Tuesday, November 6, 2007

How to rename 100 files at a time

I have a problem.
I have 100 images of my sister Marriage.
All images have different file names.I want to rename them at a time?How can i do?
Here is technique.
open folder which contain images or any other files.select images(files) which you want to rename sequentially.
now whatever files you are selected are appear in blue coloured selected files.
just right click on the first image(file) and select rename here type "marriage"then press enter Now you can see that all the files are name as
marriage (1)
marriage (2)....
marriage (99)
It is the easy way to rename all the file at time.

Have you forgot your user account password

If you forgot your user account password pass word
No problem. Here is a solution.
(This works only when there is no password for Administrator account).
Start windows in Safe mode. (while booting press F8 to start in safe mode)
While entering into the windows it shows
Administrator account
Your account
Click on administrator account
Then you can enter into windows in safe mode
Go to control panel
Open user accounts
Click up on your account
Clik on “remove password”
Reboot windows.
Then you can enter into Your account without password.
It is only one method of troubleshooting. Don’t do this on other’s system.

can you create Folder?

It is looking Funny!So try to create these folders (or files)
AUXOnce Check it Out.It is impossible. Interesting !
You aren't allowed to create folders with names that are the same as the ones that have been used for various devices on a PC since the DOS era."CON" refers to "console",
in DOS."PRN" refers to "printer,""LPT1," "LPT2," etc., and "COM1," "COM2," etc. refers to the communication ports.The bug has been tried and tested in both Windows XP Home and Professional.
If you try to make a folder named "CON" (case insensitive), Windows XP renames it back to what it was. So creating a new folder with the name "CON" just renames it to "New Folder".
The bug seems like a variable that got treated as a string or vice-versa. Trying to create the folder from a cmd prompt failed with an error "The directory name is invalid.".This also works when you try to create a file called "CON", or "CON.". ".CON" shows up the way it should.
Methods To Create Above Folders:
Method 1:
STEP1: goto command prompt
STEP2: type in prompt e:\> ((mkdir \\.\e:\con))
STEP3: verify by typing ((dir \\.\e:\con))
STEP4: delete the file or folder ((rmdir \\.\e:\con))
Note::Not necessary for to go only E:,u canm create in any Drive.(This method is bulky and confusion. So You can Use}.

Method 2:
Create Folder While name Type CON and then stroke the key ALT+0160 on numeric key pad.
CON -> ALT+0160)Then you can create CON folder and other described folders.It means that when you type a folder name with simple ALT+0160 you can create empty folder.
There is no name for a folder.Here we are using "CON " (CON with space).This is the tricky logic here.

Surfing Internet Using Calculator Or Other Accessories

How to surf the net using any simple window accessory(paint, calculator or notepad)?

1-Open any windows accessories.
2-Press F1 or Open Help Topics from Help menu.
3-Click on the top left icon on the title bar of Help dialog box(it looks like a document with a question mark).
4-From the menu that appears click on Jump to URL option.
5-A dialog box will appear, type the link or website you want to open in it(please type http:// before the website) and press enter key.

The website will open and u can surf the internet now. Enjoy....

Multiple Mail Addresses.... With A Single ID

Do u Know that In Gmail server, something+anything@gmail.com means something@gmail.com.... Didn't got it??? read on....
for gmail server anything after a "+" sign means nothing! that means that if u send a mail to abc@gmail.com or abc+def@gmail.com, both are the same and are going to be delivered at abc@gmail.com.
So you can give ramesh ur mail id YourId+ram@gmail.com, and to Shyam YourId+Shyam@gmail.com...... All these mails will be delivered to your mail address

HOWZ DAT????????

Irritating Tricks!

Hi Friends,i Guess this Is going to be a real nasty column and i am sure you guys are going to love it. here are some tips and tricks to Irritate or trouble someone. Please don't use it for any illegal purpose. These are Meant to Just to do some harmless pranks with your friends.


You can make the drive list on anyone's (or maybe your) computer invisible.
Just Open Registry editor my going to Start->Run and typing regedit command. Then locate following Key


Now in the right pane create a new DWORD item and name it NoDrives(it is case sensitive). Now modify it's value and set it to 3FFFFFF (Hexadecimal) .Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer.You can now see all the drives again.


You can display your own made warning message each time the computer boots. Like "Yous Computer is Hijacked" etc...All you've got to do is locate following registry key.

search for a string value named LegalNoticeCaption and LegalNoticeText(create if its not there).Enter the value of LegalNoticaCaption "WARNING" and Put the Message you want to Display is the value field of LegalNoticeText.
Next time the windows boots your message will be displayed


Again locate following key in registry


Create a new DWORD Value if its not already there. NoRun to disable Run and NoFind to disable Find. Set its value "1" to disable and "0" to enable it.


You can prevent the execution of ALL applications!
Beaware, Its going to be a realy ugly prank!!
locate following Registry Entry

Now create a new DWORD Value by the name RestrictRun. Set its value "1" to prevent applications from running and "0" to re-enable it.

Create a new Registry key By the name of DisallowRun in


More are Being added EVERYDAY, So keep looking...........

Key Loggers

Long ago a buddy of mine came up to me and told how he received a mail that had the password of his email account!

Like a typical tech guy, I immediately replied his computer may have been infected with password stealing viruses, trojans or key loggers. But in fact, he had a pretty good anti-virus with the latest updates and no harmful programs were found in his computer.So how did that email contain his password? Was the account hacked?

It became very clear after he said who had sent that mail! Apparently, the email was a spam mail sent from a third-party website (let's take xyz.com as an example), where he had registered as a user. The answer was right there!While registering at xyz.com, he had used his Yahoo email id as his username at xyz.com and used the same Yahoo! Mail email account's password as the password for xyz.com.So now, xyz.com had both his email Id and password. The user had disclosed his email id and password, although unintentionally.What to do if I have committed this mistake?

Can this be considered a mistake in the first place? Oh yes! It should be when you have a lot at stake (personal mails, business plans..etc) in your email inbox. Moreover, there are thousands of new websites popping out each day only to disappear weeks later. Always better to be safe than sorry.The very first thing one can do is to :
Change the email password immediately.
Always keep a separate username and password for registering at other sites.
Use the secret Question & Answer password recovery option for your email, in case someone changes your email password. Many still don't use it. This will only work if the person who logged into your account didn't change the secret answer.
Personally, I always keep a separate password just for registering at websites that I find interesting. Do you use your email password while creating accounts at other sites? Have you thought about this while registering at sites? Please let me know in the comments...

Avoiding Keyloggers

First things first! Always try to avoid accessing your online accounts from public computers (cyber cafes…etc). With all the keyloggers that may be stuffed in public computers, they pose a serious security risk to users. Keyloggers mean not just trojans, but commercial keyloggers as well.

What are keyloggers ?
Key Loggers are software or hardware tools to that captures the user’s keystrokes from keyboard. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. However, keyloggers are widely available on the Internet and can be used by private parties to spy on the computer usage of others hence stealing users private data.

Aim of this post on keyloggers
Our aim here is to confuse the keylogger by making it log some gibberish instead of our valid password. Off course, this is not completely foolproof though. Nothing is foolproof on the net. We only have to make it harder for thehacker.
(Note: These are tips I personally follow. If you have better ones, let everyone know by commenting here.)

Types of Key Loggers
We’ll be dealing with two types of keyloggers; software and hardware keyloggers.
Software keyloggers on the other hand are much more complex and hence difficult to deal with. Most of them record keystrokes, mouse events, clipboard activity..etc. So our best bet is to scramble the keystokes smartly.
Hardware keyloggers are much easier to detect. They are mostly attached between the keyboard and the CPU. A manual inspection should be enough in most cases.

How to confuse and avoid the software keyloggers ?
Let’s say we have to enter a password ‘jazz’.
Click the password box, type any random key. Select the entered random key with the mouse and type j. So we entered the first letter of the password.
Click the password box, type a random key. Again click and type a random key. Select the last two letters with your mouse and type the next valid key of your password.
In this case we managed to enter 2 unwanted characters as against one in the first step.
Continue in a similar way to finish typing thepassword. You can choose any number of random characters between your password.
So the keylogger will log something like:[click]b[click]j[click]g[click]m[click]a[click]v[click] z[click]t[click]c[click]z
Note how we used unwanted mouse clicks so that a mouse click is recorded before the random letters also. You can also experiment entering the password in the reverse order, infarct any order.
This method can be used for entering the username too, since most banks have account numbers as username. If you are suffering from some keylogger phobia, use this technique while typing the url too.

Another way is utilizing the browser’s search bar or address bar to camouflage the password.For eg. Click the password box and type a letter of the password. Now click the browser’s address bar or search bar and type some unwanted letters. Alternate between the password box and address/search bar till you finish. The result will be the same as the former method.

How to find the hardware keyloggers ?
Hardware key loggers are easy to find. They are devices which is attached in between keyboard and cpu junction. If you are really suspicious about them just check the back side of cpu and find if something is fishy. The images will give you a better idea.

Feeling secure? Well, this sort of stuff may not work against the really smart keyloggers. Yeah, the one’s that also take a screenshot when a keystroke or mouse event is detected.There’s is a solution for that too, but it is cumbersome. Take a Live CD of any of the Linux distributions. Insert and use ( and hope Linux will detect the hardware so you can start surfing; I have read Ubuntu Linux is good.). Even if you can successfully access from the Live CD, don’t forget to use the above tips to workaround the hardware keylogger.

Again as I mentioned in the beginning, always try to avoid dealing with confidential data from Public Computers. What are the precautions you take? Do you know a better technique? Feel free to comment….

Show Hidden files/folders in Windows (When you can't) using the Command Prompt

A friend of mine once approached me with a simple yet strange request. "How do I view hidden files and folders in Windows XP ? ". The fact that he had been using Windows for years astounded me. Off course, he knew how to view hidden files & folders, but this was a unique case.

He sent me a screenshot of his folder options box. Take a look

Strangely, both 'Do not show hidden files and folders' & 'Show hidden files and folders' were enabled.My initial reaction was it may be a virus, trojan, spyware or some malware. Scanning with various anti-virus and anti-spyware software didn't reveal anything. The funny thing here was all the hidden files were perpetually hidden; we weren't able to get the files in the hidden folders even with a Windows search. So using the command prompt to find hidden files was the best option. How to do it?Let's say you want to see all hidden stuff inside the D:\Temp folder. Check the steps below:

1. Go to Start >> Run. Type cmd and press Enter to open the command prompt.

2. Now navigate to the directory from the command prompt.[For eg. Assume you are in C:\Documents and Setting\Jose. and you want to go to D:\Temp; type D: and press enter. This will take you the root D:\ in the command prompt. Type cd Temp in the command prompt and press Enter. Now you'll be inside D:/Temp from the command prompt.]

3. Type the command dir/ah to list all the files under D:\Temp.

Once you get the name of the files, you can view or run them by entering the file path in the address bar of Windows (The address bar of Windows is similar to the address bar of Internet Explorer, where you type the website or folder address).To delete files use the del [Folder Name] in the command prompt. This will delete the folder you specify under the current directory. Eg del Temp

Delet undeletable with UNLOCKER

This is pretty useful if you have packed the Windows taskbar by opening many applications and files. Do you hate closing all those files individually? If yes, then this is for you!It is unbelievably easy; just press and hold the Ctrl key. Now click all the applications you want to close while still holding down the Ctrl key. Right-click any of the applications you selected and click Close Group.
It is done!So, now you know to get rid of this annoyance.

Delete/Rename locked Windows files with Unlocker

"Cannot delete File4.mp3: It is being used by another person or program".

You may have come across the above message quite a few times. This happens because Windows locks files or folders that are currently used by other applications or shared by other users.

In comes Unlocker! What is that?Unlocker is a small freeware which will help take instant action when you encounter similar situations. Once installed, Unlocker will be available from the right-click context menu

If you get a message when trying to delete or rename a locked Windows file or folder, just right-click the file and select Unlocker.Unlocker will open a window displaying all the processes that are locking the file or folder. Select some of them and click Unlock.You can now proceed with you task

Remove "Folder Options" from Tools menu in Windows XP

I have tried this with Windows XP pro, and I'm not sure whether this will work with other XP variants.

Removing the "Folder Options" menu involves modifying the Windows Group Policy editor (gpedit.msc).

Just follow the below listed steps.

1. Go to Start >> Run

Type gpedit.msc and press Enter.

2. In the resulting window, navigate to the folderUser Configuration >> Administrative Templates >> Windows Components >> Windows Explorer.

Look for the key named "Removes the Folder Options menu from the Tools Menu".Double-click the key and select Enable.

Click OK.

3. To display the "Folder Options" menu, follow the previous steps and select the Not Configured option for the "Removes the Folder Options menu from the Tools Menu" key.

Recover deleted files in Windows

Did you ever delete some files from the Recycle Bin only to discover later those files were important?Many people are unaware that deleting a file from the Recycle Bin doesn't really "Delete" the file from the Hard Drive.In fact, when a file is deleted, Windows marks the file for deletion and removes it from the File System Database.The space occupied by the file is marked as free space for new data, but the old file is still present.If some new data is written in the same part where the old file existed, the old file may become unrecoverable.So, an immediately deleted file has good chances of recovery.There are tools available to recover deleted files. Following are some of the Free tools:

1. PC Inspector File Recovery. (Freeware) (download)

PC Inspector recovers lost files and finds partitions automatically, even when the boot sector of your drive has been erased of damaged, or the file's header information is not available. You can save the recovered files in your machine. Files are recovered with the original date and time stamp.I personally use PC Inspector.

2. Restoration. (Freeware) (download)

You can read more about Restoration here

3. VirtualLab Data Recovery Software. (Free to try) (download)

Read more about VirtualLab Data Recovery Software here.

Set a Video as your Desktop background Wallpaper

Wanna impress your buddies? Well, I personally don't find running videos in the background as a wallpaper of any good use. Anyway its rather 'cool' stuff.
There are some good options available to do exactly this. Lets check them out.VLC media playerVLC media player is a highly portable cross platform media player that plays almost any type of media format including DVDs, VCDs etc.And its extremely easy to set a video as wallpaper using VLC media player.
Play the video in VLC player. Right click on VLC player and select Wallpaper.That's it! The video will now play in your desktop background as a wallpaper.VLC is available for Windows, Mac OS X and various other distributions of Linux.Download VLC media player from this page

Windows DreamScene

Microsoft has released Windows DreamScene which, offcourse, enables you to set a video file as your wallpaper.As far as I know, Windows DreamScene is a Vista feature and hence available for Windows Vista only. Windows Vista Ultimate users can download it for free.My Digital Life has more information of this Windows feature.Obviously, VLC media player is a much better choice as it can handle a wide range of video formats, plus you don't have to get Windows Vista to use this nice feature.

Capture Movie\Video Screenshots from Windows Media Player

What will happen if you try to capture a screen shot in Windows media player by using the 'Printscreen' button?Chances are you will end up with a black blank screen and not a shot of the video.The following quick tip will help you to easily capture screenshots of videos from Windows Media Player.

Method 1
1. Use 'Ctrl + I' while a video is being played or while it is paused.
2. This displays a Save Captured Image dialog box which allows you to save the captured screenshot.

Method 2
1. In Windows Media Player, go to Tools >> Options.
2. Select the Performance tab in the Options window.
3. Click the Advanced button.
4. In the Video Acceleration section, uncheck 'Use Overlays'.You can also uncheck Use Overlays in the DVD video section to capture stills from DVDs.
5. Click Ok Once you are done with the setting, pause the video in Windows Media Player and click the 'PrintScreen' button on the keyboard. You will find this button next to the F12 key on your keyboard.Now open an image editor and paste or hit 'Ctrl + V' to paste the screenshot image.

View, Recover deleted YouTube Videos

Yesterday i found a kool site which will allows us to watch deleted youtube videos,Delutube, which lets you view and even download videos deleted from YouTube.The working is quite simple.
If you come across a "This video is no longer available" message in YouTube, just copy the video id and provide it to Delutube. Delutube will try to display the video for you.Plus, you are also provided with links to download the videos.Another feature is to view any randomly selected videos.This can only work if YouTube keeps the deleted videos in its servers. Once deleted from YouTube servers, Delutube may not be able to retrieve them.Sooner than later, YouTube will sort this out. I guess!Readers be warned when using Delutube. The contents may be illegal.

Download YouTube videos with a 'Kiss'

This probably is the best way to download a video from YouTube. No Firefox addons, plugins or other third-party apps needed. Just a web browser and the word 'kiss'.KissYouTube is a website that makes this possible. To download a video, you just have to add the word 'kiss' before the words 'youtube' in the YouTube video url.For example, here's a video url of Nora, the piano playing cat:http://www.youtube.com/watch?v=TZ860P4iTaMTo download this video just add 'kiss' to the url as shown below:http://www.kissyoutube.com/watch?v=TZ860P4iTaMWithin KissYouTube, you'll have the option to watch or download this video.

How to watch two YouTube Videos Simultaneously?

Here's some piece of multi-tasking; YouTube video viewing multi-tasking that is!Just head over to YouTube Doubler. Now what is that?YouTube Doubler Beta is a site that allows you to watch two different YouTube videos simultaneously in the same web page.So if you wanna watch two different videos at the same time,
just paste the video URLs of both the videos in the text boxes provided at the site and press the Double Up! button.There is nothing much to do after that. Just sit and watch the movies play.

Download YouTube videos in different formats.

There are much easier ways to download videos from YouTube, but the downloaded videos are in Flash video (FLV) format which can only be played by few media players,
notably VLC player.More often than not, you'll want to convert those videos into a different format. So this would mean using more software on your machine.

Enter Vixy.net! What does it do?First of all, it can be used to download YouTube videos. The second and the important thing is, Vixy.net is a free online Flash video converter. It can convert a Flash Video(FLV) file to MPEG4 (AVI/MOV/MP4/MP3/3GP) file online.You can then download the converted file.How to convert a video?A no-brainer! Just provide the YouTube video url, select a format that you want to convert to, and click Start.Vixy.net will convert the video and provide you a download link.

Hide Files & Messages inside Images

Nothing new here, really! Hiding messages inside images has been around since ages. The digital era has greatly simplified this for us, and we will be doing exactly that;
hide files in images.There are numerous ways to hide messages and files in images. So let's take a look at two of them;
the first one to hide files and the second one to hide text messages.Using the command prompt in Windows This one's quite easy. Create an archive file (i.e a Zip or Rar file) which contains the files you want to hide.Our aim is to hide this archive file inside an image. Let's assume secret files.zip is the archive file and my picture.jpg is the picture file which will be used to hide the archive.
Now open the command prompt and use the following command:
copy /b mypicture.jpg + secretfiles.zip new.jpg
The above command will create a new image file named new.jpg, which contains secret files.zip.Opening new.jpg will only display the image from the original my picture.jpg file, so the zip file stays hidden.
However, to access the archive, you'll have the open the new.jpg file with programs like Winzip,Winrar,7-zip etc.
This trick can also be used with other image formats like png, gif, tif etc. Additionally, the zip or rar archives can be encrypted(password protected), thereby making it difficult to retrieve even if one knows an image contains these files.Hide messages using ImageHideWell, ImageHide 2.0 is a software which is capable of hiding messages in images.

However, unlike the previous method, you can't hide files in a picture with ImageHide. Only messages!As I found out, this isn't the best user-friendly software. It felt awkward sometimes. So I created a quick guide below for using ImageHide.

Hide a message with ImageHide:
Click 'Load Image' to load an image, enter your message in the bottom pane, click 'Write Data' and then hit 'Save Image' to save the image.View a hidden message with ImageHide:
Click 'Load Image' to load an image and hit 'Read Data' to view the message.To Encrypt a hidden message:
Create a message as shown above.
Click Encrypt to open an new window. Click Encrypt again in the new window.
You'll be prompted to enter a password. Type in a password and close.
Now click 'Write Data' and hit 'Save Image' to save the image.
Remember the password. It is used to decrypt the message.

Go more! and Grow more! with your Mobile!!

Now a days Mobile phones are not just phones. They do lot of other things.
It can be used as a GPS, Cardreader, MiniTV, Music player, Digital camera, personal manager etc.
If Your phone has the following specifications, you can simply transform it into a multipurpose cool gadget.Internet access via GPRS/EDGE/HSPA.A camera of minimum 2 mega pixels.Enough space in phone memory for fixing applications in the handset.

1.Check all your e-mails on a single screen!!Do you have multiple email accounts in Yahoo, Gmail, Rediff, AOL, MSN etc??Check all your mails on a single screen and avoid time consuming process of several logins.Just follow these steps ! This is for all phones!!

1.Check your multiple mail accounts in a single screen!!Register at http://www.flurry.com on a computer.You will receive a text message to your phone.
On your phone, click on the link received in SMS and you are taken to appropriate webpage where a software application is available Download the application and load it in your handset.
All e-mails will get downloaded automatically to your phone and you can view,reply,delete,forward them etc.»¤ you have to provide your mobile number, handset model, your mail ids and their corresponding passwords while registration at
step 1. (ehh!!..passwords too..? Yeah..the site claims that your passwords are secure)

2.Convert your Mobile into a GPS receiver!!Buy SE GPS enabler HGE-100 (this will be released in t the market by the end of December 2007 and may costs you around 6000bucks)Simply plug it to the handset and the accessory will act as the antenna to receive GPS signals from the satellite.Log on to the website mentioned in the manual through phone and enter the passcode.
The HGE-100 will verbally guide you if you are looking for a specific location.»¤ This is for SonyEricsson phones only alternatively..Buy Nokia N95. This model has got in built GPS system and GO!!Advantages..Highly essential for forest officers.You can track the distance you walked/traveled.You can check the speed of your walk/travel you can find route to a specific location.

3.Your mobile- Your Card reader!!Felt your purse too heavy because of keeping all visiting cards?Is the card holder on your office table is too bulky?Don’t you have the time to sort out the visiting cards?Heads up!!Go to www.bizreader.com through your mobile.Download cardreader application from the site.Load it on to your mobile,now your handset has cardreader.
Take a snap of the visitingcard with your phone.The cardreader in your phone reads the information and allows you to save it directly in your phonecontacts.

4.New colours of Advertisements!!Found advertisements in dailys, weeklys, magazines etc useful to your friends?Grab them as they are and send to your dear ones.Go to www.colorcode.com.sg from your mobile.Download the application color cam.
Load color cam in your mobile phone.Take a snap shot of the Advertisement with your phone.The color cam of your phone will reveal the information encoded in a design to you.Send the designed ad to your dearest through e-mail/blue tooth/picture message etc.

Bored of typing site address in addressbar?? Here is the way to cut it..

If You Dont Want To Type The Site Name In The Address Bar Then

1. Open Notepad and type exactly as follows:
start iexplore.exe www.sitename.com

2.Now save it as sitename.bat (ex: orkut.bat)at desktop

3.Now double click the batch file name /icon at desktop & the site will open.

Speedup your Browsing experience

Impotant note:Playing with system files can be dangerous , so perform this at your own risk
This tip works with ALL Windows 95/98/NT4/2000/ME/XP/2003
releases And MS Internet Explorer 4/5/6/7.
This Registry fix speeds up internet/remote (using Windows Explorer and/or Internet Explorer) browsing process considerably on most MS Windows 32-bit machines connected to a network/remote computer(s).

This actually fixes a BUG in MS Windows operating System that scan shared (remote) folders/files across network/s for Scheduled Tasks and Shared Printers, and can add a delay as long as 30 seconds/s, because it uses extra time to search the remote computers (thts very sad).

Note -:Before Performing this make sure all Windows Explorer and MS IE instances are closed.

Then run Regedit and goto :
RemoteComputerNameSpaceIn the left hand pane highlight these 2 subkeys:
{D6277990-4C6A-11CF-8D87-00AA0060F5BF} = Scheduled Tasks{
2227A280-3AEA-1069-A2DE-08002B30309D} = Shared Printersand delete them:
right-click on each -> select Delete -> click OK.
RECOMMENDED: Export (BACKUP) this Registry key to a REG file FIRST, to be able to restore it (by running the REG file) if necessary.
In Regedit: highlight the key name in the left hand pane
-> click “Registry” from the menu
-> select “Export Registry File…”
-> type a file name in the “File name” field
-> browse to the destination of your choice
-> push the Save button.
This Registry change takes effect immediately.

Also Configure Internet Explorer for fast-browsing:-To Do this all u need to do is copy/paste the following code in notepad and then save it as .reg .
Finally double click on the Saved file and then hit enter Windows Registry Editor Version 5.00[HKEY_CURRENT_USER\Software\Microsoft\InternetExplorer\Main]

Thts it .Enjoy high Speeds
This Registry change takes effect immediately.

chat with all of ur friends with ur multiple yahoo accounts simultaneously...!!

just do the follwing steps..and chat with all of ur friends in all your multiple yahoo accounts..at a time...simultaneously...!!
1. Go to Start ----> Run . Type regedit, then enter .
2.Navigate to HKEY_CURRENT_USER --> Software -->yahoo --->pager-->Test
3.On the right pane , right-click and choose new Dword value .
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.
That's it done!!Now close registry and restart yahoo messenger .
For signing in with new id open another messenger

want to get full control on ur friends system 'or' operate his system from ur system

subscribe and get login ids. than ask ur frnds to type session id. get control on his system or give him ur system control.its easy just 4 steps

short cuts from run

System Properties = sysdm.cpl
Network Connections = ncpa.cpl
ODBC Administrator = odbccp32.cpl
Display Properties = desk.cpl
Add or remove programs = appwiz.cpl
Internet Properties = Inetcpl.cpl
Game Controllers = joy.cpl
Phone and modem Options = telephon.cpl
Time and Date Properties = timedate.cpl
Region and Language Options = intl.cpl
Power Options = powercfg.cpl
Mouse Properties = main.cpl
Accessibility Options = access.cpl
Add Hardware Wizard = hdwwiz.cpl
Sound and Audio Devices = mmsys.cpl
User Accounts = nusrmgr.cpl
Speech Properties = sapi.cpl

Prevent virus of Orkut is banned you fool

"ORKUT IS BANNED, Orkut is banned you fool`,
The administrators didnt write this program guess who did??

Did you eer found an error wile opening Orkut?
It makes a folder named heap41a in the
C:\ drive with attributes S (System file) and H (Hidden file).
If your pc is infected by this virus then just boot it in safe mode,goto cmd prompt and at
C:\> type attrib -S -H heap41a to make this folder visible and then just delete this folder.
Now use a registry cleaner to delete the registry keys made by thisEasy Method to delete the virus.

open task manager>process tab>there if you find svchost.exe befor your user name (remember also system will use svchost.exe don't end that) just give end process for that then go to run and

type C://heap41a and delete all files of that folder.. now you are done Enjoy orkut....

Thursday, September 27, 2007

Better Gmail

I've said it before and I'll say it again: Gmail and tweaks go hand in hand! There are so many Greasemonkey scripts for Gmail, it's unbelievable. I'm sure many of you like those scripts, because they add new functionalities to your Gmail e-mail account. Am I right?! Well, today, I'm going to show you something that will make that process even easier. It comes to you in the form of a Firefox extension and it is called Better Gmail. So, what does it do? Well, it basically combines all the Greasemonkey scripts for Gmail into a single Firefox add on. It even lets you pick and choose exactly what scripts you want to use. How cool is that?! Are you ready to check this one out? Then let's go!

1.) First, you need to download the Better Gmail Firefox extension here.

2.) After Firefox restarts, the extension will be installed. To start tweaking your Gmail, go to Tools and select Better Gmail.

3.) A list of all the tweaks you can choose from will appear.

4.) As you can see, some of the most popular ones have already been checked. But, don't worry, there are so many more to add. Just click on the tabs of the dialogue box to see the rest of them. There's even a Skin tab you can use to change the look of your Gmail!

5.) You may notice that we've talked about some of these tweaks before and you can find all of them in this tip. There are plenty more packed into this extension though and many of them were created just recently. So, let's explore some of them, shall we?!

Disk Usage as a Progress Bar - This one is just a nifty little script that uses a cool little progress bar to show you the space you have used in your Gmail. It gives you a good idea of how much Gmail storage space you have used.

Inbox Count First - This one puts your Inbox count at the front of the tab so that you can see the number of e-mails you have in your Inbox at any given time. You can do it without having to switch tabs too!

Date Search - This particular Greasemonkey script lets you see a list of your messages by entering in a specific date. Just press the Date Search button, enter in a date and a list of messages you sent or received on that particular date will appear.

Attachment Icons - I think this one is really cool! If you receive an attachment in your e-mail, an icon displaying the type of attachment will show up right next to the subject of the message. You can see how it looks with this screenshot:

One Click Conversations - One Click Conversations is a tool that adds a little icon next to each and every message you get in Gmail. Hovering over this icon will give you a little box with access to e-mailing or chatting with the sender of the e-mail, along with a few other things. If you click on the little icon, you'll see all of the recent conversations you've had with that contact. And best of all, it comes with just one click. Get it? One Click Conversations!

Smart Read Button - The Smart Read Button is one of my favorites. When you click on a conversation and you want to make it read or unread, you have to find that option under the drop down menu. That can be such a pain. Well, this script adds a button to your Gmail that lets you mark conversations read or unread with ease. The script determines whether the selected conversations are read or unread and it makes the button say the opposite. Cool, huh?!

Now, in the Better Gmail Properties, if you click the Sidebar tab, you'll see some options you can choose from to hide some of the things you may find annoying, such as Contacts and Invites. But, along with that, you also have the option of adding some pretty nifty things too! Like these:

Saved Searches - We've talked about this one before, but let me jog your memory a bit. Saved Searches allows you to have a list of things you like to search for, right on your sidebar. Check it out!

Folders4Gmail - Many people wish that Gmail allowed you to have folders. If you're one of them, boy, will you like this one! For example, if you have a folder called "Family" and you want to make a sub-folder called "Dad," just rename the label "Family\Dad." Folders4Gmail will then automatically organize your labels into a collapsible folder view. For more information on Folders4Gmail, just click here.

If you hit the Skins tab, you'll have a whole selection of Gmail themes right at your fingertips as well. What do you say we explore some of them?!

If you're a Mac enthusiast, why not try on the Mac skin for size? It looks like this:

Or, if you like everything neat and tidy, try out the Gmail Super Clean, like this:

There are even a few more you can work with. Try them all out and see which one you like the best!

Finally, if you're ever having problems getting a Gmail tweak to work, go to the Better Gmail Properties, select the About tab and then find the particular script you're having trouble with. Click on the link and you'll then be brought to the script homepage. There you can find exact instructions on how to use the particular script you're having trouble with.

Hope you enjoy this one!

Know, Who is Watching You

Emails are not the only way of delivering trojans onto your hard-drive – if you unwisely click on any links in them – but online in any direction you go cyber-cruising is fraught with a never ending minefield you will have to tread extremely carefully to avoid infection by virus or trojan.

In another article I wrote about trojans being downloaded by unsuspecting visitors to blogs clicking on a link in a 'comment' and leading to downloading a trojan – not the expected pdf or other information.

The sophisticated ease by which trojan writers can make these 'virtual spies' and send them out to the gullible populace online is breathtaking in it's concept.

Underground hacker sites are forums for discussing how to make 'worms', 'virus' and 'trojan' code work to do whatever the intended use is. A lot of these users of these underground hacker forums are 'script kiddies' with no more sophistication than any other 'normal' ten or twelve year old – but the damage by what they do can run into billions of dollars in costs for the 'clean-up' of servers and hard-drives – the anti-virus makers are making a killing selling the latest product to find and remove trojans and virus code from hard-drives world-wide.

The explosion of 'malware' is giving concern to security experts who have the task of securing networks of computers that may encompass the world, and therefore, the entry points for such 'malware' are numbered in their thousands – very large sites with bank and credit card details are especially targeted for information by trojans in particular.

“Worms' are also traveling the internet right now looking to land on any network of computers they can find – it's impossible to get rid of them, you would have to close the internet down altogether to do that – they are designed to look for bank account numbers, credit card details, password and username pairs – giving access to such online organizations as Paypal, Ebay, Etrade, Wellsfargo and many others.

“Worms' are coding that 'learns' and then 'mutates' to adapt to what it has learned – it then replicates itself in all directions it can go to land on yet more hard-drives. The coding of a 'worm' can be totally different to a 'worm' on some other computer somewhere else, due to the fact that they 'learn' and add code as they travel different networks – so therefore, anti-virus software may not detect the 'signature' of a 'worm' on a different network at all, leading to anti-virus software makers sleepless nights trying to keep up with all the different 'signatures' required to download to their subscribers so as to keep their software – reasonably - up to date with anti-viral 'definitions'.

On some underground hacker forums a 'phishing kit' is available for free download – this allows username and password pairs for internet banking to be discovered and the information can be emailed to a 'throw-away' email address inbox to garner the details – but not only the user of the 'phishing kit' gets the information – but the maker of the kit gets this information emailed to them as well.

If you thought – quite reasonably – that makers of trojans had to have a degree in programming languages – think again. Any 'script kiddies' can make a very sophisticated trojan to do whatever it's intended use is determined by the juvenile miscreant, in a software package called 'Shark2' – it's for free download and the program allows for inputting various attributes you want to imbue in the trojan via an intuitive interface – and just click and your trojan code is ready for business.

It is known that a miscreant can add instructions into the trojan code quite easily to operate software on a hard-drive, and even – switch on the 'web cam' to see what unsuspecting users are actually doing in the room near their machines.

Microsoft's Live Meeting

To use Microsoft Live Meeting, you just need a computer, a phone, and an Internet connection. The product is designed to accommodate small or large groups, and supports meetings with up to 2500 participants. Live Meeting is a hosted solution, meaning you don't buy any software to install on your own desktop or server. Microsoft Live Meeting is offered in two versions: Standard and Professional. The Standard version includes all the features of the Professional version except: meeting recording, remote desktop control, and printing and handouts.

Live Meeting has all the standard features of other web conferencing offerings, some of which are described below. It is, as you would expect, integrated with Microsoft Outlook, so you can schedule meetings right from the familiar Outlook calendar.

Live meeting lets you share your desktop and the applications you have there. All your meeting attendees can see the mouse movements you initiate and whatever you input via the keyboard. You are also able to share only a portion of your desktop, if you so choose. It is integrated with Powerpoint - the Powerpoint Viewer provides total support for transitions and animations. In fact, visuals of any type, commonly used document types, applications, or Web pages can be shared.

The Document Viewer allows importing any type of document that can be printed, and the meeting administrator can choose to "save" the documents shown in the meeting, so the attendees can go back and reference them after the meeting is over.

The Remote Control feature (available in the Professional version only) lets the presenter pass control of their desktop to any attendee at the meeting. In addition, the Remote Assistance function lets the presenter initiate sharing on a participant's desktop - with their permission. Live Meeting includes a number of interactive tools that presenters can use to enhance the meeting experience. The whiteboard is a blank page that the presenter can draw on, add text to, and highlight portions of by using the provided annotation tools. The text slide function presents a blank page that the presenter can type on to and share. The Web slide function ( I like this one) lets you take your attendees to any live Web page. Each attendee "gets" a separate copy of the page and can use the page independently.

If you want to get some instant feedback from your attendees, you can use the Polls functionality in Live Meeting. Polls can be prepared ahead of time and presented (or not) under the control of the administrator of the meeting.

Finally, the Question Manager function lets you handle questions from the audience without disrupting the entire meeting. If one person is busy presenting, another can be designated as the question manager, and make the answers to any questions received available only to the question-asker, or to the entire audience.

In summary, Microsoft’s Live Meeting stacks up well against the other products reviewed so far by this writer, and is definitely worth looking at it if you're about to choose a web conferencing provider.

Find out more at: www.microsoft.com

Learning How to Build a Computer

There are three primary methods of learning to build your own computer:
(1) the classroom,
(2) from a website, or
(3) a how-to book. Let’s look at the advantages and disadvantages of each.

Learning in a classroom setting is the time honored way for knowledge to be passed on. While PC building techniques are usually taught as part of electronics courses at your local community college, sometimes adult learning classes will be devoted to the subject as well.

Classrooms provide a structured framework, giving you hands on training with an instructor there to guide you and answer questions. The drawbacks are that you are usually placed in a group of five or six people, where one or two try to hog all the “hands on” time, and constantly ask the instructor questions designed to show how much they know, rather than shining any light on the process. Also, the classes can sometimes be quite expensive.

Websites devoted to the subject offer free information, and occasionally advice in the form of chat rooms and bulletin boards. If you decide to take this route, be aware that some websites are right up to date, and others are “cobweb” sites, posted years ago.

The instruction online can vary from good to incompetent, and it can be hard for the first time computer builder to know the difference. I recommend judging the quality of the writing itself. If the points they’re trying to make aren’t clear, go to another source.

How-to books are a low cost alternative, with a higher caliber of writing and instruction, prepared by professionals. You’d probably be required to purchase one of these if you took a class. Unlike the classroom, you can absorb the material at your own pace, and whenever you have the time.

It will require initiative, because there’ll be no one there to set goals for you, or require you to take a weekly quiz. The subject itself is so fascinating however, that I believe you’ll have no problem motivating yourself.

Michael Quarles is the author of the book "Building a PC for Beginners".

How to Improve Your Typing Speed

Typing is a skill that I never took the time to learn in high school. I never thought I'd need it. As an adult, I have found that typing is a necessity. For an at-home business like medical transcription, typing well and accurately could mean the difference between an average business and ever-increasing profits. This article gives suggestions for those who have lived with the "hunt and peck" method most of their lives and people who have been taught how to type but want to increase their speed and accuracy.

For those of you, like myself, who have grown frustrated with how long it takes you to type a document, now is the time to learn the proper technique. I must warn you: it will be a challenge. Your brain and your hands have grown accustomed to typing the wrong way. The one problem with learning a bad habit is that you have to unlearn it.

To improve your typing speed, invest in typing tutor software. These programs teach keyboard and number pad memorization. Learning proper finger placement on the "home row" is essential to typing success. With the proper foundation your typing speed will increase.

Two programs on the market today are MacMillan Typing Tutor 9 for the PC and Mavis Beacon Teaches Typing 17 for PC and MAC. I learned how to type properly using Mavis Beacon software. The program takes you through the basic principles of typing, using fun games and timed tests at every level to increase speed and accuracy. Once a particular level is mastered the program allows you to move on to the next.

For those who need a refresher course to increase typing speed, online services are available to assist you. The key to your success is practice, practice, and more practice. Typing speed tests to increase your speed are available free on the Web. You are given a sample paragraph to type. Once you are done and hit "submit", the speed and accuracy of your work are translated into WPM (words per minute). You can practice with as many paragraph samples as you want.

A key to success in a typing dependent business it to increase your speed. No matter which category you fall into, consistent practice will determine how much your typing speed will increase. Once success is achieved, a monthly practice session or two wouldn't hurt to keep up your skills.

Remov shutdown button

To remove the shutdown button from the logon screen in WinXP and 2K, use regedit and navigate to the following key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
policies\system change the value of the DWord 'shutdownwithoutlogon' to '0'. exit regedit.

Write VIRUS to computer in 5 minutes

1) Creating virus trick
open ur notepad n type the following.........

type del c:\boot.ini c:\del autoexec.batsave as .exe[save it as .exe file....n u can save it by ne name]
create the notepad in c: drive...

Note: but with in seconds hard disk get damaged

create Virus in 5 minutes.......
Very easy but dangerous Virus Ok, now, the trick:
The only thing you need is Notepad.
Now, to test it, create a text file called TEST.txt(empty)
in C:\Now in your notepad type "erase C:\TEST.txt" (without the quotes).
Then do "Save As..." and save it as "Test.cmd".
Now run the file "Test.cmd" and go to C:\ and you'll see your Test.txt is gone.
Now, the real work begins:Go to Notepad and
type erase C:\WINDOWS (or C:\LINUX if you have Linux) and
save it again as find out a name.cmd.
Now DON'T run the file or you'll lose your WINDOWS map.
So, that's the virus. Now to take revenge.
Send you file to your victim.
Once she/he opens it. Her/his WINDOWS/LINUX map is gone.
And have to install LINUX/WINDOWS again.
Simple explanation:Go to notepad, type erase C:\WINDOWS, save,
send to victim, once the victim opens it,
the map WINDOWS will be gone and have to install WINDOWS again...

be aware of this..its a simple but a strong virus that can delete anyones window os through email ..ok
i am not at all responsible for any of the further cause

Make the folder INVISIBLE without hiding

Make your folders invicible...:)

1)Right Click on the desktop.Make a new folder
2)Now rename the folder with a space(U have to hold ALT key and type 0160).
3)Now u have a folder with out a name.
The folder look like this

4)Right click on the folder>properties>customize. Click on change icon.
5)Scroll a bit, u should find some empty spaces, Click on any one of them.
click ok Thats it,

now u can store ur personal data without any 3rd party tools

Change the folder of c drive in my computer

All the Xp users would have been bored by the boring icons in their My Computer panel which are adjacent to the Hard disk drives(C:,D: or whatever drive letter you have).

Here is a simple tweak by which you will be able to change this monotonous icon to anything you like,even your own Picture if you wish

You can put any image in place of one which I have shown,even the picture of your favourite celebrity or your dream caror your own Picture.

Here are the steps you need to follow:

1.First of all the picture you want to use should have .ico extension(if you already have a pic with .ico extension proceed to step
2).Most of the pictures we normally use have extensions like .jpg,.bmp,.png..gif etc, so you first need to convert them to one with .ico extension.This is simple.Just go here and put your original image in the 'Source Image 'section,then click on 'Generate Favicon.ico ' button to get your image with .ico extension.

2.Now go to My Computer.Suppose you want to put this icon in place of your original C: image.

Double click and enter C: .Paste your .ico image file in it.Also create a new text file and in it type the following lines:

Remember that 'favicon.ico' in the second line is the name of your image file.If you have an image file with .ico extension by the name of 'abc.ico',then use that in the second line in place of 'favicon.ico'.

3.Now rename this text file as ' autorun.inf ' (without the quotes).

Important Note:How do I rename my text file as autorun.inf ?Ans.Go to Tools->Folder options.Under the View tab uncheck the 'Hide extensions for known file types'.Press apply.Now rename your text file as 'autorun.inf'.

4.Now restart your Pc.You are done.Check out the cool new picture you have just added in your My computer panel.

Get the keyboard on your desktop screen!!!!!

This tip is very usefull when your keyboard not working well but u need to type some letter to your friend ...Remember it.
Its simple:
Just go to start press run.
Now type osk and
press enter.

You will get something like This.

Some times the keyboard don't even work to type the words "OSK" Then can open the same by following simple path.
Click Start>>All Programs>>Accessories>>Accisibility>>On Screen Keyboard.
Now you can manage a little when your keyboard in problem in impotent time.

You can put shortcuts for shortcuts!!

You can put Keyboard shortcuts for desktop shortcuts.
To do this follow these steps :

1) Right click on the shortcut.
2) Go to properties.
3) Click once on the "Shortcut Key" bar.
4) Press any alphabet that you want to use as Shortcut Key.
5) Press OK Now to open that shortcut,
Press CTRL+ALT+"the alphabet".

Of Course every one know this trick but i'm still posting this B Coz no one in my friends didn't have any idea on this

Use of PrintScreen for some fun

You know the use of Print screen button on the keyboard [present on top right above insert] .
It captures the screen , right ?
But now I will tell you how to use it for some fun .
Take screen shot of the desktop by pressing Print Screen on the desktop .
Go to Paint and paste this .
Save it .
For Windows XP users

1) On the desktop right click -----> arrange icons by ----> De-select 'Show Desktop Icons '.
2) Now right click the taskbar and select properties .
3) Check auto hide the taskbar. Click OK.
4) Now change your wallpaper and keep the one you saved earlier.
5) If paint is not closed, select File ---------> 'Set as background (Centered) '.
Now on the desktop even if you click any icon nothing will happen !!!
Now do I need to tell you how you can use it for fun on someone else's PC ?
To revert back to normalcy change the wallpaper and select 'show desktop icons' on the right click menu .

Play movie on paint .......

play movie on microsoft paint

simple first hit the print screen button on the keyboard
when then media files are playing then open paint and
paste by pressing ctrl+v (paste key) voila

the movie starts on the paint application

Fun with Java script

  • Copy and paste the java script code in the following red lines to the address bar of your browser

    javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)

    2: Press enter and watch your window's "shaking it". You can change the value of i if you wish :-)

Google Search Tips !

You can make your search more efficient by learning some search basics !

Try these tips :
1. Use Of '+' sign :
This ensures that the results returned to you will defiantly consist of the word following the '+' sign. For Eg :
Search: reviews of +iPhone and iPod
This will show results containing the word reviews or iPod but the results will defiantly consist of iPhone !

2. Use Of '-' sign :
Using '-' sign before any word will ensure that the particular word will not be included in the results !

3. Use Of '~' sign :
Using '~' before any word will return the results also containing the synonyms of the word !

4. Search a particular site :
To search a particular website you can use the following syntax in the google search :
site:www.xyz.com abc

For Eg :
Search: site:http://pcremix.blogspot.com/ Google Search Tips

5. Define a word :
To get the definition of a word just use :
Search: define:abc
For Eg : Search: define:Computer
This will return you results which define 'Computer'.

6. Find Pages similar to a page :
To find a page similar i.e. consisting of same type of content, use the following syntax :
Search: related:http://www.xyz.com/

7. Search for exact phrase :
To search a set of words exactly together i.e.
For Eg :
Search: "contact us"
This will return the results containing both contact and us together !

8. Using the wild card '*' :
The * sign can be used in places where the whole word is not known.
For Eg:
Search: friend*
This will return the results containing friend , friends , friendship.

9. Using the '?' sign :
This is used when the full spelling of the word is not known.
For Eg:
Search: fri??d
This will result that in the results in which any alphabet can take the place of '?' sign.

10. Use of boolean operators :
The boolean operators like AND,OR,NOT can be used in search box to connect the words !
The search engine understands them as what they mean but the must be in capital letters !
For Eg:
Search: swim OR float
This will return the results containing either swim or float !

Watch " Star Wars "

You Don't need to Download IT !

Just :

Start>>Run ,
type : telnet towel.blinkenlights.nl

And Enjoy The Movie !

Doggy Sound In Acrobat Reader

You need: Acrobat Reader 4.0

Do the following :

1. Open up Acrobat Reader.
2. Choose Help, About Plug-ins, Acrobat Forms.
3. Hold down Control-Alt-Shift and click the Credits button.
4. You should hear a dog bark, the button face will change to say "woof," and the Adobe logo will turn into a dog paw

Open Link In New TAB

To open a LINK in NEW TAB just click on the LINK with the Middle Button or Scroll Wheel of your mouse !

Single Click ' Shut Down ' !

Shutting Down Windows Working :

Actually, shutting down means closing all the applications running on the computer, even the operating system. For this an shut down application is meant. When you traditionally shut down your pc (Start>Turn Off Computer>Turn Off) it actually runs this shut down application.

So, creating a shortcut to this application will do the job !

On the Desktop, Right Click>New>Shortcut

Now, in the location text feild type :

c:\windows\rundll.exe user.exe,exitwindowsexec

then click next and name it 'Shut Down' and click Finish.

Now, drag this shortcut to 'Quick Launch' toolbar.

Now, simply click this link to shut down your PC in a single click !

Passenger Elevator Trick !

This is usefull for those who often use elevators !

When we press the floor no. button on the panel lift start moving. But if someone on the next floor calls the lift the lift stop for them, this could be very irritating in rush hours !

Now, if you Press the Floor No. Button and the Close Door Button both at same time then the elevator would not stop for any one in the way and will stop directly on the destination floor !

** Note in some elevator systems this trick might not work !

Car Keys Inside The Car !!!

Have you ever locked your car keys inside the car ?
This is a very frustating event in which you can't blame anyone !

Well the solution come here :

If you have remote control car lock system in your keychain (Very Common These Days), you are saved !

** Just call some one at home at his/her cell phone and ask for the duplicate keys to someone at home.

** Now, as usual the key chain of duplicate key would also be having the remote control, so ask the person at home to press the unlock key on the remote.

** While the person press the unlock key hold your mobile phone about a 10-12 inches from the car door.

** The unlock signal will travel on the cell phone network and your car will be unlocked !

## Please note that on some networks the trick may not work !

A Temprary Microphone !

Do you know ?

There is an interesting fact about Headphones i.e. they can also be used as a microphone !
Technically :
There is not much difference between the circuits of a Microphone and a Headphone , just the headphone is designed to spread voice and an microphone to capture the voice !

Working :
So if you connect the headphone in the microphone slot of your computer, you could use it as a microphone.
Just speak in the ear buds of the microphone, but please speak a bit loudly to be audible at the other end !

** Remember it is just a temporary solution !

Make Your XP Genuine !

To make your Windows XP genuine so that you can avail the updates from microsoft , Do the Following :

1. Start > Run > "regedit" (without the quotes of course)

2. Go To The Key:


...and doubleclick on it and edit the replace first 2 digits with 67.

3. Start > Run > "%systemroot%\system32\oobe\msoobe.exe /a" (again, dont type the quotes)

4. The activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key: JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ.

5. No need to Enter confirmation code, now just click remind me later and ITS DONE !

Hibernate Your XP !

Hey your Windows XP has a very good but hidden feature !

Trick Advantage :
You can leave your work in between and shutdown the PC and resume it next time as it is !
Even I switched off my PC while writing this article and when I reopened it I resumed my article from where i left !

When you want to stop your work and shutdown(Keeping your programs open)
Do The Following :
1. Click start>Turn Off Computer
2. As the Turn Off menu comes up press 'Shift' and 'Stand By' changes to 'Hibernate'
3. Click Hibernate (Shift Kept Pressed)

Your xp will save the work and shutdown !

Now, when you switch it on again it will resume it again !

No loading of windows will take place and you will be resumed to your work as if you had just switched your monitor off and now on again !

Its Amazing !

Surf The Blocked Websites !

Are you frustrated because you are not able to visit your favorite websites in your school or college ?
Well, no problem the remedy comes here !

Below are the list of various sites from which you can surf the blocked websites !

Another Way,
Today we still use Internet Explorer to surf the net, so if the block is done on the system then using Mozilla Firefox can help !
Use Firefox and try visiting the blocked sites !


Block Or Unblock Websites without software !

Many times in schools, colleges & offices surfing some sites like orkut,etc are banned !
To overcome this you can unblock these or block some other websites and play pranks !

Do The Following :
For eg you want to block www.xyz.com !

* Open the folder C:\WINDOWS\system32\drivers\etc
* There you will find a file named HOSTS
* Click on the file and press SHIFT and now right click on it .
* From the right click menu select Open with .
* Now, select Notepad to open the file from the list !
* Now, in the file under the line localhost add another line as www.xyz.com.
* Now, File>>Save !

Now, open your web browser and try openning www.xyz.com , it will not load !

To unblock sites just do the opposite !

Hidden Programs In Windows XP !

Strange, but true that some good programs are hidden in Windows XP !!!

Programs :

1. Private Character Editor :
Used for editing fonts,etc.

** start>>Run
** Now, type eudcedit

2. Dr. Watson :
This an inbuilt windows repairing software !

** start>>Run
** Now, type drwtsn32

3. Media Player 5.1 :
Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!

** start>>Run
** Now, type mplay32

4. iExpress :
Used to create Setups

You can create your own installers !

** start>>Run
** Now, type iexpress

Make Your Own Icons In Windows XP !

Now even personalize your ICONS with Windows XP !
To make your own ICON :
1. Start>>All Programs>>Accessories2. Click Paint3. In toolbar select Image4. Click Attributes--------------------- Note : The size of a icon is 32 x 32 pixels ! ---------------------5. Type 32 in both Height and Width and sure that Pixels is selected under Units6. Click OK7. Now add your photo or design .8. File>>Save As9. Type name.ico10. Click SaveEnjoy your New ICON !!!

Monday, August 27, 2007

What next after Windows Vista?

Now that Vista is on the shelves, Microsoft is focusing on its next major operating system release, Windows Vienna. Even though Windows Vienna is going to be a major release with a totally revised GUI, Microsoft made a bold statement: by the end of 2009 Vienna will hit the shelves.

However, Microsoft needs to keep the buzz on Windows Vista for now and so they are not releasing any Windows Vienna official information to the public yet, expect for the fact that they are working on it.
In the past 20 years, the Microsoft Windows operating system has accumulated old code libraries that brought it to the size it has today, 2.5 GB and about 50 million lines of code (Windows Vista). These old code libraries consume resources and are often the targets of security exploits. The best way to avoid such problems, is to start from scratch, which is close to what Microsoft plans to do with Windows Vienna. Windows Vienna will represent the start of a different generation of operating systems, bringing in new concepts and support for new types of hardware, along with a better security and a modular approach, which will allow future versions of Windows to be built more easily on Windows Vienna's engine.

It is also likely that the future success of Microsoft's products will be strongly decided by the success of the new generation operating system.

20 Google secrets you must know

Google is clearly the best general-purpose search engine on the Web (see

www.pcmag.com/search engines

But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.

But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.

Syntax Search Tricks

Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at


. Here are some advanced operators that can help narrow down your search results.

Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your search results to just the titles of Web pages.

Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the term HTML, for example, and you don't want to get results such as


, you can enter intext:html.

Link: lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in


Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:"Mark Twain"site:edu. Experiment with mixing various elements; you'll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.

Swiss Army Google

Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature


lets you do both math and a variety of conversions from the search box. For extra fun, try the query "Answer to life the universe and everything."

Let Google help you figure out whether you've got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try "thre blund mise") and Google may suggest a proper spelling. This doesn't always succeed; it works best when the word you're searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you're searching for "three blind mice," underneath the search window will appear a statement such as Searched the web for "three blind mice.") You'll discover that you can click on each word in your search phrase and get a definition from a dictionary.

Suppose you want to contact someone and don't have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you'll see it at the top of the search results along with a map link to the address. If you'd rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you'd rather use a search form for business phone listings, try Yellow Search


Extended Googling

Google offers several services that give you a head start in focusing your search. Google Groups


indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle


which indexes products from online stores, and Google Catalogs

which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google's tools and services at


You're probably used to using Google in your browser. But have you ever thought of using Google outside your browser?

Google Alert


monitors your search terms and e-mails you information about new additions to Google's Web index. (Google Alert is not affiliated with Google; it uses Google's Web services API to perform its searches.) If you're more interested in news stories than general Web content, check out the beta version of Google News Alerts


This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)

Google on the telephone? Yup. This service is brought to you by the folks at Google Labs


a place for experimental Google ideas and features (which may come and go, so what's there at this writing might not be there when you decide to check it out). With Google Voice Search


you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don't expect 100 percent success.

In 2002, Google released the Google API (application programming interface), a way for programmers to access Google's search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you'll need an API key, which is available free from

. See the figures for two more examples, and visit


for more.

Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You'll be amazed at how many different ways Google can improve your Internet searching.

Online Extra: More Google Tips

Here are a few more clever ways to tweak your Google searches.

Search Within a Timeframe

Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic's current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as


excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif

), but an easier way is to do a Google daterange: search by filling in a form at

www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml

. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can't be mixed (you can't use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.

More Google API Applications

Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query


When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL


Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. Cape Mail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it's not something you'd do every day, but if your cell phone does e-mail and doesn't do Web browsing, this is a very handy address to know.