You probably noticed that last week Google announced they will be launching their Chrome operating system. To sum it up for you: Google Chrome OS is a basically just the Google Chrome browser transformed into an operating system. It boots up in 7 seconds, uses Google Docs to replace Microsoft Office, and stores all of your files in the cloud (online). Although it doesn’t launch until next year, Google released the source files which you can now install as a Virtual Machine.
Monday, August 15, 2011
FIND WINDOWS XP PRODUCT KEY FROM YOUR INSTALLATION CD
Have you lost your Windows CD Key and are desperately looking for it? No backups, nothing. What do you do now? Well till you have your Original installation you can easily find the Product key without breaking a sweat.
check out our earlier post on how you can find your Windows XP Product key.)
![]() |
- Insert the Installation CD into your CD / Drive Drive.
- Explore the CD and navigate to the i386 folder.
- Open the file UNATTEND.txt and scroll down to the last line.
- You will find your Windows XP Product key there.
DELETE AUTORUN.INF VIRUS WITHOUT ANY SOFTWARE!
There are Numerous softwares available that exclusively deal with Autorun.inf and other Autorun viruses, for example ‘USB Disk Security‘. But Inspite of installing such kind of software, Sometimes you might accidentally open your USB disk Drive (Pen-drive) without looking at the warning by your Antivirus Software and thus Affecting your System with Autorun.inf virus. Once Autorun.inf gets control on your System, it will repeatedly Block any USB Scanning Software preventing it from deleting. It also Restricts you from opening hard drives on a double click.
In such cases, the Traditional Method of deleting Suspicious Programs Using Command Prompt is quite Useful. So Lets start with the Steps:
1. Open command prompt. Go to start > Run, and type “cmd” . Press enter.
2. Type “cd\” and press enter to get to the root directory of your System.
3. Type “attrib -h -r -s autorun.inf” and press enter. This will look for autorun.inf in the selected Drive.
4. Type “del autorun.inf” and press enter. This will delete autorun.inf virus from the selected Drive.
In such cases, the Traditional Method of deleting Suspicious Programs Using Command Prompt is quite Useful. So Lets start with the Steps:
1. Open command prompt. Go to start > Run, and type “cmd” . Press enter.
2. Type “cd\” and press enter to get to the root directory of your System.
3. Type “attrib -h -r -s autorun.inf” and press enter. This will look for autorun.inf in the selected Drive.
4. Type “del autorun.inf” and press enter. This will delete autorun.inf virus from the selected Drive.
5. Repeat the above Steps for other drives. To navigate to other Drives, First type “cls” to clear your ‘command prompt’ then type “d:” . Repeat the Steps for all the Drives including your USB Disk Drive.
6. Restart your System
Monday, July 11, 2011
PEN DRIVE FORMATTING PROBLEMS N SOLUTIONS
Let me give you a solution to format FLASH DRIVE/ Pen Drives.
Many users complain that they are not able to format their Flash drive.
They experienced an error message which said- “Windows was unable to format drive G:”
Don’t worry!
Follow these steps-
-Just right click on the My Computer icon.
-Select Manage.
-Select Disc management.
-Now find your concerning flash drive in current window.
-Right click on concerning Flash drive.
Select format.
Select format.
-Select Continue at every process.
-Your faulty flash drive will be formatted in few seconds.
Apply this procedure and gain powerful results!
We are happy to hear about new problems if Any , SO don't forget to leave your comments
Tuesday, March 22, 2011
ADOBE PHOTOSHOP CS : Creating the Magical Mirror Effect
1.Start with a vision.
first step is to start with a picture, or perhaps more accurately, a vision of your final mirror image. I started with a picture of a sunrise I took on a mountaintop in China. (I actually used a copy of the image because I never work on my original files. A good idea!)
2. Open the Canvas Size dialog box.
In Photoshop, we can increase the Canvas size (actual working area) of an image by going to Image > Canvas Size. In this screen shot, we see the actual size of my original image. When we first open Canvas Size, the center box in the tick-tac-toe grid is shaded.
3. Increase Canvas Size.
The next step is to increase the Canvas Size (again, the actual working area). We increase the Canvas Size by moving the shaded box into any of the other boxes—and then typing in a new height and /or width dimensions. Because I wanted to increase the height of my Canvas Size on the bottom side of my picture, I moved the shaded area to the top middle box. Then I typed in the new Canvas size which, for ease of use, was a bit more than double the height of my original photograph.
4. Create a flipped image of your original.
Creating a flipped image of your original is easy. Start by using the Marquee Tool to select the original image area, the sunrise in this case.Then go to Edit > Copy. Next go to File> New. When the new is created, it will be exactly the same size of your copied image. Now go to Edit > Paste. Your image will be pasted into the new document-on a new layer. To flip the image (vertically in this case), go to Edit > Transform > Flip Vertically. Now the image will be flipped.
5. Create the Magical Mirror Effect.
To create the Magical Mirror Effect, use the Move tool and drag your flipped image into the blank area of your original image. Now carefully line up both images so they look perfectly mirrored. Next flatten your image by going to Layers > Flatten.
6. Conclusion.
An optional and fun thing to do with some vertical mirror images (you can create horizontal mirror images, too) is to create the effect that your original image is reflected in water. Here is how it's done. Select the mirrored part of your image (lower half) using the Marquee tool. Now go to Filters > Distort > Ocean Ripple. Play around with the Ripple Size and Ripple Magnitude until you are happy with the effect. Click on OK. Now go to Select > Deselect to deselect the area on which you have applied the Ocean Ripple filter.
Finally, use the Crop tool to trim your picture to your liking.
first step is to start with a picture, or perhaps more accurately, a vision of your final mirror image. I started with a picture of a sunrise I took on a mountaintop in China. (I actually used a copy of the image because I never work on my original files. A good idea!)
2. Open the Canvas Size dialog box.
In Photoshop, we can increase the Canvas size (actual working area) of an image by going to Image > Canvas Size. In this screen shot, we see the actual size of my original image. When we first open Canvas Size, the center box in the tick-tac-toe grid is shaded.
3. Increase Canvas Size.
The next step is to increase the Canvas Size (again, the actual working area). We increase the Canvas Size by moving the shaded box into any of the other boxes—and then typing in a new height and /or width dimensions. Because I wanted to increase the height of my Canvas Size on the bottom side of my picture, I moved the shaded area to the top middle box. Then I typed in the new Canvas size which, for ease of use, was a bit more than double the height of my original photograph.
4. Create a flipped image of your original.
Creating a flipped image of your original is easy. Start by using the Marquee Tool to select the original image area, the sunrise in this case.Then go to Edit > Copy. Next go to File> New. When the new is created, it will be exactly the same size of your copied image. Now go to Edit > Paste. Your image will be pasted into the new document-on a new layer. To flip the image (vertically in this case), go to Edit > Transform > Flip Vertically. Now the image will be flipped.
5. Create the Magical Mirror Effect.
To create the Magical Mirror Effect, use the Move tool and drag your flipped image into the blank area of your original image. Now carefully line up both images so they look perfectly mirrored. Next flatten your image by going to Layers > Flatten.
6. Conclusion.
An optional and fun thing to do with some vertical mirror images (you can create horizontal mirror images, too) is to create the effect that your original image is reflected in water. Here is how it's done. Select the mirrored part of your image (lower half) using the Marquee tool. Now go to Filters > Distort > Ocean Ripple. Play around with the Ripple Size and Ripple Magnitude until you are happy with the effect. Click on OK. Now go to Select > Deselect to deselect the area on which you have applied the Ocean Ripple filter.
Finally, use the Crop tool to trim your picture to your liking.
Tips to Find Unauthorized Activity on Your Email Account
Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.
If this is the case, then what is the reason for many people to lose their accounts? The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password. Are you confused? If so continue reading and you’ll come to know… Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.
1. WEBSITE SPOOFING Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL. For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.
Solution: § Never try to login/access your email account from the sites other than the original site. § Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.
2. BY USING KEYLOGGERS The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.
Solution: Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.
3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES Do you access your email from cyber cafes? Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time. This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety. So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked.
Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.
If this is the case, then what is the reason for many people to lose their accounts?
The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.
Are you confused? If so continue reading and you’ll come to know…
Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.
1. WEBSITE SPOOFING
Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.
For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.
Solution:
§ Never try to login/access your email account from the sites other than the original site.
§ Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.
2. BY USING KEYLOGGERS
The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.
Solution:
Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.
3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES
Do you access your email from cyber cafes? Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.
This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.
So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked.
How to Recover Hacked Email Accounts?
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.
For Gmail
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step-1 Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2
Step-2 Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like Email addresses of up to five frequently emailed contacts.
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link
For Yahoo and Hotmail
Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions I hope this post will help you recover the lost account. I highly recommend that you also read my post on How to protect your email account from being hacked and Tips to find unauthorized activity on your Gmail account so that you always stay protected!
Friday, March 18, 2011
Create Wallpaper As Slideshow On your Desktop
One of our all time favourite wallpaper slideshow software used to be Webshots. A number of freewares now let you do the same without having to install any big application. Windows 7 has this functionality inbuilt.
Desktop Slideshow is one such freeware that allows you to change desktop wallpapers automatically. You just set the amount of time you want and then the program will Slideshow your pictures as desktop backgrounds.
- Features:
- Makes a slideshow on your desktop like Windows 7 and OS X
- Time interval function
- Image format filter
- Starts with Windows
- Very easy to use
This program is very easy to use. It starts with Windows xp and also has time interval function.
Download Desktop Slideshow
You can download this free from here: Download Desktop Slideshow
How to Hide Your Friends List in Facebook
it was very difficult to hide your friends list from some or all of your Facebook friends and public, but now it’s possible.

Just follow the simple steps below to hide your friend’s list on Facebook

1. Log in to your Facebook account.
2. Go to Account > Privacy Settings from any Facebook page.
3. On that page, you will see ‘Connecting on Facebook’, click View Setting .


4. Look for “See your friend list” and change the option to whatever you want. To completely hide your friend’s list from everyone, follow the steps below.
How to change the user information in windows
Requirement of Users for changing the user information in windows. see and follow its instruction step-by-step in your needed.
Instruction
--------------------
1. Open the registry editor(type reedit inside the run box and hit enter)
2. Navigate to all the following key HKLM\SOFTWARE\Microsoft\Windows.NET\Current Version
3. Look for the following details and make necessary changes as follows
>>Registered Organization
the name of the organization(Changes this to your desired organization)
>>Registered Owner
The name of the user (change this your desired name)
This change are reflected in the system instantaneously and requires no reboot.
You can confirm this by seeing the system properties (right-Click on “my computer" icon and select properties).
Both are REG_SZ_value. changing the registered organization and owner names doesn't affect installed application. However, application
that you install after changing these valor are likely to pick up the new name
How to Change Windows Users Without Logging Off |
If you have several users on your computer, you can change users without logging off the original user. Read on for some steps to show you how.
How to Write-Protect a Flash Drive
Flash drives are a convenient way to move data from one computer to another. They have large storage capacities, and they are hard to beat for sharing files. Larger flash drives can hold 16 full-length DVD (Digital Video Disk) quality movies or almost 1,000 hours of audio. Flash drives have become the most common way to exchange and share files, second only to the Internet, but they are now the most common way to spread viruses next to the Internet too. It can take a long time to collect and compile your files and only seconds to lose them. Write-protecting your flash drives will prevent you from losing your files.
Introduction
1. Download USB WriteProtector. Unzip it and save the files to your flash drive. Run the program and select your language
3.Close the dialog box, unplug your drive, then plug it back in.
Introduction
1. Download USB WriteProtector. Unzip it and save the files to your flash drive. Run the program and select your language
2. Select "USB write protection ON" and take note of "The changes take effect when attaching a USB storage medium" statement. Your drive will not be write-protected until you unplug your drive and plug it back in.
Writing to Your Write-Protected Drive
1. If you try to write a file, delete or change a file on your write-protected thumb drive you will get an error, as shown. Click "OK."
2. Run USB WriteProtector again and select "USB write protection OFF" to turn off write protection.
3. Unplug your drive and plug it back in for the changes to take effect once again.
source :-www.ehow.com
Tuesday, March 15, 2011
Monday, March 14, 2011
Advanced sign-in security for your Google account
Has anyone you know ever lost control of an email account and inadvertently sent spam—or worse—to their friends and family? There are plenty of examples (like the classic "Mugged in London" scam) that demonstrate why it's important to take steps to help secure your activities online. Your Gmail account, your photos, your private documents—if you reuse the same password on multiple sites and one of those sites gets hacked, or your password is conned out of you directly through a phishing scam, it can be used to access some of your most closely-held information.
Most of us are used to entrusting our information to a password, but we know that some of you are looking for something stronger. As we announced to our Google Apps customers a few months ago, we've developed an advanced opt-in security feature called 2-step verification that makes your Google Account significantly more secure by helping to verify that you're the real owner of your account. Now it's time to offer the same advanced protection to all of our users.
2-step verification requires two independent factors for authentication, much like you might see on your banking website: your password, plus a code obtained using your phone. Over the next few days, you'll see a new link on your Account Settings page that looks like this:

Take your time to carefully set up 2-step verification—we expect it may take up to 15 minutes to enroll. A user-friendly set-up wizard will guide you through the process, including setting up a backup phone and creating backup codes in case you lose access to your primary phone. Once you enable 2-step verification, you'll see an extra page that prompts you for a code when you sign in to your account. After entering your password, Google will call you with the code, send you an SMS message or give you the choice to generate the code for yourself using a mobile application on your Android, BlackBerry or iPhone device. The choice is up to you. When you enter this code after correctly submitting your password we'll have a pretty good idea that the person signing in is actually you.

It's an extra step, but it's one that significantly improves the security of your Google Account because it requires the powerful combination of both something you know—your username and password—and something that only you should have—your phone. A hacker would need access to both of these factors to gain access to your account. If you like, you can always choose a "Remember verification for this computer for 30 days" option, and you won't need to re-enter a code for another 30 days. You can also set up one-time application-specific passwords to sign in to your account from non-browser based applications that are designed to only ask for a password, and cannot prompt for the code.
Most of us are used to entrusting our information to a password, but we know that some of you are looking for something stronger. As we announced to our Google Apps customers a few months ago, we've developed an advanced opt-in security feature called 2-step verification that makes your Google Account significantly more secure by helping to verify that you're the real owner of your account. Now it's time to offer the same advanced protection to all of our users.
2-step verification requires two independent factors for authentication, much like you might see on your banking website: your password, plus a code obtained using your phone. Over the next few days, you'll see a new link on your Account Settings page that looks like this:

Take your time to carefully set up 2-step verification—we expect it may take up to 15 minutes to enroll. A user-friendly set-up wizard will guide you through the process, including setting up a backup phone and creating backup codes in case you lose access to your primary phone. Once you enable 2-step verification, you'll see an extra page that prompts you for a code when you sign in to your account. After entering your password, Google will call you with the code, send you an SMS message or give you the choice to generate the code for yourself using a mobile application on your Android, BlackBerry or iPhone device. The choice is up to you. When you enter this code after correctly submitting your password we'll have a pretty good idea that the person signing in is actually you.
It's an extra step, but it's one that significantly improves the security of your Google Account because it requires the powerful combination of both something you know—your username and password—and something that only you should have—your phone. A hacker would need access to both of these factors to gain access to your account. If you like, you can always choose a "Remember verification for this computer for 30 days" option, and you won't need to re-enter a code for another 30 days. You can also set up one-time application-specific passwords to sign in to your account from non-browser based applications that are designed to only ask for a password, and cannot prompt for the code.
Tuesday, February 22, 2011
How to Convert an MP3 From128 KBPs to 48KBPs
How to Convert an MP3 From128 KBPs to 48KBPs
Converting an MP3 from 128 KBPS to 48 KBPS is easily done with a free audio converter program such as iTunes, Switch or dBpoweramp. Simply import the MP3 into the program of your choice, adjust the MP3 bit rate settings and click convert. Although converting an MP3 from 128 KBPS to 48 KBPS will significantly reduce the file size of an MP3, it will also significantly reduce the audio quality of the MP3
Converting an MP3 from 128 KBPS to 48 KBPS is easily done with a free audio converter program such as iTunes, Switch or dBpoweramp. Simply import the MP3 into the program of your choice, adjust the MP3 bit rate settings and click convert. Although converting an MP3 from 128 KBPS to 48 KBPS will significantly reduce the file size of an MP3, it will also significantly reduce the audio quality of the MP3
Using iTunes
Open iTunes.
Open iTunes preferences. Click "iTunes" and select "Preferences" on a Mac or click "Edit" and select "Preferences" on a PC.
Open "Import Settings" and select the "MP3 Encoder" as the "Import Using" audio format.
Click the menu next to "Settings" and select "Custom."
Select 48 KBPS as the bit rate by clicking the drop down menu next to "Stereo Bit Rate."
Click "OK" to save the changed settings. Then click "OK" to exit of "Import Settings" and click "OK" again to exit the iTunes preferences menu.
Click "File," "Add to Library" and select the MP3 from your computer that you would like to convert to 48 KBPS. This will import the MP3 into your iTunes library.
Click on the imported MP3, select "Advanced" and click "Create MP3 Version." The MP3 will then be converted to 48 KBPS. When the conversion is complete, the 48 KBPS MP3 file will appear directly below the original 128 KBPS MP3 file. (See References 1).
Subscribe to:
Posts (Atom)