand (200, 99)
and then press ENTER

3:
For those of you using Windows, do the following:
1. Open an empty notepad file
2. Type "Bush hid the facts" (without the quotes)
3. Save it as whatever you want.
4. Close it, and re-open it.
is it just a really weird bug?

You can try the same thing above with another sentence "this app can break"
u cant save these wordings just check it
"live for the lover"
1.Take a notepad and write this lines (dont put qoutes)
2.Save it with any name and close it
3.Open that notepad once again
what u see?? u know how it happen???
some times bill gate never fall in love hi..hi..

14 June 2008

To Aspirants of GRE

Visit www.exambell.com for GRE words..It contains all the GRE latest words asked in the exam...enjoy urself!!!!!!!!!!!!

 

©2009 Edifying Minds | by TNB