on Tuesday, April 28, 2009




1. Install winrar in your computer.
2. Select a file which to u want to split.
3. Right click on the file. Click on "Add to archive... "
4. Tipe in "Split to volumes , bytes" the size of RARs you want !
5. Click on "OK" and wait a bit ! You found that rar files r created as per ur requirement.
on Sunday, April 19, 2009


Microsoft will release a beta of Exchange Server 2010 on Wednesday, the first product that enterprise customers will see from the next version of Office.

Microsoft is also going public with the official branding of its next productivity suite -- Office 2010. Until now Microsoft had been referring to it as Office 14, but the new name had been widely expected.

Exchange Server should be in full release by the end of the year, but the rest of the products in the suite won't be out until early 2010, said Julia White, director of the Exchange product management team.

Microsoft will release technical previews of other products in the suite, including Office 2010, SharePoint Server 2010, Visio 2010 and Project 2010, in the third calendar quarter. A technical preview is tested by hundreds of thousands of users, while millions of people will have access to the Exchange 2010 beta, White said.

Another of the Office System products, Office Communications Server (OCS), is on a different schedule. The latest version, OCS R2, was released only in February, and Microsoft has not discussed plans yet for the next big upgrade.

Microsoft will begin the process of upgrading its hosted version of Exchange, Exchange Online, at the same time it ships the Exchange 2010 on-premise product. Exchange Online customers will have the ability to determine when their users are upgraded to the new Exchange 2010 capabilities in Exchange Online, starting in the first half of 2010.

Now that Microsoft offers Exchange as both a service and an on-premise product, it is beginning to align the features of the two offerings more closely, White said. When the company makes architectural decisions about the server product, it thinks about the service as well, she said. "We're thinking about them in a unified way."

It made it easy in Exchange 2010 to automatically configure access for certain employee roles, such as a compliance officer or human-resources manager, White said. "You can set it up [for people] to just have access to the mail boxes they need to search, and can turn that access on and off very quickly," she said.

In Exchange 2007, IT pros needed "an 80-page white paper" to do something similar, she said.
on Wednesday, April 15, 2009
Health Tip of the Day - Who knew?!!!!



1. To remove a bandage painlessly, saturate the bandage with vodka. The stuff dissolves adhesive.

2. To clean the caulking around bathtubs and showers, fill a trigger-spray bottle with vodka, spray the caulking, let set five minutes and wash clean. The alcohol in the vodka kills mould and mildew.

3. To clean your eyeglasses,simply wipe the lenses with a soft, clean cloth dampened with vodka. The alcohol in the vodka cleans the glass and kills germs.

4. Prolong the life of razors by filling a cup with vodka and letting your safety razor blade soak in the alcohol after shaving. The vodka disinfects the blade and prevents rusting.

5. Spray vodka on wine stains, scrub with a brush, and then blot dry.

6. Using a cotton ball, apply vodka to your face as an astringent to cleanse the skin and tighten pores.

7. Add a jigger of vodka to a 12-ounce bottle of shampoo. The alcohol cleanses the scalp, removes toxins from hair, and stimulates the growth of healthy hair.

8. Fill a sixteen-ounce trigger-spray bottle with vodka and spray bees or wasps to kill them.

9 Pour one-half cup vodka and one-half cup water into a Ziploc freezer bag and freeze for a slushy, refreshing ice pack for aches, pain or black eyes.

10. Fill a clean, used mayonnaise jar with freshly packed lavender flowers, fill the jar with vodka, seal the lid tightly and set in the sun for three days. Strain liquid through a coffee filter, then apply the tincture to aches and pains.

11. To relieve a fever, use a washcloth to rub vodka on your chest and back as a liniment.

12. To cure foot odour, wash your feet with vodka.

13 Vodka will disinfect and alleviate a jellyfish sting.

14. Pour vodka over an area affected with poison ivy to remove the urushiol oil from your skin.

15. Swish a shot of vodka over an aching tooth. Allow your gums to absorb some of the alcohol to numb the pain.



1) Gmail - Free Email Service

Gmail is the Google approach to email and chat. Practically unlimited free online storage allows you to collect all your messages, and Gmail's simple but very smart interface lets you find them precisely and see them in context without effort. Unfortunately, Gmail does not offer IMAP, only POP access. Gmail also puts contextual advertising next to the emails you read.

***************

2) Inbox.com - Free Email Service


Inbox.com not only gives you 5 GB to store your mail online but also a highly polished, fast and functional way to access it via either the web (including speedy search, free-form labels and reading mail by conversation) or through POP in your email program.

***************

3) FastMail Guest Account - Free Email Service

FastMail is a great free email service with IMAP access, useful features, one of the best web-based email interfaces and few ads.

***************

4) Yahoo! Mail - Free Email Service

Yahoo! Mail is a comfortable, reliable and secure email service with a reasonable amount of storage. A pretty good spam filter keeps the junk out, and you can send rich emails using Yahoo! Mail's HTML editor.

***************

5) AIM Mail - Free Email Service

AIM Mail, AOL's free web-based email service, shines with 2 GB of online storage, very good spam protection and a rich, easy to use interface. Unfortunately, AIM Mail lacks a bit in productivity (no labels, smart folders and message threading), but makes up for some of that with very functional IMAP access.

***************

6) Windows Live Hotmail - Free Email Service

Windows Live Hotmail is a free email service that gives you a 2 GB of online storage, fast search, solid security and an interface easy as a desktop email program. When it comes to organizing mail, Windows Live Hotmail does not go beyond folders (to saved searches and tags, for example), its spam filter could be more effective, and POP or IMAP access are missing.

***************

7) HotPOP - Free Email Service

HotPOP offers free, reliable email accounts you can use with any email program using POP3 and SMTP. In addition, HotPOP lets you forward incoming messages to multiple other addresses. Unfortunately, HotPOP lacks IMAP access and a web-based email interface and is a bit short on storage space.

***************

8) Goowy mail - Free Email Service

Goowy mail is your rich Desktop email program on the web with a fast interface that lets you drag and drop, use context menus and enjoy lots of pleasant eye candy. In addition to email, goowy offers a calendar, an RSS feed reader and games done in a similar fashion. More features and online storage would do goowy mail good, though.

***************

9) BigString.com - Free Email Service

BigString.com is a free 1 GB email service that includes rich certified mail services and lets you expire or edit sent messages, for example. Unfortunately, BigString.com is not equally well equipped for handling incoming mail and lacks organizing tools.

***************

10) My Way Mail - Free Email Service


My Way Mail is a clean, fast and fun (though not particularly advanced) free email service.


***************
on Friday, April 10, 2009
When you get a new PC that contains the latest specifications offered in the market, you will always be thinking of speed. Normally, a new PC will perform up to par but if you notice, at some point it will deteriorate and slow down.

A lot has to do with the programs you install and use. The more programs you have on your PC, the larger the load will become. A PC user cannot help but install as they wish the programs that they have and normally it eats up space and adds to the usual processes that a standard computer has to run.

Once that happens, you can notice a decline in system performance. You may even think you have a worm or a virus inside. But while that would be a good conclusion, do consider the fact that there is such a thing as overdoing it when it comes to your computer capacity. No matter how large the hard drive may be, it remains that processors and memory chips also have their limitations.

That is perhaps the wrong notion that most people think. While it is apparent that some computers come out with awesome specs, they also have limitations. And depending on the type of program you use, the latest it is then the higher the specs needed.

Try to limit what you install. Avoid overloading your hard drive and of course your desktop. The decline in speed is normally because of this and before you know it, you may be depriving yourself of a good performing PC.
For sure, most of us will not be content with the current PC configuration that we have. Depending on the length of time that we have had our personal computers, we are bound to want more in terms of speed and features of personal computers offered in the market. But the real question is what in particular do we look for?

There are a lot of options we can think of today. Ranging from processor chips, memory modules and video cards, it may seem that the possibilities are endless. But considering that these upgrades carry costs, it would be wise to determine what you really need. There are some who go for overkill specs and traditionally these would not be put to full use. Some only need a computer for word processing or browsing the web. So how sophisticated of a specification would you need?

Others tend to be drawn into tempting sales talks from PC vendors. For example, you would seek a certain specs and the usual thing you would hear is for an extra couple of bucks, you can get this higher version. Some do it to help a buyer decide and get more value for their money while others just want a better sale. When these factors set in, you are bound to go for the higher priced and supposed higher specs.

But in the end, it all depends on you. You are the buyer and depending on your sound judgment, it will be you who will be paying for it. Think wisely and broadly and work on a budget.
We are familiar with the various third party programs that are offered and normally, we would have to consider their compatibility as far as systems are concerned. Normally, people would overlook the fact and assume that they are compatible with Windows XP or even Windows Vista. But while that is true, Windwos versions also vary and it would be wise to ask if they could function properly in between brands.

In fact, when we use device drivers, you can note that there are specific Windows system made for them. It does not necessarily follow that a device driver for Windows XP will also be recognized by that of a Windows Vista. They are different. The same holds true when you plan to install software such as graphics editing or programming software. You really have to check if they are compatible with you current Windows OS.

Windows Vista has so far been the culprit for these issues since it still lacks the perfection needed to accommodate most software needs and drivers. That is perhaps one reason why people are hesitant to shift towards Windows Vista. But give it time and for sure, we can see a smooth transition considering that Microsoft has always been known to address these problems.

All it needs is time for the Microsoft developers to find the loopholes and before you know it, your preferred software can be accommodated and used in your PC once more. The same holds true for device drivers which many today are having problems with. Just wait for the updates to creep in.
One thing you must love about Windows XP is that they have the system restore option active at times that makes it easier for you to restore at some point after you have properly backed up your system. But along with that backup includes problems such as infected files by viruses or Trojans. That is perhaps if you noticed, that sometimes, when you have to get rid of a dreaded virus, tutorials will tell you to temporarily turn off the system restore option to make sure that you don’t leave any trace of these infections.

But the question is on whether you really need the system restore turned on. Some would turn it off to be safe while others just leave it on. This is to avoid the problems of infections at times but if you are wise, it is best to leave it on, especially if you are not too technically savvy about tinkering your operating system.

A good practice to consider is to of course set a restore point and then turn off the system restore. But before you do, make sure that this restore point is virus free and reliable. That way, you can be sure that once something unfortunate occurs, you can always rely on your backed up system to get back online.

With the system restore turned on, a lot of issues can be avoided. While you may lose some current files, it is better to lose a few rather than reformatting the whole computer and lose a lot!
Often you would come across new software or operating systems like Microsoft Vista that assures you that they can run on previous PC hardware despite its high requirements prior to installation. Now the question that remains is on whether you will buy the claim or not?

Apparently as a PC user, you will not know if the claim is really true or not unless you try it. While some computers can accommodate them, there are the hidden lines that include actual performance rendering that has not been stressed. For sure, having a PC that was able to accommodate a previous Windows operating system like Windows XP will have its problems with an advanced and higher grade operating system. Issues such as processes and of course computer speed are bound to be the significant factors and as a PC user, you should place this into consideration.

With that said, would you wait to upgrade a computer before installing new software or take the risk? The safer way out is to really install these operating systems on a brand new PC with latest specs. It is not bad to improvise but if you demand high quality performance, save yourself the trouble of trying to make do with an old system that is bound to give way and perform below par.

Do take note that these are part of a marketing gimmick to save the PC companies from being unable to sell their old stock of computers. As a sign of reprieve, software manufacturers put that into consideration so make sure you avoid it.
It looks like Google is buckling down and seriously trying to penetrate the software market via its new product installment, the Google Chrome. Today, most computers come installed with the usual Internet Explorer but manufacturers are seriously considering shifting towards the Google Chrome for a change.

Microsoft has dominated the PC market for some time now but a lot of factors right now may be pushing some PC manufacturers towards considering a change of pre-installed programs. Among them include the bugs that new Microsoft software has been bringing, making life miserable for vendors as well since they will be the immediate people tasked to help out people experiencing these problems like system and driver incompatibilities.

Google has been known to go all out and it is reportedly trying to cater to other platforms as well like Linux and Mac. It gives you an idea on how dead serious Google is as far as expanding its niche and that is focused a lot on the software business.
If people had their way, as long as a memory module would fit onto the motherboard slot, they would install them. But wait. Memory modules also have their proper classifications as well. This dates back to the type of memory modules that are acceptable.

We look back at the Pentium III or IV. If you will recall, they had these tags of either a PC 100 or PC 133. To this day we see them still and one thing you will note, memory modules of a different kind do not work well together. You will notice this if you dare try. Other than seeing your operating system not loading properly, you will get tons of blue screens which will point to numbers which you may try to figure out.

While you are busy trying to determine which hardware component this may be, take out one of the memory modules and see if the blue screen will go away. If it does, then you are trying to do something that will be constantly giving you headaches.

At times when you may not even know which is the proper ram module to use, it would be best to try them one at a time. Module compatibility also depends on how the motherboard will accommodate them. After you have determined which specific module type is acceptable, then that is perhaps the best way to stick to the brand that suits your PC.

Testing memory modules will not really hurt your PC immediately. But if you are wise and cautious, it would be best to stick to the actual PC specs given and avoid experimenting for the proper well-being of your PC.
One thing about browsing these days, you may want to consider what type of browser you will be using. Normally, the Windows Internet Explorer would be the prime preference, considering it comes in by default with most Windows Operating systems upon installation. But if there is one thing you have to note, Microsoft will always be prone to security flaws and apparently there is one that has reportedly infected over 2 million computers today.

More than two million computers worldwide have been infected because of a major security flaw in Microsoft’s Internet Explorer web browser, the software giant admitted today.

The problem, first revealed last week, allows criminals to hijack computers and steal passwords if the user visits an infected website.

As many as 10,000 sites have already been compromised to take advantage of the flaw, according to anti-virus software producer Trend Micro.

So far the websites, mostly based in China, have largely been used to obtain computer game passwords which can be sold on the black market.




We are all aware that there are usually updates or patches sent out by Microsoft to its valued users. But timing is always essential. If you are late in attending to such a problem in security, that is a wide opening that a hacker will need. In this case, it is more of stealing gaming passwords that was the main agenda to which they profit by selling them in the market. That is only the lighter side of things.

Imagine these hackers being able to get their hands on other sensitive information like bank account or credit card numbers. The thought alone is scary and though we are aware that such activities exist, isn’t it wary to find out that Microsoft’s very own Internet Explorer can be made the bridge of it all?

So if you are using Internet Explorer at the moment, it would be wise to try out other browsers such as Firefox for the meantime. This is only temporary and knowing Microsoft, they will have this issue resolved in no time.
Everyone gets excited when there is a new operating system or software that Microsoft unveils in the market. But while most of the software that Bill Gates has introduced seem to always have bugs in them, it is quite interesting to note why the various operating systems that they unleash are always susceptible to bugs and patches.

It is understandable that operating systems are not immediately perfect once they are offered in the market. But it makes you wonder why Microsoft is always wants to distribute software that will always have its share of problems to which they should have foreseen. The answer here lies in a business aspect meaning if you are not updating your product line, your brand and image may fade fast if you don’t have another product up for release.

Knowing technology, this should always be ongoing. If you wait too long, the continuing process of product development may stand still and millions will be lost in the process.

Also, looking at the patches and service packs that Microsoft always announces, it can be seen as a form of marketing so that they can likewise keep track of who are using their products. How? Well have you ever wondered why aside from packaged service pack CD distribution, you are directed towards their site whenever patch updates are offered.

You can just imagine the load that their servers have to accommodate with practically the whole world having a Microsoft product in their home or office. But at least they know that the number of people who have bought their product are ranging from millions to billions.
Unless you are sure that your copy of Microsoft’s Operating System is genuine, you are best off turning those automatic updates off. Microsoft is serious in cracking down the pirated versions of their famous Windows XP and they have done this via the update service that normally comes with the operating system for patches.

This time around, once the Windows XP software has been found to be pirated, your computer will go completely black, rendering your computer useless. Now that is not a dirty way to deprive a computer owner of updates. In fact, it puts an end to “stealing” since why get something free as updates for a software that is pirated in the first place?

Depending on your stand, it would be best to avoid the updates if you are unsure of the validity of your Windows operating software. This is not really to warn Windows users on the use of pirated versions but merely informing you that your days of using these pirated operating systems are numbered.

We have heard this news sent out before. And while we may be looking for ways to avoid paying for an authentic copy of operating systems, bear in mind as well that Microsoft has stopped manufacturing and selling the Windows XP OS.

The new operating system in the market today is the Windows Vista. And while some hate it for now, better get used to it since you are really left with little options as far as operating system performance.
One thing about Windows XP that makes it a good system to use is the system restore option. But while it is present, not many people know how to use it properly. For people using a PC that don’t bother to set a restore point, chances are it is useless. Perhaps it can as far as placing you on the first day that you installed the operating system. Others turn it off, since among the issues would be contamination coming from viruses and malware that go along each time you backup your entire PC system.

System restore is the easiest way to get out of problems like crashes or failure to load of your OS. It sounds easy to do but the thing is it all depends on at which point you had backed up everything, including programs and files that you had made. So if there is something that may be a problem, it would be these two areas. But considering that you only need to install the programs and at the worst scenario, redo the files you had lost (assuming you did not save any backups).

In all, system restore is a privilege but there are people who would choose to format and install a fresh operating system. If you think of it, it is logical. If problems persist during your last use, then chances are they will occur again. It is hard to trace them but at least with a new formatted PC, you have lesser problems and correct the errors starting from scratch.
If you are using Windows XP, you may be surprised to find that after installing the Windows XP Service Pack 1, the succeeding ones are hard to install. For people who are unaware of the consequences of forcing the issue, the Windows Genuine checker will stop you from installing the Windows XP Service Pack 2. So if you cannot get past that, don’t expect to reach the Service Pack 3.

There are software (mostly pirated) that integrate the service packs to the Windows XP OS. Now that may be a good way to go about it but do remember that Microsoft is now on the prowl for pirated software and it can be detected using the update option to which the wiser ones have chosen to turn off.

But the real question is on whether you do need these service packs for a more stable operating system. There are issues such as driver issues and system crashes. Malware intrusion is another issue since some ports are prone to attacks if they are not covered. In a nutshell, PC users have little options as far as being able to choose of updating their OS for better security and updates or making do with their version that can be susceptible to viruses.

Such is a risk and price to pay for using pirated software. But if you don’t want to get caught, you are left with very little choices at this point. To avoid it all, just buy the genuine one and save yourself the trouble of legal and technical issues for your PC.
Windows Vista is an obvious flop. With all the praises that most people gave it when it first hit the market, Microsoft now finds itself trying to win back its customers no thanks to the defects and problems that this erring operating system has caused. And the savior’s name? Windows 7.

Expected to be shown at CES this coming January, rumor has it that Windows 7 will come out in three versions, namely:

• Windows Vista Home Premium Edition => Windows 7 Home Premium Edition
• Windows Vista Business Edition => Windows 7 Professional Edition
• Windows Vista Ultimate Edition => Windows 7 Ultimate Edition

Why you may ask? For one, operating systems cater to all levels. But one thing noticeably missing is the very basic version of the OS. We saw that in Windows Vista but it seems that it only caused a lot of problems rather than results. In fact, don’t be surprised if you see an upgrade version which allows current Windows XP users to upgrade straight to Windows 7 to avoid the issues with Vista.

But that remains to be seen. Microsoft has a lot of work to do to cover up the mess that Windows Vista caused. Many users reverted to Windows XP but do bear in mind that Windows XP is no longer available in the market.

Windows 7 has been programmed to use lesser resources. This should be welcome news to all Windows OS users. This was one of the issues with Windows Vista and apparently Microsoft has learned its lesson. Will Windows 7 click? Expect reviews and feedbacks once it hits the market in 2009.
Here’s a way to check if your computer RAM is having problem or it’s faulty.

Now usually there are signs that you should tell you that it leads to bad RAM. But if you are not sure what those signs are then it would take you a very long time since system diagnostics are pain! What would seem like a couple minutes of diagnosing would take about 2 hours or even days sometimes. You think you’ve located the problem and fixed it, later to find out that it leads to more problems, hence the cycle of diagnose, repair, testing repeats itself, you will find your self feeling nauseous.

The SIGNS of bad RAM


Remember when diagnosing PC components always start with the computer RAM.

* If you are plagued by the dreaded blue screen of death (BSoD), this is the time you ask yourself, ” There must be something wrong with my RAM”.
* Errors like PFN_LIST_CORRUPT and PAGE_FAULT_IN_NONPAGED_AREA and so on including include system stalls, reboots, and weird PC behavior are the signs of bad RAM.

If you think you have a problem with bad ram check it with these tools:

Speed Up My PC - (FREE Scan)

Uniblue’s Speed Up My PC repair tool will scan your RAM for errors plus automatically free up memory where it can on top of a slew of other very useful performance tweaks. It’s a free download so it is a great diagnostic tool to try before anything else.

Memtest86

It might be a little difficult or the average user, but it isn’t a bad way to check RAM. It is a useful tool, this app runs tests on your RAM, checking it out for errors.

Once you have the latest version of Memtest86, then make a diagnostic disk make it bootable, then boot from it. The cool thing about it is that it loads before the PC loads Windows drivers and such. Hence, No BSod! As Memtest86 run and diagnoses your PC, any suggestion or fixes it comes with would give a clear idea if you have bad or good RAM.

One last tip

Another thing to try would be to test one stick of RAM at a time. and test the stick(s) in each DIMM slot to rule out the possibility of a faulty slot, while also providing you with an opportunity to verify you’re using the correct slots for dual-channel operation.
As far as getting the habit of frequently changing themes, you cannot help but wonder if they would be a cause for occasional slowdowns of computers whenever they are in use. One thing we can note is the fact that they eat resources.

Unlike in the early days when you can simply change your desktop with standard themes, the new themes we use in Windows XP and Vista need larger resources. They are enhancements for people who want their computer to look unique and ideal to their eyes each time that they use them. For others however, the only important thing is being able to use your computer and get the work you need done.

For some, it may not matter. New computer specifications today allow them to enjoy the same speed and output although it may defeat the purpose of being faster when it comes to processing and resources used. Some would point towards the way of new operating system needs that slow down a computer and adding new Windows themes only aggravates it as well.

With these things in mind, we cannot avoid using some themes at some point. Perhaps modifying them according to what we want or in part can help avoid such problems in the end. It may become technical for some people who are not used to customizing themes on their desktop but if you want to maximize computer performance, you can do so by picking only some of the elements needed to make your computer stand out and be different from the rest.
Every few years, the standards that are associated with computer peripherals change. For example, the previous CD-Rom standards were upgraded to CD writers, then it became DVD drives and the now, the accepted standard are DVD writers.LCD monitors are the new standard in computer displays. Though they have not yet replaced CRT (cathode ray tube) monitors completely, LCD monitors are fast rising in popularity because of their extremely sleek looks, lower power consumption and more convenient footprint on a desk.

LCD monitors at this point are still quite expensive though and thus, extra care should be given to the unit so that it will maintain its pristine condition.

Probably the most important part that should be taken care of in an LCD monitor is the screen itself. The screen is not as tough as the glass tube of a CRT. If you have an LCD screen you will notice that only a clear, thick plastic separates your fingers from the actual components of the LCD. It is imperative that you take care of your LCD screen as much as possible and prevent it from being scratched.

There is a way though of repairing a scratched LCD screen though that is inexpensive and very easy. All you need is Vaseline petroleum jelly to fill the scratch on the LCD screen. This very simple remedy works because the optical density of Vaseline more closely matches the LCD face compared to air.

All you need to do is to clean the surface of the screen and then take some Vaseline and fill the scratch with it. Gently wipe off the excess Vaseline taking care not to wipe too forcefully so that you leave some inside the scratch.
some tips for Eye safety:

* Choose a monitor that tilts or swivels, and has both contrast and brightness controls.

* Arrange workstations and lighting to avoid reflected glare on the display screen or surrounding surfaces.

* Reorient the workstation so bright lights from open windows are at right angles with the computer screen.

* Set the computer monitor for dark characters on a light background; they are less affected by reflections than are light characters on a dark background.

* Sit about 20 inches from the computer monitor, a little farther away than reading distance, with the top of the screen at or below eye level.

* Adjust monitor angle and/or lighting to reduce neck/eye strain; adjust screen intensity for sharper images.

* Place your screen and document holder at the same distance from the eye to avoid frequent refocusing and movement of the neck or back.

* Take periodic rest breaks, and try to blink often to keep your eyes from drying out.

To Avoid back pain:

Most back problems that occur in the workplace are caused by physical stress, such as being in an awkward position for a long time, making the same motions over and over, and simply using your back too much. These injuries can cause stress and strain on muscles, nerves, tendons, joints, blood vessels, or spinal discs.

Arrange your work to help prevent work-related injuries. It is important to position yourself so that you can sit comfortably and minimize stress on any one area of your body. Change your positions and tasks as often as possible, and match tools to your size and preferences. If you are doing a job or task that requires you to sit for long periods, get up and stretch and move around at least once an hour.
on Thursday, April 9, 2009
It was yesterday when a girl in my college was telling Us about a stranger who had been harassing her over phone. Ever Faced This Situation ? Who doesn’t have an orkut profile ? I guess 99 out of 100 in a College Class. But how many follow the basic rules to stay safe and protected on Social Networking Sites. Nowadays, its common about hearing some girl being harassed with phone calls from her online friend and such stuff. Well, in case if you want to stay away from the problems you have to keep in mind some rules.


Some Rules to keep in mind to keep yourself safe on social networking sites:

1. The more information you put about yourself, the more vulnerable you could be. So choose what you want to put up. But some things are better not put up at all. Your orkut profile of a girladdress, phone numbers, and bank account or credit card numbers, for example. If someone asks you for it, don’t give it out without giving any thought to it. If you are uncomfortable about sharing some information, don’t share it.


2. If all your friends are on some cool new SN site, that does not mean that you have to join in blindly too. Explore how it works, and the level of security and privacy allowed. Check the privacy policies of the sites you sign up for so that you know whom to report if any online abuse occurs.


3. Be sure to read through the policies and understand how the information you have put up is likely to be used. How does the site handle referrals? Can the IDs of your friends be given out to others, which could include potential spammers?


4.Can all and sundry visit your site, or do you have options to control access? Start with controlled access to your information and that too only to people you know, and when you are comfortable with how the site works, you can explore loosening some of the controls.


6. Do not believe everything people post on their web sites. They may not be what they claim to be. So if you don’t know them, it’s best to avoid getting friendly with them. Some Can Even Create your Fake Profile - What to Do Then ?.


7. Be careful if a new online friend wants to meet you. Make sure you meet him in a public place during the day and take along a friend or family member along with you.


8. If you ever feel threatened by anyone or anything online, discuss it with friends, family or colleagues and inform the police if required.


9. Do not always run applications and fun stuff being circulated on the SN site. They could be viruses or Trojans which could harm your computer or the data on it.
This is a post, In case you didn't know how to connect your PC or Laptop to the internet using your Vodafone mobile connection in India. (It may work for other countries also). Many people actually don't know about this method. This is also called the Dial-Up process of connecting to the Internet. The process is very simple...


You need:
(1) A vodafone connection in India
(2) A Bluetooth enabled mobile phone with GPRS facility.
(3) A Personal Computer or Laptop.
(4) Bluetooth Dongle.


Steps:
(1) Delete all the internet profiles (if any) from your mobile phone.
(2) Delete all the data accounts (if any) from your mobile phone.
(3) Send the message WWW to 52586
(4) Save the settings that you receive.
(5) Connect your PC/Laptop to the mobile phone using the Bluetooth software.
(6) In the software (given in the CD which came with the mobile), select the option resembling “Connect to Internet”.
(7) Provide the number to dial as *99***1# and dial.
(8) You will be connected to the internet.
This procedure was tested from Hyderabad, Andhra Pradesh and it worked fine. If you know of any different procedure for any other locale, please comment below.
Youtube one of Biggest and Best video files sharing website which has giant collection of videos library. You can spend hours on YouTube while surfing thru your favorite videos. The only problem with YouTube is unavailability of Videos in various format like dvd, mp3, mp4, flv, mov etc. for downloading.

In case if you need to convert YouTube video in any of above format then first you need to download that YouTube video then using any YouTube video converting tool convert it into desired format. Does this sounds tedious and time consuming task, If yes the use catchyoutube.com.

CatchYouTube.com lets you to directly download YouTube video in your favorite fomate. CatchYouTube is a web service which converts YouTube video online in dvd,flv,mp3,mp4,mov,wav,3gp format and lets you to download that video.


Supported Formats:

* Windows (.mpg)
* Mac (.mov)
* DVD (.dvd)
* iPod/PSP/iPhone (.mp4)
* Mobile (.3gp)
* Audio Only (.mp3)
* Audio (.wav)
* Flash (.flv)

You just need to provide YouTube Video URL to CatchYouTube.com and set the output Video Format that’s it, CatchYouTube converts the YouTube video online and provides the Download link for Output YouTube Video.
Before you start making mistakes that could cost you the life of your precious new computer, you had better learn some computer repair tips how to take care of your new arrival. The things you do to your computer now will determine how long your computer will last without crashing.Never EVER Switch Off your Computer without waiting for Windows to Shut it Down.This is the most important tip for computer maintenance, since it may cause permanent hard drive defects caused by the hard drive heads contacting the surface of the disc drive and cause a host of Windows problems.


10 Easy Better Computer Maintenance Tips :

1) Remove Junk Files :
Important when talking about computer maintenance. Over the course of time, your computer accumulates unwanted and un-removed junk files that are no longer necessary. These junk files remain unused by the operating system, but occupy much disk space.


2) Defragment Every Month :
When software is installed many files are installed onto your computer in all sorts of places. So, when that software is opened or a particular file is opened the computer has to search all over the hard drive to find all of the necessary parts to open. Defragmenting your hard drive will get all of those pieces and put them in some sort of a logical order increasing the speed at which your computer can work.

Defragmenting your hard drive is a very simple process, follow the steps below for XP

* Open "My Computer" & Right-clicking the Local Disk (C:) & Select Properties
* Click the Tools tab at the top of the window & Select "Defragment Now" button

Windows Vista is pretty much the same steps.


3) Update your Antivirus Regularly :
Anti-Virus Software for computer maintenance is really only as good as the last time you updated it. New viruses, worms, and other threats are created by cyber terrorists and discovered everyday. If you updated your antivirus software yesterday, and a new virus is found today, your software won't protect you.


4) Have a Firewall Installed :
A firewall is a program or software that prevents malicious attacks coming from the internet from penetrating your computer or network. There are millions of "zombie computers" in the net that are all the time scanning for other computers connected to the internet that have security holes. Without a firewall, a computer that is connected to the internet is highly vulnerable to attacks and can be infected within twenty minutes.


5) Remove Uninstall Unwanted Programs :
This procedure will ensure you are utilizing smaller amounts of area on your hard disk and your computer will run faster and smoother. This type of computer maintenance will ensure that your PC is running at its highest performance!

* Click on your start button and click on your control panel.
* Go to add/remove programs.


6) Keep Off Dust & Dirt from the CPU Cabinet :
Open up the back of your CPU. Use a can of compressed air and an anti-static cloth to clean the dust. Hold the can vertically and spray air such that dust is not sprayed on other parts of the CPU and the circuits. Now use the anti-static cloth to clean off the dust.


7) Keep it Cool :
A computer's components produce large amounts of heat during a PC's normal operation. Always try to keep your CPU in a place in the room where the flow of air is always maintained. This will make the system breathe the fresh air. This is so in order to keep your system cool and a bit down in temperature.


8) Improving Hardware (RAM) :
Sometimes, its the most smartest option for computer maintenance is hardware upgrade. Since a RAM upgrade costs very less but the results are good. The performance of a PC highly Increases when you have 2GB of RAM along with a Good Processor.


9) Computer Maintenance for Self :
We all know that every one like to stay several hours in front of the computer. For this reason we must get used to maintain proper posture and pausing to relax the body and mind. One should know


10) Look For more Resources about Computer Maintenance Tips :

There are various suggestions and computer maintenance tips posted in many blogs and site. Be sure to read them too.
on Sunday, April 5, 2009



What is Twitter-
Twitter is a microblogging service, You can use it for many perposes like connecting with your friends, co-workers, but here we will talk about using it for our benefit, that will improve (y)our tech life and your knowledge. Some people always think from where Other's find Updates, News etc. So the answer is Twitter.

Why to Use Twitter-

As I said already, Use it for improving your tech knowlege(You can use it in any way, but we suggest you to use it for some good thing), Twitter is somehow like Orkut, but @orkut, We waste our time with our friends or We talk on different issues in communities(Which is the only good use of Orkut and is similar to Twitter), NOw, answer to this question is that, every tech geek and every big tech. organization/company use it(Yes, even google)

What are benefits of it -
First benefit is, it increases your knowledge, Get NEWS from big sites or compnies at a go, secondly drive a high Traffic to your blog/site with it (It is true, It really helped me to drive high traffic to my blog, and it helps me to get a Google PageRank), And also It helps you to become popular in the tech. world.


What to post at Twitter-
Post what you like , all posts from your blog, from your freind's blog, you can also re-post from your followers tweets , by modifying them a bit or the same, you just need to be active there.

In this thread, we will be providing you the best articles on Twitter, How to get success at this platform etc.

When you start using it, You will automatically start posting usefull content here, so be ready for the new world of information
on Saturday, April 4, 2009


April 1 has come and gone, and the Internet has not disintegrated and no major cyber-attacks were reported. But Conficker still remains a threat. Now don't panic, this doesn't mean cyber-Armageddon could strike at any minute, it just means you need to make sure your computer is fully updated if it isn't already. Feel better? Good, then let's take a look at what's going on.

Why It Ain't Over Yet

The Conficker Working Group -- which is made up of 27 tech companies and agencies including AOL, F-Secure, Facebook, ICANN, Kaspersky, McAffee, Microsoft, Symantec -- says that Conficker, also known as Downup, Downadup, and Kido, is the largest worldwide computer infection since the SQL Slammer in 2003. The CWG estimates anywhere from 3 to 15 million computers are infected worldwide, and says 30 percent of Windows computers across the globe are not updated with the latest patches to protect against Conficker. The virus authors are also still at large and able to communicate with Conficker, although that capability has been significantly reduced.



What Conficker is Doing


Yesterday, Conficker began its daily exercise of contacting 500 Web sites from a randomly generated list of 50,000 sites. Conficker will continue to do this every day until it receives instructions to do something else. Further instructions could be a simple software update or the infected computers could work as a botnet to commit theft or attack other computer networks. The problem is that while security and IT professionals are working to block Conficker from getting further instructions, they haven't been able to block all Conficker traffic. So some infected machines have gotten through, but luckily further instructions haven't been issued, yet. Conficker's authors may be laying low until publicity surrounding Conficker dies down before contacting their creation.

If Conficker is updated or receives further instructions, that capability could pass between infected machines without further need of a server or Web site, because Conficker uses a peer-to-peer (p2p) protocol to communicate with other infected machines. That's right, Conficker is file-sharing. With p2p, the worm can distribute software updates much faster than if every infected machine had to communicate with a main server.

The Final Countdown?

Does this mean the world could still end? Probably not, and that was never the concern with Conficker despite the doomsday scenarios you may have read. The fact is that most security experts believe that Conficker is just a typical botnet worm that can be used for identity theft or to commit other forms of cybercrime. Conficker is most likely controlled by an organized crime syndicate in Asia, Eastern Europe, or South America, and the group may even rent out Conficker's capabilities if the botnet every becomes active.

Conficker is a threat only if your computer does not have the latest security patches from Microsoft and an up-to-date antivirus program.