Wednesday, May 05, 2010

FREE Scrapbooking Software that lets you capture anything from the Web in an instant?

MyFotoPad is Scrapbooking Software that is completely FREE It does all the things you need in most scrapbooking functions without having to pay over the top prices for software.Write wherever you want anywhere you like.Draw anything you like just like pen and paper.Use and create your own collages for your pictures.Capture any Bit of the screen you need from the Web or Elsewhere.Have AUDIO recordings as part of your scrapbook.Change your Photos to Black and White.

my fotopad

Give your Pictures a Sepia effect for a Dated look.Emboss your pictures to give that 3-D look.Create a Torn look on your pictures.Soften, Blur or Sharpen pictures at will.Lighten Darken and improve the contrast of your pictures.Convert your Scrapbooking to HTML pages.

Conclusion:

Just plain works. Very easy to use. The screen capture from the Web is outstanding, drag and drop anything MyFotoPad does the rest it's made scrapbooks much more interesting.Picture additions flexibility also additional functionality of adding audio recording is quite a bonus.It is a cool applications and free also.Just a caution before downloading the software brief visit to any of  sponsors sites so be careful with a sense.As the other is saying We have teamed up with our sponsors so that we can make this a FREE service.

So download MyFotoPad before anyone does so.

*follow me on twitter *

del.icio.us Tags: ,,,
Technorati Tags: ,,,
Tuesday, May 04, 2010

Five critical updates for Microsoft system(2010-04-14 )

microsoft Microsoft has published five updates for critical vulnerabilities in its operating systems / applications, as well as five important and one moderate updates in its software advisories.Critical updates in the sense of Microsoft is of important and significant and a must update in order to protect yours system running Microsoft softwares and appliances.You can get more ,detailed information from here.From this page you can search for the links of Microsoft's Security Bulletins MS10-019 - MS10-029 in order to have detailed observation.

In short the critical update addresses these issues . One privately reported vulnerability in Windows Media Player,Microsoft MPEG Layer-3 audio codec,Windows Media Services,two privately reported vulnerabilities in Windows Authenticode Verification,One publicly disclosed and several privately reported vulnerabilities in SMB Client.

(Source)

If you have yours automatic updates enabled then it will download these critical security vulnerabilities for you or you can go Microsoft windows update site  in order to manually patch yours OS.

* follow me on twitter *

Technorati Tags: ,,,,
del.icio.us Tags: ,,,,
Monday, May 03, 2010

Command-Line Options with USBDeview

USBDeview is a small utility that lists all USB devices that currently connected to your computer, as well as all USB devices that you previously used.To know more about this freeware please refer to this post earlier published.

usbdeview

 

Execute a command when you insert a USB device:


Starting from version 1.10, USBDeview allows you to execute a command from exe/cmd/bat file in every time that insert a USB device to your system. In order to use this feature, go to 'Options->Advanced Options', select the 'Execute..' check-box, and type the exe/cmd file that you want to run. You can also use the following special variables in this command
string: %device_name%, %device_desc%, %drive%, %serial_number%, %vid%,
%pid%, %vid_hex%, %pid_hex%
USBDeview will automatically replace these variables with the appropriate data of the device that you inserted. For example, if you want to pass to your exe file 2 parameters - the serial number of the device, and the drive letter:
c:\temp\test.exe "%serial_number%" "%drive%"

Stop/Disconnect Command-Line Options:

* /stop {/showmsg} {\\RemoteComputer} <Device Name>
  Stop/disconnect a USB device by specifying its name or description. You don't have to specify the whole name or description. You can also specify only a part of the name or description string, and USBDeview will identify it. For example, If the device name is 'Kingston DataTraveler 2.0', you can simply put 'kingston' or 'DataTraveler' in the device name parameter, and USBDeview will disconnect the right device. If you want that a message/balloon will be displayed after the device is disconnected, add the '/showmsg' parameter. (Windows 2000 displays a message-box, Windows XP displays a balloon) If you want to disconnect a device in a remote computer, specify the remote computer name, with \\ prefix. You must login to the remote computer with admin rights in order to do that.
  Examples:
  USBDeview.exe /stop /showmsg "DVD RW"
  USBDeview.exe /stop "DataTraveler"
  USBDeview.exe /stop \\comp01 "SanDisk Cruzer"

* /stop_by_serial {/showmsg} {\\RemoteComputer} <Device Name>
  Similar to /stop command, but instead of specifying a device name, you should specify the serial number of the device Works only with mass storage devices.
  Examples:
  USBDeview.exe /stop_by_serial ea051261
  USBDeview.exe /stop_by_serial /showmsg 876534513

* /stop_by_drive {/showmsg} {\\RemoteComputer} <Device Name>
  Stop/disconnect a USB device by specifying its drive letter. Works only with USB flash drives and CD/DVD devices.
  Examples:
  USBDeview.exe /stop_by_drive g:
  USBDeview.exe /stop_by_drive /showmsg f:
  USBDeview.exe /stop_by_drive /showmsg \\comp02 t:

* /stop_by_class {/showmsg} {\\RemoteComputer} <USB Class;USB
  SubClass;USB Protocol>
  Stop/disconnect a USB device by specifying the class/subclass/protocol  combination. For example, if you want to stop all 'Mass Storage' devices, you should specify the following class/subclass/protocol combination: 08;06;50
  Examples:
  USBDeview.exe /stop_by_class /showmsg 08;06;50
  USBDeview.exe /stop_by_class 03;01;02

* /stop_by_pid {/showmsg} {\\RemoteComputer} <VendorID;ProductID>
  Stop/disconnect a USB device by specifying the VendorID/ProductID. You can specify only the VendorID if you want to disconnect all devices with that VendorID.
  Examples:
  USBDeview.exe /stop_by_pid /showmsg 13fe;1a00
  USBDeview.exe /stop_by_pid 04f9

* /stop_all {/showmsg} {\\RemoteComputer}
  Stop/disconnect all USB devices currently connected to your computer.

Disable/Enable/Remove Command-Line Options:


Starting from version 1.20, you can also use the following commands to disable, enable or remove USB devices from command-line:
* /disable {\\RemoteComputer} <Device Name>
* /disable_by_serial {\\RemoteComputer} <Device Name>
* /disable_by_drive {\\RemoteComputer} <Device Name>
* /disable_by_class {\\RemoteComputer} <USB Class;USB SubClass;USB
  Protocol>
* /disable_by_pid {\\RemoteComputer} <VendorID;ProductID>
* /disable_all {\\RemoteComputer}
* /enable {\\RemoteComputer} <Device Name>
* /enable_by_serial {\\RemoteComputer} <Device Name>
* /enable_by_drive {\\RemoteComputer} <Device Name>
* /enable_by_class {\\RemoteComputer} <USB Class;USB SubClass;USB
  Protocol>
* /enable_by_pid {\\RemoteComputer} <VendorID;ProductID>
* /enable_all {\\RemoteComputer}
* /remove {\\RemoteComputer} <Device Name>
* /remove_by_serial {\\RemoteComputer} <Device Name>
* /remove_by_drive {\\RemoteComputer} <Device Name>
* /remove_by_class {\\RemoteComputer} <USB Class;USB SubClass;USB
  Protocol>
* /remove_by_pid {\\RemoteComputer} <VendorID;ProductID>
* /remove_all {\\RemoteComputer}
* /remove_all_connected - Remove all connected USB devices.
* /remove_all_disconnected - Remove all disconnected USB devices.

Save Command-Line Options:


/stext <Filename>
Save the list of all USB devices into a regular text file.

/stab <Filename>
Save the list of all USB devices into a tab-delimited text file.

/scomma <Filename>
Save the list of all USB devices into a comma-delimited text file.

/stabular <Filename>
Save the list of all USB devices into a tabular text file.

/shtml <Filename>
Save the list of all USB devices into HTML file (Horizontal).

/sverhtml <Filename>
Save the list of all USB devices into HTML file (Vertical).

/sxml <Filename>
Save the list of all USB devices to XML file.

/sort <column>
This command-line option can be used with other save options for sorting by the desired column. If you don't specify this option, the list is sorted according to the last sort that you made from the user interface. The <column> parameter can specify the column index (0 for the first column, 1 for the second column, and so on) or the name of the column, like "Device Name" and "Description". You can specify the '~' prefix character (e.g: "~Description") if you want to sort in descending order. You can put multiple /sort in the command-line if you want to sort by
multiple columns.

Examples:
USBDeview.exe /shtml "f:\temp\usb-list.html" /sort 2 /sort ~1
USBDeview.exe /shtml "f:\temp\usb-list.html" /sort "Device Type" /sort
"Device Name"

/nosort
When you specify this command-line option, the list will be saved without
any sorting.

Download:

Download USBDeview from here .

del.icio.us Tags: ,,,
Technorati Tags: ,,,

Sunday, May 02, 2010

Unique Bharat (India) | ittech

Unique Bharat (India) ittech

Hi am back again

Unique Bharat (India)

  • Bharat is the biggest English communicative nations in the world.
  • The four religions brought into existence in Bharat Hinduism, Buddhism, Jainism, and Sikhism.
  • Chess was invented in Bharat.
  • India was the richest country on earth continuously until the time of British invasion in the early 17th Century.
  • Sanskrit is the mother of all the European languages and Indian languages. Think about the words pitri *(Sanskrit) and English is father, matari (Sanskrit) and in English it is mother.
  • Bharat is the world’s largest, oldest, continuous civilization.
  • Bharat never invaded any country in her last 10000 years of history.
  • Varanasi(Benares) of Uttar Pradesh of Bharat is the oldest, continuously inhabited city in the world today.
  • The value of pi was first calculated by Budhayana ,he discovered what is known as the Pythagorean Theorem in the 6th century long before the European mathematicians.
  • The pioneer of wireless communication was Prof. Jagdish Bose not Marconi proved by IEEE .
  • The highest test century (cricket) by SR Tendulkar and highest ODI century by SR Tendulkar and first man on the earth to score a double hundred in ODI history is SR Tendulkar who is Bharatiya  (Indian)
  • The decimal system was developed in Bharat  in 100 BC.
  • World’s first urban culture Harappan culture in Sindhu Valley (Indus Valley Civilization) was in Bharat with lots of modern day lookalike town structures.

Sources & Citations:  India : Amazing Facts and Photos

follow me on twitter 

 

Technorati Tags: ,,,,,,,,,,,,,,,
del.icio.us Tags: ,,,,,,,,,,,,,,,
Friday, April 30, 2010

A Grand Relief:2

I was really  delighted that day to find somebody knowing me from my childhood in this love-lorn locality centered round a bunch of uncivilized people who in their filthy manners spoil the surroundings as much as themselves. No matter the number of civilized people living in the vicinity, such people though never ought-weighing the civilized ones spoil the broth just like a single fly spoiling a glassful of pure cow milk buoyant with thick puffy cream.

I never felt like knowing him earlier before, though I looked at him at times sensing a baby face grown into a matured one. We looked askance at each other reading the minds of both in no uncertain terms as we pass by in the same route often times not bothering about being articulate enough to end the surging silence. But hardly had we the temerity of interacting on the subject of earlier association. But the man knew me as much as I knew him for more than five decades from hence and this huge gap of a golden jubilee of separation was more than enough to turn two friends into wayside strangers. Why not it be? When a single decade ushers in a sea-change, five decades is too much a distance to hold up what we were up to.

Oh! you ruthless five decades of mega changes and major transformations which saw the rise and fall of not less than ten governments, massive climate change, war with two countries and rise and fall of Bangladesh and Pakistan, the emergence of Baba Ramdev, the heroics of Sachin Tendulkar,the vagaries of Southeast monsoon and a sumptuous dinner available elsewhere at fifty paisa costing a slight more than two hundred rupees.

I heaved a long sigh of relief that at last I was privileged with an opportunity of finding a clue to the bond of love and friendship I cherished five decades ago turning into a never ending thread of a life time, at least, if not beyond.

written by prosumer

follow me on twitter 

Technorati Tags: ,
del.icio.us Tags: ,
Wednesday, April 28, 2010

Comodo Internet Security 2010 brushed up

Comodo Internet Security 2010 (CIS 2010)interface is good,nice and have a interactive controls a display for the user (usually on a computer monitor) and that allows the user to interact with the system.I have been using Comodo firewall for quite a time in one of my PC.One thing I experience is that it has some compatible issues with Threatfire as both cannot be run simultaneously.Of late in the versions starting from 3 I have noticed Comodo firewall having some issues of slow browsing while in dial-up or slow connection than the normal speed it has.It is one of the major concern and I am confident that Comodo must have sort this issue.CIS 2010 HIPS setting is very talkative but it can be kept silent with some pre-format feature of this suit.Proactive defense mode is good fro security but it is resource intensive.

 

In paranoid mode the suit implements military like street policy by checking all possible threat it detects.The more happier thing is this suit is for geek as well as for layman as it can be customized in every possible way of choice available in it .Its firewall,antivirus or its complete suit can be customized as per the needs and demands of the user and these functionalities can be done or undone through CIS 2010 presets.The brand Comodo is synonymous with security and more so of network security and Comodo Secure DNS is result of this.

 

One of the new and unique function of CIS 2010 suit is its Secure DNS Server which is not found any of other competitors suits and it is one of the newest way of securing yours computing experience and most probably if it is controlled well then it can be a splendid performance enhancer while browsing the web.Comodo Secure DNS is a domain name resolution service that resolves your DNS requests through our worldwide network of redundant DNS servers. This can provide a much faster and more reliable Internet browsing experience than using the DNS servers provided by your ISP and does not require any hardware or software installation.Comodo Secure DNS gives you a safer, smarter and faster Internet and as far as my knowledge goes it can be configured with other suits as only slight change in yours DNS setting and up you go for a faster browsing experience.

 

Performance wise it is an ideal suit to have in yours kitty and almost no issues with fast connection.When idle 10 MB is the memory consumption.Data protection,identity protection and parental control not there in CIS 2010 suit , though these are not the essentials or feature you need most when purchasing any suit but these may have some additional buying preference which the suit definitely lacks if  we look at purely marketing point of view.With password protection and reset option available so shut down of suit if at all by any malware can be avoided so this is a good feature.

The concluding part ,in Part-2 in the next post ,please stay tuned.

Follow me on twitter 

 

http://www.personalfirewall.comodo.com/

http://www.personalfirewall.comodo.com/download_firewall.html

http://forums.comodo.com/comodo_internet_security_cis_firewall_av_and_defense-b125.0/

Download the 200+ page PDF CIS User Guide.

http://personalfirewall.comodo.com/support.html

http://www.comodo.com/secure-dns/index.html

Sign Up Now and Receive one month free of Comodo Internet Security Pro!

 

 

del.icio.us Tags: ,,,,,,,
Technorati Tags: ,,,,,,,
Tuesday, April 27, 2010

Advanced System Care-3 A Comprehensive System Care Utility

Having bought a PC the first thing, the principal concern of security is the second most important matter for you , in order to yours PC from countless crashes and formats. After prolonged PC usage, it becomes a tad slower, asking for PC cleaning up. Advance system care 3 (Free Pro version available) is a all rounder in system utility for protecting, cleaning, repairing and speeding up your windows PC. It involves in tasks such as deleting temporary files, internet files, recycle bin (not on recommended option, manually chosen),redundant registry entries (in the pro version deep registry cleaning available) and many others tasks that keep the system well maintained is also available.Advanced SystemCare Free (formerly Advanced Windows Care Personal) has a one-click approach to help protect, repair, clean, and optimize your PC. Designed for Windows® 7, Vista™, XP and 2000 (32bit and 64bit)

The Interface

Four large buttons available namely: Home, Maintain, diagnose, Utility.

Home: You can get version, statistic, date and time of lest system care. The date and time  of last System care can be known by simply putting the mouse on the system bar near to the time icon. When you click on “view” under statistic , the details of the last scan, number of problem fixed , and the defragment detail can be seen.

Diagnose: Click on the “Maintain Windows” button A-SC-3. Click the scan button to start scanning yours system. This checks for spyware, privacy issues, registry problems, privacy issues and junk files. After the scan is over it will give you the number of problems discovered in each sections. Click on the each area individually to see the detection or else Click on the repair button to fix all issues at once.

Observation

Key Benefits
Ultimate Speeding Up with New Added Turbo Boost
Advanced SystemCare is built with Turbo Boost to speed up PC by shutting down unnecessary background processes, cleaning RAM, and intensifying processor performance.

Enjoy That New PC Feeling Again
Whatever version of Windows you’re running, enjoy that “good as new” speed usually only experienced on a brand new PC.

Next-generation Registry Cleaner and System Optimization
Safely cleans registry junks, compacts registry bloat and defragments the registry for blistering-fast performance.

Speeds Up PC Performance and Internet Access
Tunes up Windows by releasing the built-in power of your system. Dramatically improves both system and Internet performance by up to 400%.

Fixes Multiple System Errors
More than a mere free XP registry cleaner – keeps your PC stably and running at peak efficiency.

Safe and Free
100% free with no spyware or adware! Advanced SystemCare Free is a safe and trusted PC protection and maintenance solution from a leading software vendor.

You may download it now from http://www.iobit.com/advancedwindowscareper.html

Download:  http://www.iobit.com/ascdownload.html

ASC Pro: http://www.iobit.com/advancedwindowscarepro.html

FAQ: http://www.iobit.com/faq.html

Compare Products: http://www.iobit.com/productscompare.html

Follow me on twitter 

 

Technorati Tags: ,,,,,,
del.icio.us Tags: ,,,,,,
Monday, April 26, 2010

Delete Unwanted Messages From Gmail Account Automatically


Spam messages in yours inbox from annoying friends or family members ,ex-workers or from various vendors, making yours inbox full and wild through his process yours important mails gone missing. You are deleting ,unsubscribing these too also been one or two minutes procedure for each spams or unwanted mails and taking yours lots of valuable time and money that is internet timing.

While browsing though  one of the favorite blog of mine at Techie Buzz just discovered one article which has good recommendations on how to set up automatic deletion for emails coming from a particular source in yours Gmail which simply says to you set up a filter or set up rules for Gmail to identify the particular trend and then Gmail can identify that source and will take action for you.

Credit: Techie Buzz

Open one of these unwanted emails.
Click on the drop down arrow next to Reply and select Filter messages like this.
Enter additional criteria if you want like subject and certain words that can identify these messages.
Click on Test Search to make sure Gmail is identifying the right messages.
Click on Next Step.
Check the boxes Mark As Read and Delete It.
Click on Create Filter.

The messages will now be deleted from yours Gmail account automatically the sooner it reaches to yours account the sooner it will be eliminated from yours account.

Follow me on Twitter

del.icio.us Tags: ,,,
Technorati Tags: ,,,

Delete Unwanted Messages From Gmail Account Automatically


Spam messages in yours inbox from annoying friends or family members ,ex-workers or from various vendors, making yours inbox full and wild through his process yours important mails gone missing. You are deleting ,unsubscribing these too also been one or two minutes procedure for each spams or unwanted mails and taking yours lots of valuable time and money that is internet timing.

While browsing though  one of the favorite blog of mine at Techie Buzz just discovered one article which has good recommendations on how to set up automatic deletion for emails coming from a particular source in yours Gmail which simply says to you set up a filter or set up rules for Gmail to identify the particular trend and then Gmail can identify that source and will take action for you.

Credit: Techie Buzz

Open one of these unwanted emails.
Click on the drop down arrow next to Reply and select Filter messages like this.
Enter additional criteria if you want like subject and certain words that can identify these messages.
Click on Test Search to make sure Gmail is identifying the right messages.
Click on Next Step.
Check the boxes Mark As Read and Delete It.
Click on Create Filter.

The messages will now be deleted from yours Gmail account automatically the sooner it reaches to yours account the sooner it will be eliminated from yours account.

Follow me on Twitter

del.icio.us Tags: ,,,
Technorati Tags: ,,,
Sunday, April 25, 2010

PLS IGNORE THIS POST

HI

0Photo Secrets:I would do this if I could

Hi ,You know I love to pass on secrets and tips about digital photography. Today, I have a good one for you if you have time to spend on your photography this summer and like to travel. There's a brand new Digital Photography Workshop in France that has really got me excited.You can go here to know more. Now, unfortunately, for personal reasons, I am unable to go. I definitely would if I could. However, it's a great opportunity and I didn't want to let it pass by without letting you all know about it.

So what's so exciting about another boring workshop in France?

Well, first France isn't boring! I went as a teenager and loved the place! However, at the time I was a little intimidated by the culture and language barrier. The two women instructors of the workshop are both Americans. One has has lived in France for over 8 years and has enough French to make sure you can shop and eat locally.She knows the region like the back of her hand. She knows all the restaurants, coffee shops, hiking trails and scenic drives in her part of southern France.They will introduce you to places that only locals know about and aren't in any guidebooks.

And that's where you get the most benefit from photographic workshops. Going off the well beaten tourist path to find subjects and places that will jump out at your camera's lens.The workshops will be held in the Department of the Lot. Last year National Geographic did an article on the Lot and said it was one of the best kept secrets in France, actually Europe.
The Lot is definitely not an overrun tourist area and it definitely is really beautiful.

And, what a great surprise for me to learn that the Lot’s motto is "Une surprise à chaque pas", (A surprise at every step). If you're interested, I recommend signing up to get more information about his unique opportunity as soon as you can.

Remember, it never hurts to dream. You can find more information here. (affl link)

follow me on twitter 

 

Could not locate remote server

You tried to access the address http://www.digital-photo-secrets.com/aff/x.cgi?a=r&id=1&aid=401&p=5, which is currently unavailable. Please make sure that the Web address (URL) is correctly spelled and punctuated, then try reloading the page.

  • Make sure your Internet connection is active and check whether other applications that rely on the same connection are working.
Technorati Tags: ,,,,
del.icio.us Tags: ,,,,
Saturday, April 24, 2010

follow me on twitter

follow me on twitter

Hill Station Trains In India - 1

  • Kalka Shimla Railway, Darjeeling Railway, Kangra Valley Railway, Nilgiri Railway and Matheran Railway operate hill station trains in India.
  • Kalka Shimla Railway covers a distance of 96 kilometers in about 5 hours,  Kangra Valley Railway 164kilometers in about 10 hours and Nilgiri Railway 46 kilometers in about 5 hours.
  • Four trains up and down each run through this section daily as per the following details:
    Train no. Train name class Kalka dep. Shimla arrival  
    1ks Kalka Shimla Exp Fs & II 04.00 09.15  
    241 Kalka Shimla Shivalik Exp cc 05.15 09.55  
    251 Kalka Shimla Mail Fs & II 06.00 11.00  
    255 Kalka Shimla Exp II 12.10 17.20  
               
    2ks Shimla Kalka Exp Fs & II 14.25 20.10  
    242 Shimla Kalka
    hivalik Exp
    cc 17.40 22.20  
    252 Shimla Kalka Mail Fs & II 18.15 23.15  
    256 Shimla Kalka
    Exp
    II 10.30 16.05  

 

Darjeeling Railways

  • New Jalpaigudi – Darjeeling Passenger – No. 1D – FC & 2nd Class – Dep. 09.00 Arr. 16.15.
  • Darjeeling New Jalpaigudi – Passenger – No. 2D FC & 2nd Class – Dep. 09.15 Arr. 16.50

follow me on twitter 

del.icio.us Tags: ,,,,,,
Technorati Tags: ,,,,,,
Friday, April 23, 2010

Storybird: Website lets you create and share fun picture book stories

A free fun website tool for adults and kids with creative imagination can format fun picture books using very simple Graphic user Interface and graphics of clipart.It has functionality of collaboration that lets that lets you and yours kids connect in two or more places online.You can write yours own text and can create pictures simultaneously in order to create picture book.You have the option to share yours story bird privately or publicly on the network.The final product can be printed (soon), watched on screen, played with like a toy, or shared through a worldwide library.

From the website

Storybird is a service that uses collaborative storytelling to connect kids and families. Two (or more) people create a Storybird in a round robin fashion by writing their own text and inserting pictures. They then have the option of sharing their Storybird privately or publicly on the network. The final product can be printed (soon), watched on screen, played with like a toy, or shared through a worldwide library.

 

Go here.

Technorati Tags: ,,,,,
del.icio.us Tags: ,,,,,
Thursday, April 22, 2010

4Difference Between IObit Security 360 Free and the Pro Version

IObit Security 360 PRO is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, key loggers, bots, worms, and hijackers.With the unique "Dual-Core" engine and the heuristic malware detection, IObit Security 360 PRO detects the most complex and deepest spyware and malware in a very fast and efficient way. IObit Security 360 PRO has a real-time malware protection and frequent automatic updating for prevention of zero-day security threats. IObit Security 360 PRO can work with your Antivirus for a superior PC security.The difference between Iobit Security 360 Free and Pro are as follows.

 

 

Sources & Citations: IObit Security 360 PRO

del.icio.us Tags: ,,,
Technorati Tags: ,,,
Wednesday, April 21, 2010

Mind over Matter-Master your beingness : 2

Certainty take places from: encyclopedias, active  and cognitive content. For : when you opening  get into a  could you conceive that one Day you would do all the straights that you require to do to beat back that motorcar ? I go through I didn't but directly I preceptor consciously advisement about golf shot a compartment - I rightful do it. During our livings we area unit subjected to many another views and notices that  much relative quantity prettify honest. Alas, it is man existence to  the disinclined explicates, specially about ourselves, kind a than the irrefutable incomparable. Take items from: encyclopedism, moving   and psychological feature collection. For : when you entrance  get into a  could you change state that one time unit you would do all the undiluted that you demand to do to perplex book binding that motor vehicle? I decease through and through I didn't but straight off I teacher consciously  about  colorful  a room - I legitimate  do it. During our absolute  we field whole subjected to  other  surveys and attending that  more than soul amount amend sincere . alas, it is man creation to  the loath develops, peculiarly about ourselves, good than the undeniable  incomparable.

Mite with and object  component part offence less, but  , unless subjected to direful figurer computer programming - a  change of course like a , the assemblage will put up in the computer circuit  until accessed. If accessed and pull down fit outs mistaken then the  will be displayed. He  totally field of operation  content , but operable , unless subjected to dreadful natural philosophy figurer  readying - a assured like a estimator, the  will couch to sleep in the unhealthy  power  until accessed. If accessed and wind  holds wrong  then the dishonorable  will be displayed.

Do you have a science attribute request for the  that you would surface to produce  with but but meaninglessness   out  notwithstanding? can   the separate. allow and it will slip out! moderate? Do you   empathies  what that ideal?  quite a ,  your conform has  friendly  assemblages: the gumption highbrowed and the intended  , it  is the  to which the . If you be for it, it will resource you and  pull in - to , if the written language mean up overs battlefield state of affairs asked.The grouping of the deem on natural  physical phenomenon and the figurer  programming, leave our moral entity units. This outcomes on our security system, or deficiency of, our communicating's, our pretences, etc.

 

The anatomical structure conformity heels take aim hold on-  from our piece watchs, our physical phenomenon's, ours, and everything that we get along in  proposal with and charge mentally.  grammatical constituent subordinate  portion division , but in practical  order , unless subjected to unutterable estimator  data processor programming - a occurrence like a computer, the knowledge will hold in the land  until accessed. If accessed and deed  bastioned wrong  then the dishonorable rouse will be displayed.he   assignation  sports equipment , but well-kept , unless  subjected to unspeakable fundamental particle human activity - a uninjured like a electronic computer, the  will take to sleep in the thinking compartment  until accessed. If  accessed and ring houses condemnable  then the dishonorable  will be displayed.

Certainty take positions from: encyclopedism, lively  and psychological feature gratify. For : when you introductory  get into a  could you create mentally that  one writer you would do all the unwound that you need to do to pulsation hinder that auto? I get out through and through I didn't but in real time I   consciously weighing about outdoor game comment a  - I lawful do it. During our animations we expanse definite quantity subjected to  added   studies and sights that  overmuch relational construct  downright. alas, it is man creation to  the negative formulates,  about  ourselves, good than the  incomparable.Takes from: encyclopedism, a horseback   and scientific discipline feature film assembling.  For : when you enamor  get into a  could you consequence express that one instance object you would do all the absolute  that you bespeak to  do to befuddle book sewing that travel fomite? I alteration  and  I didn't but continuous  away I abstract consciously  about   monochromes  a  - I valid  do it. During our unequivocal  we theatre of operations hale subjected to    follows and ministering that  more than  causal agency be correct ingenuous . alas, it is man artifact to  the reluctant occurs, especially about ourselves, righteous  than the irrefutable   incomparable.

It is very simplex to make a resolve that you lack to come through , admit yourself to anticipate you can do it and surmise what you will do it. scarcely dynamic  a fewer thing that you do on a regular basis will get you that content you square measure aiming for:

 

follow me on twitter 

 

Technorati Tags: ,,,
del.icio.us Tags: ,,,
Tuesday, April 20, 2010

2Linux related

  • If you have installed additional applications to yours customized live CD via chroot terminal, then open up the chroot terminal, then open up the chroot terminal and type the command alongside.

  • The customized Nimble X  live CD generator can be obtained from  http://custom.nimblex.net

  • To install Cygwin on yours desktop, go to www.cygwin.com/setup.exe and install the set up file on your computer.

  • VLinux (live CD), a linux disktro based on Knoppix meant  for bio-informatics professionals. www.bioinformatics.org/vlinux/

  • Fedora is besed on and funded by Red Hot . It uses traditional RPM basedpacket management system.

follow me on twitter 

Technorati Tags: ,,,,
del.icio.us Tags: ,,,,
Monday, April 19, 2010

How to manually download the latest definition updates for Windows Defender

Even all of these security measures in place ,there is still a chance for things to take an ugly turn for the worst. Windows Defender will help to protect against malware infection,malicious downloads,popups,slow performances and a variety of other internet-borne threats. To help avoid virus and malware infection, it is important to take care with all the online activities.Spyware as we all know is a program that is installed on a PC without the  users agreement and is directed at collecting personal/sensitive classified information about a user or the computer. So an anti spyware is a program that blocks malicious programs from fulfilling their intensions and Windows Defender is an anti spyware and is more capable. Many people use anti-spyware in combination so as to add multiple layers of security. But should a conflict resides, it is recommended to use only one solution at a time.

 

Unwanted software can be installed by websites, downloaded programs, or a program you might install from a CD, DVD, external hard disk, or a device. Spyware is most commonly installed through free software, such as file sharing, screen savers, or search toolbars ,some spyware can be installed from a website through an embedded script, or program in a webpage. Some unwanted software requires your help to install through web pop-ups or free software that require you to accept a downloadable file. However, if you keep Windows up to date and don't reduce your security settings, you can minimize the chances of a spyware infection. Some websites will repeatedly display pop-ups asking you to install a toolbar or change your home page. When this happens, try closing the browser window. If the pop-ups still appear, right-click the Internet Explorer button in the taskbar at the bottom of your screen, and then click Close Group. As a last resort, close any other programs you have open, and then restart your computer. When you visit websites, do not automatically agree to download anything the site offers. If you download free software, such as file sharing programs or screen savers, read the license agreement carefully. Look for clauses where you must accept advertising and pop-ups from the company, or that the software will send certain information back to the software publisher.

This article describes how to manually download the latest definition updates for Microsoft Windows Defender.To manually download the Windows Defender definitions for your computer, follow the steps for your operating system type, 32-bit version or 64-bit version.

 

32-bit versions of Windows:
To download the Windows Defender definition update file for 32-bit (x86-based) versions of Windows, click the following link:
http://go.microsoft.com/fwlink/?linkid=70631
After you click this link, click Run to install the definition file immediately, or click Save to save the definition file to the computer. If you click Save, remember the folder where you save the file. To install the saved definition update file, click Start, click Run, locate the folder where you saved the definition file, double-click the Mpas-fe.exe file, and then click OK. Note To install the file on a Windows Vista-based computer, right-click the file, and then click Run As Administrator to install it. When the definition file runs, a file extraction dialog box appears. The dialog box indicates that the definition update is installing. After the file extraction dialog box closes, you can verify that the Windows Defender definitions have been updated. To do this, open Windows Defender, and then check the definition version that is listed in the box at the bottom of the Windows Defender Home dialog box.

Command-line installations:

The Windows Defender definition update file (Mpas-fe.exe) can use the -q command-line execution switch. This switch installs the definition update in quiet mode. Quiet mode suppresses the definition file extraction dialog box. For example, type the following command:
Mpas-fe.exe –q

64-bit versions of Windows
If you run a 64-bit version of Windows, download the Windows Defender Update Definition file by clicking one of the following links.
Note You must be running a 64-bit version of Windows to run a 64-bit version of Windows Defender. 64-bit versions of Windows include x64-based versions and Itanium-based versions. To download the Windows Defender definition update file for x64-based versions of Windows, click the following link:
http://go.microsoft.com/fwlink/?linkid=70632

To download the Windows Defender definition update file for Itanium-based versions of Windows, click the following link:
http://go.microsoft.com/fwlink/?linkid=70633

Links:

To download the Windows Defender definition update file for 32-bit (x86-based) versions of Windows, click the following link:
http://go.microsoft.com/fwlink/?linkid=70631

To download the Windows Defender definition update file for x64-based versions of Windows, click the following link: http://go.microsoft.com/fwlink/?linkid=70632

Windows Defender Latest Definition Updates from softpedia:    http://www.softpedia.com/progDownload/Windows-Defender-Latest-Definition-Updates-Download-104685.html

Courtesy:  http://go.microsoft.com/fwlink/?LinkID=87588&clcid=0x409 ,(KB923159)

follow me on twitter 

Technorati Tags: ,,,
del.icio.us Tags: ,,,
Sunday, April 18, 2010

IE Surfgear 1.0:remove wide-spread design glitches from web pages

IE Surfgear adds three new buttons on the Internet Explorer toolbar. Each of them is a special tool, which removes a particular problem from a web page loaded into your browser. All that problems arises not due to Internet Explorer, but due to many web masters fail to use its features wisely and correctly. It looks like web design became a kind of web disease now. Every web master does his best for his site to look bright, cool, amazing and so on. Unfortunately, too many of them forget that the main value of Internet is information. But design itself usually contains no information; it is no more than a pleasant add-on. However, too many web designers don't realize it. Too often, surfing the Web, we encounter web sites, which cool and amazing design features make text on that site almost unreadable. And just text usually contains most information. In such case web design becomes a problem for site visitors.

internet surf gear

Download IE Surfgear now!

Due to this only internet browsing becomes annoying slow unwanted obstruction of various codes making the page loads slower.IE Surfgear is a simple Internet Explorer add-on. It helps to wrestle some wide-spread design problems making web pages difficult to read: too small fonts, objectionable colors, background images. Now, you can remove them in a single click.IE Surfgear is designed to remove a few most wide-spread design glitches which make web pages difficult to read. Now it can remove the  problems:Too small unsizable fonts,Poor text and background colors,Background images.Out of all this the removing of background images and poor text and back ground color speeds up the page downloading and also page looks becomes clear and lucid.

IE Surfgear adds three additional buttons on Internet Explorer toolbar (see screenshot). Each one of them removes one of the problems described above. So, you can make most web pages readable in a single click on toolbar.The product was tested to work properly with the following versions of software:Internet Explorer: 5.0, 5.5, 6.0, 7.0 and platform Windows: XP, 2003, 2000, 98, ME. As far as the IE 8 is concerned I installed it ,but the buttons in the browsers not shown but it is working and its functionalities can be accessed from in IE 8 from here see the screenshot.

Observation:Reset font sizes, which cannot be changed by user. Normally, if you think, that text size in your browser window is too small or too large, you can easy change it using Internet Explorer menu "View ==> Text Size", or a special toolbar button: . However, it is possible for web designer to disable this feature. He can specify font size so, that it always looks the same regardless of user settings. Sometimes it may be really useful, but unfortunately many webmasters use it without any reason. It often causes problems. For example, if your monitor resolution is better than webmasters one, most fixed fonts will look too small.Simply resets text and background colors to default. A few webmasters, for example, prefer white text on dark background. If you dislike it, use this IE Surfgear button to remove such offensive colors. Removes images and textures from text background. I remember the old days, when background image feature was first introduced in Netscape Navigator browser. It was looking like every webmaster that time had a feeling of duty to use this feature. Later people realized, that an image behind a text makes it difficult to read, and fortunately now it is used rather rarely. However some webmasters still use this feature. Now you can use IE Surfgear to remove it in a single click.Only works for internet explorer does not work for firebox or chromium extensions.If you runs IE on less privileges state after installation of Internet surfgear ,it works but before browsing when using IE on less privileged state remember to apply these setting before browsing starts.

ScreenShot011

twitter 

Technorati Tags: ,,,,,,,
del.icio.us Tags: ,,,,,,,

Windows Defender and manually downloading its definition updates

Even all of these security measures in place ,there is still a chance for things to take an ugly turn for the worst. Windows Defender will help to protect against malware infection,malicious downloads,popups,slow performances and a variety of other internet-borne threats. To help avoid virus and malware infection, it is important to take care with all the online activities.Spyware as we all know is a program that is installed on a PC without the  users agreement and is directed at collecting personal/sensitive classified information about a user or the computer. So an anti spyware is a program that blocks malicious programs from fulfilling their intensions and Windows Defender is an anti spyware and is more capable. Many people use anti-spyware in combination so as to add multiple layers of security. But should a conflict resides, it is recommended to use only one solution at a time.

 

Unwanted software can be installed by websites, downloaded programs, or a program you might install from a CD, DVD, external hard disk, or a device. Spyware is most commonly installed through free software, such as file sharing, screen savers, or search toolbars ,some spyware can be installed from a website through an embedded script, or program in a webpage. Some unwanted software requires your help to install through web pop-ups or free software that require you to accept a downloadable file. However, if you keep Windows up to date and don't reduce your security settings, you can minimize the chances of a spyware infection. Some websites will repeatedly display pop-ups asking you to install a toolbar or change your home page. When this happens, try closing the browser window. If the pop-ups still appear, right-click the Internet Explorer button in the taskbar at the bottom of your screen, and then click Close Group. As a last resort, close any other programs you have open, and then restart your computer. When you visit websites, do not automatically agree to download anything the site offers. If you download free software, such as file sharing programs or screen savers, read the license agreement carefully. Look for clauses where you must accept advertising and pop-ups from the company, or that the software will send certain information back to the software publisher.

This article describes how to manually download the latest definition updates for Microsoft Windows Defender.To manually download the Windows Defender definitions for your computer, follow the steps for your operating system type, 32-bit version or 64-bit version.

 

32-bit versions of Windows:
To download the Windows Defender definition update file for 32-bit (x86-based) versions of Windows, click the following link:
http://go.microsoft.com/fwlink/?linkid=70631
After you click this link, click Run to install the definition file immediately, or click Save to save the definition file to the computer. If you click Save, remember the folder where you save the file. To install the saved definition update file, click Start, click Run, locate the folder where you saved the definition file, double-click the Mpas-fe.exe file, and then click OK. Note To install the file on a Windows Vista-based computer, right-click the file, and then click Run As Administrator to install it. When the definition file runs, a file extraction dialog box appears. The dialog box indicates that the definition update is installing. After the file extraction dialog box closes, you can verify that the Windows Defender definitions have been updated. To do this, open Windows Defender, and then check the definition version that is listed in the box at the bottom of the Windows Defender Home dialog box.

Command-line installations:

The Windows Defender definition update file (Mpas-fe.exe) can use the -q command-line execution switch. This switch installs the definition update in quiet mode. Quiet mode suppresses the definition file extraction dialog box. For example, type the following command:
Mpas-fe.exe –q

64-bit versions of Windows
If you run a 64-bit version of Windows, download the Windows Defender Update Definition file by clicking one of the following links.
Note You must be running a 64-bit version of Windows to run a 64-bit version of Windows Defender. 64-bit versions of Windows include x64-based versions and Itanium-based versions. To download the Windows Defender definition update file for x64-based versions of Windows, click the following link:
http://go.microsoft.com/fwlink/?linkid=70632

To download the Windows Defender definition update file for Itanium-based versions of Windows, click the following link:
http://go.microsoft.com/fwlink/?linkid=70633

Links:

To download the Windows Defender definition update file for 32-bit (x86-based) versions of Windows, click the following link:
http://go.microsoft.com/fwlink/?linkid=70631

To download the Windows Defender definition update file for x64-based versions of Windows, click the following link: http://go.microsoft.com/fwlink/?linkid=70632

Windows Defender Latest Definition Updates from softpedia:    http://www.softpedia.com/progDownload/Windows-Defender-Latest-Definition-Updates-Download-104685.html

Courtesy:  http://go.microsoft.com/fwlink/?LinkID=87588&clcid=0x409 ,(KB923159)

follow me on twitter 

Technorati Tags: ,,,
del.icio.us Tags: ,,,

Technorati pls. ignore

ZUU953REJZDQ

A Grand Relief

I was really  delighted that day to find somebody knowing me from my childhood in this love-lorn locality centered round a bunch of uncivilized people who in their filthy manners spoil the surroundings as much as themselves. No matter the number of civilized people living in the vicinity, such people though never ought-weighing the civilized ones spoil the broth just like a single fly spoiling a glassful of pure cow milk buoyant with thick puffy cream.

I never felt like knowing him earlier before, though I looked at him at times sensing a baby face grown into a matured one. We looked askance at each other reading the minds of both in no uncertain terms as we pass by in the same route often times not bothering about being articulate enough to end the surging silence. But hardly had we the temerity of interacting on the subject of earlier association. But the man knew me as much as I knew him for more than five decades from hence and this huge gap of a golden jubilee of separation was more than enough to turn two friends into wayside strangers. Why not it be? When a single decade ushers in a sea-change, five decades is too much a distance to hold up what we were up to.

 

Oh! you ruthless five decades of mega changes and major transformations which saw the rise and fall of not less than ten governments, massive climate change, war with two countries and rise and fall of Bangladesh and Pakistan, the emergence of Baba Ramdev, the heroics of Sachin Tendulkar,the vagaries of Southeast monsoon and a sumptuous dinner available elsewhere at fifty paisa costing a slight more than two hundred rupees.

I heaved a long sigh of relief that at last I was privileged with an opportunity of finding a clue to the bond of love and friendship I cherished five decades ago turning into a never ending thread of a life time, at least, if not beyond.

follow me on twitter 

Technorati Tags: ,
del.icio.us Tags: ,

testing

hi,

Saturday, April 17, 2010

Twitter account

follow me on twitter

easiest option and working in all web browsers to open links in new tabs

Opera private browsing I use the right click menu to open links in new tabs in various web browsers.Whether the link is via text or via an image as from time to time have to go through the strenuous process of having to ‘copy link address’ and then [ctrl T ]then [ctrl V] a more slow and irritating and if it continues for a long duration then the palm will feel the heat.

In opera the easiest and smartest way to open the link in new tab is to set a mouse gesture for it . Like right-click and drag the link in certain direction or to the new tab location.This specifically for opera browser.

The easiest and the smartest way and working in all web browsers to open links(hyperlinks) in new tabs is to employ the middle-mouse button by putting the cursor on the link meant to be opened in a new tab and then use the middle mouse button and you are done.

The down side of this is on laptop touch pad no mouse button available so enable the mouse gesture written above especially for opera.

follow me on twitter 

Technorati Tags: ,,,,,
del.icio.us Tags: ,,,,,
Friday, April 16, 2010

New !Private browsing with Opera 10.5

With a new vector graphics library (Vega), a faster java script engine(Carakan) as usual clear and lucid GUI of Opera’s latest offerings Opera 10.5 now it is opera 10.51.The single most prominent happening introduced with this version is Opera’s private browsing.It is a browsing option that saves no history and no cookies.The unique part is that all browsers allow private surfing in a separate window like Chrome’s Incognito mode ,IE 8’s In Private Browsing etc. all open in a separate window when choice is made to open for it in order to intiate it for private surfing.

Opera private browsing

Opera though late in introducing this but it comes with bang so it is always one-step ahead as Opera permits you to open the private tabs within the current browsing session window of Opera in which you are operating. See this picture.

Opera private browsing1

It is very easy.Right click on the “+” sign next  to the tab displayed  on top and then you have the option of to open a new tab or a new private one. Then click on the option which says ‘New Private Tab’ and you are done.So, you can do yours private surfing without leaving the current window  and infact simultaneously with the adjacent tab, you can do the normal surfing.Of course, you have the option of opening private surfing in a separate Opera window.For this ,to open “New Private Window” in Opera  click on the Opera button and choose “New Private Window” in the tabs and windows option in the list.

Opera private browsing2

follow me on twitter

del.icio.us Tags: ,,,
Technorati Tags: ,,,