Hack RapidShare Time Limit
Do as follows :
>> Click a Download link for Rapidshare !
>> Click the Free button on Rapidshare Page !
>> Now as usual the timer starts !!!
>> Now, go to the address box of your browser. (Address Box
>> Where you type the websites !) Erase the link written in it
>> In the address box type: javascript:alert(c=1)
>> Click OK on the alert box that arises. >> NO WAITING.........ENJOY...
What is GSM Technology?
*
Services
*
Quality of services and security
*
Radio frequency utilization
*
Network
Services: The services, which are provided by the system, should be potable to all Mobile Stations or Mobile Phones so that it can b used in all over the world.
Quality of services and security: The quality of both voice and data services of GSM should be good. The voice data is encoded in digital form by using a modulation technique i.e.Gussian Minimum Shift Keying (GMSK).The security features should be provided by the system to protect the network against unauthorized users.
Radio frequency utilization: The system should use the available band of frequencies (For uplink: 890-915MHz & For downlink: 935-960MHz) efficiently.
Network: Network designers manage the identification and numbering plans while switching and mobility management based upon signaling system i.e. Signaling System Number 7(SS7).
GSM Architecture
The main component groups of GSM architecture are:
*
Mobile Stations (MSs)
*
Base Station System (BSS)
*
Network and Switching Subsystem (NSS)
Mobile Stations (MSs):
The Mobile Station (MS) consist of two operational parts.
1.
Mobile Equipment (ME)
2.
Subscriber Identity Module (SIM)
Mobile Equipment (ME): This is the hard ware used by the subscriber to access the network and it has a unique identity number known as International Mobile Equipment Identity (IMEI).
Subscriber Identity Module (SIM): This is a type of electronic card that is plugs into ME and contains detailed information about the mobile subscriber.
Base Station System (BSS):
BSS is central equipment, which is located at the cell site. It provides the link between MS and NSS. The BSS consists of two operational parts.
Base Transceiver Station (BTS): BTS consists of transmitting and receiving antennas and signaling equipment that provide air interface for a cell to route the call. BTS communicates with the MS.A single BTS can support one or more cells.
Base Station Controller (BSC): All switching functions, which are performed in MSC, are controlled by BSC. It also supports handoff strategies and allocate or release temporary channels for those users whose needed handoff. Several BTSs can be controlled by a single BSC and one MSC can serve many BSCs
Network Switching Subsystem (NSS)
It is the main switching center of GSM network. NSS includes the following:
Mobile Switching Center (MSC): It is the basic unit of NSS, which supports call-switching or routing functions. Its purpose is the same as that of telephone exchange but due to advanced wireless technology, its working is much better than that of exchange. Each MSC provides coverage to a defined geographic area only.
Home Location Register (HLR): For subscriber its a reference data base. Current location of MS, identification numbers and various addresses are maintained in it.
Visitor Location Register (VLR): It’s also a type of database. When an MS moves from home location to a visited location then its location is registered as a visitor in the VLR of visited system and this information is also updated in HLR of MS, by the VLR.
Equipment Identity Register (EIR): Its again a type of database, which contains information about MS equipment and check and identify its international validity of hardware and software to work properly.
Authentication center (AUC): Its a processing center and is normally worked together with HLR.Like HLR its also require to continuously access or update subscribers data. Its main purpose is to provide data security features to authenticate the subscriber.
Black Wallpapers - 5.7MB 45 HD jpg Wallpapers
Lock My PC 4.9.8814 - Full Version
Lock My PC is an easy in use, powerful and compact tool to lock your computer from unauthorized use. When you leave your computer unattended, the program disables the hot keys (including Ctrl+Alt+Del), mouse, locks CD/DVD ROM doors and displays a lock screen. Nobody can access your system without providing the correct unlock password.
Features and benefits:
Quick and safe computer lock by hot key, or mouse click
Autolock when computer is idle
Correct Ctrl+Alt+Del lock
Bulletproof startup lock (couldn't be bypassed in safe mode)
Different installation mode
setup for home or corporate use
CD/DVD
ROM doors lock
Multi? user support
Multimonitor support
Auto turnoff when computer is locked for a long time
Blind password option
Stealth mode
Windows XP x64 compatibility
Custom lock screens
Cycling lock screen images
Screen saving effects
Lock screen transparency
you can view movies under the locked screen
Password protected settings, quit and uninstall
Command line options
and many more
Another benefits of Lock My PC in comare with Windows lock feature:
Custom lock screens and transparent lock screen options
Your computer can be used as a presentation machine
The screen displays pictures or video, but nobody can touch your computer;
Secure Lock before Windows welcome/logon screen;
Displaying unsuccesfull unlock attempts
you will be notified if anyone tried to unlock your computer;
If Lock My PC is used in muilti-user mode, a supervisor can unlock the computer without closing user session;
You can lock CD/DVD ROM doors along with the desktop, keyboard and mouse
this can prevent CD media from being stolen while you are out;
Command line support allows you to use Lock My PC in Internet kiosks.
Kaspersky Working Activation Keys For All Versions[Updated 16/09/2009]
Here I Enclosed Activation Keys For Kaspersky Internet Security And Antivirus Versions 2010,2009,v9,v8.v7 v6. These All Keys Were Tested By Myself.Keys Updated On 16th september 2009 at -6:00GMT.All Keys 100% Working. Some Keys Valid Until Next Year.If you have any doubt regarding the activation of Kaspersky Internet Security 2009 using a Key file, use this link to watch the animated tutorial-@
http://i42.tinypic.com/334ntyc.gif | |
Steganos Internet Security 2009 8.5.0.408
Imagine you are surfing the Internet and afterwards your computer will no longer start up. Viruses that access your PC unnoticed can cause great damage. They can delete your entire data – or even make your computer completely unusable. Hackers can access your PC even if they are not surfing the Web. This means they can steal your credit card number and go shopping at your cost.
Spy programs forward the passwords for your online banking: Your account is cleared out. Spam mails are not just an annoyance but are also dangerous: Phishing mails disguise themselves as official messages from your bank and try to obtain valuable access information.
Steganos Internet Security protects you quickly, securely and permanently in several areas: The virus database is updated regularly to ensure your being protected permanently against viruses.
Annoying adware and dangerous spyware are detected and destroyed: This means you are protected against identity theft.
Dangerous rootkits are automatically detected and removed.
Hacker attacks from the Internet are repelled and the complete data traffic between your computer and the Internet is controlled permanently by the integrated firewall.
While you surf the net, Web Shield checks if websites may contain malicious code and warns you. Works for Instant Messaging, too!
Spam and phishing mails are detected and blocked: that way they don't even reach your machine.
Three different detection methods are combined for ultimate security: virus scan, heuristic analysis and generic detection make sure that no virus stays undetected.
Thanks to the intelligent scanning mode, you can create your own black and white lists to in- or exclude certain files from scanning.
G Data Total Care 2010 compleate
A new era is beginning: For the First time, the usual optimum high security from G Data TotalCare is completely undetectable. Self-learning fingerprinting and whitelisting accelerate the test-winning protection so that PC performance remains completely unaffected.
Maximum security from the record test winner:
* Constant optimum virus detection
* For many years the quickest response time to new viruses
* The latest methods for detecting unknown viruses (behaviour blocking, heuristics, cloud security)
Simple user guidance - ideal for beginners:
* With new “one click” user interfaces - everything at a glance
* Automatically carries out all protection functions undetected in the background
* Silent firewall without annoying querying
The features of the new version at a glance:
- New GUI
- Performance Improvement
o 2.0 Fingerprinting
o Scanserver
o White Listing
- Optimized memory management
- False Positive Protection
Part 1 :-
Part 2 :-
Download F-Secure Internet Security 2010 v10.00.246 Incl.Patch And Keymaker-AGAiN at High Speed
F-Secure® Internet Security™ 2010 offers better security online without slowing down your computer. The completely redesigned new version offers significantly improved performance, including 70 % less memory consumption and 60 % faster scanning. It also provides enhanced protection against viruses, malware, spam e-mail, and cyber criminals. Automatic updates and advanced cloud computing technology ensure the fastest protection against new threats. The new Browsing Protection feature tells you which websites are safe to enter and which you should avoid.
Features:
* Easy to install and use
* Real-time blocking of viruses, spyware and other malware
* Instant protection against new threats (DeepGuard)
* Firewall for protection against hackers
* Browsing Protection identifies dangerous websites and protects your identity online
* Protects children from inappropriate web content
* Spam & phishing e-mail filtering
Release Name: F-Secure.Internet.Security.2010.v10.00.246.Incl.Patch.And.Keymaker-AGAiN
Size: 70.55 MB
USB Disk Security v5.2.0.5
USB Disk Security provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. USB Disk Security is the best antivirus software to permanently protect offline computer without the need for signature updates, but other antivirus software should update signature database regularly, and they cannot effectively protect offline computer. This light and easy to use solution is 100% compatible with all software and doesn't slow down your computer at all. You pay USB Disk Security once and get it all, however, other antivirus products should be paid for updates every year.
Product Highlights:
>> 100% protection against any malicious programs via USB storage
USB Disk Security uses innovative proactive technology to block any threats via USB drive. There are relatively few products available in shops or on the Internet which offer even close to 100% protection against any malicious programs via USB drive. The majority of products are unable even to guarantee 90% protection. USB Disk Security is the world's best software to block threats via USB drive.
>> The best solution to protect offline computer
Other antivirus software should update signature database regularly, and they cannot effectively protect offline computer that is not connected to the Internet. When new viruses, worms and other malicious attacks strike, traditional signatures are insufficient. Every minute one waits for a virus signature update creates a window of vulnerability that could have devastating consequences. USB Disk Security uses advanced proactive detection techniques, requires no signature updates, and closes the window of vulnerability left open by other reactive, signature-based responses.
>> The world's fastest and smallest antivirus software
With USB Disk Security, it’s not necessary to sacrifice speed for detection and scanning. Compare antivirus software and you'll discover that USB Disk Security is by far one of the smallest applications in the industry. For example, the v5.0 of USB Disk Security installer is just 1 MB. The program utilizes approximately 1 to 7 MB of RAM.
>> 100% compatible with all software
Incompatibility between antivirus programs is an issue. In the vast majority of cases, installing two antivirus programs from different vendors on one machine (for increased protection) is technically impossible, as the two programs will disrupt each other's functioning. However, USB Disk Security is 100% compatible with all software, including Windows Vista.
>> Simple to use
USB Disk Security has been specifically designed to perform effectively regardless of the user’s level of computer expertise. Just install and forget it.
How to speed up your slow internet connection?
This technique is more useful for static websites and for email applications but don't accelerate with secure and downloading audio or video files. Some good web accelerator retains your system cache to reuse websites with faster speed and can also block windows pop-up. If you are using FTP sites and downloading any program using dial-up, then web accelerator is not for you. There are various web accelerator software are free available on internet, visit and download it to enjoy your connection.
Funny XP

Is there anyone who can make a folder named “con” in his/her windows operating system? To me, no one can it. An Indian first discover this funny windows XP tricks and the surprising matter is that Microsoft even doesn’t know for what it happens.
So try yourself out now……………..
Funny Windows XP Tricks 1 :-
Create a new folder anywhere of your PC and rename it as “CON” or “con” without the quotation “”sign. What happens? Have you been able to make it?
You can bet with your friend now!!!
Funny Windows XP Tricks 2 :-
You may or not familiar with it, but let me mention the funny tricks.
You may know the sentence which comprises all of the letters of English Language. The sentence is “ A Quick Brown Fox Jumps Over The Lazy Dog”. But what happen if you get this sentence more than 200 times just entering a couple of magic words?
To do it---
Open your Microsoft Word and type here =rand (200, 99) and press enter.
Enjoy it now...........
How to make a Folder which has no name?

Creating a Folder with no name is very much funny and a useful optimization Trick for the computer users. It can be very useful to them who don’t want to let others to know what the Folder contains.
So let yourself to grab the optimization tips-
Firstly create a Folder at any Drive of your PC. Give the name to the Folder by holding Alt key + 0160. Ok done! A blank ASCII code will be created here which will show you that there is no name of your Folder.
Have fun.
How to block any installed application from lunching on your computer?
AppLocker provides us a complete solution to block any programs from being executed on a target computer. You can download this tool for any windows version using AppLocker link. Download it and run the easy setup.
After installation, double click on AppLocker icon on your desktop to start the Application Locker software. Now this application will display the list of computer software programs like Microsoft Word, Excel, Internet Explorer and many others.
Here click on any application checkbox and then click on Save button to block any software. For example, if you want to block Internet Explorer then select the checkbox of internet explorer and now after saving the change click on Internet Explorer to start it. Here you will get following message:
Now here you can add other application other than the default lock application list, you can lock other programs by clicking the “Configure” button to open the configuration window. Type the caption you want displayed on the ‘Lock application list’. Then, type the programs executable file name and click the ‘Add’ button to add new applications.
How to Enable Toggle Keys of your Systems?
To enable or disable your system Toggle keys, go to Control Panel using Start button. In your system Control Panel normally the first option will be Accessibility options. Double click on Accessibility options and check the Toggle keys box, Windows will automatically send you a special beeps when you will press locking keys.
Safer Registry Editing
Make sure before modifying your system Registry about its backup and you need to know how to organized the registry, how to perform the basic editing, because Registry contains all information how your system runs. This backup will help you to restore Registry in case any problem occurs after modifying. Learn how you can Export and Import Registry File before Editing?
You can backup the whole Registry and only Registry subkeys also.
Click Start Button then type regedit in Run dialog box and click Ok button. Here you can backup the whole Registry or you can locate the required subkeys that contain the information that you want to edit.Go to File menu option then click on Export option for backup and save it with on any your system drive with .reg extension and you can restore this backup going File menu using import option.
No NTFS Floppies
Windows XP has never supported NTFS with floppy disks because floppy disks are too small in size for NTFS data structures. If your are using Windows XP and ready to format floppy disk, first right click on drive A, then the only option you will find FAT format.
If your system uses any file system like FAT , FAT32 and NTFS, but you can format your floppy using FAT only.
How to Turn Your Num Lock On Forever?
You can set your Num Lock to stay on by default when you logon your system.
There are two different techniques to set Num Lock stay on by default.
-
If you can use Registry Editor correctly then Click on start button and type Regedt32.exe in Run command. Here Navigate to HKEY_USERS\.Default\Control Panel\Keyboard and change the value for InitialKeyboardIndicators from 0 to 2.
-
You can do same by configuring the script to change the NUM LOCK state. Click Start button and then open Notepad. Copy the giving code and paste in Notepad.
set WshShell = CreateObject("WScript.Shell")WshShell.SendKeys "{NUMLOCK}"Now save this file with name "num.vbs" must including the quotes. At the end copy this file to user startup folder. The path for this folder is Documents and Settings\All Users\Start Menu\Programs\Startup.
Now restart the computer. Num Lock should come on and stay on.
More Control Over Your Computer's Boot Process
First Right Click on My Computer option and then select its Properties. In next dialog box open Advanced tab button. Under Startup and Recovery, click on the Settings button. Use the spin box "Time to display list of operating systems" to set the number of seconds you want the system to wait before automatically starting the default operating system. Here you will set time in seconds and its range start from 0 and ends with 999 seconds.
After set the time, then click OK option to close the dialog box to save your change. The next time you restart, the new time will take effect.
How you can save Energy using Energy saving feature?
You can save your system energy applying these feature.
-
First Right click on our your system desktop and a popup menu will appear.
-
Select the Properties option from the menu.
-
Click Screen Saver tab and then select Power button, here you will get Power saving sitting option for your monitor.
-
Select your power scheme from available option, for example turn off monitor time, turn off hard disk and stand by your system.
-
At the end Click OK button to apply the selected scheme.
How you can Change The Recycle Bin's Name?
You can change the name of Recycle Bin of your system if you wish. It is very easy and interesting but it require some changes in windows registry,
- First click on Start button > click on Run option.
- Type here regedit.exe and press enter then you will find there regedit editor.
- In regedit editor you will open HKEY_CLASSES_ROOT folder, In this folder open the CLSID folder then open the {645FF040-5081-101B-9F08-00AA002F954E} folder >ShellFolder folder at last.
- Here simply change the data value from "40 01 00 20" to "70 01 00 20".
After performing all above steps restart your computer then you will find option to rename Recycle name after right clicking on Recycle Bin Icon. Now you can change new name as you wish.
How to Choose The Sounds For Each Windows Event?
-
First Click on Start button, Control Panel and then Click the Sounds and audio devices icon.
-
Click on sounds option , select it and then click Browse button.
-
After clicking browse option you will go c:\WINNT > Media or Sounds folder (windows default sounds folder), but you can add sounds here from any third source.
-
Simply locate here the sound file you want to associate with the selected event and double-click it.
-
Now you can play this sound file in preview to observe if your like the sound file or not.
-
Click OK, and then Click OK again to close the dialog box.
How you can Browsing Your Computer via the Address Toolbar?
Right click on your system taskbar > go to Toolbars and then click no Address option, here you will see a mark on Address option. After this a Address Bar will appear on your system Taskbar, you can open any web page by typing URL name here and press Enter, Windows will automatically open your web page in be default set browser.
You can also browse files and folders on your computer by using the Address Bar. simply type drive letter like C:\ , D:\ in Address Bar and Press Enter.
C:\
Task Manager running but hidden from view
If you are using Windows Task Manager to display the information about programs and processes that are running on your computer. You can start your Windows Task Manager with pressing Ctrl+Alt+Delete keys or with pressing Ctrl+Shift+Esc keys.
To keep Task Manager hidden when it is minimized.
-
First open it by pressing Ctrl+Alt+Delete keys then go to Options menu and click on Hide When Minimized.
-
You can easily restore it, if you click on the icon of Task Manager that will appear in taskbar near the time display.
Write A Batch File To Start Program In Startup
You can start your computer applications automatically and control the sequence of the programs when your computer comes up.
Here we consider you want to run three different applications (WordPad, calculator, and notepad) and minimized automatically with sequence at windows startup. However, you can write a batch file to do the job for you. Open any text editor like notepad and type the following command.
start /min wordpad.exe start /min calc.exe start /min notepad.exe
Now choose the option, Save As to save this file with .bat extension. For example filename.bat.
Now Right- click on Start button and choose open > Double click Programs > here open Startup folder. Now drag your .bat file in the Startup folder and close the dialog box.
Next time When you restart the computer, WordPad, Calc will start first and then Notepad. You won't see the batch file run because you told it to run minimized.
How to Close All Windows Programs quickly?
A cool tip to minimize and maximize all your active windows programs. You can do all using your mouse, but if you want to do this with keyboard then simply press Windows key+M to minimize all active programs and later maximize it using Windows key+Shift+M.
If you want to minimize the all active windows programs one by one then use the shortcut by pressing Alt+Space+N keys and sequentially maximize the active windows programs using shortcut Alt+Space+X keys.
Recycle as Much as You Want.
You can increase and decrease the size of the Recycle Bin. There are some size limitations with Recycle Bin size, its default size is equivalent to 10 percent of the drive size. But if you delete a larger size file accidentally, you can retrieve this file from Recycle Bin that is why you should set the maximum storage size of the Recycle Bin.
-
First Right click on the Recycle Bin icon on the Desktop of your computer then go to Properties.
-
Adjust the slider bar in the center of the screen from 10% to maximum size as you want.
-
Then click OK button to save your new sitting and exit the Recycle Bin Properties Window.
-
After change reboot your computer to have Windows fully initiate the necessary changes to your system.
Dragging and Dropping Program Files in the Start Menu.
Perhaps the most commonly asked question from readers of these tips is how to sort the Programs menu in alphabetical order. Once again, the trick is to go to Start, Programs and then make sure that you move your cursor to the right, so that your cursor is inside the actual list of programs. Then you just right-click and choose Sort By Name.
This works with Favorites, too. Please note that in both these cases, unfortunately, new programs and Favorites are always added to the bottom of the list, so you'll have to re-sort them later. You can also drag and drop the shortcuts in the list of programs, just in case you want to move the most frequently accessed programs to the top. Just go to Start, Programs and then click and hold on a program or folder. Drag it and release to move it where you like.
New Monitors can give life to an older PC
If you want to upgrade your computer, the new monitor is the easiest way to upgrade your computer, because if you have old monitor with new PC, your monitor slow down the system to download image on the screen. The main change with new monitor is the increased screen resolution, fast refresh rates in which a monitor will refresh a image on the screen.
If you want to change the refresh rate of your monitor, Right click on Desktop > Properties > Settings then open Advanced options. Here on the Monitor tab, go to Refresh Frequency list, Here you can change your Monitor frequency with new refresh rate. The default frequency setting of old monitor is 60 Hertz, but your monitor may support more than 60 hertz. First check your monitor manufacturer documentation about your monitor supports. The higher refresh rate reduces the flicker problem on your screen.
How to Choose The Sounds For Each Windows Event?
-
First Click on Start button, Control Panel and then Click the Sounds and audio devices icon.
-
Click on sounds option , select it and then click Browse button.
-
After clicking browse option you will go c:\WINNT > Media or Sounds folder (windows default sounds folder), but you can add sounds here from any third source.
-
Simply locate here the sound file you want to associate with the selected event and double-click it.
-
Now you can play this sound file in preview to observe if your like the sound file or not.
- Click OK, and then Click OK again to close the dialog box.
How you Export and Import Registry File Before Editing ?
You can backup the whole Registry and also Registry subkeys.
Click Start Button then type regedit in Run box and click Ok button. Here you can export the whole Registry or you can locate the required subkeys that contain the information that you want to edit. Go to File menu option then click on Export option for backup and save it with on any your system drive with .reg extension and you can restore this backup going File menu using import option.Quick Format Vs Default Format
Today tip about formatting your Hard disk partitions. When you ready to format you partitions, you have two methods to format a partition, you can work with default formatting and other quick format method.
When you first time format your system partition, you should use default method. This is slow and low-level formatting but with this method you can remove all data from the partition as well as the hard disk is scanned for bad sectors. Here you can fix your system bad sectors.
If you select the quick format method, you can save time but you can remove only data from the partition and does not scan the disk for bad sectors. If you sure about your hard disk health then quick format should be fine to remove data with in short time.
How to Disable or Enable Auto run CD in Windows XP?
Click Start button then type regedit in Run option then press Enter for next.
Here locate the location to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom
Here you can disable or enable automatically running your CD. Change the value of Autorun to 0 for disable and change the value to 1 for enable. At the end restart your computer for this change.
How to start windows programs quickly with Run Command?
The run option of Start menu is used to run a program or to open a document directly. If you do not know the exact location of the program or document then click on Start button to open Run and type the programs shortcut name to open it directly.
Run Commands
-
appwiz.cpl -- Used to run Add/Remove wizard
-
Calc --Calculator
-
Cfgwiz32 --ISDN Configuration Wizard
-
Charmap --Character Map
-
Chkdisk --Repair damaged files
-
Cleanmgr --Cleans up hard drives
-
Clipbrd --Windows Clipboard viewer
-
Control --Displays Control Panel
-
Cmd --Opens a new Command Window
-
Control mouse --Used to control mouse properties
-
Dcomcnfg --DCOM user security
-
Debug --Assembly language programming tool
-
Defrag --Defragmentation tool
-
Drwatson --Records programs crash & snapshots
-
Dxdiag --DirectX Diagnostic Utility
-
Explorer --Windows Explorer
-
Fontview --Graphical font viewer
-
Fsmgmt.msc -- Used to open shared folders
-
Firewall.cpl -- Used to configure windows firewall
-
Ftp -ftp.exe program
-
Hostname --Returns Computer's name
-
Hdwwiz.cpl -- Used to run Add Hardware wizard
-
Ipconfig --Displays IP configuration for all network adapters
-
Logoff -- Used to logoff the computer
-
MMC --Microsoft Management Console
-
Msconfig --Configuration to edit startup files
-
Mstsc -- Used to access remote desktop
-
Mrc -- Malicious Software Removal Tool
-
Msinfo32 --Microsoft System Information Utility
-
Nbtstat --Displays stats and current connections using NetBIOS over TCP/IP
-
Netstat --Displays all active network connections
-
Nslookup--Returns your local DNS server
-
Osk ---Used to access on screen keyboard
-
Perfmon.msc -- Used to configure the performance of Monitor.
-
Ping --Sends data to a specified host/IP
-
Powercfg.cpl -- Used to configure power option
-
Regedit --Registry Editor
-
Regwiz -- Registration wizard
-
Sfc /scannow -- System File Checker
-
Sndrec32 --Sound Recorder
-
Shutdown -- Used to shutdown the windows
-
Spider -- Used to open spider solitaire card game
-
Sfc / scannow -- Used to run system file checker utility.
-
Sndvol32 --Volume control for soundcard
-
Sysedit -- Edit system startup files
-
Taskmgr --Task manager
-
Telephon.cpl -- Used to configure modem options.
-
Telnet --Telnet program
-
Tracert --Traces and displays all paths required to reach an internet host
-
Winchat -- Used to chat with Microsoft
-
Wmplayer -- Used to run Windows Media player
-
Wab -- Used to open Windows address Book.
-
WinWord -- Used to open Microsoft word
-
Winipcfg --Displays IP configuration
-
Winver -- Used to check Windows Version
-
Wupdmgr --Takes you to Microsoft Windows Update
-
Write -- Used to open WordPad..
How to delete files that are used by other programs in windows XP/Vista?
-
Cannot delete file: the file is in use by the other program
-
Cannot delete file: There has been a sharing violation
-
Cannot delete file: The file is in use by another program or user
-
Cannot delete file: Disk is not full or write-protected and that the file is not currently in use.
-
Cannot delete file: The source or destination file may be in use
Normally, a windows restart will allow you to delete such files or folders that are being used by other program, but if you want to manage it without restart your computer then simply you need to download a freeware tool called Unlocker.
You can download this tool for any windows version using Unlocker link. Download it and run the easy setup.
After installation, right click on file or folder that you want to delete and select the option Unlocker.
Here simply click on “Unlock All” button and now you can easily delete this file.
How to enable the advance performance setting in windows vista?
If you have noticed that the speed of your system is very slow with windows vista then today tip is very useful for you to increase the performance of windows vista. There is some default setting in vista which is used to manage the write caching on disk. By default windows enabled the write caching on disk but the advanced performance setting is disabled.
Follow the given steps to configure the advance performance setting in Windows Vista:
To enable this feature, you will need to be logged into your computer with administrative rights. First right click on My Computer icon then select the option Manage. Here small windows will appear with title Computer Management, now select the Device Manager option, then locate the SATA Disk under the Disk Drives. Here select the enable advanced performance sittings on the SATA disk. Now click on Ok button to apply the setting and restart your computer after any changes to go into effect.
How to increase the Browsing and Downloading speed in Windows Vista?
With windows Vista you have noticed the slow internet speed. The web browsing and downloading speed is very slow as compare to previous versions of windows. You can open the same sites in windows XP and server 2003 with the normal speed.
Follow the given steps to increase the Vista browsing speed:
First go to Advance tab in Internet Explorer and turn off the TLS (Transport Layer Security) encryption option. Here to fix problem with some secure pages turn on the SSL 2.0 (Secure Sockets Layer) feature and click Ok button to close it.
Follow the major fix for this problem:
In windows Vista, the TCP autotuning feature is enabled by default. Some web servers do not respond properly to this feature, so it appears that some sites open with very slow speed. To use this feature, you will need to be logged into your computer with administrative rights. First click on Start button and type CMD in Run option then press Enter. At Command Prompt, type the following command and press enter. netsh interface tcp set global autotuninglevel= disabled This command will disable the TCP autotuning feature. Now close the command Prompt and restart your computer after any changes to go into effect. You can easily restore these setting by typing the following command at Command Prompt. netsh interface tcp set global autotuninglevel= normal
What are the Different Types of MP3 Players?
Hard drive based MP3 players are typically larger and heavier than their competitors due to the fact that they contain a large capacity hard drive inside. This however, may be one of its only weaknesses. These MP3 players provide the largest capacity, ten gigabytes or more, out of the different types of MP3 players. Due to the fact that ten gigabytes equates to roughly 2,900 MP3 files, most consumers buy these players because they accommodate their entire MP3 collection. However, if you are looking for a player to bring with you on a jog or to use at the gym, you may choose to shy away from these players. Any sudden physical movement may cause the internal mechanical hard drive to skip.
Micro hard drive based MP3 players are similar to their big brothers, the hard drive based players, except that they are a bit smaller, both in physical size and internal storage capacity. These MP3 players hold up to six gigabytes of MP3 files, which equals roughly 1,700 songs. Still boasting a respectable capacity, these players have won over many consumers due to their light-weight, compact size. However, these players are also susceptible to skipping if subjected to intense physical movement. Additionally, both hard drive and micro hard drive based players commonly contain rechargeable batteries that can not be replaced for a new battery, but only recharged. If it's small size and moderate capacity that you are in search of this type of player may be just right.
If neither of these players piques your interest, flash based MP3 players may fit your needs. These ultra compact, low capacity players contain no moving parts and consequently, never skip. Another advantage of these players is that their size and lack of moving parts allow them to use minimal power, causing your batteries to last longer. Also, these players almost always use replaceable, disposable batteries, allowing you to put in a new battery if your player should die in the middle of use. However, flash based MP3 players commonly range in capacity from 32 megabytes (roughly 10 songs) to two gigabytes (roughly 570 songs) at most. Therefore, most consumers with a large music collection tend to shy away from this type of MP3 player while athletes can appreciate the sturdy nature of these devices.
Some of the different types of MP3 players include additional features as well. A few of the hard drive players include a small screen that can display pictures and video that is stored on the internal drive. Other players allow for digital voice recording for future playback.
What is Internet Fax?
To use an Internet fax service, a subscriber signs up for a small monthly fee and is assigned a fax number. When a fax is sent to the subscriber's number, the service accepts the fax, turning it into a file that is forwarded to the subscriber's existing email address.
To send an Internet fax, the subscriber creates an email. The fax content can be written in the body of the email, and attachments are normally permitted. The destination fax number is entered in the "To" field, along with "@" and the Internet fax service name. For example, if the fax number were 1-550-234-5678, the email would be addressed to 15502345678@site.com. In the "Subject" field the user enters the name of the recipient, "Attn: Mr. Jam" for example. Discover the advantages of technology nowadays! Read further on the best Email to Fax Service reviews!
A small toolbar, available for download from the Internet fax service, is used as a plug-in inside the email program. Clicking on the "Send" button on the toolbar sends the email to the Internet fax service. Upon receipt, an automated program converts the email to a fax format, then faxes to the number supplied in the "To" header. The recipient receives the fax normally, through his or her fax machine.
This service can be very convenient. Of the many advantages, your assigned fax number is active 24 hours a day, so that your account can accept faxes around the clock. Contrast this with using a fax machine, which relies on your phone system being free to accept a fax. For those that use one phone line for fax, telephone, and dial-up, an Internet fax service is especially handy. Internet fax services also save paper and fax toner, and do not rely on a serviceable fax machine. All faxes are sent and received as files. They can be printed by choice, but it isn't necessary.
A further advantage of an Internet fax service is that the subscriber does not need to be familiar with faxing software or fax machines. The convenience of sending and receiving faxes by using the familiar email interface appeals many people.
One of the best features of Internet fax services is that many offer toll-free fax numbers for the U.S. and Canada, so that your U.S. and Canadian clients can fax you for free. Sending faxes is also free of phone charges for the subscriber, as he or she is only sending emails.
When looking into Internet fax services, consider a service that offers a secure website. This provides a mobile "portal" to send/receive faxes while you're on the road or away from home. Confirmation of sent faxes should be standard, so you can be sure your client got your communication. The ability to send to more than one fax number at a time can also be valuable. Check for a page capacity, as some services may limit the amount of pages the subscriber can send/receive in a month.
How to disable the "Turn Off Computer" button in windows XP?
Today tip is very useful particularly for those users who want to restrict the common users to shutdown public computer in common areas. You can disable the "Turn off Computer" button on the start menu and a common user will not "Turn Off, Restart and Stand By" a computer. Using registry editor, you can implement this task in all windows XP versions with minimum effort.
Follow the given steps to disable Turn off Computer" button on the start menu:
To use this feature, you will need to be logged into your computer with administrative rights.
Click Start button and type regedit in Run option then press Enter for next.Here locate the location to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Here in right side panel, right click to create a new DWORD value with the name NoClose.
Now assign number 1 in value data box and close the registry editor.
Now close the registry editor and restart your computer after any changes to go into effect.
How to disable the right click functionality on the desktop?
Today tip is very useful particularly for home users who want to protect their system default settings against unwanted changes that other users can make. For example changes in system desktop appearance, themes, and screen saver as well as other display settings. Using registry editor, you can disable the right click functionality on desktop to access the "Display Properties" dialog box and this will also prevent users to access windows explorer.
Follow the given steps to disable the right click functionality on desktop:
To use this feature, you will need to be logged into your computer with administrative rights.
Click Start button and type regedit in Run option then press Enter for next.
Here locate the location to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Here in right side panel, right click to create a new DWORD value with the name NoViewContextMenu (it is case sensitive), then assign number 1 in value data box. Now close the registry editor and restart your computer after any changes to go into effect.