Savitabhahi.com new Version Our Dear SavitaBhabhi Has a New Home (NSFW)

This summary is not available. Please click here to view the post.

Keep Folders Hidden

First create a new folder somewhere on your hard drivewhen you name it hold down "Alt" and press "0160" this will create and invisible space so it will apper as if it has no name.

then right click in and select "Properties" select the tab "coustimize" and select "change icon" scroll along and you should a few blanc spaces click on any one and click ok when you hav saved the settings the folder will be invisible to hide all your personal files

HOW TO CHANGE THE CMOS BATTERY

The inside of a computer is a bad place full of electricity and sharp edges.

On the electricity side always when working on you computer make sure that it’s still plugged in to the power socket and the power is turned off, this is to ensure that any static From you is discharged through the earth. The inside of most computer cases are unfinished metal and has very sharp edges so be careful.

The first signs of a battery failing are:-

1) your clock starts running slowly
2) when you boot (start) your computer it has a problem finding your hardware (no hard drive, no cd rom)

To change the battery you need the following tools

1) a X-point screwdriver
2) an anti-static strap(optional)
3) a new battery (seems logical)

Then unplug all the cables from the back of the computer as you remove them make a note where they came from. (So when you finished you can put them back)

Move the computer somewhere where you can work on it with ease

Remove the cover by locating the screws around the outer edge (back) of the computer
Some computer cases only require you to remove 2 screws on one side then a panel can be removed allowing you access to the computers insides, others you must remove 6 screws and remove the whole case by sliding it to the rear and lifting it off.

Now make sure that you read the safety instructions about static.
Look inside you will see a round silver thing that looks about the size of a 10p piece (quarter). This is the battery itself, carefully lift the retaining clip and slide the battery out. That’s it removed now go to your local computer retailer, electrical retailer (Tandy/Radio shack) taking the old battery with you and get a new battery.

Back to your computer insert the new battery by lifting the clip and sliding the battery in.

Reinstall your case and plug all the cables back (you did remember to label them didn’t you)

Now for the fun part.

You will now need to go into you bios….

Right the bios is the god of your computer.

To access it, when your computer first starts you will see a black screen with white text.

If you look carefully you will see a line that says something like "press del for setup" or some other key (F2 or ESC or tab) this will take you to god's house where you can make lots of changes to the way your machine works.

It is also the place where you can make your nice computer in to a rather expensive door stop so be careful and don’t go playing with anything.

You will now be presented with a blue screen with a lot of options on it,
The one we want is load optimised/default settings.

Press the F10 key and type y the computer should now reboot.

If every thing went well then your computer will now be up and running.

Google secrets

method 1
?ww.google.com

put this string in google search:

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Notice that i am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.


method 2
?ww.google.com

put this string in google search:

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson

Evolution & Devlopment Of Computer Virus.

Like any other field in computer science, viruses have evolved -a great deal indeed- over the years. In the series of press releases which start today, we will look at the origins and evolution of malicious code since it first appeared up to the present.

Going back to the origin of viruses, it was in 1949 that Mathematician John Von Neumann described self-replicating programs which could resemble computer viruses as they are known today. However, it was not until the 60s that we find the predecessor of current viruses. In that decade, a group of programmers developed a game called Core Wars, which could reproduce every time it was run, and even saturate the memory of other players’ computers. The creators of this peculiar game also created the first antivirus, an application named Reeper, which could destroy copies created by Core Wars.

However, it was only in 1983 that one of these programmers announced the existence of Core Wars, which was described the following year in a prestigious scientific magazine: this was actually the starting point of what we call computer viruses today.

At that time, a still young MS-DOS was starting to become the preeminent operating system worldwide. This was a system with great prospects, but still many deficiencies as well, which arose from software developments and the lack of many hardware elements known today. Even like this, this new operating system became the target of a virus in 1986: Brain, a malicious code created in Pakistan which infected boot sectors of disks so that their contents could not be accessed. That year also saw the birth of the first Trojan: an application called PC-Write.

Shortly after, virus writers realized that infecting files could be even more harmful to systems. In 1987, a virus called Suriv-02 appeared, which infected COM files and opened the door to the infamous viruses Jerusalem or Viernes 13. However, the worst was still to come: 1988 set the date when the “Morris worm” appeared, infecting 6,000 computers.

From that date up to 1995 the types of malicious codes that are known today started being developed: the first macro viruses appeared, polymorphic viruses … Some of these even triggered epidemics, such as MichaelAngelo. However, there was an event that changed the virus scenario worldwide: the massive use of the Internet and e-mail. Little by little, viruses started adapting to this new situation until the appearance, in 1999, of Melissa, the first malicious code to cause a worldwide epidemic, opening a new era for computer viruses.



part 2


This second installment of ‘The evolution of viruses’ will look at how malicious code used to spread before use of the Internet and e-mail became as commonplace as it is today, and the main objectives of the creators of those earlier viruses.
Until the worldwide web and e-mail were adopted as a standard means of communication the world over, the main mediums through which viruses spread were floppy disks, removable drives, CDs, etc., containing files that were already infected or with the virus code in an executable boot sector.

When a virus entered a system it could go memory resident, infecting other files as they were opened, or it could start to reproduce immediately, also infecting other files on the system. The virus code could also be triggered by a certain event, for example when the system clock reached a certain date or time. In this case, the virus creator would calculate the time necessary for the virus to spread and then set a date –often with some particular significance- for the virus to activate. In this way, the virus would have an incubation period during which it didn’t visibly affect computers, but just spread from one system to another waiting for ‘D-day’ to launch its payload. This incubation period would be vital to the virus successfully infecting as many computers as possible.

One classic example of a destructive virus that lay low before releasing its payload was CIH, also known as Chernobyl. The most damaging version of this malicious code activated on April 26, when it would try to overwrite the flash-BIOS, the memory which includes the code needed to control PC devices. This virus, which first appeared in June 1998, had a serious impact for over two years and still continues to infect computers today.

Because of the way in which they propagate, these viruses spread very slowly, especially in comparison to the speed of today’s malicious code. Towards the end of the Eighties, for example, the Friday 13th (or Jerusalem) virus needed a long time to actually spread and continued to infect computers for some years. In contrast, experts reckon that in January 2003, SQLSlammer took just ten minutes to cause global communication problems across the Internet.

Notoriety versus stealth

For the most part, in the past, the activation of a malicious code triggered a series of on screen messages or images, or caused sounds to be emitted to catch the user’s attention. Such was the case with the Ping Pong virus, which displayed a ball bouncing from one side of the screen to another. This kind of elaborate display was used by the creator of the virus to gain as much notoriety as possible. Nowadays however, the opposite is the norm, with virus authors trying to make malicious code as discreet as possible, infecting users’ systems without them noticing that anything is amiss.



pat 3


This third installment of ‘The evolution of viruses’ will look at how the Internet and e-mail changed the propagation techniques used by computer viruses.

Internet and e-mail revolutionized communications. However, as expected, virus creators didn’t take long to realize that along with this new means of communication, an excellent way of spreading their creations far and wide had also dawned. Therefore, they quickly changed their aim from infecting a few computers while drawing as much attention to themselves as possible, to damaging as many computers as possible, as quickly as possible. This change in strategy resulted in the first global virus epidemic, which was caused by the Melissa worm.

With the appearance of Melissa, the economic impact of a virus started to become an issue. As a result, users -above all companies- started to become seriously concerned about the consequences of viruses on the security of their computers. This is how users discovered antivirus programs, which started to be installed widely. However, this also brought about a new challenge for virus writers, how to slip past this protection and how to persuade users to run infected files.

The answer to which of these virus strategies was the most effective came in the form of a new worm: Love Letter, which used a simple but effective ruse that could be considered an early type of social engineering. This strategy involves inserting false messages that trick users into thinking that the message includes anything, except a virus. This worm’s bait was simple; it led users to believe that they had received a love letter.

This technique is still the most widely used. However, it is closely followed by another tactic that has been the center of attention lately: exploiting vulnerabilities in commonly used software. This strategy offers a range of possibilities depending on the security hole exploited. The first malicious code to use this method –and quite successfully- were the BubbleBoy and Kakworm worms. These worms exploited a vulnerability in Internet Explorer by inserting HTML code in the body of the e-mail message, which allowed them to run automatically, without needing the user to do a thing.

Vulnerabilities allow many different types of actions to be carried out. For example, they allow viruses to be dropped on computers directly from the Internet -such as the Blaster worm-. In fact, the effects of the virus depend on the vulnerability that the virus author tries to exploit.



part 4


In the early days of computers, there were relatively few PCs likely to contain “sensitive” information, such as credit card numbers or other financial data, and these were generally limited to large companies that had already incorporated computers into working processes.

In any event, information stored in computers was not likely to be compromised, unless the computer was connected to a network through which the information could be transmitted. Of course, there were exceptions to this and there were cases in which hackers perpetrated frauds using data stored in IT systems. However, this was achieved through typical hacking activities, with no viruses involved.

The advent of the Internet however caused virus creators to change their objectives, and, from that moment on, they tried to infect as many computers as possible in the shortest time. Also, the introduction of Internet services -like e-banking or online shopping- brought in another change. Some virus creators started writing malicious codes not to infect computers, but, to steal confidential data associated to those services. Evidently, to achieve this, they needed viruses that could infect many computers silently.

Their malicious labor was finally rewarded with the appearance, in 1986, of a new breed of malicious code generically called “Trojan Horse”, or simply “Trojan”. This first Trojan was called PC-Write and tried to pass itself off as the shareware version of a text processor. When run, the Trojan displayed a functional text processor on screen. The problem was that, while the user wrote, PC-Write deleted and corrupted files on the computers’ hard disk.

After PC-Write, this type of malicious code evolved very quickly to reach the stage of present-day Trojans. Today, many of the people who design Trojans to steal data cannot be considered virus writers but simply thieves who, instead of using blowtorches or dynamite have turned to viruses to commit their crimes. Ldpinch.W or the Bancos or Tolger families of Trojans are examples of this


part 5


Even though none of them can be left aside, some particular fields of computer science have played a more determinant role than others with regard to the evolution of viruses. One of the most influential fields has been the development of programming languages.

These languages are basically a means of communication with computers in order to tell them what to do. Even though each of them has its own specific development and formulation rules, computers in fact understand only one language called "machine code".

Programming languages act as an interpreter between the programmer and the computer. Obviously, the more directly you can communicate with the computer, the better it will understand you, and more complex actions you can ask it to perform.

According to this, programming languages can be divided into "low and high level" languages, depending on whether their syntax is more understandable for programmers or for computers. A "high level" language uses expressions that are easily understandable for most programmers, but not so much for computers. Visual Basic and C are good examples of this type of language.

On the contrary, expressions used by "low level" languages are closer to machine code, but are very difficult to understand for someone who has not been involved in the programming process. One of the most powerful, most widely used examples of this type of language is "assembler".

In order to explain the use of programming languages through virus history, it is necessary to refer to hardware evolution. It is not difficult to understand that an old 8-bit processor does not have the power of modern 64-bit processors, and this of course, has had an impact on the programming languages used.

In this and the next installments of this series, we will look at the different programming languages used by virus creators through computer history:

- Virus antecessors: Core Wars

As was already explained in the first chapter of this series, a group of programs called Core Wars, developed by engineers at an important telecommunications company, are considered the antecessors of current-day viruses. Computer science was still in the early stages and programming languages had hardly developed. For this reason, authors of these proto-viruses used a language that was almost equal to machine code to program them.

Curiously enough, it seems that one of the Core Wars programmers was Robert Thomas Morris, whose son programmed -years later- the "Morris worm". This malicious code became extraordinarily famous since it managed to infect 6,000 computers, an impressive figure for 1988.

- The new gurus of the 8-bits and the assembler language.

The names Altair, IMSAI and Apple in USA and Sinclair, Atari and Commodore in Europe, bring memories of times gone by, when a new generation of computer enthusiasts "fought" to establish their place in the programming world. To be the best, programmers needed to have profound knowledge of machine code and assembler, as interpreters of high-level languages used too much run time. BASIC, for example, was a relatively easy to learn language which allowed users to develop programs simply and quickly. It had however, many limitations.

This caused the appearance of two groups of programmers: those who used assembler and those who turned to high-level languages (BASIC and PASCAL, mainly).

Computer aficionados of the time enjoyed themselves more by programming useful software than malware. However, 1981 saw the birth of what can be considered the first 8-bit virus. Its name was "Elk Cloner", and was programmed in machine code. This virus could infect Apple II systems and displayed a message when it infected a computer.



part 6


Computer viruses evolve in much the same way as in other areas of IT. Two of the most important factors in understanding how viruses have reached their current level are the development of programming languages and the appearance of increasingly powerful hardware.

In 1981, almost at the same time as Elk Kloner (the first virus for 8-bit processors) made its appearance, a new operating system was growing in popularity. Its full name was Microsoft Disk Operating System, although computer buffs throughout the world would soon refer to it simply as DOS.

DOS viruses

The development of MS DOS systems occurred in parallel to the appearance of new, more powerful hardware. Personal computers were gradually establishing themselves as tools that people could use in their everyday lives, and the result was that the number of PCs users grew substantially. Perhaps inevitably, more users also started creating viruses. Gradually, we witnessed the appearance of the first viruses and Trojans for DOS, written in assembler language and demonstrating a degree of skill on the part of their authors.

Far less programmers know assembler language than are familiar with high-level languages that are far easier to learn. Malicious code written in Fortran, Basic, Cobol, C or Pascal soon began to appear. The last two languages, which are well established and very powerful, are the most widely used, particularly in their TurboC and Turbo Pascal versions. This ultimately led to the appearance of “virus families”: that is, viruses that are followed by a vast number of related viruses which are slightly modified forms of the original code.

Other users took the less ‘artistic’ approach of creating destructive viruses that did not require any great knowledge of programming. As a result, batch processing file viruses or BAT viruses began to appear.

Win16 viruses

The development of 16-bit processors led to a new era in computing. The first consequence was the birth of Windows, which, at the time, was just an application to make it easier to handle DOS using a graphic interface.

The structure of Windows 3.xx files is rather difficult to understand, and the assembler language code is very complicated, as a result of which few programmers initially attempted to develop viruses for this platform. But this problem was soon solved thanks to the development of programming tools for high-level languages, above all Visual Basic. This application is so effective that many virus creators adopted it as their ‘daily working tool’. This meant that writing a virus had become a very straightforward task, and viruses soon appeared in their hundreds. This development was accompanied by the appearance of the first Trojans able to steal passwords. As a result, more than 500 variants of the AOL Trojan family -designed to steal personal information from infected computers- were identified.

part 7

This seventh edition on the history of computer viruses will look at how the development of Windows and Visual Basic has influenced the evolution of viruses, as with the development of these, worldwide epidemics also evolved such as the first one caused by Melissa in 1999.

While Windows changed from being an application designed to make DOS easier to manage to a 32-bit platform and operating system in its own right, virus creators went back to using assembler as the main language for programming viruses.

Versions 5 and 6 of Visual Basic (VB) were developed, making it the preferred tool, along with Borland Delphi (the Pascal development for the Windows environment), for Trojan and worm writers. Then, Visual C, a powerful environment developed in C for Windows, was adopted for creating viruses, Trojans and worms. This last type of malware gained unusual strength, taking over almost all other types of viruses. Even though the characteristics of worms have changed over time, they all have the same objective: to spread to as many computers as possible, as quickly as possible.

With time, Visual Basic became extremely popular and Microsoft implemented part of the functionality of this language as an interpreter capable of running script files with a similar syntax.

At the same time as the Win32 platform was implemented, the first script viruses also appeared: malware inside a simple text file. These demonstrated that not only executable files (.EXE and .COM files) could carry viruses. As already seen with BAT viruses, there are also other means of propagation, proving the saying "anything that can be executed directly or through a interpreter can contain malware." To be specific, the first viruses that infected the macros included in Microsoft Office emerged. As a result, Word, Excel, Access and PowerPoint become ways of spreading ‘lethal weapons’, which destroyed information when the user simply opened a document.

Melissa and self-executing worms

The powerful script interpreters in Microsoft Office allowed virus authors to arm their creations with the characteristics of worms. A clear example is Melissa, a Word macro virus with the characteristics of a worm that infects Word 97 and 2000 documents. This worm automatically sends itself out as an attachment to an e-mail message to the first 50 contacts in the Outlook address book on the affected computer. This technique, which has unfortunately become very popular nowadays, was first used in this virus which, in 1999, caused one of the largest epidemics in computer history in just a few days. In fact, companies like Microsoft, Intel or Lucent Technologies had to block their connections to the Internet due to the actions of Melissa.

The technique started by Melissa was developed in 1999 by viruses like VBS/Freelink, which unlike its predecessor sent itself out to all the contacts in the address book on the infected PC. This started a new wave of worms capable of sending themselves out to all the contacts in the Outlook address book on the infected computer. Of these, the worm that most stands out from the rest is VBS/LoveLetter, more commonly known as ‘I love You’, which emerged in May 2000 and caused an epidemic that caused damage estimated at 10,000 million euros. In order to get the user’s attention and help it to spread, this worm sent itself out in an e-mail message with the subject ‘ILOVEYOU’ and an attached file called ‘LOVE-LETTER-FOR-YOU.TXT.VBS’. When the user opened this attachment, the computer was infected.

As well as Melissa, in 1999 another type of virus emerged that also marked a milestone in virus history. In November of that year, VBS/BubbleBoy appeared, a new type of Internet worm written in VB Script. VBS/BubbleBoy was automatically run without the user needing to click on an attached file, as it exploited a vulnerability in Internet Explorer 5 to automatically run when the message was opened or viewed. This worm was followed in 2000 by JS/Kak.Worm, which spread by hiding behind Java Script in the auto-signature in Microsoft Outlook Express, allowing it to infect computers without the user needing to run an attached file. These were the first samples of a series of worms, which were joined later on by worms capable of attacking computers when the user is browsing the Internet.

COMPUTER ACRONYMS

COMPUTER ACRONYMS


==A==
ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended

--- B ---
BFG - BFG Technologies
BIOS - Basic Input Output System
BNC - Barrel Nut Connector

--- C ---
CAS - Column Address Signal
CD - Compact Disk
CDR - Compact Disk Recorder
CDRW - Compact Disk Re-Writer
CD-ROM - Compact Disk - Read Only Memory
CFM - Cubic Feet per Minute (ft�/min)
CMOS - Complementary Metal Oxide Semiconductor
CPU - Central Processing Unit
CTX - CTX Technology Corporation (Commited to Excellence)

--- D ---

DDR - Double Data Rate
DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
DFI - DFI Inc. (Design for Innovation)
DIMM - Dual Inline Memory Module
DRAM - Dynamic Random Access Memory
DPI - Dots Per Inch
DSL - See ASDL
DVD - Digital Versatile Disc
DVD-RAM - Digital Versatile Disk - Random Access Memory

--- E ---
ECC - Error Correction Code
ECS - Elitegroup Computer Systems
EDO - Extended Data Out
EEPROM - Electrically Erasable Programmable Read-Only Memory
EPROM - Erasable Programmable Read-Only Memory
EVGA - EVGA Corporation

--- F ---
FC-PGA - Flip Chip Pin Grid Array
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FPS - Frame Per Second
FPU - Floating Point Unit
FSAA - Full Screen Anti-Aliasing
FS - For Sale
FSB - Front Side Bus

--- G ---
GB - Gigabytes
GBps - Gigabytes per second or Gigabits per second
GDI - Graphical Device Interface
GHz - GigaHertz

--- H ---
HDD - Hard Disk Drive
HIS - Hightech Information System Limited
HP - Hewlett-Packard Development Company
HSF - Heatsink-Fan

--- I ---
IBM - International Business Machines Corporation
IC - Integrated Circuit
IDE - Integrated Drive Electronics
IFS- Item for Sale
IRQ - Interrupt Request
ISA - Industry Standard Architecture
ISO - International Standards Organization

--- J ---
JBL - JBL (Jame B. Lansing) Speakers
JVC - JVC Company of America

- K ---
Kbps - Kilobits Per Second
KBps - KiloBytes per second

--- L ---
LG - LG Electronics
LAN - Local Area Network
LCD - Liquid Crystal Display
LDT - Lightning Data Transport
LED - Light Emitting Diode

--- M ---
MAC - Media Access Control
MB � MotherBoard or Megabyte
MBps - Megabytes Per Second
Mbps - Megabits Per Second or Megabits Per Second
MHz - MegaHertz
MIPS - Million Instructions Per Second
MMX - Multi-Media Extensions
MSI - Micro Star International

--- N ---
NAS - Network Attached Storage
NAT - Network Address Translation
NEC - NEC Corporation
NIC - Network Interface Card

--- O ---
OC - Overclock (Over Clock)
OCZ - OCZ Technology
OEM - Original Equipment Manufacturer

--- P ---
PC - Personal Computer
PCB - Printed Circuit Board
PCI - Peripheral Component Interconnect
PDA - Personal Digital Assistant
PCMCIA - Peripheral Component Microchannel Interconnect Architecture
PGA - Professional Graphics Array
PLD - Programmable Logic Device
PM - Private Message / Private Messaging
PnP - Plug 'n Play
PNY - PNY Technology
POST - Power On Self Test
PPPoA - Point-to-Point Protocol over ATM
PPPoE - Point-to-Point Protocol over Ethernet
PQI - PQI Corporation
PSU - Power Supply Unit

--- R ---
RAID - Redundant Array of Inexpensive Disks
RAM - Random Access Memory
RAMDAC - Random Access Memory Digital Analog Convertor
RDRAM - Rambus Dynamic Random Access Memory
ROM - Read Only Memory
RPM - Revolutions Per Minute

--- S ---
SASID - Self-scanned Amorphous Silicon Integrated Display
SCA - SCSI Configured Automatically
SCSI - Small Computer System Interface
SDRAM - Synchronous Dynamic Random Access Memory
SECC - Single Edge Contact Connector
SODIMM - Small Outline Dual Inline Memory Module
SPARC - Scalable Processor ArChitecture
SOHO - Small Office Home Office
SRAM - Static Random Access Memory
SSE - Streaming SIMD Extensions
SVGA - Super Video Graphics Array
S/PDIF - Sony/Philips Digital Interface

--- T ---
TB - Terabytes
TBps - Terabytes per second
Tbps - Terabits per second
TDK - TDK Electronics
TEC - Thermoelectric Cooler
TPC - TipidPC
TWAIN - Technology Without An Important Name

--- U ---
UART - Universal Asynchronous Receiver/Transmitter
USB - Universal Serial Bus
UTP - Unshieled Twisted Pair

--- V ---
VCD - Video CD
VPN - Virtual Private Network

--- W ---
WAN - Wide Area Network
WTB - Want to Buy
WYSIWYG - What You See Is What You Get

--- X ---
XGA - Extended Graphics Array
XFX - XFX Graphics, a Division of Pine
XMS - Extended Memory Specification
XT - Extended Technology

BEST KEYBOARD SHORTCUTS

Windows key + R = Run menu

This is usually followed by:
cmd = Command Prompt
iexplore + "web address" = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Services
eventvwr = Event Viewer
dsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explorer

ALT + Tab = Switch between windows

ALT, Space, X = Maximize window

CTRL + Shift + Esc = Task Manager

Windows key + Break = System properties

Windows key + F = Search

Windows key + D = Hide/Display all windows

CTRL + C = copy

CTRL + X = cut

CTRL + V = paste

Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.


Keyboard Shortcuts

[Alt] and [Esc] Switch between running applications

[Alt] and letter Select menu item by underlined letter

[Ctrl] and [Esc] Open Program Menu

[Ctrl] and [F4] Close active document or group windows (does not work with some applications)

[Alt] and [F4] Quit active application or close current window

[Alt] and [-] Open Control menu for active document

Ctrl] Lft., Rt. arrow Move cursor forward or back one word

Ctrl] Up, Down arrow Move cursor forward or back one paragraph

[F1] Open Help for active application

Windows+M Minimize all open windows

Shift+Windows+M Undo minimize all open windows

Windows+F1 Open Windows Help

Windows+Tab Cycle through the Taskbar buttons

Windows+Break Open the System Properties dialog box



acessability shortcuts

Right SHIFT for eight seconds........ Switch FilterKeys on and off.

Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off.

Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.

SHIFT....... five times Switch StickyKeys on and off.

NUM LOCK...... for five seconds Switch ToggleKeys on and off.

explorer shortcuts

END....... Display the bottom of the active window.

HOME....... Display the top of the active window.

NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.

NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.

NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.

LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.

RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.




Type the following commands in your Run Box (Windows Key + R) or Start Run

devmgmt.msc = Device Manager
msinfo32 = System Information
cleanmgr = Disk Cleanup
ntbackup = Backup or Restore Wizard (Windows Backup Utility)
mmc = Microsoft Management Console
excel = Microsoft Excel (If Installed)
msaccess = Microsoft Access (If Installed)
powerpnt = Microsoft PowerPoint (If Installed)
winword = Microsoft Word (If Installed)
frontpg = Microsoft FrontPage (If Installed)
notepad = Notepad
wordpad = WordPad
calc = Calculator
msmsgs = Windows Messenger
mspaint = Microsoft Paint
wmplayer = Windows Media Player
rstrui = System Restore
netscp6 = Netscape 6.x
netscp = Netscape 7.x
netscape = Netscape 4.x
waol = America Online
control = Opens the Control Panel
control printers = Opens the Printers Dialog


internetbrowser

type in u're adress "google", then press [Right CTRL] and [Enter]
add www. and .com to word and go to it


For Windows XP:

Copy. CTRL+C
Cut. CTRL+X
Paste. CTRL+V
Undo. CTRL+Z
Delete. DELETE
Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE
Copy selected item. CTRL while dragging an item
Create shortcut to selected item. CTRL+SHIFT while dragging an item
Rename selected item. F2
Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW
Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW
Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW
Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW
Highlight a block of text. CTRL+SHIFT with any of the arrow keys
Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys
Select all. CTRL+A
Search for a file or folder. F3
View properties for the selected item. ALT+ENTER
Close the active item, or quit the active program. ALT+F4
Opens the shortcut menu for the active window. ALT+SPACEBAR
Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4
Switch between open items. ALT+TAB
Cycle through items in the order they were opened. ALT+ESC
Cycle through screen elements in a window or on the desktop. F6
Display the Address bar list in My Computer or Windows Explorer. F4
Display the shortcut menu for the selected item. SHIFT+F10
Display the System menu for the active window. ALT+SPACEBAR
Display the Start menu. CTRL+ESC
Display the corresponding menu. ALT+Underlined letter in a menu name
Carry out the corresponding command. Underlined letter in a command name on an open menu
Activate the menu bar in the active program. F10
Open the next menu to the right, or open a submenu. RIGHT ARROW
Open the next menu to the left, or close a submenu. LEFT ARROW
Refresh the active window. F5
View the folder one level up in My Computer or Windows Explorer. BACKSPACE
Cancel the current task. ESC
SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.

Use these keyboard shortcuts for dialog boxes:

To Press
Move forward through tabs. CTRL+TAB
Move backward through tabs. CTRL+SHIFT+TAB
Move forward through options. TAB
Move backward through options. SHIFT+TAB
Carry out the corresponding command or select the corresponding option. ALT+Underlined letter
Carry out the command for the active option or button. ENTER
Select or clear the check box if the active option is a check box. SPACEBAR
Select a button if the active option is a group of option buttons. Arrow keys
Display Help. F1
Display the items in the active list. F4
Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE

If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:


Display or hide the Start menu. WIN Key
Display the System Properties dialog box. WIN Key+BREAK
Show the desktop. WIN Key+D
Minimize all windows. WIN Key+M
Restores minimized windows. WIN Key+Shift+M
Open My Computer. WIN Key+E
Search for a file or folder. WIN Key+F
Search for computers. CTRL+WIN Key+F
Display Windows Help. WIN Key+F1
Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. WIN Key+ L
Open the Run dialog box. WIN Key+R
Open Utility Manager. WIN Key+U

accessibility keyboard shortcuts:

Switch FilterKeys on and off. Right SHIFT for eight seconds
Switch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREEN
Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
Switch StickyKeys on and off. SHIFT five times
Switch ToggleKeys on and off. NUM LOCK for five seconds
Open Utility Manager. WIN Key+U

shortcuts you can use with Windows Explorer:


Display the bottom of the active window. END
Display the top of the active window. HOME
Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad (*)
Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+)
Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)
Collapse current selection if it's expanded, or select parent folder. LEFT ARROW
Display current selection if it's collapsed, or select first subfolder. RIGHT ARROW

BIOS UPDATE PROCEDURE

All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system BIOS in a FLASH Memory component. With FLASH BIOS, there is no need to replace an EPROM component. Once downloaded, the upgrade utility fits on a floppy disc allowing the user to save, verify and update the system BIOS. A hard drive or a network drive can also be used to run the newer upgrade utilities. However, memory managers can not be installed while upgrading.

Most pre-Pentium motherboards do not have a Flash BIOS. The following instructions therefore do not apply to these boards. If your motherboard does not have a Flash BIOS (EEPROM) you will need to use an EPROM programmer to re-program the BIOS chip. See your dealer for more information about this.

Please read the following instructions in full before starting a Flash BIOS upgrade:
A. Create a Bootable Floppy (in DOS)

•With a non-formatted disk, type the following:

format a:/s

•If using a formatted disk, type:

sys a:

This procedure will ensure a clean boot when you are flashing the new BIOS.

B. Download the BIOS file

•Download the correct BIOS file by clicking on the file name of the BIOS file you wish to download.

•Save the BIOS file and the Flash Utility file in the boot disk you have created. Unzip the BIOS file and the flash utility file. If you don't have an "unzip" utility, download the WinZip for Windows 95 shareware/ evaluation copy for that one time use from _www.winzip.com or _www.pkware.com. Most CD ROMs found in computer magazines, have a shareware version of WinZip on them.

•You should have extracted two files:

Flash BIOS utility eg: flash7265.exe (for example)

BIOS eg: 6152J900.bin (example)

Use the latest flash utility available unless otherwise specified (either on the BIOS update page or in the archive file). This information is usually provided.

C. Upgrade the System BIOS

During boot up, write down the old BIOS version because you will need to use it for the BIOS backup file name.

Place the bootable floppy disk containing the BIOS file and the Flash Utility in drive a, and reboot the system in MS-DOS, preferably Version 6.22

•At the A:> prompt, type the corresponding Flash BIOS utility and the BIOS file with its extension.

For example:

flash625 615j900.bin

•From the Flash Memory Writer menu, select "Y" to "Do you want to save BIOS?" if you want to save (back up) your current BIOS (strongly recommended), then type the name of your current BIOS and its extension after FILE NAME TO SAVE: eg: a:\613J900.bin

Alternatively select "N" if you don't want to save your current BIOS. Beware, though, that you won't be able to recover from a possible failure.

•Select "Y" to "Are you sure to program?"

•Wait until it displays "Message: Power Off or Reset the system"

Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system. If you write to BIOS but cannot complete the procedure, do not switch off, because the computer will not be able to boo, and you will not be given another chance to flash. In this case leave your system on until you resolve the problem (flashing BIOS with old file is a possible solution, provided you've made a backup before)

Make sure the new BIOS version has been loaded properly by taking note of the BIOS identifier as the system is rebooting.

For AMI BIOS
Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system holding the "END" key prior to power on until you enter CMOS setup. If you do not do this the first time booting up after upgrading the BIOS, the system will hang.

BIOS Update Tips
note:
1.Make sure never to turn off or reset your computer during the flash process. This will corrupt the BIOS data. We also recommend that you make a copy of your current BIOS on the bootable floppy so you can reflash it if you need to. (This option is not available when flashing an AMI BIOS).

2. If you have problems installing your new BIOS please check the following:

Have you done a clean boot?
In other words, did you follow the above procedure for making a bootable floppy? This ensures that when booting from "A" there are no device drivers on the diskette. Failing to do a clean boot is the most common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS.

If you have not used a bootable floppy, insure a clean boot either by

a) pressing F5 during bootup

b) by removing all device drivers on the CONFIG.SYS including the HIMEM.SYS. Do this by using the EDIT command.

Have you booted up under DOS?
Booting in Windows is another common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS. Make sure to boot up to DOS with a minimum set of drivers. Important: Booting in DOS does not mean selecting "Restart computer in MS-DOS Mode" from Windows98/95 shutdown menu or going to Prompt mode in WindowsNT, but rather following the above procedure (format a: /s and rebooting from a:\).

Have you entered the full file name of the flash utility and the BIOS plus its extension?
Do not forget that often you will need to add a drive letter (a:\) before flashing the BIOS. Example: when asked for file name of new BIOS file which is on your floppy disk, in case you're working from c:\ your will need to type a:\615j900.bin, rather than 615j900.bin only.

what to With Your Old Computer?

1. Create a Server
If you’re into web development or gaming you could turn your old computer into a server. The easiest way to do this would be to install a server OS and possibly buy a few new parts to make it run a little quicker. After this connect it to the internet and away you go. Here are a few tips on setting up your own server.

2. Play Multiplayer Games
Get a family member or friend playing along with you on your favourite multiplayer games. Make sure that your old computer can handle whatever games you’re wanting to play before getting the other person. Most web-based games should work fine on your old system.

3. Install a Different Operating System
Here’s your chance to get to know a different OS. If you’re a Windows person you could install a version of Linux on your old machine. Linux supports a wide range of older hardware. Debian Linux is well suited to slower machines, and it is also friendly and well documented enough for beginners. If you’re a Mac person you could try out Windows XP, or maybe even Windows 98 (old school).

4. Donate Your Old Computer
If you really have no use for your old machine, call your local school or school district and see if they want it. Many districts have minimum donation standards, so be sure to ask. Some PC makers have their own donation programs. Gateway buyers can request a donation form, which, when validated by a recycling center or charity group, entitles them to discounts on future purchases. This will get the computer out of your hands and will help someone out (maybe even giving you a little cash).

5. Turn it into an Aquarium
Lately people have been turning their old CRT monitors into really cool aquariums. Basically you take a perfectly fine but old Cathode Ray Tube monitor, strip it of all of its parts (except for the glass at the front), make it so it doesn’t leak and fill it with a plethora of colourful fish. The upside of this is that you get a really cool aquarium in your house, the problem is with the construction. Unless you build a box and place it inside the monitor, making it leak proof can be a very hard job.

6. Create a media center
Turn your old computer into a media center. Large hard drives are becoming cheaper and cheaper. If you want to upgrade to a new computer but don’t want to leave your old computer in the dust you could just slap in a few large hard drives and turn it into a repository for all of your media. Using Windows XP Media Center you can hook up your TV to your old computer and watch all of the movies you’ve “bought legally” and all of the music files that you’ve downloaded bought.

7. Create a Render Farm
If you’re into editing videos or graphics this will mean more than to your everyday user. A render farm is basically a cluster of computers that are used for the purposes of rendering graphics and/or video. If you had 5 old computers you could network them together and render your videos roughly 5x faster than before. While the cost of electricity, the excess heat caused from having this many computers, and the extra room needed might make you wary of having this many computers, the benefits can be greatly than the costs. Frantic Films provides a great suite of software for your render farm.

8. Take it apart
If you really want to know how a computer works you could take it apart. I’ve taken apart five or six old computers and it really helps you understand how a computer works. Did you ever wonder how a CPU is connected to a motherboard? Are you not sure how to remove a hard drive? Do you want to practice inserting and removing RAM modules? An older computer is an excellent practice PC for maintenance and upgrades.

9. Make an office mascot
This one might seem silly/stupid to some people but I’m being totally serious. During those long days of compiling your code why not make an office mascot out of your old computer. You could dress it up, attach things to it, maybe even attach it to an RC car and have it zoom around. Get creative and I’m sure you’ll have your co-workers laughing at you in no time (maybe they’ll help create it).


10. Drop it from a high building
This is my personal favourite but shouldn’t be done without adult supervision. Now of course if you are an adult go right ahead! Dropping your old computer from a high building can have extremely satisfying results. While this might not be the most environmentally friendly alternative it can provide extremely exciting results as it slams into the earth and smashes into a million pieces. To prep the crash area make sure there is no one standing there. Then drop away and watch it fall to its inevitable grave.

After AMD: Intel's Next Big Battle

Intel (INTC) couldn't afford to let it drag on. The world's largest chipmaker announced on Nov. 12 that it would pay $1.25 billion to resolve allegations by Advanced Micro Devices (AMD) that its larger rival competes unfairly in the market for computer chips.

On one hand, the agreement lets Intel and AMD move past the conflict that's put the companies at legal loggerheads for years, and it may help Intel resolve ongoing antitrust tussles with U.S. regulators. But a more important benefit of the agreement is that it lets Intel turn attention to what may become an even greater headache in the coming years: the challenge posed by ARM Holdings (ARM.L), maker of the technology used in chips running in a widening array of mobile devices, including the Apple (AAPL) iPhone. Intel "now gets to focus on its real long-term threat," says Jack Gold, founder of Gold Associates, a research firm. "No, it's not AMD—it's ARM Holdings."

A host of chipmakers, including Qualcomm (QCOM), Texas Instruments (TXN), Freescale (FSL), and Nvidia (NVDA), license ARM technology to create chips for handhelds, phones, and other mobile devices. ARM-based chips are valued because they consume less power than the x86-based chips, which are made by Intel and AMD and power most of the world's computers and servers, the machines that run corporate networks.

PC and server chips make up the majority of industry profits today. Still, demand for server chips may diminish as businesses replace large numbers of aging servers in data centers with a single server powered by fewer, more powerful chips. Meantime, demand is surging for mobile devices, many of which don't require the computing power of relatively pricey x86 chips. Getting past the distraction of the AMD lawsuits helps Intel place greater emphasis on sales in markets now being inundated with ARM technology, says TBR analyst John Spooner. "For some time, Intel has been preparing to reduce its reliance on the PC and server processor market, which now supplies more than 90% of its quarterly revenue," Spooner says. "The chipmaker has been realigning itself to expand its revenue base into graphics, handsets, and consumer electronics."
Countering Claims of Monopolist Practices

The benefits of Intel's agreement don't end there. Through the settlement with AMD, Intel silences the loudest voice accusing it of abusive behavior while at the same time keeping alive one of its most formidable competitors. The settlement in effect subsidizes AMD's plan to reduce debt, spin off cash-intensive manufacturing operations, and boost its research and development on new chips. Over time, that means a stronger AMD and helps Intel counter claims it wields too much power in the industry, says Richard Doherty, a director at market researcher Envisioneering Group. "They can argue it helps the whole league if you have two teams playing well," Doherty says.

Historically the companies thrive under pressure from each other, with engineers at one racing to top the archrival's designs. Even now, Intel and AMD are duking it out for the lead in combining computing and graphic-intensive functions onto a single chip. Neither expects to begin selling such a product until late 2010 at the earliest.

Intel and Advanced Micro Devices are burying the antitrust hatchet.

As part of the deal announced on Nov. 12, Intel (INTC) will pay $1.25 billion, and AMD (AMD) will drop all pending antitrust litigation. The two companies also forged a five-year cross-licensing agreement that gives the companies access to each other's key chip technology. "Today marks the beginning of a new era," AMD Chief Executive Dirk Meyer said in remarks prepared for a conference call discussing the agreement. "It represents the culmination many years of litigation and regulatory engagement."

AMD is dropping all pending litigation, including a case filed in 2005 in U.S. District Court in Delaware and two cases pending in Japan, Intel said in a statement. AMD will also withdraw all of its regulatory complaints worldwide. "This has never been about money. It's about the marketplace," says AMD chief legal counsel Tom McCoy. "It's a pivot from war to peace."
FTC Probe

Antitrust pressure on Intel intensified earlier this month after New York Attorney General Andrew Cuomo accused the chipmaker of using billions of dollars in payments to dissuade computer makers including Dell (DELL) and Hewlett-Packard (HPQ) from using AMD chips. The payments, made over several years, were part of a "systematic campaign of illegal conduct" intended to harm AMD, Cuomo alleged. The Federal Trade Commission, which has been investigating Intel for more than year, was also on weeks away from filing a lawsuit against Intel, people familiar with the matter have said.

AMD's settlement doesn't fully defuse the FTC's investigation, says antitrust lawyer David Balto, a former FTC attorney. "FTC action is necessary to assure long-term relief in this market, that competition is fully restored and that consumers have the benefit of an open market," Balto says. What's more, AMD said it will continue to object to Intel's controversial payments to PC makers. Still, McCoy notes that Intel has agreed not to make barring purchases of AMD chips a condition of rebates.

A key part of the landmark settlement is the cross-licensing agreement that is likely to make it easier for PC makers to build machines based on both companies' processors. The patent battle had stemmed from AMD's spin-off last year of its manufacturing operations into a subsidiary called GlobalFoundries, which it jointly owns with an investment firm backed by the government of Abu Dhabi.

After the agreement was announced, shares of AMD surged 26%, to 6.68. Intel shares advanced 1.5%, to 20.13.

Earlier this year, the European Commission fined Intel €1.06 billion related to allegations that the company abused its monopoly position in the European market for computer chips. "Intel has an ongoing obligation to comply with the Commission's May 2009 decision, " a European Union spokesman said in a statement.

Intel vs AMD

Word on the street is the rival Advanced Micro Devices has been eating their lunch in the small, but very lucrative four-way server business (that’s four or more processors in one system). AMD also is doing brisk business in the entry-level server market.
Never a company to take any lost sales standing still, Intel announced today it “is accelerating the availability” of its dual-core Xeon and Xeon MP processors, introducing new chips at some unspecified time this year instead of next. They’ll be targets at “early adopters and evaluators of dual-core technology.”
In an oddly worded release, the chipmaker then adds that these new processors really are a prelude to two other chips that will be introduced in early 2006.
What gives? Behind the curtains, one might expect to find that Dell has been pressuring Intel to come up with something to help them compete with hot-sellig systems from HP, Sun and others, who have heartily been jumping on the AMD bandwagon.
And AMD execs likely are smirking at the idea that dual-core technology still needs a lot of testing, since their own products have been flying off the shelves. They say they have an inherent advantage over Intel because their architecture is vastly more energy -efficient, on top of being powerful in their own right.
While Intel is still making a bundle off its Xeon chips, it seems clear they’re feeling the heat for the first time in a long time from AMD. And if researchers from IDC or Gartner in coming weeks confirm that AMD continues to gain share in that space, it’ll be a black eye that will make Intel very unhappy indeed.

Firefox 3.6 Beta 1 Now Available for Download Hear

Firefox 3.6 Beta 1, now available for download, features support for personas, full screen video, and improved performance.

This beta version of the next version of Firefox is built on the Gecko 1.9.2 web rendering engine, containing many improvements for web developers, Add-on developers, and users.

New Features:
* Users can now change their browser’s appearance with a single click, with built in support for Personas.
* Firefox 3.6 will alert users about out of date plugins to keep them safe.
* Open, native video can now be displayed full screen, and supports poster frames.
* Support for the WOFF font format.
* Improved JavaScript performance, overall browser responsiveness and startup time.
* Support for new CSS, DOM and HTML5 web technologies.

Testers can download Firefox 3.6 Beta 1 builds for Windows, Mac OS X, and Linux in 53 different languages.

Lock and Track your Stolen Mobile Hand Set Through IMEI Number

Do you know your mobile’s IMEI number? Just press * # 0 6 # in your mobile hand set, IMEI number will be displayed in your mobile hand set.

Keep the IMEI number safely at other place. This IMEI number is unique number for each mobile hand set. In case your mobile hand set will get stolen, you can track or unlock your mobile hand set through IMEI number.

First track your mobile through IMIE number here www.trackimei.com and report theft or loss.

If your mobile hand set got stolen, you need to do following things.

1. Submit FIR for your mobile loss, give details of hand set model, color, IMEI number etc.
2. Ask your service provider to track the mobile phone, your mobile phone will be tracked only if the thief are using your mobile hand set with any sim card. If the thief is keeping your mobile switched off, your service provider can not track the mobile hand set location. You should not expect muck cooperation from service provider or police to locate your phone.
3. If you are unable to find your mobile number, insure that at least your mobile handset is locked. The thief can not use (misuse) your mobile with any sim card. You should ask mobile service provider to lock your mobile through IMEI number.

Getting hidden themes in WINDOWS 7

hidden themes for windows7:

goto c:/windows/globalization.

Now goto folder options and select 'show hidden files and folders'

and

uncheck 'hide protected operating system files',

now u'l c a hidden folder named MCT in the above directory and thus u'll find missing themes in ur windows 7
enjoy!!!!!!!!!

Just Double Click On It & Install....



Nokia N900 New Space


Maemo 5 (Fremantle/2009) is Debian (Linux) based OS with Hildon (touch optimized) UI (GNOME Framework/Ubuntu Mobile). As such Linux is well known from plenty of software being free and open sourced, so access to existing projects to port is virtually unlimited. With 800x480 resolution it doesnt even need re-optimization for mobile device, only porting to maemo is needed.

Though it should be worth mentioning that Maemo is still not up-to-the-mark but is sure growing pretty fast.

Some of the -ves of the N900 are as below:
- It doesn't have an onboard FM-radio (3rd party??) even though it offers an FM-transmitter
- lacks support for MMS :-o
- The display needs a protective screen as resistive screen is prone to scratches
- surprisingly it does not have a digital campass...???
- no software for office documents

The N900 positives:
+ quad band GSM/3.5G (10/2 Mbps)/WiFi (54Mbps)/VoIP/IM
+ 3.5"/800x480/TFT 16M screen
+ great sunlight legibility
+ full-blown support for multiple home screens
+ task manager supports live multitasking (vista-like)
+ kinetic scrolling all around, gesture support
+ Maemo5 offers a very feature-rich phonebook
+ phonebook integrates live online services - skype/gTalk/Ovi
+ DivX/XviD support right out of the box
+ charges over USB
+ browser supports Flash/AJAX/JS
+ Maemo supports various languages packages right out of the box
+ user can pick two input languages and switch between them while typing
+ user can make use of two predictive input dictionaries respectively
+ SMS messages are arranged in the form of a chat (gmail-like threads)
+ fully functional email client (HTML/Rich Text) on the go
+ PDF Reader/ RSS Reader on the go

The N900 hardware:
+ TI OMAP3430 Core (ARM Cortex-A8 CPU@600MHz, PowerVR SGX530 GPU@430MHz, TMS320C64x DSP/ISP)
+ 256MB RAM, 768MB NAND VM
+ 256MB (root) + 2GB (/home/opt) storage for apps
+ 32GB (default storage) + 16GB (eMMc)
+ sports DAC33 audio chipset
+ 5MP f/2.8 (Autofocus/Carl Zeiss) Cam, WVGA (848x480, 16:9 @25fps) video
+ Java acceleration and OpenGL ES2.0 Support
+ pixel shader/vertex shader hardware
+ A-GPS (using TI/OMAP Navilink)
+ bluetooth 2.1 (+EDR/A2DP/AVRCP/FTP)
+ has an IR port... hmm... remote control?? eh?

6.gMote 1.32 attractive mouse gesture utility

6.gMote 1.32 attractive mouse gesture utility

gMote allows you to record gestures (mouse motions) and assign them to frequently performed tasks. Use gestures to bring up programs, Web sites, control your browser, media player, and clipboard. You can even assign your own key combinations to a gesture - make text bold by drawing a 'B', lock your computer with an 'L' - it's fully customisable and free. Version 1.32 is a bug-fixing release.

Download link:


http://download.softpedia.com/dl/d3f...gmote-full.zip

INFRA RECORDER CD BURNER used as a substitute for NERO

This is used in place of nero which is costly and comes with programs u may not use. This is a freeware which is equal to nero in cd/dvd writing options.
Features
  • Create custom data, audio and mixed-mode projects and record them to physical discs as well as disc images.
  • Supports recording to dual-layer DVDs.
  • Blank (erase) rewritable discs using four different methods.
  • Record disc images (ISO and BIN/CUE).
  • Fixate discs (write lead-out information to prevent further data from being added to the disc).
  • Scan the SCSI/IDE bus for devices and collect information about their capabilities.
  • Create disc copies, on the fly and using a temporary disc image.
  • Import session data from multi-session discs and add more sessions to them.
  • Display disc information.
  • Save audio and data tracks to files (.wav, .wma, .ogg, .mp3 and .iso).

Vista Transformation Pack 9.0.1

Vista Transformation Pack is a software utility that transforms Windows XP's appearance to resemble that of VISTA.

VTP will transform your entire user interface, including a Vista-themed Boot Screen, Welcome Screen, and Visual Style, as well as new icons, wallpapers, and more.

The link:

http://www.jcxp.net/vtp/

New Motherboard with USB 3.0


ASUS P6X58 Premium motherboard arrives complete with USB 3.0 ports

We've seen cables, controllers, drivers and years of promises, and it looks like we now finally have some pictures of the first official USB 3.0 motherboard out in the wild. That milestone comes courtesy of ASUS, which looks to have gone all out (or as far out as motherboards can go) with its new P6X58 Premium model. As you can see above, it packs a pair of easily identifiable USB 3.0 ports and three standard USB 2.0 ports, along with accommodations for a Core i7 processor, six DDR3 memory slots, three PCI-Express 2.0 slots, and plenty of other standard fare. Still no word on a price or release date, unfortunately, and the folks at Xfastest unsurprisingly weren't able to provide any benchmarks or the like, considering that there isn't much in the way of actual USB 3.0 gear to test it with just yet.

The long-awaited arrival of USB 3.0, which offers speeds as much as ten times faster than 2.0, is almost over as ASUS has revealed the first motherboard to feature the faster standard.

The P6X58 Premium board features both 3.0 and 2.0 ports, allowing for greater functionality with USB devices both old and new. ASUS has also made it super easy to tell the new ports from the old, with the USB 3.0 connectors sporting blue connectors.

WIDCOMM BLUETOOTH SOFTWARE 4.0.1.700

Exclamation Arrow Broadcom Corporation announced the Widcomm BTW 4.0, a new release of its Bluetooth software, with enhanced security and adding advanced audio/video (A/V) capabilities to the industry's most widely adopted Bluetooth software. The new software was tested and qualified for native support and seamless operation with Microsoft's recently announced Service Pack 2 upgrade for the Windows XP operating system (Windows XP SP2).

Wireless, high quality stereo audio headsets and speakers enabled by the new WIDCOMM BTW (Bluetooth for Windows) 4.0 software is a new application expected to drive widespread Bluetooth adoption for consumers over the coming years. A/V enhancements built into BTW 4.0 software will bring a new level of audio quality to wireless headsets, enabling a generation of products capable of delivering CD-like stereo sound without the need for wires. The same A/V Bluetooth profile support can be expected to appear in upcoming consumer electronics products like MP3 players, cellular phones, PDAs, and other appliances.

The company sees wireless headsets or speakers enabled with this technology streaming high quality sound while also performing remote control functions such as pausing or stopping play, and selecting tracks. In addition, consumers can utilise wireless speakers, enabling enhanced sound and audio distribution for DVD and CD playback.

Broadcom's WIDCOMM BTW 4.0 incorporates the latest software "profiles," which ensure a common set of features between two Bluetooth devices. Bluetooth profiles are developed and standardized through the Bluetooth Special Interest Group (SIG). BTW 4.0 features many of the latest profiles, which provide advanced multimedia capabilities including:


GAVDP -- Generic Audio Video Distribution Profile

A2DP -- Advanced Audio Distribution Profile

AVRCP -- Audio Video Remote Control Profile

BTW 4.0 also supports the Basic Imaging Profile, which provides the ability to "push" and "pull" images wirelessly between a mobile phone or digital camera and a PC.

"BTW 4.0 answers two distinct needs in the Bluetooth space: enhanced security, and the ability to effectively stream high-quality audio to wireless headphones or speakers. It is changing the dynamics of how consumers will experience multimedia content on their PCs," said Ron Wong, Senior Product Line Manager for Broadcom's Bluetooth software products. "Broadcom's unique ability to design and deliver all the critical technology pieces for next-generation wireless electronic devices enables our partners to bring products to market quickly and with features that hold great appeal for consumer markets."

PC OEMs are already shipping Bluetooth in a large number of their commercial notebook PCs and are expecting continuous growth and accelerated adoption into 2005. With this rapid adoption, large enterprises have expressed growing concerns over security and software virus spreads. The new WIDCOMM BTW4.0 software incorporates enhanced security capability to help address these concerns

The software is currently shipping to Broadcom's early access partners...and is available free of charge to all members exclusively

Click Here to Download

Sign by Danasoft - Get Your Free Sign

Visitors