AROS is a lightweight open source OS designed to be compatible with AmigaOS 3.1 but also improve on it. The project was started in 1995 and can today be run on both PowerPC and IBM PC compatible hardware. It also includes an emulator that makes it possible to run old Amiga applications.

Morph OS

MorphOS is a lightweight, media-centric OS build to run on PowerPC processors. It is inspired by AmigaOS and also includes emulation to be able to run Amiga applications.


Source model: Closed source
License: Mixed proprietary and open source
Platform: Pegasos, some Amiga models, EFIKA.

Sky OS

SkyOS is a closed source project written by Robert Szeleney and volunteers. It originally started as an experiment in OS design. It’s intended to be an easy-to-use desktop OS for average computer users. Well-known applications such as Firefox have been ported to run on Sky OS.


Source model: Closed source
License: Proprietary
Platform: x86
State: Beta

Syllable desktop

Syllable is a free and open source operating system that was forked in 2002 from AtheOS, an AmigaOS clone. It’s intended as a lightweight and fast OS suitable for home and small office users.


Source model: Free and open source
License: GNU General Public License
Platform: x86
State: Alpha

React OS

ReactOS is an operating system designed to be compatible with Microsoft Windows software. The project started in 1998 and today it can run many Windows programs well. The ReactOS kernel has been written from scratch but the OS makes use of Wine to be able to run Windows applications.

Source model: Free and open source
License: Various free software licenses
Platform: x86 (more under development)
State: Alpha

Heysan is VIRUSSSS !!!

Heysan Link :- Its spreading fast and lot of things appear to be changing..like contact list being deleted, people in your contact list recieving link to heysan.com as if you are sending it..and much more. Until we find some solution from Google, People please be advised nto to open suck links.

For those of you who have been regularly using GMail, the recent arrival of unexplained chats from your friends might have piqued your curiosity. A chat lands up in your GMail Inbox claiming to have been sent to you by one of your friends bearing some sort of cheesy one liners and that you should click on the link to view them. Something like this:


Though usually I'm highly suspicious of these sorts of clicks, I went ahead and clicked it. (After all, Firefox, my favourite web browser has quite a decent track record as far as security is concerned).The site that opened up looked like:

There are all kinds of people in the world and some are likely to enter their Google ids and passwords due to ignorance. In my opinion, this site is a fraud that is directly and obviously obtaining access to userids and passwords of GMail accounts and using them to perpetuate a mass mailing campaign from within the comfortable confines of your GMail inbox. The fact that there exists a hidden link to admob.com (a highly SEOed advert site - see image) by means of a 1px x 1px image, bolsters my gut feeling about this site. Beware all of you who get a link to heysan.com - I think that its just the tip of a very large iceberg. Recent reports of a click based vulnerability in all browsers is a further cause for tension. Be on your toes everyone!



Haiku

Introduction :
Haiku is an open source project aimed at recreating and continuing the development of the BeOS operating system (which Palm Inc. bought and then discontinued). Haiku was initially known as OpenBeOS but changed its name in 2004.
Haiku is compatible with software written for BeOS.



Source model: Free and open source
License: MIT License
Platform: x86
PowerPCState: Pre-Alpha

Read more at the Haiku website.

AmigaOS 4.1

Introduction :
This month (September 2008) AmigaOS 4.1 was released .
Although AmigaOS is a veteran in the field (many have fond memories of the original Amiga computer), its current version is a fully modern OS. AmigaOS only runs on specific PowerPC-based hardware platforms . The company ACube is currently marketing and distributing AmigaOS and is going to bundle the OS with their motherboards.

Hardware Requirements :
PowerPC processor running at 400MHz or higher, 256 megabytes of RAM, 100 megabytes of hard drive space, and a Radeon 7000 video card. A Radeon 9250 is recommended, however, as AmigaOS 4.1 contains a new graphics subsystem that—like Windows Vista and Macintosh OSX—uses the card's 3D features for a graphics compositing layer.

The OS is solid and evolving, and there are many places it could go. The announcement of support for the SAM440 motherboards is just a start: there is a large existing base of PowerPC-based Macintoshes that could easily be made to run OS 4.1, and the low RAM requirements of the OS would make it perfect for running on Sony's PlayStation 3 or on any number of mobile platforms.

Source model: Closed source
License: Proprietary
Platform: PowerPC
State: Final






Changing label of drives on UBUNTU desktop !!

Install mtools for FAT32 or FAT16 partition or ntfsprogs for NTFS .
After installing unamount whose label is to be renamed and run required utility as the root user.
Restart the computer.

Phishing !!!


Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.

Communications purporting to be from popular social web sites (Youtube, Facebook, Myspace), auction sites (eBay), online banks (PayPal), or IT Administrators (Yahoo, ISPs, corporate) are commonly used to lure the unsuspecting.

Phishing is typically carried out by e-mail or instant messaging and it often directs users to enter details at a fake website whose URL and look and feel are almost identical to the legitimate one.

Even when using SSL with strong cryptography for server authentication it is practically impossible to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users and exploits the poor usability of current web security technologies

Email Spam !!!

Email Spam is a Form of net abuse, in which messaging systems indiscriminately send unsolicited bulk messages .

Also known as unsolicited bulk Email (UBE) or unsolicited commercial email (UCE), is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.
Since , e-mail is an extremely cheap mass medium, and professional spammers have automated their processes to the extent that millions of messages can be sent daily with little or no labor costs.
Thus, spamming can be very profitable even at what would otherwise be considered extremely low response rates.
Increasingly, e-mail spam today is sent via "zombie networks", networks of virus- or worm-infected personal computers in homes and offices around the globe; many modern worms install a backdoor which allows the spammer access to the computer and use it for malicious purposes.

Email Spoofing !!!!

E-mail spoofing is a term used to describe fraudulent e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source.Is a technique commonly used for spam e-mail and phishing to hide the origin of an e-mail message. By changing certain properties of the e-mail, such as the From, Return-Path and Reply-To fields (which can be found in the message header), ill-intentioned users can make the e-mail appear to be from someone other than the actual sender. The result is that, although the e-mail appears to come from the e-mail indicated in the "From" field (found in the e-mail headers) it actually comes from another e-mail address, probably the same one indicated in the "Reply To" field; if the initial e-mail is replied to, the delivery will be sent to the "Reply To" e-mail, that is, to the spammer's e-mail.
Method :- The technique is now used ubiquitously by mass-mailing worms as a means of concealing the origin of the propagation. On infection, worms such as ILOVEYOU, Klez and Sober will often try to perform searches for e-mail addresses within the address book of a mail client, and use those addresses in the From field of e-mails that they send, so that these e-mails appear to have been sent by the third party. For example: User1 is sent an infected e-mail and then the e-mail is opened, triggering propagation The worm finds the addresses of User2 and User3 within the address book of User1 From the computer of User1, the worm sends an infected e-mail to User2, but the e-mail appears to have been sent from User3 .

Installing XP over Vista !!!!

You need empty partition . To make one use computer management to resize existing partition and make space for a new one.
To resize partition :-
Go to disk management application . Righ Click on partition .
Click on shrink volume. Choose SPace.
Change drive letter or path to avoid confusion.
Right click on empty space created.
Click on new Simple volume.
Create partition with right click drive letter.
now --- > Boot using XP installation CD and install.
--- > You wont be able to boot into windows vista any longer.Boot into XP and install software called VistaBootPRO from www.vistabootpro.org which allows to make entry and changes to boot record.

Is the pen drive dead ????

Similar solution if your pen drive is not visible in My Computer .
Solution :- Go to My computer .
Right Click and click on manage.
Computer Management window opens.

Click on storage.
Click Disk Management.
You can see your pen drive here.
Format it with FAT32.
Even now if u cannot see your pen drive on my computer or it does not opens , then your pen drive is dead.

PC hangs and restarts automatically !!!

Similar errors :-
1) PC hangs and display error - display driver has stopped working normally. To work properly go for restart.
2) Boot Disk Error.
Solution :-
May be your hide drive is faulty.Run software Speedfan which has hard drive health utility . ALso you can download bootable disc called Ultimate Boot CD and boot from it and run some more checking utilities.
These will detect if there is any problem with the hard disk.

XP doesn't shows more than 3.25 GB RAM for 4GB Configuration ???

Such type of limitation is faced by 32 -bit operating systems.Install a 64 - bit windows XP and you will be able to use all 4GB.


Fingerprint Scanners for Security !!!

Computerized fingerprint scanners have been a mainstay of spy thrillers for decades, but up until recently, they were pretty exotic technology in the real world. In the past few years, however, scanners have started popping up all over the place -- in police stations, high-security buildings and even on PC keyboards. You can pick up a personal USB fingerprint scanner for less than $100, and just like that, your computer's guarded by high-tech biometrics. Instead of, or in addition to, a password, you need your distinctive print to gain access.
A fingerprint scanner system has two basic jobs -- it needs to get an image of your finger, and it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images. There are a number of different ways to get an image of somebody's finger. The most common methods today are optical scanning and capacitance scanning. Both types come up with the same sort of image, but they go about it in completely different ways.

Optical Scanners

The heart of an optical scanner is a charge coupled device (CCD), the same light sensor system used in digital cameras and camcorders. A CCD is simply an array of light-sensitive diodes called photosites, which generate an electrical signal in response to light photons. Each photosite records a pixel, a tiny dot representing the light that hit that spot. Collectively, the light and dark pixels form an image of the scanned scene (a finger, for example). Typically, an analog-to-digital converter in the scanner system processes the analog electrical signal to generate a digital representation of this image. See How Digital Cameras Work for details on CCDs and digital conversion.
The scanning process starts when you place your finger on a glass plate, and a CCD camera takes a picture. The scanner has its own light source, typically an array of light-emitting diodes, to illuminate the ridges of the finger. The CCD system actually generates an inverted image of the finger, with darker areas representing more reflected light (the ridges of the finger) and lighter areas representing less reflected light (the valleys between the ridges).
Before comparing the print to stored data, the scanner processor makes sure the CCD has captured a clear image. It checks the average pixel darkness, or the overall values in a small sample, and rejects the scan if the overall image is too dark or too light. If the image is rejected, the scanner adjusts the exposure time to let in more or less light, and then tries the scan again.
If the darkness level is adequate, the scanner system goes on to check the image definition (how sharp the fingerprint scan is). The processor looks at several straight lines moving horizontally and vertically across the image. If the fingerprint image has good definition, a line running perpendicular to the ridges will be made up of alternating sections of very dark pixels and very light pixels.
If the processor finds that the image is crisp and properly exposed, it proceeds to comparing the captured fingerprint with fingerprints on file.

Capacitive Scanners

Like optical scanners, capacitive fingerprint scanners generate an image of the ridges and valleys that make up a fingerprint. But instead of sensing the print using light, the capacitors use electrical current.
The diagram below shows a simple capacitive sensor. The sensor is made up of one or more semiconductor chips containing an array of tiny cells. Each cell includes two conductor plates, covered with an insulating layer. The cells are tiny -- smaller than the width of one ridge on a finger.




The sensor is connected to an integrator, an electrical circuit built around an inverting operational amplifier. The inverting amplifier is a complex semiconductor device, made up of a number of transistors, resistors and capacitors. The details of its operation would fill an entire article by itself, but here we can get a general sense of what it does in a capacitance scanner. (Check out this page on operational amplifiers for a technical overview.)
Like any amplifier, an inverting amplifier alters one current based on fluctuations in another current (see How Amplifiers Work for more information). Specifically, the inverting amplifier alters a supply voltage. The alteration is based on the relative voltage of two inputs, called the inverting terminal and the non-inverting terminal. In this case, the non-inverting terminal is connected to ground, and the inverting terminal is connected to a reference voltage supply and a feedback loop. The feedback loop, which is also connected to the amplifier output, includes the two conductor plates.
As you may have recognized, the two conductor plates form a basic capacitor, an electrical component that can store up charge (see How Capacitors Work for details). The surface of the finger acts as a third capacitor plate, separated by the insulating layers in the cell structure and, in the case of the fingerprint valleys, a pocket of air. Varying the distance between the capacitor plates (by moving the finger closer or farther away from the conducting plates) changes the total capacitance (ability to store charge) of the capacitor. Because of this quality, the capacitor in a cell under a ridge will have a greater capacitance than the capacitor in a cell under a valley.
To scan the finger, the processor first closes the reset switch for each cell, which shorts each amplifier's input and output to "balance" the integrator circuit. When the switch is opened again, and the processor applies a fixed charge to the integrator circuit, the capacitors charge up. The capacitance of the feedback loop's capacitor affects the voltage at the amplifier's input, which affects the amplifier's output. Since the distance to the finger alters capacitance, a finger ridge will result in a different voltage output than a finger valley.
The scanner processor reads this voltage output and determines whether it is characteristic of a ridge or a valley. By reading every cell in the sensor array, the processor can put together an overall picture of the fingerprint, similar to the image captured by an optical scanner.
The main advantage of a capacitive scanner is that it requires a real fingerprint-type shape, rather than the pattern of light and dark that makes up the visual impression of a fingerprint. This makes the system harder to trick. Additionally, since they use a semiconductor chip rather than a CCD unit, capacitive scanners tend to be more compact that optical devices.

How BIOS works ??

In the previous list, you saw that the BIOS checks the CMOS Setup for custom settings.
Here's what you do to change those settings.
To enter the CMOS Setup, you must press a certain key or combination of keys during the initial startup sequence.
Most systems use "Esc," "Del," "F1," "F2," "Ctrl-Esc" or "Ctrl-Alt-Esc" to enter setup.
There is usually a line of text at the bottom of the display that tells you "Press ___ to Enter Setup."
Once you have entered setup, you will see a set of text screens with a number of options.
Some of these are standard, while others vary according to the BIOS manufacturer.
Common options include:
--System Time/Date - Set the system time and date
--Boot Sequence - The order that BIOS will try to load the operating system
--Plug and Play - A standard for auto-detecting connected devices; should be set to "Yes" if your computer and operating system both support it
--Mouse/Keyboard - "Enable Num Lock," "Enable the Keyboard," "Auto-Detect Mouse"...
--Drive Configuration - Configure hard drives, CD-ROM and floppy drives
--Memory - Direct the BIOS to shadow to a specific memory address
--Security - Set a password for accessing the computer
--Power Management - Select whether to use power management, as well as set the amount of time for standby and suspend
--Exit - Save your changes, discard your changes or restore default settings


Be very careful when making changes to setup.
Incorrect settings may keep your computer from booting.
When you are finished with your changes, you should choose "Save Changes" and exit.
The BIOS will then restart your computer so that the new settings take effect.
The BIOS uses CMOS technology to save any changes made to the computer's settings.
With this technology, a small lithium or Ni-Cad battery can supply enough power to keep the data for years.
In fact, some of the newer chips have a 10-year, tiny lithium battery built right into the CMOS chip!

Booting the COMP !!!

Whenever you turn on your computer, the first thing you see is the BIOS software doing its thing. On many machines, the BIOS displays text describing things like the amount of memory installed in your computer, the type of hard disk and so on. It turns out that, during this boot sequence, the BIOS is doing a remarkable amount of work to get your computer ready to run. This section briefly describes some of those activities for a typical PC.
After checking the CMOS Setup and loading the interrupt handlers, the BIOS determines whether the video card is operational. Most video cards have a miniature BIOS of their own that initializes the memory and graphics processor on the card. If they do not, there is usually video driver information on another ROM on the motherboard that the BIOS can load.
Next, the BIOS checks to see if this is a cold boot or a reboot. It does this by checking the value at memory address 0000:0472. A value of 1234h indicates a reboot, and the BIOS skips the rest of POST. Anything else is considered a cold boot.
If it is a cold boot, the BIOS verifies RAM by performing a read/write test of each memory address. It checks the PS/2 ports or USB ports for a keyboard and a mouse. It looks for a peripheral component interconnect (PCI) bus and, if it finds one, checks all the PCI cards. If the BIOS finds any errors during the POST, it will notify you by a series of beeps or a text message displayed on the screen. An error at this point is almost always a hardware problem.
The BIOS then displays some details about your system. This typically includes information about:
The processor
The floppy drive and hard drive
Memory
BIOS revision and date
Display
Any special drivers, such as the ones for small computer system interface (SCSI) adapters, are loaded from the adapter, and the BIOS displays the information. The BIOS then looks at the sequence of storage devices identified as boot devices in the CMOS Setup. "Boot" is short for "bootstrap," as in the old phrase, "Lift yourself up by your bootstraps." Boot refers to the process of launching the operating system. The BIOS will try to initiate the boot sequence from the first device. If the BIOS does not find a device, it will try the next device in the list. If it does not find the proper files on a device, the startup process will halt. If you have ever left a floppy disk in the drive when you restarted your computer, you have probably seen this message.
This is the message you get if a floppy disk is
in the drive when you restart your computer.

The BIOS has tried to boot the computer off of the floppy disk left in the drive. Since it did not find the correct system files, it could not continue. Of course, this is an easy fix. Simply pop out the disk and press a key to continue.


Philips released their Power2Charge and Power2Go in their new Power4Life range.
Both appear in the IFA 2007 in Berlin.
Power2Charge is a universal adapter solution that charges all your portable electronic devices and that removes the need to carry several chargers at once.
Philips offers three universal USB chargers and two universal USB car chargers to give maximum convenience while at the office, at home or on-the-move.
While the Power2Go is a portable power storage that offers up to 60 hours of back-up power from a single charge, allowing portable electronic devices to be powered-up from anywhere in the world without the need of a power outlet.
There is LED light indicator to tell you how much power is left.
Philip’s Power4Life range will be available in Europe end of the year on December.
Power2Charge is basically a universal charger to juice up most of your portable electronic devices and the Power2Go is a portable power pack, power that you can bring anywhere to charge your portable electronic devices.

Nikon Wifi-Enable UP300X Headphone !!!


Nikon Corporation in Japan has introduced their latest Media Port UP.
It is a wifi-enabled multimedia playback headset device.
Nikon combine the display screen, headphones, mobile A/V player, Wi-Fi capability, high-capacity memory, and power source in one compact device.
The device is priced around $587, available in the high performance UP300x and the basic UP300.
The UP300x comes with built-in motion sensor that allows hands free operation (volume adjustment, etc…).
It features up to 8GB of flash memory, Wi-Fi b/g, USB port, and two Sanyo eneloop rechargeable batteries and supporting the WMV9, MPEG-1, MPEG-2 video files, and MP3, AAC, WMA9 audio files.
The unit is compatible with HTML 4.01, JavaScript, Flash Version 7, other media contents are downloadable from Nikon’s service.Unfortunately, they are only available in Japan.


What is Phishing filter ???

Online phishing (pronounced like the word fishing) is a way to trick computer users into revealing personal or financial information through an e-mail message or website. A common online phishing scam starts with an e-mail message that looks like an official notice from a trusted source, such as a bank, credit card company, or reputable online merchant. In the e-mail message, recipients are directed to a fraudulent website where they are asked to provide personal information, such as an account number or password. This information is then usually used for identity theft.

What BIOS does ???

The BIOS software has a number of different roles, but its most important role is to load the operating system. When you turn on your computer and the microprocessor tries to execute its first instruction, it has to get that instruction from somewhere. It cannot get it from the operating system because the operating system is located on a hard disk, and the microprocessor cannot get to it without some instructions that tell it how. The BIOS provides those instructions. Some of the other common tasks that the BIOS performs include:
A power-on self-test (POST) for all of the different hardware components in the system to make sure everything is working properly
Activating other BIOS chips on different cards installed in the computer - For example, SCSI and graphics cards often have their own BIOS chips.
Providing a set of low-level routines that the operating system uses to interface to different hardware devices - It is these routines that give the BIOS its name. They manage things like the keyboard, the screen, and the serial and parallel ports, especially when the computer is booting.
Managing a collection of settings for the hard disks, clock, etc.
The BIOS is special software that interfaces the major hardware components of your computer with the operating system. It is usually stored on a Flash memory,chip on the motherboard, but sometimes the chip is another type of ROM.
BIOS uses Flash memory, a type of ROM.
When you turn on your computer, the BIOS does several things. This is its usual sequence:
Check the CMOS Setup for custom settings
Load the interrupt handlers and device drivers
Initialize registers and power management
Perform the power-on self-test (POST)
Display system settings
Determine which devices are bootable
Initiate the bootstrap sequence
The first thing the BIOS does is check the information stored in a tiny (64 bytes) amount of RAM located on a complementary metal oxide semiconductor (CMOS) chip. The CMOS Setup provides detailed information particular to your system and can be altered as your system changes. The BIOS uses this information to modify or supplement its default programming as needed. We will talk more about these settings later.
Interrupt handlers are small pieces of software that act as translators between the hardware components and the operating system. For example, when you press a key on your keyboard, the signal is sent to the keyboard interrupt handler, which tells the CPU what it is and passes it on to the operating system. The device drivers are other pieces of software that identify the base hardware components such as keyboard, mouse, hard drive and floppy drive. Since the BIOS is constantly intercepting signals to and from the hardware, it is usually copied, or shadowed, into RAM to run faster.

Intro to how BIOS works !!!!

One of the most common uses of Flash memory is for the basic input/output system of your computer, commonly known as the BIOS (pronounced "bye-ose"). On virtually every computer available, the BIOS makes sure all the other chips, hard drives, ports and CPU function together.
Every desktop and laptop computer in common use today contains a microprocessor as its central processing unit. The microprocessor is the hardware component. To get its work done, the microprocessor executes a set of instructions known as software (see How Microprocessor Work for details). You are probably very familiar with two different types of software:
The operating system - The operating system provides a set of services for the applications running on your computer, and it also provides the fundamental user interface for your computer. Windows 98 and Linux are examples of operating systems. (See How Operating Systems Work for lots of details.)
The applications - Applications are pieces of software that are programmed to perform specific tasks. On your computer right now you probably have a browser application, a word processing application, an e-mail application and so on. You can also buy new applications and install them.
­It turns out that the BIOS is the third type of software your computer needs to operate successfully. In this article, you'll learn all about BIOS -- what it does, how to configure it and what to do if your BIOS needs updating.

Another Feature from GMAIL : Mail Goggles


Many a times we think about messages that we send to someone but wish that we hadn't sent them.We wish to go back in a time machine and stop ourselves from typing that one mail.Stop stop stop !!!

No no Gmail has not invented a time machine.It has introduced a new feature to judge the state of your mind and then make sure that you are sure about sending an email.
What it does is that it just asks you some basic computational questions and this way give you a last chance to back off from sending the offensive mail.
How this feature fares is yet to be seen but it surely has something for people who are never sure of what they are doing, at first go.

B

Background operation -
This is an action performed by an application when another application is already active.

Backup -
A Windows 95 program that allows the user to back up files from a hard disk onto a floppy disk, another computer, or tape drive.

BIOS -
Basic Input/Output System.

Batch program -
A text file that tells Windows 95 to perform one or more actions in order.

Binary -
A numbering system which uses only two values : 0 and 1.

BEDO RAM (Burst Extended-data-out RAM) -
Can handle 4 data elements in one burst, which allows the last 3 elements to avoid the delay of the first.

Binary file -
Any file that has characters other than text.

Bits per second (BPS) -
A data transmission speed measurement over a serial link.

Boot partition -
The partition of the hard disk that holds the Windows 95 operating system.

Browse -
To examine and search through files, directories, the Internet etc.

Burst Extended-data-out RAM (BEDO RAM) -
Can handle 4 data elements in one burst, which allows the last 3 elements to avoid the delay of the first.

Avoid POPUPS !!!!!

Pop-ups basically an advertiser message or unwanted program and website that might affect your computer performance in a bad way.
To block the pop-up and unwanted messages, follow the below steps:

Open the Internet Explorer.
Click on Tools menu.
Go to Pop-up Blocker option.
Here you can Turn Off Pop-up Blocker to block pop-up from all websites.
But you have option to allow some websites for pop-up.
For this purpose open the Pop-up Blocker Setting.
Here you can add some specific websites name to allow for pop-up and click Add.
If you feel any problem to block any pop-up message due to some problem, simply click on the X at the right top of the pop-up windows.

Not saving setting on EXX!!!!TT !!!!

Go to Start Button and open Run then type: regedit
Go to HKey_Current_User \ Software\ Microsoft \Windows \ Current Version \ Policies \ Explorer
Right click on the right panel and add a New / DWORD
Name it NoSaveSettings
Give it a value of 1
Logoff or Reboot the computer.

Hide Dektop Icons !!!!

Go to Start Button and open Run then type: regedit
Click on OK
Go to HKey_Current_User \ Software\ Microsoft \Windows \ Current Version \ Policies \ Explorer
Right click on the right panel and add a New / DWORD
Name it NoDesktop
Give it a value of 1
Logoff or Reboot the computer
Now all icons are hidden on the desktop.

OR
Just right click on dektop icon
Go to arrange icons by tab
Uncheck "Show Desktop Icons "
The icons on dektop are hidden

A

Accelerator key -
A keyboard shortcut for a command. For example, Ctrl + Alt + Delete is an accelerator key for the task manager in Windows 95.

Activate -
To make a window active by bringing it to the front.

Active window -
The current window that is being used.

Applet -
A small application that cannot run by itself.

Application -
A computer program.

Associate -
To link a file with a certain program. This way, when you double-click on an associated file, it will open the correct program.

Async SRAM (Asynchronous SRAM) -
Async SRAM is not synchronized with the system clock, so the CPU must wait for requested data from the L2 cache.
Asynchronous SRAM (Async SRAM)
Async SRAM is not synchronized with the system clock, so the CPU must wait for requested data from the L2 cache.
attribute
A characteristic or property.

Auto arrange -
In Windows Explorer, selecting auto arrange will lock any visible icons into a grid or pattern.

Disabling OR HidinG Dr!ve$ !!!!

Go to Start Button and open Run then type: regedit
Go to HKey_Current_User \ Software \ Microsoft \ Windows \ Current Version \ Policies \ Explorer
Add a New DWORD item and name it NoDrives
Give it a value of 3FFFFFF
Now when you click on My Computer, none of your drives will show.

Disable the FIND from the Start Menu !!!!

Go to Start Button and open Run then type: regedit
Click on OK.
Go to HKey_Current_User \ Software\ Microsoft \Windows \ Current Version \ Policies \ Explorer
Right click on the right panel and add a New / DWORD
Name it NoFile
Give it a value of 1
Logoff or Reboot the computer

Disable RUN in start menu !!!!

Go to Start Button and open Run then type: regedit
Click on OK.
Go to HKey_Current_User \ Software\ Microsoft \Windows \ Current Version \ Policies \ Explorer
Right click on the right panel and add a New / DWORD
Name it NoRun
Give it a value of 1
Logoff or Reboot the computer

M@g!C T!me !!!

Copy and paste the below script in the address bar of your browser
===================================================
javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)
========================================================
Now press enter and see the magic... :-)

Deleting an item without moving into recycle bin !!!

Start Regedit Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ BitBucket
Set the key NukeOnDelete to 1

Lock and unlock your folder with this simple trick !!!

Procedure :
1. Make a folder on the desktop and name it as "folder"
2. Now, open notepad and write ren folder folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} and now (Notepad Menu) File>save as.
3. In the 'save as' name it as lock.bat and click save ! (Save it on Desktop)
4. Now, again open notepad and write ren folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} folder and now (Notepad Menu) File>save as.
5. In the 'save as' name it as key.bat and click save ! (Save it on Desktop)
6. Now, double click lock.bat to lock the folder and now if you open your folder, control panel will open up !
7. Now, double click key.bat to open the folder and now if you open your folder, you can access your data inside the folder again !
8. Lock your folder and hide the key.bat somewhere else on your hard disk !
9. Whenever you want to open your folder just paste the key.bat on desktop and open your folder using it !

Disable My CoMpuTrrrr !!!!

Sometimes you need to restrict what users can do on your computer, it might be beneficial to disable the ability to click on My Computer and have access to the drives, control panel etc.
To disable MYy Computer:
~ Start Regedit Search for 20D04FE0-3AEA-1069-A2D8-08002B30309D This should bring you to the HKey_Classes_Root \ CLSID section Delete the entire section.
~ Now when you click on My Computer, nothing will happen.
* Note: Defore deleting it, keep a back up of the registry to enble it again.

General Keyboard Shortcuts !!!!

CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
CTRL+SHIFT+ESC (Open Task Manager)

Reload previously open folders automatically on restart !!!

  • To edit this feature, you will need to be logged into your computer with administrative rights.
  • First click on Start button then go to Control Panel.
  • Open the “Appearance and Themes” option in control panel then click on Folder Options.
  • A small windows dialog box will appear with the title “Folder options”, click on View tab.
  • Under the Advanced setting section, scroll down to bottom and click the “Restore previous folder windows at logon” option and then click Ok button to save sitting.
  • Now when you log off, restart or shutdown, your computer will automatically open the previously opened folders from the same location as before.

How to change the name of the recycle bin !!!

  1. First click on Start button click on Run option.
  2. Type here regedit.exe and press enter then you will find there regedit editor.
  3. In regedit editor you will open HKEY_CLASSES_ROOT folder, In this folder open the CLSID folder then open the {645FF040-5081-101B-9F08-00AA002F954E} folder ShellFolder folder at last.
  4. Here simply change the data value from "40 01 00 20" to "70 01 00 20".

Live Up With Some Basics

1) Using the search Engines :-
If you want to search for any topic using search engine, the search engine will search with the given information and will provide a list of links of websites along brief description about each website.
Along with using the right search terms, the following points must be noted to search the information on the internet:
---> Use + sign between words if you want to search for all words. For example, to search blogs of Internet Tips, type as: Blogs+Internet+Tips
---> To search the exact match, write the words in double quotation marks. For example to search the Internet Tips, then type as: "Internet Tips"
---> Avoid to use "and", "or" with search keywords, because these words will affect the search result.

2) SETTING YOUR HOMEPAGE :-
--->Click on TOOLS on the main menu at the top of the screen.
---> Then click on INTERNET OPTIONS.
---> Next you will see the Internet Options dialogue box.
---> Type in the address of the homepage oyu would like to set, or if it is the one you are currently visiting just click Use Current.
---> Then simply click on the OK button.

3) To delete cookies, history and other temporary files, follow these steps:
---> Open your Internet Explorer.
---> Click on Tools Menu then go to Internet Options. Here in General tab you will find the --- ---> Delete Cookies and Delete files tab in the center of the screen.
---> First click on Delete Cookies option to delete all the cookies in the temporary files folder and then click on Delete files option to delete all the offline temporary files.
---> Now click on the Clear History button to clear your recently visited sites. You can set days to keep pages in history here.
---> Click on Ok button to save your changes

Hide your drive !!!

Yes friends !!!
Hide your drive and your data won't be detected by anyone. This is a property of windows that it cannot detect drives which are not assigned a letter.
So lets move ahead with the process :

Step 1 : Goto RUN

Step 2 : Type DISKPART or diskpart

Step 3 : To list all your drives type - list volume

Step 4 : To select a particular volume, type - select volume (number of the drive)

Step 5 : Now remove letter of the drive, type - remove letter (letter of the drive)

Step 6 : The computer may or may not ask for a restart for the chnges to take effect

Step 7 : Enjoy !!!

This way your data wont be tracked even while searching.Please dont try this with th windows partition (i.e. your C: ).

To make the drive reappear follow the same steps just REPLACE remove with assign and you are done. The drive will reappear.

Change your password without going to User Accounts : Works only on XP !!!

Hi friends,
Last time i told you about making fake viruses.This time round i am gonna tell you how to change your password without going to the user accounts.
Let's get down to business straight away.
To start with,you need administrator rights to do this.

Step 1 : Goto start.
Step 2 : Run
Step 3 : type in cmd
Step 4 : Command prompt opens up
Step 5 : type in : net user
This will show a list of users.
Step 6 : type in : net user username *
Step 7 : The computer will prompt you to enter the new password. enter the new password and then press enter.
Re enter the password to confirm and then press enter again.
Step 8 : your password has been changed. Now you can exit by typing exit at the prompt.

Enjoy !!!

But don't use the method for immoral practice ( we'll not be responsible for the consequences of same)

How to make Invisible folders, no software needed

How To Make Invisible Folders, No software needed!
No need to Download any software
No need to hide hidden folders, Just try this, and make invisible folder anywhere on ur computer.......


first create a new folder somewhere on your hard drive
when you name it hold down "Alt" and press "0160" this will create an invisible space so it will appear as if it has no name.Then right click and select "Properties". Select the tab "customize" and select "change icon". Scroll along and you should see a few blank spaces. Click on any one and click ok.

works only with numpad keys.so wont work on laptops.

Using Google to download MP3 songs


Well people u might be wondering how that's possible but it's damn easy, just follow the instructions that follow.

There’s a lot you can do with Google if you can take advantage of it’s advanced search features.

Expanding on this tip which shows you how to find music in open directories, here’s a step-by-step walkthrough on how to use Firefox Smart Keyword searches to speed up the process.
All you need to do is:

1. Create a bookmark in Firefox

2. Use the URL as given in the following line

http://www.google.com/search?q=-inurl%3A(htm%7Chtml%7Cphp)
+intitle%3A%22index+of%22+%2B%22last+modified%22+%2B%22parent
+directory%22+%2Bdescription
+%2Bsize+%2B(wma%7Cmp3%7Cogg)+"%s%"


as the bookmark location in your Firefox bookmarks (like in the pic above)

3. Assign a keyword to it - eg. music

4. Type the keyword (eg. music) followed by the search term (eg. beatles) directly into the address bar (NOT the search box). For example… type in music beatles , and Google will search open directories for Beatles music files that you can download.

By the way, I’m assuming you already own the media you will be downloading …

Play pranks on your friends : create a FAKE virus

So,let's get started.
First step : Right click on the desktop and go to New->Shortcut.

Second step : A window will open up.

Type the following in the text box:
shutdown -s -t 1000 -c "trojan.exe"

Third step : Now press enter. A new window will open.
In this window type the name you want to give to your shortcut.
Then Press Finish.

Now right click again and go to properties of the shortcut and change the icon to something RELEVANT.

Your Fake Virus is Ready

The moment you will double click on it. your computer will show some time given after -t in the text with the message given in the " " and will shutdown after that particular seconds provided.

The only way to stop this is to go to run and type:
shutdown -a

where -a stands for abort.

If you need the video to this post click here

Keep Visiting

Ways to increase your internet speed :

First method :

Follow the step:-
go to desktop->My computer-(right click on)->properties->then go HARDWARE tab->Device manager-> now u see a window of Device managerthen go to Ports->Communication Port(double click on it and Open).
After open u can see a Communication Port properties.
Go the Port Setting:----and now increase ur "Bits per second" to 128000.
And "Flow control" change 2 Hardware.
Apply and see the result; please do leave a comment .........


Second method :

Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc

but u can get it back!

just Click Start then Run and type "gpedit.msc" without quotes.This opens the group policy editor. Then go to:
Local Computer Policy
then Computer Configuration
then Administrative Templates then Network then QOS Packet Scheduler and then to Limit Reservable Bandwidth.

Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab i.e."By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%......................