Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

Useful Google Chrome Extensions -II

Useful Google Chrome Extensions- I link 

1) SearchPreview for Google

Adds preview images (thumbnails) to your Google search results.

 SearchPreview adds preview images (thumbnails) to your Google
 search results. See a preview image of every search result before you click.
 
Download



2) Docs PDF/PowerPoint Viewer



Automatically previews pdfs, powerpoint presentations, and other documents in Google Docs Viewer.


Download





3) Brizzly

Useful Google Chrome Extensions

With Google Chrome being one of the fastest growing browsers due to its speed and all the great features, Google has added new features like the way you can quickly jump from tab to tab. Also, there are a lot of extensions that were added, which will save you time and help you along the way. There are extensions for every little thing you can think of, Users might face difficulties to choose extensions  from the plethora of Extensions available at Chrome Website . So here I’m focusing on some of the useful chorme extensions for everyday use and for web developers

1)Speed Dial

Speed Dial for Chrome - replace Chrome new tab with your predefined visual bookmarks.
Enjoy the new Speed Dial for Google Chrome with a fast and intuitive design.Open your
favourite pages easily. Set the number of dials in the page, select your desired 

theme and background image

10 fascinating facts you didn't know about Apple

One of the first Apple computers, now in a museum.
One of the first Apple computers, now in a museum. Photo: Flickr/manuel
This post was originally published on Mashable.com
It can be argued that no consumer electronics company has captured the public's fascination the way Apple has. Over the years it has morphed into more than just a company or corporation, but for many it has become a representation of a lifestyle or culture, and a status symbol complete with a larger fan base than most pop stars.
Here at Mashable, we're also quite fascinated by Apple and its achievements. The company is known just as much for its veil of secrecy and ability to get the internet buzzing with rumors, as it is for the actual products. You're probably in on the gossip, but there are likely a few things you don't know about Apple.
Apple founders Steve Jobs and Steve Wozniak tinker in their garage in 1975.
Apple founders Steve Jobs and Steve Wozniak tinker in their garage in 1975.
So read on for the origins of product names, factoids about the Apple logo, what Wozniak sold to finance the Apple I, and more wonders dug up from the archives of Apple's past.
1. The First Apple Logo Featured Isaac Newton
Although the now-retro rainbow logo is arguably Apple's most well known, the very first Apple logo featured Sir Isaac Newton sitting under a tree, with an apple about to hit his head. (Legend has it that he was literally hit on the head with an apple and that led to the concept of gravity.)
The first Apple logo.
The first Apple logo.
The Newton logo was designed by the lesser-known Apple founder Ronald Wayne (the guy who sold his stake - that today would be worth $US22 billion - to Steve Jobs and Steve Wozniak for $US800 - ouch!) and was only used briefly in 1976, since its high level of detail didn't really show up that well when shrunk down and stuck on a product.
The rainbow apple, designed by Ron Janoff, replaced Sir Isaac and remained the symbol of the company for many years until the simpler monochromatic apple logo was introduced in 1998.
2. Wozniak Sold His Scientific Calculator to Raise Capital
In order to raise enough money to buy parts and build the first few orders of the Apple I, Steve Jobs sold his Volkswagen van and Wozniak, then an HP employee, sold his Hewlett-Packard 65 scientific calculator for $US500.
Those born after 1990 might be surprised that a mere calculator would raise any kind of capital, but back in 1976, a scientific calculator cost as much as a laptop does today, and the HP-65 was in fact marketed as “the smallest programmable computer ever.”
Woz got a decent price considering it retailed for $US795,

Microsoft Silverlight Video Tutorials

1)Video Tutorials of Microsoft Siverlight 4 Beta Networking
English | WMV3 1024×768 | MP3 48 Kbps | 798 MB

This is a “tour” of the network capabilites in the Silverlight 4 beta. We’ll look at raw HTTP access, socket access and WCF capabilities.
This series includes 12 parts:
Part 1 – WebClient and HTTP GET, XML | 52,16 MB | 12m:41s
In this video, we take a look at doing a simple HTTP GET for an XML file with the WebClient API and then reading that with LINQ to XML.
Part 2 – WebClient and HTTP GET, RSS, ATOM, JSON | 51,41Mb | 10m:42s
In this video, we take a look at doing a simple HTTP GET for a file with the WebClient API and then reading that as RSS, ATOM, JSON.

Microsoft Silverlight 4 Using Visual C# 2010: Volume --AppDev

Microsoft Silverlight 4 Using Visual C# 2010: Volume 1 | 796 MB

Silverlight 4.0 makes it possible for developers to create rich, interactive applications delivered through a Web browser to nearly any client operating system, including Windows, Mac, and Linux. This course introduces the basics of creating and hosting Silverlight applications, working through many of the important controls, through binding Silverlight applications to live data.
In this course, you will learn:

A Master Art: Poetics of Coding

Code-is-poetry metaphor comes at least partly from a perception of poetry as the master’s craft. Whether you love or hate it, there has always been a general sense that poetry sits at the apex of the written word, as though poets sit in an ivory tower, composing lines with a golden pen.
Of course, the reality is strikingly different. A lot of really bad poetry is out there, written by people who call themselves poets just because they can rhyme words at the end of two lines.

Does that sound familiar?

How similar is this to the proverbial “nephew”? You know the one: that kid who read the introduction to a high-school textbook about the Web, figured out a few HTML tags and is now driving you crazy with his offer of a “Web design” for $100 and a six-pack of beer. Makes you want to tear your hair out, doesn’t he?

Anyone who has been at this Web design thing for a while (or at least anyone who takes themselves seriously) would agree that there’s more to the job than hacking out content wrapped in a bunch of poorly structured and entirely non-semantic HTML. For those of us who strive to be masters of our craft, code is so much more.

Privacy is overrated at Facebook

Facebook continues its march towards becoming one of the largest repositories of personal information on the planet. The huge base of user base of the social networking  site and the amount of time that many users spend on the site is enough to make marketers salivate.

The problem for the users of Facebook around the world is that this march towards profits and sharing the huge amounts of personal information is eroding the privacy that users once had on the social network. In the early days of Facebook, even the people you were friends with were not shown to those who you didn’t approve.

Today much of the information that was stashed away behind security in the early days is out in the open for anyone to peruse. Facebook CEO Mark Zuckerberg reckons that people online today just don’t have the same expectations of privacy online anymore. There are many who disagree with that notion, including a few Senators who are in a potential position to force Facebook to change its data sharing ways with new legislation.

Wired reports that new information has surfaced that claims Zuckerberg just doesn't care about the privacy of Facebook users. The revelation came in the form of a Tweet between the New York Times tech blogger Nick Bilton and an unnamed Facebook employee.

The Tweet read, "Off record chat w/ Facebook employee. Me: How does Zuck feel about privacy? Response: [laughter] He doesn’t believe in it."

Some of the things that Zuckerberg has said and moves that Facebook has made certainly support the claim that Facebook doesn't care much for privacy. The company is on a march towards monetizing the huge amount of traffic it generates and one of the things that has to fall by the wayside to make money is some of the privacy of users.

Wired reports that one of the ways Facebook user information that is shared with third-party advertisers is being used is to target ads specifically at the user. For instance, when a user goes to the Microsoft site -- which is one of the third-parties that Facebook shares information with -- the user will see ads specifically tailored to software and services they are interested in.

Some new Facebook features are also clearly ways for the social network to learn more about the product likes and dislikes of users. One such feature is the "Like" button that lets sites put a Facebook button on product and service pages that users can click. A click would send the information to Facebook helping to link the user to things that they like and dislike. It’s unclear what the benefit of clicking a like button would be to the user, other than publishing the like to what Facebook calls the "Open Graph."

Facebook is opening a can of worms that marketers and other social networks are sure to follow closely. The introduction of legislation to stop information sharing with third-party sites without the express permission of users of social networks like Facebook may be the only way to turn the tide in the battle against making money and privacy online.

Visual Studio 2010 Full Version Download Links

VisualStudio2010Ultimate.jpg VSTS 2010 image by kumar_arvind
ULTIMATE Download
PROFESSIONAL Download or Download
Microsoft Visual Studio 2010 Professional
-----------------------------------------
#Overview
Microsoft Visual Studio 2010 Professional is the essential tool for 
individuals performing basic development tasks. It simplifies the creation, 
debugging, and deployment of applications on a variety of platforms including
 SharePoint and the Cloud. Visual Studio 2010 Professional comes with integrated 
support for test-driven development, as well as debugging tools that help ensure 
high-quality solutions.

Extracting .001 files

Most of the archived files that you can download from binary Usenet newsgroups have the following filenames: name.part01.rar, name.part02.rar, name.part03.rar etc. You can extract those files with WinRAR or the free program 7-Zip. But sometimes you will see files with the following filenames: name.001, name.002, name.003 etc, which I will call 001 files.Extracting isn't the right name though: normally these files are not compressed like RAR files, but just split by a file splitter, without compression. Joining would be a better term for what we are about to do.We can do this with three different programs: WinRAR, 7-Zip and HJSplit.

 Joining the files 7-Zip

 Install 7-Zip, right click on the first file (name.001) in the Windows Explorer and choose 'Extract here' in the 7-Zip submenu of the context menu. 7-Zip will extract the archive and place the extract files into the same directory as where the source files are located. You could also choose 'Open archive' to view the archive in 7-Zip or extract the file to another directory by choosing 'Extract files'. Easy!

image

Over 13 percent Google searches lead to malicious links

Over 13 percent of all searches on Google looking for popular and trending topics will lead to malicious links and searching for the latest news on the earthquake in Chile and the tsunami hitting Hawaii are no exception. Both are now used to lure people into downloading fake antivirus products, according to security firm Websense.

Usually the links in the search results look like ordinary links pointing to regular web pages. This time the cyber criminals have changed tactics to make their search results look even more convincing; by tricking Google into thinking it's a PDF file. By making the search result look like a PDF it gives the link more authenticity. Perhaps it's a research paper or at least a better written article. The likelihood that a user will click on these types of links is probably higher than if it were just another random web link.
Websense says that this is the first time we've seen the attackers use this approach but considering how aggressive the rogue AV gangs are, it's not a surprise that they continue to refine their techniques to get people to "buy" their products. The Rogue AV file itself is currently detected by 26.20 percent of the antivirus engines used by VirusTotal.

Delete/Rename locked files in Windows with Unlocker

"Cannot delete File4.mp3: It is being used by another person or program".
image
You may have come across the above message quite a few times. This happens because Windows locks files or folders that are currently used by other applications or shared by other users.
In comes Unlocker! What is that?
Unlocker is a small freeware which will help take instant action when you encounter similar situations. Once installed, Unlocker will be available from the right-click context menu.
image
If you get a message when trying to delete or rename a locked Windows file or folder, just right-click the file and select Unlocker.
Unlocker will open a window displaying all the processes that are locking the file or folder. Select some of them and click Unlock.
You can now proceed with you task.

Save Images present in a DOCX file

Here's a way to save pictures from .docx Word files. DOCX files are basically archives which can be opened with Winzip, Winrar, 7-Zip etc.

1. Open the file with your archiving software. I use 7-Zip. You can just do a right-click -- Open With Winzip..or whatever.

2. Inside the archive, go to Word -- Media folder. The images used in the .docx document are in this 'Media' folder. Just extract them.

ip address conflict

IP ( Internet Protocol ) Address conflict occurs when two different devices in local network are using the same IP address, It can happen due to the mistakes from engineers or rogue DHCP server. However once the IP conflict happened in a critical devices we want to find out the device in few minutes. In large networks it is difficult to find out the source of the device with same IP address. Here I am explaining some methods to find out the source of IP conflict device

Error :  “ip address conflict with another system on the network”

Even if it is not 100 % solution this may help you to find some identification parameters of the source device.


1, Disable the network of original device

Search Engine Optimization

This Video provides useful tips to improve the search engine ranking of your BLOG

THINGS that can be done with USB-I

USB flash drive can be used if   you want to try out an  operating system  without harming your system  or if you want to protect your system and to boost your system performance or if you want to run portable applications.
BOOT OPERATING SYSTEM
If you are considering to boot an entire operating system from the USB flash drive , operating systems like Linux and Windows can be booted. But it a tricky task to perform.
Boot Linux from USB Flash Drive :
If you are considering to boot Linux from a USB flash drive then http://www.pendrivelinux.com/  provides you the tools and steps to install  Linux on Flash drive.
if you want to try out the Google’s latest operating system Google Chrome OS:
Windows Installation Steps:
       1)Download the OS  image
        link 1:http://bit.ly/84BOEN
                2:http://bit.ly/7n9uZa 

How to create a invisible folder in Windows


Step1: Create a new folder
Step 2: rename the folder by holding the ALT key and simultaneously typing 0160 it will create an invisible folder nameimage
caution: to type the numbers only number pad should be use , laptop users should activate the num lock to use the number pad
After performing this operation you will find a folder with no name
step 3: Right click the folder and select Properties > Coustomise and click on “Change Icon” Icon

Middle click magic - Windows & Linux

Generally we use mouse middle click for scrolling the pages . But there are many simple tricks for the middle click which make life easy .

Tricks:
 i) web Browser (Windows & Linux):
  1 opening New Tab In  : Middle Click on any web url to open new tab
  2 Closing a Tab  : Middle Click on a tab to close the Tab

Unhide Hidden Files and Folders

If your computer is infected with Virus which causes the folder to be hidden
Then there are two methods to show hidden files and folders

Method 1:
1)open notepad
2)type:
   [HKEY_CURRENT_USER\software\Microsoft\windows\CurrentVersion\Explorer\Advance]
    "Hidden"="1"
3) save the file as anyname.reg
4) open the file by double clicking it

Method2:
1)go to command prompt by pressing win+r ie. Run , type cmd in it
2) type attrib -h -s -a -r fullpath to the directory\* /s /d
    for example, if the hidden files and folders reside in the director "c:\files"
    type the following command : attrib -h -s -a -r c:\files\* /s /d

connecting a Reliance Netconnect Broadband + modem in linux

steps to be followed:
configuration:
1. Plugin the modem

2. go to terminal and switch to super user

3. Enter lsusb, which shows the list of connected usb devices. Output will be similar to
Bus 005 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 001 Device 004: ID 12d1:1412 Huawei Technologies Co., Ltd.
Bus 001 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub 


4. Note down the Device ID for the modem ie. here it is 12d1:1412


5.Next Enter  modprobe usbserial vendor=0×12d1 product=0×1412 in the terminal
    enter the vendor and product number noted 


6. open wvdial to configure the modem properties
gedit /etc/wvdial.conf
if wvdial is not installed, follow the following steps according to the linux version
        i. for debian based linux run  "sudo apt-get install wvdial " in the terminal
      ii. For suse linux got to url :http://software.opensuse.org/search/ and search for wvdial
          and install it using yast.

7. After opening wvdial.conf  paste the following code in the window


[Dialer Defaults]
Init1 = ATZ
Init2 = ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0
Stupid Mode = 1
Modem Type = USB Modem
ISDN = 0
Phone = #777
New PPPD = yes
Modem = /dev/ttyUSB0 (This may also be dev/ttyUSB2 depending on where you plugged in your device)
Username = 9xxxxxxxxxx (your username, should be a number )
Password = 9xxxxxxxxxx (Your password , should be the same number)
CBaud = 460800


8. save the file and close it .

9. To connect to internet open new terminal and dial sudo wvdial

10. To close the connection press ctrl+c key




Windows 7 -Project guide






Windows 7 - Product Guide
Windows 7 - Product Guide
English | Pages: 140 | Scan & PDF: Antfer | PDF | 55.2 mb

Download links