computers&technologys

Adobe Digital Editions

Adobe® Digital Editions is an engaging new way to read and manage eBooks and other digital publications. It is built from the ground up as a lightweight rich Internet application (RIA). Adobe Digital Editions works online and offline and supports PDF- and XHTML-based content as well as Adobe Flash® SWF for rich interactivity.
Download now
The free Adobe Digital Editions download is under 3MB (Windows® version) and takes less than two minutes to install over a broadband connection. With an RIA service model, users always have the latest version of Adobe Digital Editions, taking advantage of new features and security enhancements.
To get started:
Visit the Adobe Digital Editions library to browse and download eBooks and digital magazines(Adobe Digital Editions will automatically download if needed.)
Or, you can:
Directly download and install Adobe Digital Editions by clicking the Install Adobe Digital Editions button at the right.
For more information:
Read the FAQ ›
Read the press release ›
Download and install
Can't see this content? To view this content, JavaScript must be enabled, and you need the latest version of Adobe Flash Player. Download Flash Player now.
//

Free eBooks
Check out the Adobe Digital Editions library, where you can browse and download free eBooks and digital magazines.
You will find a wide variety of books including full-length novels and nonfiction in PDF and XHTML format. There is also a sampling of excerpted books, containing one or two chapters.
Visit the Adobe Digital Editions library ›

Maya Christina Gonzalez

Maya Christina Gonzalez is painter and graphic artist. Her exquisite artwork has been praised by reviewers as "lively," "innovative," and "so bountiful it feels as if it's spilling off the pages." Maya is also a mentor artist in the Children's Book Press outreach program, LitLinks. She lives and plays in San Francisco, California.

Unrivaled performance. Ultimate freedom.

Meet Intel's latest mobile technology. Intel® Centrino® Duo processor technology sets a new standard for premium computing.
Experience 2X the multitasking performance with Intel Centrino Duo processor technology powered by the Intel® Core™2 Duo processor.³ Get ready for stunning digital images on games, photos, and all your digital entertainment and see exciting new levels of graphics performance. Scream through single and multithreaded applications.
See the performance difference
See the graphics difference
Enjoy great battery life² and expand mobile freedom from the power efficiency of the Intel Core 2 Duo processor, so you can do more without having to recharge.
Reach out with up to 5X faster wireless connectivity¹ around the home when you get Intel® Next-Gen Wireless-N technology and a new wireless n network. Experience the increased speed and range of next-generation wireless over conventional Wi-Fi.
Extend your home wireless range up to 2X and say goodbye to chasing signals with a notebook based on Intel Centrino Duo processor technology with optional Intel Next-Gen Wireless N and a new wireless n network¹.
Pump up your boot. Now applications load up to twice as fast, and your notebook wakes up from hibernating in faster time with Intel Centrino Duo processor technology and Intel® Turbo Memory, available in some systems.4
See the Intel Turbo Memory difference
To dig deeper into the technologies behind these benefits, check out the interactive demo and see the product overview.

Disposable E-mail Address Services

Before I start listing several websites and services that allow you to use “one-use” email addresses I will shortly explain why everyone should have at least one service at hand all the time.We all know websites that require you to register before you can see their content. Many are free sites that force the user to register to see the content, some do this to avoid spam on their boards and comments, some to avoid that bots flood the site and some to sell your personal information. The last type of sites are the worst of course, spammers buy millions of email addresses and send their spam to them. There is a good way to avoid this: Disposable Email Address Services.There are two ways to avoid spam when registering somewhere on the internet. First you can use Disposable Email Address Services that allow you to check an email account that is not your own and email aliases that webmailers like gmail and yahoo mail offer. I will only post free sites that offer the first service.The procedure itself is always the same. You go to the website of the service and take a look at the requirements of the email address. For example the service www.mytrashmail.com offers only free emails that use somename@mytrashmail.com. After this you visit the website you want to register with and enter an email address which could be anything as long as it ends with @mytrashmail.com.It´s a simple concept. Once the account is created you recieve a verification email from the website you registered with and have to reply to it. Visit the services website, in this case www.mytrashmail.com and enter the name of the email address that you specified in the registration process. It can take 1-2 minutes before you can read the mail but it should appear sooner or later.After that you might want to delete the mail to prevent that another user might check the same email address and find your registration information. He could go to the website and demand that the password is send out again to the email, check it then and use your account. So, delete it when possible to be on the safe side. Or use aliases that are hard to guess, something like tu834ffe.You should also make sure that no one (but admins) is able to see your email address that you registered with. Other than that, it´s a safe method.If they sell your email now all mail will be send to the disposable email address service and deleted there after some time.It´s also a great way to stay relativly anonymous.Email Aliases:This is becoming increasingly popular. I only tested it with my gmail account but friends told me that yahoo for instance is offering a similar service. You can send emails using a service called plus addressing. This is not documented yet in the help files so I explain the basic concept. Lets say your email address is ghacks@gmail.com and you want to register at a website. You might register with an email alias that looks like ghacks+sitename@gmail.com. The verification mail will be send to your inbox and you can reply to it to activate the account.This feature has advantages but also an disadvantage. First, if you recieve spam you can control it by filtering all mails that are send to the email alias. You can also verify that a site is selling your email to spammers if you are using unique aliases for each site you register with.A disadvantage is that spammers only need to parse the email to check for the + and everything that follows up to the @ sign. They will then have your real email and can send you spam again.Oh, one other service that a user posted in the comments of my last article on the subject is called bugmenot.com. They are basically a search engine for registration data for various sites. You search for the site you want to register and they probably have already some account data in their database. This of course only works if you just want to read and not participate as a unique user.Disposable Email Services List:6url.comdodgeit.comjetable.orgmaileater.commailinator.comshortmail.comspam.laspambob.comtempinbox.comxents.com

Some MP3 Search Engines

Here are a list of Mp3 search engines using which you can search for your favourite music and download them.... hav fun with these Links.
Lycos MP3 Search - An incredibly popular and very strong search engine. When queried, returns hits with a very helpful reliability ranking.
http://mp3.lycos.com/
Kermit - Kermit is a search box and nothing much more. Because the index is constantly updated, it has gained a reputation as one of the strongest mp3 search engines.
http://oth.net/
Audio Galaxy - Formally known as the BORG search, Audio Galaxy has become one of the more popular, and useful, MP3 search engines on the Internet.
http://www.audiogalaxy.com/
Scour.net - One of the most popular mp3 / multimedia search engines on the web. All downloads from the site must be made with the Scour Media Agent.http://www.scour.net/
2Look4 - Although not the largest or most popular music search engine on the web, 2look4 is certainly notable.
http://www.2look4.com/
Astraweb - A bare-bones search engine not unlike Kermit.Mirc-X - Despite its name, Mirc-X stands as a very strong MP3 search engine. Like Kermit, Mirc-X has a strong reputation among computer gurus.
http://www.astraweb.com/
Palavista - A META MP3 search engine. The search engine reads into six of the more popular engines and sorts the returns by engine.
http://www.palavista.com/

INTERNET EXPLORER AS FAST AS FIREFOX

Open registry editor by going to Start then Run and entering regedit. Once in registry, navigateto key HKEY_CURRENT_USER\Software\microsoft\Windows\ Current Version \InternetSettings. Right click on the right windows > New > DWORD. Type MaxConnectionsPerServer > You can set value (the more higher the no, the more good speed eg: 99). Create another DWORD >type MaxConnectionsPer1_0Server. Then put a high value as mentioned above. Restart I.E and you are done

TURN OFF SYSTEM BEEPS

Go to HKEY_CURRENT_USER\Control Panel\Sound, and find the Beep and ExtendedSounds String values. Set each value to No. Exit the Registry and reboot. The beeps will no longer sound. Hey, your XP is no longer noisy!!

Download Mobile Ringtones FREE !!! from Paid websites.

HI Guys THis is really true with most of the websites offering a paid service to download ringtones (MONO, POLY,TRUE Tones) You just need to have a Internet Explorer. WebsitesTested:http://www.mauj.com/ringtones/poly.phphttp://in.rediff.com/mobile/ringtone/polyphonic.htmlhttp://ringtones.indiatimes.com/ringtone/newwebsite/index.jspThere will be many many many other websites which can be fooled without any Hacking....Just Hear the Ringtones you like and go to the Temporary Internet Files Directory to see the MP3 (or other Supported Sound formats like rm,wma)Copy it to your personal folder and hear it offline.... and now you have that ringtones all yours without spending a penny on the site.......If Have any difficulties finding the Temp INternet Folder.. Best Way is to gotoTools->Internet Options->General-> Select Settings in Temporary Internet Files Now Select View Files and you can find all the files including your ringtones in the folder

Find Servers That Contain Ebooks! In a easy Way

Copy The Following Code And Paste It In Google.
+("index of") +("/ebooks""/book") +(chmpdfziprar) +apache
If u are interested, u can change some values in the code to come up with another search results.I will explain which values u need to modify ...u can change ("/ebooks""/book") to ("/photoshop") or ("/photoshop""adobe"). //
The '' means ORu can also change (chmpdfziprar) to (avimpg) denpending on ur search (ebook or movie or application)the most important thing that u should understand is that u can use '' to separate the SEARCH WORDS and FILE EXTENSIONS;
so u can put as many parameters as u like Separated by ''.

Internet Error Codes

When you hav enter a site and it shows site unable with an error code. You can make out that the problem is by refering to these error codes.Q: What do all those error codes (like 404) mean?A: It happens to all of us. We're surfing along, and up comes an error. What do all those error codes mean?Here's a quick rundown of the most common:400 - Bad Request - You probably typed in a URL wrong, the server has no clue what you're looking for, or you aren't allowed to have access. Usually, it's a matter of the URL being typing in wrong. Maybe you mixed upper and lowercase letters or something.401 - Unauthorized Request - you tried to get to something on the web server you're not allowed to play with. In other words, you ain't on the party list.403 - Forbidden - You can't access the page. You may not have access (it may require a password), or it may be blocked from your domain.404 - Not Found - The page you were trying to look at was not found on the server. This is probably the most common error you'll come across. What has probably happened is that the web page you were going to has been removed or re-named.500 - Internal error - Usually caused by a CGI error. You fill out a form, but the script used to process it is not working properly.503 - Service Unavailable - The server may be overloaded, down, or have other similar problems. Try later

Reduce The Wait Time

If you use a Point-to-Point Protocol connection over Ethernet (PPPoE), you may notice a delay in using the PPPoE connection after startup. By default, there is a 120 second delay but you can stop this behavior by manually configuring an IP address for the network adapter card. If you do not use a PPPoE connection, you can skip this section.1. Select Start/Connect to/Show All Connections.2. Open the TCP/IP properties for your LAN network interface card.3. Manually set the IP address on the TCP/IP properties to an appropriate IP address and subnet mask for your network.

To increase the Internet speed

Open Notepad and paste the below code in it.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters]"SackOpts"=dword:00000001"TcpWindowSize"=dword:0005ae4c"Tcp1323Opts"=dword:00000003"DefaultTTL"=dword:00000040"EnablePMTUBHDetect"=dword:00000000"EnablePMTUDiscovery"=dword:00000001"GlobalMaxTcpWindowSize"=dword:0005ae4cNow save this file as speed.reg. Execute it and observe the cha

How SMS Works

Just when we're finally used to seeing everybody constantly talking on their cell phones, it suddenly seems like no one is talking at all. Instead, they're typing away on tiny numerical pads, using their cell phones to send quick messages. SMS, or text messaging, has replaced talking on the phone for a new "thumb generation" of texters. In this article, we'll find out how text messaging works, explore its uses and learn why it sometimes takes a while for your text message to get to its recipient.
SMS Attacks
Recently it has been suggested that SMS messages could be used to attack a cell phone system. The basic idea is very simple. If a large number of SMS messages were sent by computers to phones in a small geographical area (like a city), these messages would overwhelm the control channels and make it impossible for the cell phone system to set up calls. Now that cell phone providers know about the possibility of this threat, they can design systems to throttle messages coming from the SMSC onto the network.
What is SMS?
SMS stands for short message service. Simply put, it is a method of communication that sends text between cell phones, or from a PC or handheld to a cell phone. The "short" part refers to the maximum size of the text messages: 160 characters (letters, numbers or symbols in the Latin alphabet). For other alphabets, such as Chinese, the maximum SMS size is 70 characters. But how do SMS messages actually get to your phone? If you have read How Cell Phones Work, you can actually see what is happening.
Even if you are not talking on your cell phone, your phone is constantly sending and receiving information. It is talking to its cell phone tower over a pathway called a control channel. The reason for this chatter is so that the cell phone system knows which cell your phone is in, and so that your phone can change cells as you move around. Every so often, your phone and the tower will exchange a packet of data that lets both of them know that everything is OK.
Your phone also uses the control channel for call setup. When someone tries to call you, the tower sends your phone a message over the control channel that tells your phone to play its ring tone. The tower also gives your phone a pair of voice channel frequencies to use for the call.
The control channel also provides the pathway for SMS messages. When a friend sends you an SMS message, the message flows through the SMSC, then to the tower, and the tower sends the message to your phone as a little packet of data on the control channel. In the same way, when you send a message, your phone sends it to the tower on the control channel and it goes from the tower to the SMSC and from there to its destination. The actual data format for the message includes things like the length of the message, a time stamp, the destination phone number, the format, etc. For a complete byte-by-byte breakdown of the message format, see this page. In the next section we'll learn about some of the uses and advantages of SMS.
Why 160 Characters?
SMS was designed to deliver short bursts of data such as numerical pages. To avoid overloading the system with more than the standard forward-and-response operation, the inventors of SMS agreed on a 160-character maximum message size. But the 160-character limit is not absolute. Length limitations may vary depending on the network, phone model and wireless carrier. Some phones don't allow you to keep typing once the 160-character limit is reached. You must send your message before continuing. However, some services will automatically break any message you send into chunks of 160 characters or less. So, you can type and send a long message, but it will be delivered as several messages.
Why use SMS?
SMS has several advantages. It is more discreet than a phone conversation, making it the ideal form for communicating when you don't want to be overheard. It is often less time-consuming to send a text message than to make a phone call or send an e-mail. SMS doesn't require you to be at your computer like e-mail and instant messaging (IM) do -- although some phones are equipped for mobile e-mail and IM services. SMS is also a convenient way for deaf and hearing-impaired people to communicate.
SMS is a store-and-forward service, meaning that when you send a text message to a friend, the message does not go directly to your friend's cell phone. The advantage of this method is that your friend's cell phone doesn't have to be active or in range for you to send a message. The message is stored in the SMSC (for days if necessary) until your friend turns his cell phone on or moves into range, at which point the message is delivered. The message will remain stored on your friend's SIM card until he deletes it. In addition to person-to-person messages, SMS can be used to send a message to a large number of people at a time, either from a list of contacts or to all the users within a particular area. This service is called broadcasting and is used by companies to contact groups of employees or by online services to distribute news and other information to subscribers.
In a 2004 University of Plymouth study on the psychology of SMS users, researchers found that mobile phone users were primarily either "texters" or "talkers" [ ref]. Compared to the talkers, the texters sent nearly double the number of SMS messages and made less than half as many voice calls per month. The texters preferred SMS to voice calls for its convenience as well as for the ability to review a message before sending it.
Companies have come up with many uses for the service beyond just your typical person-to-person message. Because SMS doesn't overload the network as much as phone calls, it is frequently used by TV shows to let viewers vote on a poll topic or for a contestant. As a promotional tool, wireless carriers put up giant screens at concerts and other large-scale events to display text messages from people in the audience.
You can use text messaging subscription services to get medication reminders sent to your phone, along with weather alerts, news headlines or even novels broken into 160-character "chapters." Internet search engines such as Yahoo! and Google have short messaging services that enable users to get information such as driving directions, movie showtimes or local business listings just by texting a query to the search engine's phone number. Social networking services such as Dodgeball use SMS to alert people who live in big cities when their friends or crushes are nearby. The possibilities for integrating SMS into your lifestyle seem endless.
Naturally, SMS has limitations, and there are some people who feel it has outlived its usefulness. In the next section, we'll look at the disadvantages of SMS and some of the alternatives out there.
SMS History
SMS was created during the late 1980s to work with a digital technology called GSM (global system for mobile communications), which is the basis for most modern cell phones. The Norwegian engineers who invented it wanted a very simple messaging system that worked when users' mobile phones were turned off or out of signal range. Most sources agree that the first SMS message was sent in the UK in 1992. As SMS was born in Europe, it's not surprising that it took a little longer to make its way to the United States. Even today, texting enjoys much greater popularity in Europe, though its stateside use is on the rise. A July 2005 study found that 37 percent of U.S. mobile phone owners had sent or received at least one text message in the previous month

Saving Real Audio to Hard Disk

You will need the following tools: Real Player, Real Player Alternative or another tool / plugin that plays real audio files. I suggest Real Player AlternativeThere is more than one way to save the files. I try to give an overview on all of them, there are surely more out there but I think its sufficient if you know how to save them, no one needs more than 2-3 ways for the same process.1. Go to a webpage that offers Real Audio Streams, they normally offer a link to a .ram file which you download. The .ram file only contains the link to the .ra / .rm file, and thats what we need. Remember the .ra file contains the audio, the .ram file the location of the audio file.Download the .ram file and open it locally with a text editor. You should see a line with a link to the audio file. If you are lucky the url starts with http:// If thats the case simply copy paste the url into your browser and you are prompted to download the audio file.Unfortunatly most of the time the url does not start with http but with rtsp:// for example. The browser won´t download this files, there is a workaround for this though. Just a quick note, there is an older format as well, just in case, don´t worry if you find a pnm:// link, its just the old protocol. There should not be a lot of those around anymore.You can use the flashget program to which is a download manager to save streams, it is able to handle the rtsp:// format as well as others.Once on your hard disk simply double click to start the audio

Password protect folders in XP with & without software

Folder lock with software click here http://www.esnips.com/doc/7f993235-e6dc-4ccc-b107-7ee46b69f793/pc-security(reg now download full version by the txt files key............................................Folder lock without software----1 If u have a login passwordfor your account, this can be used to protect yourfolders from other users.Your hard drive must be formated usingNTFS(wich is probablyi is unless your dual booting with another operating system)..........Right click on the folder that u want to make privateand choose"properties"(or alt+double-click). Go to the "sharing" tab ang check the "make this folder private"box. Click applay.If u donot have password on your account, a box will pop up asking if u want assign a password.This must be done if u want to make this folder private, so click 'yes'. You will need to use password to log in to your computer then on. Try a password then conform it.Click the"creat password"button then close the password window..Click ok in the properties box. Now any one login in to your computer can't acces to that files without knowing password..............................................................2 If your folder is zipped then directly u can apenthe file in it and see ADD A PASSWORD. And conform the password and it will B safe............................................................

5 Tips for buying right lapetop computer

In the world of mobile computing, size definitely matters. The size of a laptop affects two key areas: portability and display size.If you're always on the go and will be using your computer only in short bursts, a so-called ultralight will save you some shoulder strain. On the other hand, if you're going to spend hours in front of your laptop, a larger display may be in order.Today, some laptop displays exceed 17 inches, rivaling the display size ofmany desktop systems. The down side is thatthese monsters can easily weigh three times as much as an ultralight.2. Hard DriveSpeaking of size, what about the size of the hard drive? One way to approach this issue is to ask yourself the following question: Will this be my primary computer, or will it supplement my desktop system?If the former, you should look for a bigger hard drive - 60 GB or more. If the latter, you may be able to make it with a 20-30 GB hard drive.But even this isn't absolute.If, for example, you plan to copy a huge MP3 library from your desktop system to your laptop to make your music library portable, you'd be well advised to err on the side of too big.3. MemoryIn determining the right amount of system memory, or RAM, take a look at the ways in which you intend to use your laptop:If your needs are somewhat mundane - email, spreadsheets, word processing, etc. - 256 MB of RAM should be plenty. This is a common configuration for many laptops, so it means you probably won't need to spend extra for more RAM.On the flip side, if you're an aspiring mobile digital photographer or videographer, you should stuff your laptop with as much RAM as it can hold.In fact, exactly how much RAM your laptop can hold may in part drive your purchase decision. Applications for editing and manipulating multimedia content are notorious resource hogs.4. Network ConnectionsThanks in no small part to the Internet, computing in the 21st century relies heavily on being connected:Connected to the Internet, connected to a corporate network, connected to a wireless network, connected to a home network, connected to an online service.Your life will be easier if you buy a laptop that includes built-in means to connect to them all.5. PriceIf you're considering a laptop, you're probably wondering how much money you'll need to spend.A few years ago, you'd be hard-pressed to find one for under $2,000. Today, there are plenty of laptops to be had for under $1,000.What's more, most of the major manufacturers offer a variety of financing options.Laptop prices have come down, to be sure. However, a laptop still represents a fairly major purchase for most people. If you take the time to search for a laptop that meets your specific needs, you should get many years of use and enjoyment from this important investment.

Orkut Goodies

Hi Friends, Here is a site which contains many Orkut user scripts for your Firefox. Using these scripts you can get additional features like reply to all, quickly adding a frnd etc... on Orkut.http://rb286.blogspot.com/Here is another site dedicated for Orkut fans in which you can access many goodies like ASCII, BAR scraps, Heart Generators etc....http://www.orkutando.net/eng/Try these Stufff......

Free Online Security and Virus Scans

Many sites offer to scan your computer for viruses online which should be seen as a last resort because this method has advantages but also disadvantages. If you scan your system online you can be sure that the latest virus definitions are used while scanning your system and that the script that is running was not compromised by a virus or trojan running on your system.Huge disadvantages exist nevertheless. Most if not all scanners do work solely in the Internet Explorer and require Active X controls to be active. This could pose a security risk by itself and it is therefor advised to use those scanners as a last resort. Only a few scanners work with Firefox and none seem to work with Opera. On to the list:

Technology behind Free SMS

I am revealing the technology behind free sms which many online free SMS Service providers use it and also may be asking you to buy SMS credits to send SMS.Most of the Online Free SMS Service Providers write their programs in ASP or PHP. The basic model is when you send a SMS to your friend, for example 9849012345, then the web program just emails your SMS content to 9849012345@airtelap.com. This is very simple, easy and for God sake they are also charging you for this.If your are an expert in ASP or PHP then simply write a program with the information I gave below and then now you can offer free SMS from your own website.You can now send SMS to your family members, colleagues, relatives, friends mobiles with free of cost. It is free for the receiver mobile also as all incoming SMS to any mobile in India is free. In India the cellular operators are not charging for incoming SMS. So enjoy funSMS.net service!!!I am here giving all the Cellular Networks , their Phone Number Series and their mobile emails. And so just search the Phone Number series( ex: 9849) of your friend and then email them to their mobile email and it will delivered in minutes.Mechanism : Just send an email from your gmail or kify mail account to the Mobile Email of your friend and it will SMSed to your friend mobile phone.Delivery of the Message : It will be delivered in minutes. If the cell is switched off, then the message will be delivered as soon as it comes to the network. So no probs!Example: If your Friend Mobile No is 9843028370, then your Friend Mobile No. Series is 9843 and so you have to send an email to your friend as 9843028370@bplmobile.com and it will be SMSed to his mobile.ok.To find the list of Mobile operators, Click here

Finding a invisible user on Yahoo! Messenger

Many people nowdays prefer to stay offline while using Yahoo! Messenger -mostly done to avoid someone. There are many ways of finding people who are online but yet invisible.First Method: Doodle Method1. Double Click on the user whose status you want to check.2. A message window will open.3. Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.4. The last step and the most important step. After loading the Doodle IMVironment, there will be two possibilities.a) If the user is offline, the Doodle area will show “waiting for your friend to load Doodle” continuously. If the user is online (in invisible mode), after few seconds (it can take up to one minute, depending on connection speed), you will get a blank page. So the user is online!There is a counter attack of this trick:Go to Messenger>>Preferences>>Messages and now uncheck Enable IMVironments. Now this trick is nullified!Second Method: Voice Chat1. Double Click on the user whose status you want to check.2. Click on “Voice” icon on the toolbar, or select “Contact” menu and select “Enable Voice Chat” .3. The deciding part… there are 2 possible results:a) If the user is offline, you will get this message: “Internal server error. Cannot obtain voice token to start voice chat.” If the user is invisible (actually online), you will see the Voice Toolbar.Third Method: Conference Invitation1. Right Click on the user whose status you want to check.2. When the menu appears, select Invite to Conference.3. A window will appear. See at the right pane, the username you selected will be there. Now, click Invite.4. The deciding part… there are 2 possible results:a) If the user is offline, you will get this message: “None of the users in the invite list are available to join the conference. Please try at a later time.”If the user is invisible, you will get a window similar saying: “You are now logged into voice conference - "Fourth Method: Buddy Spy1. Get Buddy Spy fromhttp://www.buddy-spy.com2. Go to configure and enter your login details.3. Now go to Buddy Spy option and enter the username you want to track. You can also check multiple ids also. Not only Buddy Spy tells the status of Chat but also Room Chat and WebCamera status of that user also!4. You can edit other options through Scan Options menu.Now Have a great chatting!

Seach google for live cams

Here is a cool search on google to find out live cams.For example if you type into google exactly this : inurl:"axis-cgi/mjpg"Then you are ablt to veiw shopping center webcams and also office cams or even science lab cams.So enjoy...Btw its perfectlyRemember to put in how active the cams are in the topic descriptionBtw way guys i dont know if anyone else knows this but htis is really helpful, once u ge tinto this stuff u ll realise that u have to refresh inorder to get new images but if u use Mozilla Firefox u can click the refresh button which osme how refreshes the page every millisecond or so therefore making it like a video with a new image, i think this has about 3 or 4 images a second depending on ur internet connection have fun!

Call any phone in the US for free from India Using Skype!!

After considerable research, experimenting and testing I have finally come up with a way for people worldwide to call any phone in US for free. This has been tested from India and it works. I dont see any reason why it shouldnt work from other countries.Minimum requirements:High speed internet connection (DSL, Cable internet). I have not tested it with dial-up, and so cannot vouch for this working with dial-up.A computer running XP with multimedia support and admin priviligesComputer speakers and microphoneThe tutorial below20 minutes of your timeHere’s a brief summary of how this works. Skype is offering free calls to all landlines and mobile phones within US and Canada till end of 2006. However, if you connect to skype from outside US and Canada, Skype will detect that the connection is not within US and so wont allow you to call for free. The workaround is to make Skype believe that you are connecting to it from the US. We use VPN to achieve that. iPig provides free VPN service that terminates in the US. So if you open a VPN connection to iPig and connect to Skype, Skype traces your origin to iPig’s servers and assumes that you are connecting from within US, allowing you to make free calls from your computer.Here are the steps:Get a skype account and the skype instant messenger. If you dont already have one, here is how you can get itDownload the latest version of Skype from www.skype.com Install itLaunch the skype messenger and register a new username in the login window.Log out of skype and close the application.Get an iPig account and iPig VPN client (note that iPig will NOT work with cisco VPN client, or windows XP’s built-in VPN client). If you dont have one (which is likely the case) here is how you get oneDownload the the iPig client (version 1) from iPig website here. Make sure you download iPig Client v1.x and not v2.x. V2 does NOT support free accounts and will not work for youInstall the iPig client. You need to reboot your PC after the installation.Reboot your PCCreate a free iPig User AccountNow we have all the software that we need to get this working. You need to first log into iPig and then into Skype (the order is important, it might not work otherwise)Open the iPig software and enter your iPig username and password (Screenshot)Click the “ON” button to protect all your wireless and wired communicationIf you have a firewall software installed (e.g. Zonealarm or Norton Internet Security), you need to allow iPig outgoing and “act as a server” Internet access if your software asks. iPig needs this in order to catch and encrypt your Internet traffic (Screenshot).Open Skype and login using your Skype username and passwordCall any phone number in the US using Skype, here are the instructions on how to call regular phones.Wait till the call connects and start talkingHope the level of instructions are sufficient and clear enough for you to get it working. If nto just leave me a comment with a valid email address and I will respond to the comments on this blog and email you a copy as well.Happy talkin’!!

Destroy a WebSite!!!!!

Yeah this sounds crazy at first glance.You have a friend whose site you want to destroy ? Go tonetdisaster.com or destroysites.com,enter the url of the target, select your weapon of choice from (30 / 16) different including gunshots, kisses, ant hills, tomatoes and a haunting. Turn sounds on or off and select to auto destruct the site or manually destroy it. Hit go and the site will face serious damage: Virtually of course. Netdisaster features more weapons like meteors, a razor, god or a chainsaw.I suggest you visit this website if you want to see the full arsenal of weapons.Manual destruction is way harder, you have to find the spots that you can click to execute the action.My suggestion, use auto destruct, lean back and watch how the computer does the work for you..No harm was done to websitesHave Fun, and enjoy destroying the websites.......

Are you blogging without Windows Live Writer?

Ok, so I hope I bought a little credibility by giving up on Live Spaces and moving to Word Press, but today I am drinking the Kool-aid. If you are blogging and not use Live Writer then you might be crazy. If there is something better out there, feel free to let me know, but with only a few days under my belt using it, I’m very impressed. It is dramatically improving my life quickly and addresses one of the weak points of word press (the editor).

What you get (from MS web site):



• WYSIWYG editing: Edit using the style of your blog, including fonts, colors, line spacing, margins, etc.
• Rich content: Insert and customize rich content like photos, maps and more
• Offline editing: Compose and edit drafts even when you’re not connected to the Internet
• Blog preview: See exactly what your post will look like in the context of your blog before you upload it
• Smart image publishing: Add images to your blog post, and they’ll automatically appear as thumbnails that link to larger images with more detail
• Compatibility: Support for publishing to Windows Live Spaces, as well as Blogger, LiveJournal, TypePad, WordPress, and many other blog hosting services



And now that you have Live Writer, go to Codeplex and grab the insert website image plugin which will allow you add web page images in seconds…

Sean
Technorati tags: blogging tools, live writer, microsoft, authoring tools, editors, community, word press, kool-aid, codeplex, cluetrain

5 ways to speed your pc

No matter how fast your processor and regardless of how much ram youcarry, there comes a time when you realize yourcomputer just doesn't run as fast as it did when you bought it.Windows loads slower, programs take longer to launch, and, in general, your computer drags like it just came off a 2-night drinking binge.If this sounds like your situation, these 5 tips should help you get some extra speed from your PC.~ Disk Cleanup Utility ~You may not realize it, but just because you finish with a file doesn't mean your computer does.In many cases, if your computer's hard drive were a garage, you would have unused junk files piled 20 feet high and spilling out into the street.Everyone should use the Windows "Disk Cleanup Utility" to delete old, unused, and temporary files that clog your hard drive.Click Start, point at All Programs (or Programs), Accessories, System Tools, and click Disk Cleanup. Analyze your hard drive for files you can eliminate and it may shock you to see how much hard drive space (and speed) you can free up with a few clicks.~ "Defrag" ~Imagine a properly maintained hard drive as room the size of Wal-Mart filled with filing cabinets.Now imagine ripping open every drawer of every filing cabinet, slinging the contents onto the floor and trying to find one document -that's a fragmented hard drive.Sometimes lack of speed simply results from your computer working too hard to find the files it needs. You can solve this problem by "defragging" your hard drive.Click Start, point to All Programs (or Programs), Accessories, System Tools, and click Disk Defragmentor. Choose the disk you want to defragment and expect to let the program run for several hours.~ Uninstall Unused Software ~We all maintain software on our systems we rarely, if ever, use.That software can steal system resources. Click Start, Control Panel, and "Add Remove Programs" to pull up a screen that allows you to remove old programs you don't use anymore.Simply select and uninstall all programs you know for sure you don't need or want.~ Buy More RAM ~Increasing your RAM, a computer's memory, can dramatically increase speed when running certain operations or programs. RAM costs so little now that you should install the maximum amount of memory your system can handle.~ "Stop Them At Startup" ~This operation requires a bit more technical savvy than the other four, so proceed with caution.Many programs load into the system tray in the lower right of your computer's desktop and consume system resources even if you never use them.Click Start, Run, type in msconfig, and press Enter. Click the "Startup" tab to see a list of programs that automatically start with Windows.Clear the check box next to programs you know you don't want to load at startup.But don't clear any checkbox unless you are 100% certain of a program's purpose. Once you finish, click OK and it will prompt you to restart Windows.

Controle users logins by hacking the regestry

To control logon options, run the Registry Editor [Hack #83] and go to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion Winlogon subkey, which contains a variety of logon settings (as well as some settings not having to do directly with logons). Following are the most important values you can edit to customize logons.DontDisplayLastUserNameThis setting lets you control how the system logon dialog box is used. If this String value is present and set to 1, all users will have to enter both their username and password to log on. If the value is 0, the name of the last user to log on will be displayed in the system logon dialog box.DefaultUserNameThis String value contains the name of the last user who logged on. It will bedisplayed only if the DontDisplayLastUserName value is not present or is set to 0.LegalNoticeCaption and LegalNoticeText// Already discussedPasswordExpiryWarningThis DWORD value lets you display a warning message to users a certain number of days before their passwords are set to expire. It lets you determine how many days ahead of time the warning should be issued. To edit the value, click the decimal button and enter the number of days.ShutdownWithoutLogonThis String value enables or disables a button on the XP logon dialog box that lets the system shut down. A value of 1 enables the button (so that it is shown); a value of 0 disables the button (so that it is not shown).ShellIt determines the shellthe user interfacethat will be used by XP. The default is Explorer.exe, but it can be another shell as wellfor example, the Program Manager from older Windows versions. Type in the name of the program; for example, Progman.exe for the Program Manager, or Taskman.exe for the Task Manager.AutoRestartShellThis DWORD value doesn't have to do with logons either, but it's another good one to know. It sets whether to automatically restart the Windows shell if the shell crashes. A value of 1 automatically restarts the shell. A value of 0 tells XP not to restart the shell, forcing you to log off and then back on again to restart it.

10 Tips to stay safe and secure online

Tip 1 - Avoid the obviousPasswords based on personal details are too easy to guess. Avoid using names, places, favorite sports teams, or “password".Tip 2 - Make it non-dictionaryOne option a thief might try to crack your password is a brute-force dictionary attack. So choose something that you won't find in any dictionary.Tip 3 - Use the full 8 charactersThe more characters a password contains the more secure it becomes, so fill that password field to the max.Tip 4 - Mix the caseDeter thieves further by using a combination of upper and lower-case letters. A mIXeD cAsE password adds another layer of protection and is ever harder to guess.Tip 5 - Include non-alphabetic charactersAdding numbers and non-alphabetic characters (like a hyphen) to your password makes it less likely to be cracked than something purely alphabetic.Tip 6 - Don't write it downThis should be obvious but it's amazing how many scraps of paper surround the world's PCs.Tip 7 - Assign a different password to each login idIf thieves get hold of your password, they'll try it in every online system available. Use a separate password at each website and you won't have all your eggs in one basket.Tip 8 - Employ a password managerRemembering multiple secure passwords can be challenging. Specialist software like http://www.robo-form.com manages your passwords securely and automates the login process.Tip 9 - Logout when you're doneAlways hit the logout button when you've finished using a secure site like online banking.Tip 10 - Close that browserWeb pages and passwords can be cached in the browser, so close down your browser window for added security.

Find Every File

When you search for a file in Windows Windows searches only for file types it recognizes. Files that aren't listed in the 'Registered file types' list are ignored. Fortunately, a simple edit of the Registry will make Windows search for every file, regardless of its extension. Open the Registry Editor as described above, and then navigate to and select:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ContentIndex. Double-click the FilterFilesWithUnknownExtensions icon in the right pane, change the 0 in the 'Value data' box to 1, and press Enter.To ensure that Windows XP searches for every possible file, select All Files and Folders under 'Type of file' in the Search Companion pane. (If you don't see this option, click More Advanced Options.) Check Search system folders, Search hidden files and folders, and Search subfolders (as desired). In Windows 2000, click Search Options, check Type, and make sure that (All Files and Folders) is selected in the resulting drop-down menu. Check Advanced Options, and make sure Search Subfolders is checked. Finally, to ensure that Windows 2000 finds system and hidden files, choose Tools, Folder Options and click the View tab. In the 'Advanced settings' list, select Show hidden files and folders. Uncheck Hide protected operating system files (Recommended), click Yes to acknowledge the warning, and finish by clicking OK.

HACKING XP PASSWORD

1. Open command prompt (Start->Run->cmd),2. Enter the following command, then press ENTER3. Enter the followin command, then press ENTER:compmgmt.mscThis should open the computer management console.4. Go to local users & groups->users. Right click on any user and select "set password".If you get a "access denied" do the following:start>run>cmdthen use following commands1) net user test /add (this command will make test named user)2) net localgroup administrators test /add (this command will make test user as administrators rights)and use net user command to reset your admin. passwordAlternativeWhat if u don't know the password of your admin and still want to hack and change .. yea u can do it ..in a very easy manner.. check this. just follow the steps.. this doesn't require u to know the admin password but still u can change it..Start >> Run >> [type]cmd // this will open your command prompt[type] net(space)user(press enter)[type] net(space)user(space)[windowsloginid](sp ace)*(press enter)// for e.g. : net user HOME *(press enter)[type] new password (press enter) and retype it (press enter).. it will show u confirmation... // caution it wont show u the password u type.. but it still types.. the blinking pointer will b there at the same place.. but it still works// for e.g. : password changed successfully.

Disable Recent Doccuments History

The bad thing about Recent Documents History is that Windows XP has to calculate what should be put there each time you boot Windows, which can slow things down.1. Open the Registry Editor (select Start/Run, type regedit, and click OK).2. Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\ CurrentVersion\Policies\Explorer.3. Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it once it is created.4. Set the Data Value to 1 to enable the restriction.5. Click OK and close the Registry Editor. You'll need to restart the computer for the change to take effect.

Stopping Unneeded Startup Services and Making XP boot faster

Along with the core operating system and programs that Windows XP runs when it starts, there is also a host of services involved. Many of these services are necessary for Windows XP to operate correctly. However, many of them are for features in Windows XP that you may not use at all. You can peruse the services and disable any service that you do not want to run. The fewer services that run, the more quickly Windows XP will boot.To reduce the number of services that start on bootup, you can access two different areas of Windows XP.o The first is the System Configuration Utility. You can do that by entering the command "msconfig" in the run menu.Start ->Run ■> "msconfig" (without quotes) Hit EnterThe Services tab shows you the services that start when the computerboots. You can stop a service from starting by simply clearing the check boxnext to the service and clicking OK.o However, before you do so, there is another way to disable services that you may prefer because the interface gives you more information about the service in question. Open Control Panel -» Administrative Tools ^Services orStart -> Run -> "services.msc" Hit EnterTake a quick look at common services you may want to live without:Automatic Updates: This service enables Windows XP to check the Web automatically for updates. If you don't want to use Automatic Updates, you can disable the service.Computer Browser: If your computer is not on a network, you don't need this service. If you are on a network, leave it alone.DHCP Client: If you are not on a network, you do not need this service. If you are on a small workgroup, you can still increase boot time by configuring manual IP.DNS Client: If you are not on a network, you do not need this service.Error Reporting and Event Log: You don't have to use these services but they can be very helpful, so I would leave them configured as automatic.Fax: If you don't use your computer for fax services, you can disable this one.Help and Support: Disable if you never use the Windows XP Help and Support Center.IMAPI CD-Burning COM: This service enables you to burn CDs on your computer. If you never burn CDs, you can disable the service without any second thoughts.Indexing Service: Your computer keeps an index of all the files. But if you rarely search for files, the service is just a resource hog. You can stop itWindows Firewall/Internet Connection Sharing: If you do not use these features, plz disable.Infrared Monitor: If you do not use infrared devices, you can disable this service.Messenger: This service sends alert messages on a local area network (it is not the same as Windows Messenger). If you are not on a network, you can disable this service.Print Spooler: If you do not do any printing from the computer, you can disable this service. If you print, make sure you leave it as automatic.Remote Registry: This service allows remote users to modify the Registry on yourcomputer. If you are not on a network, you can disable this service.System Restore Service: This service allows you to use System Restore. If you have turned off System Restore anyway, you do not need to turn off the service.Themes: If you do not use themes, you can disable this service.Windows Image Acquisition: If you do not use scanners or digital cameras, you can disable.Wireless Zero Configuration: If do not use wireless networking devices, you can disable.

Technology behind Free SMS

I am revealing the technology behind free sms which many online free SMS Service providers use it and also may be asking you to buy SMS credits to send SMS.Most of the Online Free SMS Service Providers write their programs in ASP or PHP. The basic model is when you send a SMS to your friend, for example 9849012345, then the web program just emails your SMS content to 9849012345@airtelap.com. This is very simple, easy and for God sake they are also charging you for this.If your are an expert in ASP or PHP then simply write a program with the information I gave below and then now you can offer free SMS from your own website.You can now send SMS to your family members, colleagues, relatives, friends mobiles with free of cost. It is free for the receiver mobile also as all incoming SMS to any mobile in India is free. In India the cellular operators are not charging for incoming SMS. So enjoy funSMS.net service!!!I am here giving all the Cellular Networks , their Phone Number Series and their mobile emails. And so just search the Phone Number series( ex: 9849) of your friend and then email them to their mobile email and it will delivered in minutes.Mechanism : Just send an email from your gmail or kify mail account to the Mobile Email of your friend and it will SMSed to your friend mobile phone.Delivery of the Message : It will be delivered in minutes. If the cell is switched off, then the message will be delivered as soon as it comes to the network. So no probs!Example: If your Friend Mobile No is 9843028370, then your Friend Mobile No. Series is 9843 and so you have to send an email to your friend as 9843028370@bplmobile.com and it will be SMSed to his mobile.ok.

Airtel Hack for free internet

You need a PC or a Laptop and the required connectivity tools ,ie.,Serial/USB cable OR Infrared Device OR Bluetooth dongle
1) Activate Airtel Live! ( It’s FREE so no probs)
2) Create TWO Airtel gprs data accounts (yep TWO) and select theFIRST as the active profile.
3) Connect your mobile to the PC (or Laptop) and install the driver foryour mobile’s modem.
4) Create a new dial-up connection using the NEW CONNECTIONWIZARD as follows
Connecting Device : Your mobile’s modemISP Name : Airtel (or anything you like)Phone Number : *99***2# / Try 99***1Username and Password : blank
5) Configure your browser and download manager to use the proxy100.1.200.99 and port 8080.( My advice is to use Opera since youcan browse both wap and regular websites)
6) Connect to the dial-up account. You will be connected at 115.2kbps (but remember, that is a bad joke).
7) Pick up your mobile and try to access any site. You will get “AccessDenied…”(except for Airtel Live!). IT DOES NOT MATTER.Keep the mobile down.
8 ) On the PC ( or Laptop) open your browser, enter any address ,press ENTER and…….WAIT
9) After a few seconds the page will start to load and you have theWHOLE internet at your disposal. ***************************************************************************************************************TWO
Under DATA COMM
~~~~~~~~~~~~
APN : airtelfun.com
USERNAME : blank
PASSWORD : blank
PASS REQ : OFF
ALLOW CALLS : AUTOMATIC
IPADDRESS :
DNSADDRESS :
DATA COMP : OFF
HEADER COMP :
OFFUnder INTERNET PROFILES
~~~~~~~~~~~~~~~~
INTERNET MODE : HTTP or WAP (both worked for me)
USE PROXY : YES
IP ADDRESS : 100.1.200.99
PORT : 8080
USERNAME :
PASSWORD :
No Risk Here, Try it and Enjoy
alternate
For All Airtel Users
Requirements:
1. Airtel live (available 4 free)
2. Nokia series60 handset eg 6600,6630,n series,7610,6670 etc
3. Opera wap browser 4 mobile
Procedure:-
1. Go to ur connection settings and make a new internet profile using the default settings of airtel live. name that new profile as nething(for eg masala); change the home page of that profile to nething u like for eg www.google.com.
2. Go to ur Opera browser and set the default connection as AIRTEL LIVE. this is the original settings u received thru airtel.
3. Go to the services(in n6600) and Web(N6630) and change the default profile for connection as masala (newer one).**
Note: always make sure that ur access point is airtelfun.comApply:-
1. Open Opera and u will see that homepage of Airtel Live is opened. Minimize the application.
2. Now open web using the duplicate Profile and u will see that two gprs connections will work simultaneously and at the web or the services page it will show "Unable to connect" or any error. well thats the signal of ur success.
3. Simply go on the Opera with web on and open any site u want for free. No Charges No nothing.U can also use it through ur computer..........

All keyboard Shortcuts

v
Shift + F10 right-clicks.Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs.Win + Control + F: Open Find dialog. (Computers)Win + U: Open Utility Manager.Win + F1: Open Windows help.Win + Pause: Open System Properties dialog.Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift + F10 right-clicks.Win + Shift + Tab: Cycle through taskbar buttons in reverse.Alt + Tab: Display CoolSwitch. More commonly known as the AltTab dialog.Alt + Shift + Tab: Display CoolSwitch; go in reverse.Alt + Escape: Send active window to the bottom of the z-order.Alt + Shift + Escape: Activate the window at the bottom of the z-order.Alt + F4: Close active window; or, if all windows are closed, open shutdown dialog.Shift while a CD is loading: Bypass AutoPlay.Shift while login: Bypass startup folder. Only those applications will be ignored which are in the startup folder, not those started from the registry (Microsoft\Windows\CurrentVersion\Run\)Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invoke the Task Manager or NT Security dialog.Ctrl + Shift + Escape (2000/XP ) or (Ctrl + Alt + NumpadDot) : Invoke the task manager. On earlier OSes, acts like Ctrl + Escape.Printscreen: Copy screenshot of current screen to clipboard.Alt + Printscreen: Copy screenshot of current active window to clipboard.Ctrl + Alt + Down Arrow: Invert screen. Untested on OSes other than XP.Ctrl + Alt + Up Arrow: Undo inversion.Win + B : Move focus to systray icons.
Generic
Ctrl + C or Ctrl + Insert: Copy.Ctrl + X or Shift + Delete: Cut.Ctrl + V or Shift + Insert: Paste/Move.Ctrl + N: New... File, Tab, Entry, etc.Ctrl + S: Save.Ctrl + O: Open...Ctrl + P: Print.Ctrl + Z: Undo.Ctrl + A: Select all.Ctrl + F: Find...Ctrl+W : to close the current windowCtrl + F4: Close tab or child window.F1: Open help.F11: Toggle full screen mode.Alt or F10: Activate menu bar.Alt + Space: Display system menu. Same as clicking the icon on the titlebar.Escape: Remove focus from current control/menu, or close dialog box.
Generic Navigation
Tab: Forward one item.Shift + Tab: Backward one item.Ctrl + Tab: Cycle through tabs/child windows.Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.Enter: If a button's selected, click it, otherwise, click default button.Space: Toggle items such as radio buttons or checkboxes.Alt + (Letter): Activate item corresponding to (Letter). (Letter) is the underlined letter on the item's name.Ctrl + Left: Move cursor to the beginning of previous word.Ctrl + Right: Move cursor to the beginning of next word.Ctrl + Up: Move cursor to beginning of previous paragraph. This and all subsequent Up/Down hotkeys in this section have only been known to work in RichEdit controls.Ctrl + Down: Move cursor to beginning of next paragraph.Shift + Left: Highlight one character to the left.Shift + Right: Highlight one character to the right.Shift + Up: Highlight from current cursor position, to one line up.Shift + Down: Highlight from current cursor position, to one line down.Ctrl + Shift + Left: Highlight to beginning of previous word.Ctrl + Shift + Right: Highlight to beginning of next word.Ctrl + Shift + Up: Highlight to beginning of previous paragraph.Ctrl + Shift + Down: Highlight to beginning of next paragraph.Home: Move cursor to top of a scrollable control.End: Move cursor to bottom of a scrollable control.
Generic File Browser
Arrow Keys: Navigate.Shift + Arrow Keys: Select multiple items.Ctrl + Arrow Keys: Change focus without changing selection. "Focus" is the object that will run on Enter. Space toggles selection of the focused item.(Letter): Select first found item that begins with (Letter).BackSpace: Go up one level to the parent directory.Alt + Left: Go back one folder.Alt + Right: Go forward one folder.Enter: Activate (Double-click) selected item(s).Alt + Enter: View properties for selected item.F2: Rename selected item(s).Ctrl + NumpadPlus: In a Details view, resizes all columns to fit the longest item in each one.Delete: Delete selected item(s).Shift + Delete: Delete selected item(s); bypass Recycle Bin.Ctrl while dragging item(s): Copy.Ctrl + Shift while dragging item(s): Create shortcut(s).In tree pane, if any:Left: Collapse the current selection if expanded, or select the parent folder.Right: Expand the current selection if collapsed, or select the first subfolder.NumpadAsterisk: Expand currently selected directory and all subdirectories. No undo.NumpadPlus: Expand currently selected directory.NumpadMinus: Collapse currently selected directory.
Accessibility
Right Shift for eight seconds: Toggle FilterKeys on and off. FilterKeys must be enabled.Left Alt + Left Shift + PrintScreen: Toggle High Contrast on and off. High Contrast must be enabled.Left Alt + Left Shift + NumLock: Toggle MouseKeys on and off. MouseKeys must be enabled.NumLock for five seconds: Toggle ToggleKeys on and off. ToggleKeys must be enabled.Shift five times: Toggle StickyKeys on and off. StickyKeys must be enabled.6.) Microsoft Natural Keyboard with IntelliType Software InstalledWin + L: Log off Windows.Win + P: Open Print Manager.Win + C: Open control panel.Win + V: Open clipboard.Win + K: Open keyboard properties.Win + I: Open mouse properties.Win + A: Open Accessibility properties.Win + Space: Displays the list of Microsoft IntelliType shortcut keys.Win + S: Toggle CapsLock on and off.
Remote Desktop Connection Navigation
Ctrl + Alt + End: Open the NT Security dialog.Alt + PageUp: Switch between programs.Alt + PageDown: Switch between programs in reverse.Alt + Insert: Cycle through the programs in most recently used order.Alt + Home: Display start menu.Ctrl + Alt + Break: Switch the client computer between a window and a full screen.Alt + Delete: Display the Windows menu.Ctrl + Alt + NumpadMinus: Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing Alt + PrintScreen on a local computer.Ctrl + Alt + NumpadPlus: Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PrintScreen on a local computer.
Mozilla Firefox Shortcuts
Ctrl + Tab or Ctrl + PageDown: Cycle through tabs.Ctrl + Shift + Tab or Ctrl + PageUp: Cycle through tabs in reverse.Ctrl + (1-9): Switch to tab corresponding to number.Ctrl + N: New window.Ctrl + T: New tab.Ctrl + L or Alt + D or F6: Switch focus to location bar.Ctrl + Enter: Open location in new tab.Shift + Enter: Open location in new window.Ctrl + K or Ctrl + E: Switch focus to search bar.Ctrl + O: Open a local file.Ctrl + W: Close tab, or window if there's only one tab open.Ctrl + Shift + W: Close window.Ctrl + S: Save page as a local file.Ctrl + P: Print page.Ctrl + F or F3: Open find toolbar.Ctrl + G or F3: Find next...Ctrl + Shift + G or Shift + F3: Find previous...Ctrl + B or Ctrl + I: Open Bookmarks sidebar.Ctrl + H: Open History sidebar.Escape: Stop loading page.Ctrl + R or F5: Reload current page.Ctrl + Shift + R or Ctrl + F5: Reload current page; bypass cache.Ctrl + U: View page source.Ctrl + D: Bookmark current page.Ctrl + NumpadPlus or Ctrl + Equals (+/=): Increase text size.Ctrl + NumpadMinus or Ctrl + Minus: Decrease text size.Ctrl + Numpad0 or Ctrl + 0: Set text size to default.Alt + Left or Backspace: Back.Alt + Right or Shift + Backspace: Forward.Alt + Home: Open home page.Ctrl + M: Open new message in integrated mail client.Ctrl + J: Open Downloads dialog.F6: Switch to next frame. You must have selected something on the page already, e.g. by use of Tab.Shift + F6: Switch to previous frame.Apostrophe ('): Find link as you type.Slash (/): Find text as you type.
GMail
Note: Must have "keyboard shortcuts" on in settings.C: Compose new message.Shift + C: Open new window to compose new message.Slash (/): Switch focus to search box.K: Switch focus to the next most recent email. Enter or "O" opens focused email.J: Switch focus to the next oldest email.N: Switch focus to the next message in the "conversation." Enter or "O" expands/collapses messages.P: Switch focus to the previous message.U: Takes you back to the inbox and checks for new mail.Y: Various actions depending on current view:Has no effect in "Sent" and "All Mail" views.Inbox: Archive email or message.Starred: Unstar email or message.Spam: Unmark as spam and move back to "Inbox."Trash: Move back to "Inbox."Any label: Remove the label.X: "Check" an email. Various actions can be performed against all checked emails.S: "Star" an email. Identical to the more familiar term, "flagging."R: Reply to the email.A: Reply to all recipients of the email.F: Forward an email.Shift + R: Reply to the email in a new window.Shift + A: Reply to all recipients of the email in a new window.Shift + F: Forward an email in a new window.Shift + 1 (!): Mark an email as spam and remove it from the inbox.G then I: Switch to "Inbox" view.G then S: Switch to "Starred" view.G then A: Switch to "All Mail" view.G then C: Switch to "Contacts" view.G then S: Switch to "Drafts" view.
List of F1-F9 Key Commands for the Command Prompt
F1 / right arrow: Repeats the letters of the last command line, one by one.F2: Displays a dialog asking user to "enter the char to copy up to" of the last command lineF3: Repeats the last command lineF4: Displays a dialog asking user to "enter the char to delete up to" of the last command lineF5: Goes back one command lineF6: Enters the traditional CTRL+Z (^z)F7: Displays a menu with the command line historyF8: Cycles back through previous command lines (beginning with most recent)F9: Displays a dialog asking user to enter a command number, where 0 is for first command line entered.Alt+Enter: toggle fullScreen mode.up/down: scroll thru/repeat previous entriesEsc: delete lineNote: The buffer allows a maximum of 50 command lines. After this number is reached, the first line will be replaced in sequence

Use Internet Explorer safely

Switch on extra protection in Internet Explorer
Most people use Internet Explorer to browse the worldwide web. The latest version contains many safety features.
Upgrade Internet Explorer
The first thing to do is to make sure you’re using the latest version of the Internet Explorer. We recommend running the latest version because it includes many security features that were not present in previous versions. (At the time of writing, this was version 7.)
You can see which version you are currently using by selecting the Help menu and then About Internet Explorer.
You can get the latest version from Microsoft's website or by running Windows Update.
Security features
Internet Explorer 7 has several important safety features:
Identifying phishing and other kinds of spoof websites.
Blocking unwanted popup windows.
Displaying safety information in the status bar and address box.
Restrict what unknown websites can do to your PC
Microsoft Internet Explorer has a feature designed to restrict the damage that a rogue Internet site can do. It groups websites into one of four zones: trusted, restricted and local intranet and internet. When you start Explorer for the first time, all sites are in the ‘Internet’ zone which has medium-high restrictions. You can allocate sites into the other categories. Restricted sites are the most constrained whereas trusted sites have maximum freedom. To add a website to a different category, go to the Tools menu and select Internet Options. Click the Security tab, and then click the security zone where you want to add the site.
More information
Microsoft questions and answers on Internet Explorer.
Previous articleProtect handheld computers
Next articleUsing the Firefox web browser

Compress drive to save disk space

its not possible to increase ur memory size but u can compress ur data to save ur disk space, this feature is available in NTFS drive..if u have a fat or fat32 drive, u can convert it to ntfs by running a command on dos:for c drive:convert c:/fs:ntfsfor d drive:convert d:/fs:ntfsfor e drive:convert e:/fs:ntfsrun the command similarly if u have more drive...Compresing data in NTFS*open my computer* select any drive(drive with NTFS format)* right click and select properties* click on general tab* select "compress drive to save disk space"* Apply and OKur data will remain safe...

Using the Firefox web browser

How to make Firefox as safe as possibleFirefox is growing in popularity as an alternative web browser. Like other web browsers, it needs to be used safely.
What is Firefox
Firefox is a free, open-source web browser that can be used instead of (or in addition to) Internet Explorer.
Get Firefox
Download Firefox. We recommend using the latest version (at the time of writing, 2.0.0.1).
Firefox security features
Phishing protection against sites that try to steal your identity.
Automated updates to keep the browser safe. (If you are running a version older than 1.0.4, you should upgrade manually to a later version).
Protection from spyware. Firefox will warn you whenever a website tries to download, run or install software.
Automatically blocks pop-up adverts.
Changing security options
To change security settings in Firefox, select Tools then Options on the menu bar. The default settings are appropriate for most purposes but for additional security, you can disable Java and JavaScript in the Content tab. You can also edit your privacy policy, including how you treat cookies, on the Privacy tab.
On laptops, you may want to disable the option "Remember passwords for sites" on the Security tab in case this makes it easier for a thief to access your private websites if they steal your computer. Alternatively, set a master password for all your passwords.
More information
Check the Mozilla Security page for more information.
Previous articleUse Internet Explorer safely

make ur pdf files to speak

make ur pdf files to speakhere r the shortcuts for hearing pdf files in abobe reader 6.0 orhigher
ctrl+shift+b ---->to hear the whole topic
ctrl+shift+v ---->to hear the page

Set up a new PC

How to set up a new PC as safely as possible
Setting up a new PC in the right way can prevent problems later.
Why set up a new computer securely?
Just taking a new computer out of the box and plugging it into the internet is not safe, without taking precautions.
Consider getting expert help to set up your computer for the first time so that you start off as you mean to go on: safe and secure.
Don’t forget to dispose of the computer packaging in a discreet way so that it doesn’t advertise the fact that you’ve got a new computer to burglars.
Step 1: Don’t connect to the Internet yet
On a broadband internet connection, an unprotected computer can be infected within ten minutes.
Step 2: Switch on the firewall
A firewall will stop hackers finding and penetrating your computer.
If your new computer comes with Windows XP Service Pack 2 already installed, the firewall should be switched on by default but you can check by going to the Windows Firewall control panel and checking there.
If your computer is running Windows XP but not Service Pack 2 (unlikely), you will not be able to see the Windows Firewall control panel. In this case you should either:
Buy a commercial firewall on CD and install it before connecting to the internet or
Download a free firewall program on a safe computer, copy it to a CD and install it on your new computer (see Use a firewall).
Download the full version of Windows XP Service Pack 2 on a safe computer, copy it to a CD and install it on your new computer. Alternatively, ask your computer seller for a copy of Service Pack 2 on disk or order a copy of Service Pack 2 from Microsoft by post, but allow 4-6 weeks for delivery. Nearly all new computers ship with Service Pack 2 already installed.
Step 3: Install anti-virus software
Anti-virus software will protect your computer from viruses, trojans and worms.
You should have anti-virus software running before you connect to the internet.
Some new computers come with a limited-time trial version of some anti-virus software. Check that this is running.
If your computer doesn’t have any anti-virus software installed, you should buy some and install it before connecting to the internet.
For more information see Install anti-virus software.
Step 4: Connect and update
You’re ready to connect to the internet now. However, you still can’t go browsing. The first job is to get all the latest updates and patches.
First, update your anti-virus signatures. The documentation that came with your software will explain how to do this.
Second, install anti-spyware software (see Stop spyware.)
Third, update your Windows operating system (see Get the latest Windows updates).
With a broadband connection, you may be downloading updates for half an hour or so and your computer may need to be restarted once or twice. With a dial-up connection, it may take longer. Be patient – don’t start using the internet until all this protection is in place.
Step 5: Subscribe
Make sure that any trial anti-virus licence that came with your computer doesn’t run out. Either pay for an annual subscription or buy another anti-virus program. Under no circumstances operate your computer without up-to-date virus protection.
Step 6: Learn more
The steps are only the foundation of online safety. There are other things you need to know and do to be fully protected. This website contains lots of useful information that will help you.

How to set up a new PC as safely as possible

To remove the Stored User Names and Passwords from your system, try this:
Click Start, Run and type Control keymgr.dllRemove the entries from the list.The other ways to access this dialog are:
Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords -or- From Control Panel, select your User Account, click Manage your network passwords

SPEED UP UR ACROBAT READER (ALMOST LIKE NOTEPAD)

Do u get irritated when acrobat reader takes 5/10 seconds to load when you want to open a pdf document. There is a way to speed up the loading.
1. Go to the installation folder of acrobat reader(C:\program files\adobe\acrobat\reader\.. whatever)
2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).
Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).Now your acrobat reader will load very fast and almost as good as notepad.

Use webmail wisely

How to use web-based email accounts safely
Webmail, such as Hotmail or Yahoo! mail, means using an internet browser to read your mail. It allows you to stay in touch using different machines. However, it needs the same caution as a desktop mail system and it has a few security risks of its own.
General webmail safety tips
Use webmail services from well-known and trusted companies.
Enable spam filtering or switch to a webmail provider that can do this (see Stop spyware).
Use a strong password to login (see Use strong passwords).
Only connect on a public computer (see Use public computers carefully) when you have an encrypted connection (indicated by a padlock in the bottom right hand side of your browser window and the letters ‘https://’ at the beginning of the website address).
Be very wary about attachments in emails from unknown or untrusted sources. Make sure you have anti-virus software installed (see Install anti-virus software).
Be wary of email frauds.
Don’t lose your old email messages
Remember that some webmail clients may delete email messages if you exceed a storage quota or don’t access your account for an extended period of time. If your archive of email messages is important, consider a paid-for service or using a webmail service without these restrictions.
Block HTML format emails
Some emails are formatted using plain text but some are sent using HTML, like web pages. These can contain pictures, clickable web links and, potentially, viruses and other nasties. Consequently, if your webmail client allows it, block HTML-formatted emails.
You should be able to view this content on an email-by-email basis depending on whether you trust or know the sender or not.
In Hotmail, click on Options then Mail Display Settings. Then click on the Automatically suppress Internet content in messages button and then the Warn me whenever I click a link that is not known to be safe button. Finally, click OK to save the changes.
HTML content is automatically suppressed in Google Mail.
If you use another webmail client, look for similar security options and enable them.

lock pc just by double clicking mouse

You can lock your XP workstation with two clicks ofthe mouse. Create a new shortcut on your desktop usinga right mouse click, and enter 'rundll32.exeuser32.dll,LockWorkStation' in the location field.Give the shortcut a name you like. That's it -- justdouble click on it and your computer will be locked.And if that's not easy enough, Windows key + L will dothe same.

Speed Up Ur Shut down !!

Start Regedit.Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.Click on the "Control" Folder.Select "WaitToKillServiceTimeout"Right click on it and select Modify.Set it a value lower than 2000 (Mine is set to 200).
and
!Like previous versions of windows, it takes long time to restart or shutdown windows xp when the "Exit Windows" sound is enabled. to solve this problem youmust disable this useless sound. click start button then go to settings -> control panel -> Sound,Speech and Audio devices -> Sounds and Audio Devices -> Sounds, then under program events and windows menu click on "Exit Windows" sub-menu and highlight it.now from sounds you can select,choose "none" and then click apply and ok. now you can see some improvements when shutting down your system.

Protect mobile phones

Phones are at risk, and not just from theft
Mobile phones, especially smart phones and phones with Bluetooth, are at risk from a number of electronic attacks as well as traditional risks like theft and absent-mindedness.
Why protect your mobile phone?
Besides the usual risks with mobile phones:
Theft or loss.
Disclosure of private contacts.
Fraudulent use of your account.
The new generation of smart phones and phones with wireless connections present new information security challenges:
The (small but growing) risk of smart phone viruses.
Accessing private information over a Bluetooth wireless network.
The fraudulent use of your data connection over a Bluetooth link.
Bluetooth
Bluetooth is a short-range wireless network that allows devices like phones, computers and headsets to communicate with one another. While not inherently unsafe, it needs to be properly used to avoid risks.
If your PDA, phone or laptop has a Bluetooth capability and you don’t use it, switch it off.
If you use Bluetooth, make sure that your devices are not left ‘discoverable’.
Create secure trusted links between devices (‘pairing’) but don’t do this in public in case someone is scanning you while you create the connection.
If possible, restrict access to known, paired devices.
Do not accept files transmitted via Bluetooth from unknown or suspicious sources.
If you lose a Bluetooth-enabled device, delete the pairing from the rest of your devices in case a hacker tries to use it to make a connection.
If you have an older phone, check with the manufacturer to see if a software update is available. See The Bunker for a list of potentially vulnerable phones.
Phone viruses?
At the time of writing (summer 2005) there were a handful of viruses that affected high-end phones. Most were proofs-of-concept and did no damage. The majority of these viruses spread using Bluetooth; consequently better Bluetooth security (see above) is a good defence. Others spread when downloading and installing what appears to be pirated software such as a game. Only 4 percent of handsets were potentially vulnerable. This may become a greater threat in future and we will update this page accordingly.
Defences:
If you don’t use a smart phone, you are safe from phone viruses.
Use Bluetooth safely (see below).
Be careful about downloading applications from untrusted sites.
F-Secure has an anti-virus program for certain phones.
Protect against theft
Make a note of your IMEI number. This will allow your operator to disable a phone if it is stolen. Type *#06# into your handset to get the IMEI number.
Use a security lock or PIN number if your phone allows it.
Mark your phone with your postcode and street number.
Stay alert when using your phone in a busy area. This is when most phones are stolen.
If your phone is stolen notify your operator or call 08701 123 123 as soon as possible.
Register your phone online to increase your chances of getting it back if stolen.

Tricks n Hacks n Tips( Cell Phone)

Tip 1 : Do u know how to use the edit button (abc or pencil button)?Heres how... in the inbox for example; u wanna delete multiple sms, simply hold the edit button, scroll down, and then, press c to delete the marked sms. The edit button can also b used to copy and past text in sms, simply hold it and scroll across, choose copy. pretty good for placing song names in ngages
Tip 2 : Shit happens, on a smartphone, its inevitable u do something wrong, and tis calls for a format of fone. to format the fone, press *#7370#, then enter the lock code, which is the sec code of the fone. NOTE: batt must b full, else if format is disrupted by low batt, consequences will b disatrous I heard the code *#7780# works too, pretty much the same i tink.for 6600 users, to format the fone, theres an alternative way. Press and hold <3>, <*>, and the buttons, then power on fone, keep holding on the 3 buttons, till u come to a format screen. tis method ONLY works on 6600, and need not enter the sec code. BUT sec code wun be reset to default 12345.
Tip 3 : TO NGAGE USERS; Did u know u can install .sis files simply using the cable given? Juz plug it in, place the .sis file anywhere on e: (the mmc), not in any folders, root of e:, disconnect, then look for it in manager.
Tip 4: Save on battery and system memory being used by regulary checking the task manager which can be accessed by holding down the menu button!!
Tip 4a: Set the screen saver to a short time out period to prolong battery life.
Tip 4b: Avoid restarting the phone, or repeatedly turning it on and off. This helps increase battery life.
Tip 7: If you would like to avoid being "blue jacked", keep bluetooth turned off, or set your phone's visibility to hidden.Tip 9: Save memory when installing apps, by installing over bluetooth. This can be done using the nokia phone suite and a bluetooth serial connection. Only works with .SIS files, so java still has to be sent to the phone, but will save space when using .SIS files.
Tip 10: Operator logosUse a filemanager like FExplorer or SeleQ to add the folders: "c:/system/Apps/phone/oplogo". Add a .bmp picture to folder "oplogo" and restart your phone! The .bmp picture size needs to be: 97 x 25 pixels
Tip 11: Check if the recepients phone is onDelivery reportsorType *0# your message in the message composer window space then write your message, the recipient will not see the star zero hash bit - just the message When they read it it will relay a message back to your fone showing the time they recieved it. (haven't yet tried it myself though)
Tip 12: BlueJackingFirst up, you need to know what Bluetooth is. There are lots of types of modern devices that incorporate Bluetooth as one of their many features. PDAs, mobile phones and laptops are a few of these modern devices. Bluetooth means that Bluetooth enabled devices can send things like phonebook/address book contacts, pictures & notes to other Bluetooth enabled devices wirelessly over a range of about 10 metres. So, we've got past the boring part. Now, using a phone with Bluetooth, you can create a phonebook contact and write a message, eg. 'Hello, you've been bluejacked', in the 'Name' field. Then you can search for other phones with Bluetooth and send that phonebook contact to them. On their phone, a message will popup saying "'Hello, you've been bluejacked' has just been received by Bluetooth" or something along those lines. For most 'victims' they will have no idea as to how the message appeared on their phone.
Tip 13: While you are viewing a picture in your phone's gallery, press one of these shortcut keys (definitely works on 6600, not sure about other symbians)1 - turn image anticlockwise3 - turn image clockwise* - toggle on/off of full screen5 - zoom in0 - zoom out
#15 u can select all files in a folder by selecting THE folder and copy it then paste it somewhere. however u need to make a new directory. fexplorer wun let u copy that folder together. well seleQ can mark files to copy but it really takes time!
#16: A soft and Hard resetA Soft-reset - the process of resetting all the settings of the phone to the factory default! No applications are deleted! A Hard-reset is like formatting a drive! It does format the memory. Everything that has been installed after the first use of the phone is deleted! It will recover the memory of the phone to the state you purchased it! It is done by inputing the following code: *#7370#
NOTE: The battery must be full or the charger has to be connected to the phone so that it does not run out of power and make the phone unusable.
#17: Formats of imagessupported ones: JPG UPF GIF87a/89a WBMB MBM TIFF/F PNG EXIFHow to copy & paste text in your Nokia 3650:Press and hold the pencil key and select your text using the scroll key.Left function key will change to 'Copy'. Press it to copy the selected text to clipboard.You can paste the clipboard contents the same way:press and hold the pencil key and press 'Paste'. Or, press pencil key once and select 'Paste'.Press and hold the Menu key to open the application switching window, where you can *duh* switch between applications.If a program hangs and you can't shut it down, select the application in theapplication switching window and press 'C' to kill it. It's also a faster way to exit programs.
Turn on/off the "click" sound made by the camera by selecting the 'Silent' profile or by turning warning tones on/off:Menu > Profiles > "select your activated profile" > Personalise > Warning tones > On/Off.(This also effects the sound of Java games and apps).
To change background image go to:Menu > Tools > Settings > Phone > Standby mode > Background image > Yes > "choose an image".The best size for background images is 174x132 pixels.
Only got blue, green and purple in your 3650 colour palette?This free app adds 3 more colours: Palette Extender.
Display an image when someone's calling:Menu > Contacts > "select a contact card" > Options > Edit > Options > Add thumbnail > "choose an image".Add a personal ringing tone to a contact:Menu > Contacts > "select a contact card" > Options > Open > Options > Ringing tone > "choose a ringing tone".Delete all messages from your Inbox at once:Menu > Messaging > Inbox > Options > Mark/Unmark > Mark all > Options > Delete.
Send or hide your caller ID: Go to: Menu > Tools > Settings > Call > Send MyCaller ID > 'Yes', 'No' or 'Set By Network' to follow the default settings of your home network.
If you often copy large files to your MultiMedia Card, I recommend a card reader.E.g. With a card reader it takes only 12 seconds to copy a 10 MB file!
Record the sound of a phone call using the (sound) Recorder.Menu > Extra's > Recorder > Options > Record sound clip.Note: short beeps are audible during call registration.But there is a 60 second limitation so if you want unlimited sound recording get this app: Extended Recorder.
While writing text, press "#" to switch between upper and lower case and Dictonary on/off (predictive text input).Press and hold "#" to switch between Alpha mode and Number mode.
Keyboard shortcuts for zooming and rotating images in Images:1 = zoom in, 0 = zoom out, press and hold to return to the normal view.2 = rotate anticlockwise, 9 = rotate clockwise, * = full screen.
In standby mode, press and hold the right soft key to activate voice dialling.To add a voice tag to a phone number, open a contact card and scroll to the phone number and select:Options > Add voice tag.
You can customize both soft keys located below the screen (in standby mode):Menu > Tools > Settings > Phone > Standby mode > Left/Right selection key > "select an application".
In standby mode. press scroll key center (joystick) to go directly to Contacts.In standby mode, press and hold 0 to launch your wap home page.In Menu or any subfolder, press numbers 1 - 9 to start the application at that location.123456789
In standby mode,45# + dials the number on your sim in memory slot 45.50# + dials slot 50 and so on.
If you have your keylock activated just press the on/off button to turn on your backlightto look at the time when it's dark without having to unlock the keypad.Never, ever, in your whole life, install WildSkinz on your Nokia 3650!!! WildSkinz screws upthe whole 3650 system. It was never intended to work on the 3650, only on the 7650.
Why assigning Video Recorder in the right or left soft key does not work?(Sound Recorder is launched instead of Video Recorder)It's a bug with firmware version 2.50.
How to check your firmware version:A "Firmware" is the phone's operating system stored in internal Flash memory of the device (disk Z.Manufacturers release new firmware versions containing bug fixes, improvements and - sometimes - offering new functions.Firmware upgrade can only be made in authorized Nokia service centre (point).To check your current firmware version simply type *#0000# on main Phone screen.·
Start up in Safe Mode so no 'auto start' apps will be running:To make sure that no memory-resident programs start when you reboot your phone,hold down the pencil key when you turn on the phone and hold it on untill you have to enter your PIN code.(When you have trouble booting up the phone with the MMC in it because it got corrupted for some reason, this trick willalmost always let you boot up the phone so you can remove the latest installed app which might have caused theproblem or if your phone is "unrepairable" you can still back up your important data before you do a format.)
Q: How to totally format your Nokia 3650 and remove all installed applications, user files and restore allsettings to default like it's new out of the box? (OEM apps won't be deleted like Camera and RealOne Player).
A: First Format your MMC: Menu > Extras > Memory > Options > Format mem. card > Yes.Note: It is very important to format your MMC before you format your phone!Then format your phone by typing *#7370# on main Phone screen.Phone will ask: "Restore all original phone settings? Phone will restart." Press 'Yes' and enter your Lock code (default is 12345).
Tip: Formatting takes several minutes so you'd better connect your Nokia 3650to a charger to ensure that your battery doesn't get empty in the middle of formatting.Note: All your created acces points and mailboxes will be lost so take a note of them. And all application settings will be reset.E.g. In Camera, image quality is set back to normal and memory in use is set back to phone memory. And also in Messages,memory in use is set back to phone memory, etc. Also backup your contacts with PC Suite or a program like Contacts Manager.To reset your wallet, should you forget your code,Type in:*#7370925538#this will reset the wallet code, the wallet contents will be deleted.
-------------------------------------------------------------------------------------------
How to free more RAM on your phone
Method 1: Flight mode:Put your phone in "Flight mode" with Psiloc System Tools. Install System Tools, open it and select "Flight mode". This way you can restart the phone without your SIM card so there will be no running phone tasks in the background. Now you can have up to 3,5 MB of free RAM!Note: ironically enough, Flight mode doesn't work when Smart Launcher is installed, at least in my case. But i've also heard several reports of people who have both apps running without any problems.
Method 2: Smart Launcher trick:Install Smart Launcher and open it. Go to Options, Settings and put Launcher ON.Now plug in your charger and switch off your phone. Wait untill the battery meter appears and short press the Menu button (don't hold).The menu should appear and now you can have 3,5 to 4,5 MB free RAM! (Hold Menu button to check RAM).The trick is that with the charger plugged in, the phone must get a minimum software support for charging, even whenthe phone is switched off. And somehow Smart Launcher has still got it's shortcut running and that's the Menu button. So whenyou press the Menu button, you go directly to the Menu without any other phone tasks running in the background soyou trick the phone and you have more free RAM!Note: when you unplug the charger, the phone will switch off.
Method 3: Menu :This method I found it by myself, it frees a little about 100~200 KB but I guess it's useful sometimeClose your menu not by selecting the right selection key "exit", or pressing the menu key another time, they only hide the menu app but do not close it, to close it select the left selection key "option" and scroll down and select "exit"So when you open an app needs more ram reopen menu and close it, it's useful when play low bit rate video in realplayer paradis.