Pages

How to Upload Photos on Facebook

In an alternate universe, perhaps there's a version of Facebook without faces -- and that strange variant is probably the most boring Web site ever. The photos that let you share the faces of your friends and family are a key reason that Facebook is exceedingly popular. Now you just need to understand the best ways to share your photos.

As with all things on the Web, there are multiple ways to accomplish Facebook-related tasks. That includes the various methods you might employ in uploading and editing pictures destined for Facebook fame.

But before we get to the specifics, here are some critical reminders for anyone taking their first plunge into Facebook photo fun. For one, don't even think about uploading images that you wouldn't share with every one of your friends and family.

So keep those pictures of your naked, drunken self to … well, yourself. Because once that picture is online, you should always assume that it could appear anywhere else on the Web -- maybe even on your grandmother's computer screen. Don't assume that privacy controls of any kind will protect your pictures or your reputation.
With that caveat out of the way, it's simple to share pictures on Facebook. After you log in to your account, you'll see your "news feed," which is a chronological list of updates, photos and links that your Facebook friends have posted.

If you simply want to post a picture to your "wall" so that it appears in your friends' "news feed," click "photo," which is at the top of the page next to "share." You'll see three self-explanatory options: "upload a photo from your drive," "take a photo with a webcam" and "create an album with many photos."

With the first two options, you can immediately share a single image on your "wall." Using the third option, you can upload as many photos as you want, but this process takes a bit more time and you'll have different options for sharing these images.

How will computers evolve over the next 100 years?

 

To call the evolution of the computer meteoric seems like an understatement. Consider Moore's Law, an observation that Gordon Moore made back in 1965. He noticed that the number of transistors engineers could cram onto a silicon chip doubled every year or so. That manic pace slowed over the years to a slightly more modest 24-month cycle.
Awareness of the breakneck speed at which computer technology develops has seeped into the public consciousness. We've all heard the joke about buying a computer at the store only to find out it's obsolete by the time you get home. What will the future hold for computers?
Assuming microprocessor manufacturers can continue to live up to Moore's Law, the processing power of our computers should double every two years. That would mean computers 100 years from now would be 1,125,899,906,842,624 times more powerful than the current models. That's hard to imagine.

But even Gordon Moore would caution against assuming Moore's Law will hold out that long. In 2005, Moore said that as transistors reach the atomic scale we may encounter fundamental barriers we can't cross [source: Dubash]. At that point, we won't be able to cram more transistors in the same amount of space.
We may get around that barrier by building larger processor chips with more transistors. But transistors generate heat, and a hot processor can cause a computer to shut down. Computers with fast processors need efficient cooling systems to avoid overheating. The larger the processor chip, the more heat the computer will generate when working at full speed.
Another tactic is to switch to multi-core architecture. A multi-core processor dedicates part of its processing power to each core. They're good at handling calculations that can be broken down into smaller components; however, they aren't as good at handling large computational problems that can't be broken down.
Future computers may rely on a completely different model than traditional machines. What if we abandon the old transistor-based processor?

The International Space Station and the Docked Space Shuttle Endeavour


ISS027-E-036619 (23 May 2011) --- This image of the International Space Station and the docked space shuttle Endeavour, flying at an altitude of approximately 220 miles, was taken by Expedition 27 crew member Paolo Nespoli from the Soyuz TMA-20 following its undocking on May 23, 2011 (USA time). The pictures are the first taken of a shuttle docked to the International Space Station from the perspective of a Russian Soyuz spacecraft. Onboard the Soyuz were Russian cosmonaut and Expedition 27 commander Dmitry Kondratyev; Nespoli, a European Space Agency astronaut; and NASA astronaut Cady Coleman. Coleman and Nespoli were both flight engineers. The three landed in Kazakhstan later that day, completing 159 days in space.

Solar Powered Crop Harvesting Robot' wins Intel India Embedded Challenge 2011

T.J. David and Kudikala Shravan Kumar, from International Institute of Information Technology, Hyderabad have won the coveted Intel® India Embedded Challenge grand prize for 2011 for their project Solar Powered Crop Harvesting Robot

The nationwide competition is an initiative by Intel in India to recognize and reward outstanding ideas in embedded technology, based on the Intel Atom processor.
“We want to cultivate technical talent in India and promote our knowledge economy, so we can cater to emerging markets. Companies like Intel who share their technological expertise and foster the development of these skills in India play a crucial role in this endeavor,” said Shri H K Mittal, Head, National Science and technology Entrepreneurship Development Board,(NSTEDB) Dept of Science and Technology, Government of India, New Delhi. “Our association with Intel India on the Intel Embedded Challenge awards helps to create a pipeline of ideas in the field of embedded technology that will further advance social development.”
“Intel believes technological innovation is the driver of future economic and social success. By providing India's engineering students and technical professionals with exposure to the highest level of proficiency, Intel seeks to nurture an ecosystem in which innovation can thrive,” said Dr. Praveen Vishakantaiah, President, Intel India. “This platform offers students and professionals an environment where their talent can be nurtured.”

This year's Intel India Embedded Challenge had two main categories – 'Embedded Geeks' and 'Embedded Solutions for a Social Cause'. Entries were submitted under five themes: Biomedical and healthcare, Education, Smart Solutions, Industrial and Consumer Electronics, Rural IT, e-governance and citizen services.

How to speed up Internet Explorer 7

To increase the speed of Internet Explorer 7 by modifying the maximum number of connections per server. This should allocate the additional bandwidth and reasonably improve internet browsing performance. Using registry editor, you can implement this task in all windows versions with minimum effort. Make sure before modifying your system Registry about its backup because Registry contains all information how your system runs. This backup will help you to restore Registry in case any problem occurs after modifying.
Follow the given steps to increase the explorer speed:

To use this feature, you will need to be logged into your computer with administrative rights.
Click Start button and type regedit in Run option then press Enter for next.






Here locate the location to:


HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\InternetSettings.                      Here in right side panel, locate the values called "MaxConnectionsPerServer" and "MaxConnectionsPer1_0Server".



If these values are not present then in right side panel, right-click to create new DWORD value with the name "MaxConnectionsPerServer" and "MaxConnectionsPer1_0Server" then assign number 6 in value data for both keys.



Now close the registry editor and restart your computer after any changes to go into effect.

Lock your PC using Pen drive

Have you ever seen a movie in which a person in some secret government installation simply inserts and removes a card to log in and log out of a PC? If you thought that idea was cool, you’ll definitely want to investigate Predator. Once installed and configured, this little freeware utility will allow you to turn a USB flash drive into a key you can use to lock and unlock your computer.

With Predator, you can use a USB flash drive as a key to lock and unlock your computer.

While the USB flash drive is connected to your computer, everything works as it normally would. Once you remove the USB flash drive, your computer is locked down — the keyboard and mouse are disabled and the screen darkens. To unlock your computer, you just plug in the USB flash drive and the computer will be unlocked and you can begin using it.

To learn more about Predator, and/or to download it, visit developer’s Web site.

Mozilla Firefox Web Browser For Mobile

As a browser, Firefox needs no introduction. It has gained a loyal following on the desktop, and the mobile version has already amassed millions of downloads on the Android Market. But can Firefox for Android live up to its desktop counterpart? It sure tries, I'll give it that.

The user interface is cleverly designed so that, to access the toolbar and tabs, you drag a page left or right.
Dragging the page left reveals the right-edge toolbar, with back, forward, and "bookmark" buttons. But when you are viewing a wide page (any page without a dedicated mobile view), it takes multiple swipes to the left to reach the edge, and each swipe comes with an annoying graphical refresh.

Drag the page to the right, and you can see which tabs you have open. Each tab is shown as a tiny screenshot of the site you're browsing, making them easy to tell apart without needing lengthy text labels.
Firefox for Android prides itself on its synchronization abilities. The browser can sync with your desktop Firefox so that history, bookmarks, passwords, and even open tabs carry over to your portable version. But do you really want your 30-tab desktop browsing session to be synced over to your mobile?

Even without a multitude of tabs open, Firefox still feels sluggish on Android. On my device (a Samsung Vibrant), it shows a splash screen for about three seconds while loading, whereas other browsers just pop open instantly. It is also a very large download, at 14MB versus 2.1MB for Miren and 767KB for Opera Mini. Installed, it takes up 20MB of disk space.

All in all, it doesn't seem as if Firefox has made the adjustment to mobile very well. Yes, the interface feels optimized for a smaller screen; but the large download and slow loading detract from the overall experience.

Search the Internet from the Start Menu

The Start Menu's search box is a convenient way to search through your PC -- but you can also have it do double-duty and perform Internet searches as well. To enable this feature:

1. In the Start Menu search box, type GPEDIT.MSC and press Enter to run the Group Policy Editor.

2. Go to User Configuration --> Administrative Templates --> Start Menu and Taskbar.

3. Double-click "Add Search Internet link to Start Menu," and from the screen that appears, select Enabled. Then click OK and close the Group Policy Editor.


4. From now on, when you type a search term in the Search box on the Start Menu, a "Search the Internet" link will appear. Click the link to launch the search in your default browser with your default search engine.

Get Battery Performance Report in Windows 7

Have a laptop and want to get more battery life out of it? Windows 7 includes a hidden built-in tool that will examine your laptop's energy use and make recommendations on how to improve it. To use it:

1. Run a command prompt as an administrator. To do this, type cmd in the search box, and when the cmd icon appears, right-click it and choose "Run as administrator."

2. At the command line, type in the following:
powercfg -energy -output \Folder\Energy_Report.html
where \Folder represents the folder where you want the report to be placed.

3. For about a minute, Windows 7 will examine the behavior of your laptop. It will then analyze it and create a report in HTML format in the folder you specified. Double-click the file, and you'll get a report -- follow its recommendations for ways to improve power performance.

Use Hidden Wallpapers and Themes on Windows 7

When you first install Windows 7, it asks for your language, time and currency. Based on your responses, it installs a set of wallpapers and themes. If you choose English (United States) for your time and currency format, for example, the available desktop backgrounds and themes will include a United States section with scenery from locations such as Maine, the Southwest and so on.
Hidden, though, are background scenery and themes from other English-speaking countries -- Australia, Canada, Great Britain and South Africa. Normally, you can't access those backgrounds or themes, but there is a simple way you can install and use them:

1. In the search box in the Start menu, type C:\Windows\Globalization\MCT and press Enter. (Note: If Windows 7 is installed in a drive other than C:, use that letter instead.)

2. Windows Explorer will launch and show you a list of subfolders under C:\Windows\Globalization\MCT: MCT-AU, MCT-CA, MCT-GB, MCT-US, and MCT-ZA. Each subfolder has wallpapers for a specific country: AU for Australia, CA for Canada, GB for Great Britain, US for the United States, and ZA for South Africa.

For any of the countries whose wallpaper and themes you want to use, go into its Theme folder, for example, C:\Windows\Globalization\MCT\MCT-ZA\Theme. Double-click the theme you see there (for example ZA).

3. That will install a shortcut to the theme and wallpapers in the Personalization section of Control Panel.
You can now use them as you would any other theme or background, by right-clicking the desktop, choosing Personalize, and choosing a background or theme. They will be listed in their own section.

How To Write Protect Your USB Flash Drive?

Viruses spread to different computers through pen drives.The viruses are capable enough to copy itself to whatever flash drive is attached into the infected computer’s USB drive.If you write protect your USB drives deleting/Copying files or Folders on the USB drive is not Possible.Thus virus is also prevented 
Here is a freeware utility to make your USB flash drive write protected in single click.USB Write Protector is a portable application that prevents viruses getting copied to your flash drive themselves.

Download: USB WriteProtector

E-Speaking: Control Your PC Through Your Voice

An easy software solution to enable you to control your computer, dictate emails and letters, and have the computer read documents back to you. e-Speaking – Voice Recognition software using your voice to command and control your computer. Reduce or eliminate mouse clicks or keyboard input. Use it to enhance your computing experience by providing an additional input to the computer.

10 Reasons for Trying e-Speaking’s Software
1. Free Download of software
2. Over 100 commands built-in
3. Ability to add more commands
4. Runs in Windows2000 and Windows XP
5. Small file size
6. Utilizes latest technologies from Microsoft
7. Seamlesly integrate with Office
8. Voice commands of Mouse events
9. Based on SAPI and .NET technologies
10. Easy to Use

 What is Speech Recognition & Voice Recognition?


 

These are exciting technologies that change the way you interact with your computer. Now you can speak to your computer and it can speak back. The speech that you and your computer exchange is scripted. In other words, you can’t just ask your computer how he/she is feeling? Rather, you can talk to your computer using a set of pre-defined commands and instructions (i.e., a script). Your computer will respond in the same way (also using a scripted language). For example, you can say: “File Open”, and the computer would respond: “Select the file”. Or you can say: “Edit Find” and the computer would ask: “Find What?”.

 Download : e-Speaking Software (Shareware)

Useful shortcut Keys for Windows 7

win7shortcuts Shortcut Keys in Windows 7

Another Take on Supersonic


 


Our ability to fly at supersonic speeds over land in civil aircraft depends on our ability to reduce the level of sonic booms. NASA has been exploring a variety of options for quieting the boom, starting with design concepts and moving through wind tunnel tests to flight tests of new technologies. This rendering of a possible future civil supersonic transport shows a vehicle that is shaped to reduce the sonic shockwave signature and also to reduce drag.

This Is What the Moon Looks Like From Space




On Sunday, July 31, 2011, when Expedition 28 astronaut Ron Garan aboard the International Space Station looked out his window, this is what he saw: the moon. And, he saw it 16 times. Said Garan, "We had simultaneous sunsets and moonsets." For Garan and the rest of the station crew, this extraordinary event is a daily occurrence. Since the station orbits the Earth every 90 minutes, each day the crew experiences this about 16 times a day.

Cosmonauts Conduct Spacewalk


Cosmonauts Sergei Volkov and Alexander Samokutyaev (out of frame), attired in Russian Orlan spacesuits, conducted a spacewalk on Wednesday, Aug. 3, 2011, on the Russian segment of the International Space Station. During the six-hour, 23-minute spacewalk, the Expedition 28 flight engineers moved a cargo boom from one airlock to another, installed a prototype laser communications system and deployed an amateur radio micro-satellite.

Cosmic Exclamation Point

VV 340, also known as Arp 302, provides a textbook example of colliding galaxies seen in the early stages of their interaction. The edge-on galaxy near the top of the image is VV 340 North and the face-on galaxy at the bottom of the image is VV 340 South. Millions of years later these two spirals will merge -- much like the Milky Way and Andromeda will likely do billions of years from now. Data from NASA's Chandra X-ray Observatory (purple) are shown here along with optical data from the Hubble Space Telescope (red, green, blue). VV 340 is located about 450 million light years from Earth.


Ophir Chasma

During its examination of Mars, the Viking 1 spacecraft returned images of Valles Marineris, a huge canyon system 5,000 km, or about 3,106 miles, long, whose connected chasma or valleys may have formed from a combination of erosional collapse and structural activity. This synthetic oblique view shows Ophir Chasma, the northern most one of the connected valleys of Valles Marineris. For scale, the large impact crater in lower right corner is about 18.5 miles, or 30 km, wide.



Ophir Chasma is a large west-northwest-trending trough about 62 miles, or 100 km, wide. The Chasma is bordered by high-walled cliffs, most likely faults, that show spur-and-gully morphology and smooth sections. The walls have been dissected by landslides forming reentrants. The volume of the landslide debris is more than 1,000 times greater than that from the May 18, 1980, debris avalanche from Mount St. Helens. The longitudinal grooves seen in the foreground are thought to be due to differential shear and lateral spreading at high velocities.

Hurricane Irene

High above the Earth from aboard the International Space Station, astronaut Ron Garan snapped this image of Hurricane Irene as it passed over the Caribbean on Aug. 22, 2011.





The National Hurricane Center noted on Aug. 22 that Irene is expected to produce total rainfall accumulations of 5 to 10 inches across Puerto Rico, The Virgin Islands, the Dominican Republic, Haiti, the Southeastern Bahamas and The Turks and Caicos Islands. Isolated maximum amounts of rainfall may reach up to 20 inches.

A Tale of Three Galaxies

Arp 274, also known as NGC 5679, is a system of three galaxies that appear to be partially overlapping in the image, although they may be at somewhat different distances. The spiral shapes of two of these galaxies appear mostly intact. The third galaxy (to the far left) is more compact, but shows evidence of star formation.




Two of the three galaxies are forming new stars at a high rate. This is evident in the bright blue knots of star formation that are strung along the arms of the galaxy on the right and along the small galaxy on the left.

The largest component is located in the middle of the three. It appears as a spiral galaxy, which may be barred. The entire system resides at about 400 million light-years away from Earth in the constellation Virgo.
Hubble’s Wide Field Planetary Camera 2 was used to image Arp 274 in April 2009. Blue, visible and infrared filters were combined with a filter that isolates hydrogen emission. The colors in this image reflect the intrinsic color of the different stellar populations that make up the galaxies. Yellowish older stars can be seen in the central bulge of each galaxy. A bright central cluster of stars pinpoint each nucleus. Younger blue stars trace the spiral arms, along with pinkish nebulae that are illuminated by new star formation. Interstellar dust is silhouetted against the starry population. A pair of foreground stars inside our own Milky Way are at far right.


Astronomers: We've found a planet made of diamond

Perhaps the biggest frustration for astronomers is that they can't get to the places that most interest them.
So please imagine the excitement--and vexation--of skygazers who believe they have discovered a planet that might just be the shiniest piece of bling out there. Reuters paints a picture of astronomers who feel like someone who has just been offered 27 carats over their chocolate pudding.
For there seems to be a planet orbiting tightly around a small star just down the road (in celestial terms) from Earth that is "a massive diamond."

If only Planet Tiffany could look like this.

Those last three words aren't mine. They are those of a seemingly very excited Matthew Bailes, a professor at the Swinburne University of Technology in Melbourne, Australia. For he told Reuters: "The evolutionary history and amazing density of the planet all suggest it is comprised of carbon...i.e a massive diamond orbiting a neutron star every two hours in an orbit so tight it would fit inside our own sun."
The discovery was reported yesterday in the journal Science.
Astronomers are theorizing that this as-yet unnamed planet--just 4,000 light years from us--is actually a relic of a star shed its outer layer to reveal its inner riches. Planet Tiffany (you have a problem with the name I've given it?) appears to be merely five times the size of Earth. The star it orbits every 2 hours and 10 minutes does have a very fetching name: J1719-1438.
Though radio telescopes have been detecting beams from the star, it is as yet impossible to know what Planet Tiffany really looks like. Some suggest it won't be quite the shiny object that one might imagine.


 

Speed up your internet by 20%

Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc

You can get it back:

Click Start then Run and type "gpedit.msc" without quotes. This opens the group policy editor.

Then go to:
--> Local Computer Policy
--> Computer Configuration
--> Administrative Templates
--> Network
--> QOS Packet Scheduler
--> Limit Reservable Bandwidth.
 
Double click on Limit Reservable bandwidth.
 It will say it is not configured, but the truth is under the 'Explain' tab i.e." By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.

Simple Trick to Turn off all system beeps

If you want to turn off all system beeps (like the ones that go through your computers' internal speaker):

Start Regedit

Go to HKEY_CURRENT_USER\Control Panel\Sound

Edit the key Beep and give it a value of No

Complete list of run commands in windows XP

Run Commands In Windows XP
You can access all these programs by going through START-->RUN or Simply Click Windows Key+R

SQL Client Configuration - cliconfg
System Configuration Editor - sysedit
System Configuration Utility - msconfig
System File Checker Utility (Scan Immediately)- sfc /scannow
System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce
System File Checker Utility (Scan On Every Boot) - sfc /scanboot
System File Checker Utility (Return to Default Setting)- sfc /revert
System File Checker Utility (Purge File Cache)- sfc /purgecache
System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x
System Information - msinfo32.
Task Manager
taskmgr
System Properties - sysdm.cpl
Task Manager
taskmgr
TCP Tester - tcptest
Telnet Client - telnet
Tweak UI (if installed) - tweakui
User Account Management- nusrmgr.cpl
Utility Manager - utilman
Windows Address Book - wab
Windows Address Book Import Utility - wabmig
Windows Backup Utility (if installed)- ntbackup
Windows Explorer - explorer
Windows Firewall- firewall.cpl
Windows Magnifier- magnify
Windows Management Infrastructure - wmimgmt.msc
Windows Media Player - wmplayer
Windows Messenger - msmsgs
Windows Picture Import Wizard (need camera connected)- wiaacmgr
Windows System Security Tool
syskey
Windows Update Launches - wupdmgr
Windows Version (to show which version of windows)- winver
Windows XP Tour Wizard - tourstart
Wordpad - write
Password Properties - password.cpl
Performance Monitor - perfmon.msc
Phone and Modem Options - telephon.cpl
Phone Dialer - dialer
Pinball Game - pinball
Power Configuration - powercfg.cpl
Printers and Faxes - control printers
Printers Folder
printers
Private Character Editor - eudceditQuicktime (If Installed)- QuickTime.cplReal Player (if installed)- realplayRegional Settings - intl.cplRegistry Editor - regeditRegistry Editor - regedit32Remote Access Phonebook - rasphoneRemote Desktop - mstscRemovable Storage - ntmsmgr.mscRemovable Storage Operator Requests - ntmsoprq.mscResultant Set of Policy (XP Prof) - rsop.mscScanners and Cameras - sticpl.cplScheduled Tasks - control schedtasksSecurity Center - wscui.cplServices - services.mscShared Folders - fsmgmt.mscShuts Down Windows - shutdownSounds and Audio - mmsys.cplSpider Solitare Card Game - spiderMalicious Software Removal Tool - mrtMicrosoft Access (if installed) - access.cplMicrosoft Chat - winchat
Microsoft Excel (if installed) - excel
Microsoft Frontpage (if installed)- frontpg
Microsoft Movie Maker - moviemk
Microsoft Paint - mspaint
Microsoft Powerpoint (if installed)- powerpnt
Microsoft Word (if installed)- winword
Microsoft Syncronization Tool - mobsync
Minesweeper Game - winmine
Mouse Properties - control mouse
Mouse Properties - main.cpl
Nero (if installed)- nero
Netmeeting - conf
Network Connections - control netconnections
Network Connections - ncpa.cpl
Network Setup Wizard - netsetup.cpl
Notepad - notepad
Nview Desktop Manager (If Installed)- nvtuicpl.cpl
Object Packager - packager
ODBC Data Source Administrator- odbccp32.cpl
On Screen Keyboard - osk
Opens AC3 Filter (If Installed) - ac3filter.cpl
Outlook Express - msimn
Paint
pbrush
Keyboard Properties - control keyboard
IP Configuration (Display Connection Configuration) - ipconfi/all
IP Configuration (Display DNS Cache Contents)- ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns
IP Configuration (Release All Connections)- ipconfig /release
IP Configuration (Renew All Connections)- ipconfig /renew
IP Configuration(RefreshesDHCP&Re-RegistersDNS)-ipconfig/registerdns
IP Configuration (Display DHCP Class ID)- ipconfig/showclassid
IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid
Java Control Panel (If Installed)- jpicpl32.cpl
Java Control Panel (If Installed)- javaws
Local Security Settings - secpol.msc
Local Users and Groups - lusrmgr.msc
Logs You Out Of Windows - logoff.....
Accessibility Controls - access.cpl
Accessibility Wizard - accwiz
Add Hardware - Wizardhdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Administrative Tools control - admintools
Adobe Acrobat (if installed) - acrobat
Adobe Designer (if installed)- acrodist
Adobe Distiller (if installed)- acrodist
Adobe ImageReady (if installed)- imageready
Adobe Photoshop (if installed)- photoshop
Automatic Updates - wuaucpl.cpl
Bluetooth Transfer Wizard
fsquirt
Calculator - calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Control Panel - control
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Control Panel (If Installed)- directx.cpl
Direct X Troubleshooter- dxdiag
Disk Cleanup Utility- cleanmgr
Disk Defragment- dfrg.msc
Disk Management- diskmgmt.msc
Disk Partition Manager- diskpart
Display Properties- control desktop
Display Properties- desk.cpl
Display Properties (w/Appearance Tab Preselected)- control color
Dr. Watson System Troubleshooting Utility- drwtsn32
Driver Verifier Utility- verifier
Event Viewer- eventvwr.msc
Files and Settings Transfer Tool- migwiz
File Signature Verification Tool- sigverif
Findfast- findfast.cpl
Firefox (if installed)- firefox
Folders Properties- control folders
Fonts- control fonts
Fonts Folder- fonts
Free Cell Card Game- freecell
Game Controllers- joy.cpl
Group Policy Editor (XP Prof)- gpedit.msc
Hearts Card Game- mshearts
Help and Support- helpctr
HyperTerminal- hypertrm
Iexpress Wizard- iexpress
Indexing Service- ciadv.msc
Internet Connection Wizard- icwconn1
Internet Explorer- iexplore
Internet Setup Wizard- inetwiz
Internet Properties- inetcpl.cpl

Download Brand New Google+ Windows 7 Theme

Google Plus Wallpaper 04 VikiTech Download Brand New Google+ Windows 7 Theme

Google Plus the new social network by Google. Google Plus is pretty good and loads fast.Google Plus looks solid and is quite awesome to use. icon wink Download Brand New Google+ Windows 7 Theme Google Plus got attention of many internet users and it started growing rapidly. It has also fired the imagination of artists and has generated a number of artworks based on the Google Plus theme and presentation. Here is cool brand new Google+ theme for windows user icon smile Download Brand New Google+ Windows 7 Theme

Nokia hidden codes



Code                                Action
*#7780#                 To restore the factory settings of mobile set
*#3283#                 To verify the set Manufacturing date
*#746025625#       To stop the sim clock
*#67705646#         Use to delete the operator logo
*#73#                     Use to reset game scores and phone timers
*#0000#                 Use to display the mobile software version
*#06#                     To display the IMEI Number of the mobile
*#92702689#         To display the mobile warranty related settings
*#7760#                 To display the Production serial number
*#bta0#                  Use to display Bluetooth MAC address
*#9999#                 Use to display the mobile software version
*#2640#                 To display the mobile security code
*#43#                     To verify the call waiting status
*#2820#                 To verify the Bluetooth information
*#7370#                 To format the mobile phone memory
*#delset#                To delete the GPRS AND EMAIL settings
#pw+1234567890+1#       To display the lock status of mobile set
#pw+1234567890+4#       To display the lock status of your SIM
*#7328748263373738#     Apply to resets the set default security code



BAE Putting Lasers on Mk 38 Naval Gun




So, BAE Systems and Boeing have teamed up to add lethal lasers to the already tricked out Mk 38 chain gun system used for close-in defense on U.S. Navy ships.

In March, BAE — maker of the MK 38 system (shown above) — recieved a contract to build a demo laser system to show that such a weapon could work. Now, they’ve teamed with Boeing to produce that gun/laser demo weapon.

BAE’s Mk 38 25 mm chain gun system was originally designed to be manually aimed and fired. However, the latest version of the system, dubbed the Mk 38 Mod 2,  is completely remote-controlled using an electro-optitical/infrared sensor ball and laser range finder to find and track targets.  Add a laser to this system and it could be even deadlier when engaging fast moving targets such as UAVs or speedboats.


France Arming Libyan Rebels


So it looks like NATO has begun arming the Libyan rebels, or at least the French have.

Makes me wonder if this tricked out FN2000 (shown above) was really seized from a Gadhafi loyalist, or was it provided by the French?


Get Access into Registration-Required Sites without Need to Register



Are you annoying of having to register on a free Web site just to read some news or view some information? Rather than registering on such Web sites (and risking your email of annoying spam).
I have a simple method to get access to protected content without need to endure the annoyance of signing up for an account. Every time relatives and friends send me links to registration-required Web sites, I’ll visit BugMeNot to bypass most of these annoyance.

BugMeNot is a free Web site that stored registered user account logins and passwords so you don’t have to provide your personal info.

Once you at BugMeNot front page, just type in the URL of the website that you’d like access. BugMeNot then will return a list of user names and passwords along with their accuracy percentage.

For Firefox users, BugMeNot provide the extension that automates these process. Once you’ve installed the extension, you can easily access the website you like by right click on the username or email address text box.

How to Open Office 2007 Documents in Older Versions of Office

With Microsoft Office 2007, Microsoft introduced a new set of file formats: .docx, .xlsx, and .pptx, all not compatible with previous Microsoft Office versions. So if somebody sends you a Word 2007 document and you use Word XP, an error message awaits you. Luckily, the fix is easy: Use the Office plugin named Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats.
MOCPWEP2007FF enables you to open/edit/save Office 2007 documents in Office 2000, 2003, or XP without any work on your part. Just make sure that your office has the latest Service Pack installed - either SP3 for Office 2000 and XP, or SP1 for Office 2003.

If you don’t want to go all that difficulty and you just need to convert just a single .docx file, point your browser to docx-converter.com. Upload your file, select your preferred format (.doc is just one choice), and enter your email address. In a moment, you should get a note containing a link to download the converted file. It’s a free service.

Optimize your Windows System Registry with WinASO Registry Optimizer


Registry cleaning is one of numerous methods employed for performing system tune up on Microsoft Windows operating systems. Its purpose is to remove redundant or unwanted entries from the registry. The softwares used to perform this operation are often called as a registry cleaner. By performing registry cleanup, it presents you instant liberation from various computer problems such as removing stubborn useless programs, getting rid of malware and viruses as well as avoiding system crashes and blue screens. Hence, we will be presented with improved, superior and error-free Windows operating system.

Main Window

WinASO Registry Optimizer is registry cleaner software utility that will allow you to perform all these tasks in only a few clicks. WinASO Registry Optimizer cleans the registry by removing unwanted clutter, repairing registry problems and performing system maintenance as well as optimization. WinASO Registry Optimizer also offer tools for managing your start-up programs, purging histories, optimizing internet connections and system settings as well as maintaining your computer to peak performance. For example, you can clean all traces left by various internet applications or browsers such as Internet Explorer using only with a simple tool provided.

Iran’s Newest Cruise Missile


So, Tehran is showing off yet another cruise missile (as it seems to do every few months). This latest weapon, dubbed the Ghader, is apparently designed to destroy warships sailing up to 124 miles off the nation’s coastline.
Now if the missile actually works, it will be able to take out targets anywhere in the Persian Gulf or Gulf of Oman. However, while Tehran’s got a bunch of cruise missiles and ballistic missiles, it will be interesting to see if the Iranian’s have mastered the guidance and targeting systems needed to strike a moving target. Iran frequently unveils new tech that are nothing more that parade pieces. Furthermore, all the U.S. needs to do is park its ships beyond the reach this and Tehran’s other new “carrier killer” missile with a 185-mile range.  I mean, Tomahawks and F/A-18E/F Super Hornets launched from 400 to 1,000 miles offshore could easily strike Iran’s missile batteries if the Iranian military ever tried to close down the Persian Gulf. So while the missiles pose a limited threat to the region, they could be put out of action by the U.S.  Navy (or Air Force for that matter). Sorry Iran, you haven’t yet mastered area denial in the same way that China is.
Still, check out this interesting post over at DoDBuzz that lists what might actually be a bigger area denial threat to U.S. ships in the Gulf, albeit less glamorous one, than cruise missiles; Iranian sea mines.
From the AP:
Iran’s president claimed on Tuesday the country’s military can cripple enemies on their own ground as Tehran put a new Iranian-made cruise missile on display, the latest addition to the nation’s growing arsenal.
The state TV reported that the new missile, showcased at a ceremony in Tehran, is designed for sea-based targets, with a range of 124 miles (200 kilometers) and is capable of destroying a warship. The TV said it can travel at low altitudes and has a lighter weight and smaller dimensions.
“The best deterrence is that the enemy does not dare to invade,” President Mahmoud Ahmadinejad said during the ceremony. As he spoke, the TV showed footage of the weapon, dubbed “Ghader,” or “Capable” in Farsi.


So, Tehran is showing off yet another cruise missile (as it seems to do every few months). This latest weapon, dubbed the Ghader, is apparently designed to destroy warships sailing up to 124 miles off the nation’s coastline.
Now if the missile actually works, it will be able to take out targets anywhere in the Persian Gulf or Gulf of Oman. However, while Tehran’s got a bunch of cruise missiles and ballistic missiles, it will be interesting to see if the Iranian’s have mastered the guidance and targeting systems needed to strike a moving target. Iran frequently unveils new tech that are nothing more that parade pieces. Furthermore, all the U.S. needs to do is park its ships beyond the reach this and Tehran’s other new “carrier killer” missile with a 185-mile range.  I mean, Tomahawks and F/A-18E/F Super Hornets launched from 400 to 1,000 miles offshore could easily strike Iran’s missile batteries if the Iranian military ever tried to close down the Persian Gulf. So while the missiles pose a limited threat to the region, they could be put out of action by the U.S.  Navy (or Air Force for that matter). Sorry Iran, you haven’t yet mastered area denial in the same way that China is.

 

Libyan Rebel UAV


Not all of the Libyan rebels’ weaponry was jerry-rigged DIY gear put together from whatever arms (or toys) the militia could find. For the first time we’re seeing that the rebels used a thoroughly 21st Century tool of war; the UAV.
The Scout micro UAV, made by the Canadian firm Aeryon Labs, was used by the rebels to gain intelligence on Gadhafi’s troops. As you’ll see in the video (after the jump), the rebels were able to use the three-pound, VTOL aircraft after only a day and a half of training. Check out the Scout’s thermal camera video of a Libyan artillery position firing at night at the 59-second mark.
The little battery-powered quad-rotor, yes, quad-rotor can fly for 25 minutes up to 13,000 feet and operate in temperatures up to 122 degrees Fahrenheit, according to Aeryon. It uses GPS for navigation and has a range of just under two miles, likely due to its WiFi-based comms system.
While likely not “exquisite”, to use Pentagonese, this weapon was obviously durable, portable and really easy to use. Rebel pilots controlled it using a “map-based touch screen interface” (almost an auto pilot) rather than a traditional joystick and video camera and watched as the intel was fed to their computers.
Another Canadian firm, Zariba Security Corporation, was tasked with getting the drone to the rebels and training them how to use it.


Latest China Mobiles Secret Codes

china mobile iphone 150x150 Latest China Mobiles Secret Codes,Tips,Tricks...
Default user code : 1122, 3344, 1234, 5678
Engineer mode : *#110*01#
Factory mode : *#987#
Enable COM port : *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
Restore factory settings : *#987*99#
LCD contrast : *#369#
Software version : *#800#
Software version : *#900#
Set default language : *#0000# Send
Set English language : *#0044# Send
Set English language (new firmware) : *#001# Send

Latest Technology of Intel Core i3,i5,i7 Processor

intel i7 technology Latest Technology of Intel Core i3,i5,i7 ProcessorIntelInside  as a emperor computer world. Pc not functioned in without Intel.Now intel to introduced in next generation(Second Generation) processors like as i3,i5 and i7.Intel Turbo boost technology implement in this type of processors.
The turbo boost technology specially made by Intel second generation computers.urbo Boost Technology 2.0 automatically allows processor cores to run faster than the base operating frequency if it’s operating below power, current, and temperature specification limits.
Features of Intel Turbo Boost Technology: 
  • Dynamically increasing performance – auto detect in operating system requirements and support highest processor performance state.
  • Intel Turbo Boost Technology 2.0 is dependent on the number of active cores. The amount of time the processor spends in the Intel Turbo Boost Technology 2.0 state depends on the workload and operating environment.
  • the cores also involved in some access levels
    • Number of active cores
    • Estimated current consumption
    • Estimated power consumption
    • Processor temperature
  • The frequency level is automatically increased in level of system performsnce and  user dependents.
  • Intel Turbo Boost Technology 2.0 has multiple algorithms operating in parallel to manage current, power, and temperature to maximize performance and energy efficiency.
  • Intel Turbo Boost Technology 2.0 allows the processor to operate at a power level that is higher than its rated upper power limit (TDP) for short durations to maximize performance.

How to Fix MBR in Windows 7

How to fix MBR error in windows 7

How to Repair the MBR on Windows 7,How to Fix Windows 7 When It Fails to Boot,How to fix MBR error in 7‎,Run fixmbr from within Win 7‎ ,How to fix MBR through command prompt?, Simplest way to restore Windows 7 MBR?
I find in above type of problems in search engine‎ and i am already published the related problem in windows xp similar to Windows vista.
Please fallow the instruction and fix your problem.
Step1: Rastart your pc and insert windows 7 setup dvd
Step2: and click it ” Repair to your Computer” now windows can scan your previous windows installation.
Step3: and one menu is displayed “System Recovery option”
Step4: Then select click your operating system “windows7″ and click next.
How to repair MBR on Windows 7 How to Fix MBR in Windows 7
Step5: now click “command prompt” in your displayed screen.
Step6: and give bootrec.exe /fixmbr and enter it now automatically your problem solved.

Configure Your iPhone for an Exchange Mailbox

Steps to Configure Your iPhone For an Exchange Mailbox

Step 1 : First of all you need to make an account for this. To make the account on your iPhone just go to Desktop -> Click Settings -> Under Settings -> Select Mail, Contacts, Calenders.
Step 2 : Select Add Account.
Step 3 : Now Select Microsoft Exchange.
Step 4 : Now just enter this below information :
- Email: Enter full email address.
-Domain: Enter domain name (Optional)
-Username: Enter the User Name. (Ordinarily follows the format user_domain.com)
-Password: Enter the password for the mailbox.
-Description: Enter Exchange Account.
-Click on Next.
Step 5 : With clicking Next, You will be questioned to enter the server name, So Enter the Server name as mobile.myexchangeemail.com and Click on Next.
Step 6 : Now Set the following
- Mail: ON
- Contacts: OFF
- Calendars: OFF
-Click on Save.
That’s all. Now you can send and receive mails from your iPhone as you could do with any Blackberry or PDA.

Create friends group on Google SMS channel and Send SMS to your friends for free

Recently Google India team launched an interesting service called “Google SMS channel“. Using Google SMS channel you can send SMS text messages to your friends for free. Even you can get SMS alerts on your mobile for news, cricket scores, Jokes, Job alerts and lot more, all for no cost! (Image credit: katielips)

How it works? Create a group on Google SMS channel. Invite your friends to join this group by providing their mobile numbers. That’s it. You all can send SMS text messages to this group, which will reach to all registered phone numbers in your group. Isn’t it that simple?

Another interesting use of this service is to get daily jokes on your mobile. Just search all the existing public Google SMS channels for your favorite subject and subscribe to that channel or group. For example if you want to get latest cricket updates or score, just search the group names like “cricket updates” and subscribe to appropriate group. You will get all cricket score updates for free on your mobile through SMS text alerts. If you subscribe to any jokes channel and if you don’t want spammed by messages during busy hours then you can set the SMS message frequency per day like only 4 text messages per day between 6 pm to 10 pm. You can unsubscribe from any channel at any time.

Publishers can use this service like RSS feed subscription. Publishers can send blog updates to their readers via SMS.
This SMS service is currently available for Indian phone numbers only. Soon may be available for other countries. Other than English some local Indian languages like Hindi, Tamil etc. are also supported to compose the SMS test messages.
How to start?
Head to Google SMS channel, register your phone number with Google and get your favorite channel content on your mobile all for free.

An Artificial Leaf Invented Which Can Solve Power Crisis

Scientists have created the world’s first practical artificial leaf that can turn sunlight and water into energy, which they claim could pave the way for a cheaper source of power.
A team at Massachusetts Institute of Technology (MIT) says that the artificial leaf from silicon, electronics and various catalysts which spur chemical reactions within the device, can use sunlight to break water into hydrogen and oxygen which can then be used to create electricity in a separate fuel cell.

Artificial leaf
An important step toward realizing the dream of an inexpensive and simple “artificial leaf,” a device to harness solar energy by splitting water molecules, has been accomplished by two separate teams of researchers at MIT
Scientists have created

“A practical artificial leaf has been one of the Holy Grails of science for decades. We believe we have done it. And placed in a gallon of water and left in sun, these artificial leaves could provide a home in the developing world with basic electricity for a day,” Daniel Nocera, who led the team, said.
He added: “Our goal is to make each home its own power station. One can envision villages in India and Africa not long from now purchasing an affordable basic power system based on this technology.”
Both teams produced devices that combine a standard silicon solar cell with a catalyst developed three years ago by professor Daniel Nocera. When submerged in water and exposed to sunlight, the devices cause bubbles of oxygen to separate out of the water.
The next step to producing a full, usable artificial leaf, explains Nocera, the Henry Dreyfus Professor of Energy and professor of chemistry, will be to integrate the final ingredient: an additional catalyst to bubble out the water’s hydrogen atoms. In the current devices, hydrogen atoms are simply dissociated into the solution as loose protons and electrons. If a catalyst could produce fully formed hydrogen molecules (H2), the molecules could be used to generate electricity or to make fuel for vehicles. Realization of that step, Nocera says, will be the subject of a forthcoming paper.
The reports by the two teams were published in the journals Energy & Environmental Science on May 12, and the Proceedings of the National Academy of Sciences on June 6. Nocera encouraged two different teams to work on the project so that each could bring their special expertise to addressing the problem, and says the fact that both succeeded “speaks to the versatility of the catalyst system.”
Nocera’s ultimate goal is to produce an “artificial leaf” so simple and so inexpensive that it could be made widely available to the billions of people in the world who lack access to adequate, reliable sources of electricity. What’s needed to accomplish that, in addition to stepping up the voltage, is the addition of a second catalyst material to the other side of the silicon cell, Nocera says.
Making hydrogen gas (the bubbles) from a solar cell in water, a Sun Catalytix prototype.
Making hydrogen gas (the bubbles) from a solar cell in water, a Sun Catalytix prototype.

The “leaf” system, by contrast, is “still a science project,” Nocera says. “We haven’t even gotten to what I would call an engineering design.” He hopes, however, that the artificial leaf could become a reality within three years.

IPv6: Are You Ready?

As IPv6 is around the corner and set to grow in the coming few years, are you ready for it yet?
Find out using this test if your network are ready for IPv6.
IPv6IPv6 is an IP address standard designed to replace the current IPv4 protocol, which has been in use since the 1980s for routing Internet traffic. The new protocol has been available for several years now and supports several magnitudes more address spaces than IPv4, while also providing better security and reliability.
For more than 30 years, 32-bit addresses have served us well,but the growth of the Internet has mandated a need for more addresses than is possible with IPv4. IPv6 allows for vastly more addresses. IPv6 is the only long-term solution,  it has not yet been widely deployed. With IPv4 addresses expected to run out in 2011, only 0.2% of Internet users have native IPv6 connectivity.

Decomposition of an IPv6 address into its binary form.
Decomposition of an IPv6 address into its binary form.
While IPv4 allows 32 bits for an Internet Protocol address, and can therefore support 232 (4,294,967,296) addresses, IPv6 uses 128-bit addresses, so the new address space supports 2128 (approximately 340 undecillion or 3.4×1038) addresses. This expansion allows for many more devices and users on the internet as well as extra flexibility in allocating addresses and efficiency for routing traffic. It also eliminates the primary need for network address translation (NAT), which gained widespread deployment as an effort to alleviate IPv4 address exhaustion.
On 8 June, 2011, top websites and Internet service providers around the world, including Google, Facebook, Yahoo!, Akamai and Limelight Networks joined together with more than 1000 other participating websites in World IPv6 Day for a successful global-scale trial of the new Internet Protocol, IPv6. By providing a coordinated 24-hour “test flight”, the event helped demonstrate that major websites around the world are well-positioned for the move to a global IPv6-enabled Internet, enabling its continued exponential growth.
Organised by the Internet Society, the project was intended to raise awareness about the need to start the global transition to IPv6 and to enable participants to gather data about potential glitches.
Many of the problems are likely to stem from the simple facts that IPv6 is far newer and untested technology compared with IPv4, and that the two protocols will need to coexist for several years.
The real test of the IPv6 protocol, however, will come when companies start migrating to it in earnest in the next few years.

Visible Light Communications

Visible Light Communication uses light emitting diodes (LEDs), for the dual role of illumination and data transmission. Using the visible light spectrum, which is free and less crowded than other frequencies, wireless services can be piggy-backed over existing lighting installations. With this leading edge technology, data including video and audio, internet traffic, etc, can be transmitted at high speeds using LED light.
Prof Harald Haas leads the EPSRC-funded D-LIGHT project at the School of Electronics and Engineering at the University of Edinburgh.
VLC technology has the potential to deliver data transfer rates in excess of hundreds of megabits per second. Light radiation neither constitutes nor suffers from electromagnetic interference (EMI) making VLC a very attractive technology in places/environments where electromagnetic interference (EMI) is an issue, such as in hospitals and in aircraft. In addition, where security of local communication is important eg defence and fanance applications, D-Light technology offers a secure medium for communication in an office/building environment.
The two year D-Light project is midway through its funding. The main commercial goal is the formation of a University of Edinburgh spinout company, hopefully starting in 2012.
Visit the D-LIGHT project site here:  http://visiblelightcomm.com/

VLC Applications:

A wide range of applications would benefit from using novel visible light communications:
  • WiFi Spectrum Relief - Providing additional bandwidth in environments where licensed and/or unlicensed communication bands are congested
  • Smart Home Network – Enabling smart domestic/industrial lighting; home wireless communication including media streaming and internet access
  • Commercial Aviation – Enabling wireless data communications such as in-flight entertainment and personal communications
  • Hazardous Environments- Enabling data communications in environments where RF is potentially dangerous, such as oil & gas, petrochemicals and mining
  • Hospital and Healthcare – Enabling mobility and data communications in hospitals
  • Defence and Military Applications – Enabling high data rate wireless communications within military vehicles and aircraft
  • Corporate and Organisational Security – Enabling the use of wireless networks in applications where (WiFi) presents a security risk
  • Underwater Communications – Enabling communications between divers and/or remote operated vehicles
  • Location-Based Services – Enabling navigation and tracking inside buildings.
The two year D-Light project is midway through its funding. The main commercial goal is the formation of a University of Edinburgh spinout company, hopefully starting in 2012.

Welcome To My Blog

Hi,

        About Me: I am RAJASEKAR From Salem currently living in Chennai