on Friday, March 27, 2009
WiFi is no longer secure enough to protect wireless data.

Global Secure Systems has said that a Russian's firm's use of the latest NVidia graphics cards to accelerate WiFi ‘password recovery' times by up to an astonishing 10,000 per cent proves that WiFi's WPA and WPA2 encryption systems are no longer enough to protect wireless data.



David Hobson, managing director of GSS, claimed that companies can no longer view standards-based WiFi transmission as sufficiently secure against eavesdropping to be used with impunity. He also said that the use of VPNs is arguably now mandatory for companies wanting to comply with the Data Protection Act.



He said: “This breakthrough in brute force decryption of WiFi signals by Elcomsoft confirms our observations that firms can no longer rely on standards-based security to protect their data. As a result, we now advise clients using WiFi in their offices to move on up to a VPN encryption system as well.



“Brute force decryption of the WPA and WPA2 systems using parallel processing has been on the theoretical possibilities horizon for some time - and presumably employed by relevant government agencies in extreme situations - but the use of the latest NVidia cards to speedup decryption on a standard PC is extremely worrying.



“The $64,000 question, of course, is what happens when hackers secure a pecuniary advantage by gaining access to company data flowing across a WPA or WPA2-encrypted wireless connection. Will the Information Commissioner take action against the company concerned for an effective breach of the Data Protection Act.”
GET RID OF ALMOST ALL VIRUSES?
TO GET RID OF ALL VIRUSES YOU HAVE TO DO NOTHING . JUST FOLLOW THE FOLLOWING.

1. WHEN YOU INSERT ANY PEN DRIVE OR CD, START PRESSING RIGHT SHIFT KEY (PLZ BE CAREFUL ONLY RIGHT SHIFT KEY NOT LEFT KEY).

2. THIS STOPS THE AUTOPLAY OPTION. MOST OF THE VIRUSES HAVE THEIR AUTORUN FILE WITH THEM.

3. NOW OPEN CMD AND SWITCH TO THE PEN DRIVE. TYPE "ATTRIB" AND PRESS ENTER.

4. THIS COMMAND DISPLAYS THE ATTRIBUTES ASSOCIATED WITH EACH FILE IN THE PEN DRIVE.

5. NOW SEARCH FOR FILES THAT HAVE ATTRIBUTES "SHR".IT MEANS THE FILE IS HIDDEN, READ ONLY & SYSTEM FILE.

6. MOST OF THE VIRUSES HAVE SHR ATTRIBUTE.

7. NOW TYPE ATTRIB -S -H -R FILENAME AND REMOVE ALL ATTRIBUTES OF FILES.(DO THIS FOR ALL FILES)

8. NOW OPEN AUTORUN.INF FILE FROM CMD.

9. SEARCH FOR THE NAME OF VIRUS IN THE AUTORUN FILE.

10. DELETE THE VIRUSES FROM THE PEN DRIVE BY USING DEL COMMAND.

11. YOUR PEN DRIVE IS FREE FROM ALL VIRUSES.

HAVE A VIRUS FREE COMPUTER !!
Use Pen Drive as RAM
Follow these steps :-

1. Insert the Pen Drive (1GB atleast) in the USB port
try to prefer 4GB.
2. Let the PC do what it wants to do to detect it..
3. After it finished his work, you have to act smart,

" Here goes the real thing "

4. Right Click on My Computer -> Properties
5. Advanced -> Performance Settings
6. Advanced -> Change
7. Select the Pen Drive
8. Click on Custom Size

" Check the value of space available "

9. Enter the same in the Initial and the Max columns

" You just used the space of the PenDrive as a Virtual Memory "

Restart...
" VOILA !!! Your PC is fast and furious "
Section 1: The Introduction

Tired of wondering if you have gone over your minute limit? Tired of trying to guess how many minutes you are going to use? Tired of even paying for the shit? Then this is the tutorial for you. This is a short and simple tutorial that will teach you, the reader, how to make free calls on your Nokia cell phone. So let's proceed...

Section 2: So How Do We Do It?


This technique works on most of the nokia models out today. Meaning this will work for you as long as you don't have an old fossil sort of model. So what you will first do is turn on your phone. Then punch in the code *3001#12345#. This will bring up the NAM programming menu. From here go down and select the option NAM 1. Once you are in the NAM 1 menu, go down until you see "Emergency Numbers", and enter. You then go down until you see an empty slot and enter the empty slot. Then simply punch in the number that you want to call and exit the NAM programming menu. Now when you dial up the number, the number will be treated as an emergency call number, which will therefore put the phone into emergency call mode (which you can exit out of once you are finished with your call). No number in the emergency call number list is ever billed to you. There are a couple of other things you can do from within the NAM programming menu, but that can be saved for another time, and another tutorial.

Section 3: The Conclusion

Once again I hoped you enjoyed reading this as much as I enjoyed writing this. This trick for the most part only works on the Nokia 60 series, though I believe may also work for a couple of other models. Be sure to also note that this trick also doesn't work on all networks. Therefore, if you indeed do have a compatible model, first try it with just one or two calls before you start going wild. Then just wait for the bill, and if nothing shows up about the calls you made with this trick, then feel free to call away. Anyways, until next time...
How to disable a STOLEN mobile phone?
To check your Mobile phone's serial number, key in the following digits on your phone: * # 0 6 #

A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe.

Should your phone get stolen, you can phone your service provider and give them this code.They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless.

You probably won't get your phone back, but at least you know that whoever stole it can't use/sell it either.

If everybody does this, there would be no point in people stealing mobile phones.
1- Open your mobile cover

2- Take out your battery

3- Take two to three fresh leaves of peepal/pipal/ ashwattha tree

4- Touch the stub of these leaves on your mobile battery terminal for a minute

5- Clean the mobile battery terminal with the soft cloth

6- Put your battery again in your mobile and switch it on

7- Now you can see the result

8- If required repeat the process with fresh leaves
There are two messenger services available for Windows and Internet users. They are Windows Messenger Service and Instant Messaging.

Instant Messenger is used to chat, call, share files, video conference, send SMS messages between two internet users.

Windows Messenger is used to just send messages between two users in the network.

This article is about Windows Messenger Service not about Instant messaging. We will discuss how we can stop the Windows Messenger Service that can be really troublesome at times.

Is Windows Messenger Service problematic?

Yes. A total stranger can use Windows Messenger Service to send you a message. When you are seriously engaged in your work, a pop window will suddently appear in your window. You will see the message sent by the stranger. The title bar of the pop window will show ‘Messenger Service’.

Users of Windows 98/ME/2000/NT/XP will have this Windows Messenger Service. The person who send these messages over internet may not even know who you are. Likewise you too may not know who sent these messages.

To play hide and seek like this Windows Messenger Service is used. You do not need any special skills to send these messages. Even new computer users can send these messages. The Windows messenger service is so easy to use.

They may send messages that threaten as if your computer has been infected by a virus. Or a message that sends advertisements. It may even prompt you to change passwords by clicking on a link and taking you to another website. Or the message can be just about anything.

If you can stop the windows messenger service in your computer then you can prevent all these pop up windows from your computer. If required you can bring back windows messenger service anytime later.

How to Stop Windows Messenger Service?

For those Windows 98 users and Windows ME users, sorry you cannot stop this windows messenger service in your computer.

To stop Windows Messenger service in Windows NT

1. Click on Start->Control Panel
2. Double click the ‘Administrative tools’ icon.
3. Click on the ‘Services’ icon and double click the ‘Messenger’
4. In the ‘Messenger Properties’ window select the ‘Stop’ option
5. In the ‘Startup type’ option select the ‘Disable’ option
6. Click on OK

To stop Windows Messenger in Windows 2000

1. Click on Start->Settings->Control Panel
2. Click on the ‘Administrative tools’
3. Click on ‘Services’
4. Scroll down and find the ‘Messenger’ service and click on properties command
5. Click on ‘Stop’ button
6. In the Startup type select ‘Disable’
7. Click on ‘OK’

To stop Windows Messenger Service in Windows XP Home edition

1. Click on Start=>settings=>Control Panel
2. Click on ‘Performance and Maintenance’
3. Click on the ‘Administrative Tools’
4. Click on ‘Services’
5. Scroll down and choose the ‘Messenger’ and right click and select ‘Properties’
6. Click on ‘Stop’
7. In the ‘Startup type’ select ‘Disable’.

To stop Windows Messenger Service in Windows XP Professional

1. Click on Start=>settings=>Control Panel
2. Click on the ‘Administrative Tools’
3. Click on ‘Services
4. Scroll down and choose the ‘Messenger’ and right click and select ‘Properties’
5. Click on ‘Stop’
6. In the ‘Startup type’ select ‘Disable’.

Congratulations you have successfully stopped your Windows Messenger Service. Now you will not get those annoying pop windows from strangers anymore.
Defragmentation Explained:


Fragmentation iscaused by creating and deleting files and folders, installing newsoftware, and downloading files from the Internet. Computers do notnecessarily save an entire file or folder in a single space on a disk;they're saved in the first available space. After a large portion of adisk has been used, most of the subsequent files and folders are savedin pieces across the volume.
When youdelete files or folders, the empty spaces left behind are filled inrandomly as you store new ones. This is how fragmentation occurs. Themore fragmented the volume is, the slower the computer's file input andoutput performance will be.
Defragmentation is the process ofrewriting non-contiguous parts of a file to contiguous sectors on adisk for the purpose of increasing data access and retrieval speeds.Because FAT and NTFS disks can deteriorate and become badly fragmentedover time, defragmentation is vital for optimal system performance.
InJune 1999 the ABR Corporation of Irvine, California, performed afragmentation analysis and found that, out of 100 corporate officesthat were not using a defragmenter, 50 percent of the respondents hadserver files with 2,000 to 10,000 fragments. In all cases the resultswere the same: Servers and workstations experienced a significantdegradation in performance.




Why Defragment Disks?


Harddisks are by far the slowest component in your computer. CPU and memorywork much faster than hard disks because they do not have moving parts.Therefore fragmented disks often become a bottleneck of the systemperformance.
Besides causing slowdowns, fragmentation makes thedisk drive heads move too much when reading files which leads tofreeze-ups and system crashes. It is important to keep your disksdefragmented and optimized as much as possible.
The default speed of the Start Menu is pretty slow, but you can fix that by editing a Registry Key.

Fire up the Registry Editor and navigate to the following key:

HKEY_CURRENT_USER \ Control Panel \ Desktop \ MenuShowDelay

By default, the value is 400.

Change this to a smaller value, such as 0, to speed it up.
A very important feature in Microsoft Windows XP is the ability to do a boot defragment.

This basically means that all boot files are placed next to each other on the disk drive to allow for faster booting.

By default this option is enabled but some upgrades could disable this feature.

to enable it :

1. Start Regedit.

2. Navigate to HKEY_LOCAL_MACHINE\
SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction

3. Select Enable from the list on the right.

4. Right on it and select Modify.

5. Change the value to Y to enable and N to disable.

6. Reboot your computer.
One common gripe I hear about Windows is how sometimes a USB device will no longer be recognized by the system when you plug it in.

This is generally due to a problem with the hardware manifest or the "device tree" in Windows, and there's a fairly simple solution.



1. Unplug all the USB devices that don't absolutely have to be there (i.e., your mouse and keyboard can stay).

2. Boot Windows in Safe Mode.

3. Open the Device Manager and look for everything in the USB Devices or Universal Serial Bus Controllers category.

4. Delete everything in that category.

5. Shut down and reboot the system normally. Windows will then re-install the USB controllers.

6. Re-add your USB devices. They should be recognized properly, although you may need to provide drivers for them if Windows can't find them in its own driver repository.
To speed up the Internet connection speed we need to configure aspecial buffer in the computer's memory in order to enable it to betterdeal with interrupts made from the NIC or the USB modem.

This tip is only recommended if you have 256MB RAM or higher.

Step #1 - Identify the IRQ used by the NIC/USB modem

Follow these steps:

1.Open the System Information tool by running MSINFO32.EXE from the Run command.

2.Expand System Summary > Hardware Resources > IRQs.

3.Lookfor the listing made for your NIC (in my case - a Intel(R) PRO/100+Management Adapter). Note the IRQ next to the specified line (in mycase - IRQ21).

In case of USB modems you will first need to find the right USB device used by your modem. Follow these steps:

1.Openthe Device Manager tool by running DEVMGMT.MSC from the Run command (orby right-clicking My Computer > Hardware tab > Device Managerbutton).

2.Scroll down to Universal Serial Bus controllers and expand it.

3.Right-clickthe USB Root Hub and select Properties. Note that you might need to doso for all listed USB Root hubs (if there are more than one) in orderto find the right one.

4.In the Power tab, look for your USB ADSL modem.

5.In the Resources tab look for the assigned IRQ (in this case - IRQ21).

6.This is the IRQ we're looking for.

Lamer note: IRQs and modem names might vary...

Step #2 - Modify the system.ini file

Follow these steps:

1.Run SYSEDIT.EXE from the Run command.

2.Expand the system.ini file window.

3.Scroll down almost to the end of the file till you find a line called [386enh].

4.Press Enter to make one blank line, and in that line type

IrqX=4096

where X is the designated IRQ number we found in step #1, in my case it's IRQ21.

Note: This line IS CASE SENSITIVE!!!

5.Click on the File menu, then choose Save.

6.Close SYSEDIT and reboot your computer.

Done. Speed improvement will be noticed after the computer reboots.
Wireless Internet Sharing

If you plan onsharing your wireless internet access, you will need to have thatoption turned on in your settings. However, if you do not have othercomputers hooked up to the network at this time, for security purposes,you should leave the setting turned off until the need arises to sharethe wireless internet access.

Wireless Internet Speeds

Coming in at the slowest is Bluetooth, followed by 802.11b, 802.11a andtopping the charts currently is 802.11g. 802.11b is roughly equivalentto the traditional wired 10BaseT Wired Ethernet networks. Therefore,switching to Wi-Fi should not considerably slow down your wirelessinternet connection.

Wireless Network Equipment While Traveling

Youwill need to have a wireless network card, either an adapter orintegrated in your laptop. If you do not have an available slot on yourPC, there are adapters you can purchase that plug into a USB port onthe computer.

Finding a Wireless Internet Hot Spot

Thereare several stores and restaurants that offer wireless internet access,such as Starbucks. If you have a particular destination in mind, youcan call the hotels to see if they offer the service. There are alsohot spot directories that you can search to find wireless internetaccess.

Wireless internet - WiFi Standards

802.11 is the Wi-Fi standard, however there are other standards which are variations of the 802.11. These include:

* 802.11a
* 802.11b
* 802.11g
* 802.11i.

Thedifferences among these standards includes speed, transmissionfrequency, and price. 802.11g is backwards compatible with previousproducts, but that is not the case with 802.11a. Make sure you check oncompatibility issues prior to purchasing products.

Wireless Internet and Dial up

Itis possible to share a wireless internet connection with dial up, butit is not a very good idea. Some access points, such as the airportextreme base station from Apple, will allow this. However, there issome slow down time with sharing a wireless internet connection, and ifyou decide to share a dial up connection, you won't be surfing anythingfast.

Finding a Wireless Internet Hot Spot in a Chain

Ifyou are traveling and know that you will be stopping at Starbucks, forexample, and want to access the internet, you can check out theirwebsite to see what specific franchises offer wireless internet access.

Paying for Wireless Internet Access

Mostlikely, you will need to pay for the high speed wireless internetaccess when you travel. Starbucks for example uses T-mobile as theirwireless internet provider. You will need to have a t-mobile account inorder to access wi-fi at Starbucks. There are some restaurants that mayadvertise free Wi-Fi, but in general, you should expect to pay a fee.

Nationwide Wireless Internet Service

Thereare a plethora of national wireless high speed internet servicesavailable. AT&T, Sprint PCS, T-mobile, and Verizon are a few whichoffer nationwide service. You will want to check out various pricing,roaming policies and fees for the various networks.

Mixing Apples and PC's to Share Wireless Internet Connection

Youcan mix apple and PC on a wireless network and share a wirelessinternet access. For example, Apple makes an access point called theAirPort Extreme Base station. Even though it is made by Apple, it stilluses the Wi-Fi standard, and PC computers with a wireless adapter onthe network will be able to share the wireless internet connection

Mixing Wireless Internet and Wired Internet

Youcan easily share a wireless internet access while still maintaining awired network. There are many wireless routers on the market whichoffer both wired and wireless network capabilities. It is also possibleto add on an access point after a wired router for wireless access.

Configuring Wireless Access Point to Share Wireless Internet Connection

Onceyou install the drivers on your computer for the access point, you willbe able to open up the configuration software that comes with therouter. The IP address 192.168.0.0 is the lowest in the network andshould be dedicated to the router. Make sure to follow the specificconfiguration instructions that come with your wireless router, as eachproduct will be slightly different from one another.

Wireless Internet Equipment

Thebeauty of the WI-FI is that it set a standard for wireless networking.Because of this, you do not need to have equipment from all the samevenders in order to run a successful wireless network. You will be ableto share wireless internet access as well without having equipment fromall the same venders.

Configuring Wireless Internet Card

Youwill need to use the configuration software that comes with yournetwork card to configure your computer to work at various hot spots.Simply type in the hotspot network name (various depending on theservice you are using) and state the type of network, such as accesspoint. You can also scan available wireless broadband internet accessin the area and choose which network you wish to connect with.

Wireless Internet WIFI

WI-FI,the 802.11 standard, is important for a variety of reasons. Having astandard in the industry ensures that anyone using wi-fi will be usingthe same standard, therefore equipment and connections areinterchangeable. Having a set standard makes setting up wirelessnetworks, sharing wireless internet access and working with wirelessequipment more users friendly.
Windows XP didn’t give you a way to conveniently log in if you had forgotten your password and required you to go search for third-party tools. Fortunately, Vista allows you to easily create a “Password Reset” disk should you forget your login password. You can even use your iPod or USB memory disk as a computer key!



If you can do this on your own, just press Ctrl + Alt + Delete > Change a Password > Create a Password Reset Disk. Follow the step-by-step wizard and you’re all set.

If you want to follow this tutorial step-by-step, then create a Reset Disk following these steps instead.

1) Click on Start Pearl and type this in the Search bar: control.exe /name Microsoft.UserAccounts

or

Classic Control Panel View: Start > Control Panel > User Accounts

Normal Control Panel View: Start > Control Panel > User and Family Safety > User Accounts

2) Click on Create a Password Reset Disk on the left panel.

3) Click next and you will be asked to choose where you want your password key disk saved. I recommend you choose a form of removable media such as a floppy or a USB disk.

4) Make sure the selected disk is still in the drive, then enter your current user account password.

5) Click Next and let Windows do its thing.

Once you create the password disk, any other password disks you’ve created in the past won’t work anymore. You must use the one you have just created. So what do you do when you actually have forgotten your password? When you log in, purposely get your password wrong and click OK when you get prompted for a wrong password. Then a new link will appear at the bottom that says Reset Password. Click that and follow the step-by-step wizard to reset your password. You should have no problem at all getting back into Vista.
You can install Vista with no product key and have 30 days to evaluate it

1. Boot from the DVD and start the installation

2. Select the Language, Time and Currency, and Keyboard

3. Click on Next

4. Click on Install Now

5. Don’t enter a Product Key

6. Uncheck Automatically activate Windows when I’m online

7. Click on Next

8. Click on No to confirm you do not want to enter a product key

9. Highlight the version of Vista you want to install

10. Check that it is the same edition you have purchased (if you want to enter in a product key at a later time).

12. Click on Next

13. Check accept the license and terms

14. Click on Next

15. Install a clean copy and continue as with a regular install
minimize all loaded programs and windows
Windows Button + M
Show Desktop
Windows Button + D
Load Windows Explorer
Windows Button + E
Load Run Command Window
Windows Button + R
Open Start menu
Windows Button or Ctrl + Escape
Load Utility manager
Windows Button + U
Lock Windows
Windows Button + L
Show Windows Task Manager
Ctrl + Shift + Escape
Close any sub window
Ctrl + F4
Minimize any active program or window
Alt + Space + N
Maximize any active program or window
Alt + Space + X
Restore any active program or window
Alt + Space + R
Move any active program or window (active window must not in maximizedposition)
Alt + Space + M
Re size any active program or window (active window must not in maximizedposition)
Alt + Space + S
Capture only active window (You can paste it in Paint Brush or any otherprogram like Photoshop or Microsot Word etc.)
Alt + Print Screen
Switching between loaded softwares
Alt + Tab
Get properties of selected file
Alt + Enter
Right click
Shift + F10





1.) Windows Hotkeys
* Shift + F10 right-clicks.
* Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.
* Win + F or F3: Open Find dialog. (All Files) F3 may not work in someapplications which use F3 for their own find dialogs.
* Win + Control + F: Open Find dialog. (Computers)
* Win + U: Open Utility Manager.
* Win + F1: Open Windows help.
* Win + Pause: Open System Properties dialog.
* Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift +F10 right-clicks.
* Win + Shift + Tab: Cycle through taskbar buttons in reverse.
* Alt + Tab: Display CoolSwitch. More commonly known as the AltTab dialog.
* Alt + Shift + Tab: Display CoolSwitch; go in reverse.
* Alt + Escape: Send active window to the bottom of the z-order.
* Alt + Shift + Escape: Activate the window at the bottom of the z-order.
* Alt + F4: Close active window; or, if all windows are closed, open shutdowndialog.
* Shift while a CD is loading: Bypass AutoPlay.
* Shift while login: Bypass startup folder. Only those applications will beignored which are in the startup folder, not those started from the registry(MicrosoftWindowsCurrentVersionRun)
* Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invokethe Task Manager or NT Security dialog.
* Ctrl + Shift + Escape (2000/XP ) or (Ctrl + Alt + NumpadDot) : Invoke thetask manager. On earlier OSes, acts like Ctrl + Escape.
* Printscreen: Copy screenshot of current screen to clipboard.
* Alt + Printscreen: Copy screenshot of current active window to clipboard.
* Ctrl + Alt + Down Arrow: Invert screen. Untested on OSes other than XP.
* Ctrl + Alt + Up Arrow: Undo inversion.
* Win + B : Move focus to systray icons.





2.) Generic
* Ctrl + C or Ctrl + Insert: Copy.
* Ctrl + X or Shift + Delete: Cut.
* Ctrl + V or Shift + Insert: Paste/Move.
* Ctrl + N: New... File, Tab, Entry, etc.
* Ctrl + S: Save.
* Ctrl + O: Open...
* Ctrl + P: Print.
* Ctrl + Z: Undo.
* Ctrl + A: Select all.
* Ctrl + F: Find...
* Ctrl+W : to close the current window
* Ctrl + F4: Close tab or child window.
* F1: Open help.
* F11: Toggle full screen mode.
* Alt or F10: Activate menu bar.
* Alt + Space: Display system menu. Same as clicking the icon on the titlebar.
* Escape: Remove focus from current control/menu, or close dialog box.





3.) Generic Navigation
* Tab: Forward one item.
* Shift + Tab: Backward one item.
* Ctrl + Tab: Cycle through tabs/child windows.
* Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.
* Enter: If a button's selected, click it, otherwise, click default button.
* Space: Toggle items such as radio buttons or checkboxes.
* Alt + (Letter): Activate item corresponding to (Letter). (Letter) is theunderlined letter on the item's name.
* Ctrl + Left: Move cursor to the beginning of previous word.
* Ctrl + Right: Move cursor to the beginning of next word.
* Ctrl + Up: Move cursor to beginning of previous paragraph. This and allsubsequent Up/Down hotkeys in this section have only been known to work inRichEdit controls.
* Ctrl + Down: Move cursor to beginning of next paragraph.
* Shift + Left: Highlight one character to the left.
* Shift + Right: Highlight one character to the right.
* Shift + Up: Highlight from current cursor position, to one line up.
* Shift + Down: Highlight from current cursor position, to one line down.
* Ctrl + Shift + Left: Highlight to beginning of previous word.
* Ctrl + Shift + Right: Highlight to beginning of next word.
* Ctrl + Shift + Up: Highlight to beginning of previous paragraph.
* Ctrl + Shift + Down: Highlight to beginning of next paragraph.
* Home: Move cursor to top of a scrollable control.
* End: Move cursor to bottom of a scrollable control.





4.) Generic File Browser
* Arrow Keys: Navigate.
* Shift + Arrow Keys: Select multiple items.
* Ctrl + Arrow Keys: Change focus without changing selection. "Focus"is the object that will run on Enter. Space toggles selection of the focuseditem.
* (Letter): Select first found item that begins with (Letter).
* BackSpace: Go up one level to the parent directory.
* Alt + Left: Go back one folder.
* Alt + Right: Go forward one folder.
* Enter: Activate (Double-click) selected item(s).
* Alt + Enter: View properties for selected item.
* F2: Rename selected item(s).
* Ctrl + NumpadPlus: In a Details view, resizes all columns to fit the longestitem in each one.
* Delete: Delete selected item(s).
* Shift + Delete: Delete selected item(s); bypass Recycle Bin.
* Ctrl while dragging item(s): Copy.
* Ctrl + Shift while dragging item(s): Create shortcut(s).
* In tree pane, if any:
* Left: Collapse the current selection if expanded, or select the parentfolder.
* Right: Expand the current selection if collapsed, or select the firstsubfolder.
* NumpadAsterisk: Expand currently selected directory and all subdirectories.No undo.
* NumpadPlus: Expand currently selected directory.
* NumpadMinus: Collapse currently selected directory.





5.) Accessibility
* Right Shift for eight seconds: Toggle FilterKeys on and off. FilterKeys mustbe enabled.
* Left Alt + Left Shift + PrintScreen: Toggle High Contrast on and off. HighContrast must be enabled.
* Left Alt + Left Shift + NumLock: Toggle MouseKeys on and off. MouseKeys mustbe enabled.
* NumLock for five seconds: Toggle ToggleKeys on and off. ToggleKeys must beenabled.
* Shift five times: Toggle StickyKeys on and off. StickyKeys must be enabled.
on Saturday, March 14, 2009
Google is the go-to provider of many things online-search, email, maps, and more. But have you ever stopped to consider all of the information you’re sharing with Google? Read on, and find out all of the dirt that Google has on you.


# What you’re searching for: Google is used by millions of people worldwide-and they know what every user is searching for, even if it’s not personally identifiable.

# The web pages you visit: Google AdSense is used by many web pages for online advertising, and Google’s cookies record your visits to web pages with their ad program on them.

# The blogs you read: If you use Google Reader, Google knows the blogs you subscribe to. Even if you’re not on Google Reader, Google knows all of the Blogger pages you visit.

# Your financial information: Users of AdSense and/or Google Checkout share financial information, addresses, and other personal information with Google.

# The strength and popularity of your website or blog: For users of Google Analytics, Google knows what sites you control, how they are doing, and their trends.

# Who and what you’re emailing: GMail users, and those who send mail to GMail users share a variety of personal and business information with Google.

# What’s on your PC: If you’re using Google Desktop, Google knows everything that you keep on your computer.

# Your research paper, bills, upcoming blog post, etc.: Docs and Spreadsheets are great web-based office tools, but using them means exposing the information in your documents to Google.

# Your schedule: Google Calendar opens your personal and business schedule up to the prying eyes of Google.

# Your social network and interests: Google indexes sites like Orkut, Facebook, and Digg, and as such, has access to information about what you’re interested in online.

# When you’re going to get the flu: Google can track flu related searches to find out where and when the flu happens.

# Where you and your friends are: Using Google Latitude, cell phone users can share their location with others. Even if you’re not using Latitude, Google Maps for mobile can approximate your location.

# What you’re watching on YouTube: Google owns YouTube, and knows about all the dirty videos you’ve been watching.

# What and where you study: Google Books, Scholar, and University Search are tools that can reveal your academic life online.

# Everything you’re looking at online: Users of the browser Google Chrome allow Google to see all of the web pages they are visiting.

# Your problems: Asking a question or giving an answer on Google Answers will reveal your problems and personal life to Google.

# Your medical issues: Do you use Google Health? If so, you’re sharing your entire medical history with Google.

# Your home address: Use Google Maps, AdSense, or Checkout, and there’s a good chance Google has your home address.

# Mobile number: On SMS, Google Mobile, and Gmail, you can reveal your mobile number to Google.

# How your voice sounds: Using Google Talk will share the sound of your voice with Google.

# What you, your friends and family look like and do: With the photo editor Picasa, you’re revealing your photographs, friends, and moments to Google.

# Everything you do online: Google Secure Access encrypts your data, so everything you’re doing online is recordable.

# What you want to buy and have bought: Product search and Catalog search can reveal what you’re buying and shopping for.

# What your business is about: Keywords and purchasing patterns on Adwords share information about your business with Google.

# What’s important to you: If you’ve set up Google Alerts, Google knows all of the things that are most important for you to know about online.