Friday, December 31, 2010

Microsoft Becoming a Failure: 12 Brand Mistakes with High Costs

hello friends
happy new year to all
Analysts continue to criticize Microsoft and consider its prospects as cloud computing and competitive products dim the prospects for the company’s operating systems.
A History of Failed Brands
Indeed, Microsoft has a long track record of failed brands. Here are a dozen examples:
Vista: This failure hurt the most. Microsoft is synonymous with operating systems, so a failed product in this category was a body blow. Released in January 2007, by April 2009, the software had only achieved a 24% share of PC operating systems. Most people still prefer to limp along using decade-old systems.
Kin Phone: It took years and billions of dollars to develop, but only sold 503 units after 48 days on the market. In terms of financial cost, this brand inflicted plenty of damage.
Tablet PC: The failure of this brand chipped away at Microsoft’s reputation as an innovator.  Ground-breaking when Microsoft first announced it ten years ago, the Tablet PC was surpassed by better design and better marketing of the iPad and Samsung’s Android.

Zune: An innovative reputation can’t be won with copycat products. Microsoft’s Zune portable media player has not been able to effectively compete with Apple and its iPod.
MSN: As Microsoft struggled with MSN Search, which became MSN (with the butterfly), then Live Search and now Bing, Google started, grew, and now dominates.
WebTV: The internet over television sounded like the holy grail of convergence. But the product never produced a revenue stream as its tech-averse customer base created an expensive customer service nightmare.
Passport: Microsoft demonstrated branding cluelessness by originally calling this “thing”  Microsoft Wallet, then Passport, then .NET Passport, then Microsoft Passport Network, then Live ID, then Windows Live as part of MSN. Phew! Moreover, entrusting sensitive information to a company known for operating systems with massive security bugs, Passport was a no-go. The service closed August 2009.
Encarta: Why pay for a limited and outdated encyclopedia when there is Wikipedia? This brand finally expired on March, 2009.
Bob: Bob was meant to be a user-friendly Windows interface, but turned into a laughing-stock that perennially makes the “worst of” lists. “Bob” appears to be an internal project name that somehow escaped as a public-facing brand name on an embarrassing product.
Money: Brand trust issues aside, Microsoft Money could not compete against online banks, free personal finance tools and more established and robust financial software products.
WinCE: Yup, this product made people “wince”. This personal digital assistant software brand represents years of trying, failing and eventually giving up.
“I’m a PC”: In answer to Apple’s successful “I’m a Mac” branding campaign came the inexplicable “I’m a PC” answer from Microsoft. In addition to adopting an “I know you are, but what am I” brand positioning, the campaign didn’t identify the brand Windows beyond a logo and said nothing about the “V-Word” (the failing Vista operating system). Why invest in advertising a generic like a PC?
Key Factors in Microsoft’s Branding Failures
1)      Poor design:  Apple’s brand is built on excellent, innovative design. Microsoft design is generic and old-fashioned.
2)      Inconsistency: The Apple product brands all support key brand attributes of the parent company: coolness and easy usability. Microsoft branding is all over the map, with some product brands having almost no association with the parent company and with no brands sharing a unifying attribute that would bring them all together as Microsoft.
3)      No jumping off point: Apple has always been about devices integrated with software, making it easy to create new products of all kinds. Microsoft was just an operating system, and a bug-ridden one at that.
4)      Problems with trust: Microsoft has been seen as arrogant and pushy. Its reputation has never recovered from the anti-trust lawsuit in the 1990s.
5)      Poor follow-through: Beyond a launch announcement and a few ads, many Microsoft products flounder unsupported.
Lots of money and really smart people are Microsoft strengths, but the company cannot reach its full potential without smarter branding. Little by little, newcomers like Google and old competitors like Apple will eat their lunch.

Thursday, December 30, 2010

Earn Money Online For Free With Paisalive

Well its been a long time since I have written a article on how to Earn money Online because I could not found a genuine method that actually works .Today I glady introduce you to a new online money making trick.Well you cannot earn full time income but still you can earn enough to pay your telephone bills,canteen bills etc
This doesn’t require any investment on your part as it is completely free to join.All it requires is at-most 15-20 minutes of your daily time

click here to join it



  • You will get Rs 99 Instantly Once you have
  • Earn Rs 5 for verifying your mobile number.
  • You can make Rs. 2 (Rs. 50 for the first 2 referrals) per referral.
  • You can earn upto Rs 5 for each PaisaLive email you check.
  • You can make Rs 1 everyday just by just logging into your account.
  • You can earn upto Rs. 2500, for Special campaigns in a single action.
  • You’ll get the pay once in 15 days and Cheque is the only mode of payment.
  • The minimum Payout criteria is Rs 500.

  1. Once registered your account will automatically credited with Rs 99
  2. Now you will have to complete their free and easy offers to earn from them.It will take only a minute or two to complete a offer.You can expect 10 to 20 offers everyday.
  3. You will be paid for each offer you complete.
  4. Check your paisalive account daily to get high paying offers
  5. The minimum payout is only Rs 500.

Wednesday, December 29, 2010

WIBREE- killing bluetooth tehnology

Wibree, also called "Baby Bluetooth," is a low-power wireless local area network (WLAN) technology that facilitates interoperability among mobile and portable consumer devices such as pagers, personal digital assistants (PDAs), wireless computer peripherals, entertainment devices and medical equipment.
Wibree is a wireless technology for mobiles,laptops,watches for short distance communication.Its development was started by nokia in 2001 to bring an alternative to bluetooth technology.The research was by published in 2004 with the name “Bluetooth Low End Extension” .It was publicaly released in 2006 by nokia.The main purpose for introducing wibree was to create a wireless technology that consumes less energy ,more efficient and cheaper then bluetooth.As most of devices nowdays,uses the bluetooth chip the compatibility with chip was also a big requirement.Now here we will compare both bluetooth and wibree and see in what are the advantages of wibree over bluetooth.


Wibree is cheaper then the bluetooth wireless communication.It consumes less power that’s why it was named as “ Bluetooth Low End Extension “.It was built using and enhancing bluetooth features.Wibree can be integrated on the bluetooth chip.Wibree uses a small transceiver of 2.4 MHz with a physical layer of Mbs.

Monday, December 27, 2010

How To Hack Closed PC On Cyber Cafe

here is a quick new hack on how to intrude in the PC which is shut downed at Cyber cafe. (Don’t Forget to read our disclaimer at the bottom of the post.)
1. As you all must have know these days all Cyber cafe owners have a program for administration to control all PC’s in local area network. So all files can be inter transmitted.
2. First of all press Ctrl+Alt+Del the task manager or any controlling application, will open. Then from APPLICATIONS select the program that is controlling all PC’s  & terminate it, This is for security reason. Now log of PC, & you ll get user names of the PC.

3. But some times, cyber cafes have security clients installed that have restricted access to Task Manager, restart the computer & press F8 continuously before windows boots.
The Menu will open, select Safe Mode from it. And now you can copy files from networked PC’s without any  security layer.
Next step is where you’ll need to crack the hashes.  SO go to your home PC , Download & install Saminside cracking tool. And from some another Cyber cafe try to crack the hashes of that PC. By same log off method explained below.
This where you actually perform hacking. Have a gret time & tell us weather it worked for you.
Meanwhile if you can get IP address,  of the PC you wish to hack try to get it from ip-explorer.com, but this is not the part of this hack its sort of next step of hacking from outside the network.
Disclaimer : The trick here explained it for educational purpose only & not to  perform illegal or criminal activities. Don’t forget hacking into some one’s privacy is considered as crime. SO do it on your home network that you own or something.  We are not responsible for anything you do & consequences of it by using our articles.

Friday, December 24, 2010

windows 7 shortcut keys

Windows 7 Cheat Sheet

Keyboard shortcuts are combinations of two or more keys that, when pressed, can be used to perform a task that would typically require a mouse or other pointing device. Keyboard shortcuts can make it easier to interact with your computer, saving you time and effort as you work with Windows and other programs. 

 From Desktop

  1. Windows Key + Tab : Aero [press Tab to cycle between Windows]
  2. Windows Key + E : Windows Explorer is launched.
  3. Windows Key + R : Run Command is launched.
  4. Windows Key + F : Search (which is there in previous Windows versions too)
  5. Windows Key + X : Mobility Center
  6. Windows Key + L : Lock Computer (It is there from the earlier versions as well)
  7. Windows Key + U : Launches Ease of Access
  8. Windows Key + P : Projector
  9. Windows Key + T : Cycle Super Taskbar Items
  10. Windows Key + S : OneNote Screen Clipping Tool [requires OneNote]
  11. Windows Key + M : Minimize All Windows
  12. Windows Key + D : Show/Hide Desktop
  13. Windows Key + Up : Maximize Current Window
  14. Windows Key + Down : Restore Down / Minimize Current Windows
  15. Windows Key + Left : Tile Current Window to the Left
  16. Windows Key + Right : Tile Current Windows to the Right
    [Continue pressing the Left and Right keys to rotate the window as well]
  17. Windows Key + # (# is any number) : Quickly Launch a new instance of the application in the Nth slot on the taskbar. Example Win+1 launches first pinned app, Win+2 launches second, etc.
  18. Windows Key + = : Launches the Magnifier
  19. Windows Key + Plus : Zoom in
  20. Windows Key + Minus : Zooms out
  21. Windows Key + Space : Peek at the desktop

How To Make System Faster | No Need To Add RAM

MSwin32.dll.vbs AND autorun.inf are the irritations of the computer..!
Today we are facing so many troubles with our computer such as virus problem, Booting problem, Display Problem and Error Messages etc. So here, we have some solutions for solving the slow booting and slow performance of the computer. This problem can be detected by some of Antivirus Programs but cannot be rectified. This problem seems like primordial attempt from viruses. It does nothing more than one problem alike Slow Performance.

Identifying these types of viruses is very easy.
1. We cannot open any windows and drives by double clicking especially USB Drives.

2. An unknown WSCRIPT.EXE, MONIT.EXE and SCVHOST.EXE appear in our task manager.
3. In every drive MSwin32.dll.vbs and autorun.inf hidden files will appear.
What do the Hidden Files do?
1. Make us stumble to open the drives directly. That is we cannot open the drives by double clicking. If it will, open only in a new window.
2. Login and Logout will become very slow.
Removal of the Hidden Files.
We can easily remove this type of files……

However, please note that this virus most often appears only inside the folder along with the virus and same name, which creates .exe files. After removing the virus hurry up to Task Manager and put an end for WSCRIPT.EXE, MONIT.EXE and SCVHOST.EXE.
Below is the detailed explanation.
1. Go to Folder Options (Start > Control Panel > Folder Options)
2. Enable Show Hidden Files and Folders.
3. Make Uncheck Hide Extension For Known File Types
4. Make Uncheck Hide Protected Operating System Files.
5. Click OK.

6. Go to every drive and delete the hidden files WSCRIPT.EXE, MONIT.EXE and SCVHOST.EXE completely.
7. At this attempt, please do not insert your USB drives.
8. Finish the entire removal procedure.
Let us look at the Removal in USB Drives, Digicam, Mobiles, iPods.
1. Click START > RUN > Type regedit
2. Click OK.

3. And delete the following keys.
4. Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Run\wscript

5. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Run\monit
6. Then navigate the following key HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
and double click on the Key Window Title.
7. Change that key value to “Microsoft Internet Explorer” (without the quotes :P ).

Tuesday, December 21, 2010

Shocking Google search results

Google search is a web search engine owned by Google Inc. and is the most-used search engine on the Web. Google receives several hundred million queries each day through its various services. Google’s search engine normally accepts queries as a simple text, and breaks up the user’s text into a sequence of search terms, which will usually be words that are to occur in the results. The diagram below points out four features that are important to understanding the search results page but sometimes we can see some very shocking results… Have fun!


Cheapest Laptop, NOW COMMING

In attempt to construct a bridge between the poor and rich people, Indian scientists has developed the low cost laptop of the world. India has well reputation for creating cheap and low-priced technology, last year India invented the cheapest car of the world at Rs100,00((£1,450).

The new computer, ‘Sakshat’ that is translated as “before your eyes” is the part of new program “national mission for education”. With the invention of this laptop, students can get access to their coursework, lecture and the help of specialists. Vice chancellor of Andhra Pradesh University said that India was in search of cheap hardware and software.
Cost of the laptop has been kept low so that mostly students can get access to broadband and computers. It designed by the Indian Institute of Technology in Madras, the Vellore Institute of Technology, the Indian Institute of Science in Bangalore, the state-controlled Semiconductor Complex. It is equipped with wireless connecting device and 2 GB Ram. Official of Indian Government are satisfied with its lowest price of Rs500. This computer is also cheaper than the lime-green computer which is known as OX or Children’s Machine made by Massachusetts Institute of Technology in the USA. Managing director of Netcore Solutions is committed with the low priced computer and said “A screen of computer cannot be made in $20”




funny google tricks

We all use google for searching but its time to explore the funny side of google. Here I have collected the funny google tricks that will amaze you. Some of the tricks are provided by google itself while other have been developers





1. Google gravity:- We all have read the Newton’s law of gravity.Does it also apply to google?To test it follow the instructions
  • Go to google.com
  • Type Google Gravity
  • Click on I’m feeling Lucky
Now you will see the effect of gravity on google.The google icon will fall down automatically.You can even pickup and throw google icon anyware.

 2. Change Background Image:-You can also change the background image of google image.To change the background image follow the instructions
  • Go to google.com
  • Click on the Change Background Image

3. Epic Google:- In epic google you will see the font size of google increasing automatically as if it will come out of your computer screen.To use google Follow the instructions
  • Go to google.com
  • Type Epic Google
  • Click on I’m feeling Lucky
4. Google Hacker:-want to see how the google homepage will look if it gets hacked .Follow the instructions below
  • Go to google.com
  • Type Google Hacker
  • Click on I’m feeling Lucky
 5. Annoying Google:- In this trick the capitalisation of your searches will change automatically.Some words will change into small letter and some into capital letters in your search result.Want to try it follow the instructions
  • Go to google.com
  • Type Annoying Google
  • Click on I’m feeling Lucky


If you also know some more cool google tricks then do share with us and our readers by commenting your google tricks

Saturday, December 18, 2010

Microsoft’s Upcoming Operating System – MIDORI

Microsoft is working on a new operating system codenamed as Midori, that will eventually replace Windows as we know it.

 WINDOWS is a name that has ruled the whole computer world since its first launch in November 1985. Since then it is like a trademark of Microsoft Corporation. With many advanced versions of Windows available today such as Windows XP, Windows Vista, it is the most used operating system in the world.


But now here is time to experience a yet another technology of operating systems. Yes, MICROSOFT is working on a new generation of operating systems called Cloud-Based Operating System and rumors are there that MIDORI will be their first such operating system, which will replace Windows fully from computer map.

WHAT´S THE DIFFERENCE?
MIDORI is an offshoot of Microsoft Research´s Singularity operating system. In this the tools and libraries are completely managed code. MIDORI is designed to run directly on native hardware (x86, x64 and ARM), will be hosted on the Windows Hyper-V hypervisor, or even be hosted by a Windows process. MIDORI can be also seen as MICROSOFT´S answer those competitors who are applying "Virtualization" as a mean to solving issues within contemporary computing.

The main idea behind MIDORI is to develop a lightweight portable OS which can be mated easily to lots of various applications.


Midori is the code name for Windows 8 and for a managed code operating system being developed by Microsoft Research.

Friday, December 17, 2010

Multiple Logins in yahoo without Software

hello fiends!!
my exams are going on so i am enable to post regularly.
but today i am posting a small trick of yahoo...
1) Go to Start
2) Navigate to HKEY_CURRENT_USER-->Software-->Yahoo-->Pager-->Test
3)ON the Right side if the page , Right click and choose new Dword Value.
4) Rename it as " Plural ".
5)Double click and assign a decimal value of 1.
6) Now close registry and restar yahoo messenger and try Multiple Login
enjoy friends....
wish me good luck!!!

Monday, December 13, 2010

How To Add Background Wallpaper On Your Pendrive

We all might have set background images for the Local drives in Windows Xp.But you might not have set background picture for your pendrive.It’s a very simple hack so give it a try after reading this post,
All you need to do is, just Copy & Paste the below code to notepad,then save it as “desktop.ini”
[.ShellClassInfo]
IconFile=%SystemRoot%\system32\SHELL32.dll
IconIndex=127
ConfirmFileOp=0
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
Attributes=1
IconArea_Image=”YourPictureName.jpg”
IconArea_Text=”0xFFFFFF”
VeBRA sources – don’t delete the tag above, it’s there for XXXXX purposes -
[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}
{5984FFE0-28D4-11CF-AE66-08002B2E1262}={5984FFE0-28D4-11CF-AE66-08002B2E1262}
[{5984FFE0-28D4-11CF-AE66-08002B2E1262}]
PersistMoniker=Folder.htt
PersistMonikerPreview=%WebDir%\folder.bmp
Some Information On Above Code:
1. Where “YourPictureName.jpg” is, delete that and replace with your picture name for example “Transformers Frenzy.gif”
How To Add Background Wallpaper On Your Pendrive
 
Note:
Please check that Picture format (.jpg , .bmp, .gif) properly else this hack won’t work.
2. If your Picture is white colour then folder names will not be clear so change the IconArea_Text=”0xFFFFFF” to IconArea_Text=”0x000000
3. Save the notepad as “desktop.ini”.
4. Place both your notepad file (i.e) desktop.ini and your picture in Pendrive.
5. Set the above files attributes as Hidden.
6. Refresh(F5) and Enjoy with your new background.
7.You can also this on your windows Xp Local drives(C,D,E,F…).
I hope you would like this trick.

Saturday, December 11, 2010

Friday, December 10, 2010

how to change windows xp name with your name

Branding Windows with your name.
this trick is quite simple, use notepad and follow the following steps....


open notepad dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\system32 directory:


[General]
Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here
 

Save the file, then make a right click on my computer select properties, in the general tab a button will be highlighted (support information) make a click on it, you will be able to see the changes.
Now if you want to display some more information then simply increase the line in the file.
 

ex:
Line4=Your Working Hours Here
 now thats finish.....
enjoy... :)

Thursday, December 9, 2010

HOW TO MAKE CLONE OF HARD DISK

Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.

First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.

Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.

Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the "Full" button.

Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says "Autofix Errors".

Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:

Click on the "Start" button, then click on the "Run..." button, then place the following into the Runbox:

"XCOPY C:\*.*D:\ /c/h/e/k/r" (minus the quotes, of course) then press the "Enter" button.

If you receive an error message, then remove the space from between XCOPY and C:\

Anything that should happen to come up in the DOS box, just click "Y" for "Yes". When its all finished, pull the original Master from the system, designate the Slave as the Master (change your jumpers), then check your new Master out.



now all is done.... :)

Wednesday, December 8, 2010

why use Blekko | a new search engine

In a world of Google and Bing, smaller players find it very difficult to create a space for themselves in the search engine market. The only way these smaller ones survive is by attracting a niche audience and offering something unique. Blekko might look like just another search engine, but what’s under its hood will leave you impressed.
here is two main reason


1. Vertical Search with Blekko

Blekko’s game-changing search engine allows searchers to “slash the web” or easily customize a search query to find what you are looking for and reduce clutter. When researching any topic, you can add a slashtag to drill down and get particular view points in the search results. For Example, if you query Blekko for “HealthCare,” you can then add a slashtag for “liberal” and get only liberal points of view. See healthcare/liberal and below:
Blekko Search healthcare liberal 2 Reasons to Use Blekko Over Google For Search
Blekko Search | Healthcare /Liberal

2. Algorithm Transparency with Blekko

While Google’s search engine algorithm is commonly referred to as a “blackbox,” Blekko lets search engine fanatics see directly into their search engine algortihm.  One slashtag that Blekko has created to view the inner workings of how they rank websites on search engine results pages is “/rank.” Let’s take a look at the data Blekko provides for a search query containing /Rank:
Search: Inbound Marketing/Rank
inbound marketing rank blekko 2 Reasons to Use Blekko Over Google For Search
Inbound Marketing /Rank | Blekko Search
50 websites show up in the search engine results page.  It seems as though Blekko ranks the 50 webpages based on Domain, Anchor, Title and URL.  Blekko breaks up “inbound marketing” into 3 keyword phrases and provides a detailed analysis:

Monday, December 6, 2010

5G technology is comming | ARE YOU READY!!!!

5G Technology stands for 5th Generation Mobile technology. 5G mobile technology has changed the means to use cell phones within very high bandwidth. User never experienced ever before such a high value technology. Nowadays mobile users have much awareness of the cell phone (mobile) technology. The 5G technologies include all type of advanced features which makes 5G mobile technology most powerful and in huge demand in near future. 

With the day by day advancement in technologies, mobile phones are also getting more enhanced. In every 8 to 10 years we see new technologies in the mobile market first came the 1G, after few years 2G came to surface, then 3G, nowadays the very popular and many say super fast technology 4G and now there will come 5G Fifth Generation technology. This latest and more enhanced technology will provide a unique experience to its users.

The gigantic array of innovative technology being built into new cell phones is stunning. 5G technology which is on hand held phone offering more power and features than at least 1000 lunar modules. A user can also hook their 5G technology cell phone with their Laptop to get broadband internet access. 5G technology including camera, MP3 recording, video player, large phone memory, dialing speed, audio player and much more you never imagine. For children rocking fun Bluetooth technology and Piconets has become in market. 

What 5G Technology offers

5G technology going to be a new mobile revolution in mobile market. Through 5G technology now you can use worldwide cellular phones and this technology also strike the china mobile market and a user being proficient to get access to Germany phone as a local phone. With the coming out of cell phone alike to PDA now your whole office in your finger tips or in your phone. 5G technology has extraordinary data capabilities and has ability to tie together unrestricted call volumes and infinite data broadcast within latest mobile operating system. 5G technology has a bright future because it can handle best technologies and offer priceless handset to their customers. May be in coming days 5G technology takes over the world market. 5G Technologies have an extraordinary capability to support Software and Consultancy.


 

how to change IP address

This article will help you to change your IP address within a minute. Just follow the following steps...

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"


You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

NOTE:
This only changes your dynamic IP address, not your ISP/IP address.

Sunday, December 5, 2010

HOW TO MAKE CALCULATOR IN HTML

HOW TO MAKE CALCULATOR USING HTML
hello friends!!
you cane easily make a calculator in html, it is so simlpe just copy and paste the code in notepad and same it as calculator.html
click below to download code....
https://docs.google.com/document/d/1mUhZ7r5p7NKsZzFmTL3Ux35z_iFAuYq3w5101rliGRA/edit?hl=en#

Saturday, December 4, 2010

Windows 8 to be 128-bit compatible

As we’ve known for some time, Microsoft had already begun work on Windows 8 before Windows 7 was completed. The reason being that different teams work on different aspects of the operating system, which is why Microsoft was able to do this. Microsoft previously shed some light on what we can see in Windows 8 through a job description.
It appears though, that one specific Microsoft employee was not too careful with their LinkedIn profile, and had accidentally leaked some interesting details regarding Windows 8.
Windows 8 News managed to catch this on the Microsoft employee’s LinkedIn profile before it disappeared:
“Robert Morgan is working to get IA-128 working backwards with full binary compatibility on the existing IA-64 instructions in the hardware simulation to work for Windows 8 and definitely Windows 9.”
“Robert Morgan is using Hestia (custom software package) for experimenting with the processor for scientific analysis and 3D graphics. Error: Memory Latency? Always gotta be a challenge barrier, it’s gotta be a bug in Hestia. right?!”
“Robert Morgan is frustrated with process standards and regulations! Delays Delays!”
Murdon seems certain that we will see 128-bit compatibility with Windows 9, while it appears that whether we will see it in Windows 8 or not is still uncertain. Coincidentally, many do believe that Windows 7 will be Microsoft’s last 32-bit OS. So could this mean we will see Windows 8 come in 64-bit and 128-bit flavors? Let us know what you think in the comments.

How to Get the Product Key in 64-Bit version of Windows 7

We all know that the operating system has undergone a lot of changes and each changes needs adaption.
Unfortunately, many users wipe out the OS itself after buying a new Vista machine, replaces it with Windows XP and they forget to check if there’s a backup CD or copy of the product key.
Most of the manufacturers nowadays doesn’t give the installer of the OS.

Prevention is Better than Cure
Using the new version of WinGuggle, you can create a backup if you don’t have the original installation disc of your 64-bit version of Windows.
Just run the program and copy the product key for safe keeping.
Windows 7 64-Bit Enterprise Edition
windows7enterprise
Your antivirus program will not give any alarm and also works with 64-Bit version of Vista, Microsoft Office XP, 2003 and 2007!
Hope this helps!
click here for download WinGuggle

Friday, December 3, 2010

how to make windows xp genuine

Making your copy of windows genuine..works perfect making your copy of windows genuine many of you might have tried windows update and found out that your copy of windows is not genuine…here’s how to make your copy of windows genuine…download jellybean keyfinder from here:
http://www.magicaljellybean.com/beta/

Now open keyfinder.exe Click on options and click “change windows key”Now enter this key and you’re done.
*******************************************************
V2C47-MK7JD-3R89F-D2KXW-VPK3J
*******************************************************

Wednesday, December 1, 2010

what is 4G technology

When talking about 4G, question comes to our mind is what is 4G Technology. 4G is short for Fourth (4th) Generation Technology. 4G Technology is basically the extension in the 3G technology with more bandwidth and services offers in the 3G. But at this time nobody exactly knows the true 4G definition. Some people say that 4G technology is the future technologies that are mostly in their maturity period. The expectation for the 4G technology is basically the high quality audio/video streaming over end to end Internet Protocol. If the Internet Protocol (IP) multimedia sub-system movement achieves what it going to do, nothing of this possibly will matter. WiMAX or mobile structural design will become progressively more translucent, and therefore the acceptance of several architectures by a particular network operator ever more common. 


MAGIC of 4G Technology

So far there has been no specific definition to this successor of 2G and 3G. However it has been used often to denote a fast internet access available to mobile phone users. More over the distinguishing feature of high multimedia streaming and end to end IP configuration is judged to be its MAGIC enchantment.3G utilized WiMax and WiFi as separate wireless technologies, whereas 4G is expected to coalesce these two technologies. Hence one can evaluate how efficient it would become when combining two extremely reliable technologies.

 

what is silverlight

many of my college friends does not know any thing about microsoft silverlight
whenever i talk about it they ask me what is this??? Is this a movie???
so today i am posting about silverlight

Microsoft Silverlight is an application framework for writing and running rich Internet applications with emphasis on multimedia, animations, and graphics, with features and purposes similar to those of Adobe Flash. The run-time environment for Silverlight is available as a plug-in for most web browsers. While early versions of Silverlight focused on streaming media, current versions support multimedia, graphics and animation, and give developers support for CLI languages and development tools.


Silverlight is a new cross-browser, cross-platform implementation of the .NET Framework for building and delivering the next generation of media experiences and Rich Interactive Applications(RIA) for the web. It runs in all popular browsers, including Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera. The plugin required to run Silverlight is very small in size hence gets installed very quickly.

The current version 4 was released in April 2010. It is compatible with multiple web browsers used on Microsoft Windows and Mac OS X operating systems. Mobile devices, starting with Windows Phone 7 and Symbian (Series 60) phones, are likely to become supported in 2010. A free software implementation named Moonlight, developed by Novell in cooperation with Microsoft, is available to bring most Silverlight functionality to Linux, FreeBSD and other open source platforms.

Silverlight aims to compete with Adobe Flash and the presentation components of Ajax. It also competes with Sun Microsystems' JavaFX, which was launched a few days after Silverlight.

Tuesday, November 30, 2010

how to open blocked facebook

hello friends!!
proxies are updated again so enjoy all blocked sites without any interrupt....
click given link for proxies
http://hackers001.blogspot.com/p/open-blocked-sites.html

Monday, November 29, 2010

Facebook Farmville Cheats and Codes

  • Farmville cheats are sometimes available for coins, items and experience as you play the game. However, there are no actual Farmville cheat codes--only occasional glitches that allow players to benefit, and are considered cheats. Find cheats for Farmville throughout the page below, as well as strategies for leveling up quickly and earning lots of money. Listed here are the speed cheats, along with the fastest growing crops.


    FarmVille is a social game developed by Zynga, and available on social networks and iPhones. Launched in June 2009, it became one of the most popular applications on Facebook, garnering 10 million users in less than a month. This is one of the most popular games on the largest social networking system in the world.


    In this MMORPG game, you can buy the farm in a good way. You learn how to plow, plant, reap your harvest, and help your friendly neighbors on this game. This game is for people of all ages, and is easy to learn. Yes, players will find some cheat codes, along with strategy tips and hints for everyone to use.There are links to other Farmville cheats are included in this page.
  • Cheat Software

    Some automated software, or "bots," are available that can speed up the playing process by automatically tending to your crops or performing other game functions. These can be accessed over the Internet and downloaded to your computer. While some of them may be effective, there is always a risk of downloading a virus or spyware. In addition, word on the street is that Zynga looks out for these, and may ban your account if you are caught using one.http://farmvillecheats.co.cc/
  • Facebook Farmville Cheat Codes for Speed

    Clear a section in your field of plots, you need to create a nice section of land. Clear nine spots in a formation. Now ‘walk’ your person in the middle of this section.
    Go to the market, purchase the cheapest fences, and set the fences around the person. After you have set four fences down you will need to turn two of them. You can click on the fence when it is placed and turn it sideways. This effectively blocks in the person and now you can plow and plant much quicker.

    This fence trick is super handy if you have a large amount of area to plow or plant. If you use other items to block in your person, he or she will walk around the perimeter and proceed to plant or plow.

    FarmVille Cheats- The Gift that keeps on Giving
    Try this though it may not work on every browser. Create an additional account (not your main one) which we call the giver. Using the giver account, right click on the "Gift" tab and then click on Open In New Browser. Open as many of this as you want. The, go to each open tab which essentially has the same screen and select the gifts you want. Please make sure you do that for each tab without confirming the selection. Then, go to each tab again and select your main account as the account to receive the gift. Again, the key is not to confirm anything. Once you are done,  you can then click confirm and your main account should receive these gifts. Since gifts=money at some point, you would have created a way to earn unlimited amount of money though it is probably not as fast as doing it the honest way of planting and harvesting crops.


    FarmVille cheats in getting coins
    This is not really a cheat but The trick is really knowing which tree and animals give you the best bang for the buck. It is usually good to just sell the tree once they have gone through one harvest. This is because the initial gifts does not cost any coin, but then it later takes up too much space and so selling them immediately allows you to make some coins on 0 cost and then save the time since it takes some time for the next harvest. Also, you get the most coins when you plant versus rearing animals. Just like stock investing, you really want to diversity as the plants takes different amount of time to grow and harvest. By planting several crops, it allows you to have almost a constant supply of fresh crops ready for harvest so you are not just waiting around for crops to grow.

    You should also know that crops just grow whether you are in front of the computer or not. So, do know the timing of each crop as you need to be able to harvest them within hours or they will start rotting and you do not want to waste time clearing rotting crops.

    Strawberries are the cheapest and grows in about 4 hours. So, you may want to start your morning sowing some strawberry seeds and then log in 4 hours later to harvest it. This is the crop you get started with when you start playing FarmVille, but it is not necessarily the best crop to plant since they can spoil very quickly which means you would have wasted all your money trying to plant the crop.

    FarmVille cheats in a farm on auto pilot mode
    If you do not have much time to work on a farm, yet want a stable cash flow, you may want to make decisions on the kind of tree you want to plant. Fruit trees last longer and allows you to sell the fruits for money. The problem is that they take up space, are expensive to buy and the fruits does not sell for a lot of money. In other words, your return on investment is not the best here. However, if you do not have time anyway, this may be the best for you. Otherwise, you can also invest in animals where you can get milk from the cows, eggs from the duck, etc and make some small cash flow with it. Unlike crops which is time critical, food from the animals never really spoil and so you are not tied to returning to your computer to try to manage it.

    So, most of the Farmville cheats you find online are really not cheats, but just smarters ways to make more money and level up in experience points. Using the Cheat Engine is probably your best bet to quickly change a number in memory. Otherwise,there are also Farmville guide books on that you can buy if you want to learn the strategies and techniques.

Saturday, November 27, 2010

6 Myths about Internet Safety

“Internet Safety” the term has been getting vague with the increasing virus outbreaks nowdays. PC Magazine once conducted a survey in which they asked the participants to rate their broadband ISP services and the results were astonishing. Most of users didn’t completely understand the seriousness of potential threats or how to protect their PCs. Here are the top 6 Myths about safe surfing over internet.

Myth 1 – Nothing Valuable is on the Computer, so I don’t have to worry about security. Your PC can be infected over internet

Long time ago,this was partially true… but the hybrid worms and viruses of today like Blaster, hidrag and others blindly spread across internet to thousands or millions of PCs in a matter of hours, without regard for who owns them, what is  stored there, or the value of the information they hold for the sole purpose of wreaking havoc. Even if your computer is not attacked directly, it can be used as a zombie to launch a denial-of-service or other attack on a network or to send spam or pornography to other PCs without being traced. Therefore, your civic responsibility is to protect your PC so that others are protected.

Myth 2 – I can protect my PC if I disconnect from the Internet or turn it off when I’m not using it.

Wrong. You are a target, If you connect to the Internet at all. You could download a virus when you connect to internet and it may not be activated immediately, not until you read your email offline days after. Viruses nowadays spread wildly through USB/Pen drives, pirated cd’s or torrents or file from networks. But now you can protect your business from internet threats with the top web security software

Myth 3 – I can protect myself from viruses by not opening suspicious e-mail attachments. Some viruses simply get activated by reading or previewing an e-mail

Wrong again. The next virus you get may come from your best friend’s or boss’ computer if his e-mail address book was compromised for simulating an attack. Hybrid worms can enter through the Web browser through loopholes and it is possible to activate some viruses simply by reading or previewing an e-mail. You simply must have a PC-based antivirus package or a firewall.

Myth 4 – I have a Macintosh (or a Linux-based system), not a Windows system, so I don’t have to worry about being attacked.

It is true that most attacks target Microsoft Windows–based PCs, but there have been attacks against Mac OS and Linux systems as well. Some experts have predicted that the Mac virus problem will get worse, because Mac OS X uses a version of Unix. And although these systems have some useful security features, they can still be attacked.

Myth 5 – My system came with an Anti-virus package, so I’m protected.

Installing Antivirus Software is Sufficient

Not quite. Firstly, if you haven’t activated your antivirus to scan incoming web traffic automatically, you don’t have a good Anti-virus and malware protection software. Secondly, new threats appear daily, so an antivirus package is only as good as its last update so its a must to activate the auto-update features to keep your guard up against the latest  threats. Thirdly, an antivirus package can’t protect you from every threat. Malwares, spywares are running in the wild out there and every now and then malicious code penetrate weak systems. You need a combination of solutions, including, at minimum, antivirus, a personal firewall ,an anti spyware/malware package and a plan for keeping your operating system and software up to date with security patches
Antivirus software is a commonly known requirement for Internet security. However, the myth that antivirus installed is all that is needed for protection is dangerous for Internet surfers. Installing antivirus software is the start of Internet security. Constant installation of the latest virus definition files is required. Most reputable antivirus software has monthly updates for definition files. Download them to ensure the computer can recognize newest threats.

Myth 6-Hackers Only Target Specific People

The Department of Homeland Security disputes this train of thought. This is a common thought for home users. Several scripts are available that allow others to find security holes on a computer. These people are called “script kiddies.” Script kiddies run common programs that find the security issues on machines that don’t have the latest security patches. For the best protection, purchase an antivirus program that protects against all types of hack attacks.
The best protection against Internet malware is avoiding websites that are suspicious. Choose a web browser like Google Chrome or Mozilla Firefox to ensure the latest websites listed as attack sites are blocked when finding them in the search results. Don’t have a false sense of security and ensure the latest definition files are applied.


Make Portable Version Of any Software

Make Portable Version Of any Software Using Cameyo 

Now a days almost everybody  carries a pendrive whether he is a IT professional or a home User.There are a lot of softwares that you want to carry with you so that you can open them anywhere without any installations.Here isthe solution to create a portable version of any software.Moreover you can also create a package of software.

Friends i love using firefox browser and addicted to its user interface. Now i can create the portable version of firefox.You can create a portable package of your choice of softwares.
Here is the complete step by step video tutorial  to  Make Portable Version Of any Software Using Cameyo
1. Download the Cameyo software.Its completely free.
2.Install the software.
3.Now Click on Start->Cameyo->Caputre Software Installation
4.Intstall the software into your system whose portable version you want to create.
5.After Complete installation of the software click on the Install Done of the cameyo screen.
6.Now it will create a portable version of your installed software which you can carry and run anywhere without any installation.

Friday, November 26, 2010

what is SQL Injection

When a machine has only port 80 opened, your most trusted vulnerability scanner cannot return anything useful, and you know that the admin always patch his server, we have to turn to web hacking. SQL injection is one of type of web hacking that require nothing but port 80 and it might just work even if the admin is patch-happy. It attacks on the web application (like ASP, JSP, PHP, CGI, etc) itself rather than on the web server or services running in the OS.

This article does not introduce anything new, SQL injection has been widely written and used in the wild. We wrote the article because we would like to document some of our pen-test using SQL injection and hope that it may be of some use to others. You may find a trick or two but please check out the "9.0 Where can I get more info?" for people who truly deserve credit for developing many techniques in SQL injection.
 

What is SQL Injection?
It is a trick to inject SQL query/command as an input possibly via web pages. Many web pages take parameters from web user, and make SQL query to the database. Take for instance when a user login, web page that user name and password and make SQL query to the database to check if a user has valid name and password. With SQL Injection, it is possible for us to send crafted user name and/or password field that will change the SQL query and thus grant us something else.

Thursday, November 25, 2010

Problem Step Recorder-Windows 7 Screen Capture Tool




Well!You might not heard of this great tool provided by microsoft in windows 7.Problem Step Recorder (PSR) is a small tool which can be of extreme help if have to send some screenshots to some technician or friend of your for asking help about a program crash or anything like that.What this Tool does Is as follows
  • Automatically takes a screenshot on mouse click.
  • Automatically takes screenshot on any key press.
  • You can also add comments according to your requirements.
  • Saves all Screenshots in a zip file that can be easily sent via email.

How do I use Problem Steps Recorder?

You can use Problem Steps Recorder to automatically capture the steps you take on a computer, including a text description of where you clicked and a picture of the screen during each click (called a screen shot). Once you capture these steps, you can save them to a file that can be used by a support professional or someone else helping you with a computer problem.

Notes

When you record steps on your computer, anything you type will not be recorded. If what you type is an important part of recreating the problem you're trying to solve, use the comment feature described below to highlight where the problem is occurring.
Some programs, like a full-screen game, might not be captured accurately or might not provide useful details to a support professional.

Here is a step by step guide of how to use Problem Step Recoder In windows 7 with screenshots

1.To start Problem Step Recorder click on the window button and enter psr or psr.exe and press enter key
problemsteprecorder Problem Step Recorder Windows 7 Screen Capture Tool
2.After you press enter you will see application as shown below with the options to Start the recording enabled and the rest of the options disabled.
problemsteprecorderreco Problem Step Recorder Windows 7 Screen Capture Tool
3.Now click on the Start Record button and it will start recording your mouse clicks and key press i.e every time mouse is clicked it will take the screenshot of the current window.
problemsteprecorderreco Problem Step Recorder Windows 7 Screen Capture Tool

4.Now this is the time you start the application which is crashing and it will record the whole step by step execution.So your technician or friend will be able to see how the application crashed or what you might have done wrong while launching the application.
5.After completing the above mentioned steps click on the stop record button.You can also add comments wherever you feel by clicking on the add comments button.
6.When click on stop record you will be asked to save the file.give it a name and save it .this file be in zipped format.
princy gupta
mmec 3rd yr

Wednesday, November 24, 2010

Defragment your hard drives and speed up your Windows

If your Windows XP or Vista is getting slow, a wise thing to do is to defragment your hard drives!defragment
There are many programs but one of the best is Auslogics Disk Defragmenter. Just download the defragmenter, install it and run defragment. It should take approximately 1 hour and it says how much faster your computer went (for example 30%).
When the program has completed defragmenting you should immediately feel the difference (if the percent was over 30). Your computer should now be much faster than it used to be. Programs start up in a glance!
Yes, I know Windows XP also has a built-in defragmenting tool, but it sucks.
Windows XP or Vista is getting slow

Monday, November 22, 2010

The New Search War: Google vs Facebook

It’s no coincidence that Facebook launched a new real-time search engine on the same day that it bought FriendFeed and Google announced a new infrastructure project aimed at speeding up its indexing time. Make no mistake about it: people that know search believe that there’s gold in real-time and social data, and Facebook’s blockbuster acquisition of FriendFeed was a lob squarely across Google’s bow.
Facebook has always been in a position to take a lead in real-time and social search because of the sheer amount of data the site has collected about what people are doing, the things they’re interested in, and what their social graph looks like.



What Facebook Got


Here’s the bullet point list of what Facebook got by purchasing FriendFeed:
- A collection of very smart, ex-Google engineers that really know real-time search
- A social status platform that is arguably better than Twitter’s
- A powerful, ready-made real-time search product
- A small, but influential user base full of early adopters willing to try and evangelize new products
Some might think FriendFeed was a second choice acquisition for Facebook, since the company couldn’t land Twitter last year. But FriendFeed was probably the smarter choice. At just under $50 million it cost less than 1/10th as much as Twitter would have, and comes with arguably a better platform and a team that’s just as strong. Yes, Twitter has more than 20 times as many users, but the acquisition of FriendFeed was clearly about technology and engineering talent – one thing Facebook is not lacking, after all, is users.
punchout-google-facebook

Why Google Should Worry


Facebook has one major asset: users, lots of them. 250 million registered users, to be exact, 30 million of whom update their status at least once per day. What they don’t have is users who are used to sharing their status updates with the world, but they’re trying to change that.
Google still gets more than twice as many visitors as Facebook, but how might that change if Facebook and the new engineering additions from team FriendFeed figure out how to slice and dice that user data in real-time? No one has yet really cracked the real-time or social search egg, but if Facebook can do it, its approximately hundreds of millions of monthly visitors could become hundreds of millions of monthly searchers – and that’s very monetizable and very dangerous to Google’s core business.
And what of Microsoft? Let’s not forget that Microsoft’s Bing powers web search results on Facebook, already. What if the two companies mash it all together and Facebook’s real-time, social web search results find their way out onto Yahoo! (which will soon serve Bing search results)? That’s a very plausible eventuality, and another that’s very dangerous to Google.
facebook-publisher

Facebook’s Track Record


What should really worry Google, though, is Facebook’s track record. Facebook has a knack for taking the technologies geeks love and adapting them for mainstream audiences. They did it with the news feed (FriendFeed), photo tagging (Flickr), link sharing (Delicious), and even status updates, which Facebook had before Twitter, but only pushed to the forefront once Twitter got hot with early adopters.
Sometimes a vocal minority fights against these features when they are first introduced, but Facebook has proven that it has a knack for knowing when to tweak and change features and when to stand their ground to find that sweet spot for features that users eventually come to love and rely upon.
Given their past track record, it seems likely that Facebook will be able to get most of its tens of millions of active users to embrace whichever of FriendFeed’s features it co-opts and if they can then succeed in convincing those users to use its combination real-time/Bing-powered web search – look out Google, you have a new and very worthy competitor.

how to make a pen drive read only

good evening...
from past 2 days i am trying to make pendrive write protected.
because in my college, there are many viruses in every pc. whenever i use my pendrive in college then it give me huge amount of virus. so finally i got trick....
Its an easy registry change:
1. Go to Start -> Run -> Type regedit and hit Enter or click on the OK button.
Browse to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
2. Create a new key called StorageDevicePolicies
Right click on the Control, select New -> Key and type in StorageDevicePolicies

3. Create a DWORD called WriteProtect under StorageDevicePolicies that you created in step 2 and set the value to 1.

This will prevent users from writing to USB drives.



To allow writing to USB drives just change the value to 0. Oh, you don’t need to restart your computer in order to disable write access to removable storage using the method above.
princy gupta
mmec