This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Thursday, 15 May 2014

HOW TO INCREASE RAM (for windows xp,7,8)

For Windows XP users :

1. Goto ‘Properties’ of My Computer
2. Click on ‘Advance’ Tab
3. Under ‘Performance’ section click on
‘Settings’ button
4. Now Move to ‘Advance’ Tab
5. Under ‘Virtual memory’ Section click on
“Change” button
6. Now Select Drive “C” .
7. Select Option “Custom Size”
8. Set Initial Size (MB) to 5000 for 5GB 2000
for 2GB or Whatever suitable for you. We
will recommend you to keep at least 2000
9. Set Maximum Size to 5000 for 5GB, this
means 5GB of Local Disk C will be used as
Virtual Memory. Better keep it as High as
You can afford.
10. Click on “Set” Button
11. Perform this with all other Drives also
12. Click on “OK” Button
13. Again Click on “OK” Button
14. Again Click on “OK” Button That’s it.
==============================
========

For Windows 7 users:

1. Open ‘Properties’ of My Computer
2. Under the ‘System’ Window, click on
‘Advanced system settings’ from left panel.
3. In the ‘System Properties’, under
‘Performance’ section click on ‘Settings…’
4. Now move to ‘Advance’ tab, under
‘Virtual memory’ section click on ‘Change’
5. Uncheck ‘Automatically manage paging
file size for all drives’ option Rest follow the
same steps of Windows XP, above.
That’s it.
Once you save the settings, restart your PC.
After restarting the PC you will immediately
feel the difference in the speed.

Increase You Knowledge !!

The 404 or Not Found error message is a HTTP standard response code indicating that the client was able to communicate with the server, but the server could not find what was requested.

The web site hosting server will typically generate a "404 Not Found" web page when a user attempts to follow a broken or dead link; hence the 404 error is one of the most recognizable errors users can find on the web.

Another HTTP status codes list
--------------------------------------
100 Continue
101 Switching Protocols
102 Processing (WebDAV; RFC 2518)
200 OK
201 Created
202 Accepted
203 Non-Authoritative Information (since HTTP/1.1)
204 No Content
205 Reset Content
206 Partial Content
207 Multi-Status (WebDAV; RFC 4918)
208 Already Reported (WebDAV; RFC 5842)
226 IM Used (RFC 3229)
300 Multiple Choices
301 Moved Permanently
302 Found
303 See Other (since HTTP/1.1)
304 Not Modified
305 Use Proxy (since HTTP/1.1)
306 Switch Proxy
307 Temporary Redirect (since HTTP/1.1)
308 Permanent Redirect (approved as experimental RFC)[12]
400 Bad Request
401 Unauthorized
402 Payment Required
403 Forbidden
404 Not Found
405 Method Not Allowed
406 Not Acceptable
407 Proxy Authentication Required
408 Request Timeout
409 Conflict
410 Gone
411 Length Required
412 Precondition Failed
413 Request Entity Too Large
414 Request-URI Too Long
415 Unsupported Media Type
416 Requested Range Not Satisfiable
417 Expectation Failed
418 I'm a teapot (RFC 2324)
419 Authentication Timeout (not in RFC 2616)
420 Method Failure (Spring Framework)
420 Enhance Your Calm (Twitter)
422 Unprocessable Entity (WebDAV; RFC 4918)
423 Locked (WebDAV; RFC 4918)
424 Failed Dependency (WebDAV; RFC 4918)
424 Method Failure (WebDAV)[14]
425 Unordered Collection (Internet draft)
426 Upgrade Required (RFC 2817)
428 Precondition Required (RFC 6585)
429 Too Many Requests (RFC 6585)
431 Request Header Fields Too Large (RFC 6585)
440 Login Timeout
444 No Response (Nginx)
449 Retry With (Microsoft)
450 Blocked by Windows Parental Controls (Microsoft)
451 Unavailable For Legal Reasons (Internet draft)
451 Redirect (Microsoft)
494 Request Header Too Large (Nginx)
495 Cert Error (Nginx)
496 No Cert (Nginx)
497 HTTP to HTTPS (Nginx)
499 Client Closed Request (Nginx)
500 Internal Server Error
501 Not Implemented
502 Bad Gateway
503 Service Unavailable
504 Gateway Timeout
505 HTTP Version Not Supported
506 Variant Also Negotiates (RFC 2295)
507 Insufficient Storage (WebDAV; RFC 4918)
508 Loop Detected (WebDAV; RFC 5842)
509 Bandwidth Limit Exceeded (Apache bw/limited extension)
510 Not Extended (RFC 2774)
511 Network Authentication Required (RFC 6585)
522 Connection timed out
524 A timeout occurred
598 Network read timeout error (Unknown)
599 Network connect timeout error (Unknown)

Sunday, 11 May 2014

Delete Virus Without Any Software

Delete Virus Without any Software 

Asslamu A'laikum

aj jo tip share karne jaa raha hu ye tip mere boht kaam i
socha ap sub se b share kar du..

waise mera irada tha k ye thread urdu mai post karu.. i know k moderators naraz honge lekin.. ek to der ho jaye gi share karne mai 2nd mere exams start hone wale hain so time nahi hai or na he milay ga ab 2 months...
koi bhai isko urdu mai kar de to acha rahe ga, beshak ye mere wali delete ho jaye...

aksar hamare pc mai autorun.inf wala virus or kuch exe files k sath viruses aa jate hain
hum boht koshish karte hain lekin delete nahi hote, ho b jayen to phir aa jate hain
hum koi software jaise k winrar wagera use karte hain lekin ho sakta hai software wali cd ya usb mai b virus ho..
so in tamam cheezon se bachne k lye apko ye tip azmani hogi

sub se pehle drive C format kar lein, phir jab window ho jaye to My Computer kholen or begair kisi drive khole Folder Option mai jaa k show hidden files ko check kar dein or My Computer close kar dein
ab Ctrl+Alt+Delete press karen
waha pehla tab Applications or doosra Processes ka hoga
Processes pe click kar dein
waha explorer.exe likha hoga, us pe right click kar k End Process kar dein
ab desktop pe sub kuch gaib ho jaye ga
Ab Applications wale tab be click karen, wahan neechay New Task pe click karen or Browse pe click kar dein
phir ek window khulay gi waha se apni sari drives kholen or hidden files show hui hongi autorun.inf or doosri *.exe hidden files
inko select kar k Shift+Delete press kar k delete kar dein
ab us window ko close kar dein or jaha pe ap ne browse kia tha waha "explorer.exe" likh k ok press kar dein
lein g viurs khatam ho gya

Basic Guide to the Internet

The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.


--------------------------------------------------------------------------------

COMPONENTS OF THE INTERNET


--------------------------------------------------------------------------------

WORLD WIDE WEB
The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.

The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.

The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.

Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.

The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.

The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.

For more complete information about the World Wide Web, see Understanding The World Wide Web.

E-MAIL
Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.

A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.

TELNET
Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.

Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.

With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.

FTP
FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.

If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.

FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. 
E-MAIL DISCUSSION GROUPS
One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.

A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. 

Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.

What Is FireWall?

What is Firewall -Introduction to
Firewalls
Introduction to firewalls
When you use internet in your
college/school/office , You may not be
access some websites, right? Do you
know how they block those websites?
They use firewalls for block websites.
Firewall prevent the system from
hackers attack. Lets us know what is
firewall.
What is Firewall?
Firewall is working like a security
guard standing outside the office.
Usually, What the security guard do?
He will allow those who has identity
card and block those who has not the
identity card. Right? Likewise, The
firewall will block unauthorized access
to the system.
Firewall may be a software or
hardware. It will work based on the set
of rules defined by the administrator.
Using Firewall administrator can block
certain website from being accessed.
All traffic from inside and outside of
the network must pass through the
firewall.
Only authorized traffic will be allowed
to pass (based on the set of rules)
Types of Fire Walls
Packet Filtering
Application level gate way
Circuit level gate way.
Packet Filtering (Network Layer)
A packet filtering router applies a set
of rules to each incoming IP packet and
then forwards or discards the packets.
Router is configured such that it can
filter incoming and outgoing packets.
The packets will filtered based on the
source and destination IP address.
IP spoofing attack is possible in this
packet filtering. IP spoofing can be
achieved by changing the source IP
address of packets.
Stateful Inspection Firewalls
A stateful inspection packet filters
tightens the rules of TCP traffic by
creating a state table of out bound TCP
connection. If the packet matches with
existing connection based on the state
table, it will be allowed. If it does not
match, It will be evaluated according to
the rule set for new connections.
Application Level Gateway
Application level gateway is also
known as proxy server. The user
communicate with the gateway using
application layer of TCP/IP stack. The
gateway asks the user for the name of
the remote host to be connected.
When the user enters valid user ID,
gateway will give access to the remote
application. This will block the
malicious activity and correct the
application behavior. This will ensure
the safety of company.
More secure than packet filtering. Easy
to log and audit all incoming traffic at
the application level. Application-level
filtering may include protection
against spam and viruses as well, and
be able to block undesirable Web sites
based on content rather than just
their IP address.
Circuit Level Gateway
The circuit level gateway works at
session layer of OSI model. Monitor
TCP handshaking between packets to
make sure a session is legitimate.
Traffic is filtered based on the session
rules. Circuit-level firewalls hide the
network itself from the outside, which
is useful for denying access to
intruders. But they don't filter
individual packets. This firewall is used
when the administrator trusts internal
users.
Why Firewall?
Firewall block unauthorized users,
prohibits vulnerable services from
entering or leaving the network.
Protection from IP spoofing and
routing attacks.
Protection against Remote login,
Trojan backdoor, Session hijacking,
cookie stealing,etc.
Limitation of Firewalls
The firewall cannot protect against
attacks that by pass the firewall.
The firewall does not protect against
internal threats
The firewall cannot protect against
the transfer of virus infected programs
(or) files. It would be impossible for the
firewall to scan all incoming files,
emails for viruses.

Thursday, 8 May 2014

Remove Rar file Password...

How to remove WinRAR/RAR Archives Password for download unknown files
I recommend a tool to fix your problem.
Tips: This guide is to introduce you the easiest way to use RAR Password Recovery 5.0. Detailed information is available on the “Help” file integrated in the program, please refer to it if any inquiries.
Step 1: Click “Open” button in the Menu or the “Open” button to browse the full path of the WinRAR/RAR.

Select your WinRAR/RAR file in the Open File window, and click “Open”.

Step 2: On the “Recovery” tab, select “Brute-force Attack (Trying All Possible Combinations)”.

Step 3: Click “Start” button in the Menu to initiate the program.

Step 4: The program is processing for the password. Some time later, a message box pops up to you, displaying the expected password. Click “OK”.


DOWNLOAD LINK                http://www.recoverlostpassword.com/downloads/rar_password_recovery_trial.exe


Monday, 5 May 2014

Advantages and disadvantages of 3G

Third-generation, or 3G, technology is a wireless network technology that is commonly utilized in smart phones like iPhones and Blackberries etc. While its predecessor, second-generation (2G) technology, was formulated around voice applications (like talking, call-waiting and voicemail), 3G technology puts a strong emphasis on Internet and multimedia services, such as web browsing, video conferencing and downloading music. And while there are several advantages to 3G, the technology also comes with its disadvantages.

Advantages and Disadvantages of 3G


Advantages of 3G:


Overcrowding is relieved in existing systems with radio spectrum
Bandwidth, security and reliability are more
Provides interoperability among service providers
Availability of fixed and variable rates
Support to devices with backward compatibility with existing networks
Always online devices – 3G uses IP connectivity which is packet based
Rich multi media services are available

Disadvantages of 3G:


The cost of cellular infrastructure , upgrading base stations is very high
Needs different handsets.
Roaming and data/voice work together has not yet been implemented
Power consumption is high
Requires closer base stations and are expensive
Spectrum-license costs, network deployment costs and handset subsidies subscribers are tremendous.

Nokia Hack Codes!

Imagine ur cell battery is very low, u r expecting an important call and u don't have a charger.

Nokia instrument comes with a reserve battery. To activate, key is "*3370#"

Ur cell will restart with this reserve and ur instrument will show a 50% incerase in battery.

This reserve will get charged when u charge ur cell next time.

*3370# Activate Enhanced Full Rate Codec (EFR)-Your phone uses the best sound quality but talk time is reduced by approx. 5%
#3370# Deactivate Enhanced Full Rate Codec( EFR)


*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound
but you should gain approx 30% more Talk Time
*#4720# Deactivate Half Rate Codec

2 *#0000# Displays your phones software version,

1st Line :S oftware Version,
2nd Line : Software Release Date,
3rd Line : Compression Type
3 *#9999# Phones software v ersion if *#0000# does not work

4 *#06# For checking the International Mobile Equipment Identity (IMEI Number)

5 #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

6 #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

7 #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

8 #pw+1234567890+4# SIM Card Lock Status.(use the "*" button to obtain the "p,w" and "+" symbols)

9 *#147# (vodafone) this lets you know who called you last *#1471# Last call (Only vodofone)

10 *#21# Allows you to check the number that "All Calls" are diverted To

11 *#2640# Displays security code in use


12 *#30# Lets you see the private number

13 *#43# Allows you to check the "Call Waiting" status of your phone.

14 *#61# Allows you to check the number that "On No Reply" calls are diverted to

15 *#62# Allows you to check the number that "Divert If Unrea chable(no service)" calls are diverted to

16 *#67# Allows you to check the number that "On Busy Calls" are diverted to

17 *#67705646#R emoves operator logo on 3310 & 3330

18 *#73# Reset phone timers and game scores

19 *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it
means you will get the best standby time possible

20 *#7760# Manufactures code

21 *#7780# Restore factory settings

22 *#8110# Software version for the nokia 8110

23 *#92702689# (to rember *#WAR0ANTY#)

Displays -
1.Serial Number,
2.Date Made
3.Purchase Date,
4.Date of last repair (0000 for no repairs),
5.Transfer User Data.
To exit this mode -you need to switch your phone off then on again

24 *#94870345123456789# Deactivate the PWM-Mem

25 **21*number# Turn on "All Calls" diverting to the phone number entered

26 **61*number# Turn on "No Reply" diverting to the phone number entered

27 **67*number# Turn on "On Busy" diverting to the phone number entered

Each command is prefixed with either one or two * or # characters as follows:
** Register and Activate
* Activate
## De-Register (and Deactivate)
# Deactivate
*# Check Status
? Call button



Once each command has been entered, if it is a network command (as opposed to a local handset command) it must be transmitted to the network by pressing the YES (receiver) key which acts as an enter key - this is represented here with the ? character. Always enter numbers in full international format +CountryAreaNumber ( e.g. +447712345678).

Command Description Command String
Security
Change call barring code **03*OldCode*NewCode*NewCode#?
Change call barring code **03*330*OldCode*NewCode*NewCode#?
Change PIN code **04*OldPIN*NewPIN*NewPIN#?
Change PIN2 code **042*OldPIN2*NewPIN2*NewPIN2#?
Unlock PIN code (when PIN is entered wrong 3 times) **05*PUK*NewPIN*NewPIN#?
Unlock PIN2 code (when PIN2 is entered wrong 3 times) **052*PUK2*NewPIN2*NewPIN2#?
Display IMEI *#06#
Call Forwarding (Diversions)
De-register all call diversions ##002#?
Set all configured call diversions to number and activate **004*number#?
De-register all configured call diversions (no answer, not reachable, busy) ##004#?
Unconditionally divert all calls to number and activate **21*number#?
Activate unconditionally divert all calls *21#?
De-register unconditionally divert all calls ##21#?
Deactivate unconditionally divert all calls #21#?
Check status of unconditionally divert all calls *#21#?
Divert on no answer to number and activate **61*number#?
Activate divert on no answer *61#?
De-register divert on no answer ##61#?
Deactivate divert on no answer #61#?
Check status of divert on no answer *#61#?
Divert on not reachable to number and activate **62*number#?
Activate divert on not reachable *62#?
De-register divert on not reachable ##62#?
Deactivate divert on not reachable #62#?
Check status of divert on not reachable *#62#?
Divert on busy to number and activate /td> **67*number#?<
Activate divert on busy *67#?
De-register divert on busy ##67#?
Deactivate divert on busy #67#?
Check status of divert on busy *#67#?
Change number of seconds of ringing for the given service before diverting a call (such as on no answer). Seconds must be a value from 5 to 30. De-registering the same divert will also delete this change! **service*number**seconds#? (Service numbers, see below)
Call barring
Activate barr all outgoing calls (see Security to set code) **33*code#?
Deactivate barr all outgoing calls #33*code#?
Check status of barr all outgoing calls *#33#?
Activate barr all calls **330*code#?
Deactivate barr all calls #330*code#?
Check status of barr all calls /td> *#330*code#?<
Activate barr all outgoing international calls **331*code#?
Deactivate barr all outgoing international calls #331*code#?
Check status of barr all outgoing international calls *#331#?
Activate barr all outgoing international calls except to home country **332*code#?
Deactivate barr all outgoing international calls except to home country #332*code#?
Check status of barr all outgoing international calls except to home country *#332#?
Activate barr all outgoing calls **333*code#?
Deactivate barr all outgoing calls #333*code#?
Check status of barr all outgoing calls *#333#?
Activate barr all incoming calls **35*code#?
Deactivate barr all incoming calls #35*code#?
Check status of barr all incoming calls *#35#?
Activate barr all incoming calls when roaming **351*code#?
Deactivate barr all incoming calls when roaming #351*code#?
Check status of barr all incoming calls when roaming *#351#?
Activate barr all incoming calls **353*code#?
Deactivate barr all incoming calls #353*code#?
Check status of barr all incoming calls *#353#?
Call waiting
Activate call waiting *43*#?
Deactivate call waiting #43##?
Check status of call waiting *#43#?
Calling Line Identification
The following only works if CLIP and CLIR are enabled (ask your service provider)
CLIP: Presentation of the number of the incoming call
Activate CLIP **30#?
Deactivate CLIP ##30#?
Check status of CLIP *#30#?
CLIR: Presentation of one's own number to the to the called party
Activate CLIR **31#?
Activate CLIR for the actual call *31#number?
Deactivate CLIR ##31#?
Deactivate CLIR for the actual call #31#number?
Check status of CLIR *#31#?
COLP: Presentation of the actual number reached (if number called was diverted to another number
Activate COLP *76#?
Deactivate COLP #76#?
Check status of COLP *#76#?
COLR: Presentation of the original number called by the calling party (if the call was diverted to this cellphone)
Activate COLR *77#?
Deactivate COLR #77#?
Check status of COLR *#77#?

Short Keys for Excel

Action------- Excel shortcut
Alternates between displaying cell values and displaying formulas in the worksheet. CTRL+`
Alternates between hiding objects, displaying objects, and displaying placeholders for objects. CTRL+6
Applies or removes bold formatting CTRL+2
Applies or removes bold formatting CTRL+B
Applies or removes italic formatting CTRL+3
Applies or removes italic formatting CTRL+I
Applies or removes underlining CTRL+4
Applies or removes underlining CTRL+V 
Applies the Currency format with two decimal places CTRL+$
Applies the Date format with the day, month, and year CTRL+#
Applies the Exponential number format with two decimal places CTRL+^
Applies the General number format CTRL+~
Applies the Number format with two decimal places, thousands separator, and minus sign (-) for negative values CTRL+!
Applies the outline border to the selected cells CTRL+&
Applies the Percentage format with no decimal places CTRL+%
Applies the Time format with the hour and minute, and AM or PM CTRL+*
Calculates all worksheets in all open workbooks, regardless of whether they have changed since the last calculation CTRL+ALT+F9
Calculates all worksheets in all open workbooks F9
Calculates the active worksheet SHIFT+F9
Closes and reopens the current task pane CTRL+F1
Closes the selected workbook window CTRL+F4
Closes the selected workbook window CTRL+X 
Copies the selected cells CTRL+C
Copies the value from the cell above the active cell into the cell or the Formula Bar" CTRL+"
Creates a chart of the data in the current range ALT+F1
Creates a chart of the data in the current range F11
Cuts the selected cells CTRL+Y
Displays or hides the outline symbols CTRL+8
Displays or hides the Standard toolbar CTRL+7
Displays the Create List dialog box. CTRL+N Creates a new, blank file CTRL+L
Displays the Delete dialog box to delete the selected cells CTRL+-
Displays the Find and Replace dialog box CTRL+H
Displays the Format Cells dialog box CTRL+1
Displays the Go To dialog box CTRL+G
Displays the Go To dialog box F5
Displays the Help task pane F1
Displays the Insert dialog box to insert blank cells CTRL++
Displays the Insert Function dialog box SHIFT+F3
Displays the Macro dialog box to run, edit, or delete a macro ALT+F8
Displays the Microsoft Office Clipboard CTRL+C
Displays the Open dialog box to open or find a file CTRL+O
Displays the Print dialog box CTRL+R 
Displays the Save As dialog box F12
Displays the shortcut menu for a selected item SHIFT+F10
Displays the Spelling dialog box to check spelling in the active worksheet or selected range F7
Edits a cell comment SHIFT+F2
Enters the current date CTRL+;
Enters the current time CTRL+:
Hides the selected columns CTRL+0
Hides the selected rows CTRL+9
Including cells not marked as needing to be calculated CTRL+F9 
Inserts a new worksheet ALT+SHIFT+F1
Inserts a new worksheet SHIFT+F11
Maximizes or restores the selected workbook window CTRL+F10
Minimizes a workbook window to an icon F10
Pastes a defined name into a formula F3
Removes the outline border from the selected cells CTRL+_
Repeats the last command or action, if possible CTRL+Z
Repeats the last command or action, if possible F4
Restores the window size of the selected workbook window CTRL+F5
Saves the active file with its current file name and location CTRL+S
Selects all cells that contain comments CTRL+SHIFT+O
Selects the current region CTRL+A
Selects the entire worksheet CTRL+A CTRL+A (two times)
Undo command CTRL+U
Unhides any hidden columns within the selection CTRL+

How to delete administrator password without any software

How to "Delete administrator Password" without any software
Method 1

Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2

Step 1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer :-)

Sunday, 4 May 2014

SuperEasy SpeedUp 1.06

SuperEasy SpeedUp is a modern, particularly capable and intuitively operable tuning suite for the smaller budget. Equipped with carefully programmed performance modules that are at least equal to those of (expensive) competitors, you can challenge a current as well as a premature drop in efficiency. The whole system gets a 'rejuvenation cure' so that the installation often becomes better than the original one. SuperEasy SpeedUp lifts the speed limits of the past and brings your Windows to top form - without loosing carefully elaborated settings and without having to install programs and system anew.
SuperEasy SpeedUp
- stabilises your PC
- accelerates your system through effective system cleaning
- improves the PC-performance through fast analysis- and cleaning tools
- leaves behind obsolete data
- prolongs the service life of your computer
- restores precious storage capacity through data carrier cleaning
- removes well-known Windows-decelerations

With SuperEasy SpeedUp you get your Windows going and elicit more performance from your PC. Garbage data no longer blocks you hard disks and main memory or slows down your computer.

SuperEasy SpeedUp is a tool box for Windows-optimization, which consists of different modules. The System Scan tool checks your system and cleans it in manifold manner. The DriveCleaner removes superfluous data from your hard disks; the RegistryCleaner cleans your system from decelerating entries and the InternetCleaner removes revealing surf traces. Other modules optimize your hard disk access, scan unnecessary autostart entries and disclose the services that Windows loads to the memory during boot up.

As a result, you purify your whole system, get back valuable memory space and speed up future starts.

Other features
- intuitively operable surface with common start view for all modules
- easiest operation
- optimum adjustability
- fast execution times

[COLOR="MediumTurquoise"]System requirements[/
COLOR]

- Windows XP/Vista
- .NET Framework Version 2.0 (is automatically installed if not yet available)
- 256 MB RAM
- Pentium-compatible processor
- Mouse
Name:  g.gif
Views: 95
Size:  23.9 KB
Link
http://www.4shared.com/file/109428390/a167cd09/SuperEasy_SpeedUp_v106.html

How to remove micro sd memory card password

1:

1. Download and Install FExplorer 
http://www.gosymbian.com/FE_download.html
2. Insert your card into your phone, without accessing it through the phone
3. Run FExplorer and Open the path C:\system
4. Find the file called mmcstore, and rename it mmcstore.txt
5. Copy that file (mmcstore.txt) to your PC and open it in Notepad
6. Your password will be located within that file.

2:

1. Download and Install X-Plore 
http://en.kioskea.net/download/download-10092-x-plore
2. Now open the X-Plore and press Zero(0) then check you have marked the "Show the System Files".
3. After you done the above step now go to the file: C:/Sys/Data/Mmcstore
4. If you found the above path then press the option "3" to set the Hex-Viewer.
5. Now look the third column you can see the code like ! TMSD02G (c ??”? x???3?3?3?3?3) Now see the characters between '?' because it is your password 33333.
6. You mayn't able to access the path file: C:/Sys/Data/Mmcstore if you don't set the password for the memory card. 

3:

For Micro SD:
Put the card in any E series mobile or N95 etc and format it.
It will not ask for a password.


4:

1. Go to file manager on your mobile 
2. In Settings choose system folders, 
3. In the System folder, find a file called mmcstore 
4. Send the file to your PC using IR/Bluetooth 
5. Open the file in Notepad 
6. The password you need for your memory card is located within that file

Keyboard Tricks

Alt Key + Calculator Number = Symbol.

To create the ® symbol Alt + 0174 = ®

Alt Key + Number = Symbol

130 = é [accent over e ]
0176 = ° [degrees for Temperature]
0169 = © [Copyright]
0174 = ® [Registered Trademark]
0153 = ™ [Trade Mark]
155 = ¢ [cent sign]
156 = £ [Pound Sterling]
0165 = ¥ [Japanese Yen sign]
0128 = € [Euro symbol]
0190 = ¾
171 = ½
172 = ¼
21 = §
144 = É [Capitalised accent over E]
241 = ±
246 = ÷
174 = «
175 = »
225 = ß
135 = ç
137 = ë
132 = ä
160 = á
133 = à
136 = ê
15 = ¤
170 = ¬
159 = ƒ
146 = Æ
145 = æ
129 = ü
253 = ² [Square sign]
350 = ^
352 = `
382 = ~
166 = ª
254 = ¦
249 = ·
152 = ÿ
142 = Ä
154 = Ü
230 = µ
0134 = † [dagger sign]
20 = ¶
195 = +
194 = -
168 = ¿
197 = +
0179 = ³ [cubic sign]
0161 = ¡

Make Calculator Icon on Screen

Make calculator icon on screen:

Right click on screen
>New
>Shortcut

type "calc" 
and next and see magic

Useful Mobile Commands Full Forms

SIM
Subscriber Identity Module
GSM
Global System for Mobile Communications
GPRS
General Packet Radio Service
MSISDN
Mobile Station Integrated Services Digital Network
ISDN
Integrated Services Digital Network
EDGE
Enhanced Data rates for Global Evolution
TDMA
Time Division Multiple Access
CDMA
Code Division Multiple Access
IVR
Interactive Voice Response
Bluetooth
A wireless personal area network (PAN) technology
MSC
Mobile Switching Center
MTSO
Mobile Telephone Switching Office
BTS
Base Transceiver Station
MMS
Multimedia Messaging Service
WAP
Wireless Application Protocol
SMS
Short Messaging Service
PIN
Personal Identification Number
AMPS
Advanced Mobile Phone System
BBS
Bulletin Board Service
CLI
Caller Line Identification
CeBIT
The world's largest telecommunications exhibition,
held in Hanover in Germany each spring
coax
A shortening of the term "coaxial cable". A type of shielded cable used between a mobile transceiver and its antenna
D-AMPS
D-AMPS has been renamed TDMA (Time Division Multiple Access).
DCS 1800
Digital Communications System based on GSM, working on a radio frequency of 1800 MHz. Also known as GSM1800 or PCN
DECT
Digital Enhanced Cordless Telecommunications
DTMF
Dual Tone Multi Frequency Signal
DTX
Disconnector Unit in a mobile phone that
automatically turns off the transmitter when you
are not talking. This saves your battery time
EFR
Enhanced Full Rate voice coding
EPOC
An operating system, designed especially for mobile use, being put forward by Ericsson, Nokia, Psion, Motorola and Matsushita.
ERMES
European Radio Messaging System
ETACS
Extended Total Access Communications System
GSM 1800
also known as DCS 1800 or PCN, GSM 1800 is a digital network working on a frequency of 1800 MHz. It is used in Europe, Asia-Pacific and Australia
GSM 1900
also known as PCS 1900, GSM 1900 is a digital
network working on a frequency of 1900 MHz. It is
used in the US and Canada and is scheduled for
parts of Latin America and Africa
GSM 900
GSM 900, or just GSM, is the world's most widely
used digital network and now operating in over
100 countries around the world, particularly in
Europe and Asia Pacific
NiCd
Nickel Cadmium (Handset Battery Type)
NiMH
Nickel Metal Hydride (Handset Battery Type)
PCN
Personal Communications Network
PCS 1900
Personal Communications Service working on a radio frequency of 1900 MHz.
PDC
Personal Digital Cellular
NAM
Number Assignment Module
PIN2
Personal Identification Number 2 - an authorization code which is used only for special services
PUK
Personal Unblocking Code
RLP
Radio Link Protocol
SIM card
Subscriber Identity Module Card
TACS
Total Access Communication System
TAPI
Telephone Application Programming Interface
PCU
Packet Control Unit
VOX
Voice Operated Transmitter
WCDMA
Wideband CDMA
URL
Uniform Resource Locator
HTTP
Hyper Text Transport Protocol
MHz
Mega Hertz - One million cycles per second
GHz
Giga hertz means one billion cycles per second
HLR
Home Location Register
HSCSD
High Speed Circuit Switch Data Service
USSD
Unstructured Supplementary Services Data
HTML
Hyper Text Markup Language
PDA
Personal Digital Assistant
IP
Internet Protocol
IP address
Internet Protocol address
CUG
Closed Users Group
GUI
Graphical user interface
CLI
Command Line Interface
TUI
Text User Interface
IMSI
International Mobile Subscriber Identity
HNI
The Home Network Identity
MCC
Mobile Country Code
IrDA
Infrared Data Association
AUC
Authentication Centre
VLR
Visitors Location Register
EIR
Equipment Identity Register
EMI/UCP
External Machine Interface/Universal Computer
Protocol
SMSC
Short Messaging Service Centre
MMSC
Multimedia Messaging System Centre
SMPP
Short message peer-to-peer
CIMD
Computer Interface to Message Distribution
OIS
Open Interface Specification
MVNO
Mobile Virtual Network Operator
BSS
Base Station Subsystem
BSC
Base Station Controller
3G
3G (or 3-G) is short for third-generation mobile
telephone technology
UMTS
Universal Mobile Telephone System
PSTN
The public switched telephone network
RF
Radio frequency
UPS
Uninterruptible Power Supply
IN
Intelligent Network
AIN
Advanced Intelligent Network.

Saturday, 3 May 2014

MediaPortal (must see)

Use your big television screen as Smart TV now! Just connect your computer and run MediaPortal, the open source media center.
Tune to regular TV and radio channels, watch or listen to online media, enjoy your own media files or comfortably browse the web while sitting on your couch.

Features:
Watch and record TV
Watch videos and DVDs
Listen to music
Listen to broadcast and web radio stations
View the TV guide on any PC in your home
Movie covers and details are automatically downloaded from IMDB (Internet Movie Database)
View all your artists, albums, tracks, CDs, DVDs or playlists, with album art and artist images
Enjoy audio visualizations
Stream throughout your home via any PC client connected to the MediaPortal TV server
View pictures and slideshows
Check weather reports, your RSS feeds or Wikipedia on your TV screen
Browse the huge plug-in archive
Choose from a variety of looks, styles and interfaces to suit your taste.

Download Link

How To Instal Window Xp Quickly

TRICK TO SAVE YOUR TIME WHILE INSTALLING WINDOWS
Boot through Windows XP CD.
After all the files are completely loaded, you get the option to select the partition. Select “c”.
Now Format the partition, whether it is normal or quick with NTFS or FAT
Once the formatting is completed, All the setup files required for installation are copied.Restart your system by pressing Enter.Now, here begins the Simple trick to save 10-15 minutes.
After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.
Now, Press SHIFT + F10 Key -> This opens command prompt.
Type “Taskmgr” and press enter. This will open Task Manager.
Click the Process Tab, here we find a process Setup.exe. Right Click on Setup.exe and Set Priority -> Select High or Above Normal. Initially it will be Normal