21 September 2009
With that spirit we come together today to celebrate the International Peace Day, a day of reflection and a time to acknowledge the need for peace in our ever conflicting world.
The International Day of Peace occurs all around the world on the 21st of September, it is an annual celebration and it is dedicated to peace, or specifically the absence of war, such as might be occasioned by a temporary ceasefire in a combat zone. It is celebrated by many nations, especially political groups and military groups.
I hope your day is peaceful and happy. And I also hope for peace and happiness all over the world! May the peace and happiness always remain in our heart!
If you would like to know more about International Peace Day, then follow the link below:
16 September 2009
What you will do when your Virtual Memory is too low ? This Article talks about anything about the virtual memory and how much virtual memory you need for your system, so that you will not face the problem again.
Introduction & Background
Today application is getting bigger and bigger. Therefore, it requires a bigger system memory in order for the system to hold the application data, instruction, and thread and to load it. The system needs to copy the application data from the HDD into the system memory in order for it to process and execute the data. Once the memory gets filled up with data, the system will stop loading the program. In this case, users need to add more memory onto their system to support that intense application. However, adding more system memory costs the money and the normal user only needs to run the the intense application that requires the memory only for one or two days. Therefore, virtual memory is introduced to solve that type of problem.
Terminology & Explanation
There are two types of memory, which are as follows:
1) System Memory is a memory that is used to store the application data and instruction in order for the system to process and execute that application data and instruction. When you install the memory sticks to increase the system RAM, you are adding more system memory. System Memory can be known as either the physical memory or the main memory.
2) Virtual Memory is a memory that uses a portion of HDD space as the memory to store the application data and instruction that the system deemed it doesn't need to process for now. Virtual Memory can be known as the logical memory, and it controls by the Operating System, which is Microsoft Windows. Adding the Virtual Memory can be done in system configuration.
Information & Facts or Implementation
Virtual Memory is a HDD space that uses some portion of it as the memory. It is used to store application data and instruction that is currently not needed to be process by the system.cs
During the program loading process, the system will copy the application data and its instruction from the HDD into the main memory (system memory). Therefore the system can use its resources such as CPU to process and execute it. Once the system memory gets filled up, the system will start moving some of the data and instruction that don't need to process anymore into the Virtual Memory until those data and instruction need to process again. So the system can call the next application data and instruction and copy it into the main memory in order for the system to process the rest and load the program. When the data and instruction that is in the Virtual Memory needs to process again, the system will first check the main memory for its space. If there is space, it will simply swap those into the main memory. If there are not any space left for the main memory, the system will first check the main memory and move any data and instructions that doesn't need to be process into the Virtual Memory. And then swap the data and instruction that need to be process by the system from the Virtual Memory into the main memory.
Having too low of Virtual Memory size or large Virtual Memory size (meaning the size that is above double of the system memory) is not a good idea. If you set the Virtual Memory too low, then the OS will keep issuing an error message that states either Not enough memory or Virtual too low. This is because some portion of the system memory are used to store the OS Kernel, and it requires to be remain in the main memory all the time. Therefore the system needs to have a space to store the not currently needed process data and instruction when the main memory get filled up. If you set the Virtual Memory size too large to support the intensive application, it is also not a good idea. Because it will create the performance lagging, and even it will take the HDD free space. The system needs to transfer the application data and instruction back and forth between the Virtual Memory and the System Memory. Therefore, that is not a good idea. The ideal size for the Virtual Memory is the default size of Virtual Memory, and it should not be exceed the value of the triple size of system memory.
To determine how much virtual memory you need, since the user's system contains the different amount of RAM, it is based on the system. By default, the OS will set the appropriate size for Virtual Memory. The default and appropriate size of Virtual Memory is:
For example, if your system contains 256 MB of RAM, you should set 384 MB for Virtual Memory.
Amount_Of_System_Memory * 1.5 = Default_Appropriate_Size_Of_Virtual Memory
256 MB of RAM (Main Memory) * 1.5 = 384 MB for Virtual MemoryIf you would like to determine how much the Virtual Memory is for your system and/or would like to configure and add more virtual memory, follow the procedure that is shown below. The following procedure is based on windows XP Professional.
1-1) Go to right-click My Computer and choose Properties
1-2) In the System Properties dialog box, go to Advanced tab
1-3) Click Settings button that is from the Performance frame
1-4) Once the Performance Options shows up on the screen, go to Advanced tab
1-5) Under the Advanced tab, click the Change button from the Virtual Memory frame to access to the Virtual Memory setting
Then the Virtual Memory dialog box appears on the screen. In there, you are able to check how much the Virtual Memory you set. If you would like to modify the size of Virtual Memory, follow the procedure that is shown below.
2-1) In there, select the drive letter that is used to install the Operating System
2-2) Choose the option that says, "Custom Size:"
Once you choose that option, the setting for Initial Size and Maximum Size become available for you to set. Initial Size (MB) means the actual size of Virtual Memory, and Maximum Size (MB) means the maximum size of Virtual Memory that is allowed to use.
Let's say if your system contains 512 MB of RAM, then the ideal setting for the Virtual Memory is as follows:
Initial Size (MB): 768Once you are happy with that Virtual Memory size, click the Set button from Paging file size for selected drive to apply the setting for the Virtual Memory size. Then click the OK button to apply the setting.
Maximum Size (MB): 1500
That's where you can manage and configure for the size of Virtual Memory.
To maintain the good overall system performance, you should be using the default size of actual size for Virtual Memory and the triple the value of the size of the main memory for the maximum size of Virtual Memory. If you find that main memory plus virtual memory is not big enough to load the intensive application, then you will need to add more main memory onto your system.
10 September 2009
Defragment your drive: This is one of the often repeated tips, yet we say this again. . I think it is the most common reasons for making hard disk performance slow down. As the new files cannot be stored in contiguous clusters, the disk becomes fragmented when files are deleted and new files are written to the disk. Use the Windows defragmentation tool which comes default with your Operating system or a free tool like Auslogics Defragmenter which can be find here: http://www.auslogics.com/disk-defrag .
Avoid tilting : You should avoid this or otherwise moving your PC when the PC is on will led your hard disk to crush. Hard disks do not take too kindly to being moved around while they are working! And, if you hear a screeching noise from your PC that coincides with the hard disk activity indicator(usually the red or amber LED), it's time for you to backup immediately and be prepared for a new hard disk.
07 September 2009
What is spyware?
Spware is a program that is embedded on the user's computer to monitor browser and taking notes of the websites which user visits. It also tries to collect various informations about that particular user and transmit it to advertisers or other interested parties. In other words, Spyware is an Internet language for Advertising Supported software (Adware). It is a way
for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales.
This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.
There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.
How to check if a program has spyware?
This is a little site that keeps a database of programs that are known to install spyware.
If you would like to block pop-ups (IE Pop-ups), there are tons of different ways out there, but these are the two best, I think.
Try: Google Toolbar (http://toolbar.google.com/) This program is Free.
Try: AdMuncher (http://www.admuncher.com) This program is Shareware.
If you observe that your computer is infected with "spyware" and you want to remove it, then you can try these below"
Try: Lavasoft Ad-Aware (http://www.lavasoft.com/) This program is Free. Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.
Try: Spybot-S&D (http://www.safer-networking.org/) This program is also free, It Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.
If you would like to Avoid "spyware" being install on your computer, try the following
Try: SpywareBlaster 2.6.1 (http://www.javacoolsoftware.com/spywareblaster.html) This program is a freeware. SpywareBlaster doesn't scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.
Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is also a freeware. XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.
If you would like more Information about "spyware".
Check these sites.
Finally all these softwares will help you to remove and prevent evil spammers and spyware attacking your computer. I myself recommend getting "spywareblaster" " spybot" & "admuncher" to protect your computer. A weekly scan is also recommended on a regular basis. This will keep your computer clean and free from harmful spyware.
05 September 2009
So here it is:
1. Right click where ever you want the invisible folder to be, go to new, then click on folder.
2. Turn number lock on, select the name, and hold Alt and press 0160, then release Alt. This should make a character that looks like a space, but it isn't.
3. Now right click the folder you just made and go to properties. Then go to the Customize tab. Then press the Change Icon button. Scroll through the icons until you find one that has no image (a blank space in the icons, any one will do).
4. Hit OK and you have an invisible folder!
Now you can put anything you want in there... If you can't find it, just select the entire folder/desktop and there will be a little blue rectangle below the invisible icon (the folder).
NOTE: If you put it on your desktop it might show the folder for a second or two upon startup. For this reason I recommend putting it inside another folder.
( Some people know this, and some people don't / Good to hide your porn)
30 August 2009
Recently, Just Today I was chatting with one of my friend on Yahoo Messenger, As he is new in Blogging, he asked me How do i submit my blogger blog in Google sitmap ? I answered simply just go to Google Webmaster submit your site, verify it and also submit it in Google Sitemap. After that he successfully applied his site to Google Webmaster and verified it, But he got the problem with Google Sitemap. He didn't got his URLs indexed. So as he requested me to solve his problem, I began to consider the problem and searching here and there. Then I found the solution for him, which I'am mentioning here in my Article. Below I've mentioned step by step procedure on How to Add Google Sitemap in Your Blogger Blog. So Read it cautiously!
So Ready to get started with Google Webmaster Tools ?
Step 1 : Go to Google Webmaster Tools Website.
You can sign in directly if you already have Google
Account or if you don't have one then create it.
Step 2 : Login to account now and At the middle of your screen in the Add a site box, enter your Blog Url as shown in the image below and click ok.
Now you need to verify the ownership of your blog and confirm that you own the blog. They asks you to verify the blog ownership because as a result they can send you the detailed information and statistics of your blog. So now click "verify this site" link or button.
Next, They will ask you to verify your site by simply making some specific change in your webpage or by uploading a file. Actually there are two ways to verify the site but for bloggers(blogspot) only one way is possible that is by adding Meta tag in your Blog. The Meta tag will look like as shown in the image above. After clicking the verify link select the "add a meta tag" option. Then copy that meta tag, Go to your Blogger dashboard, click on Layout tab, edit html and paste the meta tag in between the head tags. Now save the template.
Step 3 : Then after that again move to your Google webmaster page, click on "Verify" at the bottom (in Google Webmaster account) and there will be a confirmation message saying that you have successfully verified.
Step 4 : Now you have to do the main procedure that is you have to submit a sitemap for google to crawl your site. Go back to the google webmaster dashboard or (home) and click the "site configuration" link which is dropdown to your blog name and click the "submit a sitemap" link or button as shown in the image below.
Step 5 : Next, as you can see in the image above the "sitemap" Url is blank. You might have seen lots of people trying to fill that Url with atom feed or rss feed which is no longer working with Google Sitemap. My friend too tried the same, that's why his blog was not getting indexed by Google Bot. But to fill that Sitemap url I have found some another way with atom feed. Well, simply use the following url as the Sitemap.
atom.xml?redirect=false&start-index=1&max-results=100 (If you have up to 100 posts)Step 6 : That's it my friends, Hopefully now your blog will be indexed very faster depending upon your posting and content by Google bot. You can also recheck it after few days to see the full detail and statistics of your blog like same Top search queries, Crawl error and many more...
And if you have more than 100 articles or posts, then you have to add more sitemaps, after you have already added the previous one, like these:
atom.xml?redirect=false&start-index=101&max-results=100 (If you have up to 200 posts)
atom.xml?redirect=false&start-index=201&max-results=100 (If you have up to 300 posts)
atom.xml?redirect=false&start-index=301&max-results=100 (If you have up to 400 posts).
Hope you enjoyed reading this article! Thanks!
25 August 2009
There is also another method to detect invisible person on Yahoo Messenger. Just choose a person you want to check. Double click to open the chat window. Now simply invite the person for a voice conference. This can be done by clicking on the "conference" button on the top of the chat window.
20 August 2009
So, Here I am introducing one of the most best selling Internet Security software called F-secure Internet Security 2010 which is the latest one. F-Secure Internet Security 2010 is an excellent safety package, including virus and firewall killer. It provides complete protection against online threats with powerful detection and removal of all types of malicious software. Automatic updates and advanced DeepGuard™ 2.0 cloud computing technology ensure the fastest protection against new threats and viruses. This comprehensive security package also includes a firewall, spam control, rootkit detection and parental control.
Today I just stumbled upon a very fascinating post that you can actually get free 1 year of F-Secure Internet Security 2010 License key. And that is true! The first most thing you have to do is to visit any of the sites mentioned below and download the 2010 version: -
http://www.majorgeeks.com/download4339.html?2009-08-07So, You have downloaded your 2010 version setup file. Now, the only thing you need to do is to register for a free 3 months valid commercial license member at the German F-secure Internet security site which is mentioned below
(https://www.f-secure-estore.de). And after that paste the (
url.php?cnt=chip08) in the Google translate address. Hopefully the page shall open now. Fill the form as required as shown in the image below and click send data.Make sure that you provide proper E-mail Address.
After Signing up, Check your email inbox for an eMail containing license key valid for 90 days. Now you can install this short period license key as many times as you want as F-secure doesn't has trial check at all. This just means that the key, which you have received in your email during registration, can be used many times to activate your F-Secure Internet Security 2010. By this way you can extend your 90 days short period full license to one year license. Grab it and start a full one year protection of F-Secure Internet Security 2010. Enjoy!!
You get to save $59.99 from your pocket and also get to use one of the best Internet Security Software. Enjoy using the best Internet security to protect your computer from viruses for the whole year!!
18 August 2009
Okay, Lets proceed to the topic! Have you ever tried to download files from Rapidshare.com as a free user? If you have ever, then you might have encountered that you have to wait for a few seconds, minutes or even hours to download a small piece of files. This is due to the certain limitations and restrictions created by Rapidshare for free users.
Just recently walking through various forums and blog I've found a very comparatively new site called Rapid8.com which has been started since 24th April 2009 . It is not like other premium link generator sites which comes and lasts for only few couple of weeks and expires. It is four months old, still active and serving the fellows like us. When I first visited the site it took sometimes to load due to the heavy ads and pop ups. But when it fully loaded it works like a charm!
Then I went to it's homepage, I decided to download my most awaited file called winrar pro 3.80 which is a latest version by RARlab. It's a file compressor tool. I simply copied the Rapidshare url/link of winrar pro 3.80 and pasted in the box of homepage and clicked "download" button. After that I had to wait for the download to process, normally 4-5 seconds. When the process got completely finished I found the button named "Begin your download". I just clicked it and I got my file downloaded to my hard drive. This way I found this site very useful and thought to post it here.
Rapid8.com has very good features which makes it very reliable and very trustworthy than others. It has features like: -
- It converts any Rapidshare link to a premium link for free of cost.
- Unlimited Download slots everyday.
- Unlimited parallel downloads
- It supports Download Managers.
- Download starts without delays
So what are you waiting for ? Visit Free Rapidshare Working Premium Link Generator.
16 August 2009
You may not realize it, but your computer and your vehicles like car or your motor bikes have something in common: They both need regular maintenance. No, you don't need to change your computer's oil. But you should be updating your software, keeping your Anti virus subscription up to date, and checking for Spy ware. Read on to learn what you can do to help improve your computer's security.
Here are some basics maintenance tasks you can do today to start improving your computer's security. Be sure you make these part of your ongoing maintenance as well.
* Sign up for software update e-mail notices. Many software companies will send you e-mail whenever a software update is available. This is particularly important for your operating system, your Anti virus program, and your Firewall.
* Register your software. If you still have registration forms for existing software, send them in. And be sure to register new software in the future. This is another way for the software manufacturer to alert you when new updates are available.
* Install software updates immediately.
When you get an update notice, download the update immediately and install it. (Remember, downloading and installing are two separate tasks.)
An ounce of prevention
A few simple steps will help you keep your files safe and clean.
* Step 1: Update your software
* Step 2: Backup your files
* Step 3: Use antivirus software and keep it updated
* Step 4: Change your passwords
Developing ongoing maintenance practices
Now that you've done some ground work, it's time to start moving into longer term maintenance tasks. These are all tasks that you should do today (or as soon as possible) to get started. But for best results, make these a part of a regular maintenance schedule. We recommend setting aside time each week to help keep your computer secure.
* Back up your files. Backing up your files simply means creating a copy of your computer files that you can use in the event the originals are lost. (Accidents can happen.) To learn more read our tips for backing up information.
* Scan your files with up to date antivirus software. Use your antivirus scan tool regularly to search for potential computer viruses and worms. Also, check your antivirus program's user manual to see if you can schedule an automatic scan of your computer. To learn more, read our tips for reducing your virus risk.
* Change your passwords. Using the same password increases the odds that someone else will discover it. Change all of your passwords regularly (we recommend monthly) to reduce your risk. Also, choose your passwords carefully. To learn more, read our tips for creating stronger passwords.
Making a schedule
One of the best ways to help protect your computer is to perform maintenance regularly. To help you keep track, we suggest making a regular "appointment" with your computer. Treat it like you would any other appointment. Record it in your date book or online calendar, and if you cannot make it, reschedule. Remember, you are not only helping to improve your computer, you are also helping to protect your personal information.
Ok that's it my friend. Now You may Hopefully keep your computer well maintained.
If you don't know what exactly the Google Adsense is ? Then you have been living under a rock. This Google Adsense is a type of Money maker which is pretty much a must have if you want to make money from your blog. Google display simple text and image ads on your blog that are targeted to what you are writing about? Google has been a regular money maker for my blog.
If you look back at the Internet few years back, you will come to know that advertising was done in a very similar way to that sort of media like television, or more like what you see in a newspaper.
You would enter a site, and in some location you would get to see a banner (often these were quite numerous and very large), which would present and ad for whatever company was paying for ads on your space. But there was one problem with this kind of advertising. It really wasn't exploiting the fact that the adds weren't in some newspaper, but were instead presented over the Internet.
You've probably noticed a lot of things like this over the pages you've browsed. You're looking at an on-line shop, looking for a watch but you get a banner that advertises a car. While you might, at some later point want to buy a car, right now you're looking for a watch and it would have surely been nice if the banner were advertising a watch, because then you would have probably clicked it.
Well that's also what the folks at Google thought of, so they came up with a killer idea. This is known as Google AdSense, and it's known as a targeted advertising program.
What you do (as a web designer / website owner) is, instead of jumping through hoops to get some banner on your site that your visitors won't even care about, is you just allocate some region of the screen.
You then sign up for the Google AdSense program, you insert a small piece of code in your web page and Google ensures that in the location you specify, a banner will appear, presenting ads relevant to the contents of your site. It's very easy for Google to do this because Google is a search engine company. It looks for the key words in your page, searches a database of websites to find the ones related to whatever is on your page and present a targeted ad.
You (the webmaster) get a revenue for each visitor that clicks on an adsense banner on your site. Now that's bound to happen more often then with a traditional banner because people are actually interested in what's in that banner (otherwise, they wouldn't be on your page would they?).But, this also does wonders for the people who want to advertise. And it's because of the same reason. The greatest thing about Google AdSense is that all the content in a banner is relevant.
This relevancy is the key to the programs success, and also the reason why everyone remains happy. The advertiser has a relevantly placed advert, the publisher earns money from their content and Google take their cut. Of course, as always, Google has set some high standards for its AdSense program, in terms of looks and functionality. You can't have more than two such banners on your website and Google only inserts text in these banners.
So an extra benefit is that AdSense advertising is a lot less obtrusive then regular advertising. But this also means you should position the banner better because it's possible that visitors might miss it altogether.
So in the end, Google AdSense is an advertising program that is unique because the ads are relevant to the content on the site. Anyone that wants to advertise pays Google for it. Anyone who wants to place ads on their site does this through AdSense, getting paid by Google in the process.
All transactions are run through Google, and the advertisers and publishers get access to statistics which help them to understand and moderate the effectiveness of their campaign.
The whole process is elegant, simple and effective from anyone in the chain, from site visitors to advertisers, and it's one of the reasons Google are known for their innovation and new thinking.
Thanks a lot! for reading this article, I hope you found this information useful and to of great use.
14 August 2009
Just recently My computer got infected by some viruses and I got the same problem. However I anyhow managed to find the solution to overcome this issue through some research in internet. And thought to post it here.
So here's the Solution:-
The First and foremost thing that you have to do is to check that you have enabled the Show hidden files and folder or not.
1. Go to Tools > Folder options. This will show a folder options menu.
2. Go to View tab and select the option “Show hidden files and folder”
The hidden files and folders are displayed by this method normally. But in case if some viruses or malicious script is preventing the hidden files and folders from being visible, follow the below steps:1. Go to Start --> Run, then type Regedit
Regedit is the Soul of your computer, So mostly several type of viruses or malicious script try to attack it first.
2. Then after Navigate to the registry folder HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\ CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL
3. Find a key called CheckedValue.
4. Double Click CheckedValue key and modify it to 1. This is to show all the hidden files. That's it!
Now I'm sure that the problem will get fixed. Try going again to folder options and checking by "show hidden files". Now the files and folders that you were trying to access will get visible.
13 August 2009
As here we are mainly focusing to search ebooks only using Google search engine, all other tricks like searching mp3, programs shall be discussed later.
You will mostly find the main ebook format in .pdf extension, but ebooks also have .doc, .chm and even .txt extension. So we will have to include all extension which a normal eb00ks have. But unfortunately some ebooks are packed with .zip or .rar extension for which we would probably have to include zip and rar extension as well to your search.
To search for an ebooks perhaps try the following: -
Go to Google's search page and use the following criteria in the search dialog
intitle:index.of? file extension Name of item
e.g. intitle:index.of? pdf photoshop
This will hopefully give you a listing of all websites that Google has cached that contain references to files in PDF format that are published under photoshop.
I sometime also use the below mentioned trick in Google
+("index of") +("/ebooks"|"/book") +(chm|pdf|doc|zip|rar) +photoshop
allinurl: +(rar|chm|doc|zip|pdf|tgz) photoshop
Hopefully this all above mentioned tricks will work perfectly for you as it worked for me.
09 August 2009
If you're using AdWords or AdSense you must have heard about an emerging practice in the underworld of computing called "click fraud". But what exactly is click fraud and how is it accomplished?
Well AdSense uses a payment mechanism that awards a certain amount of money to a publisher (someone who holds an AdSense banner on their page) every time a person clicks on the said banner. So click fraud is the attempt to have people clicking the ads just so that they can earn a greater income.
There are people setting up sites for the sole purpose of fraudulently generating revenue through Google's AdSense program. These users achieve an incredible number of clicks through many methods, some complex and sophisticated and some rudimentary and simple.
One of the most complex is through the use of so called "hitbots". These are automated programs who emulate clicking the links in AdSense banners (there are some that actually click the banners as well).
Google's AdSense protection scheme is by no means perfect and nearly anyone can find the details of surmounting the protection mechanism, ironically just by doing a Google search.
Another, more rudimentary method is to hire a lot of people in a poor country to click the links on your site. This means these people will actually sit all day and just click links so you can earn a fortune. They come from very poor countries like India, and they're prepared to do so for just $0.50 an hour.
Of course, there's a problem with this mechanism. Once Google receives a large number of clicks from a single address, the address and the site that had the AdSense banner will be banned, and the illicit behavior might even get the fraudster sued.
To prevent this from happening, many people use a large number of proxy servers for the purpose of clicking. These are basically trojans, located on computers throughout the world (though mostly in the US). What's even more daunting is that these clicks will appear to originate from an actual computer so such scams are really hard to detect.
And don't think this happens only in isolated instances. There is a great deal of illegal activity in this domain.
In fact there's so much that if search engine companies don't increase their security with such programs as AdSense, such criminal behavior could become more become even more damaging.
Google has a very strict policy regarding click fraud, and it has sued those employing such techniques in the past. But while the search engine giant tries its best to minimize the risk of click fraud there's certainly room for a lot of improvement.
It is estimated that more then 20% of the clicks that follow an AdSense link are just done in order to get money from the person paying for the ad. Some people believe the number of fraudulent clicks to be even twice as large.
There are a great deal more schemes involving click fraud, such as groups of AdSense publishers clicking each other's links (which is referred to as "clicking rings", or spamming people so that they click such links.
Despite Google still holding click fraud on a leash, the phenomenon is certainly raising concerns for the advertisers on AdWords, but despite this advertising with Google's AdSense still remains more profitable for the advertiser, as opposed to traditional untargeted advertising schemes.
There are some means of protection against such schemes and all advertisers should be savvy enough to employ them. Many advertisers choose to avoid the content network all together for fear of click fraud.
08 August 2009
The above Micrsoft Office plugins enables you to Open, edit, and save documents, workbooks, and presentations in older versions of Microsoft Office 2000, 2003, or XP without any work on your part. Just make sure that your office has the latest Service Pack installed - either SP3 for Office 2000 and XP, or SP1 for Office 2003. Please take a special care to read the overview on that page.
Note: If you use Microsoft Word 2000 or Microsoft Word 2002 to read or write documents containing complex scripts, please see http://support.microsoft.com/kb/925451 for information to enable Word 2007 documents to be displayed correctly in your version of Word.
Ok friends, Here is an easier way. If you feel that the above method is complicated for you and you just need to convert just a single .docx file, get your mouse over docx-converter.com. Simply, Upload your file, select your preferred format (.doc is just one choice), and enter your email address. In a moment, you should get a note containing a link to download the converted file. It’s a free service. So enjoy it!
I hope that you enjoyed reading this article!
30 July 2009
Before we start, we know that the two greatest resources an Internet entrepreneur possesses are Time and Money. So, you will either need to use time or money to generate traffic to your website. It's an exchange. If you spend more time, you will need to spend less money. If you have more money, then you can spend less time on web traffic generation.
As above described both of the resources are precious. You would want to spend as little time as possible to generate web traffic which don't work and are more risky. So you have learn that to generate traffic giving time is must. Here is the Free method that will generate web traffic for you:
Putting up a company would of course require a lot of things, to get straight to the point, you need a money. To make money requires money as well. But of course, with the versatility the internet offers, there are many ways you could find that could help optimize the potential of your site or business in generating web traffic for free.
While there are ways to jump start your traffic flows, many sites don’t have the resources that others have to generate more traffic for your site. Well, you don’t have to spend a cent; all you need is the proper mindset and a lot of eagerness. You also must have the drive and perseverance to do hard work and research to generate more traffic for your site.
How sweet it is to have more traffic for your site without spending a single cent. Now it’s a sure thing that many sites have articles that offer tips and guidelines in how to generate traffic using only free methods. Because it is possible, you don’t need to speed a single cent, it may take time, to say honestly, I’m not going to beat around the bush with you. You get better chances by paying for your advertisements, but at least you get a fighting chance with some of these free methods I’m about to tell you.
Take advantage of online forums and online communities and some traffic exchanges. The great thing about forums and online communities is that you can target a certain group that fits the certain demographic that you are looking for. You can discuss about lots of things about the niche that you represent or offer. Another great advantage is that you know what you are getting into and you will be prepared.
With online communities and forums you can build a reputation for your company. Show them what you are made of and wow them with your range of expertise about the subject, with that you can build a reputation and build trust with the people in your expertise and knowledge.
You can also make use of newsletters. Provide people with a catalog of your products and interesting and entertaining articles. If you make it really interesting and entertaining, more people will sign up for your newsletter and recommend it to other people. The more people who signs up for your newsletter, the more people there will be that will go to your site increasing your traffic.
Another great idea is trading links with other sites. You don’t have to spend a cent. All you have to do is reach an agreement with another webmaster. With exchanging links, the efforts both sites do will benefit both sites. Every traffic that goes to the site could potentially click on the link of your site and visit your site as well. This works well especially when both sites feature the same niche.
Write articles that could drive the attention of people that have interest in your product. Try writing articles that will provide tips and guides to other follower. Writing articles that provide good service and knowledge to other people would provide the necessary mileage your traffic flow needs.
Many sites offer free submission and posting of your articles. When people find interest in your articles they have a good chance of following the track by finding out where the article originated. Include a link or a brief description of your company with the article and there’s a great probability that they will go to your site.
Write good content for your site. Many search engines track down the keywords and keyword phrases your site uses and how they are used. It is not a requirement that a content should be done by a professional content writer. You could do your on but you have to make content for your site that is entertaining as well as informational. It should provide certain requirements as well as great quality.
Generally, internet users use search engines to find what they are looking for. Search engines in return use keyword searching in aiding their search results. With the right keywords, you could get high rankings in search engine results without the costs.
All of these methods and more will drive more web traffic to your site for free. All it takes is a bit of effort and extended man hours. So friends time is must to give to drive free traffic. Learn all you can about the methods depicted here and you will soon have a site with a great traffic flow without the usual costs that come with it.
28 July 2009
Today The Bluetooth and it's Technology is being used in almost every field mostly on Mobiles. So I thought to post some benefits of Bluetooth and it's Technology.
Below, are 10 benefits and reasons to use Bluetooth and it's technology.
As you probably already know, there are many benefits
and advantages to using wireless devices like Bluetooth. Along with
improving safety as a result of eliminating wires
you don't need, wireless also offers you plenty of
other advantages. When traveling with your laptop
or other wireless devices, you'll no longer have to
worry about bringing connection cables.
2. Bluetooth is actually inexpensive
The technology of Bluetooth is cheap for companies
to implement, which results in lower costs for the
company. These savings are then passed from the
company on to you.
3. Bluetooth is automatic
Bluetooth doesn't have to set up a connection or
push any buttons. When two or more devices enter
a range of up to 30 feet of each other, they will
automatically begin to communicate without you
having to do anything.
4. Standardized protocol
Bluetooth is standardized wireless, meaning that
a high level of compatibility among devices is
guaranteed. Bluetooth will connect devices to
each other, even if they aren't the same model.
5. Low interference
Bluetooth devices almost always avoid interference
from other wireless devices. Bluetooth uses a
technique known as frequency hopping, and also
low power wireless signals.
6. Low energy consumption
As a result of Bluetooth using low power signals,
the technology requires very little energy and will
use less battery or electrical power as a result.
This is an excellent benefit for mobile devices,
as Bluetooth won't drain the battery.
7. Sharing voice and data
The standard for Bluetooth will allow compatible
devices to share data and voice communications.
This is great for mobile phones and headsets, as
Bluetooth simplifies driving and talking on your
8. Instant PAN (Personal Area Network)
You can connect up to seven Bluetooth devices to
each other within a range of up to 30 feet, forming
a piconet or PAN. For a single room, you can
also set up multiple piconets.
Upgradeable is the standard for Bluetooth. There
are newer versions of Bluetooth in the works,
which offer many new advantages and backward
compatible with older versions.
10. The technology stays
Bluetooth and it's technology is a world wide, universal
wireless standard. With it being as popular as
it is, you can count on it being around for years
to come. As more and more devices start to use
Bluetooth technology, more manufacturers will be
eager to make their products compatible. A chain
reaction will occur, making Bluetooth the standard
for cutting edge wireless.
Thanks for you time and effort in reading this article.
Please feel free to subscribe my blog if you are interested.
25 July 2009
Warning! Some words may be offensive
10x — thanks
1- Bye, Goodbye
1337 (written in ASCII) - From the word Leet, derived from the word elite
2 - too, or to
4 - For
AYBABTU (also abbreviated as AYB) - All your base are belong to us (from the video game Zero Wing)
AFK - Away from keyboard
ASAP - As soon as possible
AFAICR/S/T - As far as I can recall / remember / see / tel
AFAIK - As far as I know
ANFSCD - And Now For Something Completely Different. Used to change the subject of conversation.
ASL - Age / sex / location
ATEOTD - At The End of the Day
ATM - At the moment
AWOL - Absent Without (Official) Leave
B2B - Business to Business
B& and/or B7- Banned
BBIAB - Be back in a bit
BBL/S - Be back later / shortly / soon
BCNU - Be seein' you
Blog - Also known as web log or an online journal
BOFH - ~censored~ operator from hell
Bot - Any type of automated software in chatrooms and web-cataloging software
BRB - Be right back
BSOD - Blue Screen of Death
BTDT - Been there done that
BTW - By the way
Bump - Increment (For example, C's ++ operator.)or a backronym for "Bring Up My Post"
Crawl - To retrieve a web page along with the hyperlinks that reference it
Crapplet - A poorly written computer application
CU - See you (later)
CYA - See ya OR Cover Your Ass
Cyber (prefix) - A term used to connect the subsequent word loosely to the world of computers or the Internet or sex over a computer
Cyberspace - Virtual reality, the Internet, the World Wide Web, and other kinds of computer systems. Science fiction author William Gibson popularized the term in his novel Neuromancer. Gibson used the word to describe a virtual world of computer networks that his cyberpunk heroes 'jacked into'
DFTT - Don't feed the trolls
DGAF - Don't Give A ~censored~
DIAF - Die in a fire
DILLIGAF/D/S - Does it look like I give a flip / ~censored~ / damn / shit
DND - Do not disturb
DOA - Dead on arrival. Refers to hardware that is broken on delivery.
EOF - End Of File
EOM - End of Message
EOL - End of Life. Device or hardware that is at the end of its product life cycle.
EQ - EverQuest
ETA - Estimated time of arrival
FAQ - Frequently Asked Question(s)
FFS - For ~censored~'s sake
Flamer - Someone who makes inflammatory, abusive or directly offensive comments. Similar to, but not quite the same as an Internet troll
FMCDH - From My Cold Dead Hands
FOAD - ~censored~ off and die
FOAF - Friend of a friend
FTL - For the loss
FTW - For the win
FU - ~censored~ you
FUBAR - ~censored~ up beyond all recognition / repair (from military slang; pronounced "foo-bar")
FUD - Fear, Uncertainty and Doubt (the purposeful spread of misinformation)
FWIW - For what it's worth
FYI - For your information
GBTW - Get back to work
GF - Great/good fight/girlfriend
GFU - Good for you
GFY - Go ~censored~ yourself
GG - Good game, used at or near the conclusion of a gaming match
GJ - Good job, often used in online gaming when a teammate performs an act benefitting his team, such as killing an opponent or enabling that kill
GMTA - Great minds think alike
Godwin's Law - Dictates that the longer a thread, the more likely someone will post a comparison involving Nazis or Hitler
Gratz - Congratulations
GTFO - Get the ~censored~ out
GTG or G2G - 'Got to go' or 'Good to go'
GR -Good Race
GR8 - Great
HAND - Have A Nice Day
Handle - Name used in online chat, (AKA nick(name), alias, screen/user name)
HF - Have fun
Haxor or H4x0r (1337) - Hacker
Hit - A request made to the web server, (noun) the results of an internet search, (verb) loading a Web page. Hits are not equivalent to visitors of a webpage.
Home page - The website's introduction page, starting point, and guide. The technical term is "index"
Hot list - A collection of publicly available URLs (World Wide Web site addresses), sometimes available as text files.
HTH - Hope this / that helps
H8 - Hate
IANAL - I am not a lawyer
IBTL - In before the lock
IDC - I don't care
IDK - I don't know
IIRC - If I recall / remember correctly
IIUC - If I understand correctly
IMO/IMHO/IMNSHO/IMAO - In my (humble / honest / not so humble / arrogant) opinion
Information superhighway - The Internet (AKA: I-way, infobahn)
IONO - I don't know
IOW - In other words
IRC - Internet Relay Chat
IRL - In real life
ITYM - I Think You Mean
IWSN - I want sex now
IYKWIM - If you know what I mean
Jaggy - Aliased computer graphics
JK or j/k - Just kidding, or joke
JFGI - Just ~censored~/Freaking Google It
k or kk - OK
KISS - Keep it simple stupid.
KS(ing) - Kill-Steal(ing)
KOS - Kill on sight
KTHX - OK, thanks
KTHXBAI or KTHXBYE - OK, thanks, goodbye, used either to cut short a conversation or to express displeasure with being cut short
L2P - Learn to play; an admonishment to MMORPG players who are incompetent and/or whine
L8R - Later, L8R also sometimes abbreviated as L8ER is commonly used in chat rooms and other text based communications as a way of saying good bye.
Lag - Slang term for slow Internet speeds or high Internet latency; Lag is sometimes due to a server problem, but more frequently due to the connection between client and server. A slow or intermittent connection may often be referred to as laggy
Lamer - A know-nothing, one who is lame.
Leet - Often spelled as l33t or 1337 in ASCII form. It originally meant elite
LFG - Looking for group
LFM - Looking for more
LM(F)AO - Laughing my (frigging) ass off
LMIRL - Let's meet in real life.
LMK - Let me know
LOL - Laughing out loud, laugh out loud
LTNS - Long time no see
Lurker - Someone who frequents a Usenet group without participating in discussions
MMORPG, MMO - Massive Multi-player Online Role Playing Game
MMOFPS - Massive Multi-player Online First Person Shooter
MOTD - Message of the day
MS - MapleStory, an MMORPG
MTFBWY - May The Force be with you
MUD - Multi-User Dungeon
MUSH - Multi-User Shared Hallucination
MYOB - Mind your own business
M8 - Mate
NE1 - "Anyone"
NFI - "No ~censored~ Idea"
Newbie, noob, or n00b - An inexperienced user of a system or game,or an annoying person.
NIFOC - Naked In Front Of Computer
NM - (Sometimes written N/M) Not much, Never mind or no message, used on message boards or in e-mails to indicate that everything is already said in the subject line.
NP - No problem
NSFW - Not safe for work. Warning about content that may get the viewer in trouble with his employer or co-workers.
NVM, NVMD, or nm - Nevermind, not much
O RLY - Oh really?
OIC - Oh, I see
OFN - Old ~censored~ news
OMG - Oh my god
OMFG - Oh my ~censored~ god
OMW - On my way or Oh my word
OP - Original poster / Operator / Outpost
OS - Operating system
OT - Off topic
OTOH - On the other hand
OTP - On the phone or One true pairing
P2P - Peer to peer, or pay to play
PAW - Parents are watching
PEBKAC/PEBCAK - Problem exists between keyboard and chair
Ping - From the popular network monitoring tool, used as a greeting similar to "Are you there?".
PITA - Pain in the arse / ass
PLMK - Please let me know
PMSL - Pissing myself laughing
POS - Piece of shit, or parent over shoulder.
POTS - Plain old telephone service
POV - Point of view
PPL - People
PTKFGS - Punch the Keys For God's Sake
pr0n - Intentional misspelling of porn
PW - Persistent World (gaming)
pwned - Intentional misspelling of owned
QFT - Quoted for truth. Used on internet message boards to show agreement from a previous message
Rehi (or merely re) - Hello again
RL - Real Life
RO(T)FL - Rolling on (the) floor laughing
RO(T)FLMAO - Rolling on (the) floor laughing my ass off
RO(T)FLOL - Rolling on (the) floor laughing out loud
RSN - Real soon now (used sarcastically)
RTFB - Read the ~censored~ binary (or book)
RTFS - Read the ~censored~ source
RTFM/RTM - Read the (~censored~) manual
SCNR - Sorry, could not resist
sk8/sk8r - skate/skater
Smiley - Another name for emoticons
SMH - Shaking my head
SNAFU - Situation normal: all (~censored~/fouled) up
Snail mail - Normal paper mail service
SOHF - Sense of humor failure
Spider - The program behind a search engine
STFU - Shut the ~censored~ up
STFW - Search the ~censored~ web
TANSTAAFL - There ain't no such thing as a free lunch
TBF - Time between failures
TBH - To be honest
TG - That's great
TGIF - Thank god it's Friday
TH(N)X, TNX or TX - Thanks
TIA - Thanks in advance
TINC - There Is No Cabal, a term discouraging conspiracy theories
TMI - Too much information
TOS - Terms of service
TTBOMK - To the best of my knowledge
TTFN - Ta ta for now
TTT - To the top, used in forums to bump a thread
TTYL - Talk to you later (also spelled TTUL, T2UL or T2YL)
TTYTT - To Tell You The Truth
Tweedler - One who has deep love for all computer related technology and gadgets
TWIMC - To Whom It May Concern
TY - Thank you
TYT - Take your time
TYVM - Thank you very much
U - You
UTFSE - Use the ~censored~ search engine
w00t, w00T or WOOT - First two express exuberance, the latter is a backronym for the term "We Own the Other Team".
W/ or W/O - With or without
WB - Welcome back
W/E - Whatever
WRT - With respect / regard to
WTB - Want to buy
WTF - What the ~censored~
WTG - Way to go
WTH - What the hell
WTS - Want to sell
WTT - Want to trade
WUG - What you got?
WoW - World of Warcraft (game)
WUBU2 - What (have) you been up to?
WUU2 - What (are) you up to?
WYSIWYG - What you see is what you get
W8 - Wait
YARLY - Yeah Really
YHBT - You have been trolled
YKW - You know what?
YMMV - Your mileage may vary.
YTMND - You're The Man Now, Dog
YW - You're welcome.
YOYO- You're On Your Own.
ZOMG - An intentional misspelling of the acronym shorthand for "Oh My God/Gawd" and pronounced "Zoh My God/Gawd" This version is mainly used in jest or to ridicule people who use abbreviations like OMG and OMFG
This is it friends, Thanks for reviewing this article, I hope you found the information useful and to of great use.
This is how you can download everything for free like Q&A's and Study Guides DIRECTLY from www.actualtests.com. I did not figure this on my own, so I cant take the credit.
But I had to share it as I have gotten a lot of useful stuff from here on .
First thing, go here to make sure that the Q&A or Study Guide that you are seeking is offered by ActualTests.com:
If you don't do this, and just try to download a A&A or Study Guide and get an error, that means they don't offer it.
To download the Q&As:
1. Register as a new member at www.actualtests.com so that you could login. Login normally using your newly created account.
2. Once you are in, copy and paste this link:
Also try this link if that one doesn't work:
3. Replace xxx-xxx.zip with the exam code you want (based on the exam number/code. Also replace the hxxp with http.)
For example, to download CCNA Q&A, put in 640-801.
To download MCSE Windows XP, use 070-270.
Note that cause MS uses a 2 digit number at the start, you need to put an extra 0 at the beginning.
To download the Study Guides:
2. Use this URL
3. Replace the xxx-xxx with the code for your exam, as in the above example. Be sure to leave in the "sg" part as its needed. Stands for Study Guide btw.
This will give you the most up to date material to study from, as its directly from the site. Don't know how long it will last, so get all you need.
One other thing. I downloaded Testking's version 34 for 70-270 (not from ActualTests.com, obviously) and noticed that Testking and ActualTests have the EXACT PRACTICE QUESTIONS.
I think that TK might have copied it from AT, as TK is rife with grammatical mistakes. However, if you don't have the TK, this will be very useful to you.
11 June 2009
Here I have described a few techniques that I use in Google search engine. They have been collected from various help pages, chat rooms and books. If you find any error please point it out.
Check it out below : -
Type in '2+2' or '2 plus two' or any sum and the calculator will give you the result.
Type in 'define' followed by a word or a group of words. Google will give you an accurate definition.
Type in '$5 in ¥' and the $5 will be converted to Yen.
Type in 'Weather London' and Google will display the forecast for the next few days.
Type in a full address and Google will display it on a map.
Type in a keyword, followed by 'site:' and a full URL of a website. Google will search for that keyword in the site you entered.
Search By Number
Simply enter a number, such as a UPS or ParcelForce ID and Google will return the latest information about your package.
I'm Feeling Lucky Button
Google will automatically redirect you to the first result in your query.
Enter a keyword, followed by ':' and it's filetype. Google will display results related to the keyword and in the filetype you entered. You can also view the results in HTML.
That's it!! which i know .....Thanks a lot for reading this post !!
06 June 2009
To speed up your hard disk speed we need to configure a special buffer in the computer's memory in order to enable it to better deal with interrupts made from the disk.
This tip is only recommended if you have 256MB RAM or higher.
Follow these steps:
- Run SYSEDIT.EXE from the Run command.
Done. Speed improvement will be noticed after the computer reboots.
Update: The most speed improvement is visible with IDE drives, however there are reports that this tweak also does good for SCSI disks. In any case, it won't harm your system, so why not try it yourself and let me know what you find.
02 April 2009
Simple Follow these steps: -
1. Open 'Windows Task Manager' (Ctrl+Alt+Del)
2. Click 'Shutdown' (at the top next to 'Help')
3. Then HOLD the 'Ctrl' key and Select 'Turn Off'.
4. ...5...4....3....2...1....You PC turns off immediately. I always do this when I'm in a rush etc.. It doesn't effect the PC.
Hope this trick is helpful to you!!!
31 March 2009
Even today the right message at the right time can lead to sweet success of business.
Want money? A promotion? To sell something? Explain something? Then write a good letter for your business.
Letter writing is not a lost art. Just a forgotten one. The principles still exist. If you try them, you’ll see improvement in your next letter of your business.
Make a list of all the things you’d like to say. Look them over. Find any that don’t support your main cause, and cross them off without remorse.
Remember, the best business letters have a strong sense of purpose.
2. Get to the point early: - If your reader wanted a mystery, he’d be reading Raymond Chandler. A letter should tell whodunit in the first paragraph.
3. Put yourself in your reader’s place: - Think if the same letter came to you, how would you respond?
Therefore, be friendly. Be nice. And find ways to turn negative statements into positive ones of your business.
Keep your sentences short – one idea in each. Any sentence longer
Than two typed lines is automatically suspect.
5. Clear the deadwood: - Chop out words, sentences and even whole paragraphs if they don’t contribute. Work hard so your reader won’t have to.
In particular, cast a questioning eye on adjectives. They can sap the strength from your words, or stretch your credibility. As Voltaire put it, “The adjective is the enemy of the noun”.
6. Use active verbs: - Face it, the passive voice is wimpy. “A decision has been reached by the committee” wouldn’t last three rounds in the ring with “The committee has reached a decision”.
Also, your reader will sniff a cover up if you write: “Your order has
Been misplaced” instead of “I misplaced your order”. Courage!
7. Be Human: - Your business letter should like a conversation, not a decree.
Address your reader by name: “Dear Ms. Hartman”. And if you can fit it in naturally, use Ms. Hartman’s name once or twice in the body. You want her to know you wrote the letter just for her.
Whenever you can, use pronouns like I, we, and you. Especially you – It’s an arrow straight to your reader’s heart.
Devise a way to handle the problem in an upbeat manner. Your chances of success will multiply tenfold.
9. End it with and action step: - The last sentence of your business letter should suggest the reader’s next move. Or your own next move.
Resist the hat-in-hand, shuffling type of exit: “Again, thank you for…” or “If you have any problems. Please don’t hesitate to call.”
Instead, try closing with a plain and simple “Sincerely”, and your signature. It may be the perfect ending.
10. Be Professional: - The strongest business letter in the World can’t survive a bad presentation.
Set up a clean, logical format for your business letter. A crowded or over designed page will distract from your message.
11. Develop a regimen: - The keys to powerful correspondence are
a) Writing often and
b) Responding quickly.
IF it sounds like work, read on.
Unlike heavy-duty word processors, Quick Letter is designed to do one thing and one thing only – write letters fast.
Quick Letter’s built-in address book places your reader’s name and address into your letter, automatically.
Quick letter’s page preview displays your letter, vertically centered, in the format you’ve defined. Automatically.
Quick letter addresses any size envelope. Automatically.
And the list of features goes on. There you have it. All the secrets of brilliant business correspondence at your fingertips. Except one. And you can pick that up at your local software store.
I hope that u enjoyed reading the secrets of writing business letters !!
28 March 2009
Are you sick of spending more time each day weeding the spam out of your inbox? Get control of your inbox back with one of these top anti-spam software programs. While I've listed only single-use programs here, most of these anti-spam software programs also have multi-use license packages available. (A word of warning, though; these anti-spam software programs are designed to identify and block spam, not viruses. For virus protection, you will also want to install anti-virus software.)
EasyHits4U.com - Your Free Traffic Exchange - 1:1 Exchange Ratio, 5-Tier Referral Program. FREE Advertising!