Saturday, October 09, 2010

Famous Quotes of Hindi Cinema:-3

Nargis and Raj Kapoor in Awaara (1951), also d...

Image via Wikipedia

 Devdas(1955)

“Kaun kambakht bardaasht karne ko peeta hai? Main toh peeta hoon ke bas saans le saku” Dilip Kumar

Pakeezah(1972)

“Apke paon dekhe, bahut haseen hai. Inhe zameen par mat utariyega, maile ho jayenge” Raj Kumar

Deewar(1975)

“Aaj mere paas gaadi hai, bungla hai, paisa hai… tumhare pas kya he?” Amitabh Bachan

Deewar(1975)

“Mere pas mere pas… Maa ke…” Shashi Kapoor

Yaadon ki Baraat(1973)

“Kute , kamine, main tera khoon pee jaunga” Dharmendra

Sauten(1983)

“Jinke ghar shise  ke hote hain, woh batti bujhake kapde badalte hain” Prem Chopra

Sholay(1975)

“Hum angrezon ke zamane ke jailor hain” Asrani

 

Technorati Tags: ,,,,
 

Enhanced by Zemanta
Friday, October 08, 2010

New ImagePerfect feature in Weebly

Weebly

Image via Wikipedia

Weebly launched an awesome new feature to help you customize the header image on your website known as  ImagePerfect.With ImagePerfect, you can replace the current header image on your website with one from your computer, from Weebly  photo gallery, or from elsewhere on the internet. You can fade images together, add text using a bunch of fonts, apply effects, and even set different header images for different pages. Weebly the easiest and most powerful way to build a website. ImagePerfect is free for all users. You can read more about it on Weebly blog, or try it out yourself on Weebly.com.

Technorati Tags: ,,

Enhanced by Zemanta
Thursday, October 07, 2010

Express "I Love You" in Indian speeches

Phyla nodiflora (syn. Lippia canescens, Lippia...

Image via Wikipedia

Hindi -     Hum Tumhe Pyar Karte hai
Odia-        Mu Tumaku Bhala pae
Gujarati -     Hu tumney prem karu chu
Bangla -    Aamee tuma ke bhalo baashi
Marathi -     Me tula prem karto
Konkani - Tu magel moga cho
Tamil -     Naan unnai kathalikiraen
Malayalam - Njan Ninne Premikunnu
Telugu -     Nenu ninnu premistunnanu
Kannada - Naa ninna preetisuve
Sindhi -     Maa tokhe pyar kendo ahyan

 

Technorati Tags: ,,,,
Enhanced by Zemanta
Wednesday, October 06, 2010

Privacy principles of Google

SYDNEY, AUSTRALIA - OCTOBER 14:  Artwork of th...

Image by Getty Images via @daylife

Google is keen to save yours and protect yours privacy.Google takes it as responsibility to protect your privacy. It lets you know what information it collects when you use its products and services, why it collects it and how it uses it to improve your experience.5 privacy principles of Google  that describe how it approaches privacy and user information across all of its products. This Privacy Center was created to provide you with easy-to-understand information about Google  products and policies to help you make more informed choices about which products you use, how to use them, and what information you provide to Google .These are 5 privacy principles of Google.

  1. Use information to provide our users with valuable products and services.
  2. Develop products that reflect strong privacy standards and practices.
  3. Make the collection of personal information transparent.
  4. Give users meaningful choices to protect their privacy.
  5. Be a responsible steward of the information we hold.

Google’s Privacy Policy describes how it treats personal information when you use Google’s products and services.Go here for more detail. Find out more details about the updates and read the new policy. The updated policy will take effect on October 3, 2010.

Technorati Tags: ,,

Enhanced by Zemanta
Tuesday, October 05, 2010

Famous Quotes of Hindi Cinema:- 2

Mother India

Image via Wikipedia

 

Shahenshah(1988)

“Rishte mein to hum tumhare baap lagte hain, naam hai Shahenshah”-Amitab Bachchan

 

Guide(1965)

“Marco,mein jeena chahti hoon”- Wahida Rehman

 

Baazigar(1993)

Kabhi kabhi kuch jeetne ke liye kuch harna bhi padta hai, aur haar kar jeetney wale ko baazigar kehte hain”-SRK

 

Kaante(2002)

“Agar tere sar par bomb laga doon toh pehle kaun phatega, tu ya tera sar?”-Sanjay Dutt

 

Maine Pyaar Kiya(1989)

Dosti ka ek usool hai madam: no sorry , no thank you” Salman

Mother India(1957)

“Tu mujhe nahin maar sakti. Tu meri maa hai” Sunil Dutt

Mother India(1957)

Mein pehle ek aurat hoon” Nargis

 

Technorati Tags: ,,,,

Enhanced by Zemanta
Monday, October 04, 2010

Knowing virtualization server

Entrance of IBM Headquaters, Armonk, Town of N...

Image via Wikipedia

Virtualization moves on the application titled  "hypervisor" . It changes on lead of the system of rules component . It transforms a compressed computer circuit between  organization and the  it counts upon. Hypervisor resources septuple s functioning  paralled or sort out to each some other. Hypervisor make each operating system move as differentiate simple machine , thusly each connective tissue is famed as essential  soul. in order,  on a individual  piece of instrumentality aggregate  humans square measure pouring. The ingenuity parceling of base car can be transformed dynamically by hypervisor , accordant  to call fors by essential  mechanical devices. This represents best  utilisation of base human to its fullest. however on the dot eutherians virtualisation service? locations how…Back up of essential  forge is tardily and in some somebody it has the quality, as it can be set up on diametric base  guinea pig to coming together of posts  and assets. true , in a portion it is a supply for devastation exploit. As through and through realistic  creates, it minimises ask in a multifarious effectuation as it stay production threefold base humans thence lancinate the superpower and mechanism disbursements.  motor vehicles can be used for examination of computer codes so as to pronounce a delivery properness for software package s without  the base  at all. With dual essential  groupings  on a base , attain utilisation of data  will be dejected  as it can dissonance the affect of accumulation fall into several divides ,  minimising the base omission, production a recovery state of grace for you and for yours organisation.irtualization moves on the application titled  "hypervisor" . It changes on lead of the system of rules component . It transforms a compressed computer circuit between  organization and the  it counts upon. Hypervisor resources septuple s functioning  paralled or sort out to each some other. Hypervisor make each operating system move as differentiate simple machine , thusly each connective tissue is famed as essential  soul. in order,  on a individual  piece of instrumentality aggregate  humans square measure pouring. The ingenuity parceling of base car can be transformed dynamically by hypervisor , accordant  to call fors by essential  mechanical devices. This represents best  utilisation of base human to its fullest. however on the dot eutherians virtualisation service? locations how…Back up of essential  forge is tardily and in some somebody it has the quality, as it can be set up on diametric base  guinea pig to coming together of posts  and assets. true , in a portion it is a supply for devastation exploit. As through and through realistic  creates, it minimises ask in a multifarious effectuation as it stay production threefold base humans thence lancinate the superpower and mechanism disbursements.  motor vehicles can be used for examination of computer codes so as to pronounce a delivery properness for software package s without  the base  at all. With dual essential  groupings  on a base , attain utilisation of data  will be dejected  as it can dissonance the affect of accumulation fall into several divides ,  minimising the base omission, production a recovery state of grace for you and for yours organisation.

Technorati Tags: ,,,,

Enhanced by Zemanta
Sunday, October 03, 2010

A painful farewell

My relationship with Docomo was as old as its introduction. I was an ardent fan of Docomo which is evident from my earlier writing on it a few months back when I praised the generosity of the Tatas in refunding me excess charges they had erroneously debited which normally never happens. But, now, I have relinquished the SIM in favor of Vodafone. It was a painful substitution done after a myriad thoughts.

The last three/ four months were too much for me to forbear. I had never subscribed for jokes, but deductions were made and jokes came, Similarly, sports news, music downloads, etc. came without myself consciously requesting for it. To add to my woes, all my subscriptions were being renewed without myself requesting for the same. I was completely at sea without having any knowledge of quashing the compulsion. I ran from pillar to post to undo the damage inflicted upon me by Docomo, but their staffs are trained  not to listen to us in such a manner that I had to relinquish the SIM altogether, much against my inner urge.

It so happened during my last three months of Docomo usage that whatever amount of recharge voucher were put, all were debited as arrears towards some fun, game or astrological news thrust upon me by Docomo.

I was always short of balance for using the phone even after recharging the mobile with more than adequate balance projected for a month. But, it took me four long months to take the painful decision of separation. It shows, how much I like my partner.But, alas, it is a one way traffic. My partner does not like me So, my conjugal life with Docomo ended.

 

But, once a partner, I cannot think ill of my better-half. Let it rest in peace without luring others for the same love-game.

Technorati Tags: ,,,
Follow ittechs on Twitter
Saturday, October 02, 2010

Take a dig at virtualisation server

Server virtualisation runs on the technology called “hypervisor” . It runs on top of the system hardware . It becomes a thin interface between Operating System (OS) and the hardware it depends upon. Hypervisor supports multiple OSs running paralled or isolate to each other. Hypervisor make each OS behave as separate machine , thus each OS is known as virtual machine. So, clearly on a single piece of hardware multiple virtual machines are running. The resource allocation of base machine can be changed dynamically by hypervisor , according to demands by virtual machines. This shows optimum utilisation of base machine to its fullest. How exactly does virtualisation help? Here’s how…Back up of virtual machine is easy and in some case it has the mobility, as it can be install on different base system subject to meeting of standards  and resources. So, in a way it is a tool for disaster recovery. As through virtual machines, it minimises cost in a multifaceted way as it stops making multiple base machines thus cutting the power and cooling expenses. Virtual machines can be used for testing of softwares so as to say a saving grace for software developers without hurting the base system at all. With multiple virtual systems  on a base system, average utilisation of dat6a flow will be lower as it can divide the process of data flow into various segments , thus minimising the base failure, making a saving grace for you and for yours organisation.

 

Technorati Tags: ,,,,
Follow ittechs on Twitter
Friday, October 01, 2010

Famous Quotes of Hindi Cinema:-1

Mr India(1987)

“Mogambo khush hua”- Amrish Puri

 

Mughal-e-Azam(1960)

“Anarkali, Salim ki mohabbat tumhe marne nehin degi aur hum tumhe jine nehin denge.”-Prithviraj Kapoor

 

Sholay(1975)

“Kitne aadmi thhe?”-Amzad Khan

 

Vishwanath(1978)

“Jali ko aag kehte hain, bhuji ko raakh kehte hain , jis raakh se barood bane usey Vishwanath kehte hain,”-Satrughan Sinha

 

Sholay(1975)

“Arre-O Sambha”-Amzad Khan

 

Amar Prem(1971)

“Pushpa, I hate tears , inhe ponch dalo.”-Rajesh Khanna

 

Mughal-e-Azam(1960)

“Anarkali ke kismat mein kaanta aaya hai”-Dilip Kumar

 

Mughal-e-Azam(1960)

“Phool toh murjha jaate hain, lekin kaante daman tham lete kain:-Madhubala

 

Waqt(1965)

“Chinai Seth, chhuri bachon ke khelne ki cheez nahin hoti , haath kat jaye toh khoon nikal aata hai”-Raj Kumar

Technorati Tags: ,,,,

Follow ittechs on Twitter
Thursday, September 30, 2010

Google relaunches Instantiations developer tools -now for free

Google come into possession of Instantiations in the beginning of august . Instantiations

a company known for its focus on Eclipse Java developer tools, including GWT Designer. GWT Designer is a powerful Eclipse-based development tools that enable Java developers to quickly create Ajax user interfaces using Google Web Toolkit (GWT). Google on September 16, 2010,Thursday relaunches the following former Instantiations products under the Google name and making them available to all developers at no charge. It is definitely a great news for the developers.The products are GWT Designer,CodePro AnalytiX,WindowBuilder Pro,WindowTester Pro. The next vision for Google is to more deeply unify them into the GWT family of tools by blending the fantastic Instantiations technology into the Google Plugin for Eclipse (GPE). You can download any of the tools from the GWT download page.  (Source)

Technorati Tags: ,,,,,
Follow ittechs on Twitter
Wednesday, September 29, 2010

Express "I Love You" in Foreign speeches

English -     I love you
Nepali -     Ma Timilai Maya Garchhu
Chinese     Ngo oiy ney a
Mandarin Chinese -    Wo ai ni
French -     Je t'aime, Je t'adore
Irish -     Taim i' ngra leat
Italian -     Ti amo
Japanese - Aishiteru
Korean -     Sarang Heyo
Latin -     Te amo
Zimbabwe - Ndinokuda
Afrikans -Ek het jou lief
Dutch -     Ik hou van jou
Bulgarian - Obicham te
Russian -    Ya tebya liubliu
German -     Ich liebe dich
Greek -     S'agapo
Romanian - Te ubesc
Finnish -     Mina rakastan sinua
Polish -     Kocham Cie
Filipino -     Mahal kita
Taiwanese -     Wa ga ei li
Norwegian -     Jeg Elsker Deg

Technorati Tags: ,,,
Follow ittechs on Twitter
Tuesday, September 28, 2010

IObit Security 360 –Free antimalware with real-time protection

IObit the makers of utilitarian windows freewares and sharewares such as Advanced SystemCare, SmartDefrag and Game Booster,Iobit Uninstaller has a very good and light antispyware software and freeware called IObit Security 360.IObit Security 360 is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers. With the unique "Dual-Core" engine and the heuristic malware detection, IObit Security 360 detects the most complex and deepest spyware and malware in a very fast and efficient way. IObit Security 360 has a real-time malware protection and frequent updating for prevention of zero-day security threats. Designed for Windows® 7, Vista™, XP and 2000 (32bit and 64bit), IObit Security 360 can work with your Antivirus for a superior PC security

Key Features and Benefits:As IObit Security 360 suggests it works with all antiviruses , I tested with Vipre AV suit ,it works seamless and also on another PC I tested with Avira AntiVir Personal with Comodo firewall at Proactive security , it works and gel with these settings .Antimalware, antispyware, anti-adware, anti-Trojan, anti-bots, and more. IObit Security 360 can assist  your Antivirus defend any tricky and complex threats.It is very fast and light and its updates is very good especially on its Pro version but I have heard from my colleagues its free version did sometimes gives some annoyances, but I have failed to do this as am using the Pro version.

What it makes the differences from other similar line of products is its complete annoyance free installation.Take a look at the case of Super antispyware, during the installation it will ask you  to guard the changes of Home page of Internet Explorer.With Mallwarebytes Antimalware its context menu installation option is boring.

IObit Security 360 using DOG (Digital Original Gene), a novel heuristic malware detection method, IObit Security 360 can find the most complex threats.Scan & Remove is free, and real-time protection is free too. You will love this small but powerful free anti-malware genius.Remember it is the only free antimalware which will give you the real time protection for free where as its competitor such as Super antispyware and also Mallwarebytes antimalware gives these only in their Pro version.

Technorati Tags: ,,
Follow ittechs on Twitter
Monday, September 27, 2010

Different countries' Independence day :- 5

SEPT. 9, 1991 - TAJIKISTAN
SEPT. 21, 1991 - ARMENIA
OCTOBER 27, 1991 - TURKMENISTAN
NOVEMBER 24, 1991 - UKRAINE
DECEMBER 16, 1991 - KAZAKHSTAN
JANUARY 1, 1993 - SLOVAKIA
JANUARY 1, 1993 - CZECH REPUBLIC
MARCH 3, 1992 - BOSNIA AND HERZEGOVINA
MAY 24, 1993 - ERITREA

JUNE 5, 2006 - SERBIA
JUNE 3, 2006 - MONTENEGRO
FEBRUARY 17, 2008 - KOSOVO

Technorati Tags: ,,,
Follow ittechs on Twitter
Sunday, September 26, 2010

Delete WinXP individual system restore points with CCleaner

Individual or selective removal of WinXP System Restore Points has now become more easier.System Restore Service takes space in Windows XP in a span of 2 months almost 8 GB with over 50 individual restore points.Any system changes, including minor software additions or deletions,creates a restore points even multiple restore points in a day.You can minimize this more so if you are using laptop having space constraints. Please read on .

Download the latest version of CCleaner ;important: download the version 2.19.900 on or afterwards.It now has a tool to delete individual restore points. You may download it now from www.ccleaner.com. Open CCleaner click on 'Tools' on the left hand side then click on 'System Restore' and select any individual restore point and click on 'Remove'. It is only possible to remove one at a time. Automatically the latest system restore point cannot be deleted ,never disable system restore completely because it is essential to use it for minor mishaps.Please view Full Album for more illustration.CCleaner is the tool for cleaning your Windows PC. Keep your privacy online and offline, and make your computer faster and more secure. Easy to use and a small, fast download.

Technorati Tags: ,,,
Saturday, September 25, 2010

TweetLater!

TweetLater is a fantastic tool for managing and organising yours twitter account. You can post twitter updates with a  time-delay . This gives  yours guest  an illusion that you are always  on twitter. This can pull more people towards yours twitter account and resulting enhancing popularity yours twitting. If you are a great tool making and  showing yours twitter account active  always on . TweetLater account active always on. TweetLater is used in stealth mode.

How do I add a Twitter account and then automate it?

Login to TweetLater.com.Click the "Accounts" menu tab in the top menu that's below the site logo.Click the "Add Account" sub-menu tab.Click the Continue button on the next page.That will open a page where you need to enter your twitter  username and password.Scroll down and click to check the selection boxes of the automation options you want. Scroll all the way down and click the Save button.

API Key:This API Key is the authentication mechanism that gives access to your TweetLater account to any third-party application that uses the TweetLater API. You never need to provide your TweetLater username or password to any application. If anybody asks for your username and password, then it's a scam.If you suspect that your API Key has been compromised, you can generate a new key with TweetLater.

The first thing you need to understand is, your new followers will never be processed immediately when they follow you. It is simply impossible for TweetLater to do that.When you add your Twitter account and set its automation options,TweetLater grab a copy of your follower list from Twitter and  save it in their system.After waiting several hours ,TweetLater use this new list and compare it with the previous one they grabbed.Then make the comparison and update the status of the followers.

Every time you edit your Twitter account entry and change any of the automation options, TweetLater completely reset your schedule, and  take a new snapshot of your follower list.In other words, any unprocessed new followers that followed you before you clicked the Save button will not be recognized as new followers and will not be processed. Only new followers who follow you after you've clicked the Save button will be picked up and processed the next time the bus reaches your stop.

Go here for TweetLater :Productivity tools for busy Tweeple.

Technorati Tags: ,
Friday, September 24, 2010

Manually download the latest definition updates for Windows Defender

Even all of these security measures in place ,there is still a chance for things to take an ugly turn for the worst. Windows Defender will help to protect against malware infection,malicious downloads,popups,slow performances and a variety of other internet-borne threats. To help avoid virus and malware infection, it is important to take care with all the online activities.Spyware as we all know is a program that is installed on a PC without the  users agreement and is directed at collecting personal/sensitive classified information about a user or the computer. So an anti spyware is a program that blocks malicious programs from fulfilling their intensions and Windows Defender is an anti spyware and is more capable. Many people use anti-spyware in combination so as to add multiple layers of security. But should a conflict resides, it is recommended to use only one solution at a time.

Unwanted software can be installed by websites, downloaded programs, or a program you might install from a CD, DVD, external hard disk, or a device. Spyware is most commonly installed through free software, such as file sharing, screen savers, or search toolbars ,some spyware can be installed from a website through an embedded script, or program in a webpage. Some unwanted software requires your help to install through web pop-ups or free software that require you to accept a downloadable file. However, if you keep Windows up to date and don't reduce your security settings, you can minimize the chances of a spyware infection. Some websites will repeatedly display pop-ups asking you to install a toolbar or change your home page. When this happens, try closing the browser window. If the pop-ups still appear, right-click the Internet Explorer button in the taskbar at the bottom of your screen, and then click Close Group. As a last resort, close any other programs you have open, and then restart your computer. When you visit websites, do not automatically agree to download anything the site offers. If you download free software, such as file sharing programs or screen savers, read the license agreement carefully. Look for clauses where you must accept advertising and pop-ups from the company, or that the software will send certain information back to the software publisher.

This article describes how to manually download the latest definition updates for Microsoft Windows Defender.To manually download the Windows Defender definitions for your computer, follow the steps for your operating system type, 32-bit version or 64-bit version.

After you click this link, click Run to install the definition file immediately, or click Save to save the definition file to the computer. If you click Save, remember the folder where you save the file. To install the saved definition update file, click Start, click Run, locate the folder where you saved the definition file, double-click the Mpas-fe.exe file, and then click OK. Note To install the file on a Windows Vista-based computer, right-click the file, and then click Run As Administrator to install it. When the definition file runs, a file extraction dialog box appears. The dialog box indicates that the definition update is installing. After the file extraction dialog box closes, you can verify that the Windows Defender definitions have been updated. To do this, open Windows Defender, and then check the definition version that is listed in the box at the bottom of the Windows Defender Home dialog box.

Command-line installations:

The Windows Defender definition update file (Mpas-fe.exe) can use the -q command-line execution switch. This switch installs the definition update in quiet mode. Quiet mode suppresses the definition file extraction dialog box. For example, type the following command:

    • Mpas-fe.exe –q

64-bit versions of Windows :
If you run a 64-bit version of Windows, download the Windows Defender Update Definition file by clicking one of the following links.
Note You must be running a 64-bit version of Windows to run a 64-bit version of Windows Defender. 64-bit versions of Windows include x64-based versions and Itanium-based versions. To download the Windows Defender definition update file for x64-based versions of Windows, click the following link: http://go.microsoft.com/fwlink/?linkid=70632

Links:

  1. To download the Windows Defender definition update file for 32-bit (x86-based) versions of Windows, click the following link:
    http://go.microsoft.com/fwlink/?linkid=70631
  2. To download the Windows Defender definition update file for x64-based versions of Windows, click the following link: http://go.microsoft.com/fwlink/?linkid=70632
  3. Windows Defender Latest Definition Updates from softpedia:                                                    http://www.softpedia.com/progDownload/Windows-Defender-Latest-Definition-Updates-Download-104685.html

Courtesy:  http://go.microsoft.com/fwlink/?LinkID=87588&clcid=0x409 ,(KB923159)

Technorati Tags: ,,,
Thursday, September 23, 2010

jetable.org :yours antispam address

To avoid spam, jetable.org provides you with a temporary email address. As soon as it is created, all the emails sent to this address are forwarded to your actual email address. Your antispam address will be deactivated after the lifespan you selected comes to its end.

jetable.org IS NOT an anonymous email service: email headers are not modified , jetable.org keeps the logs of this service.

It is simple,,put yours email address,give it a lifespan (one hour,one day,one week or one month) then click on the “Create your disposable email address”.

Apart from English language version,it is available in some other languages also. So go here and avoid spam.About jetable.org

Technorati Tags: ,
Wednesday, September 22, 2010

VIPfollowers- increase yours twitter followers count

If you are using lately Twitter then desire for yours augmented number of followers then VIPFollowers.com may have been yours quality alternative  to increase yours followers count. To say the least I tried it with its Regular members and got almost 50 to 60 members as my followers within a week. You can follow me at my twitter account also.

You will have to feed yours twitter account username and password in order to log in in to this so better read the privacy statement and other information before using this site. vipfollowers.com in no way affiliated with or endorsed by Twitter.com .Login, follow all the vip/regular users, then you will automatically join train.To make sure your using the right twitter account to get followers.By opting out, This will take you out of vipfollowers.com system, And you will no longer receive followers.

As this website assures

“if you are in fact, trying to gain more followers on Twitter!  Our software will guarantee that you get the maximum number of followers possible for your business, website, or fan page! ”

Privacy Policy as suggested at vipfollowers.com
Any twitter contact information is kept absolutely private. Neither your account nor anything about your account is sold or shared with any other company or agency. Occasionally, we may tweet on your account for promotion purposes. However, we do respect your right to privacy and will not send tweets if you opt out of our service.

Follow me on twitter

Technorati Tags: ,