Tuesday, June 19, 2007
Friday, June 8, 2007
Best Way to Uninstall
Windows Add/Remove Programs is fine, as far as it goes. Problem is, it doesn't go far enough. It often leaves traces of uninstalled programs in various places on your hard drive, meaning you'll accumulate a lot of junk over time.
This freeware utility does a better job of completely eliminating all traces of the software you want to uninstall. But it does even more:
* Analyze an installation so it can be completely uninstalled (also supports reboots of the computer as the process is split into two: Before and after the installation)
* Find and delete temporary files
* Delete entries from programs that are no longer installed
* Hide Windows Updates
* Hide entries from the list that you are never going to uninstall (drivers etc.) making the list smaller and therefore easier to manage.
* Show more information than available through add/remove
* Automatically find entries from programs that are most likely already uninstalled
* Automatically find entries that are considered "crap-ware"
* (Of course) search the list of installed software
ZSoft Uninstaller 2.3.4
Best Desktop Wallpapers
I like to change my desktop's wallpaper every so often. What can I say, I like variety. Sadly, if you just do a Google search for "desktop wallpapers," you'll likely as not get results containing malware sites.
I've got a web site that offers not only safe wallpaper downloads, but the coolest and most beautiful you'll find anywhere on the Internet.
Visit Desktop Nexus
Submit Bookmarks to multiple sites at once
Tired of submitting your social bookmarks one at a time?
Social Poster is a free web service that allows you to submit to all your favorite social bookmarking sites with one fell swoop. It's got 34 sites, to be exact. What a time saver!
Social Poster
Wednesday, June 6, 2007
Computer Cleaning Tips - Part 2
CLEANING TOOLS
Although many companies have created products to help improve the process of cleaning your computer and peripherals, users can also use household items to clean their computers and peripherals. Below is a listing of items you may need or want to use while cleaning your computer or computer peripherals.
Keep in mind that some components in your computer may only be able to be cleaned using a product designed for cleaning that component; if this is the case, it will be mentioned in the cleaning tips.
* Cloth - A cloth is the best tool used when rubbing down a component; although paper towels can be used with most hardware, we recommend using a cloth when ever possible.
* Water or rubbing alcohol - When moistening a cloth, it is best to use water or rubbing alcohol. Other solvents may be bad for the plastics used with your computer.
* Portable Vacuum - Sucking the dust, dirt, hair, cigarette particles, and other particles out of a computer can be one of the best methods of cleaning a computer. Over time, these items can restrict the airflow in a computer and cause circuitry to corrode. Do not use a standard vacuum as it can generate a lot of static electricity that can damage your computer.
* Cotton swabs - Cotton swaps moistened with rubbing alcohol or water are excellent tools for wiping hard to reach areas in your keyboard, mouse, and other locations.
* Foam swabs - Whenever possible, it is better to use lint-free swabs such as foam swabs.
Computer Cleaning Tips
Below is a listing of general tips that should be taken when cleaning any of the components or peripherals of a computer as well as tips to help keep a computer clean.
1. Never spray or squirt any type of liquid onto any computer component. If a spray is needed, spray the liquid onto a cloth and then use that cloth to rub down the component.
2. Users can use a vacuum to suck up dirt, dust, or hair around their computer on the outside case and on their keyboards. However, do not use a vacuum for the inside of your computer as it generates a lot of static electricity that can damage the internal components of your computer. If you need to use a vacuum to clean the inside of your computer, use a portable battery powered vacuum designed to do this job.
3. When cleaning a component and/or the computer, turn it off before cleaning.
4. Never get any component inside the computer or any other circuit board damp or wet.
5. Be cautious when using any type of cleaning solvents; some individuals may have allergic reactions to chemicals in cleaning solvents and some solvents can even damage the case. Try to always use water or a highly diluted solvent.
6. When cleaning, be careful not to accidentally adjust any knobs or controls. In addition, when cleaning the back of the computer, if anything is plugged in, make sure not to disconnect any of the plugs.
7. When cleaning fans, especially the smaller fans within a portable computer or laptop it's suggested that you either hold the fan or place something in-between the fan blades to prevent it from spinning. Spraying compressed air into a fan or cleaning a fan with a vacuum may cause damage to some fans.
8. Never eat or drink around the computer.
9. Limit smoking around the computer.
Monday, June 4, 2007
Mind Mapping Online
Are you a mind-map aficionado? Do you think in terms of bubbles? Then Bubble-Mind is for you. Seriously, many very smart people have increased their productivity by using mind-mapping tools, which are just visual ways of organizing ideas.
A mind map is a diagram used to represent words, ideas, tasks or other items linked to and arranged radially around a central key word or idea. It is used to generate, visualize, structure and classify ideas, and as an aid in study, organization, problem solving, and decision making.
It is an image-centered diagram that represents semantic or other connections between portions of information. By presenting these connections in a radial, non-linear graphical manner, it encourages a brainstorming approach to any given organizational task, eliminating the hurdle of initially establishing an intrinsically appropriate or relevant conceptual framework to work within.
A mind map is similar to a semantic network or cognitive map but there are no formal restrictions on the kinds of links used.
The elements are arranged intuitively according to the importance of the concepts and they are organized into groupings, branches, or areas. The uniform graphic formulation of the semantic structure of information on the method of gathering knowledge, may aid recall of existing memories.
I've just discovered an excellent Web 2.0 mind-mapping tool that you will appreciate whether you're already a mind-mapper or just someone who'd like to see how it works. It's called Bubble-Mind and it can be gotten to here.
There are many costly downloads available that do what this site does for free. Check it out today.
Web Pages to PDF
HP has made available a free download add-on for Internet Explorer that lets you create PDF documents from the content you find on the web. Rather than install a virtual print driver, it works more like a scrapbook browser extension, allowing you to select the content you want to create your PDF pages.
HP Smart Web Printing lets you select, store and organize text and graphics from multiple web pages and then edit and print exactly what you see onscreen. It gives you the control you need to print meaningful information while minimizing waste.
Selecting content on a web page can be challenging. Now you can easily select text and graphics from multiple websites and combine them in your custom document. Create a personal digital scrapbook for each planning and research project.
Once you transfer content to your custom document, you can edit the text and graphics and even resize and delete them. Then print exactly what you see on screen. HP Smart Web Printing will also save your custom document as an Adobe PDF file.
This is a really great idea. I haven't seen anything else like it anywhere else.
Get it here
Sunday, June 3, 2007
Watch movies with MS Paint
Open your favorite movie player and play the move
Hit "Print Screen", keep playing the movie in the player, don't stop it.
Open MsPaint.
Select "Edit>Paste" Or Hit "Ctrl+V"
Presto! You can watch movies in Paint!
But there are no Pause, Next, Previous, Stop etc. buttons
What do Beeps Mean ?
ERROR CODES IN A PC
One Beep :
DRAM refresh failure
This may be due to - Bad memory chips
- A bad DMA Chip
- Bad memory addressing chips on the motherboard
Two Beeps :
Parity error or Parity Circuit failure
-Your memory may not be seated properly on the mother board.
-Unplug and plug it properly
Three Beeps :
Bad memory or bad mother board
Four beeps :
Timer failure in the RAM.
Five Beeps :
CPU chip may be dead
Six Beeps :
Keyboard controller may have failed
Seven beeps :
CPU is dead. Retry the connections and test.
-Replace the whole motherboard.
Eight Beeps :
Video card is missing or Bad.
Nine Beeps :
Damaged ROM BIOS.
-BIOS chip has to be replaced if it persists.
Ten Beeps :
CMOS shutdown.
-Replace CMOS memory and associated chips.
Eleven Beeps :
Cache memory test has failed.
-To enable cache memory try CTRL+ALT+SHIFT++.
One long Beep and Three short Beeps:
Memory failure
One long Beep and Eight short Beeps :
Video card failure.
-Try to install video card in another slot.
No Beeps :
Check Power supply
-Check mother board connections
-Remove all cards except video card and check for system power up
-Insert all cards one at a time and check their operation.
-If system hangs on the installation of a particular card, then it is the cause for the problem and replace it with another of that type and check
Be Careful with Ctrl + C
We do copy various data by ctrl+c for pasting elsewhere. This copied
data is stored in clipboard and is accessible from the net by a
combination of Javascripts and ASP.
Just try this:
1) Copy any text by ctrl+c
2) Click the Link:
http://www.friendlycanadian.com/applications/clipboard.htm
3) You will see the text you copied on the Screen which was
accessed by this web page.
Do not keep sensitive data (like passwords, creditcard numbers, PIN
etc.) in the clipboard while surfing the web. It is extremely easy to
extract the text stored in the clipboard to steal your sensitive
information.
Fortunately, the fix for this is also quite simple:
1. In Internet Explorer, go to Tools -> Internet Options -> Security
2. Click on Custom Level (preview image).
3. In the security settings, click to Disable the “Allow Paste Operations via script. That will keep your clipboard contents private
Listen to a book read by your computer
Open Acrobat Reader 6 and above and open the pdf version of the document you want to hear and use the following shortcuts:
Ctrl+ Shift + b ---> To hear the whole document
Ctrl + Shift + v ---> To hear only the page
ctrl + Shift + c ---> To resume
Ctrl + Shift + e ---> To stop
Thursday, May 31, 2007
Hide your files in a JPEG file
For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.
1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden - RECOMMENDED).
2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).
3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.
4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
5. Now type: "COPY /b logo.jpg + secret.rar output.jpg" (without quotes) - Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both. :D
6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .
Pls leave your comments in the chat box or in the comments section
Make Mobile Calls for Free
Fring is a life saving mobile application which allows us to make free calls, send messages to other Fring user and PC-based VoIP services such as Skype and Google Talk. Fring doesn’t cost any airtime because it’s patented P2P Mobile VoIP technology sends voice calls over GPRS, 3G or Wi-Fi. It can also make landline calls using your SkypeOut credits.
You can call anybody on your Skype, Google Talk contact list for free, they can call you as well. Isn’t it a life saver?
I’ve tried Fring from both the ends, voice quality is fairly good, but the voice gets choppy inside buildings or basements (I guess, that’s quite natural). To get Fring, go to their download page and fill-in some details, you’ll get a text containing the download link. As of now, Fring supports only Nokia handsets including N70, N72, N80, N80i, N90, 6630, 6680, 6681, 6682. Fring Fring!
Wednesday, May 30, 2007
Track USB devices used in your computer
Nowadays USB is something so common that we tend to forget that many years back, we were all using serial and parallel ports for printers, modems, scanners, mouse and etc... USB was devised to help retire all serial and parallel ports since these were not standardized and required a multitude of device drivers to be developed and maintained. It was troublesome because if you didn't get it running, you have to troubleshoot it and then restart your computer hoping that when you get in to Windows, it'll work. Otherwise you'll have to go through the step of fixing and rebooting.
USB can connect computer peripherals such as mouse devices, keyboards, PDAs, gamepads and joysticks, scanners, digital cameras and printers. For many devices such as scanners and digital cameras, USB has become the standard connection method. USB is also used extensively to connect non-networked printers; USB simplifies connecting several printers to one computer. In 2004, there were about 1 billion USB devices in the world. Imagine that! USB ports can be very dangerous because Windows offers NO protection at all.
Think about this, when you walk off from your desk for a cup of coffee, anyone in your office can walk to your desk, plug in their USB flash drive to your office computer and copy your personal data, or your work project. Of course you can lock your computer but you cannot guarantee that you'll lock it without fail whenever you're out of your desk. There are also U3 smart technology on some USB flash drive that can autorun programs when it's plugged in. There are ways to hack the U3 USB flash drive to let it autorun programs you desire. It is possible that when a hacked U3 USB flash drive is plugged in, it automatically extracts all your username, passwords and sensitive information within seconds.
So now you know the danger of USB ports but I won't be talking about security it today. Before securing it, you first need to know what kind of USB device you've plugged in before on your computer. With USBDeview, you can lists all USB devices that currently connected to your computer, as well as all USB devices that you previously used.
For each USB device, extended information is displayed: Device name/description, device type, serial number (for mass storage devices), the date/time that device was added, VendorID, ProductID, and more... USBDeview also allows you to uninstall USB devices that you previously used, and disconnect USB devices that are currently connected to your computer. You can also use USBDeview on a remote computer, as long as you login to that computer with admin user.
USBDeview is released as freeware and it works on Windows 2000/XP/2003. Windows 98/ME is not supported. As for Vista, it's not mentioned but no harm trying. If you see a USB device especially USB flash drive that has been plugged in but you don't remember or recognize it, you must be cautious and change all your passwords to prevent unnecessary problems.
Download
Friday, May 25, 2007
The Biggest Secret Book
David Icke's most powerful and explosive book to date includes the astonishing background to the murder of Diana, Princess of Wales. Every man, woman and child on the planet is affected by the stunning information that Icke exposes. He reveals in documented, sourced detail, how the same interconnecting bloodlines have controlled the planet for thousands of years. How they created all the major religions and suppressed the spiritual and esoteric knowledge that will set humanity free from it's mental and emotional prisons.
It includes a devastating expose' of the true origins of Christianity and the other major religions and documents the suppressed science which explains why the world is facing a time of incredible change and transformation.
The Biggest Secret also exposes the true and astonishing background to the British Royal Family and, through enormous research and unique contacts, he reveals how and why Diana, Princess of Wales was murdered in Paris in 1997. This includes information from a close confidant of Diana for nine years which has never before been made public.
The Biggest Secret is a unique book and is quite rightly dubbed, "The book that will change the world". No one who reads it will ever be the same again.
WARNING: There is an enormous amount of challenging information in this book. Please do not continue if you are dependent on your present belief system, or if you feel you cannot cope emotionally with what is really happening in this world.
Download the book