Saturday, November 15, 2008

Social networking statistics

MySpace
&0000000246351193.000000246,351,193 Open to ages 14 and up. &0000000000000006.000000

Facebook
&0000000124000000.000000124,000,000 Open to people 13 and older.
Windows Live Spaces
&0000000120000000.000000120,000,000 Open
Habbo
&0000000100000000.000000100,000,000 Open to people 13 and older
hi5
&0000000080000000.00000080,000,000 Open to people 13 and older
Friendster
&0000000080000000.00000080,000,000 Open to people 16 and older.
Orkut
&0000000067000000.00000067,000,000 Open to people 18 and older


Gmail tips and tricks

Recently I found out a trick in gmail that I felt very  interesting.The trick is like having a gmail address and making many gmail addresses by using the simple operators like .,+.

Gmail doesn't differentiate between the following addresses
raghubharat@gmail.com
raghu.bharat@gmail.com
r.a.g.hu.bharat@gmail.com
some other mail id with . in middle
                            
                                        The trick here is suppose you have a gmail id yourname@gmail.com you will recieve the mails sent to any combination of your email id with . operator

2) The second trick is using the + operator.You can add some random text using the +operator to your gmail id
FOR EXample: raghubharat+yourtext@gmail.com

                                             Hence beware of spammers who can send emails to these.I recommend you to keep some random number to have a unique id.

Tuesday, November 11, 2008

Online virus checker for free

NoVirusThanks.org offer a free service that scan suspicious files for possible presence of virus, worms, trojans and any other kind of malware using several Anti-Virus engines.

Features:
- Free and independent service
- Use of multiple antivirus engines
- Automatic updates of virus signatures every 6 hours
- Detailed results from each antivirus engine
- Advanced details of file analyzed
- BBCode support

If you discover a suspicious file on your machine, or suspect that a program you downloaded from the Internet might be malicious, you can check the files here.Indicate the file to be checked; it will automatically be uploaded from your computer to a dedicated server, where it will be scanned using Kaspersky Anti-Virus. Multiple independent tests and publications acknowledge the solution to have exceptional detection rates. Updates every three hours ensure that even the very newest viruses can be detected.
Only one file of up to 1 MB can be checked at any one time. If the file is too large, a window with an error message will be displayed. Type the name of the file in the window at the top of this page, or find the file using 'Browse'. Then click on 'Submit'.If you have several potentially suspicious files, you can check them one after the other, or create an archive file (in zip, arj or similar format) and check that. The archive should not be larger than 1 MB


Some other free scanners available online
http://www.bitdefender.com/scan8/ie.html
leading anti-virus vendors McAfee Inc. and Symantec Corp. have rich online scanning tools, but these services do not actually remove detected threats.


HOW to find the complete information about a person on the web

With 123people, you can find out most of the information about a person that has been posted on the internet. Type in a name of a person you want to find and know more about, and you get results from social websites, image sites, video sites, blogs, news sites, and many more sources.The 123People site aggregates all these different websites together to provide you with a webpage that gives as much information about someone as you will need. Great for those interested in their internet fame as well as reuniting with old friends.
click here to go to site

Monday, November 10, 2008

Chatting lanuage

Here is a list of 40 words that are useful for chatting.They save a lot of time while chatting.

01-10 | A TO F

* AKA: Also Known As
* ASAP: As Soon As Possible
* BRB: Be Right Back
* BTW: By The Way
* BAK: Back At Keyboard
* BBL: Be Back Later
* B4N: Bye For Now
* F2F: Face To Face
* FYI: For Your Information
* FYA: For Your Amusement



11-20 | G TO I

* G2G: Got To Go
* GFY: Good For You
* GL: Good Luck
* GTGB: Got To Go Bye
* IM: Instant Message
* ILU: I Love You
* IOW: In Other Words
* IMO: In My Opinion
* IRL: In Real Life
* ITS: I Told You So



21-30 | K TO R

* KIT: Keep In Touch
* LTL: Lets Talk Later
* LOL: Laughing Out Loud
* NYO: Need Your Opinion
* NP: No Problem
* LU: Looking Up
* PLS: Please
* POS: Parents Over Shoulder
* POV: Point Of View
* ROTFL: Rolling On The Floor Laughing



31-40 | T TO W

* TMI: Too Much Info
* TIA: Thanks In Advance
* TTYL: Talk To You Later
* TTFN: Ta Ta For Now
* TX: Thanks
* TY: Thank You
* TU: Thank You
* U: You
* U2: You Too
* WB: Welcome Back

multi search engines

Here are a list of some websites that gives you option to search from different search engines from a single website.A very useful list if you browse a lot :P

GAHOOYOOGLE:
As the name says it searches google and yahoo at a time and displays the results in seperate frames in a single website.Now the website is down and it is shifted to polycola.com.It is my all time favourite

1. Joongel ( http://www.joongel.com/ ) -Yhis Search gives results form top 10 search engines. Result page open in a new window with cut bar at the top, which you can use to get results from other search engine.



2. SearchBoth ( http://www.searchboth.com/) - It allows you to search 2 specific search engines in same category at the same time. For example search Google & Yahoo or Monster & Hotjobs at the same time.You can choose which two search engines you are searching and can modify later.


3. Search.io ( http://search.io/) - It allows you to search multiple search engine with the comfort of ever so familiar tabs. It has a tabbed interface for the different search engines as shown in the image.Very fast and simple


4. Zuula (http://www.zuula.com/ ) - It allows you to search over 10 search engine from the same window. By default results from Google are shown. You can chose the search engine from the top bar and get results from other search engine. Works pretty good!



5. PolyCola ( http://www.polycola.com/) - metasearch engine which was previously known as GahooYoogle. It simultaneously searches Google, Yahoo!, Live Search, Ask.com, Dogpile, AltaVista and AOL.It was started with the domain www.GahooYoogle.com in 2005 but it was shut down due legal problems. Currently it is operating with the address www.polycola.com
Its shows search results in two vertical window at a time.


INFO.COM:
A search engine that displays the results from top search engines like google,yahoo,ask etc in the same site.You cannot choose which sites you can use unlike other sites but the results are too goood.
Dogpile is a metasearch engine that fetches results from Google, Yahoo!, Live Search, Ask.com, About.com, MIVA, LookSmart and several other popular search engines, including those from audio and video content providers. It is a registered trademark of InfoSpace, Inc.The Dogpile search engine earned the 2006 and 2007 J.D. Power and Associates award for best Residential Online Search Engine Service. The site was developed in 1996 by Aaron Flin and later sold to Go2net (which was in turn acquired by Infospace). Dogpile is trying to raise $1 million before 2009 to donate to animals in need; They will donate $1 each time someone uses the search engine.

Sunday, November 9, 2008

data recovery guide

In an office setting, computers have become an indispensable tool for commerce. It facilitates greater output at a lesser time. Accountants, for instance, need computers to speed up work on financial statements. Engineers and architects used software to perfect their designs. Every professional, at one time or another, needs to get acquainted with computer.

But along with the opportunities come responsibilities. Computers are subject to wear and tear. But probably the biggest threat to computers is the person using it. Yes, you and me. Human error posed the biggest problem to computers.

It wouldnt be a pretty sight to open your computer one day and find out that it wasnt running anymore. Some nasty virus or a mechanical problem occurred. All your important files are lost. And you end up, spending companys valuable time and effort in data recovery.

Data recovery can be tedious. The good news is data recovery, more often than not, is still possible. Data recovery can be done in either two ways: by using data recovery software or data recovery services. Data recovery software can help you revive the data which you thought is lost. Data recovery services can do more than that. Data recovery service is more extensive and required more technical skills.

Before engaging a hard drive recovery service to attempt recovery, it pays to know what hard drive and hard drive failure are. A hard drive is a stack of disc coated with thin layers of substrate and magnetic material. Hovering above the disc is the drivehead. The discs create a slight breeze as they spin, creating a cushion of air for the head. The drivehead, as a rule, never touches the discs. Unless, something happens to that cushion of air. If in some rare circumstance the head touches the discs, it will drop through the magnetic layers and cut slashes into the surface of the discs. It grinds through the aluminum substrate and spray dust from all three layers and all over the discs. One piece of dust is what causes all of this to happen. The resulting hard drive failure occurs.

What a hard drive recovery service does first is to try and make the damaged drive run again. The hard drive recovery service clones your drive to a blank drive then work on the cloned drive. As for the damaged parts, they attempt to work around those too. The hard drive recovery service then used an off-the shelf variety or custom-made recovery software. If that wont work, the hard drive recovery service attempts to rebuild the data by hand to start the lengthy process of data recovery. The hard drive recovery service recreates the Master Boot Record 'MBR' and the Master File Table 'MFT'. The MBR tells how big the drive is while the MFT tells where all the bits of data are on the drive.

A hard drive recovery service cannot guarantee that recovery is possible in all circumstances though. Data recovery is oftentimes a lengthy process that is why data recovery is always best to use a professional hard drive recovery service or recommended data recovery software. Or else, NO data recovery will be done and you might run the risk of damaging your computer further.

FInd number of photos that can be stored in your memory card

Number of photos which can be stored on different card sizes for cameras between 3 and 8 megapixels (MP).



Lowest Compression JPEG (Super Fine Setting):
Camera Sensor 128 MB Card
256MB Card
512 MB Card
1 GB Card
2 GB card
3 MP 74 148 296 592 1184
4 MP 60 120 240 480 960
5 MP 50 100 200 400 800
6 MP 37 74 148 296 592
8 MP 31 72 144 288 576


Moderate Compression JPEG (Fine Setting):
Camera Sensor 128 MB Card
256MB Card
512 MB Card
1 GB Card
2 GB Card
3 MP 136 272 544 1088 2176
4 MP 109 218 436 872 1744
5 MP 88 176 152 704 1408
6 MP 68 136 272 544 1088
8 MP 55 110 220 440 880

What is flash memory


Flash memory is something known as "non-volatile computer memory". Non-volatile is a fancy term that means the memory device will still hold the memory whether or not the device is powered.

Your hard drive is probably the best example of non-volatile computer memory, because you (hopefully) retain all of your files even if your computer is turned off.


If you use any kind of digital components that are compatible with your PC, then you probably own flash memory. Digital cameras, camcorders, video games, and even GPS units all use flash memory to capture and store information that can later be downloaded to your PC.

Though flash memory may take several different forms, like memory cards, memory sticks or jump drives, the basic operating principles are the same.

Flash memory is special in that it can transfer files and information between computers by simply inserting and removing the memory device. If you take the memory stick or memory card out of your new Nikon digital camera and you want to transfer your pictures to your computer to print the photos, you can do that safely and without worry. Just make sure that the memory stick is compatible with both your new Nikon camera and your computer.

Another great thing about flash memory is the cost. This type of memory actually costs very little and is very versatile. Part of the reason that it is so cost-effective is that it can be erased and used over and over again, unlike some other computer accessories like CDs or DVDs.

Using flash memory allows you to transfer a load of photos to your computer for printing or editing, delete the flash memory device, and do the same thing all over again as many times as you like.

A flash memory source is a great way to back up your digital photographs while you are editing them. If you make a mistake in cropping or editing a picture that you can't undo, or even if you accidentally delete the photo, you can rest easy knowing that you have a copy of the original picture saved on the flash memory card that goes in your camera.

Digital Memory Buying Guide

Digital memory devices let you store and retrieve data whenever you need. They are compatible with most electronic goods. Many consumers prefer digital memory devices because of their small size, durability and portability. There are many different types of digital memory devices in the market. It is always good to consider which kind of digital memory device is compatible with your electronics before choosing one.

How does a memory card store data?

A memory card functions electronically and uses flash memory, also called flash RAM, to store data on non-volatile memory chips. Memory cards have the ability to electrically erase or reprogram any recorded data.

What are the different types of memory devices available in the market?

CompactFlash (CF):

CompactFlash is in the size of a matchbox and is used in a variety of electronic devices, including PDAs, digital cameras, digital voice recorders and set-top television boxes. There are two models: Type I and Type II. The latter is thicker and provides expandable memory options. Type I cards will often fit in a standard laptop PC slot with the use of an inexpensive adapter and are also compatible with Compact Flash Type II slots. CompactFlash cards can be used in a PCMCIA slot if you have an adaptor. Otherwise, you need a device with a CompactFlash Type I slot.

SmartMedia (SM):

The SmartMedia is often called as SSFDC cards (Solid-State Flash Digital Cards). They are as thin as credit cards and about the size of a matchbox. They are specifically designed for portable digital devices such as digital cameras, portable MP3 players, PDAs and the like. SmartMedia is available with storage capacities of up to 128 megabytes. Some devices have slots for both Smart Media and CompactFlash cards. If this is not the case, you need a SmartMedia slot to use a SmartMedia card.

MultiMedia Card (MMC):

The MMC is a postage stamp-sized card used in mobile phones, pagers, video cameras, global positioning systems, portable MP3 players and PDAs. Their storage capacity ranges from 256 MB to 4 GB. Devices that use Secure Digital cards will also accept MultiMedia Cards.

Secure Digital (SD):

The Secure Digital memory card succeeded the MMC card. It is slightly thicker than the MMC card, has additional storage capacity and a digital copyright security scheme to store copyrighted data. This digital memory device is popular among many new PDAs, organizers, phones, and MP3 players. Devices that use MultiMedia Cards may also accept Secure Digital cards.

Memory Stick:

The memory stick is a storage device developed exclusively by Sony. It is most compatible with Sony products like digital cameras, portable MP3 players and PDAs. They have a storage capacity of 256 MB to 8 GB and support 1.1 and 2.0 USB for better connectivity. There is a special version of the Memory Stick with digital-rights management features for certain devices. This card is known by one of the following names - Magic Gate Memory Stick, MagicGate Memory Stick Duo Media, or Memory Stick PRO Duo Media. Users can share and transport data via their computers USB port with the help of Micro Vault USB Storage Media.

xD Picture Card:

The xD-Picture card is the smallest storage format developed for recording, storing and transporting audio-visual information. In addition, xD-Picture Cards are designed to minimize power consumption and extend the battery life of your digital devices. You can use xD cards in a CompactFlash slot if you have an adaptor. Some devices have slots for both xD and SmartMedia cards. If the device does not have both slots, only a device with an xD slot will work with an xD Picture card.

What are Memory Card Readers and Adapters?

Memory card adapters maximize a memory cards performance by increasing data transfer speeds to 60 MB/sec. Besides the potential for expansion, memory card adapters have the ability to transfer data without having to connect the device to your computer with a cable. The memory card readers read most of the memory cards including all SD cards, CF cards, MMC series and much more. Most of the readers also offer writing capability and thus they function as a pen drive.

Which brands are most popular?

Memory cards produced by digital device manufacturers, like Sony and Olympus, tend to be quite popular with consumers. If you are concerned about the speed of your digital memory device, opt for brands like Lexar, SimpleTech or SanDisk. Lexar high speed cards, SimpleTech ProX cards and SanDisk Ultra cards have significantly higher speeds than most standard memory cards.

What are the handling instructions for using a memory card?

Do not remove a memory card from a device while data is being processed. It is advisable to switch off the operating device before removing a memory card. Also, you should remove a memory card from any device that is low in battery charge. Avoid touching the metal connectors of memory cards, especially those on Secure Digital cards, Smart Media cards and XD cards, to avoid electrostatic discharge of data.

Saturday, November 8, 2008

MIU korean company releases HDPC(Hybrid Dual Portable Computer)

 
Have you ever imagined of having a laptop and a pda in a single device with two operating systems and two seperate processors for two OS?
                                                           The device runs Windows XP. It features a QWERTY thumbpad, VGA screen and having a dimension of 163 x 67 x 24.5-mm and weighs 387g.The cartridge could contain digicam/webcam, MP3 player, portable storage, and USB cable and even more functionalities. Besides, the device’s main display was spotted with a smaller panel and keypad that you could make IP-based calls. The company claimed that it’d be a device that cost reasonable price.


# 4-inch, 800 x 480 pixel touchscreen display which slides out and flips over for the cellphone interface
# Up to a 1GHz VIA C7M ULV processor and 4GB of DDR2 memory
# Dual, Windows XP / Linux Qplus embedded OS
# Unspecified cellphone radio
# Maximum 1.3-inch 60GB hard disk (or 4GB SSD) and miniSD/microSD expansion
# 7-hour battery (or 90-hours at low power)
# 802.11b/g WiFi, Bluetooth 2.0
# 2x USB, docking port, stereo speakers, QWERTY thumbpad and mouse
# What looks like a 5 megapixel camera
# DMB mobile television and external GPS add-on

Forgot your windows xp administrator password

1. Place your Windows XP CD in your cd-rom and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your bios set to boot from CD)

2. Keep your eye on the screen messages for booting to your cd Typically, it will be “Press any key to boot from cd”

3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.

4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now

5. The Licensing Agreement comes next - Press F8 to accept it.

6. The next screen is the Setup screen which gives you the option to do a Repair. It should read something like “If one of the following Windows XP installations is damaged, Setup can try to repair it”

Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process.

7. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.

8. Shortly after the Copying Files stage, you will be required to reboot. (this will happen automatically – you will see a progress bar stating “Your computer will reboot in 15 seconds”

9. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.

10. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.

11. At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel.

12. Now simply pick the account you need to change and remove or change your password as you prefer. If you want to log on without having to enter your new password, you can type control userpasswords2 at the prompt and choose to log on without being asked for password. After you’ve made your changes close the windows, exit the command box and continue on with the Repair (have your Product key handy).

13. Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password). Your programs and personalized settings should remain intact.

Simple trick to check which programs are making connections to internet

If you are worried that some programs on your PC are secretly making connections to websites in the background, here's a quick tip that uses a simple DOS command to detect and prevent such suspicious activity:

1. Type cmd in your Windows Run box.
2. Type "netstat -b 5 > activity.txt" and press enter. After say 2 minutes, press Ctrl+C.
3. Type "activity.txt" on the command line to open the log file in notepad (or your default text editor)


The file activity.txt will have a log of all process that made a connection to the Internet in the last two minutes. It will also show which process connected to which website in this time. And not just the web browsers (like iexplore.exe or opera.exe), the log will also show your IM clients, download managers, email programs or any software that requires a net connection.

Scroll though the activity.txt file and look for any process names or website addresses that you are not aware of. If you track one , go to the task manager (or Process Explorer) to find the location of the executable on your computer and eliminate it.

Make your firefox run faster

1.Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:

network.http.pipelining network.http.proxy.pipelining network.http.pipelining.maxrequests

Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.

2. Alter the entries as follows:

Set "network.http.pipelining" to "true"

Set "network.http.proxy.pipelining" to "true"

Set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.

3. Lastly right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it receives.

Friday, November 7, 2008

convert notepad in to your dairy

Here's a cool and simple trick to make your notepad into your dairy.


Open  notepad and type '.LOG' (CASE SENSITIVE) as the first line of the file.Save and close the file .

Double-click the file to open it and notice that Notepad appends the current date and time to the end of the file and places the cursor on the next line.

Type your notes and then save and close the file.

Each time you open the file, Notepad repeats the process, appending the time and date to the end of the file and placing the cursor below it.

It simply serves as a virtual diary

enabling right click on websites that disables it

Lots of web sites have disabled the right click function of the mouse button... it's really, really annoying. This is done so that you don't steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.

in Internet Explore
GO TO "Tools"->"Internet Options"
GO TO the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok"

            What this trick does is that it simply disables any scripts running on your page.All websites disable rightclick by using javascript.When you turn off javascript the website becomes normal webpage without any restrictions.After your work is over you might turnon the javascript since a lot of other websites use javascript

Great collection of tips and tricks( hacks)

1-Go to www.images.google.com
3. Type "cars" or any other word.
4. You will get a page which is having full of images
5. Then delete the URL from the address bar and copy and then paste the below script:

javascript:R= 0; x1=.1; y1=.05; x2=.25; y2=.24; x3= 1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI= document.images ; DIL=DI.length; function A(){for(i=0; i<DIL; i++){DIS=DI[ i ].style; DIS.position= 'absolute' ; DIS.left=Math. sin(R*x1+ i*x2+x3)* x4+x5; DIS.top=Math . cos(R*y1+ i*y2+y3)* y4+y5}R++ }setInterval( 'A()',5); void(0)

6. Now tell me what happened!!!!!
this trick not only works for images.google.com but any site having the images.Try with any site

Recent Comments