computers&technologys

What is HTML?

HTML stands for Hypertext Markup Language. A markup language combines text and extra information about the text. The extra information, related to the text's structure and presentation -- things like whether the text is bold, where it is positioned on the page, etc., that information is expressed using markup, which is intermingled with the ordinary text. In the case of HTML, the markup information is contained in "tags," which are easily recognizable by the < > symbols.

Usage
HTML is used to create web pages. No web designer or web developer can do his job without knowing at least some HTML. In the same time, the language is absolutely essential to people who are creating their first webpage or taking their business online.

Although the creation of HTML coincided with the creation of the World Wide Web more than 25 years ago, today it remains one of the core technologies behind the Internet. Virtually every webpage and web application has HTML as its basis. Additionally, HTML can be used on the desktop for formatting help files and documents.

History
HTML has been the standard for creating web pages since it was first introduced in the late 1980s by Tim Berners-Lee, in the form of the first web page and a specification for a collection of tags, or labels, for formatting information for use on the web. The original HTML specification described 22 elements, and 13 of those are valid today.

Today, the World Wide Web Consortium maintains the specifications for the the current version -- HTML 4.01. Work on HTML 5, as well as on CSS 3, is ongoing.

Welcome to Allrecipes.com!

First we applied the Reverse Publishing concept to commemorative books with Legacy.com and social networking sites like CarePages.com. Then we added travel to the mix by employing our open API with our partner, Regent Seven Seas Cruises. Skeptics have questioned what other categories of content might be applicable and, while we think all content is relevant for Reverse Publishing, we clearly need to prove it, category by category.

Today, we are excited to announce SharedBook's first Reverse Publishing partnership in the food category, with Allrecipes.com. If you have ever tried to use your computer in the kitchen, you'll be able to appreciate the practicality and fun of having your personal and most used recipes in one place in a professionally printed cookbook. Allrecipes' 'Create-A'Cookbook' is a one-click way to self-publish cookbooks from your favorite online and personal recipes. But, like everything else at SharedBook, it doesn't stop there. As with all of SharedBook's products, users can choose to preview and purchase their books immediately or to personalize them further. They can edit the content, upload additional information and photos, and invite family and friends into their personal book making space. SharedBook and Allrecipes together allow the user to simulate the common act of tearsheeting recipes plus have the personalization and collaboration tools of Web 2.0 to be able to add additional content. We welcome Allrecipes to the SharedBook platform and look forward to a great partnership.

Recipes for Success

OK, so I like a good play on words. What can I say? And on this blog - I'm not alone.

Over the past few months Mor, Ann, and Ben have written a few entries about our Open API. Up until this past week, we have been eating our own cooking and adjusting the ingredients to get things just right. The fruits of our labor were our Blog2Print application and widget.

This past week represents a major step forward with our API - the launch of the AllRecipes.com Create-a-Cookbook. Based on the feedback we've received, there isn't any need for me to write about what a great product this is. Instead I want to point out HOW it was implemented.

This new book was built utilizing our API, and shows the flexibility of the application. And it takes full advantage of many of the features we first built to accommodate Blog2Print.

Take, for example, embedded photos. For each of the recipes, there is a spot for an accompanying image of the finished dish. The text for the details and ingredients print around the (right-aligned) image. Maybe this sounds simple, but what happens behind the scenes is rather complex. And the image itself is just a simple URL placed inside the text that is sent to our API.

We built this functionality using standard HTML formats and the examples of many blogs. Now that Blog2Print can handle this, the AllRecipes.com implementation was a snap.

Add a generous amount of our SharedBook core functions - like the auto creation of page numbers and the corresponding table of contents (what's a cookbook without an index of some kind?). Wrap it up with our customizable soft or hard cover (with your own personal photo) and you have a great pairing!

I expect we will thrill many chefs with a professional cookbook they build themselves. But I also think we will thrill many Webmasters who are looking for a simple way to implement a SharedBook from their site's content.

Today I made a chair.

Working for a high-tech company can be very frustrating sometimes. Basically, what we all do is actually move virtual text from one place to another.

In all my years of experience I have worked for quite a few companies that developed various products. Products for billing, banking, e-commerce, online catalogs, etc ...

I never felt what I was doing was very exciting, and was never able to show others (family, friends) what I was actually doing. When asked, I usually answered "something with computers." Somewhere deep inside I always wished I was a carpenter, so I would be able to show everyone the new chair I just finished.

A CEO in one of the companies I worked for once told me a nice story. He was working as the VP of sales for a very big media & TV corporation. His daughter asked what he was doing at work and he began to explain all about the large corporation and all the responsibilities he had. The little child got confused and bored, but eventually understood two words: sale & TV. So she asked him very excitedly, "So Daddy, you are selling TVs? That's great!" imagining her Dad going from door to door.

I also have a hard time explaining to my three kids what I do at work. Somehow, Quality Assurance & Tech Support always comes down to – "Daddy is checking and fixing computers.”

All this has changed in SharedBook. Today I can come home and show them all the great memory books we are creating here, which are getting better and more beautiful with each new client. I have even created baby books for all of them, which came out wonderful and were praised by everyone who saw them.

Thanks to SharedBook, today I can finally show my family and friends the “chairs” I am making.

Professional Web Site Design: 6 Tips Even the Amateur Aficionado Can Handle

By Marci Crane ; October 16th, 2007
Tagged: HTML • CSS • Design
Professional web site design is important but you don't have to be a licensed professional to get an online space that “says” professional web site design with confidence!


The following design tips will help you to achieve the look alike professional web site design that your business or personalize website has been waiting for.

11 Web Design Tips

By John LaSpina ; September 4th, 2007
Tagged: HTML • CSS • Design
Before you start design on a website step back a minute – or two. Think about what a website is REALLY supposed to do for the client as well as the visitor. In its simplest form, a website is there to facilitate a transaction of information between it and the visitor. With this in mind, here are some tips for designing useful web sites:

Why Should You Become Certified?

Life-long learning are the keywords to your future success.

Do you want a career with a future? You should add regular updates to your skills and knowledge. Unless, you have already decided that your current skills and job are good enough for your future.

Knowledge is power, especially in the current job market. Documentation of your skills enables you to move upwards in your organization.

Getting a certificate proves your commitment to upgrade your skills, gives you the credibility needed for more responsibilities, larger projects, and a higher salary.

In addition, documented knowledge is often the key factor when hiring new personnel. Your certificate might advance your career or help you to start a new one.

Also have in mind that employees with certifications increase their company's chances of retaining old and getting new customers. You will do your company a favor getting certified. Expect your company to support you in this.

parrot


More advanced color creation using RGB, alpha and web color settings

Creates a Color structure from the specified 8-bit color values (red, green, and blue). The alpha value is implicitly 255 (no transparency).[C#] Color myColor = Color.FromArgb(0, 255,125);
[Visual Basic]
Dim myColor As Color = Color.FromArgb(0, 255,125)
Creates a Color structure from the four ARGB component (alpha, red, green, and blue). Alpha is also known as transparency where 255 is totally solid and 0 is totally transparent.[C#]Color myColor = FromArgb(120, 0, 255,125);
[Visual Basic]
Dim myColor As Color = FromArgb(120, 0, 255,125)
Creates a Color from a 32-bit ARGB value. (alpha, red, green, and blue)[C#]Color myColor = Color.FromArgb(0x78FF0000);
[Visual Basic]
Dim myColor As Color = Color.FromArgb(&H78FF0000)
Creates a Color from the specified Color Name, but with the new specified alpha value, valid alpha values are between 0 through 255.[C#]Color myColor = Color.FromArgb(125,Color.Red);
[Visual Basic]
Dim myColor As Color = Color.FromArgb(125,Color.Red)
For converting a web color:If the color is "bgcolor="#388B7E" , replace # with 0x(for csharp) or &H (for visual basic), and add an alpha value between 0-7F after that, then add the rest. (0x7F388B7E or &H7F388B7E)[C#]Color myColor = Color.FromArgb(0x7F388B7E);
[Visual Basic]
Dim myColor As Color = Color.FromArgb(&H7F388B7E)

Introduction

This document describes how to add the .netCHARTING control to various versions of Visual Studio toolbox.
Visual Studio 2002 & 2003:
Right-Click on the toolbox > Add/Remove Items
Select the .net Framework Components tab
If the server version is installed, the component will be listed in the list box. Otherwise, click browse and select the .netCHARTING dll.
Click Ok to finish.
If the error "The format of the file 'dotnetcharting' is invalid." occurs. This means the dll being added is a .net 2.0 assembly. To resolve this issue, the .net 1.x version of the bundle must be downloaded and used instead.

Visual Studio 2005 & Express editions.
Right-Click on the toolbox > Choose Items
Select the .net Framework Components tab
If the server version is installed, the component will be listed in the list box. Otherwise, click browse and select the .netCHARTING dll.
Click Ok to finish.

Web Matrix
Select "Custom Controls" tab of the toolbox.
Right-Click on the custom controls tab and select "Add Local Toolbox Components..."
Click "Browse..."
Navigate to the location of the dotnetcharting.dll file, select it and click ok.
Finally click ok at the "Select Components" popup.
When the "Install to GAC" popup appears, click no.

Common Problems and Resolutions:

When I start the WebApplication from Visual Studio I get Empty page. Cause: The database folder does not exist in you project folder. When I start the WebApplication from Visual Studio I get "CreateControl: generic error occurred in GDI+". Cause: the Temp folder does not exist or does not have Write permissions. Error in reading Database Cause: ConnectionString property is not pointing to right path for the database. When I drag and drop Chart control from Toolbox to Form , I get "error in CreateChildControl" Solution: Add a reference to dotnetCHARTING.dll and under the References node in Solution Explorer. I do not see the Chart Control in Toolbox. Solution: Select Customize Toolbox from Tools menu and then add the dll to Toolbox or right-click on the tool box > Add/Remove Items > .net tab > browse to the dll > click OK.
Design Time Support: The Chart control can used in design time in Visual Studio .NET (or web matrix). You can use this control in an ASP.NET web Application (not in desktop or winforms applications) As with any other control first you should add it to the Toolbox as follows:
From Tools menu option select "Customize Toolbox" then browse and select the dotnetCharting.dll assembly and click OK.
You will now see the chart control listed in the toolboxTool
You may now drag and drop the chart into the aspx page and use it.
You can use the Properties browser to see all chart control properties, and any changes when made on any properties, related code will be generated in code behind file in InitializeComponent() method, you can also write your own code, overriding any properties in the Page_load section or any part of file as you please.

Installation Instructions:

Create new project, ASP.NET Web Application.
Copy the Database folder from the .netCHARTING bundle into your project root ( for example in c:\inetpub\wwwroot\webApplication)
Copy dotnetCHARTING.dll to the bin folder within your web application (like you did for the database in step 2)
Add a reference to dotnetCHARTING.dll under the References node in Solution Explorer.
Select Customize Toolbox from Tools menu and then add the dll to Toolbox or right-click on the tool box > Add/Remove Items > .net tab > browse to the dll > click OK. For more information, see this article.
Copy and Paste the code from any of the .netCHARTING samples included in the bundle to your aspx page (you can delete any default html code which has been created through Visual Studio .NET wizard)
Create a Temp folder in the project path same as step 2 or 3 and modify the permissions to have write access (See installation for more information).
Make sure the path for database is set correctly.
When you start the project you should see a chart based on the sample code you added.

Differences from the WebForms version:

The winforms Chart control is inherited from System.Windows.Forms.userControl and you have access to all events,properties and methods of UserControl in addition to the full .netCHARTING object model.
Width and Height properties are "int" type versus WebControl which are Unit type.
HitTest method. This method accepts the X,Y position on the chart image and returns the corresponding object for that point of the Image. These are 3 overloaded methods for HitTest method: [C#]
HitTestInfo myObj = HitTest(x,y);[Visual Basic]
HitTestInfo myObj = HitTest(x,y)x,y are int and represent the point you want to get the related object from. [C#]
HitTestInfo myObj = HitTest(myPoint);[Visual Basic]
HitTestInfo myObj = HitTest(myPoint)myPoint is "Point" type and represents the point you want to get the related object from.[C#]
HitTestInfo myObj = HitTest();[Visual Basic]
HitTestInfo myObj = HitTest()If you do not pass the cursor position, internally this method uses the position from the Chart control. This usage would be applicable when using the winforms control in a winforms project.Currently, the HitTestInfo Class has one property called "Object". It will hold the object clicked and can be used for drilldown or other advanced integration with the chart in a winforms environment.
When you use Object.URL properties, such as Element.URL when you click on the Element, a new browser window will be launched with the URL value specified. URL target has no effect in a winforms environment.

.netCHARTING Winforms Support

A winforms version has been released in conjunction with .netCHARTING 3.0. This enables usage outside of a web environment and in desktop applications. The winforms bundle (dotnetchartingwinforms.zip) contains a separate assembly dotnetcharting.winforms.dll.
The winforms control will not function in a web environment. In addition, the web version (dotnetcharting.dll) will not function outside of a web environment.
If you are already familiar with .netCHARTING the winforms version will also be familiar. When you run the provided sample application (dotnetchartingsamples.exe) you will discover the code for various charts is identical. This application provides an interface for viewing different charts along with the source for each in C# and VB.NET. You can also print the source listing or copy it to the clipboard for subsequent use.

acrofnt08.lst

%!Adobe-FontList 1.11
%Locale:0x409
%BeginFont
Handler:DirectoryHandler
FontType:CMap
CMapName:Identity-H
Registry:Adobe
Ordering:Identity
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\CMap\Identity-H
FileLength:6716
FileModTime:971075690
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:CMap
CMapName:Identity-V
Registry:Adobe
Ordering:Identity
UseCMap:Identity-H
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\CMap\Identity-V
FileLength:1249
FileModTime:971075690
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:AdobeSerifMM
FamilyName:Adobe Serif MM
StyleName:Regular
FullName:Adobe Serif MM
MenuName:Adobe Serif MM
StyleBits:0
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\ZY______.PFB
DataFormat:Plain
MMAxisName:Weight
MMAxisName:Width
UsesStandardEncoding:yes
isCFF:no
FileLength:96418
FileModTime:924077814
WeightClass:400
WidthClass:5
AngleClass:0
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:AdobeSansMM
FamilyName:Adobe Sans MM
StyleName:Regular
FullName:Adobe Sans MM
MenuName:Adobe Sans MM
StyleBits:0
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\ZX______.PFB
DataFormat:Plain
MMAxisName:Weight
MMAxisName:Width
UsesStandardEncoding:yes
isCFF:no
FileLength:75573
FileModTime:924077814
WeightClass:400
WidthClass:5
AngleClass:0
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:AdobePiStd
FamilyName:Adobe Pi Std
StyleName:Regular
FullName:Adobe Pi Std
MenuName:Adobe Pi Std
StyleBits:0
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\AdobePiStd.otf
DataFormat:sfntData
UsesStandardEncoding:yes
isCFF:yes
FileLength:89660
FileModTime:1161525208
WeightClass:400
WidthClass:5
AngleClass:0
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:Symbol
FamilyName:Symbol
StyleName:Regular
FullName:Symbol
MenuName:Symbol
StyleBits:0
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\SY______.PFB
DataFormat:Plain
UsesStandardEncoding:no
isCFF:no
FileLength:34705
FileModTime:924077814
WeightClass:400
WidthClass:5
AngleClass:0
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:CourierStd
FamilyName:Courier Std
StyleName:Medium
FullName:Courier Std Medium
MenuName:Courier Std
StyleBits:0
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\CourierStd.otf
DataFormat:sfntData
UsesStandardEncoding:yes
isCFF:yes
FileLength:35448
FileModTime:1161525208
WeightClass:500
WidthClass:5
AngleClass:0
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:CourierStd-BoldOblique
FamilyName:Courier Std
StyleName:Bold Oblique
FullName:Courier Std Bold Oblique
MenuName:Courier Std
StyleBits:3
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\CourierStd-BoldOblique.otf
DataFormat:sfntData
UsesStandardEncoding:yes
isCFF:yes
FileLength:36496
FileModTime:1161525208
WeightClass:700
WidthClass:5
AngleClass:1
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:CourierStd-Bold
FamilyName:Courier Std
StyleName:Bold
FullName:Courier Std Bold
MenuName:Courier Std
StyleBits:2
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\CourierStd-Bold.otf
DataFormat:sfntData
UsesStandardEncoding:yes
isCFF:yes
FileLength:35188
FileModTime:1161525208
WeightClass:700
WidthClass:5
AngleClass:0
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:CourierStd-Oblique
FamilyName:Courier Std
StyleName:Medium Oblique
FullName:Courier Std Medium Oblique
MenuName:Courier Std
StyleBits:1
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\CourierStd-Oblique.otf
DataFormat:sfntData
UsesStandardEncoding:yes
isCFF:yes
FileLength:36824
FileModTime:1161525208
WeightClass:500
WidthClass:5
AngleClass:1
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:MyriadPro-It
FamilyName:Myriad Pro
StyleName:Italic
FullName:Myriad Pro Italic
MenuName:Myriad Pro
StyleBits:1
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\MyriadPro-It.otf
DataFormat:sfntData
UsesStandardEncoding:yes
isCFF:yes
FileLength:100252
FileModTime:1119265582
WeightClass:400
WidthClass:5
AngleClass:1
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:MyriadPro-BoldIt
FamilyName:Myriad Pro
StyleName:Bold Italic
FullName:Myriad Pro Bold Italic
MenuName:Myriad Pro
StyleBits:3
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\MyriadPro-BoldIt.otf
DataFormat:sfntData
UsesStandardEncoding:yes
isCFF:yes
FileLength:101512
FileModTime:1119265582
WeightClass:700
WidthClass:5
AngleClass:1
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:MyriadPro-Bold
FamilyName:Myriad Pro
StyleName:Bold
FullName:Myriad Pro Bold
MenuName:Myriad Pro
StyleBits:2
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\MyriadPro-Bold.otf
DataFormat:sfntData
UsesStandardEncoding:yes
isCFF:yes
FileLength:96484
FileModTime:1119265582
WeightClass:700
WidthClass:5
AngleClass:0
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:MinionPro-Regular
FamilyName:Minion Pro
StyleName:Regular
FullName:Minion Pro
MenuName:Minion Pro
StyleBits:0
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\MinionPro-Regular.otf
DataFormat:sfntData
UsesStandardEncoding:yes
isCFF:yes
FileLength:205608
FileModTime:1119265582
WeightClass:400
WidthClass:5
AngleClass:0
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:MinionPro-It
FamilyName:Minion Pro
StyleName:Italic
FullName:Minion Pro Italic
MenuName:Minion Pro
StyleBits:1
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\MinionPro-It.otf
DataFormat:sfntData
UsesStandardEncoding:yes
isCFF:yes
FileLength:250708
FileModTime:1119265582
WeightClass:400
WidthClass:5
AngleClass:1
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:MinionPro-BoldIt
FamilyName:Minion Pro
StyleName:Bold Italic
FullName:Minion Pro Bold Italic
MenuName:Minion Pro
StyleBits:3
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\MinionPro-BoldIt.otf
DataFormat:sfntData
UsesStandardEncoding:yes
isCFF:yes
FileLength:250828
FileModTime:1119265582
WeightClass:700
WidthClass:5
AngleClass:1
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:MinionPro-Bold
FamilyName:Minion Pro
StyleName:Bold
FullName:Minion Pro Bold
MenuName:Minion Pro
StyleBits:2
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\MinionPro-Bold.otf
DataFormat:sfntData
UsesStandardEncoding:yes
isCFF:yes
FileLength:210112
FileModTime:1119265582
WeightClass:700
WidthClass:5
AngleClass:0
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:Type1
FontName:MyriadPro-Regular
FamilyName:Myriad Pro
StyleName:Regular
FullName:Myriad Pro
MenuName:Myriad Pro
StyleBits:0
WritingScript:Roman
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\MyriadPro-Regular.otf
DataFormat:sfntData
UsesStandardEncoding:yes
isCFF:yes
FileLength:94884
FileModTime:1119265582
WeightClass:400
WidthClass:5
AngleClass:0
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:PFM
FontName:AdobeSerifMM
NumMMAxes:0
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\PFM\zy______.pfm
FileLength:684
FileModTime:924077814
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:PFM
FontName:AdobeSansMM
NumMMAxes:0
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\PFM\zx______.pfm
FileLength:683
FileModTime:924077814
%EndFont
%BeginFont
Handler:DirectoryHandler
FontType:PFM
FontName:Symbol
NumMMAxes:0
OutlineFileName:C:\Program Files\Adobe\Reader 8.0\Resource\Font\PFM\SY______.PFM
FileLength:672
FileModTime:924077814
%EndFont

Adobe Digital Editions

Adobe® Digital Editions is an engaging new way to read and manage eBooks and other digital publications. It is built from the ground up as a lightweight rich Internet application (RIA). Adobe Digital Editions works online and offline and supports PDF- and XHTML-based content as well as Adobe Flash® SWF for rich interactivity.
Download now
The free Adobe Digital Editions download is under 3MB (Windows® version) and takes less than two minutes to install over a broadband connection. With an RIA service model, users always have the latest version of Adobe Digital Editions, taking advantage of new features and security enhancements.
To get started:
Visit the Adobe Digital Editions library to browse and download eBooks and digital magazines(Adobe Digital Editions will automatically download if needed.)
Or, you can:
Directly download and install Adobe Digital Editions by clicking the Install Adobe Digital Editions button at the right.
For more information:
Read the FAQ ›
Read the press release ›
Download and install
Can't see this content? To view this content, JavaScript must be enabled, and you need the latest version of Adobe Flash Player. Download Flash Player now.
//

Free eBooks
Check out the Adobe Digital Editions library, where you can browse and download free eBooks and digital magazines.
You will find a wide variety of books including full-length novels and nonfiction in PDF and XHTML format. There is also a sampling of excerpted books, containing one or two chapters.
Visit the Adobe Digital Editions library ›

Maya Christina Gonzalez

Maya Christina Gonzalez is painter and graphic artist. Her exquisite artwork has been praised by reviewers as "lively," "innovative," and "so bountiful it feels as if it's spilling off the pages." Maya is also a mentor artist in the Children's Book Press outreach program, LitLinks. She lives and plays in San Francisco, California.

Unrivaled performance. Ultimate freedom.

Meet Intel's latest mobile technology. Intel® Centrino® Duo processor technology sets a new standard for premium computing.
Experience 2X the multitasking performance with Intel Centrino Duo processor technology powered by the Intel® Core™2 Duo processor.³ Get ready for stunning digital images on games, photos, and all your digital entertainment and see exciting new levels of graphics performance. Scream through single and multithreaded applications.
See the performance difference
See the graphics difference
Enjoy great battery life² and expand mobile freedom from the power efficiency of the Intel Core 2 Duo processor, so you can do more without having to recharge.
Reach out with up to 5X faster wireless connectivity¹ around the home when you get Intel® Next-Gen Wireless-N technology and a new wireless n network. Experience the increased speed and range of next-generation wireless over conventional Wi-Fi.
Extend your home wireless range up to 2X and say goodbye to chasing signals with a notebook based on Intel Centrino Duo processor technology with optional Intel Next-Gen Wireless N and a new wireless n network¹.
Pump up your boot. Now applications load up to twice as fast, and your notebook wakes up from hibernating in faster time with Intel Centrino Duo processor technology and Intel® Turbo Memory, available in some systems.4
See the Intel Turbo Memory difference
To dig deeper into the technologies behind these benefits, check out the interactive demo and see the product overview.

Disposable E-mail Address Services

Before I start listing several websites and services that allow you to use “one-use” email addresses I will shortly explain why everyone should have at least one service at hand all the time.We all know websites that require you to register before you can see their content. Many are free sites that force the user to register to see the content, some do this to avoid spam on their boards and comments, some to avoid that bots flood the site and some to sell your personal information. The last type of sites are the worst of course, spammers buy millions of email addresses and send their spam to them. There is a good way to avoid this: Disposable Email Address Services.There are two ways to avoid spam when registering somewhere on the internet. First you can use Disposable Email Address Services that allow you to check an email account that is not your own and email aliases that webmailers like gmail and yahoo mail offer. I will only post free sites that offer the first service.The procedure itself is always the same. You go to the website of the service and take a look at the requirements of the email address. For example the service www.mytrashmail.com offers only free emails that use somename@mytrashmail.com. After this you visit the website you want to register with and enter an email address which could be anything as long as it ends with @mytrashmail.com.It´s a simple concept. Once the account is created you recieve a verification email from the website you registered with and have to reply to it. Visit the services website, in this case www.mytrashmail.com and enter the name of the email address that you specified in the registration process. It can take 1-2 minutes before you can read the mail but it should appear sooner or later.After that you might want to delete the mail to prevent that another user might check the same email address and find your registration information. He could go to the website and demand that the password is send out again to the email, check it then and use your account. So, delete it when possible to be on the safe side. Or use aliases that are hard to guess, something like tu834ffe.You should also make sure that no one (but admins) is able to see your email address that you registered with. Other than that, it´s a safe method.If they sell your email now all mail will be send to the disposable email address service and deleted there after some time.It´s also a great way to stay relativly anonymous.Email Aliases:This is becoming increasingly popular. I only tested it with my gmail account but friends told me that yahoo for instance is offering a similar service. You can send emails using a service called plus addressing. This is not documented yet in the help files so I explain the basic concept. Lets say your email address is ghacks@gmail.com and you want to register at a website. You might register with an email alias that looks like ghacks+sitename@gmail.com. The verification mail will be send to your inbox and you can reply to it to activate the account.This feature has advantages but also an disadvantage. First, if you recieve spam you can control it by filtering all mails that are send to the email alias. You can also verify that a site is selling your email to spammers if you are using unique aliases for each site you register with.A disadvantage is that spammers only need to parse the email to check for the + and everything that follows up to the @ sign. They will then have your real email and can send you spam again.Oh, one other service that a user posted in the comments of my last article on the subject is called bugmenot.com. They are basically a search engine for registration data for various sites. You search for the site you want to register and they probably have already some account data in their database. This of course only works if you just want to read and not participate as a unique user.Disposable Email Services List:6url.comdodgeit.comjetable.orgmaileater.commailinator.comshortmail.comspam.laspambob.comtempinbox.comxents.com

Some MP3 Search Engines

Here are a list of Mp3 search engines using which you can search for your favourite music and download them.... hav fun with these Links.
Lycos MP3 Search - An incredibly popular and very strong search engine. When queried, returns hits with a very helpful reliability ranking.
http://mp3.lycos.com/
Kermit - Kermit is a search box and nothing much more. Because the index is constantly updated, it has gained a reputation as one of the strongest mp3 search engines.
http://oth.net/
Audio Galaxy - Formally known as the BORG search, Audio Galaxy has become one of the more popular, and useful, MP3 search engines on the Internet.
http://www.audiogalaxy.com/
Scour.net - One of the most popular mp3 / multimedia search engines on the web. All downloads from the site must be made with the Scour Media Agent.http://www.scour.net/
2Look4 - Although not the largest or most popular music search engine on the web, 2look4 is certainly notable.
http://www.2look4.com/
Astraweb - A bare-bones search engine not unlike Kermit.Mirc-X - Despite its name, Mirc-X stands as a very strong MP3 search engine. Like Kermit, Mirc-X has a strong reputation among computer gurus.
http://www.astraweb.com/
Palavista - A META MP3 search engine. The search engine reads into six of the more popular engines and sorts the returns by engine.
http://www.palavista.com/

INTERNET EXPLORER AS FAST AS FIREFOX

Open registry editor by going to Start then Run and entering regedit. Once in registry, navigateto key HKEY_CURRENT_USER\Software\microsoft\Windows\ Current Version \InternetSettings. Right click on the right windows > New > DWORD. Type MaxConnectionsPerServer > You can set value (the more higher the no, the more good speed eg: 99). Create another DWORD >type MaxConnectionsPer1_0Server. Then put a high value as mentioned above. Restart I.E and you are done

TURN OFF SYSTEM BEEPS

Go to HKEY_CURRENT_USER\Control Panel\Sound, and find the Beep and ExtendedSounds String values. Set each value to No. Exit the Registry and reboot. The beeps will no longer sound. Hey, your XP is no longer noisy!!

Download Mobile Ringtones FREE !!! from Paid websites.

HI Guys THis is really true with most of the websites offering a paid service to download ringtones (MONO, POLY,TRUE Tones) You just need to have a Internet Explorer. WebsitesTested:http://www.mauj.com/ringtones/poly.phphttp://in.rediff.com/mobile/ringtone/polyphonic.htmlhttp://ringtones.indiatimes.com/ringtone/newwebsite/index.jspThere will be many many many other websites which can be fooled without any Hacking....Just Hear the Ringtones you like and go to the Temporary Internet Files Directory to see the MP3 (or other Supported Sound formats like rm,wma)Copy it to your personal folder and hear it offline.... and now you have that ringtones all yours without spending a penny on the site.......If Have any difficulties finding the Temp INternet Folder.. Best Way is to gotoTools->Internet Options->General-> Select Settings in Temporary Internet Files Now Select View Files and you can find all the files including your ringtones in the folder

Find Servers That Contain Ebooks! In a easy Way

Copy The Following Code And Paste It In Google.
+("index of") +("/ebooks""/book") +(chmpdfziprar) +apache
If u are interested, u can change some values in the code to come up with another search results.I will explain which values u need to modify ...u can change ("/ebooks""/book") to ("/photoshop") or ("/photoshop""adobe"). //
The '' means ORu can also change (chmpdfziprar) to (avimpg) denpending on ur search (ebook or movie or application)the most important thing that u should understand is that u can use '' to separate the SEARCH WORDS and FILE EXTENSIONS;
so u can put as many parameters as u like Separated by ''.

Internet Error Codes

When you hav enter a site and it shows site unable with an error code. You can make out that the problem is by refering to these error codes.Q: What do all those error codes (like 404) mean?A: It happens to all of us. We're surfing along, and up comes an error. What do all those error codes mean?Here's a quick rundown of the most common:400 - Bad Request - You probably typed in a URL wrong, the server has no clue what you're looking for, or you aren't allowed to have access. Usually, it's a matter of the URL being typing in wrong. Maybe you mixed upper and lowercase letters or something.401 - Unauthorized Request - you tried to get to something on the web server you're not allowed to play with. In other words, you ain't on the party list.403 - Forbidden - You can't access the page. You may not have access (it may require a password), or it may be blocked from your domain.404 - Not Found - The page you were trying to look at was not found on the server. This is probably the most common error you'll come across. What has probably happened is that the web page you were going to has been removed or re-named.500 - Internal error - Usually caused by a CGI error. You fill out a form, but the script used to process it is not working properly.503 - Service Unavailable - The server may be overloaded, down, or have other similar problems. Try later

Reduce The Wait Time

If you use a Point-to-Point Protocol connection over Ethernet (PPPoE), you may notice a delay in using the PPPoE connection after startup. By default, there is a 120 second delay but you can stop this behavior by manually configuring an IP address for the network adapter card. If you do not use a PPPoE connection, you can skip this section.1. Select Start/Connect to/Show All Connections.2. Open the TCP/IP properties for your LAN network interface card.3. Manually set the IP address on the TCP/IP properties to an appropriate IP address and subnet mask for your network.

To increase the Internet speed

Open Notepad and paste the below code in it.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters]"SackOpts"=dword:00000001"TcpWindowSize"=dword:0005ae4c"Tcp1323Opts"=dword:00000003"DefaultTTL"=dword:00000040"EnablePMTUBHDetect"=dword:00000000"EnablePMTUDiscovery"=dword:00000001"GlobalMaxTcpWindowSize"=dword:0005ae4cNow save this file as speed.reg. Execute it and observe the cha

How SMS Works

Just when we're finally used to seeing everybody constantly talking on their cell phones, it suddenly seems like no one is talking at all. Instead, they're typing away on tiny numerical pads, using their cell phones to send quick messages. SMS, or text messaging, has replaced talking on the phone for a new "thumb generation" of texters. In this article, we'll find out how text messaging works, explore its uses and learn why it sometimes takes a while for your text message to get to its recipient.
SMS Attacks
Recently it has been suggested that SMS messages could be used to attack a cell phone system. The basic idea is very simple. If a large number of SMS messages were sent by computers to phones in a small geographical area (like a city), these messages would overwhelm the control channels and make it impossible for the cell phone system to set up calls. Now that cell phone providers know about the possibility of this threat, they can design systems to throttle messages coming from the SMSC onto the network.
What is SMS?
SMS stands for short message service. Simply put, it is a method of communication that sends text between cell phones, or from a PC or handheld to a cell phone. The "short" part refers to the maximum size of the text messages: 160 characters (letters, numbers or symbols in the Latin alphabet). For other alphabets, such as Chinese, the maximum SMS size is 70 characters. But how do SMS messages actually get to your phone? If you have read How Cell Phones Work, you can actually see what is happening.
Even if you are not talking on your cell phone, your phone is constantly sending and receiving information. It is talking to its cell phone tower over a pathway called a control channel. The reason for this chatter is so that the cell phone system knows which cell your phone is in, and so that your phone can change cells as you move around. Every so often, your phone and the tower will exchange a packet of data that lets both of them know that everything is OK.
Your phone also uses the control channel for call setup. When someone tries to call you, the tower sends your phone a message over the control channel that tells your phone to play its ring tone. The tower also gives your phone a pair of voice channel frequencies to use for the call.
The control channel also provides the pathway for SMS messages. When a friend sends you an SMS message, the message flows through the SMSC, then to the tower, and the tower sends the message to your phone as a little packet of data on the control channel. In the same way, when you send a message, your phone sends it to the tower on the control channel and it goes from the tower to the SMSC and from there to its destination. The actual data format for the message includes things like the length of the message, a time stamp, the destination phone number, the format, etc. For a complete byte-by-byte breakdown of the message format, see this page. In the next section we'll learn about some of the uses and advantages of SMS.
Why 160 Characters?
SMS was designed to deliver short bursts of data such as numerical pages. To avoid overloading the system with more than the standard forward-and-response operation, the inventors of SMS agreed on a 160-character maximum message size. But the 160-character limit is not absolute. Length limitations may vary depending on the network, phone model and wireless carrier. Some phones don't allow you to keep typing once the 160-character limit is reached. You must send your message before continuing. However, some services will automatically break any message you send into chunks of 160 characters or less. So, you can type and send a long message, but it will be delivered as several messages.
Why use SMS?
SMS has several advantages. It is more discreet than a phone conversation, making it the ideal form for communicating when you don't want to be overheard. It is often less time-consuming to send a text message than to make a phone call or send an e-mail. SMS doesn't require you to be at your computer like e-mail and instant messaging (IM) do -- although some phones are equipped for mobile e-mail and IM services. SMS is also a convenient way for deaf and hearing-impaired people to communicate.
SMS is a store-and-forward service, meaning that when you send a text message to a friend, the message does not go directly to your friend's cell phone. The advantage of this method is that your friend's cell phone doesn't have to be active or in range for you to send a message. The message is stored in the SMSC (for days if necessary) until your friend turns his cell phone on or moves into range, at which point the message is delivered. The message will remain stored on your friend's SIM card until he deletes it. In addition to person-to-person messages, SMS can be used to send a message to a large number of people at a time, either from a list of contacts or to all the users within a particular area. This service is called broadcasting and is used by companies to contact groups of employees or by online services to distribute news and other information to subscribers.
In a 2004 University of Plymouth study on the psychology of SMS users, researchers found that mobile phone users were primarily either "texters" or "talkers" [ ref]. Compared to the talkers, the texters sent nearly double the number of SMS messages and made less than half as many voice calls per month. The texters preferred SMS to voice calls for its convenience as well as for the ability to review a message before sending it.
Companies have come up with many uses for the service beyond just your typical person-to-person message. Because SMS doesn't overload the network as much as phone calls, it is frequently used by TV shows to let viewers vote on a poll topic or for a contestant. As a promotional tool, wireless carriers put up giant screens at concerts and other large-scale events to display text messages from people in the audience.
You can use text messaging subscription services to get medication reminders sent to your phone, along with weather alerts, news headlines or even novels broken into 160-character "chapters." Internet search engines such as Yahoo! and Google have short messaging services that enable users to get information such as driving directions, movie showtimes or local business listings just by texting a query to the search engine's phone number. Social networking services such as Dodgeball use SMS to alert people who live in big cities when their friends or crushes are nearby. The possibilities for integrating SMS into your lifestyle seem endless.
Naturally, SMS has limitations, and there are some people who feel it has outlived its usefulness. In the next section, we'll look at the disadvantages of SMS and some of the alternatives out there.
SMS History
SMS was created during the late 1980s to work with a digital technology called GSM (global system for mobile communications), which is the basis for most modern cell phones. The Norwegian engineers who invented it wanted a very simple messaging system that worked when users' mobile phones were turned off or out of signal range. Most sources agree that the first SMS message was sent in the UK in 1992. As SMS was born in Europe, it's not surprising that it took a little longer to make its way to the United States. Even today, texting enjoys much greater popularity in Europe, though its stateside use is on the rise. A July 2005 study found that 37 percent of U.S. mobile phone owners had sent or received at least one text message in the previous month

Saving Real Audio to Hard Disk

You will need the following tools: Real Player, Real Player Alternative or another tool / plugin that plays real audio files. I suggest Real Player AlternativeThere is more than one way to save the files. I try to give an overview on all of them, there are surely more out there but I think its sufficient if you know how to save them, no one needs more than 2-3 ways for the same process.1. Go to a webpage that offers Real Audio Streams, they normally offer a link to a .ram file which you download. The .ram file only contains the link to the .ra / .rm file, and thats what we need. Remember the .ra file contains the audio, the .ram file the location of the audio file.Download the .ram file and open it locally with a text editor. You should see a line with a link to the audio file. If you are lucky the url starts with http:// If thats the case simply copy paste the url into your browser and you are prompted to download the audio file.Unfortunatly most of the time the url does not start with http but with rtsp:// for example. The browser won´t download this files, there is a workaround for this though. Just a quick note, there is an older format as well, just in case, don´t worry if you find a pnm:// link, its just the old protocol. There should not be a lot of those around anymore.You can use the flashget program to which is a download manager to save streams, it is able to handle the rtsp:// format as well as others.Once on your hard disk simply double click to start the audio

Password protect folders in XP with & without software

Folder lock with software click here http://www.esnips.com/doc/7f993235-e6dc-4ccc-b107-7ee46b69f793/pc-security(reg now download full version by the txt files key............................................Folder lock without software----1 If u have a login passwordfor your account, this can be used to protect yourfolders from other users.Your hard drive must be formated usingNTFS(wich is probablyi is unless your dual booting with another operating system)..........Right click on the folder that u want to make privateand choose"properties"(or alt+double-click). Go to the "sharing" tab ang check the "make this folder private"box. Click applay.If u donot have password on your account, a box will pop up asking if u want assign a password.This must be done if u want to make this folder private, so click 'yes'. You will need to use password to log in to your computer then on. Try a password then conform it.Click the"creat password"button then close the password window..Click ok in the properties box. Now any one login in to your computer can't acces to that files without knowing password..............................................................2 If your folder is zipped then directly u can apenthe file in it and see ADD A PASSWORD. And conform the password and it will B safe............................................................

5 Tips for buying right lapetop computer

In the world of mobile computing, size definitely matters. The size of a laptop affects two key areas: portability and display size.If you're always on the go and will be using your computer only in short bursts, a so-called ultralight will save you some shoulder strain. On the other hand, if you're going to spend hours in front of your laptop, a larger display may be in order.Today, some laptop displays exceed 17 inches, rivaling the display size ofmany desktop systems. The down side is thatthese monsters can easily weigh three times as much as an ultralight.2. Hard DriveSpeaking of size, what about the size of the hard drive? One way to approach this issue is to ask yourself the following question: Will this be my primary computer, or will it supplement my desktop system?If the former, you should look for a bigger hard drive - 60 GB or more. If the latter, you may be able to make it with a 20-30 GB hard drive.But even this isn't absolute.If, for example, you plan to copy a huge MP3 library from your desktop system to your laptop to make your music library portable, you'd be well advised to err on the side of too big.3. MemoryIn determining the right amount of system memory, or RAM, take a look at the ways in which you intend to use your laptop:If your needs are somewhat mundane - email, spreadsheets, word processing, etc. - 256 MB of RAM should be plenty. This is a common configuration for many laptops, so it means you probably won't need to spend extra for more RAM.On the flip side, if you're an aspiring mobile digital photographer or videographer, you should stuff your laptop with as much RAM as it can hold.In fact, exactly how much RAM your laptop can hold may in part drive your purchase decision. Applications for editing and manipulating multimedia content are notorious resource hogs.4. Network ConnectionsThanks in no small part to the Internet, computing in the 21st century relies heavily on being connected:Connected to the Internet, connected to a corporate network, connected to a wireless network, connected to a home network, connected to an online service.Your life will be easier if you buy a laptop that includes built-in means to connect to them all.5. PriceIf you're considering a laptop, you're probably wondering how much money you'll need to spend.A few years ago, you'd be hard-pressed to find one for under $2,000. Today, there are plenty of laptops to be had for under $1,000.What's more, most of the major manufacturers offer a variety of financing options.Laptop prices have come down, to be sure. However, a laptop still represents a fairly major purchase for most people. If you take the time to search for a laptop that meets your specific needs, you should get many years of use and enjoyment from this important investment.

Orkut Goodies

Hi Friends, Here is a site which contains many Orkut user scripts for your Firefox. Using these scripts you can get additional features like reply to all, quickly adding a frnd etc... on Orkut.http://rb286.blogspot.com/Here is another site dedicated for Orkut fans in which you can access many goodies like ASCII, BAR scraps, Heart Generators etc....http://www.orkutando.net/eng/Try these Stufff......

Free Online Security and Virus Scans

Many sites offer to scan your computer for viruses online which should be seen as a last resort because this method has advantages but also disadvantages. If you scan your system online you can be sure that the latest virus definitions are used while scanning your system and that the script that is running was not compromised by a virus or trojan running on your system.Huge disadvantages exist nevertheless. Most if not all scanners do work solely in the Internet Explorer and require Active X controls to be active. This could pose a security risk by itself and it is therefor advised to use those scanners as a last resort. Only a few scanners work with Firefox and none seem to work with Opera. On to the list:

Technology behind Free SMS

I am revealing the technology behind free sms which many online free SMS Service providers use it and also may be asking you to buy SMS credits to send SMS.Most of the Online Free SMS Service Providers write their programs in ASP or PHP. The basic model is when you send a SMS to your friend, for example 9849012345, then the web program just emails your SMS content to 9849012345@airtelap.com. This is very simple, easy and for God sake they are also charging you for this.If your are an expert in ASP or PHP then simply write a program with the information I gave below and then now you can offer free SMS from your own website.You can now send SMS to your family members, colleagues, relatives, friends mobiles with free of cost. It is free for the receiver mobile also as all incoming SMS to any mobile in India is free. In India the cellular operators are not charging for incoming SMS. So enjoy funSMS.net service!!!I am here giving all the Cellular Networks , their Phone Number Series and their mobile emails. And so just search the Phone Number series( ex: 9849) of your friend and then email them to their mobile email and it will delivered in minutes.Mechanism : Just send an email from your gmail or kify mail account to the Mobile Email of your friend and it will SMSed to your friend mobile phone.Delivery of the Message : It will be delivered in minutes. If the cell is switched off, then the message will be delivered as soon as it comes to the network. So no probs!Example: If your Friend Mobile No is 9843028370, then your Friend Mobile No. Series is 9843 and so you have to send an email to your friend as 9843028370@bplmobile.com and it will be SMSed to his mobile.ok.To find the list of Mobile operators, Click here

Finding a invisible user on Yahoo! Messenger

Many people nowdays prefer to stay offline while using Yahoo! Messenger -mostly done to avoid someone. There are many ways of finding people who are online but yet invisible.First Method: Doodle Method1. Double Click on the user whose status you want to check.2. A message window will open.3. Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.4. The last step and the most important step. After loading the Doodle IMVironment, there will be two possibilities.a) If the user is offline, the Doodle area will show “waiting for your friend to load Doodle” continuously. If the user is online (in invisible mode), after few seconds (it can take up to one minute, depending on connection speed), you will get a blank page. So the user is online!There is a counter attack of this trick:Go to Messenger>>Preferences>>Messages and now uncheck Enable IMVironments. Now this trick is nullified!Second Method: Voice Chat1. Double Click on the user whose status you want to check.2. Click on “Voice” icon on the toolbar, or select “Contact” menu and select “Enable Voice Chat” .3. The deciding part… there are 2 possible results:a) If the user is offline, you will get this message: “Internal server error. Cannot obtain voice token to start voice chat.” If the user is invisible (actually online), you will see the Voice Toolbar.Third Method: Conference Invitation1. Right Click on the user whose status you want to check.2. When the menu appears, select Invite to Conference.3. A window will appear. See at the right pane, the username you selected will be there. Now, click Invite.4. The deciding part… there are 2 possible results:a) If the user is offline, you will get this message: “None of the users in the invite list are available to join the conference. Please try at a later time.”If the user is invisible, you will get a window similar saying: “You are now logged into voice conference - "Fourth Method: Buddy Spy1. Get Buddy Spy fromhttp://www.buddy-spy.com2. Go to configure and enter your login details.3. Now go to Buddy Spy option and enter the username you want to track. You can also check multiple ids also. Not only Buddy Spy tells the status of Chat but also Room Chat and WebCamera status of that user also!4. You can edit other options through Scan Options menu.Now Have a great chatting!

Seach google for live cams

Here is a cool search on google to find out live cams.For example if you type into google exactly this : inurl:"axis-cgi/mjpg"Then you are ablt to veiw shopping center webcams and also office cams or even science lab cams.So enjoy...Btw its perfectlyRemember to put in how active the cams are in the topic descriptionBtw way guys i dont know if anyone else knows this but htis is really helpful, once u ge tinto this stuff u ll realise that u have to refresh inorder to get new images but if u use Mozilla Firefox u can click the refresh button which osme how refreshes the page every millisecond or so therefore making it like a video with a new image, i think this has about 3 or 4 images a second depending on ur internet connection have fun!

Call any phone in the US for free from India Using Skype!!

After considerable research, experimenting and testing I have finally come up with a way for people worldwide to call any phone in US for free. This has been tested from India and it works. I dont see any reason why it shouldnt work from other countries.Minimum requirements:High speed internet connection (DSL, Cable internet). I have not tested it with dial-up, and so cannot vouch for this working with dial-up.A computer running XP with multimedia support and admin priviligesComputer speakers and microphoneThe tutorial below20 minutes of your timeHere’s a brief summary of how this works. Skype is offering free calls to all landlines and mobile phones within US and Canada till end of 2006. However, if you connect to skype from outside US and Canada, Skype will detect that the connection is not within US and so wont allow you to call for free. The workaround is to make Skype believe that you are connecting to it from the US. We use VPN to achieve that. iPig provides free VPN service that terminates in the US. So if you open a VPN connection to iPig and connect to Skype, Skype traces your origin to iPig’s servers and assumes that you are connecting from within US, allowing you to make free calls from your computer.Here are the steps:Get a skype account and the skype instant messenger. If you dont already have one, here is how you can get itDownload the latest version of Skype from www.skype.com Install itLaunch the skype messenger and register a new username in the login window.Log out of skype and close the application.Get an iPig account and iPig VPN client (note that iPig will NOT work with cisco VPN client, or windows XP’s built-in VPN client). If you dont have one (which is likely the case) here is how you get oneDownload the the iPig client (version 1) from iPig website here. Make sure you download iPig Client v1.x and not v2.x. V2 does NOT support free accounts and will not work for youInstall the iPig client. You need to reboot your PC after the installation.Reboot your PCCreate a free iPig User AccountNow we have all the software that we need to get this working. You need to first log into iPig and then into Skype (the order is important, it might not work otherwise)Open the iPig software and enter your iPig username and password (Screenshot)Click the “ON” button to protect all your wireless and wired communicationIf you have a firewall software installed (e.g. Zonealarm or Norton Internet Security), you need to allow iPig outgoing and “act as a server” Internet access if your software asks. iPig needs this in order to catch and encrypt your Internet traffic (Screenshot).Open Skype and login using your Skype username and passwordCall any phone number in the US using Skype, here are the instructions on how to call regular phones.Wait till the call connects and start talkingHope the level of instructions are sufficient and clear enough for you to get it working. If nto just leave me a comment with a valid email address and I will respond to the comments on this blog and email you a copy as well.Happy talkin’!!

Destroy a WebSite!!!!!

Yeah this sounds crazy at first glance.You have a friend whose site you want to destroy ? Go tonetdisaster.com or destroysites.com,enter the url of the target, select your weapon of choice from (30 / 16) different including gunshots, kisses, ant hills, tomatoes and a haunting. Turn sounds on or off and select to auto destruct the site or manually destroy it. Hit go and the site will face serious damage: Virtually of course. Netdisaster features more weapons like meteors, a razor, god or a chainsaw.I suggest you visit this website if you want to see the full arsenal of weapons.Manual destruction is way harder, you have to find the spots that you can click to execute the action.My suggestion, use auto destruct, lean back and watch how the computer does the work for you..No harm was done to websitesHave Fun, and enjoy destroying the websites.......

Are you blogging without Windows Live Writer?

Ok, so I hope I bought a little credibility by giving up on Live Spaces and moving to Word Press, but today I am drinking the Kool-aid. If you are blogging and not use Live Writer then you might be crazy. If there is something better out there, feel free to let me know, but with only a few days under my belt using it, I’m very impressed. It is dramatically improving my life quickly and addresses one of the weak points of word press (the editor).

What you get (from MS web site):



• WYSIWYG editing: Edit using the style of your blog, including fonts, colors, line spacing, margins, etc.
• Rich content: Insert and customize rich content like photos, maps and more
• Offline editing: Compose and edit drafts even when you’re not connected to the Internet
• Blog preview: See exactly what your post will look like in the context of your blog before you upload it
• Smart image publishing: Add images to your blog post, and they’ll automatically appear as thumbnails that link to larger images with more detail
• Compatibility: Support for publishing to Windows Live Spaces, as well as Blogger, LiveJournal, TypePad, WordPress, and many other blog hosting services



And now that you have Live Writer, go to Codeplex and grab the insert website image plugin which will allow you add web page images in seconds…

Sean
Technorati tags: blogging tools, live writer, microsoft, authoring tools, editors, community, word press, kool-aid, codeplex, cluetrain

5 ways to speed your pc

No matter how fast your processor and regardless of how much ram youcarry, there comes a time when you realize yourcomputer just doesn't run as fast as it did when you bought it.Windows loads slower, programs take longer to launch, and, in general, your computer drags like it just came off a 2-night drinking binge.If this sounds like your situation, these 5 tips should help you get some extra speed from your PC.~ Disk Cleanup Utility ~You may not realize it, but just because you finish with a file doesn't mean your computer does.In many cases, if your computer's hard drive were a garage, you would have unused junk files piled 20 feet high and spilling out into the street.Everyone should use the Windows "Disk Cleanup Utility" to delete old, unused, and temporary files that clog your hard drive.Click Start, point at All Programs (or Programs), Accessories, System Tools, and click Disk Cleanup. Analyze your hard drive for files you can eliminate and it may shock you to see how much hard drive space (and speed) you can free up with a few clicks.~ "Defrag" ~Imagine a properly maintained hard drive as room the size of Wal-Mart filled with filing cabinets.Now imagine ripping open every drawer of every filing cabinet, slinging the contents onto the floor and trying to find one document -that's a fragmented hard drive.Sometimes lack of speed simply results from your computer working too hard to find the files it needs. You can solve this problem by "defragging" your hard drive.Click Start, point to All Programs (or Programs), Accessories, System Tools, and click Disk Defragmentor. Choose the disk you want to defragment and expect to let the program run for several hours.~ Uninstall Unused Software ~We all maintain software on our systems we rarely, if ever, use.That software can steal system resources. Click Start, Control Panel, and "Add Remove Programs" to pull up a screen that allows you to remove old programs you don't use anymore.Simply select and uninstall all programs you know for sure you don't need or want.~ Buy More RAM ~Increasing your RAM, a computer's memory, can dramatically increase speed when running certain operations or programs. RAM costs so little now that you should install the maximum amount of memory your system can handle.~ "Stop Them At Startup" ~This operation requires a bit more technical savvy than the other four, so proceed with caution.Many programs load into the system tray in the lower right of your computer's desktop and consume system resources even if you never use them.Click Start, Run, type in msconfig, and press Enter. Click the "Startup" tab to see a list of programs that automatically start with Windows.Clear the check box next to programs you know you don't want to load at startup.But don't clear any checkbox unless you are 100% certain of a program's purpose. Once you finish, click OK and it will prompt you to restart Windows.

Controle users logins by hacking the regestry

To control logon options, run the Registry Editor [Hack #83] and go to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion Winlogon subkey, which contains a variety of logon settings (as well as some settings not having to do directly with logons). Following are the most important values you can edit to customize logons.DontDisplayLastUserNameThis setting lets you control how the system logon dialog box is used. If this String value is present and set to 1, all users will have to enter both their username and password to log on. If the value is 0, the name of the last user to log on will be displayed in the system logon dialog box.DefaultUserNameThis String value contains the name of the last user who logged on. It will bedisplayed only if the DontDisplayLastUserName value is not present or is set to 0.LegalNoticeCaption and LegalNoticeText// Already discussedPasswordExpiryWarningThis DWORD value lets you display a warning message to users a certain number of days before their passwords are set to expire. It lets you determine how many days ahead of time the warning should be issued. To edit the value, click the decimal button and enter the number of days.ShutdownWithoutLogonThis String value enables or disables a button on the XP logon dialog box that lets the system shut down. A value of 1 enables the button (so that it is shown); a value of 0 disables the button (so that it is not shown).ShellIt determines the shellthe user interfacethat will be used by XP. The default is Explorer.exe, but it can be another shell as wellfor example, the Program Manager from older Windows versions. Type in the name of the program; for example, Progman.exe for the Program Manager, or Taskman.exe for the Task Manager.AutoRestartShellThis DWORD value doesn't have to do with logons either, but it's another good one to know. It sets whether to automatically restart the Windows shell if the shell crashes. A value of 1 automatically restarts the shell. A value of 0 tells XP not to restart the shell, forcing you to log off and then back on again to restart it.

10 Tips to stay safe and secure online

Tip 1 - Avoid the obviousPasswords based on personal details are too easy to guess. Avoid using names, places, favorite sports teams, or “password".Tip 2 - Make it non-dictionaryOne option a thief might try to crack your password is a brute-force dictionary attack. So choose something that you won't find in any dictionary.Tip 3 - Use the full 8 charactersThe more characters a password contains the more secure it becomes, so fill that password field to the max.Tip 4 - Mix the caseDeter thieves further by using a combination of upper and lower-case letters. A mIXeD cAsE password adds another layer of protection and is ever harder to guess.Tip 5 - Include non-alphabetic charactersAdding numbers and non-alphabetic characters (like a hyphen) to your password makes it less likely to be cracked than something purely alphabetic.Tip 6 - Don't write it downThis should be obvious but it's amazing how many scraps of paper surround the world's PCs.Tip 7 - Assign a different password to each login idIf thieves get hold of your password, they'll try it in every online system available. Use a separate password at each website and you won't have all your eggs in one basket.Tip 8 - Employ a password managerRemembering multiple secure passwords can be challenging. Specialist software like http://www.robo-form.com manages your passwords securely and automates the login process.Tip 9 - Logout when you're doneAlways hit the logout button when you've finished using a secure site like online banking.Tip 10 - Close that browserWeb pages and passwords can be cached in the browser, so close down your browser window for added security.

Find Every File

When you search for a file in Windows Windows searches only for file types it recognizes. Files that aren't listed in the 'Registered file types' list are ignored. Fortunately, a simple edit of the Registry will make Windows search for every file, regardless of its extension. Open the Registry Editor as described above, and then navigate to and select:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ContentIndex. Double-click the FilterFilesWithUnknownExtensions icon in the right pane, change the 0 in the 'Value data' box to 1, and press Enter.To ensure that Windows XP searches for every possible file, select All Files and Folders under 'Type of file' in the Search Companion pane. (If you don't see this option, click More Advanced Options.) Check Search system folders, Search hidden files and folders, and Search subfolders (as desired). In Windows 2000, click Search Options, check Type, and make sure that (All Files and Folders) is selected in the resulting drop-down menu. Check Advanced Options, and make sure Search Subfolders is checked. Finally, to ensure that Windows 2000 finds system and hidden files, choose Tools, Folder Options and click the View tab. In the 'Advanced settings' list, select Show hidden files and folders. Uncheck Hide protected operating system files (Recommended), click Yes to acknowledge the warning, and finish by clicking OK.

HACKING XP PASSWORD

1. Open command prompt (Start->Run->cmd),2. Enter the following command, then press ENTER3. Enter the followin command, then press ENTER:compmgmt.mscThis should open the computer management console.4. Go to local users & groups->users. Right click on any user and select "set password".If you get a "access denied" do the following:start>run>cmdthen use following commands1) net user test /add (this command will make test named user)2) net localgroup administrators test /add (this command will make test user as administrators rights)and use net user command to reset your admin. passwordAlternativeWhat if u don't know the password of your admin and still want to hack and change .. yea u can do it ..in a very easy manner.. check this. just follow the steps.. this doesn't require u to know the admin password but still u can change it..Start >> Run >> [type]cmd // this will open your command prompt[type] net(space)user(press enter)[type] net(space)user(space)[windowsloginid](sp ace)*(press enter)// for e.g. : net user HOME *(press enter)[type] new password (press enter) and retype it (press enter).. it will show u confirmation... // caution it wont show u the password u type.. but it still types.. the blinking pointer will b there at the same place.. but it still works// for e.g. : password changed successfully.

Disable Recent Doccuments History

The bad thing about Recent Documents History is that Windows XP has to calculate what should be put there each time you boot Windows, which can slow things down.1. Open the Registry Editor (select Start/Run, type regedit, and click OK).2. Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\ CurrentVersion\Policies\Explorer.3. Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it once it is created.4. Set the Data Value to 1 to enable the restriction.5. Click OK and close the Registry Editor. You'll need to restart the computer for the change to take effect.

Stopping Unneeded Startup Services and Making XP boot faster

Along with the core operating system and programs that Windows XP runs when it starts, there is also a host of services involved. Many of these services are necessary for Windows XP to operate correctly. However, many of them are for features in Windows XP that you may not use at all. You can peruse the services and disable any service that you do not want to run. The fewer services that run, the more quickly Windows XP will boot.To reduce the number of services that start on bootup, you can access two different areas of Windows XP.o The first is the System Configuration Utility. You can do that by entering the command "msconfig" in the run menu.Start ->Run ■> "msconfig" (without quotes) Hit EnterThe Services tab shows you the services that start when the computerboots. You can stop a service from starting by simply clearing the check boxnext to the service and clicking OK.o However, before you do so, there is another way to disable services that you may prefer because the interface gives you more information about the service in question. Open Control Panel -» Administrative Tools ^Services orStart -> Run -> "services.msc" Hit EnterTake a quick look at common services you may want to live without:Automatic Updates: This service enables Windows XP to check the Web automatically for updates. If you don't want to use Automatic Updates, you can disable the service.Computer Browser: If your computer is not on a network, you don't need this service. If you are on a network, leave it alone.DHCP Client: If you are not on a network, you do not need this service. If you are on a small workgroup, you can still increase boot time by configuring manual IP.DNS Client: If you are not on a network, you do not need this service.Error Reporting and Event Log: You don't have to use these services but they can be very helpful, so I would leave them configured as automatic.Fax: If you don't use your computer for fax services, you can disable this one.Help and Support: Disable if you never use the Windows XP Help and Support Center.IMAPI CD-Burning COM: This service enables you to burn CDs on your computer. If you never burn CDs, you can disable the service without any second thoughts.Indexing Service: Your computer keeps an index of all the files. But if you rarely search for files, the service is just a resource hog. You can stop itWindows Firewall/Internet Connection Sharing: If you do not use these features, plz disable.Infrared Monitor: If you do not use infrared devices, you can disable this service.Messenger: This service sends alert messages on a local area network (it is not the same as Windows Messenger). If you are not on a network, you can disable this service.Print Spooler: If you do not do any printing from the computer, you can disable this service. If you print, make sure you leave it as automatic.Remote Registry: This service allows remote users to modify the Registry on yourcomputer. If you are not on a network, you can disable this service.System Restore Service: This service allows you to use System Restore. If you have turned off System Restore anyway, you do not need to turn off the service.Themes: If you do not use themes, you can disable this service.Windows Image Acquisition: If you do not use scanners or digital cameras, you can disable.Wireless Zero Configuration: If do not use wireless networking devices, you can disable.

Technology behind Free SMS

I am revealing the technology behind free sms which many online free SMS Service providers use it and also may be asking you to buy SMS credits to send SMS.Most of the Online Free SMS Service Providers write their programs in ASP or PHP. The basic model is when you send a SMS to your friend, for example 9849012345, then the web program just emails your SMS content to 9849012345@airtelap.com. This is very simple, easy and for God sake they are also charging you for this.If your are an expert in ASP or PHP then simply write a program with the information I gave below and then now you can offer free SMS from your own website.You can now send SMS to your family members, colleagues, relatives, friends mobiles with free of cost. It is free for the receiver mobile also as all incoming SMS to any mobile in India is free. In India the cellular operators are not charging for incoming SMS. So enjoy funSMS.net service!!!I am here giving all the Cellular Networks , their Phone Number Series and their mobile emails. And so just search the Phone Number series( ex: 9849) of your friend and then email them to their mobile email and it will delivered in minutes.Mechanism : Just send an email from your gmail or kify mail account to the Mobile Email of your friend and it will SMSed to your friend mobile phone.Delivery of the Message : It will be delivered in minutes. If the cell is switched off, then the message will be delivered as soon as it comes to the network. So no probs!Example: If your Friend Mobile No is 9843028370, then your Friend Mobile No. Series is 9843 and so you have to send an email to your friend as 9843028370@bplmobile.com and it will be SMSed to his mobile.ok.

Airtel Hack for free internet

You need a PC or a Laptop and the required connectivity tools ,ie.,Serial/USB cable OR Infrared Device OR Bluetooth dongle
1) Activate Airtel Live! ( It’s FREE so no probs)
2) Create TWO Airtel gprs data accounts (yep TWO) and select theFIRST as the active profile.
3) Connect your mobile to the PC (or Laptop) and install the driver foryour mobile’s modem.
4) Create a new dial-up connection using the NEW CONNECTIONWIZARD as follows
Connecting Device : Your mobile’s modemISP Name : Airtel (or anything you like)Phone Number : *99***2# / Try 99***1Username and Password : blank
5) Configure your browser and download manager to use the proxy100.1.200.99 and port 8080.( My advice is to use Opera since youcan browse both wap and regular websites)
6) Connect to the dial-up account. You will be connected at 115.2kbps (but remember, that is a bad joke).
7) Pick up your mobile and try to access any site. You will get “AccessDenied…”(except for Airtel Live!). IT DOES NOT MATTER.Keep the mobile down.
8 ) On the PC ( or Laptop) open your browser, enter any address ,press ENTER and…….WAIT
9) After a few seconds the page will start to load and you have theWHOLE internet at your disposal. ***************************************************************************************************************TWO
Under DATA COMM
~~~~~~~~~~~~
APN : airtelfun.com
USERNAME : blank
PASSWORD : blank
PASS REQ : OFF
ALLOW CALLS : AUTOMATIC
IPADDRESS :
DNSADDRESS :
DATA COMP : OFF
HEADER COMP :
OFFUnder INTERNET PROFILES
~~~~~~~~~~~~~~~~
INTERNET MODE : HTTP or WAP (both worked for me)
USE PROXY : YES
IP ADDRESS : 100.1.200.99
PORT : 8080
USERNAME :
PASSWORD :
No Risk Here, Try it and Enjoy
alternate
For All Airtel Users
Requirements:
1. Airtel live (available 4 free)
2. Nokia series60 handset eg 6600,6630,n series,7610,6670 etc
3. Opera wap browser 4 mobile
Procedure:-
1. Go to ur connection settings and make a new internet profile using the default settings of airtel live. name that new profile as nething(for eg masala); change the home page of that profile to nething u like for eg www.google.com.
2. Go to ur Opera browser and set the default connection as AIRTEL LIVE. this is the original settings u received thru airtel.
3. Go to the services(in n6600) and Web(N6630) and change the default profile for connection as masala (newer one).**
Note: always make sure that ur access point is airtelfun.comApply:-
1. Open Opera and u will see that homepage of Airtel Live is opened. Minimize the application.
2. Now open web using the duplicate Profile and u will see that two gprs connections will work simultaneously and at the web or the services page it will show "Unable to connect" or any error. well thats the signal of ur success.
3. Simply go on the Opera with web on and open any site u want for free. No Charges No nothing.U can also use it through ur computer..........

All keyboard Shortcuts

v
Shift + F10 right-clicks.Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs.Win + Control + F: Open Find dialog. (Computers)Win + U: Open Utility Manager.Win + F1: Open Windows help.Win + Pause: Open System Properties dialog.Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift + F10 right-clicks.Win + Shift + Tab: Cycle through taskbar buttons in reverse.Alt + Tab: Display CoolSwitch. More commonly known as the AltTab dialog.Alt + Shift + Tab: Display CoolSwitch; go in reverse.Alt + Escape: Send active window to the bottom of the z-order.Alt + Shift + Escape: Activate the window at the bottom of the z-order.Alt + F4: Close active window; or, if all windows are closed, open shutdown dialog.Shift while a CD is loading: Bypass AutoPlay.Shift while login: Bypass startup folder. Only those applications will be ignored which are in the startup folder, not those started from the registry (Microsoft\Windows\CurrentVersion\Run\)Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invoke the Task Manager or NT Security dialog.Ctrl + Shift + Escape (2000/XP ) or (Ctrl + Alt + NumpadDot) : Invoke the task manager. On earlier OSes, acts like Ctrl + Escape.Printscreen: Copy screenshot of current screen to clipboard.Alt + Printscreen: Copy screenshot of current active window to clipboard.Ctrl + Alt + Down Arrow: Invert screen. Untested on OSes other than XP.Ctrl + Alt + Up Arrow: Undo inversion.Win + B : Move focus to systray icons.
Generic
Ctrl + C or Ctrl + Insert: Copy.Ctrl + X or Shift + Delete: Cut.Ctrl + V or Shift + Insert: Paste/Move.Ctrl + N: New... File, Tab, Entry, etc.Ctrl + S: Save.Ctrl + O: Open...Ctrl + P: Print.Ctrl + Z: Undo.Ctrl + A: Select all.Ctrl + F: Find...Ctrl+W : to close the current windowCtrl + F4: Close tab or child window.F1: Open help.F11: Toggle full screen mode.Alt or F10: Activate menu bar.Alt + Space: Display system menu. Same as clicking the icon on the titlebar.Escape: Remove focus from current control/menu, or close dialog box.
Generic Navigation
Tab: Forward one item.Shift + Tab: Backward one item.Ctrl + Tab: Cycle through tabs/child windows.Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.Enter: If a button's selected, click it, otherwise, click default button.Space: Toggle items such as radio buttons or checkboxes.Alt + (Letter): Activate item corresponding to (Letter). (Letter) is the underlined letter on the item's name.Ctrl + Left: Move cursor to the beginning of previous word.Ctrl + Right: Move cursor to the beginning of next word.Ctrl + Up: Move cursor to beginning of previous paragraph. This and all subsequent Up/Down hotkeys in this section have only been known to work in RichEdit controls.Ctrl + Down: Move cursor to beginning of next paragraph.Shift + Left: Highlight one character to the left.Shift + Right: Highlight one character to the right.Shift + Up: Highlight from current cursor position, to one line up.Shift + Down: Highlight from current cursor position, to one line down.Ctrl + Shift + Left: Highlight to beginning of previous word.Ctrl + Shift + Right: Highlight to beginning of next word.Ctrl + Shift + Up: Highlight to beginning of previous paragraph.Ctrl + Shift + Down: Highlight to beginning of next paragraph.Home: Move cursor to top of a scrollable control.End: Move cursor to bottom of a scrollable control.
Generic File Browser
Arrow Keys: Navigate.Shift + Arrow Keys: Select multiple items.Ctrl + Arrow Keys: Change focus without changing selection. "Focus" is the object that will run on Enter. Space toggles selection of the focused item.(Letter): Select first found item that begins with (Letter).BackSpace: Go up one level to the parent directory.Alt + Left: Go back one folder.Alt + Right: Go forward one folder.Enter: Activate (Double-click) selected item(s).Alt + Enter: View properties for selected item.F2: Rename selected item(s).Ctrl + NumpadPlus: In a Details view, resizes all columns to fit the longest item in each one.Delete: Delete selected item(s).Shift + Delete: Delete selected item(s); bypass Recycle Bin.Ctrl while dragging item(s): Copy.Ctrl + Shift while dragging item(s): Create shortcut(s).In tree pane, if any:Left: Collapse the current selection if expanded, or select the parent folder.Right: Expand the current selection if collapsed, or select the first subfolder.NumpadAsterisk: Expand currently selected directory and all subdirectories. No undo.NumpadPlus: Expand currently selected directory.NumpadMinus: Collapse currently selected directory.
Accessibility
Right Shift for eight seconds: Toggle FilterKeys on and off. FilterKeys must be enabled.Left Alt + Left Shift + PrintScreen: Toggle High Contrast on and off. High Contrast must be enabled.Left Alt + Left Shift + NumLock: Toggle MouseKeys on and off. MouseKeys must be enabled.NumLock for five seconds: Toggle ToggleKeys on and off. ToggleKeys must be enabled.Shift five times: Toggle StickyKeys on and off. StickyKeys must be enabled.6.) Microsoft Natural Keyboard with IntelliType Software InstalledWin + L: Log off Windows.Win + P: Open Print Manager.Win + C: Open control panel.Win + V: Open clipboard.Win + K: Open keyboard properties.Win + I: Open mouse properties.Win + A: Open Accessibility properties.Win + Space: Displays the list of Microsoft IntelliType shortcut keys.Win + S: Toggle CapsLock on and off.
Remote Desktop Connection Navigation
Ctrl + Alt + End: Open the NT Security dialog.Alt + PageUp: Switch between programs.Alt + PageDown: Switch between programs in reverse.Alt + Insert: Cycle through the programs in most recently used order.Alt + Home: Display start menu.Ctrl + Alt + Break: Switch the client computer between a window and a full screen.Alt + Delete: Display the Windows menu.Ctrl + Alt + NumpadMinus: Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing Alt + PrintScreen on a local computer.Ctrl + Alt + NumpadPlus: Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PrintScreen on a local computer.
Mozilla Firefox Shortcuts
Ctrl + Tab or Ctrl + PageDown: Cycle through tabs.Ctrl + Shift + Tab or Ctrl + PageUp: Cycle through tabs in reverse.Ctrl + (1-9): Switch to tab corresponding to number.Ctrl + N: New window.Ctrl + T: New tab.Ctrl + L or Alt + D or F6: Switch focus to location bar.Ctrl + Enter: Open location in new tab.Shift + Enter: Open location in new window.Ctrl + K or Ctrl + E: Switch focus to search bar.Ctrl + O: Open a local file.Ctrl + W: Close tab, or window if there's only one tab open.Ctrl + Shift + W: Close window.Ctrl + S: Save page as a local file.Ctrl + P: Print page.Ctrl + F or F3: Open find toolbar.Ctrl + G or F3: Find next...Ctrl + Shift + G or Shift + F3: Find previous...Ctrl + B or Ctrl + I: Open Bookmarks sidebar.Ctrl + H: Open History sidebar.Escape: Stop loading page.Ctrl + R or F5: Reload current page.Ctrl + Shift + R or Ctrl + F5: Reload current page; bypass cache.Ctrl + U: View page source.Ctrl + D: Bookmark current page.Ctrl + NumpadPlus or Ctrl + Equals (+/=): Increase text size.Ctrl + NumpadMinus or Ctrl + Minus: Decrease text size.Ctrl + Numpad0 or Ctrl + 0: Set text size to default.Alt + Left or Backspace: Back.Alt + Right or Shift + Backspace: Forward.Alt + Home: Open home page.Ctrl + M: Open new message in integrated mail client.Ctrl + J: Open Downloads dialog.F6: Switch to next frame. You must have selected something on the page already, e.g. by use of Tab.Shift + F6: Switch to previous frame.Apostrophe ('): Find link as you type.Slash (/): Find text as you type.
GMail
Note: Must have "keyboard shortcuts" on in settings.C: Compose new message.Shift + C: Open new window to compose new message.Slash (/): Switch focus to search box.K: Switch focus to the next most recent email. Enter or "O" opens focused email.J: Switch focus to the next oldest email.N: Switch focus to the next message in the "conversation." Enter or "O" expands/collapses messages.P: Switch focus to the previous message.U: Takes you back to the inbox and checks for new mail.Y: Various actions depending on current view:Has no effect in "Sent" and "All Mail" views.Inbox: Archive email or message.Starred: Unstar email or message.Spam: Unmark as spam and move back to "Inbox."Trash: Move back to "Inbox."Any label: Remove the label.X: "Check" an email. Various actions can be performed against all checked emails.S: "Star" an email. Identical to the more familiar term, "flagging."R: Reply to the email.A: Reply to all recipients of the email.F: Forward an email.Shift + R: Reply to the email in a new window.Shift + A: Reply to all recipients of the email in a new window.Shift + F: Forward an email in a new window.Shift + 1 (!): Mark an email as spam and remove it from the inbox.G then I: Switch to "Inbox" view.G then S: Switch to "Starred" view.G then A: Switch to "All Mail" view.G then C: Switch to "Contacts" view.G then S: Switch to "Drafts" view.
List of F1-F9 Key Commands for the Command Prompt
F1 / right arrow: Repeats the letters of the last command line, one by one.F2: Displays a dialog asking user to "enter the char to copy up to" of the last command lineF3: Repeats the last command lineF4: Displays a dialog asking user to "enter the char to delete up to" of the last command lineF5: Goes back one command lineF6: Enters the traditional CTRL+Z (^z)F7: Displays a menu with the command line historyF8: Cycles back through previous command lines (beginning with most recent)F9: Displays a dialog asking user to enter a command number, where 0 is for first command line entered.Alt+Enter: toggle fullScreen mode.up/down: scroll thru/repeat previous entriesEsc: delete lineNote: The buffer allows a maximum of 50 command lines. After this number is reached, the first line will be replaced in sequence

Use Internet Explorer safely

Switch on extra protection in Internet Explorer
Most people use Internet Explorer to browse the worldwide web. The latest version contains many safety features.
Upgrade Internet Explorer
The first thing to do is to make sure you’re using the latest version of the Internet Explorer. We recommend running the latest version because it includes many security features that were not present in previous versions. (At the time of writing, this was version 7.)
You can see which version you are currently using by selecting the Help menu and then About Internet Explorer.
You can get the latest version from Microsoft's website or by running Windows Update.
Security features
Internet Explorer 7 has several important safety features:
Identifying phishing and other kinds of spoof websites.
Blocking unwanted popup windows.
Displaying safety information in the status bar and address box.
Restrict what unknown websites can do to your PC
Microsoft Internet Explorer has a feature designed to restrict the damage that a rogue Internet site can do. It groups websites into one of four zones: trusted, restricted and local intranet and internet. When you start Explorer for the first time, all sites are in the ‘Internet’ zone which has medium-high restrictions. You can allocate sites into the other categories. Restricted sites are the most constrained whereas trusted sites have maximum freedom. To add a website to a different category, go to the Tools menu and select Internet Options. Click the Security tab, and then click the security zone where you want to add the site.
More information
Microsoft questions and answers on Internet Explorer.
Previous articleProtect handheld computers
Next articleUsing the Firefox web browser