If you want a private chat with a friend or client on you Network, you don't need to download any fancy program!
All you need is your friends IP address and Command Prompt.
Firstly, open Notepad and enter:
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
Now save this as "Messenger.bat". Open the .bat file and in Command Prompt you should see:
MESSENGER
User:
After "User" type the IP address of the computer you want to contact.
After this, you should see this:
Message:
Now type in the message you wish to send.
Before you press "Enter" it should look like this:
MESSENGER
User: 56.108.104.107
Message: Hi
Now all you need to do is press "Enter", and start chatting!
Tuesday, April 28, 2009
Make your xp talk ....
Open a text file in notepad and write:
Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg
Save the file with a (*.vbs) extension, it will create a VBScript File.
It will prompt you for a text while opening the file, input the text and press ok it will speak whtaever u type in..........................enjoyyyyyyyyyyyy
Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg
Save the file with a (*.vbs) extension, it will create a VBScript File.
It will prompt you for a text while opening the file, input the text and press ok it will speak whtaever u type in..........................enjoyyyyyyyyyyyy
XP Game secrets.......
FreeCell
Secret 1. - Instant Win
Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.
Secret 2. - Hidden Game Modes
Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.
Hearts
Secret - Show All Cards
Instructions - Edit this registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Hearts and create a new String value named ZB with a Data value of 42. Start Hearts and Press Ctrl + Alt + Shift + F12 to show all the cards.
Minesweeper
Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.
Secret - Stop Timer
Instructions - Launch Minesweeper and start a game so the timer starts counting, then press the Windows Key + D to show the desktop. Now when you select minesweeper from the taskbar you can continue playing with the timer stopped.
Pinball
Secret - Extra Balls
Instructions - Type 1max at the start of a new ball to get extra balls.
Secret - Gravity Well
Instructions - Type gmax at the start of a new game to activate the Gravity Well.
Secret - Instant Promotion
Instructions - Type rmax at the start of a new game to go up in ranks.
Enjoyyyyyyy gaming but do leave ur comments...
Secret 1. - Instant Win
Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.
Secret 2. - Hidden Game Modes
Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.
Hearts
Secret - Show All Cards
Instructions - Edit this registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Hearts and create a new String value named ZB with a Data value of 42. Start Hearts and Press Ctrl + Alt + Shift + F12 to show all the cards.
Minesweeper
Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.
Secret - Stop Timer
Instructions - Launch Minesweeper and start a game so the timer starts counting, then press the Windows Key + D to show the desktop. Now when you select minesweeper from the taskbar you can continue playing with the timer stopped.
Pinball
Secret - Extra Balls
Instructions - Type 1max at the start of a new ball to get extra balls.
Secret - Gravity Well
Instructions - Type gmax at the start of a new game to activate the Gravity Well.
Secret - Instant Promotion
Instructions - Type rmax at the start of a new game to go up in ranks.
Enjoyyyyyyy gaming but do leave ur comments...
Hidden XP programms !!!
Most OF Us Would Know This ................ But dis is A Collection......
Do Comment If U Like IT
Programs :
1. Private Character Editor :
Used for editing fonts,etc.
** start>>Run
** Now, type eudcedit
2. Dr. Watson :
This an inbuilt windows repairing software !
** start>>Run
** Now, type drwtsn32
3. Media Player 5.1 :
Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!
** start>>Run
** Now, type mplay32
4. iExpress :
Used to create SetupsYou can create your own installers !
** start>>Run
** Now, type iexpress
Do Comment If U Like IT
Programs :
1. Private Character Editor :
Used for editing fonts,etc.
** start>>Run
** Now, type eudcedit
2. Dr. Watson :
This an inbuilt windows repairing software !
** start>>Run
** Now, type drwtsn32
3. Media Player 5.1 :
Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!
** start>>Run
** Now, type mplay32
4. iExpress :
Used to create SetupsYou can create your own installers !
** start>>Run
** Now, type iexpress
HOW TO SECURE A PC...
open dos prompt
now you are at
C:\Documents and Settings\dia\
type "attrib"............remove inverted comos
you will get all processes and viruse on you computer
mostly "SHR "files are viruses
but there are also SHR system files , so becareful
so better to check D, e F,G ...drives first
delete command
e.g
you wanna remove Rovman.exe virus from d drice
oped D: in command prompt
attrib........press enter
// list of working process will we open
//if it has ROVMAN.exe file too ,as we know it is a virus
type
attrib -s -h -r ROVMAN.exe...............press enter
then type
del Ravmon.exe
so RAVmon is deleted
now same process for other viruses.
now you are at
C:\Documents and Settings\dia\
type "attrib"............remove inverted comos
you will get all processes and viruse on you computer
mostly "SHR "files are viruses
but there are also SHR system files , so becareful
so better to check D, e F,G ...drives first
delete command
e.g
you wanna remove Rovman.exe virus from d drice
oped D: in command prompt
attrib........press enter
// list of working process will we open
//if it has ROVMAN.exe file too ,as we know it is a virus
type
attrib -s -h -r ROVMAN.exe...............press enter
then type
del Ravmon.exe
so RAVmon is deleted
now same process for other viruses.
Change Your IP in less than 1 min.
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
Warning:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back
reply if u found it knowledgeable coz i need response.....!!
Freak Out.....!!
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
Warning:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back
reply if u found it knowledgeable coz i need response.....!!
Freak Out.....!!
Ten Tips to Keep your Computer Running Smoothly
1. Never, never, turn your computer off with the power switch until Windows has shut down.The one exception to this rule is when your computer locks up and your hard drive is not running (hard drive light is not blinking). In this situation, you can turn the power off without harmful effects to the hard drive. As cutting the power can also result in lost data or Windows files, you should only do this when you have to.
Following this rule will prevent permanent hard drive defects caused by the hard drive heads contacting the surface of the drive disc, and it will prevent a host of Windows problems.Whenever possible, recover from crashes by pressing the Ctrl + Alt + Delete keys at the same time. Press them again to reboot your computer.
2. I highly recommend that you purchase an UPS (uninteruptable power supply) for your computer. This will keep your computer from crashing during power outages, and will protect your computer from low and high voltage occurrences.
An UPS is far superior to a surge protector and will save your computer from almost any type of power disaster. (See #1 above for what happens when your computer crashes.)
3. Backup, backup, backup, any data you cannot afford to lose to at least two separate physical drives. So backup data to external hard drives, Zip disks, CD-RWs etc.
The time to backup is when you create something you can't afford to lose. Don't wait until tomorrow.
4. Run Scan disk and De fragment at least once a month. This will keep your hard drive healthy and prevent crashes. Alternatively, purchase Norton Utilities and use it to keep your hard drive healthy.
5. Never unplug peripherals from the computer when it is powered up. Unplugging with the power on can short out the connector socket or the motherboard.
The only exception to this rule is if you know a peripheral is "hot pluggable". If you do not know what "hot pluggable" means then ignore this exception.
6. Do keep at least 300 MBs of your C: drive free for Windows to use. If you use Windows XP or Vista then you should have 400-600 MBs of free space on your C: drive.
If you do not have enough free space you will choke Windows and it will start dumping data to your hard drive, or it will just get really, really, slow.
Use the ADD/Delete tool in the Windows Control Panel to delete unneeded programs from your drive.
You can also use Clean sweep included in Norton Utilities to clean up your drive. If you do use Clean sweep or another hard drive cleaner, do not delete shared files unless you back them up. The cleaners do a rotten job of knowing if another program uses shared files.
7. Do not let a lot of programs load up when you start your computer. They use valuable memory and Windows Resources (Windows internal workspace).
All programs in your Windows System Tray (in the lower left of your screen) are running on your computer. Close them if you don't need them or run them and configure them not to load when you boot up.
Other programs running in the background can be found by pressing Ctrl + Alt + Delete at the same time.
8. Do use a virus checker regularly. Everyone should use a virus checker. The best type of protection is continuous monitoring from a dedicated anti-virus program like Norton Antivirus.
The second best thing is to use is the free online virus checkers such as Housecall provided by Trend Micro.
9. If you have a high speed Internet connection you need a firewall program. A firewall program keeps those who want to hijack your computer from gaining access to your system. You really do not want someone else running your computer.
I suggest you purchase and run Norton's Personal Firewall program. Your firewall should boot up with your computer to protect it from invasion.
Case in point: When I am online 10 hours or more with my DSL connection, my computer is usually attacked by a hacker at least once.
Do not think you are safe from hackers!! Hackers use search programs to seek out computers at random. Get a firewall program and use it.
10. Keep track of the software disks you receive with your computer and new peripherals. These disks contain valuable software drivers and programs for Windows and are needed when Windows must be reloaded. Keep these disks and your Windows software disks in a safe, dry, place -- you never know when you will need them.
Hopefully these computer maintenance tips will keep you out of trouble. However, if you have problems with your computer, feel free to ask.
Following this rule will prevent permanent hard drive defects caused by the hard drive heads contacting the surface of the drive disc, and it will prevent a host of Windows problems.Whenever possible, recover from crashes by pressing the Ctrl + Alt + Delete keys at the same time. Press them again to reboot your computer.
2. I highly recommend that you purchase an UPS (uninteruptable power supply) for your computer. This will keep your computer from crashing during power outages, and will protect your computer from low and high voltage occurrences.
An UPS is far superior to a surge protector and will save your computer from almost any type of power disaster. (See #1 above for what happens when your computer crashes.)
3. Backup, backup, backup, any data you cannot afford to lose to at least two separate physical drives. So backup data to external hard drives, Zip disks, CD-RWs etc.
The time to backup is when you create something you can't afford to lose. Don't wait until tomorrow.
4. Run Scan disk and De fragment at least once a month. This will keep your hard drive healthy and prevent crashes. Alternatively, purchase Norton Utilities and use it to keep your hard drive healthy.
5. Never unplug peripherals from the computer when it is powered up. Unplugging with the power on can short out the connector socket or the motherboard.
The only exception to this rule is if you know a peripheral is "hot pluggable". If you do not know what "hot pluggable" means then ignore this exception.
6. Do keep at least 300 MBs of your C: drive free for Windows to use. If you use Windows XP or Vista then you should have 400-600 MBs of free space on your C: drive.
If you do not have enough free space you will choke Windows and it will start dumping data to your hard drive, or it will just get really, really, slow.
Use the ADD/Delete tool in the Windows Control Panel to delete unneeded programs from your drive.
You can also use Clean sweep included in Norton Utilities to clean up your drive. If you do use Clean sweep or another hard drive cleaner, do not delete shared files unless you back them up. The cleaners do a rotten job of knowing if another program uses shared files.
7. Do not let a lot of programs load up when you start your computer. They use valuable memory and Windows Resources (Windows internal workspace).
All programs in your Windows System Tray (in the lower left of your screen) are running on your computer. Close them if you don't need them or run them and configure them not to load when you boot up.
Other programs running in the background can be found by pressing Ctrl + Alt + Delete at the same time.
8. Do use a virus checker regularly. Everyone should use a virus checker. The best type of protection is continuous monitoring from a dedicated anti-virus program like Norton Antivirus.
The second best thing is to use is the free online virus checkers such as Housecall provided by Trend Micro.
9. If you have a high speed Internet connection you need a firewall program. A firewall program keeps those who want to hijack your computer from gaining access to your system. You really do not want someone else running your computer.
I suggest you purchase and run Norton's Personal Firewall program. Your firewall should boot up with your computer to protect it from invasion.
Case in point: When I am online 10 hours or more with my DSL connection, my computer is usually attacked by a hacker at least once.
Do not think you are safe from hackers!! Hackers use search programs to seek out computers at random. Get a firewall program and use it.
10. Keep track of the software disks you receive with your computer and new peripherals. These disks contain valuable software drivers and programs for Windows and are needed when Windows must be reloaded. Keep these disks and your Windows software disks in a safe, dry, place -- you never know when you will need them.
Hopefully these computer maintenance tips will keep you out of trouble. However, if you have problems with your computer, feel free to ask.
Computer related terms
1- Assembler
A program that converts symbolically-coded programs into object level, machine code. In an assembler program, unlike a compiler, there is a one-to-one correspondence between human-readable instructions and the machine-language code.
2 - Compiler
A program that translates human-readable programs into a form the computer understands. The input (source code) to the compiler is a description of an algorithm in a problem- oriented language; its output (object code) is an equivalent description of the algorithm in a machine-oriented language
3 - Bandwidth
A piece of the spectrum occupied by some form of signal, where it is television, voice, fax data, etc.. Signals require a certain size and location of bandwidth in order to be transmitted. The higher the bandwidth, the faster the signal transmission, and thus allowing for a more complex signal such as audio or video. Because bandwidth is a limited space, when one user is occupying it, others must wait their turn. Bombarding the Internet with unnecessary information is referred to as "taking up bandwidth."
4 - Batch processing
Originally, a method of organizing work for a computer system, designed to reduce overhead by grouping similar jobs. In one scheme, jobs were collected into batches, each requiring a particular compiler. The compiler was loaded, and the jobs submitted in sequence to the compiler. The term has come to be applied to background processing of jobs not requiring user intervention on multiuser systems.
5 - Broadband
A communications medium on which multiple signals are simultaneously transmitted at different frequencies. Also refers to switching capability implemented on this medium that allows communication between devices connected to it. In telecommunications it is defined as any channel with a bandwidth greater than voice grade (4 KHz).
6- Debug
To detect, trace and eliminate errors in computer programs.
7 - Ethernet
A local area network originally developed by Xerox for linking personal computers. Later adapted by DEC and Intel as well and subsequently adopted as an international standard called 802.3. It transmits data at 10 megabits per second. All computers on a network were originally connected to a coaxial cable up to one kilometer. Each computer monitors all transmissions, looking for packets containing its identifier as the destination. Only one signal may be present on the channel at a time and no single computer controls transmissions. Several upper layer protocols, such as DECnet and TCP/IP use Ethernet as an underlying transport mechanism. Ethernet is to be contrasted with other data link protocols such as token ring, DDCMP or SDLC. Uses CSMA/CD.
8 - Fiber optics
A high speed channel for transmitting data. Made of high-purity glass sealed within an opaque tube. Much faster than conventional copper wire such as coaxial cable.
9 - FAQ
Frequently Asked Questions. A collection of information on the basics of any given subject. Often put together and archived on a server so that people don't waste bandwidth asking simple questions.
10 - FTP
File Transfer Protocol. A program that allows for file transfers over the Internet.
11 - Hardwired
Circuits that are permanently interconnected to perform a specific function, as distinct from circuits addressed by software in a program and, therefore, capable of performing a variety of functions, albeit more slowly. Also used to describe a non-switched connection between devices.
12 - Hierarchical file
A hierarchical file is one that contains information collected on multiple units of analysis where each unit of analysis is subordinate to another unit. For example, if the physical housing structure is one unit, and individual persons within the structure is another unit, the person records are subordinate
13 - Hierarchical file structure
A format for storing hierarchical files . Each unit of analysis has its own record structure or record type . Different units of analysis do not necessarily have the same number of bytes or characters as the records for other units of analysis. In order to give such a file a common physical record length , short logical records are typically "padded" with blanks so that they will all be the same physical record length. A hierarchical file can be also be stored in a rectangular file . For instance, the Survey of Income and Program Participation is distributed both ways; users can choose the format they prefer. Typically, the hierarchical file structure is more space-efficient but more difficult to use.
14 - Hub
A device that is a center of network activity because it connects multiple networks together
15 - ISDN
Integrated Services Digital Network. An international communications standard for a common interface to digital networks that allows the integration of voice and data on a common transport mechanism. Proposed by Bellcore for transmission of data, voice and higher-bandwidth technologies over phone lines.
16 - JPEG
Joint Photographic Experts Group. The ISO proposed standard for compression of digital data, especially 24-bit color images. It is lossy in that it reduces the file size at the expense of image quality. PostScript Level 2 color printers are supposed to be able to receive, decompress and print JPEG compressed images. Uses quantization and Huffman encoding.
17 - Modem
Short for MOdulation/DEModulation, it is a device that can convert a digital bit stream into an analog signal (modulation) and can convert incoming analog signals back into digital signals (demodulation). The analog communications channel is typically a telephone line and the analog signals are typically sounds.
18 - Mosaic
An Internet-based, global hypermedia browser that provides a unified interface to the various protocols, data formats, and information archives (i.e. gopher) used on the Internet and enables powerful new ways for discovering, using, viewing, and sharing information. It was developed by NCSA as part of the WWW project.
19 - Ping
Packet Internet Groper. Probably originally contrived to match the submariners term for a sonar pulse.
n. Slang term for a small network message (ICMP ECHO) sent by a computer to check for the presence and aliveness of another.
v. To verify the presence of. To get the attention of.
20 - Router
A device connecting separate networks that forwards a packet from one network to another based only on the network address for the protocol being used. For example, an IP router looks only at the IP network number.
21 - SPARC
Scalable Processor ARChitecture. Trademark of SunMicrosystems 32-bit RISC microprocessor architecture. The architecture is open in the sense that other vendors can obtain the processor chips and documentation sufficient to build computers using it.
22 - SQL
Structured Query Language. ANSI standard data manipulation language used in most relational data base systems. A language for requesting data from a relational database.
23 - URL
Uniform Resource Locater. A scheme used to locate a document accessible over the Internet.
24 - CMOS--- Complementary Metal-Oxide Semiconductor
25 - BIOS--- Basic Input Output System
26 - USB--- Universal Serial Bus
27 - ATM--- Automatic Teller Machine
A program that converts symbolically-coded programs into object level, machine code. In an assembler program, unlike a compiler, there is a one-to-one correspondence between human-readable instructions and the machine-language code.
2 - Compiler
A program that translates human-readable programs into a form the computer understands. The input (source code) to the compiler is a description of an algorithm in a problem- oriented language; its output (object code) is an equivalent description of the algorithm in a machine-oriented language
3 - Bandwidth
A piece of the spectrum occupied by some form of signal, where it is television, voice, fax data, etc.. Signals require a certain size and location of bandwidth in order to be transmitted. The higher the bandwidth, the faster the signal transmission, and thus allowing for a more complex signal such as audio or video. Because bandwidth is a limited space, when one user is occupying it, others must wait their turn. Bombarding the Internet with unnecessary information is referred to as "taking up bandwidth."
4 - Batch processing
Originally, a method of organizing work for a computer system, designed to reduce overhead by grouping similar jobs. In one scheme, jobs were collected into batches, each requiring a particular compiler. The compiler was loaded, and the jobs submitted in sequence to the compiler. The term has come to be applied to background processing of jobs not requiring user intervention on multiuser systems.
5 - Broadband
A communications medium on which multiple signals are simultaneously transmitted at different frequencies. Also refers to switching capability implemented on this medium that allows communication between devices connected to it. In telecommunications it is defined as any channel with a bandwidth greater than voice grade (4 KHz).
6- Debug
To detect, trace and eliminate errors in computer programs.
7 - Ethernet
A local area network originally developed by Xerox for linking personal computers. Later adapted by DEC and Intel as well and subsequently adopted as an international standard called 802.3. It transmits data at 10 megabits per second. All computers on a network were originally connected to a coaxial cable up to one kilometer. Each computer monitors all transmissions, looking for packets containing its identifier as the destination. Only one signal may be present on the channel at a time and no single computer controls transmissions. Several upper layer protocols, such as DECnet and TCP/IP use Ethernet as an underlying transport mechanism. Ethernet is to be contrasted with other data link protocols such as token ring, DDCMP or SDLC. Uses CSMA/CD.
8 - Fiber optics
A high speed channel for transmitting data. Made of high-purity glass sealed within an opaque tube. Much faster than conventional copper wire such as coaxial cable.
9 - FAQ
Frequently Asked Questions. A collection of information on the basics of any given subject. Often put together and archived on a server so that people don't waste bandwidth asking simple questions.
10 - FTP
File Transfer Protocol. A program that allows for file transfers over the Internet.
11 - Hardwired
Circuits that are permanently interconnected to perform a specific function, as distinct from circuits addressed by software in a program and, therefore, capable of performing a variety of functions, albeit more slowly. Also used to describe a non-switched connection between devices.
12 - Hierarchical file
A hierarchical file is one that contains information collected on multiple units of analysis where each unit of analysis is subordinate to another unit. For example, if the physical housing structure is one unit, and individual persons within the structure is another unit, the person records are subordinate
13 - Hierarchical file structure
A format for storing hierarchical files . Each unit of analysis has its own record structure or record type . Different units of analysis do not necessarily have the same number of bytes or characters as the records for other units of analysis. In order to give such a file a common physical record length , short logical records are typically "padded" with blanks so that they will all be the same physical record length. A hierarchical file can be also be stored in a rectangular file . For instance, the Survey of Income and Program Participation is distributed both ways; users can choose the format they prefer. Typically, the hierarchical file structure is more space-efficient but more difficult to use.
14 - Hub
A device that is a center of network activity because it connects multiple networks together
15 - ISDN
Integrated Services Digital Network. An international communications standard for a common interface to digital networks that allows the integration of voice and data on a common transport mechanism. Proposed by Bellcore for transmission of data, voice and higher-bandwidth technologies over phone lines.
16 - JPEG
Joint Photographic Experts Group. The ISO proposed standard for compression of digital data, especially 24-bit color images. It is lossy in that it reduces the file size at the expense of image quality. PostScript Level 2 color printers are supposed to be able to receive, decompress and print JPEG compressed images. Uses quantization and Huffman encoding.
17 - Modem
Short for MOdulation/DEModulation, it is a device that can convert a digital bit stream into an analog signal (modulation) and can convert incoming analog signals back into digital signals (demodulation). The analog communications channel is typically a telephone line and the analog signals are typically sounds.
18 - Mosaic
An Internet-based, global hypermedia browser that provides a unified interface to the various protocols, data formats, and information archives (i.e. gopher) used on the Internet and enables powerful new ways for discovering, using, viewing, and sharing information. It was developed by NCSA as part of the WWW project.
19 - Ping
Packet Internet Groper. Probably originally contrived to match the submariners term for a sonar pulse.
n. Slang term for a small network message (ICMP ECHO) sent by a computer to check for the presence and aliveness of another.
v. To verify the presence of. To get the attention of.
20 - Router
A device connecting separate networks that forwards a packet from one network to another based only on the network address for the protocol being used. For example, an IP router looks only at the IP network number.
21 - SPARC
Scalable Processor ARChitecture. Trademark of SunMicrosystems 32-bit RISC microprocessor architecture. The architecture is open in the sense that other vendors can obtain the processor chips and documentation sufficient to build computers using it.
22 - SQL
Structured Query Language. ANSI standard data manipulation language used in most relational data base systems. A language for requesting data from a relational database.
23 - URL
Uniform Resource Locater. A scheme used to locate a document accessible over the Internet.
24 - CMOS--- Complementary Metal-Oxide Semiconductor
25 - BIOS--- Basic Input Output System
26 - USB--- Universal Serial Bus
27 - ATM--- Automatic Teller Machine
Boost the browser speed
Here's a great tip to speed up your browsing of Windows XP machines. Its actually a fix to a bug installed as default in Windows 2000 that scans shared files for Scheduled Tasks. And it turns out that you can experience a delay as long as 30 seconds when you try to view shared files across a network because Windows 2000 is using the extra time to search the remote computer for any Scheduled Tasks. Note that though the fix is originally intended for only those affected, Windows 2000 users will experience that the actual browsing speed of both the Internet & Windows Explorers improve significantly after applying it since it doesn't search for Scheduled Tasks anymore. Here's how :
Open up the Registry and go to : HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace
Under that branch, select the key :
{D6277990-4C6A-11CF-8D87-00AA0060F5BF}
>and delete it.
This is key that instructs Windows to search for Scheduled Tasks. If you like you may want to export the exact branch so that you can restore the key if necessary.
This fix is so effective that it doesn't require a reboot and you can almost immediately determine yourself how much it speeds up your browsing processes.
Open up the Registry and go to : HKEY_LOCAL_MACHINE/Software/Microsoft/Wi
Under that branch, select the key :
{D6277990-4C6A-11CF-8D87-00AA0060F5BF}
>and delete it.
This is key that instructs Windows to search for Scheduled Tasks. If you like you may want to export the exact branch so that you can restore the key if necessary.
This fix is so effective that it doesn't require a reboot and you can almost immediately determine yourself how much it speeds up your browsing processes.
Labels:
INTERNET,
PC MAINTENANCE,
REGISTRY TRICKS,
WINDOWS TRICKS,
XP TRICKS
Removing virus from usb drive
Common viruses such as ’Ravmon’ , ‘New Folder.exe’, ‘Orkut is banned’ etc are spreading through USB drives. Most anti virus programs are unable to detect them and even if they do, in most cases they are unable to delete the file, only quarantine it. Here are the things which you can do if you want to remove such viruses from your USB Drive
Whenever you plug a USB drive in your system, autorun window will display.
Don’t click on Ok , just choose ‘Cancel’. Open the Command Prompt by typing ‘cmd‘ in the run box. In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.
This will display a list of the files in the pen drive. Check whether the following files are there or not
•Autorun.inf
•Ravmon.exe
•New Folder.exe
•svchost.exe
•Heap41a
•or any other exe file which may be suspicious.
If any of the above files are there, then probably the USB drive is infected. In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. Now just delete the files using the command del filename. example del Ravmon.exe. Delete all the files that are suspicious. To be on a safer side, just scan the USB drive with an anti virus program to check whether it is free of virus or not. Now remove the drive and plug it again. In most of the cases, the real culprit turns out to be the “Autorun.inf” file which mostly gets executed when someone clicks Ok in the dialog window which appears above. Thus the infections can spread.Common viruses such as ’Ravmon’ , ‘New Folder.exe’, ‘Orkut is banned’ etc are spreading through USB drives. Most anti virus programs are unable to detect them and even if they do, in most cases they are unable to delete the file, only quarantine it. Here are the things which you can do if you want to remove such viruses from your USB Drive
Whenever you plug a USB drive in your system, autorun window will display.
Don’t click on Ok , just choose ‘Cancel’. Open the Command Prompt by typing ‘cmd‘ in the run box. In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.
This will display a list of the files in the pen drive. Check whether the following files are there or not
•Autorun.inf
•Ravmon.exe
•New Folder.exe
•svchost.exe
•Heap41a
•or any other exe file which may be suspicious.
If any of the above files are there, then probably the USB drive is infected. In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. Now just delete the files using the command del filename. example del Ravmon.exe. Delete all the files that are suspicious. To be on a safer side, just scan the USB drive with an anti virus program to check whether it is free of virus or not. Now remove the drive and plug it again. In most of the cases, the real culprit turns out to be the “Autorun.inf” file which mostly gets executed when someone clicks Ok in the dialog window which appears above. Thus the infections can spread.
Whenever you plug a USB drive in your system, autorun window will display.
Don’t click on Ok , just choose ‘Cancel’. Open the Command Prompt by typing ‘cmd‘ in the run box. In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.
This will display a list of the files in the pen drive. Check whether the following files are there or not
•Autorun.inf
•Ravmon.exe
•New Folder.exe
•svchost.exe
•Heap41a
•or any other exe file which may be suspicious.
If any of the above files are there, then probably the USB drive is infected. In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. Now just delete the files using the command del filename. example del Ravmon.exe. Delete all the files that are suspicious. To be on a safer side, just scan the USB drive with an anti virus program to check whether it is free of virus or not. Now remove the drive and plug it again. In most of the cases, the real culprit turns out to be the “Autorun.inf” file which mostly gets executed when someone clicks Ok in the dialog window which appears above. Thus the infections can spread.Common viruses such as ’Ravmon’ , ‘New Folder.exe’, ‘Orkut is banned’ etc are spreading through USB drives. Most anti virus programs are unable to detect them and even if they do, in most cases they are unable to delete the file, only quarantine it. Here are the things which you can do if you want to remove such viruses from your USB Drive
Whenever you plug a USB drive in your system, autorun window will display.
Don’t click on Ok , just choose ‘Cancel’. Open the Command Prompt by typing ‘cmd‘ in the run box. In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.
This will display a list of the files in the pen drive. Check whether the following files are there or not
•Autorun.inf
•Ravmon.exe
•New Folder.exe
•svchost.exe
•Heap41a
•or any other exe file which may be suspicious.
If any of the above files are there, then probably the USB drive is infected. In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. Now just delete the files using the command del filename. example del Ravmon.exe. Delete all the files that are suspicious. To be on a safer side, just scan the USB drive with an anti virus program to check whether it is free of virus or not. Now remove the drive and plug it again. In most of the cases, the real culprit turns out to be the “Autorun.inf” file which mostly gets executed when someone clicks Ok in the dialog window which appears above. Thus the infections can spread.
Restarting system automaticaly in dumb state
Windows Blue Screen of Death in both of Xp and Vista are the most terrible thing which happens when there is a system failure and machine comes to an halt. The next you do is power down the machine and start it manually. However you can change this to make it restart automatically after the dump is created instead of waiting.
* Right click on My Computer and Click Properties
* Click on settings of System and Recovery.
* Remember this place is you can configure what the system will do when it gets into system failure.
* Just check the check box which says Automatically restart
Now the next time your computer goes for a system failure it will auto restart. But You will have to wait for the dumb to get created. Moreover you can also check for Overwriting the old dump file in case you want to save some space.
* Right click on My Computer and Click Properties
* Click on settings of System and Recovery.
* Remember this place is you can configure what the system will do when it gets into system failure.
* Just check the check box which says Automatically restart
Now the next time your computer goes for a system failure it will auto restart. But You will have to wait for the dumb to get created. Moreover you can also check for Overwriting the old dump file in case you want to save some space.
Change XP password
Here is a technique to change XP password of your friend's login pc without knowing any hint or old passwords:
just open CMD PROMPT and type as shown below
C:/ net user username newpassword <----|
for example...
If your friend's username is Gaurav, and you want to change itz password to Bhatia
Type as shown below:
C:/net user Gaurav Bhatia <====
tats all u have successfully changed ur friendz password to "Bhatia"
If you are the admin of pc then go to CMD prompt and type
"""""control userpasswords2""""""
here you can change the password
just open CMD PROMPT and type as shown below
C:/ net user username newpassword <----|
for example...
If your friend's username is Gaurav, and you want to change itz password to Bhatia
Type as shown below:
C:/net user Gaurav Bhatia <====
tats all u have successfully changed ur friendz password to "Bhatia"
If you are the admin of pc then go to CMD prompt and type
"""""control userpasswords2""""""
here you can change the password
Information about LCD
Lcd means"liquid crystal display"
lcd is mainly divided into 6 parts
1> virtical polarizer
2>vertical conductor
3>liquid crystals>
4>horizontal conductor
5>horizontal polarizer
6>reflective layer
advantages:
1>low cost
2>less power consumption
3>it requires less space coz screen is totaly flat
4>low weight
5>produce littile heat
disadvantages:
1>low quality resolution
2>lower contrast
3>not suitable 4 use in dark envoirment
lcd is mainly divided into 6 parts
1> virtical polarizer
2>vertical conductor
3>liquid crystals>
4>horizontal conductor
5>horizontal polarizer
6>reflective layer
advantages:
1>low cost
2>less power consumption
3>it requires less space coz screen is totaly flat
4>low weight
5>produce littile heat
disadvantages:
1>low quality resolution
2>lower contrast
3>not suitable 4 use in dark envoirment
Hard drive cleanup
Wonder why your computer is getting so slow? One very common reason is your hard drive getting full because of the temporary files it's been saving. The very first and easy thing you can try is to clean up your hard drives. Windows keeps the temporary files within your hard drives, mainly to minimize the access time on the next use. However, these files get added up, and you'd notice your computer gets slower by time. A good practice is to perform a disk cleanup every once in a while to empty out those temporary storages. This normally improves your pc's performance.
The temporary files can be just some text files or images. Yes, images! whenever you visit a website, almost everything you see on the page is downloaded to your local hard drive, stored into the temporary storage as "temporary internet files". You might notice the next time you revisit the same page, the loading speed is somehow faster. This is because Windows reuses the temporary files which it found unchanged comparing to the page content. (no wonder why you've been told to refresh the page?)
Now these files can be large! since a file can be one big file that you downloaded off the internet. Then you've used it and thought you have deleted it... but in many cases, a copy of it is still there, as a temporary file.
Follow the instructions below to perform a disk cleanup for your hard drives, especially the one that has Windows systems files (normally "C" drive).
1. Launch the Disk Cleanup utility by either:
- "Start" >> "Programs" >> "Accessories" >> "System Tools" >> "Disk Cleanup", or:
- "Start" >> "Run", enter "cleanmgr" then press Enter.
2. Select the disk you want to clean up from the drop-down box (i.e. "Local Disk C") and click "OK":
3. Windows will calculate the space on your selected hard drive. This might take a few minutes depending on the size of your hard drive:
4. Once Windows is done with the calculation, Disk Cleanup Utility displays. Here you can select which storages you want to clean up (under "Files to delete"). It doesn't hurt if you select them all when you really need free spaces on your hard drive. Notice the usage size on some of these storages might be huge:
5. Click "OK" after your selections, then click "Yes" on the prompt.
6. Disk Cleanup Utility starts to clean up your hard drive. This might take a while depending on the current usage level on the storage. During the cleanup process, your computer might be very slow, so give it some time. After cleanup your hard disks, perform a disk defragmentation would really help your pc run faster.
The temporary files can be just some text files or images. Yes, images! whenever you visit a website, almost everything you see on the page is downloaded to your local hard drive, stored into the temporary storage as "temporary internet files". You might notice the next time you revisit the same page, the loading speed is somehow faster. This is because Windows reuses the temporary files which it found unchanged comparing to the page content. (no wonder why you've been told to refresh the page?)
Now these files can be large! since a file can be one big file that you downloaded off the internet. Then you've used it and thought you have deleted it... but in many cases, a copy of it is still there, as a temporary file.
Follow the instructions below to perform a disk cleanup for your hard drives, especially the one that has Windows systems files (normally "C" drive).
1. Launch the Disk Cleanup utility by either:
- "Start" >> "Programs" >> "Accessories" >> "System Tools" >> "Disk Cleanup", or:
- "Start" >> "Run", enter "cleanmgr" then press Enter.
2. Select the disk you want to clean up from the drop-down box (i.e. "Local Disk C") and click "OK":
3. Windows will calculate the space on your selected hard drive. This might take a few minutes depending on the size of your hard drive:
4. Once Windows is done with the calculation, Disk Cleanup Utility displays. Here you can select which storages you want to clean up (under "Files to delete"). It doesn't hurt if you select them all when you really need free spaces on your hard drive. Notice the usage size on some of these storages might be huge:
5. Click "OK" after your selections, then click "Yes" on the prompt.
6. Disk Cleanup Utility starts to clean up your hard drive. This might take a while depending on the current usage level on the storage. During the cleanup process, your computer might be very slow, so give it some time. After cleanup your hard disks, perform a disk defragmentation would really help your pc run faster.
INFORMATION ABOUT AUDIO CD AND MP3 CD
Audio CD
An audio CD (Compact Disc Digital Audio) is one that you buy from stores and contains only audio tracks. You can play an audio CD in any CD players, including your car CD player, and your computer CD-ROM. The standard for Audio CDs is called "Red Book".
The audio tracks are uncompressed digital data (essentially WAV). When you look at the contents of an audio CD, you may notice the files are .CDA files. A CDA file simply points to the location of the audio track on the CD. You cannot just copy these CDA files to another location since they are just "pointer" files, contain no audio data. The actual audio data is stored on the CD sectors and cannot be viewable on your computers.
An audio CD normally can hold up to 74 or 80 minutes of audio. So when you create an audio CD from some MP3 files, for example, no matter how big or small your mp3 files are, the CD can only fit in up to 80 minutes of audio.
Pro & Con
Audio CD is a very first generation of digital audio compact disc and because of this, audio CD can be played on any CD players.
However, an audio can only hold up to 80 minutes of audio. This is about 10-15 songs if the average length of the songs are 4-5 minute. Not much at all! if you want to put more songs onto a CD, you'll an MP3 CD.
The frequency response: from 20 Hz to 20 kHz.
Bit rate = 44100 samples/s × 16 bit/sample × 2 channels = 1411.2 kbit/s (more than 10 MB per minute)
Sample values: range from -32768 to +32767.
On the disc, the data are stored in sectors of 2352 bytes each, read at 75 sectors/s.
MP3 CD
An Mp3 ("MPEG-1 Audio Layer 3") file is just like a computer data file. The Mp3 format is audio encoding format, sometimes called "compressed" format. The Mp3 format was invented by a team of European engineers at Philips and became an ISO/IEC standard in 1991.
Late 1990s, the internet users started to encode more and more audio files using the Mp3 format and spread them over the internet. This lead to the creations of many Mp3 player software such as WinAmp, Nullsoft, etc... The Mp3 format became the most popular audio format for computer because of the advantages of it.
You can compress an audio track from 40-50 MB to create an mp3 file of 4-5 MB with the same quality. Well, the quality actually depends on the encoding methods. The low bit-rate would give you a smaller Mp3, but with lower quality.
Pros & Cons
An Mp3 CD can hold up to 700 MB of data/mp3 files. If you have Mp3 files with an average of 4-5 MB each, for example, you can store up to 160 songs on a CD, about 10 times of an Audio CD.
However, not all CD players can play Mp3 CD. More and more CD players are now Mp3 compatible, but not all of them. So you might need to question yourself when you want to create an Mp3 CD; for example, if the target CD player can handle it.
An audio CD (Compact Disc Digital Audio) is one that you buy from stores and contains only audio tracks. You can play an audio CD in any CD players, including your car CD player, and your computer CD-ROM. The standard for Audio CDs is called "Red Book".
The audio tracks are uncompressed digital data (essentially WAV). When you look at the contents of an audio CD, you may notice the files are .CDA files. A CDA file simply points to the location of the audio track on the CD. You cannot just copy these CDA files to another location since they are just "pointer" files, contain no audio data. The actual audio data is stored on the CD sectors and cannot be viewable on your computers.
An audio CD normally can hold up to 74 or 80 minutes of audio. So when you create an audio CD from some MP3 files, for example, no matter how big or small your mp3 files are, the CD can only fit in up to 80 minutes of audio.
Pro & Con
Audio CD is a very first generation of digital audio compact disc and because of this, audio CD can be played on any CD players.
However, an audio can only hold up to 80 minutes of audio. This is about 10-15 songs if the average length of the songs are 4-5 minute. Not much at all! if you want to put more songs onto a CD, you'll an MP3 CD.
The frequency response: from 20 Hz to 20 kHz.
Bit rate = 44100 samples/s × 16 bit/sample × 2 channels = 1411.2 kbit/s (more than 10 MB per minute)
Sample values: range from -32768 to +32767.
On the disc, the data are stored in sectors of 2352 bytes each, read at 75 sectors/s.
MP3 CD
An Mp3 ("MPEG-1 Audio Layer 3") file is just like a computer data file. The Mp3 format is audio encoding format, sometimes called "compressed" format. The Mp3 format was invented by a team of European engineers at Philips and became an ISO/IEC standard in 1991.
Late 1990s, the internet users started to encode more and more audio files using the Mp3 format and spread them over the internet. This lead to the creations of many Mp3 player software such as WinAmp, Nullsoft, etc... The Mp3 format became the most popular audio format for computer because of the advantages of it.
You can compress an audio track from 40-50 MB to create an mp3 file of 4-5 MB with the same quality. Well, the quality actually depends on the encoding methods. The low bit-rate would give you a smaller Mp3, but with lower quality.
Pros & Cons
An Mp3 CD can hold up to 700 MB of data/mp3 files. If you have Mp3 files with an average of 4-5 MB each, for example, you can store up to 160 songs on a CD, about 10 times of an Audio CD.
However, not all CD players can play Mp3 CD. More and more CD players are now Mp3 compatible, but not all of them. So you might need to question yourself when you want to create an Mp3 CD; for example, if the target CD player can handle it.
Information about COMPUTER BIOS
At times a Computers BIOS and its Drivers will need to be updated. This is usually true with older computers because with the arrival of new technology, new standards will arise, and the BIOS and Drivers will need to change in order to understand the new hardware. A driver is a software program that controls a device. Every device like a printer, disk drive or keyboard has a driver.
Whenever you startup a computer, the first thing you see is the BIOS software running. To enter the BIOS setup you will have to press a certain key or combination of keys in the initial startup screen (Esc, Del, Ctrl-Esc, F2, F1, Ctrl-Alt-Esc, ect…). There is usually a command line that shows up. When it does, press the specified key or keys to enter setup. Depending on the BIOS manufacturer you will see a number of options. (Examples: time/date, memory, plug and play, security, power management, boot sequence, drive configuration, exit, ect…) Be cautious when making changes to the setup. Some changes can cause the computer to not boot properly. When you finish you should save your settings and exit. The BIOS should restart your computer and the new settings should take effect.
The BIOS (Basic input/output system) is software that is usually stored on a flash memory chip and is located on the motherboard. What BIOS does is make sure that the CPU, hard drive(s), ports, and other chips in the computer work together. BIOS plays a huge part in starting up a computer. The BIOS provides the CPU with the instructions to start the operating system. A computer might have more than one bios chip. For example: A video card might have its own bios chip installed. The BIOS is in charge of setting up and managing things like the monitor, keyboard, and other ports on the computer especially when the computer system is starting up. Upon starting a computer system, the bios runs a POST (Power on self test) to check all of the hardware components to make sure they are functioning properly.
Whenever you startup a computer, the first thing you see is the BIOS software running. To enter the BIOS setup you will have to press a certain key or combination of keys in the initial startup screen (Esc, Del, Ctrl-Esc, F2, F1, Ctrl-Alt-Esc, ect…). There is usually a command line that shows up. When it does, press the specified key or keys to enter setup. Depending on the BIOS manufacturer you will see a number of options. (Examples: time/date, memory, plug and play, security, power management, boot sequence, drive configuration, exit, ect…) Be cautious when making changes to the setup. Some changes can cause the computer to not boot properly. When you finish you should save your settings and exit. The BIOS should restart your computer and the new settings should take effect.
The BIOS (Basic input/output system) is software that is usually stored on a flash memory chip and is located on the motherboard. What BIOS does is make sure that the CPU, hard drive(s), ports, and other chips in the computer work together. BIOS plays a huge part in starting up a computer. The BIOS provides the CPU with the instructions to start the operating system. A computer might have more than one bios chip. For example: A video card might have its own bios chip installed. The BIOS is in charge of setting up and managing things like the monitor, keyboard, and other ports on the computer especially when the computer system is starting up. Upon starting a computer system, the bios runs a POST (Power on self test) to check all of the hardware components to make sure they are functioning properly.
Information about RAM (RANDOM ACCESS MEMORY)
RAM (Random Access Memory) is the best known form of memory your computer uses to temporarily store and access data. From the time you turn on your computer, your CPU is constantly using memory (RAM). Every time something is opened or loaded, it gets placed into RAM. This means it is put into a temporary storage area so the CPU can more easily access the information. From there it becomes a continuous cycle where the CPU requests data from RAM, processes it and then writes new data back to RAM. In most computers, this transfer of data between CPU and RAM happens millions of times every second. When an application is closed, the application itself, along with all its accompanying files is deleted from RAM. This is to make sure there is room for new data, so unless the changed files are saved to a permanent storage device, they will be lost.
DIfferent Types of RAM:
RAM Type: Pins: Usage:
SD RAM 168 Typically only used in older and slower computers.
Rambus RAM 184 Only used in certain Pentium 4’s with certain Intel chipsets.
DDR RAM 184 Faster version of SD RAM used in Pentium 4’s and Athlon
DDR2 RAM 240 Newer version of DDR RAM with higher clock frequencies
DDR3 RAM 240 Newer version of DDR2 with higher clock frequencies
When looking to upgrade your computer’s RAM, you will find RAM information typically displayed like this:
1GB, 240-pin DIMM, DDR2 PC2-5300,
* 1GB refers to the size of the memory
* 240-pin refers to the number of pins used to connect to the motherboard
* DIMM- Dual In-line Memory Module
* SIMM- Single In-line Memory Module
* DDR2 refers to the type of memory
* PC2-5300 refers to the module type
Some other pieces of information you might find in a RAM description are:
Clock frequency-refers to speed of the RAM in MHz (800MHz)
CAS (Column Address Strobe) Latency-refers to the number of clock cycles that elapse from the time the request for data is sent to the actual memory location until the data is transmitted from the module. This is represented by a set of 4 numbers also known as RAM timing (4-4-4-12). These numbers stand for:
TCL - CAS Latency Time
Trcd - DRAM RAS# to CAS# Delay
Trp - DRAM RAS# Precharge
Tras - Precharge delay
Normally the BIOS will allow a user to adjust RAM timing to increase performance and stability.
RAM is considered the most critical component in a computer system. Every bit of data must pass through RAM to get to the processor. Generic, low-cost RAM is most often the cause of data corruption and program crashes, so never skimp on the quality of RAM when upgrading RAM. Make sure the RAM you choose is considered Grade A RAM. Grade A RAM can only be found through major manufacturers of RAM, such as: Crucial.com.
DIfferent Types of RAM:
RAM Type: Pins: Usage:
SD RAM 168 Typically only used in older and slower computers.
Rambus RAM 184 Only used in certain Pentium 4’s with certain Intel chipsets.
DDR RAM 184 Faster version of SD RAM used in Pentium 4’s and Athlon
DDR2 RAM 240 Newer version of DDR RAM with higher clock frequencies
DDR3 RAM 240 Newer version of DDR2 with higher clock frequencies
When looking to upgrade your computer’s RAM, you will find RAM information typically displayed like this:
1GB, 240-pin DIMM, DDR2 PC2-5300,
* 1GB refers to the size of the memory
* 240-pin refers to the number of pins used to connect to the motherboard
* DIMM- Dual In-line Memory Module
* SIMM- Single In-line Memory Module
* DDR2 refers to the type of memory
* PC2-5300 refers to the module type
Some other pieces of information you might find in a RAM description are:
Clock frequency-refers to speed of the RAM in MHz (800MHz)
CAS (Column Address Strobe) Latency-refers to the number of clock cycles that elapse from the time the request for data is sent to the actual memory location until the data is transmitted from the module. This is represented by a set of 4 numbers also known as RAM timing (4-4-4-12). These numbers stand for:
TCL - CAS Latency Time
Trcd - DRAM RAS# to CAS# Delay
Trp - DRAM RAS# Precharge
Tras - Precharge delay
Normally the BIOS will allow a user to adjust RAM timing to increase performance and stability.
RAM is considered the most critical component in a computer system. Every bit of data must pass through RAM to get to the processor. Generic, low-cost RAM is most often the cause of data corruption and program crashes, so never skimp on the quality of RAM when upgrading RAM. Make sure the RAM you choose is considered Grade A RAM. Grade A RAM can only be found through major manufacturers of RAM, such as: Crucial.com.
Information about Computer Memory
Computer Memory are internal storage areas in the computer used to either temporarily or permanently store data or instructions to be processed. There are four basic types of computer memory: Cache Memory, RAM, Virtual Memory and Hard Drives. With modern CPU’s running at speeds of 1 gigahertz or higher, it is hard for computer memory to keep up with the extreme amount of data being processed. Computer engineers fixed the problem by "tiering" memory. By using this tiering effect, engineers use a small amount of more expensive memory and a large amount of low cost memory.
RAM:
RAM (Random Access Memory) is the best known form of memory your computer uses. Every file or application opened is placed in RAM. Any information the computer needs or uses becomes part of a continuous cycle where the CPU requests data from RAM, processes it and then writes new data back to RAM. This can happen millions of times a second. However, this is usually just for temporary file storage, so unless the data is saved somewhere, it is deleted when the files or applications are closed.
Hard Drive:
A Hard Drive is a form of computer memory that allows you to permanently store data. This is where all of your permanent files and programs are stored. On computers running with Microsoft windows the Hard Drive is often called C-Drive. The size of a Hard Drive is typically measured in gigabytes.
Virtual Memory:
Virtual memory typically comes into place when applications are too large for the RAM to handle. The operating System uses the hard drive to temporarily store information and take it back when needed. This is normally a lot slower than actual RAM and can possibly degrade performance if used to heavily.
Cache Memory:
Cache Memory is used in-between the CPU and the RAM and holds the most frequently used data or instructions to be processed. There are three different grades of Cache. Some systems will only have level 1 and level 2. More advanced systems will include the level 3.
Level 1 (L1) - Is the primary and is on or very close to the processor. This is used for the most frequently used data and instructions.
Level 2 (L2) - Is second closest to the CPU and is more common to be on the motherboard. Depending on your motherboard it might be able to be updated. This is used for the most frequently used data and instructions.
Level 3 (L3) - This is the most advanced cache and will speed up the memory even further. This is used for the most frequently used data and instructions
RAM:
RAM (Random Access Memory) is the best known form of memory your computer uses. Every file or application opened is placed in RAM. Any information the computer needs or uses becomes part of a continuous cycle where the CPU requests data from RAM, processes it and then writes new data back to RAM. This can happen millions of times a second. However, this is usually just for temporary file storage, so unless the data is saved somewhere, it is deleted when the files or applications are closed.
Hard Drive:
A Hard Drive is a form of computer memory that allows you to permanently store data. This is where all of your permanent files and programs are stored. On computers running with Microsoft windows the Hard Drive is often called C-Drive. The size of a Hard Drive is typically measured in gigabytes.
Virtual Memory:
Virtual memory typically comes into place when applications are too large for the RAM to handle. The operating System uses the hard drive to temporarily store information and take it back when needed. This is normally a lot slower than actual RAM and can possibly degrade performance if used to heavily.
Cache Memory:
Cache Memory is used in-between the CPU and the RAM and holds the most frequently used data or instructions to be processed. There are three different grades of Cache. Some systems will only have level 1 and level 2. More advanced systems will include the level 3.
Level 1 (L1) - Is the primary and is on or very close to the processor. This is used for the most frequently used data and instructions.
Level 2 (L2) - Is second closest to the CPU and is more common to be on the motherboard. Depending on your motherboard it might be able to be updated. This is used for the most frequently used data and instructions.
Level 3 (L3) - This is the most advanced cache and will speed up the memory even further. This is used for the most frequently used data and instructions
Information about Advanced Graphics Port Video Cards
AGP (Advanced Graphics Port) Video Cards are still considered the standard for video cards on the market today. Even though they do not offer all of the features that the PCI Express Video Cards have, they are big step up from PCI Video cards. AGP video cards can be capable of over 4 times the data transfer speed over PCI. AGP improved its data transfer rate by enabling data to be transferred both during the rise and fall of its clock cycle.
AGP uses pipelining and sideband addressing to improve its overall speed. Pipelining is a way to improve performance by letting tasks overlap themselves (For instance: AGP makes multiple requests for information during bus or memory access and PCI makes one request and does not make another until the data has been transferred). Sideband addressing separates the address bus from the data bus, which allows the graphics controller to issue new AGP commands while the main address/data lines are still operating. These two features greatly improve the speed of this style video card.
There are three versions and four basic speeds of AGP Video Cards:
AGP 1.0- supports 1x and 2x speeds and has a 3.3v connector
AGP 2.0- this version is compatible with 1.0 but adds 4x and 1.5v support
APG 3.0-supports 4x and 8x speeds and is only compatible with the 4x version in 2.0
There are three different types of AGP mechanical board connectors. The 3.3v (which usually has a notch at the front end), the 1.5v (which usually has a notch at the back end), and the universal AGP slot which supports multiple voltages (there are no notches so both style cards can fit in it). The AGP card and the monitor are what determine the quality of a computer’s video display, so keep in mind that the newer versions are better for more advanced graphics.
AGP uses pipelining and sideband addressing to improve its overall speed. Pipelining is a way to improve performance by letting tasks overlap themselves (For instance: AGP makes multiple requests for information during bus or memory access and PCI makes one request and does not make another until the data has been transferred). Sideband addressing separates the address bus from the data bus, which allows the graphics controller to issue new AGP commands while the main address/data lines are still operating. These two features greatly improve the speed of this style video card.
There are three versions and four basic speeds of AGP Video Cards:
AGP 1.0- supports 1x and 2x speeds and has a 3.3v connector
AGP 2.0- this version is compatible with 1.0 but adds 4x and 1.5v support
APG 3.0-supports 4x and 8x speeds and is only compatible with the 4x version in 2.0
There are three different types of AGP mechanical board connectors. The 3.3v (which usually has a notch at the front end), the 1.5v (which usually has a notch at the back end), and the universal AGP slot which supports multiple voltages (there are no notches so both style cards can fit in it). The AGP card and the monitor are what determine the quality of a computer’s video display, so keep in mind that the newer versions are better for more advanced graphics.
Increase your system speed
To increase the system speed follow the following steps. Your system speed will definitely increase.
1) Wallpaper slows down your system speed. Try to use the plain desktop.
2) If you are working with multiple windows at at a time, minimize the remaining windows so that ram can work with max speed.
3) Updates your installed drivers. Especially graphic card driver's updating help to improve the speed.
1) Wallpaper slows down your system speed. Try to use the plain desktop.
2) If you are working with multiple windows at at a time, minimize the remaining windows so that ram can work with max speed.
3) Updates your installed drivers. Especially graphic card driver's updating help to improve the speed.
Labels:
CONNECTIVITY,
INTERNET,
PC MAINTENANCE,
WINDOWS TRICKS,
XP TRICKS
How to create partition in Windows Vista
Dear friends this is the common question asked by the people, using vista operating system. Vista has only two default partitioned drives namely c:\ and d:\. I found several students from engineering field who says that we cant create partition.
But its not true.... You can create new partition without formatting the disk. You have to follow the following steps:
1)Open disk manager.
2)Right click on the volume which u want to shrink.
3)choose shrink volume option,
4)Follow the instructions as on the screen.
But its not true.... You can create new partition without formatting the disk. You have to follow the following steps:
1)Open disk manager.
2)Right click on the volume which u want to shrink.
3)choose shrink volume option,
4)Follow the instructions as on the screen.
Block websites without any software
Block websites without any software
Steps:
1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.orkut.com , and that site will no longer be accessable.
5] Done!
example :
127.0.0.1 localhost
127.0.0.2 www.orkut.com-
www.orkut.com is now unaccessable
For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.
ie:
127.0.0.3 www.yahoo.com127.0.0.4 www.msn.com127.0.0.5 www.google.com
This also works with banner sites, just find the host name of the server with the banners and do the same thing with that addy.
Hope this small tutorial could keep you going in simple way of blocking websites.
Steps:
1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.orkut.com , and that site will no longer be accessable.
5] Done!
example :
127.0.0.1 localhost
127.0.0.2 www.orkut.com-
www.orkut.com is now unaccessable
For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.
ie:
127.0.0.3 www.yahoo.com127.0.0.4 www.msn.com127.0.0.5 www.google.com
This also works with banner sites, just find the host name of the server with the banners and do the same thing with that addy.
Hope this small tutorial could keep you going in simple way of blocking websites.
Labels:
INTERNET,
OPERATING SYSTEM,
WINDOWS TRICKS,
XP TRICKS
Hide drives using registry
How to Hide the drives(c:,d:,e:,a:...etc) in My Co
This is a great trick you can play on your friends. To disable the display of local or networked drives when you click My Computer.
1.Go to start->run.Type regedit.Now go to:
HKEY_CURRENT_USER\Software\Microsoft\Win
dows\CurrentVersion\Policies\Explorer
Now in the right pane create a new DWORD item and name it NoDrives(it is case sensitive). Now modify it's value and set it to 3FFFFFF (Hexadecimal) .Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer. You can now see all the drives again.
This is a great trick you can play on your friends. To disable the display of local or networked drives when you click My Computer.
1.Go to start->run.Type regedit.Now go to:
HKEY_CURRENT_USER\Software\Microsoft\Win
dows\CurrentVersion\Policies\Explorer
Now in the right pane create a new DWORD item and name it NoDrives(it is case sensitive). Now modify it's value and set it to 3FFFFFF (Hexadecimal) .Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer. You can now see all the drives again.
Create a Hidden User Account
This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view.
To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000 i.e. press CTRL+ALT+DEL twice.
1. Open Registry Editor.
2. Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Modify/Create DWORD Value of Data type REG_DWORD Named [Type Name of Account to be Hidden]
Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]
3. Exit Registry / Reboot
While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups.
To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000 i.e. press CTRL+ALT+DEL twice.
1. Open Registry Editor.
2. Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Modify/Create DWORD Value of Data type REG_DWORD Named [Type Name of Account to be Hidden]
Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]
3. Exit Registry / Reboot
While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups.
Labels:
REGISTRY TRICKS,
SECURITY,
WINDOWS TRICKS,
XP TRICKS
Open Folder with Key Combination
1. Create a shortcut of the file/folder in the Desktop.
For that, right-click the folder > Send To > Desktop. (Works only with desktop shortcuts)
2. Now, on your desktop, right-click the new shortcut, and then view its Properties.
3. Click On the "Shortcut" Tab and then on "Shortcut Key" box.
4 .By Default it will be "None" .So press the letter in the box…..on your keyboard that you want to use to open the folder. (Note: In the Shortcut key box CTRL+ALT is automatically added before the key you press)
5. Click Ok
Now u can press ctrl+Alt+ur selected letter........And folder will be opened....
For that, right-click the folder > Send To > Desktop. (Works only with desktop shortcuts)
2. Now, on your desktop, right-click the new shortcut, and then view its Properties.
3. Click On the "Shortcut" Tab and then on "Shortcut Key" box.
4 .By Default it will be "None" .So press the letter in the box…..on your keyboard that you want to use to open the folder. (Note: In the Shortcut key box CTRL+ALT is automatically added before the key you press)
5. Click Ok
Now u can press ctrl+Alt+ur selected letter........And folder will be opened....
How to search on Google
Basic Boolean
Whenever you search for more than one keyword at a time, Google will search for all of them. If you search for
XML Java “web Services”
Google will search for all the words. If you want to specify that either word is acceptable, you put an OR between each item
XML OR Java OR “Web Services”
If you want to have definitely one term and one of two or more other terms, you group them with parentheses, like this
XML (Java OR “Web Services”)
This query searches for the word “Java” or phrase “Web Services” along with the word “XML.” A stand-in for OR borrowed from the computer programming realm is the | (pipe) character, as in
XML (Java | “Web Services”)
If you want to specify that a query item must not appear in your results, use a -.(minus sign or dash).
XML Java -”Web Services”
This will search for pages that contain both the words “XML” and “Java” but not the phrase “Web Services.”
Operators
In addition to the basic AND, OR, and quoted strings, Google offers some rather extensive special syntaxes for honing your searches. Google being a full-text search engine, it indexes entire web pages instead of just titles and descriptions. Additional commands, called special syntaxes, let Google users search specific parts of web pages or specific types of information. Specifying that your query words must appear only in the title or URL of a returned web page is a great way to have your results get very specific without making your keywords themselves too specific.
Here are some of the common keywords that you can add to your query in Google
intitle, allintitle
Restricts your search to the titles of web pages. The variation, allintitle: finds pages wherein all the words specified make up the title of the web page. It’s probably best to avoid the allintitle: variation, because it doesn’t mix well with some of the other syntaxes.
Eg: intitle:”george bush”
allintitle:”money supply” economics
inurl, allinurl
Restricts your search to the URLs of web pages. This syntax tends to work well for finding search and help pages, because they tend to be rather regular in composition. An allinurl: variation finds all the words listed in a URL but doesn’t mix well with some other special syntaxes.
Eg: inurl:help
allinurl:search help
intext, allintext
Searches only body text (i.e., ignores link text, URLs, and titles). There’s an allintext: variation, but again, this doesn’t play well with others. While its uses are limited, it’s perfect for finding query words that might be too common in URLs or link titles.
Eg: intext:”yahoo.com”
allintext:html
inanchor
Searches for text in a page’s link anchors. A link anchor is the descriptive text of a link. For example, the link anchor in the HTML code O’Reilly and Associates is “O’Reilly and Associates.”
Eg: inanchor:”tom peters”
site
Allows you to narrow your search by either a site or a top-level domain. AltaVista, for example, has two syntaxes for this function (host: and domain:), but Google has only the one.
Eg: site:loc.gov
site:thomas.loc.gov
site:edu
site:nc.us
You can also use site: operator to exclude certain domains from a search
Eg: google -site:google.com
This is particularly useful for ego searches. You can find out all those sites which mention your name expect your site.
Eg: bill gates -site:microsoft.com -site:wikipedia.org
link
Returns a list of pages linking to the specified URL. Enter link:www.google.com and you’ll be returned a list of pages that link to Google. Don’t worry about including the http:// bit; you don’t need it, and, indeed, Google appears to ignore it even if you do put it in. link: works just as well with “deep” URLs-http://www.raelity.org/apps/blosxom/ for instance-as with top-level URLs such as raelity.org.
Eg: link:www.google.com
cache
Finds a copy of the page that Google indexed even if that page is no longer available at its original URL or has since changed its content completely. This is particularly useful for pages that change often. If Google returns a result that appears to have little to do with your query, you’re almost sure to find what you’re looking for in the latest cached version of the page at Google.
Eg: cache:www.yahoo.com
filetype
Searches the suffixes or filename extensions. These are usually, but not necessarily, different file types. I like to make this distinction, because searching for filetype:htm and filetype:html will give you different result counts, even though they’re the same file type. You can even search for different page generators, such as ASP, PHP, CGI, and so forth-presuming the site isn’t hiding them behind redirection and proxying. Google indexes several different Microsoft formats, including: PowerPoint (PPT), Excel (XLS), and Word (DOC).
Eg: homeschooling filetype:pdf
“leading economic indicators” filetype:ppt
related
Finds pages that are related to the specified page. Not all pages are related to other pages. This is a good way to find categories of pages; a search for related:google.com would return a variety of search engines, including HotBot, Yahoo!, and Northern Light.
Eg: related:www.yahoo.com
related:www.cnn.com
info
Provides a page of links to more information about a specified URL. Information includes a link to the URL’s cache, a list of pages that link to that URL, pages that are related to that URL, and pages that contain that URL. Note that this information is dependent on whether Google has indexed that URL or not. If Google hasn’t indexed that URL, information will obviously be more limited.
Eg: info:www.oreilly.com
info:www.nytimes.com/technology
define
Will get the definition of the term that you have entered. This syntax can be used to get the definitions of words, phrases, and acronyms
Eg: define:dreaming
This query will get you the definition of the word dreaming
numrange
If you want to search for a range of numbers then you can use two dots (without spaces) to represent a range of numbers
Eg: inventions 1850..1899
This query will get you all the inventions between 1850 and 1899
stocks
If you start your query with stocks:, Google will interpret the rest of the query terms as NYSE, NASDAQ, AMEX, or mutual fund stock ticker symbols, and will open a page showing stock information for the symbols you specify.
Eg: stocks:goog
This will show information about Google’s stock. Specify ticker symbols not company names. If you enter an invalid ticker symbol, you’ll be told so and given a link to a page where you can look up a valid ticker symbol.
The Special Syntaxes
Currency Conversion
Google makes it easy to calculate money conversions from one form of currency to another.
Eg: $5 in yenThe above query will let you know that five dollars is worth about 566.599846 yen.
If you’re not sure of the name of a currency, use nationality instead.
Eg: 25 Australian money in Italian money
This may sound awkward but it does the job.
Eg: $5 in indian money
This will let you know that 5 US dollars is worth about 224.477976 Indian rupees
You can even convert units in this fashion.
Eg: $2.85 per gallon in British money per literThis query will tell you that it is about 42 pence per liter and provides an international basis for discussing gas prices at the pump.
Check Airfares
When you google for the names of two major cities, Google automatically offers to search for flights.
Eg: Denver Fort Lauderdale
In the form labeled “Flights from Denver, CO to Fort Lauderdale, FL”, enter a departure and return date and choose whether to search using Expedia, Hotwire or Orbitz. Do not use quotation marks in your initial search. Denver “Fort Lauderdale” will not bring up the flight search form.
Find Song Lyrics
If you are looking for the title or lyrics of a song then you can use Google search phrases and wildcards to find them.
Eg: “Friday I am in love” lyrics
Or use the wildcard operator to get lyrics with certain words in them, like this
“Friday * love” lyrics
Whenever you search for more than one keyword at a time, Google will search for all of them. If you search for
XML Java “web Services”
Google will search for all the words. If you want to specify that either word is acceptable, you put an OR between each item
XML OR Java OR “Web Services”
If you want to have definitely one term and one of two or more other terms, you group them with parentheses, like this
XML (Java OR “Web Services”)
This query searches for the word “Java” or phrase “Web Services” along with the word “XML.” A stand-in for OR borrowed from the computer programming realm is the | (pipe) character, as in
XML (Java | “Web Services”)
If you want to specify that a query item must not appear in your results, use a -.(minus sign or dash).
XML Java -”Web Services”
This will search for pages that contain both the words “XML” and “Java” but not the phrase “Web Services.”
Operators
In addition to the basic AND, OR, and quoted strings, Google offers some rather extensive special syntaxes for honing your searches. Google being a full-text search engine, it indexes entire web pages instead of just titles and descriptions. Additional commands, called special syntaxes, let Google users search specific parts of web pages or specific types of information. Specifying that your query words must appear only in the title or URL of a returned web page is a great way to have your results get very specific without making your keywords themselves too specific.
Here are some of the common keywords that you can add to your query in Google
intitle, allintitle
Restricts your search to the titles of web pages. The variation, allintitle: finds pages wherein all the words specified make up the title of the web page. It’s probably best to avoid the allintitle: variation, because it doesn’t mix well with some of the other syntaxes.
Eg: intitle:”george bush”
allintitle:”money supply” economics
inurl, allinurl
Restricts your search to the URLs of web pages. This syntax tends to work well for finding search and help pages, because they tend to be rather regular in composition. An allinurl: variation finds all the words listed in a URL but doesn’t mix well with some other special syntaxes.
Eg: inurl:help
allinurl:search help
intext, allintext
Searches only body text (i.e., ignores link text, URLs, and titles). There’s an allintext: variation, but again, this doesn’t play well with others. While its uses are limited, it’s perfect for finding query words that might be too common in URLs or link titles.
Eg: intext:”yahoo.com”
allintext:html
inanchor
Searches for text in a page’s link anchors. A link anchor is the descriptive text of a link. For example, the link anchor in the HTML code O’Reilly and Associates is “O’Reilly and Associates.”
Eg: inanchor:”tom peters”
site
Allows you to narrow your search by either a site or a top-level domain. AltaVista, for example, has two syntaxes for this function (host: and domain:), but Google has only the one.
Eg: site:loc.gov
site:thomas.loc.gov
site:edu
site:nc.us
You can also use site: operator to exclude certain domains from a search
Eg: google -site:google.com
This is particularly useful for ego searches. You can find out all those sites which mention your name expect your site.
Eg: bill gates -site:microsoft.com -site:wikipedia.org
link
Returns a list of pages linking to the specified URL. Enter link:www.google.com and you’ll be returned a list of pages that link to Google. Don’t worry about including the http:// bit; you don’t need it, and, indeed, Google appears to ignore it even if you do put it in. link: works just as well with “deep” URLs-http://www.raelity.org/apps/blosxo
Eg: link:www.google.com
cache
Finds a copy of the page that Google indexed even if that page is no longer available at its original URL or has since changed its content completely. This is particularly useful for pages that change often. If Google returns a result that appears to have little to do with your query, you’re almost sure to find what you’re looking for in the latest cached version of the page at Google.
Eg: cache:www.yahoo.com
filetype
Searches the suffixes or filename extensions. These are usually, but not necessarily, different file types. I like to make this distinction, because searching for filetype:htm and filetype:html will give you different result counts, even though they’re the same file type. You can even search for different page generators, such as ASP, PHP, CGI, and so forth-presuming the site isn’t hiding them behind redirection and proxying. Google indexes several different Microsoft formats, including: PowerPoint (PPT), Excel (XLS), and Word (DOC).
Eg: homeschooling filetype:pdf
“leading economic indicators” filetype:ppt
related
Finds pages that are related to the specified page. Not all pages are related to other pages. This is a good way to find categories of pages; a search for related:google.com would return a variety of search engines, including HotBot, Yahoo!, and Northern Light.
Eg: related:www.yahoo.com
related:www.cnn.com
info
Provides a page of links to more information about a specified URL. Information includes a link to the URL’s cache, a list of pages that link to that URL, pages that are related to that URL, and pages that contain that URL. Note that this information is dependent on whether Google has indexed that URL or not. If Google hasn’t indexed that URL, information will obviously be more limited.
Eg: info:www.oreilly.com
info:www.nytimes.com/technology
define
Will get the definition of the term that you have entered. This syntax can be used to get the definitions of words, phrases, and acronyms
Eg: define:dreaming
This query will get you the definition of the word dreaming
numrange
If you want to search for a range of numbers then you can use two dots (without spaces) to represent a range of numbers
Eg: inventions 1850..1899
This query will get you all the inventions between 1850 and 1899
stocks
If you start your query with stocks:, Google will interpret the rest of the query terms as NYSE, NASDAQ, AMEX, or mutual fund stock ticker symbols, and will open a page showing stock information for the symbols you specify.
Eg: stocks:goog
This will show information about Google’s stock. Specify ticker symbols not company names. If you enter an invalid ticker symbol, you’ll be told so and given a link to a page where you can look up a valid ticker symbol.
The Special Syntaxes
Currency Conversion
Google makes it easy to calculate money conversions from one form of currency to another.
Eg: $5 in yenThe above query will let you know that five dollars is worth about 566.599846 yen.
If you’re not sure of the name of a currency, use nationality instead.
Eg: 25 Australian money in Italian money
This may sound awkward but it does the job.
Eg: $5 in indian money
This will let you know that 5 US dollars is worth about 224.477976 Indian rupees
You can even convert units in this fashion.
Eg: $2.85 per gallon in British money per literThis query will tell you that it is about 42 pence per liter and provides an international basis for discussing gas prices at the pump.
Check Airfares
When you google for the names of two major cities, Google automatically offers to search for flights.
Eg: Denver Fort Lauderdale
In the form labeled “Flights from Denver, CO to Fort Lauderdale, FL”, enter a departure and return date and choose whether to search using Expedia, Hotwire or Orbitz. Do not use quotation marks in your initial search. Denver “Fort Lauderdale” will not bring up the flight search form.
Find Song Lyrics
If you are looking for the title or lyrics of a song then you can use Google search phrases and wildcards to find them.
Eg: “Friday I am in love” lyrics
Or use the wildcard operator to get lyrics with certain words in them, like this
“Friday * love” lyrics
Risk Of Using "Ctrl+C"
We often press Ctrl+C for Copy purpose.
Its risky online.... To know this do following...
1.Copy any text by pressing Ctrl+C.
2.go to http://www.sourcecodesworld.com/special/clipboard.asp
3.You will see ur text their. This was accessed by this page.
Do Comment....
Its risky online.... To know this do following...
1.Copy any text by pressing Ctrl+C.
2.go to http://www.sourcecodesworld.com/special
3.You will see ur text their. This was accessed by this page.
Do Comment....
Labels:
CONNECTIVITY,
INTERNET,
SECURITY,
WINDOWS TRICKS,
XP TRICKS
Unload Unused DLLs
XP has the habit of leaving associated DLL files in the memory.
Follow the trick to change it.
1. Type regedit in run.
2. Navigate to, HKEY_LOCAL_MACHINE\software\microsoft\windows\current version\AlwaysUnloadDll.
3. Double Click it. Set the value to 1.
Follow the trick to change it.
1. Type regedit in run.
2. Navigate to, HKEY_LOCAL_MACHINE\software\microsoft\windows\current version\AlwaysUnloadDll.
3. Double Click it. Set the value to 1.
Labels:
OPERATING SYSTEM,
REGISTRY TRICKS,
WINDOWS TRICKS,
XP TRICKS
Subscribe to:
Posts (Atom)