Official Google Webmaster Central Blog

Saturday, December 29, 2007

How to start windows programs quickly with Run Command?

How to start windows programs quickly with Run Command?




The run option of Start menu is used to run a program or to open a document directly. If you do not know the exact location of the program or document then click on Start button to open Run and type the programs shortcut name to open it directly.


Click the Start Button & Press R Or GoTo RUN Menu & Press Enter

Run Commands

appwiz.cpl -- Used to run Add/Remove wizard

Calc --Calculator

Cfgwiz32 --ISDN Configuration Wizard

Charmap --Character Map

Chkdisk --Repair damaged files

Cleanmgr --Cleans up hard drives

Clipbrd --Windows Clipboard viewer

Control --Displays Control Panel

Cmd --Opens a new Command Window

Control mouse --Used to control mouse properties


Dcomcnfg --DCOM user security

Debug --Assembly language programming tool

Defrag --Defragmentation tool

Drwatson --Records programs crash & snapshots

Dxdiag --DirectX Diagnostic Utility

Explorer --Windows Explorer



Fontview --Graphical font viewer

Fsmgmt.msc -- Used to open shared folders

Firewall.cpl -- Used to configure windows firewall

Ftp -ftp.exe program

Hostname --Returns Computer's name

Hdwwiz.cpl -- Used to run Add Hardware wizard

Ipconfig --Displays IP configuration for all network adapters

Logoff -- Used to logoff the computer

MMC --Microsoft Management Console

Msconfig --Configuration to edit startup files

Mstsc -- Used to access remote desktop

Mrc -- Malicious Software Removal Tool

Msinfo32 --Microsoft System Information Utility

Nbtstat --Displays stats and current connections using NetBIOS over TCP/IP

Netstat --Displays all active network connections

Nslookup--Returns your local DNS server

Osk ---Used to access on screen keyboard

Perfmon.msc -- Used to configure the performance of Monitor.

Ping --Sends data to a specified host/IP

Powercfg.cpl -- Used to configure power option

Regedit --Registry Editor

Regwiz -- Registration wizard

Sfc /scannow -- System File Checker

Sndrec32 --Sound Recorder

Shutdown -- Used to shutdown the windows

Spider -- Used to open spider solitaire card game

Sfc / scannow -- Used to run system file checker utility.

Sndvol32 --Volume control for soundcard

Sysedit -- Edit system startup files

Taskmgr --Task manager

Telephon.cpl -- Used to configure modem options.

Telnet --Telnet program

Tracert --Traces and displays all paths required to reach an internet host

Winchat -- Used to chat with Microsoft

Wmplayer -- Used to run Windows Media player



Wab -- Used to open Windows address Book.

WinWord -- Used to open Microsoft word

Winipcfg --Displays IP configuration

Winver -- Used to check Windows Version

Wupdmgr --Takes you to Microsoft Windows Update

Write -- Used to open WordPad

regedit -- Registry Editor

Friday, December 21, 2007

How to Configure Windows XP to send and receive Fax?

How to Configure Windows XP to send and receive Fax?

If you are using windows XP, you can use sending and receiving option for fax service built into windows XP. You can enjoy free facilities of fax from your computer, because buying a dedicated fax machine for home or small office may not be a feasible option. Using windows XP based fax services; you can read, save, forward, delete the fax messages. By default fax service is not installed in your windows XP, but if you have windows XP CD, you can install fax feature using Add or Remove Program option.

Follow the gives steps to install fax components:

--> To install this feature, you will need to be logged into your computer with administrative rights.

--> Make sure, you have installed modem driver on your computer before running fax components setup.

--> Now click on Start button and go to System Control Panel then double click on Add or Remove Program.

--> Select the Fax services check box under Add or Remove Windows components.

--> Now click Next to finish the fax installation wizard and close it.
















How to Configure Windows XP to send and receive Fax?

If you are using windows XP, you can use sending and receiving option for fax service built into windows XP. You can enjoy free facilities of fax from your computer, because buying a dedicated fax machine for home or small office may not be a feasible option. Using windows XP based fax services; you can read, save, forward, delete the fax messages. By default fax service is not installed in your windows XP, but if you have windows XP CD, you can install fax feature using Add or Remove Program option.



Follow the gives steps to install fax components:

--> To install this feature, you will need to be logged into your computer with administrative rights.

--> Make sure, you have installed modem driver on your computer before running fax components setup.

--> Now click on Start button and go to System Control Panel then double click on Add or Remove Program.

--> Select the Fax services check box under Add or Remove Windows components.

--> Now click Next to finish the fax installation wizard and close it.

--> After the fax components installed, now configure the fax setting before using it.

--> First click on Start button, go to All Programs> Accessories> Communications then click on Fax Console.

--> Now in fax configuration wizard, type the fax cover page information then click on Next.

--> Select the suitable modem for fax and also enable others send and receive options.

--> Now type the TSID (Transmitting Subscriber Identification) and click Next then type here CSID (Called Subscriber Identification) and again Next.

--> At the end select the printer to be automatically printing the fax and click to finish.

Wednesday, December 19, 2007

Sub Sonic


Hi Friends

This article help you solved out your all problem related to DAL(Database Access Layer), Sub sonic is one of the best Data -Relational Open source software for .NET 3.0 by which you can made persistent application of Database, this software u can save your lot off time from the crude application of Database like insert,delete,update etc...., u can also make join and and operation on your Database Table without write a single query

Subsonic has it's own class library which contain for Application Database Management

You can find more information on : subsonicproject

Tuesday, December 18, 2007

Office 2007 SP1 autoinstalls confuse Vista, XP users

Office 2007 SP1 autoinstalls confuse Vista, XP users
Contrary to earlier statements, some users get massive update automatically


December 13, 2007 (Computerworld) -- Some users have gotten the massive Office 2007 SP1 update automatically, even though Microsoft Corp. said it would not use Windows Automatic Updates (AU) to push out the large upgrade for several months, the company confirmed today.

Anyone running a preview copy of Windows Vista Service Pack 1 (SP1), which was made available to all comers only yesterday, will receive the Office 2007 upgrade automatically. Users of other in-beta Microsoft products, including Windows XP SP3, which is still in limited testing, will also be hit by the Office update, which weighs in at almost 220MB.

"As noted to beta customers, if [they] are running Vista SP1 beta software, as part of the beta program, Office 2007 SP1 on prerelease Windows Vista SP1 will automatically install as planned for this beta program," said Bobbie Harder, a senior program manager with the Windows Server Update Services (WSUS) group.

Others, including Susan Bradley, a writer for the WindowsSecrets newsletter, noticed the automatic download and install of Office 2007 SP1. "I woke up on Wednesday morning to find a notification that a Vista machine had rebooted after being patched," Bradley said in today's issue of the newsletter. "I found, to my surprise, that the new Service Pack 1 for Office 2007, which was released on Tuesday, had been autoinstalled."

Bradley also said that even if users of Vista SP1, Windows XP SP3 or WSUS 3.0 SP3 manually installed Office 2007 SP1, AU later automatically installs -- actually re-installs -- the service pack.

Earlier this week, when Microsoft unveiled the service pack, it said AU would not be used to deliver SP1 for at least three months, and maybe as many as six months. In any case, it promised to give users 30 days' notice before it pushed it out using AU.

While technically true -- Office 2007 SP1 is only shoved to users running a preview operating system -- some Vista users have been confused by the appearance of the service pack in their Windows Update listings this week as they downloaded and applied numerous security patches.

Harder explained what Vista users experience in a blog post today. "On Vista in the Windows Update Control Panel Applet, the Office 2007 SP1 will appear as an available update to download and install, but it will NOT automatically download and install, regardless of the automatic settings," she said.

That's true, countered Bradley, but because the service pack shows on the list and is checked by default, it's easy for users to overlook it, then get slammed with the massive download. "If you are a bit asleep and just blindly approve all of the patches, you get a very large wait while SP1 for Office 2007 is downloaded," she said.

A Computerworld reader reported exactly that. "I received [Office 2007 SP1] last night, Dec. 11, as part of Windows Auto-update," said someone identified as 6monthVistaUser in a comment attached to a story about SP1. "Last night was the largest autoupdate ever (230MB download) filled with 11 updates. One was for IE v7, six were for Vista cumulative patches, one was the Office 2007 Service Pack 1, the other one was for Business Contacts Manager SP 1."

Harder defended the process. "For customers who want the benefits of Office 2007 SP1 now, we have made it available," she said. She also noted that users could choose not to pull in the service pack. "Download and installation of the Office 2007 SP1 via the Vista Windows Update control panel applet requires explicit user interaction, just as with the Microsoft Update site," she said. "Once the list of available updates appears, they can deselect or uncheck the box next to Office 2007 SP1 and choose to download and install other updates, or just close the applet."

The next time Windows Update runs, however, Office 2007 SP1 reappears, again checked by default. To strike it off the list, users must right-click the item in the list and choose "hide update."

Firefox 3.0 beta 2 due by year's end

Firefox 3.0 beta 2 due by year's end
Mozilla sets tentative release for Dec. 21; some bugs get pass to beta 3



December 11, 2007 (Computerworld) -- Mozilla Corp. announced that developers have handed off the second beta of Firefox 3.0 to internal testing and that it will ship the next preview of the open-source browser before the end of the year.

The tentative release date for Beta 2 has been set for Dec. 21, said Mike Beltzner, Mozilla's interface designer, in a posting to a company blog yesterday. "If all goes well during the testing, Firefox 3 Beta 2 will be released on [Dec. 21] in the early afternoon, Pacific Standard Time. You can track our progress on the Firefox 3 Beta 2 Release Checklist," Beltzner said.

Mozilla dropped Beta 1 on users Nov. 20. A day later, Mike Schroepfer, the company's vice president of engineering, said the goal was to get another beta out the door before 2007 ended.

On Friday, Mozilla will hold one of its all-comers test days, where it asks for volunteers to run the beta through a series of stress tests.

Some bugs present in Beta 1, however, have not been fixed in the newest preview, according to messages on the mozilla.dev.planning forum. Last Friday, after the final five bugs that had held up Beta 2's progress were addressed, Schroepfer gave the green light, even though others proposed holding the code until three more problems were fixed.

"Nope, sucks if it is back, but I wouldn't block on it," Schroepfer said, referring to a bug that prevents users from submitting Firefox crash reports from a Windows Vista PC. None of the three bugs had been marked as fixed by Tuesday in Bugzilla, Mozilla's bug tracking database and management tool, but at least two other patches squeezed in under the deadline.

Mozilla will also take steps similar to ones put in place last month to prevent its servers from being overwhelmed as a result of bloggers or reporters linking to its "nightly builds" -- the code that's updated daily and used primarily by developers and testers. A posting to Digg.com before Beta 1 was ready led to a deluge of traffic, prompting Mozilla to redirect users to an explanatory page to keep the nightly server online.

"In order to limit distribution of this not-yet-tested release, anyone who [has] linked to the release candidate download directory will be redirected to this announcement," Beltzner said in his Monday post. "While we appreciate the attention and devotion of our users, we ask them to wait until we have completed testing."

Facebook doesn't budge on Beacon's broad user tracking


December 07, 2007 (IDG News Service) -- Facebook CEO and founder Mark Zuckerberg has profusely apologized for missteps in the design and deployment of the Beacon ad system, but he remains unrepentant about what privacy advocates consider a particularly egregious feature.


Absent from Zuckerberg's mea culpa Wednesday is any indication that Facebook plans to modify the system's ability to indiscriminately track actions of all users on external sites that have implemented Beacon.


While Wednesday's decision to allow Facebook members to completely decline participation in Beacon has been generally welcomed, privacy advocates will likely keep Facebook in their crosshairs until the system's user-tracking mechanism is scaled back.


Announced a month ago as part of what Facebook calls Social Ads, Beacon tracks certain actions of Facebook users on some external sites, such as Blockbuster and Fandango, in order to report those actions back to users' Facebook friends network.


For Facebook, these notices represent what it considers an innovative and ultimately more effective form of online advertising that leverages the deep social connections of its users.


In other words, by being intricately combined with people's social circle via the actions of friends and family, these notices promote products and services in a more organic way than regular online ads, Facebook maintains.


Even critics of Beacon had generally assumed that the ad system limited its non-Facebook tracking and data reporting to Facebook members who were logged onto the site.


However, in the past week, CA security researcher Stefan Berteau stunned many when he reported that Beacon tracks all users in these external sites, including logged-off and former Facebook members and even non-Facebook members, and sends data back to Facebook. He also found that logged-in Facebook users who declined to have their actions broadcast to their friends still had their data sent to Facebook.


Beacon, already denounced for weeks by privacy advocates such as MoveOn.org and the Electronic Privacy Information Center, as well as by concerned Facebook users, has come under renewed attacks as a result of the findings from Berteau's independent research.


Facebook confirmed that this broad user tracking function remains untouched in Beacon, despite the changes announced Wednesday, a spokeswoman said in an e-mail.


"Facebook does not share profile data with Beacon partner sites. The partner site prompts Facebook to check whether a Facebook user has taken a Beacon-qualified action, and passes the action data to Facebook for potential sharing with friends if the user's privacy settings permit it," she wrote.

"This checking process, which operates in a similar fashion to any embedding on a Web page of third-party content like YouTube videos or network advertisements, may collect information on logged-out Facebook users or non-users."


Facebook has said that it deletes the data in all the cases flagged by Berteau; logged-in users who declined the broadcast; logged-off users; former members and non-members.


In his latest note regarding Beacon published yesterday, Berteau, who is senior research engineer at CA Inc.'s Threat Research Group, commends Facebook for the most recent changes, but reminds the company that it needs to go further.


As long as Beacon silently tracks logged-off, former members and non-members, people who use Facebook and the sites affiliated with Beacon face a privacy threat, Berteau wrote.


"The silent transmission of data about actions on third-party Web sites to Facebook poses a serious risk, and must be mitigated by both prominent notice to the user, and a binding commitment on Facebook's part to handle the data properly," Berteau wrote.


If a user has ever checked the option for Facebook to "remember me," which saves the user from having to log onto the site upon every return to it, Facebook can tie his activities on third-party Beacon sites directly to him, even if he's logged off and has opted out of the broadcast, Berteau reported in his first note on Beacon.


If the user has never chosen this option, the information still flows back to Facebook, although without it being tied to his Facebook ID. For non-members, Beacon captures addresses of Web pages visited, IP addresses and the actions taken on the site.


Berteau has said that it's particularly concerning that people aren't informed that data on their activities at these sites is flowing back to Facebook, nor given the option to block that information from being transmitted.


More than 40 Web sites have signed up for Beacon, although not all have implemented the system. Non-Facebook activities that can be broadcast to a user's Facebook friends include purchasing a product, signing up for a service and including an item on a wish list.


In addition to Wednesday's changes, Facebook also modified Beacon last week, prior to Berteau's revelations. In the first set of changes, Facebook responded to complaints that Beacon was too confusing to manage and opt out of. As a result, Facebook made its workings more explicit to Facebook users and simplified the way to stop a broadcast message and opt out of having activities tracked on specific Web sites.

Sunday, December 16, 2007

How to access the sharing data offline?

How to access the sharing data offline?

Access the shared data offline allows you to keep using your shared files, folders and software programs when disconnected from the data server. When you reconnect to your data server, all files will be synchronized to the files on the network.

There are two types of configurations required to set the access shared folders offline available, one for data server and other for client computer.

Configuration on Data Server



First locate the folders that you would like to share or make new folders then share these folders so they can be accessible to any one on the network.

Now right click on that folder and click on the option "Sharing and security".



















A small dialog box will appear with the title "data properties". Under the "Sharing" tab, select the check box "Share this folder on the network" under the "Network sharing and security".





















Now set the share level permissions that you want to give the users on every folder. Enable cache of share folders by click on cache button (by default it will be enabled).




















Configuration on Client Computer

On the client computer, first open My Computer then click on Tools.











In Tools menu bar, click on Folder Options, a window will appear with the title Folder Options.

Under the Offline File tab, check the option Enable Offline File. Here you can choose the synchronization process "Synchronize all offline files when logging on", "Synchronize all offline files before logging off" and others.



















Click on Apply button to save the settings and then Ok button to close this window.

Now sitting on the client computer, try to access the shared folder from the data server.

First Right click on the shared folder and Click on Make available offline.

To synchronizing the offline work from client computer to data server, again open My Computer then click on Tools. Click on Synchronize then click on synchronizing button.




















After that down to data server and then try to access share folders by give the UNC (Universal Naming Convention) path of data server. But it will be accessible weather the server is down or up.

Saturday, December 15, 2007

Mobile Tips and Tricks

Camera Phones and Consumer Tips

While your new camera phone provides you with the flexibility to make a phone call and instantly take and transmit a photo.

For this reason, we recommend the following consumer tips and requests that every camera phone users follows them: Camera phone users should always respect the privacy of others.

1 Users should always respect areas considered private by those who use them, for example: bathrooms, changing rooms, and gym locker rooms.

2 Users should always respect the sensitivity of many office and industrial environments where the viewing of proprietary materials is a concern.

3 Users should respect areas of photographic sensitivity, for example: museums, movie theatres and live performances.

4 Camera phones should not be used to take photos of individuals without their knowledge and consent. Special discretion is advised when using your camera phone to take photos of persons under 18 years of age.

5 Do not use camera phones while operating a motor vehicle. It is also illegal to send messages which would be regarded as harassing, menacing or otherwise offensive.

6 Users should be aware that some organizations ban the use of camera phones in some areas.

Friday, December 14, 2007

Mobile Tips and Tricks

Lost and stolen mobile phones keep it safe & know what to do if you lose it.


If you lose your mobile phone, or have it stolen, not only do you have to deal with the inconvenience of not having your phone, but you could be paying for someone else�s calls!

PREVENTION

Prevention is better than cure.

Reduce your phone�s appeal to thieves and assist in its recovery if it is lost or stolen:

1) Treat your phone as you would any valuable item: Even if you got your handset as a $0 upfront deal�, this does not reflect its true cost. Handsets are expensive - they can cost more than $1000.

--> Be discrete. Keep your mobile on you. Never put it down in a public place or leave it unattended.
--> Switch to vibrate mode in circumstances where a ring tone might attract the attention of a thief.

2) Use your phone�s security features: Your phone has security features which you can use to stop others using your phone for example, you can set a Personal Identification Number (PIN) number which must be entered before anyone can use the phone. Read your handset User Guide to find out what features your phone has and use them. Even if your phone isn�t stolen, someone might be tempted to borrow your phone and make a few expensive calls without your knowledge.

3) Name it: Some form of personal identification on your phone can deter the would-be thief. Consider engraving your initials on your phone and the battery, and � if you have one also including your driver�s license number.

4) Know your IMEI: Every mobile phone has a unique 15-digit electronic serial number, known as the International Mobile Equipment Identity (IMEI) number. Record your phone�s IMEI number and keep it in a safe place in case your phone is lost or stolen. You can check your IMEI number by dialing *#06#.

5) Insurance: Don�t assume your phone is covered in your (or your parent�s) home contents insurance. Check and consider insuring it separately, if necessary. Remember that even if you got the phone for ‘$0 upfront�, this doesn�t mean it was free it means the cost was absorbed in the overall contract price. You may not be able to get a replacement phone for $0 upfront.

LOST OR STOLEN
If your phone is lost or stolen:

6) Notify your network carrier AND the police immediately in the event of loss or theft. Tell them your IMEI number and any other identifying features on your phone (e.g. engraved initials). Your carrier can use this number to block your phone from all networks once you report the phone lost or stolen, making it useless to any thief. Importantly, this also ensures you�re not paying for any calls made by the thief. If the handset is subsequently found, the IMEI block can be easily removed as long as you can prove you�re the original, rightful owner of the phone.

Wednesday, December 12, 2007

NETWORKING TUTORIALS

What is Network?

A network or communication network is a system of interconnected communication devices that can communicate with one another and share information. Therefore computer network can be defined as:

A system in which more than one computers or large number of computers are interconnected together, communicate freely with one another and share information is called computer network.

A network can be internal to an organization or span the world by connecting itself to the internet. In computer network, network operating system is used that controls and co-ordinates the activities of computers that are connected to the network. The example of these operating systems are: windows NT, UNIX, and Novell etc.

Types of Network

Networks are of three types. These are:

Local Area Network (LAN)
Wide Area Network (WAN)
Metropolitan Area Network (MAN)

Local Area Network

A local area network is a network system in which computers are interconnected in a limited geographical area, such as network of computers in college computer laboratory or network of computers in office building etc.

Wide Area Network

A wide area network is a network system that covers a large geographical area such as different cities of country or different countries of the world. In WAN telephone lines, satellites, microwave, fiber optic etc. are used as transmission media.

Metropolitan Area Network

A Metropolitan area Network is a network system that covers area of a single city. Usually, MAN connects more than one LANS in a city or town and covers a smaller geographical area than a WAN. The cable television, telephone companies or local corporations use MAN

Tuesday, December 11, 2007

What is .NET 3.0

The Microsoft .NET Framework 3.0 (formerly WinFX), is the new managed code programming model for Windows. It combines the power of the .NET Framework 2.0 with new technologies for building applications that have visually compelling user experiences, seamless communication across technology boundaries, and the ability to support a wide range of business processes.

see image of community there you can see four section,
WCF- Window Communication Foundation
WF-Workflow foundation
WPF-Window Presentation Foundation
Infocard-Window card scrap

now if we put these four section in one layer on .NER freamwork2.0 then it's come up with new freamwork call .NET Freamwork 3.0

What is WPF?


The Windows Presentation Foundation (or WPF), formerly code named Avalon, is the graphical subsystem feature of the .NET Framework 3.0 (formerly called WinFX)[1] and is directly related to XAML.[2] It is pre-installed in Vista,[3] the latest version of the Microsoft Windows operating system. WPF is also available for installation on Windows XP SP2 and Windows Server 2003. It provides a consistent programming model for building applications and provides a clear separation between the UI and the business logic. A WPF application can be deployed on the desktop or hosted in a web browser. It also enables richer control, design, and development of the visual aspects of Windows programs. It aims to unify a host of application services: user interface, 2D and 3D drawing, fixed and adaptive documents, advanced typography, vector graphics, raster graphics, animation, data binding, audio and video.

Microsoft Silverlight is a web-based subset of WPF. During development it was named WPF/E, which stood for "Windows Presentation Foundation Everywhere". Silverlight is based on XAML and Javascript. The Silverlight subset enables Flash-like web and mobile applications with the exact same code as Windows .NET applications. 3D features are not included, but XPS, vector-based drawing and hardware acceleration are.

What is WCF?

Windows Communication Foundation, sometimes shortened to just WCF, previously codenamed Indigo, is a new communication subsystem to enable applications, in one machine or across multiple machines connected by a network, to communicate. WCF applications can be developed in any language which can target the .NET runtime.

The WCF programming model unifies Web Services, .NET Remoting, Distributed Transactions, and Message Queues into a single Service-oriented programming model for distributed computing. It is intended to provide the rapid application development methodology to the development of web services, with a single API for inter-process communication in a local machine, LAN, or over the Internet. WCF runs in a sandbox and provides the enhanced security model all .NET applications provide.

WCF uses SOAP messages for communication between two processes, thereby making WCF-based applications interoperable with any other process that communicates via SOAP messages. When a WCF process communicates with a non–WCF process, XML-based encoding is used for the SOAP messages but when it communicates with another WCF process, the SOAP messages are encoded in an optimized binary format. Both encodings conform to the data structure of the SOAP format, called Infoset.

Validation JavaScript in Button

script language="javascript"
function validation() {
if(document.getElementById('txtDomainName').value == ''){
alert("Plase Enter value for Dname Name");
document.frmAddPaymentMethod.focus();
return false;
}
if(document.getElementById('txtCurrencyCode').value == ''){
alert("Plase Enter value for Currency Code");
document.frmAddPaymentMethod.txtCurrencyCode.focus();
return false;
}
if(document.getElementById('txtCurrencySymbol').value == ''){
alert("Plase Enter value for Currency Symbol");
document.frmAddPaymentMethod.txtCurrencySymbol.focus();
return false;
}
if(document.getElementById('txtBaseConversionRate').value == ''){
alert("Plase Enter value for Base Conversion Rate");
document.frmAddPaymentMethod.txtBaseConversionRate.focus();
return false;
}
if(document.getElementById('ddlCountry').value == ''){
alert("Plase Select Country");
document.frmAddPaymentMethod.ddlCountry.focus();
return false;
}

if(document.getElementById('ddlLanguage').value == ''){
alert("Please Select Language");
document.frmAddPaymentMethod.ddlLanguage.focus();
return false;
}
return true;
}
/script

*************************************************************************************

Private Sub Page_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load

btnAdd.Attributes.Add("onclick", "return validation();")

If IsPostBack = False Then


End if
End sub

Monday, December 10, 2007

Move the Location of your Temporary Internet files.

When you are browsing your internet, the website you visit placed some temporary files on your computer. The main purpose of temporary files to save your preferences that you specify for future reference. Normally internet temporary files are saved on C drive in windows folder but you can change the location of temporary folder to hide your internet browsing history from others.

If you are using Internet Explorer then follow the given steps to change the location of temporary folder.

1) Open Internet Explorer, click on the Tools then Internet Options.

2) Go to General tab then Settings button under the Temporary Internet Files.

3) Here click on Move folder button then select new location to save Temporary files on different drive or computer.

4) Now restart your computer for this change.

Sunday, December 9, 2007

Hangs up internet dial-up connection

When you are browsing your favorite websites using dial-up internet connection, your incoming calls can create problem with your modem if the call waiting option in your modem sittings is enable. Your modem may be hangs up and disconnects the internet connection frequently. Normally when you disabled the call waiting option in your modem sitting and any body tries to call you, he will get the busy beep during internet connected. You should always disable the call waiting option to avoid modem disconnectivity or hangs up.

1) To disable the call waiting option, first click on Start button, then Network Connections.

2) Here double click on your internet connection and click on Properties button then General.

3) Under General tab select Use Dialing Rules box then click on dialing rules button.

4) Here select My Location then click on Edit button. Under General tab select the option To disable call waiting dial and put any number in next box like *32.

5) At the end click on Ok button and dial your connection again.

You can access the restricted or banned websites with the help of this tip. You may have problems to accessing your favorite’s politics, news, and sex


You can access the restricted or banned websites with the help of this tip. You may have problems to accessing your favorite’s politics, news, and sexy websites in your office and other public places. Some time these websites banned by Government, ISP and may be by your office network administrator. This tip is very useful, if you are using internet particularly in school, college and office.

Follow the given points to access the banned website:

Technique 1: Search the banned website, for example www.smartsharemarket.blogspot.com in Google and yahoo search engine then open the cached copy of that page to access the website. You can get also cache link of that website, if you search in Google with keyword cache:URL name and get cache link to access the website.

Friday, December 7, 2007

Global System for Mobile Communications (GSM)

GSM network is designed by using digital wireless technology. It offers compatible wireless services to all mobile users in all over the world. The basic requirements for GSM are following:

Services

Quality of services and security

Radio frequency utilization

Network

Services: The services, which are provided by the system, should be potable to all Mobile Stations or Mobile Phones so that it can b used in all over the world.

Quality of services and security: The quality of both voice and data services of GSM should be good. The voice data is encoded in digital form by using a modulation technique i.e.Gussian Minimum Shift Keying (GMSK).The security features should be provided by the system to protect the network against unauthorized users.

Radio frequency utilization: The system should use the available band of frequencies (For uplink: 890-915MHz & For downlink: 935-960MHz) efficiently.

Network: Network designers manage the identification and numbering plans while switching and mobility management based upon signaling system i.e. Signaling System Number 7(SS7).

GSM Architecture

The main component groups of GSM architecture are:

Mobile Stations (MSs)

Base Station System (BSS)

Network and Switching Subsystem (NSS)

Mobile Stations (MSs):

The Mobile Station (MS) consist of two operational parts.

Mobile Equipment (ME)

Subscriber Identity Module (SIM)

Mobile Equipment (ME): This is the hard ware used by the subscriber to access the network and it has a unique identity number known as International Mobile Equipment Identity (IMEI).

Subscriber Identity Module (SIM): This is a type of electronic card that is plugs into ME and contains detailed information about the mobile subscriber.

Base Station System (BSS):

BSS is central equipment, which is located at the cell site. It provides the link between MS and NSS. The BSS consists of two operational parts.

Base Transceiver Station (BTS): BTS consists of transmitting and receiving antennas and signaling equipment that provide air interface for a cell to route the call. BTS communicates with the MS.A single BTS can support one or more cells.

Base Station Controller (BSC): All switching functions, which are performed in MSC, are controlled by BSC. It also supports handoff strategies and allocate or release temporary channels for those users whose needed handoff. Several BTSs can be controlled by a single BSC and one MSC can serve many BSCs

Network Switching Subsystem (NSS)

It is the main switching center of GSM network. NSS includes the following:

Mobile Switching Center (MSC): It is the basic unit of NSS, which supports call-switching or routing functions. Its purpose is the same as that of telephone exchange but due to advanced wireless technology, its working is much better than that of exchange. Each MSC provides coverage to a defined geographic area only.

Home Location Register (HLR): For subscriber its a reference data base. Current location of MS, identification numbers and various addresses are maintained in it.

Visitor Location Register (VLR): It’s also a type of database. When an MS moves from home location to a visited location then its location is registered as a visitor in the VLR of visited system and this information is also updated in HLR of MS, by the VLR.

Equipment Identity Register (EIR): Its again a type of database, which contains information about MS equipment and check and identify its international validity of hardware and software to work properly.

Authentication center (AUC): Its a processing center and is normally worked together with HLR.Like HLR its also require to continuously access or update subscribers data. Its main purpose is to provide data security features to authenticate the subscriber.

Thursday, December 6, 2007

Hangs up internet dial-up connection

When you are browsing your favorite websites using dial-up internet connection, your incoming calls can create problem with your modem if the call waiting option in your modem sittings is enable. Your modem may be hangs up and disconnects the internet connection frequently. Normally when you disabled the call waiting option in your modem sitting and any body tries to call you, he will get the busy beep during internet connected. You should always disable the call waiting option to avoid modem disconnectivity or hangs up.

--> To disable the call waiting option, first click on Start button, then Network Connections.

--> Here double click on your internet connection and click on Properties button then General.

--> Under General tab select Use Dialing Rules box then click on dialing rules button.

--> Here select My Location then click on Edit button. Under General tab select the option To disable call waiting dial and put any number in next box like *32.

-- >At the end click on Ok button and dial your connection again.

Monday, December 3, 2007

How to speed up your slow internet connection?

Today a special tip for those who are still using any slow dial-up internet connection due to unavailability of any broadband connection in their area. The Web Accelerator application designed to provide the full acceleration for your routine web sites browsing. With the help of Web Accelerator you can browse your internet 4 to 6 times faster than normal dial-up connection. Basically this services compressing the website text data, images and heavy graphics to open or download this data with high speed.

This technique is more useful for static websites and for email applications but don't accelerate with secure and downloading audio or video files. Some good web accelerator retains your system cache to reuse websites with faster speed and can also block windows pop-up. If you are using FTP sites and downloading any program using dial-up, then web accelerator is not for you. There are various web accelerator software are free available on internet, visit and download it to enjoy your connection.

Saturday, December 1, 2007

Internet Connection Error

Internet Connection Error

Sometime you are browsing the internet and trying to open any website, your e-mail and any FTP sites , but you see different error codes there. You should be familiar with these error codes. You can solve these problems if you are well-known with the meaning of error codes.

Error Codes Meaning

400 : This is bad request error, First check you may be typing wrong URL name and server could not understand your request.

401 : You are trying to open any unauthorized access site or page. Check your username and password if you are trying to open any webpage.

402 : Payment Required Error

403 : You are trying to open any forbidden page and you are blocked by that domain.

404 : Here you are trying to open the webpage that was removed or re-named, also check the URL spelling.

408 : This is time out error. you should send the request with in time that the server set for you.

Friday, November 30, 2007

Decrease the Character in your TextArea

function Count ( text, maxlength ,divdisplay )
{
if ( text.value.length > maxlength )
{
alert( maxlength + ' characters limit. \r Excessive data will be truncated.');
text.value = text.value.substring(0, maxlength);
text.focus();
}document.getElementById(divdisplay).innerHTML = text.value.length;
}

textarea id="txtaboutcorp" rows="5" cols="50" onkeypress="Count(this,10

,'divcounteraboutcorp')" onkeydown="Count(this,10,'divcounteraboutcorp')" onfocusout="Count(this,10,'divcounteraboutcorp')" style="border-style:solid;border-color:Black; border-width:thin;">

textarea

Thursday, November 29, 2007

Multiple Gtalk at a time

1) First Go on Desktop after

2) Right Click of Mouse & Go to in NEW --> Shourt cut


3) then enter following text in textbox

{Copy & Paste in your text box }

"c:\program files\google\google talk\googletalk.exe" /nomutex

Wednesday, November 28, 2007

Windows Tricks

(1). Use a BIOS system password


One of the basic ways of securing your PC is to prevent it from even booting
unless a password is entered. This is achieved by assigning a system
password in the BIOS. Once you enter the BIOS, look for an option that says
"System Password".

Usually, you can either set a BIOS Password, which prevents open access to
the BIOS, or a system password, which allows booting only if a password is
entered. Assign a system password when prompted. Once the password has been
confirmed, you can save your settings and exit the BIOS. Now, when your computer
restarts, you will have to enter the password during booting. This can be your
first line of defence. However, the BIOS password can be reset by someone who
knows his way around the motherboard.



(2). The windows password

If your guest account is enabled in windows 2000 or XP, you may turn it off
so only registered users and Administrator can get into the windows. This
setting can be accessed by going to User Accounts in the Control Panel. This
should take care of most intruders except for the really determined ones who,
given enough time, can boot off a CD or USB drive and copy or read your files.

Colorful Scrap in ORKUT

javascript:cor=new Array('aqua','blue','fuchsia','gold','gray','green','lime','maroon','navy','olive','orange','pink','purple','red','silver','teal','violet','yellow' );var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y

Tuesday, November 27, 2007

Orkut Tips

wαит тσ wяiтє likє тнiร?

wαит тσ wяiтє likє тнiร??????????......

SIMPLE
(1)CLICK σи REPLY

(2)write anything in the box

(3)ραSтє тнє FσLLσWIиG SCяIρт Iи αDDяєรร Bαя(Wнєяє Yσυ WяIтє тнє αDDяєรร σF тнє WєBSIтєร)

(4)нIт єитєя

(5)CLICK σи SυBмIтjavascript:var txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/a/gi,"α");txt.value=txt.value.replace(/p/gi,"ρ");txt.value=txt.value.replace(/N/gi,"и");txt.value=txt.value.replace(/t/gi,"т");txt.value=txt.value.replace(/E/gi,"є");txt.value=txt.value.replace(/u/gi,"υ");txt.value=txt.value.replace(/h/gi,"н");txt.value=txt.value.replace(/s/gi,"ร");txt.value=txt.value.replace(/o/gi,"σ");txt.value=txt.value.replace(/m/gi,"м");txt.value=txt.value.replace(/r/gi,"я");void(0);