You are on page 1of 44

How to make your Desktop Icons Transparent

Go to Control Panel > System, > Advanced > Performance area > Settings button Vi
sual Effects tab "Use drop shadows for icon labels on the Desktop"
Make your Folders Private
Open My Computer
Double-click the drive where Windows is installed (usually drive (C:), unless you
have more than one drive on your computer).
If the contents of the drive are hidden, under System Tasks, click Show the conte
nts of this drive.
Double-click the Documents and Settings folder.
Double-click your user folder.
Right-click any folder in your user profile, and then click Properties.
On the Sharing tab, select the Make this folder private so that only I have acces
s to it check box.
Note
To open My Computer, click Start, and then click My Computer.
This option is only available for folders included in your user profile. Folders
in your user profile include My Documents and its subfolders, Desktop, Start Men
u, Cookies, and Favorites. If you do not make these folders private, they are av
ailable to everyone who uses your computer.
When you make a folder private, all of its subfolders are private as well. For ex
ample, when you make My Documents private, you also make My Music and My Picture
s private. When you share a folder, you also share all of its subfolders unless
you make them private.
You cannot make your folders private if your drive is not formatted as NTFS For i
nformation about converting your drive to NTFS

Multi boot recovery-


Multi-Boot Recovery and Bootable CD [2008]

Multi-Boot Recovery and Bootable CD


Install,Recover,Troubleshoot with a set of 100 of tools.This cd contains 9 boot
images.
1. Hiren boot cd 9.2
2. Acronis True image 10
3. Acronis Disk Director 10
4. OS selcector/Activator (to resuce unbootable drives)
5. Password reset (xp/Vista)
6. ERD Commander 2005 (for rescue,recover)
7. BartPE (win XP on cd)
8. Recovery console (Recover installation without xp cd)
9. NLTDR fixer (Fix NLTDR error in XP)
All in one Multi-boot cd
Download Link:
Code:
MEGAUPLOAD - The leading online storage and file delivery service
Password:
theseekersoasis.org

No to all
When moving files, Windows XP will give four options: Yes, Yes to All, No and Ca
ncel. Sometimes though, you want a No to All - to enable this, just hold down SH
IFT while clicking No.

NTFS vs. FAT


To NTFS or not to NTFS that is the question. But unlike the deeper questions of li
fe, this one isn't really all that hard to answer. For most users running Window
s XP, NTFS is the obvious choice. It's more powerful and offers security advanta
ges not found in the other file systems. But let's go over the differences among
the files systems so we're all clear about the choice. There are essentially th
ree different file systems available in Windows XP: FAT16, short for File Alloca
tion Table, FAT32, and NTFS, short for NT File System.
FAT16
it's showing its age. It was designed originally to handle files on a floppy dri
ve, and has had minor modifications over the years so it can handle hard disks,
and even file names longer than the original limitation of 8.3 characters, but i
t's still the lowest common denominator. The biggest advantage of FAT16 is that
it is compatible across a wide variety of operating systems, including Windows 9
5/98/Me, OS/2, Linux, and some versions of UNIX. The biggest problem of FAT16 is
that it has a fixed maximum number of clusters per partition, so as hard disks
get bigger and bigger, the size of each cluster has to get larger. In a 2 GB parti
tion, each cluster is 32 kilobytes, meaning that even the smallest file on the p
artition will take up 32 KB of space. FAT16 also doesn't support compression, en
cryption, or advanced security using access control lists.
FAT32

The FAT32 file system, originally introduced in Windows 95 Service Pack 2, is re


ally just an extension of the original FAT16 file system that provides for a muc
h larger number of clusters per partition. As such, it greatly improves the over
all disk utilization when compared to a FAT16 file system. However, FAT32 shares
all of the other limitations of FAT16, and adds an important additional limitat
ion many operating systems that can recognize FAT16 will not work with FAT32 most no
tably Windows NT, but also Linux and UNIX as well. Now this isn't a problem if y
ou're running FAT32 on a Windows XP computer and sharing your drive out to other
computers on your network they don't need to know (and generally don't really car
e) what your underlying file system is.

The Advantages of NTFS


The NTFS file system, introduced with first version of Windows NT, is a complete
ly different file system from FAT. It provides for greatly increased security, f
ile by file compression, quotas, and even encryption. It is the default file system
for new installations of Windows XP, and if you're doing an upgrade from a previ
ous version of Windows, you'll be asked if you want to convert your existing fil
e systems to NTFS. Don't worry. If you've already upgraded to Windows XP and did
n't do the conversion then, it's not a problem. You can convert FAT16 or FAT32 v
olumes to NTFS at any point. Just remember that you can't easily go back to FAT
or FAT32 (without reformatting the drive or partition), not that I think you'll
want to.
The NTFS file system is generally not compatible with other operating systems in
stalled on the same computer, nor is it available when you've booted a computer
from a floppy disk. For this reason, many system administrators, myself included
, used to recommend that users format at least a small partition at the beginnin
g of their main hard disk as FAT. This partition provided a place to store emerg
ency recovery tools or special drivers needed for reinstallation, and was a mech
anism for digging yourself out of the hole you'd just dug into. But with the enh
anced recovery abilities built into Windows XP (more on that in a future column)
, I don't think it's necessary or desirable to create that initial FAT partition
.

When to Use FAT or FAT32


If you're running more than one operating system on a single computer (see Dual
booting in Guides), you will definitely need to format some of your volumes as F
AT. Any programs or data that need to be accessed by more than one operating sys
tem on that computer should be stored on a FAT16 or possibly FAT32 volume. But k
eep in mind that you have no security for data on a FAT16 or FAT32 volume any one
with access to the computer can read, change, or even delete any file that is st
ored on a FAT16 or FAT32 partition. In many cases, this is even possible over a
network. So do not store sensitive files on drives or partitions formatted with
FAT file systems

Speed up your browsing of Windows 2000 & XP machines


Here's a great tip to speed up your browsing of Windows XP machines. Its actuall
y a fix to a bug installed as default in Windows 2000 that scans shared files fo
r Scheduled Tasks. And it turns out that you can experience a delay as long as 3
0 seconds when you try to view shared files across a network because Windows 200
0 is using the extra time to search the remote computer for any Scheduled Tasks.
Note that though the fix is originally intended for only those affected, Window
s 2000 users will experience that the actual browsing speed of both the Internet
& Windows Explorers improve significantly after applying it since it doesn't se
arch for Scheduled Tasks anymore. Here's how :
Open up the Registry and go to :
HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteCom
puter/NameSpace
Under that branch, select the key :
{D6277990-4C6A-11CF-8D87-00AA0060F5BF}
and delete it.
This is key that instructs Windows to search for Scheduled Tasks. If you like yo
u may want to export the exact branch so that you can restore the key if necessa
ry.
This fix is so effective that it doesn't require a reboot and you can almost imm
ediately determine yourself how much it speeds up your browsing processes.

ways to speed up your PC


Following a few simple guidelines, you can maintain your computer and keep it ru
nning smoothly. This article discusses how to use the tools available in Windows
XP Service Pack 3 (SP3) and Windows Vista to more efficiently maintain your com
puter and safeguard your privacy when you're online.
Free Up Disk Space
By freeing disk space, you can improve the performance of your computer. The Dis
k Cleanup tool helps you free up space on your hard disk. The utility identifies
files that you can safely delete, and then enables you to choose whether you wa
nt to delete some or all of the identified files.
Use Disk Cleanup to:
* Remove temporary Internet files.
* Remove downloaded program files (such as Microsoft ActiveX controls and Java a
pplets).
* Empty the Recycle Bin.
* Remove Windows temporary files.
* Remove optional Windows components that you don't use.
* Remove installed programs that you no longer use.
Tip: Typically, temporary Internet files take the most amount of space because t
he browser caches each page you visit for faster access later.
To use Disk Cleanup
1.Click Start, point to All Programs, point to Accessories, point to System Tool
s, and then click Disk Cleanup. If several drives are available, you might be pr
ompted to specify which drive you want to clean.
2. In the Disk Cleanup for dialog box, scroll through the content of the Files t
o delete list.
Choose the files that you want to delete.
3.Clear the check boxes for files that you don't want to delete, and then click
OK.
4.When prompted to confirm that you want to delete the specified files, click Ye
s.
After a few minutes, the process completes and the Disk Cleanup dialog box close
s, leaving your computer cleaner and performing better.
2.Speed up access to data
Disk fragmentation slows the overall performance of your system. When files are
fragmented, the computer must search the hard disk when the file is opened to pi
ece it back together. The response time can be significantly longer.
Disk Defragmenter is a Windows utility that consolidates fragmented files and fo
lders on your computer's hard disk so that each occupies a single space on the d
isk. With your files stored neatly end-to-end, without fragmentation, reading an
d writing to the disk speeds up.
When to run Disk Defragmenter
In addition to running Disk Defragmenter at regular intervals-monthly is optimal
-there are other times you should run it too, such as when:
* You add a large number of files.
* Your free disk space totals 15 percent or less.
* You install new programs or a new version of Windows.
To use Disk Defragmenter:
1. Click Start, point to All Programs, point to Accessories, point to System Too
ls, and then click Disk Defragmenter.
Click Analyze to start the Disk Defragmenter.
1. In the Disk Defragmenter dialog box, click the drives that you want to defrag
ment, and then click the Analyze button. After the disk is analyzed, a dialog bo
x appears, letting you know whether you should defragment the analyzed drives.
Tip: You should analyze a volume before defragmenting it to get an estimate of h
ow long the defragmentation process will take.
2. To defragment the selected drive or drives, click the Defragment button. Note
: In Windows Vista, there is no graphical user interface to demonstrate the prog
ress-but your hard drive is still being defragmented.
After the defragmentation is complete, Disk Defragmenter displays the results.
3. To display detailed information about the defragmented disk or partition, cli
ck View Report.
4. To close the View Report dialog box, click Close.
5. To close the Disk Defragmenter utility, click the Close button on the title b
ar of the window.

3.Detect and repair disk errors


In addition to running Disk Cleanup and Disk Defragmenter to optimize the perfor
mance of your computer, you can check the integrity of the files stored on your
hard disk by running the Error Checking utility.
As you use your hard drive, it can develop bad sectors. Bad sectors slow down ha
rd disk performance and sometimes make data writing (such as file saving) diffic
ult, or even impossible. The Error Checking utility scans the hard drive for bad
sectors, and scans for file system errors to see whether certain files or folde
rs are misplaced.
If you use your computer daily, you should run this utility once a week to help
prevent data loss.
To run the Error Checking utility:
1. Close all open files.
2. Click Start, and then click My Computer.
3. In the My Computer window, right-click the hard disk you want to search for b
ad sectors, and then click Properties.
4. In the Properties dialog box, click the Tools tab.
5. Click the Check Now button.
6. In the Check Disk dialog box, select the Scan for and attempt recovery of bad
sectors check box, and then click Start.
7. If bad sectors are found, choose to fix them.
Tip: Only select the "Automatically fix file system errors" check box if you thi
nk that your disk contains bad sectors.
4. Protect your computer against spyware
Spyware collects personal information without letting you know and without askin
g for permission. From the Web sites you visit to usernames and passwords, spywa
re can put you and your confidential information at risk. In addition to privacy
concerns, spyware can hamper your computer's performance. To combat spyware, yo
u might want to consider using Microsoft Windows Defender, which is included in
Windows Vista, and is available as a free download for Microsoft XP SP2. Alterna
tively, there are other free anti-spyware software programs available.
5. Learn all about ReadyBoost
If you're using Windows Vista, you can use ReadyBoost to speed up your system. A
new concept in adding memory to a system, it allows you to use non-volatile fla
sh memory-like a USB flash drive or a memory card-to improve performance without
having to add additional memory.

How to Superhide your file?


Its important to understand the logic before hiding the file
you may have notice that windows (system) contents are hidden like autoexec n al
l, what they do is just add an Attribute to the file called Superhide, and then
it wont be visible to the user unless the attributes are changed, the Superhide
Attribute is just like another attributes like Read only, Write, Hidden, Achieve
file e.t.c.
Now since the superhide is used to hide the information of microsoft windows the
y have not made this option available in simple GUI,
How to do it?
you need to open command prompt for this, now decide the folder or file you want
to hide, copy the path, Here we take Example of say c:\New folder
here's the command
attrib +a +h +r +s <path>
for our example
attrib +a +h +r +s "c:\New folder"
Since there is space in New folder we have to use "double quotes"
And there you go your file is not visible to anyone now. . . .
How to unhide it?
jst change + into -
Example:-
attrib -a -h -r -s "c:\New folder"

Similarly you can do this for any folder, this trick is just for Microsoft windo
ws
Enjoy!

Use proper search

By default, Windows XP hides a bunch of files from the search engine. It also us
es a plasticine-looking dog called the "Search Companion" that you'll want to ge
t rid of post haste.
1. Open Windows Explorer, and hit F3 to open the search panel
2. Click the Change preferences link, and then the Without an animated screen
character link
3. Click Change preferences again, then click Change files and folders search
behavior link and select the Advanced option, then click OK
4. Expand the newly seen More advanced options section by clicking on it, and
make sure Search system folders, Search hidden files and folders and Search sub
folders is selected to get the best possible search results
How the search engine should be.

ABOUT SERVICES TOOLS LOGIN Windows XP Run Commands and Shortcuts


Windows XP Home / Pro Run Commands and Short Cuts
How To - Click Start, Click Run and enter the command Click OK
Run commands
Calc - Calculator
Cfgwiz32 - ISDN Configuration Wizard
Charmap - Character Map
Chkdisk - Repair damaged files
Cleanmgr - Cleans up hard drives
Clipbrd - Windows Clipboard viewer
Cmd - Opens a new Command Window (cmd.exe)
Control - Displays Control Panel
Dcomcnfg - DCOM user security
Debug - Assembly language programming tool
Defrag - Defragmentation tool
Drwatson - Records programs crash & snapshots
Dxdiag - DirectX Diagnostic Utility
Explorer - Windows Explorer
Fontview - Graphical font viewer
Ftp - ftp.exe program
Hostname - Returns Computer's name
Ipconfig - Displays IP configuration for all network adapters
Jview - Microsoft Command-line Loader for Java classes
MMC - Microsoft Management Console
Msconfig - Configuration to edit startup files
Msinfo32 - Microsoft System Information Utility
Nbtstat - Displays stats and current connections using NetBios over TCP/IP
Netstat - Displays all active network connections
Nslookup- Returns your local DNS server
Ping - Sends data to a specified host/IP
Regedit - registry Editor
Regsvr32 - register/de-register DLL/OCX/ActiveX
Regwiz - Reistration wizard
Sfc /scannow - Sytem File Checker
Sndrec32 - Sound Recorder
Sndvol32 - Volume control for soundcard
Sysedit - Edit system startup files (config.sys, autoexec.bat, win.ini, etc.)
Taskmgr - Task manager
Telnet - Telnet program
Tracert - Traces and displays all paths required to reach an internet host
Winipcfg - Displays IP configuration
Management Consoles
certmgr.msc - Certificate Manager
ciadv.msc - Indexing Service
compmgmt.msc - Computer management
devmgmt.msc - Device Manager
dfrg.msc - Defragment
diskmgmt.msc - Disk Management
fsmgmt.msc - Folder Sharing Management
eventvwr.msc - Event Viewer
gpedit.msc - Group Policy -XP Pro only
iis.msc - Internet Information Services
lusrmgr.msc - Local Users and Groups
mscorcfg.msc - Net configurations
ntmsmgr.msc - Removable Storage
perfmon.msc - Performance Manager
secpol.msc - Local Security Policy
services.msc - System Services
wmimgmt.msc - Windows Management
Shortcuts
access.cpl - Accessibility Options
hdwwiz.cpl - Add New Hardware Wizard
appwiz.cpl - dd/Remove Programs
timedate.cpl - Date and Time Properties
desk.cpl - Display Properties
inetcpl.cpl - Internet Properties
joy.cpl - Joystick Properties
main.cpl keboard - Keyboard Properties
main.cpl - Mouse Properties
ncpa.cpl - Network Connections
ncpl.cpl - Network Properties
telephon.cpl - Phone and Modem options
powercfg.cpl - Power Management
intl.cpl - Regional settings
mmsys.cpl sounds - Sound Properties
mmsys.cpl - Sounds and Audio Device Properties
sysdm.cpl - System Properties
nusrmgr.cpl - User settings
firewall.cpl - Firewall Settings (sp2)
wscui.cpl - Security Center (sp2)
Windows Environment Commands
%ALLUSERSPROFILE% - Open the All User's Profile
%HomeDrive% - Opens your home drive e.g. C:\
%UserProfile% - Opens you User's Profile
%temp% Opens - temporary file Folder
%systemroot% - Opens Windows folder
Wupdmgr - Takes you to Microsoft Windows Update
General keyboard shortcuts
CTRL+C(Copy)
CTRL+X (Cut)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in t
he Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph
)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragra
ph)
SHIFT with any of the arrow keys (Select more than one item in a window or on th
e desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple
documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding c
ommand)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from au
tomatically playing)
CTRL+SHIFT+ESC (Open Task Manager) Dialog box keyboard shortcuts
If you press SHIFT+F8 in extended selection list boxes, you enable extended sele
ction mode. In this mode, you can use an arrow key to move a cursor without chan
ging the selection. You can press CTRL+SPACEBAR or SHIFT+SPACEBAR to adjust the
selection. To cancel extended selection mode, press SHIFT+F8 again. Extended sel
ection mode cancels itself when you move the focus to another control.
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the correspon
ding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or
Open dialog box)
Microsoft natural keyboard shortcuts
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility keyboard shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer keyboard shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the sel
ected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the pare
nt folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the fir
st subfolder)
Shortcut keys for Character Map
After you double-click a character on the grid of characters, you can move throu
gh the grid by using the keyboard shortcuts
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC) main window keyboard shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console) ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC console window keyboard shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console wi
ndow, this shortcut closes the console)
Remote desktop connection navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the entire client window area on th
e Terminal server clipboard and provide the same functionality as pressing ALT+P
RINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the active window in the client on t
he Terminal server clipboard and provide the same functionality as pressing PRIN
T SCREEN on a local computer.)
Microsoft Internet Explorer navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+R (Update the current Web page)
CTRL+ CTRL+P (Open the Print dialog box)
W (Close the current window)
Wireless Mouse Tips

Wireless Mouse Troubleshooting


If your wireless mouse starts acting slower then normal or does not track smooth
ly across the screen, there are a few things you can check to make sure of optim
al performance. Make sure the batteries are charged or fresh. Also, make sure th
at the receiver, which is connected to the computer, is not blocked in some fash
ion. Finally, make sure that you are within the range given by the manufacturer
for the wireless keyboard.
________________________________________
Choosing a Wireless Mouse:
If you are right handed, the Logitech cordless mouse may be the right choice for
you. While the Belkin is designed to be versatile, the Logitech is ergonomicall
y designed for your right hand. The Logitech also brings these features to the t
able:
" 4 button and tilt wheel built in to the ergonomically designed unit
" Functions on 2 AA batteries or use of the desktop charger
" Cordless USB mini receiver included (and USB to PS/2 adapter)
________________________________________
How a Wireless Mouse Works
Wireless mice come with a receiver station which plugs into your computer via a
USB or PS/2 connection. The wireless mouse will then send a signal to the receiv
er. The mouse will need to be recharged, and will require the use of batteries o
r a recharging station.
________________________________________
Benefits of a wireless mouse
Using a wireless mouse for your computer is a great way to reduce clutter and wi
res around your computer. You also won't need to worry about where you put your
computer tower and if your mouse cord is long enough. The range is excellent and
it is one less wire to worry about!
________________________________________
Optical and Laser Cordless Mouse
Both optical and laser wireless mice operate on light technology as opposed to t
he old standard mouse wheel. The laser mouse is the latest technology, and light
defuses better, making the mouse movements smoother and easier to use on non tr
aditional surfaces. With both optical and laser wireless mice, you do not need t
o use a mouse pad.
________________________________________
Choosing a Wireless Mouse:
Belkin is a great manufacturer of wireless products. The Belkin wireless mouse c
omes with several terrific features to consider:
" Versatile and can be used by left or right handed users
" Operates at a range of approx 6 feet - great for use in conference rooms
" The mouse is rechargeable (YDB-F8E845)
" Four customizable buttons, and scroll wheel.
" Mouse runs on 2 AA batteries

3 Steps To Better Digital Prints

3 simple steps you can take to get better prints from your digital photos...

1- Resolution of Image- The important factor to get a quality print, the DPI of
the an image. DPI stand for numbers of dots of ink per inch that will appear o
n the page in both directions (Vertically and horizontally), for example 600X70
0 dpi.
There are some guidelines for certain printing task:
If you are going to print simple text or image then 300 dpi is best and for high
er quality text or image your choice for image resolution should be 600 dpi. But
if you are working with professional image quality then set dpi up to 2400.

2- Paper Quality- Paper quality playing a vital role in printing an images. Sp


ecially printer manufactures designed paper to be used with the ink in your prin
ter. You should consider some qualities in paper like page size, paper color an
d its weight.

3. Printer Settings - Printer setting is also important factor in image result,


but these setting almost same with the all printers, for example Paper size, pri
nting mode (EconoMode for save toner), printing quality (Best Quality, Faster Pr
inting and Custom) and color management.
A Quick way to print a Document

There are many ways to prints a document, but you can print a document quickly i
f you put a shortcut to the printer on your desktop and drag a document icon to
it, no need to open file for printing just drag a file to printer icon and get
your print.

o do this, first click Start button, Settings, then Printers ( first make sure
you installed your printer driver). When the Printers window opens, hold down Ct
rl and drag the printer icon to your system desktop.
Now you can drag a document icon and drop it in printer icon on your desktop. He
re you will get a print quickly and with out open a file.
CD-ROM Cleaning Tips

If your CD drive creating problem to read CD disc, taking time to read and show
ing message there is no disc in the drive. These are the symptoms of dirty or we
ak CD-drive lens, because dirty lens can create errors in reading or writing and
soon will not work at all.
Follow the given steps to care and clean a CD-Drive.
" First make sure your discs are clean, unscratched and you're loaded it prop
erly.
" Always use laser lens cleaner to clean drive lens.
" Insert the laser lens cleaner disc and play it for 2 to 3 min.
" Using CD drive cleaner properly clean the CD-ROM laser from dust. If your
drive still creating problem then open it and clean the lens with a cotton swab.
Computer Cleaning Tools

Today there are many computer cleaning products and tools are available in the m
arket. Many computer manufacturer guide the user about their products on how to
safe and clean it. Some cleaning tools are available in market for internal comp
uter components and for peripherals. Usually some household items are also helpf
ul to clean the computers components.
" Cloth - For computer cleaning use the lightly dampened cloth on the compute
r case and use paper towel to dry it. But avoid to cleaning inside computer comp
onents or other circuit board with damp or wet cloth.
" Cleaning fluids - spray any cleaning fluids on the computer case and use pa
per towel to dry it.
" Compressed air - use the compressed air and start clean from back to front
of your computer case, specially casing and power supply fan.
" Lens cleaning kit - Always use lens cleaning kit to clean drive lens that s
pecially designed to clean the reading/writing devices.

How you can Deal with your Print Screen Button?

Today a very useful tip for those who are interested to copy or download an imag
es (Specially for Copyrights Images) from any site using Internet. Then there ar
e two options to copy these images in Windows XP, Just open the required image p
age website, one option deal with this the Print Screen Button on your Keyboard
and other is press Alt- Print Screen Button. If you simply press Print Screen Bu
tton after open a image from any site, here you can copies the entire windows to
the Clipboard, and if you press Alt- Print Screen Button, Windows XP copy the o
nly active window.
Now you can use any Graphic Tools like (Adobe Photoshop, Paint) to manage and pr
int this image. Just open one tool then paste this image, this will paste all Cl
ipboard contents into Paint. Now you can print, save this image or can do more w
ork on this image.
GENERAL CLEANING TIPS

You can save your computer maintenance cost if you clean your computer on the re
gular basis. This will improve the cooling and performance of the computer compo
nents. Your computer components could damage, if you do not keep it clean on per
iodically basis, because dust is the main cause to heat up your system and heat
link to hardware failure.

" Never place your computer on the ground, always use computer table or shelf
for this purpose.
" To clean computer case first unplugs your system power from the electrical
outlet. Remove all cables and connectors from the back side of your computer.
" Now blow the air around all the hardware components and keeping away your b
lower nozzle 4 to 5 inches away from main board components. You can use vacuum c
leaner also for this purpose but compressed air is the better solution to clean
a system.
" At the end using lightly dampened cloth or spray any cleaning fluids on the
computer case and use paper towel to dry it.
" Never clean inside computer components or other circuit board with damp or
wet cloth.
" Always be careful to eat or drink around the computer.
How to Back Up to your system?

There are many steps to save data with backup regularly.


" Back up regularly your data. It is important factor for you to get backup
your files and folder on a regular basis. Because in this global network a com
puter can crash, a virus, or a hard drive failure can wipe out everything. Don'
t make this mistake, It depend upon you and your data importance but better tech
nique is that back up everything at least once a week. But if you use your compu
ter daily, it is best to back up important files daily and other data weekly.

" Keep several backup copies of same backup. Never back up over a previous ba
ckup copy, always try to keep several copies over time so that if one time one
back create problem you can user others.. Remember, a problem that is backed up
will remain a problem when restored!

" Easy way for backup using Be selective method. You don't have to do a total
system backup of your system over time, If your are doing so, you are wasting y
our time. Just back up your important files, folder and photos. Backing up the e
ntire hard drive is time-consuming, not practical, and should not be done. A bac
kup of specific data files is the way to go. But a best technique is that first
install your all computer program and system drivers then do a backup using any
third party software (cloning software) like Norton ghost or others of your C dr
ive once, this backup will help you to restore your all computer program in 15 m
in in case of any problem and do important data backup daily or weekly.

How to clean CD/DVD with care?

You can preserve the life of CD/DVD, if you handle and clean it properly, becaus
e dirty discs can create errors in reading or writing and soon discs will not wo
rk at all.
Follow the given steps to care and clean a CD/DVD.
" Avoid to touching the writeable or data side of the CD/DVD.
" Always hold your CD/DVD by its center hole or by the outer edges.
" Keep away your discs from sunlight, heat and anything that may create scrat
ch on the discs.
" Always clean dust with a soft cloth or with a CD/DVD cleaning kit and avoid
to clean with static cloth or harsh detergents.
" Start work to clean from inside to outside in straight lines until the CD/D
VD is clean.
" Store your all discs vertically position and in dust free box.

How to Print several files together with single command?

If you have many files to print, maybe these files created in same program or in
different programs but you can print all these with a single command without pr
int individually. This technique is very useful if you have many files to print
and also created in different programs.

First create a temporary folder for this purpose, copy all files from different
location in this temporary folder. Here you have two options, you can select al
l files using CTRL+A or can choose with hold down the CTRL key to select one by
one.

At the end Right-click on the select files and choose Print command. Each file w
ill be opened in its related program and printed automatically.

Increase the printing speed of your printer


You can improve the printing speed of your printer with managing the print spo
oler option. Basically printer spooler holds your prints for some time then send
to printer for print out. By default on most printers, printer spooler option i
s enabled but you turn off to specify that the file should be sending to the pri
nter and not spooled.

Here printer spooler option might be different location in your printer but on m
ost printers you can turn off by going to Start, Setting then Printers. Now righ
t click on the icon of the printer that you are using. Click Properties and sele
ct the Advanced tab. Here click on "Print directly to printer" option. This will
tie up your application until the printer has all the data, but your print job
should finish more quickly. Printing directly to the printer will also come in h
andy if your print spooler crashes and you need to print before you reboot your
PC.

Keyboard Cleaning Tips

When the appearance of your computer keyboard is looking dirty, yellowish or som
e keys creating problem to work properly then you can understand about inner sid
e of your keyboard keys dirty as outside.

" To clean keyboard first shut down your computer then disconnect the keyboar
d.

" Now use the compressed air with long nozzle and start clean all keys.

" Use lightly dampened cloth or spray any cleaning fluids on the keyboard key
s and use paper towel to dry it.

" Try to use any cover of keyboard if you are working in high-dust environmen
ts.

" Always be careful to eat or drink around the computer.

LCD Cleaning Tips

Flat panel monitors are commonly used in mobile devices such as laptop and table
PCs. Similarly, smart phones, PDAs calculators have LCD screens. LCD screens ar
e much softer than old CRT screens, so they required extra care as compare to th
e CRT Monitors.

" First read the LCD manufacturer manual about your LCD model on how to safe
and clean it.
" To clean LCD monitor first unplugs your LCD power from the electrical outle
t.
" Never use dirty cloth, spray any cleaning fluids on the LCD screen and pape
r towel to dry it.
" Always use dry cotton cloth to clean the fingerprints and dust on the LCD s
creen. You can use lightly dampened soft cloth if you feel any difficulty to cle
an the screen.
Motherboard Cleaning Tips

Motherboard is the main part of your computer that contains all hardware compone
nts. Your computer motherboard could fry, if you do not keep it clean on periodi
cally basis. Dust is the main cause to heat up your system and heat link to hard
ware failure. You can save your computer maintenance cost if you clean your comp
uter on the regular basis. This will improve the cooling and performance of the
motherboard components.
" To clean your motherboard first unplugs your system power from the electric
al outlet.
" Using the screwdriver remove the side covers of your computer case and put
them to one side.
" Check all data and power cables connections. Inspect all motherboard PCI an
d AGP slots.
" Remove all add-on card of your motherboard for example RAM, modem, VGA, sou
nd card and LAN card.
" Now blow the air around all the motherboard sides and keeping away your blo
wer nozzle 4 to 5 inches away from main board components. You can use vacuum cle
aner also for this purpose but compressed air is the better solution to clean a
system.
" At the end assemble back all cards, cables and side covers of your system.
" I recommend you doing this after every three months if you want to save you
r system life.

Bluejacking Introduction

Bluejacking is not mobile hacking or hijacking its totaly different. Bluejacking


is a harmless prank played on people who have switched Bluetooth on their phone
s.
blue is taken from Bluetooth, the technology bluejacking uses.
jacking is derived from both "ajack" and "hijacking"
Even thought bluejacking does not resemble hijacking There is no accessing or ta
king private data from your victim's device.
Bluejacking is totally limited to Bluetooth enabled devices.Bluetooth has a very
limited range, usually around 10 metres on mobile phones, but laptops and other
instrument with high power transmitters can reach up to 100 meters.
Bluejacking Explained
"Bluejacking" is define as sending of unsolicited messages over Bluetooth to Blu
etooth-enabled devices such as mobile phones, PDAs, Laptops, sending a contact w
hich typically contains a message in the name field to another bluetooth enabled
device via the OBEX protocol.
Few prople say the term "Bluejacking" originated with a user named ajack on esat
o.com. Some people say that the term bluejacking comes from Bluetooth and hijack
ing. While that certainly sounds logical, a bluejacker doesn't hijack anything,
he just send a contact to the recipient's device. Both parties have absolute con
trol over their devices, and a bluejacker will not be able to take control of yo
ur phone or steal your personal information.
You can create a phonebook contact and write a message, eg. 'Hello, you've been
bluejacked', in the 'Name' field. Then you can search for other phones with Blue
tooth and send that phonebook contact to them. On their phone, a message will po
pup saying "'Hello, you've been bluejacked' has just been received by Bluetooth"
or something along those lines. For most 'victims' they will have no idea as to
how the message appeared on their phone. So, personalised messages like 'I like
your pink top' and the startled expressions that result is where the fun really
starts.
Bluejacking is quite harmless, but because bluejacked people don't know what is
happening, they think their phone is malfunctioning. Usually, a bluejacker will
only send a text message, but with modern phones it's possible to send images or
sounds as well.
But with the increase in the availability of bluetooth enabled devices, these de
vices have become vulnarable to virus attacks and even complete take over of dev
ices through a trojan horse program.
Bluejacking Process
" Go to Contacts.
" Create a new contact.
" Write the short message you want to send on the line next to 'Last name'
" Save this contact.
" Select this contact and send via Bluetooth.
" Your phone will search for devices
" All the Bluetooth devices near you will be displayed.
" Select any one you like and send.
" You have bluejacked someone.
You can also send pictures to your victim by adding them to your bluejack contac
t. The best thing about this is even if the victim rejects the contact that you
sent him/her, the picture gets automatically saved in the victim's My Pictures s
ection.
Note:
It is not that interesting after 2 or 3 trials. Its just a prank. Do NOT harass
anyone with this. Be careful at some places and with some peoples, especially in
airports where the tolerance level is very low. Also don't send threatening mes
sages. Technically you cannot be traced, but if the victim notices you behaving
in a suspicious way with your mobile phone in your hand, you better run for your
life.

Bluejacking is not mobile hacking or hijacking its totaly different. Bluejacking


is a harmless prank played on people who have switched Bluetooth on their phone
s.

GPRS protocol

GPRS protocol is a packet-switch protocol; define for web applications in GSM ne


twork. In other words Internet on GSM network is standardized as GPRS network. G
PRS has digital structure and this structure based on Time Division Multiple Acc
ess (TDMA) technique. One TDMA frame has 8 time slots (TSs). These TSs can be al
located to users, and single TS can be shared by several active users for uplink
and downlink purposes. Different coding schemes are used to enhance data rate f
rom 9Kbps to 150 Kbps per user, and it takes 0.5 to 1 second. Security features
in GPRS is provided by GSM network.
GPRS Architecture
Global System for Mobile Communication (GSM) circuit-switch architecture does no
t support the GPRS packet-switch architecture. Thus, GPRS requires its own netwo
rk architecture. Several networks and databases e.g. Mobile Station (MS), Base S
tation Subsystem (BSS), Home Location Register (HLR), Visitor Location Register
(VLR) in existing GSM network are modified in GPRS network.
GPRS architecture introduces the following network nodes to GSM architecture.
" Serving GPRS Support Node (SGSN)
" Gateway GPRS Support Node (GGSN)
" Mobile Station (MS)
" Base Station System (BSS)
" Home Location Register (HLR)
" Visitor Location Register (VLR)
1.Serving GPRS Support Node (SGSN): In GPRS network SGSN is equivalent to MSC. P
ackets of data between MSC and Public Switch Data Network (PSDN) are transferred
and received by SGSN.
2.Gateway GPRS Support Node (GGSN): GSM databases e.g. HLR and VLR are supported
by GGSN. It also interacts with external packet-switch networks.
3.Mobile Station (MS): In GPRS network MS consists of Mobile Terminal (MT) and T
erminal Equipment (TE). A computer attached to MT is called a ME. Through air, M
T communicates with the BSS.
4.Base Station System (BSS): In BSS, Base Transceiver Station (BTS) and Base Sta
tion Controller (BSC) are modified to support GPRS channel coding schemes BTS is
modified while to forward calls to Mobile Switching Centre (MSC) and data to SG
SN through Packet Control Unit (PCU), is supported by BSC. One SGSN is served by
one BSC.
5.Home Location Register (HLR): In GPRS, HLR contains information about routing.
To map an MS to one or more GGSNs, update the SGSN and to store the Internet Pr
otocol (IP) address, this information is accessed by both SGSN and GGSN.
6.Visitor Location Register (VLR): In GPRS. VLR contains the SGSN number and thi
s number indicates the MS currently served by the SGSN.
GPRS Interfaces
Different interfaces are used for routing between network nodes in GPRS.
" Um interface provides communication between MS and BSS.
" Gb interface provides connection between BSS and SGSN.
" Gn interface provides connection between SGSN and GGSN within the same GPRS
network.
" Gp interface provides connection between SGSN and GGSN when they are in dif
ferent GPRS network.
" Gi interface provides connection between GGSN and external networks.
" Gs interface provides communication between MSC and SGSN.
GPRS functional Groups
The functions which are defined in GPRS are following.
" Network access function: Point to point data transfer, registration of MS w
ith packet data protocols, radio resources for MS communication and charging inf
ormation about packet transmission, is provided by this function.
" Packet routing and transfer function: Routing of data between an MS and des
tination, conversion of GPRS address to external address and forwarding of packe
ts between an MS and GGSN, is provided by this function.
" Logical link management function: The communication between an MS and the G
SM network is maintained by it.
" Radio resources management function: Radio communication paths are allocate
d by it.
" Mobility management function: Current location of an MS is kept by it. When
an MS is entered to a new area, all routing and location in formations are also
updated by it.
" Network management function: If provides mechanisms to support network func
tions related to GPRS.
Advantages
The major advantage of GPRS is that, to access data no dial-up connection is req
uired. It is an inexpensive mobile data service as compared to Short Message Ser
vice (SMS) in GSM

Mobile phone viruses, simple measures to protect yourself

The Australian Mobile Telecommunications Association (AMTA) has developed consum


er tips to assist users to protect themselves against the risk of mobile phone v
iruses.
This guide explains what viruses are, how they spread, and what can be done abou
t them.
What's a mobile phone virus?
A mobile phone virus or mobile malware - malicious mobile software - is a comput
er virus specifically adapted for the mobile phone environment and designed to s
pread from one vulnerable phone to another.
A virus is a program code that replicates by being copied to another program. Vi
ruses can be transmitted as attachments to an email or in a download file. Some
viruses take effect as soon as their code is executed; other viruses can lie dor
mant. A virus that replicates by resending itself as an email attachment or as a
part of a network message is known as a worm.
Mobile phone viruses, simple measures to protect yourself
The Australian Mobile Telecommunications Association (AMTA) has developed consum
er tips to assist users to protect themselves against the risk of mobile phone v
iruses.
This guide explains what viruses are, how they spread, and what can be done abou
t them.
What's a mobile phone virus?
A mobile phone virus or mobile malware - malicious mobile software - is a comput
er virus specifically adapted for the mobile phone environment and designed to s
pread from one vulnerable phone to another.
A virus is a program code that replicates by being copied to another program. Vi
ruses can be transmitted as attachments to an email or in a download file. Some
viruses take effect as soon as their code is executed; other viruses can lie dor
mant. A virus that replicates by resending itself as an email attachment or as a
part of a network message is known as a worm.
Viruses can range from benign to quite harmful; they can erase data from the inf
ected phone or send fake messages purporting to be from the phones owner. How pr
evalent are mobile phone viruses? The current security risk from mobile phone vi
ruses and worms is low.
Until many more smart phones or PDAs are in use, and users of these phones are r
egularly exchanging executable files, the risk will remain low. The mobile indus
try takes the threat of viruses very seriously and is continually monitoring its
networks and working to protect users from any future risk from mobile phone vi
ruses. There are also some simple measures that individual users can implement t
o protect themselves.
What can I do to protect my phone?
The following tips can help prevent problems with viruses on your phone:
1. Switch to Bluetooth hidden mode. If your phone has Bluetooth capability, ensu
re that the Bluetooth capability is switched to hidden or invisible mode unless
you specifically need it to be visible. This will help prevent other Bluetooth-e
nabled devices from finding your phone (unless you grant them the necessary perm
ission) and will therefore help protect your phone from worms that spread using
the Bluetooth wireless technology.
2. Exercise caution before opening attachments. When accepting applications sent
via Bluetooth, or opening MMS attachments, exercise caution, just as you would
when opening an email attachment on your PC, because they may include harmful so
ftware. Ensure the application or attachment comes from a known source, and is w
ary of opening files that have unfamiliar text attached to them, even if they co
me from someone you know.
3. Only download content from a trusted source. Trusted sources may include oper
ator portals and other well-known brands that offer adequate protection against
viruses and other harmful software. Be aware though that, as with emails, malici
ous or fraudulent users may be able to fake the appearance of a trusted source.
4. Consider anti-virus software. Some software is available to prevent phone vir
uses. You may wish to consider downloading this software.
5. Contact your phone manufacturer if concerned. If you think you have a virus,
call the phone manufacturer's care line. They can assist you confirm if it is a
virus, and help fix the problem.

Mobile Ringtone

Get the Latest Polyphonic Ring Tones


" Mobile Music Polyphonic is a polyphonic ringtone composition software. Conv
ert midi to mmf (*.mmf), to sp midi (nokia ringtone) and mp3 to ringtone. Wave t
o mmf, wav to mmf, mp3 to mmf, mp3 to amr, wave to AMR, wav to AMR, mp3 to AMR,
amr to wave, amr to mp3, amr to wav, mp3/wave/amr to awb,and mp3 to wave. Conver
t between mp3, wave, amr, awb format. Convert mp3/wave/amr/awb to mmf.
" MP3/WAV/CD to MIDI Converter is a WAV to MIDI, MP3 to MIDI, CD to MIDI conv
erter transcribes prerecorded polyphonic music. Compose MIDI music by singing or
playing your instrument into a microphone.
" Mobile Music is a monophonic ringtone composition and convertion software.
It can import rtttl ( nokia ringtone ), midi, imelody format and export midi, rt
ttl ( nokia ringtone ), imelody, emelody and key press base sequence ringtone fo
rmat.

Tips on Mobile Maintenance

Looking after your mobile helps to ensure it has a long and productive life. Th
ere are 8 easy maintenance tips to help you get the best out of your mobile phon
e. All of the points below should also apply to your battery, charger and any ot
her accessories.
KEEP YOUR MOBILE:
1. Charged: Ensure your battery is fully charged, and then completely run it
down before recharging. Recharging too early causes your battery to run out of p
ower more quickly.
2. Secure: For security reasons, enable the PIN on your SIM Card and Phone-lo
ck on your phone to avoid unauthorized used. These security checks will also be
activated when the phone is power cycled. You can check with your carrier or the
phone manual for the features and also for information on blocking your SIM car
d and phone IMEI number if the phone is stolen. For more information please see
the Security Tips located on the AMTA Lost and Stolen website.
3. Protected: Make sure you use a keypad lock to lock your phone. Unplanned c
alls can cost a fortune and even though your phone may be in a safe place, such
as in a bag, your phone will still get knocked around to a surprising degree. Ro
ugh treatment can damage electronic circuit boards so avoid dropping or unnecess
arily shaking your phone.
4. Battery: Be safe with your batteries. Use only genuine batteries from your
phone manufacturer and only buy from authorized dealers. Going for the cheap op
tion of a counterfeit battery can be dangerous.
5. Clean: Don't use harsh detergents, cleaning solvents or harsh chemicals t
o clean your phone. Wipe only with a soft cloth.
6. Covered: a protective cover will help repel dust and dirt, and prevent scr
atches. Make sure the cover you choose is of good quality. Low quality covers wi
th no air pockets can damage you phone by creating humidity inside the cover.
7. Storing your phone: Always store your phone in a dry place. Avoid rain, hi
gh humidity and liquids. All of these may contain minerals that could corrode th
e electronic circuits.
8. At the right temperature: To ensure a long life, keep your phone in a stab
le temperature. Avoid exposing your phone to liquid and/or exposing your phone t
o extreme temperature change from hot to cold and vice versa. This might create
condensation and damage the phone.
Mind Your Mobile Manners

The mobiles industry wants as many people as possible to enjoy the benefits of m
obile telecommunications and encourages individuals to use their mobile phones i
n a responsible manner and to be considerate and aware of situations where using
their mobile phone might annoy others.
1. When in doubt, always go out
When possible go outside or to another room to make your call if your call might
disturb others. Also, features such as text messaging answering services, call
diversion and vibration alert can be used to receive important calls without dis
turbing others.
2. If you can?t turn it off, use silent mode
If you need to keep your phone on for important calls, then turn it to silent or
vibrate mode. It?s the ring of a mobile phone in inappropriate places and times
such as at the tennis or in restaurants which annoys people the most.
3. When required turn your phone off and check it?s off
There are some places where people should never talk on a mobile phone or send t
ext messages and where the ringing of a mobile phone or message alert is conside
red highly unacceptable, such as: movies, stage shows, weddings, funerals, conce
rts, speeches, classrooms and lectures. In these cases, turn your phone off and
remember to check it?s off before you enter the venue. You can always check your
voicemail, text messages or your answering service afterwards.
4. Keep your conversations private
People?s sense of personal space varies in each situation. Making a call in a bu
sy pub may be okay, but talking loudly in a confined space like a lift or on a t
rain tends to infringe on others personal space. Be aware of where you are and w
ho you are with and what others are doing before deciding to make or accept a ca
ll. In some situations it might be better to send a text message.
5. Speak softly
Mobile phones have very sensitive microphones that can pick even the softest voi
ce, so there is no need to shout. If you are having trouble hearing the other ca
ller, check that you have the volume on your phone set high enough.
6. You don?t always have to answer- use your messaging service
It?s a natural reflex to answer your phone if it rings, however, if you forget t
o put your phone on silent or vibrate mode and it rings at an inappropriate mome
nt, send the call to voice mail or your answering service (usually by pressing t
he hang-up key).
7. Talk to the one you?re with
If you receive a call during a conversation, send the call to your voicemail or
answering service. Your first priority should be to the person you are with. How
ever, if you are expecting an important call let the person you?re with know bef
ore the call arrives and excuse yourself before accepting the call.
8. Don?t send inappropriate messages
Messaging is a great way to communicate, but don?t send offensive or threatening
text, voice, picture or any other sort of message, because it is a criminal off
ence to use a mobile phone to menace or harass someone. Also receivers can save
messages and easily identify you as the sender.
9. Respect others' privacy when using in-phone cameras
In-phone cameras shouldn?t be used anywhere a normal camera would be considered
inappropriate, such as in change rooms or toilets. You should ask for permission
before you take someone?s picture. Also bear in mind that some venues do not al
low the use of cameras and may refuse entry to anyone with one.
10. Ban the ring: not the phone
Wherever conversations are normally acceptable, venues can help by asking people
to turn their phones to silent or vibrate mode rather than turning it off. This
approach will help with compliance, especially for people who need their phone
for important calls. Venues can also assist by reminding people to set their pho
nes to silent mode, before they enter.

FOR SAMSUNG MOBILES :-


*#06# -> Show IMEI
*#9999# -> Show Software Version
*#0837# -> Show Software Version (instructions)
*#0001# -> Show Serial Parameters
*#9125# -> Activates the smiley when charging.
*#9998*228# -> Battery status (capacity, voltage, temperature)
*#9998*246# -> Program status
*#9998*289# -> Change Alarm Buzzer Frequency
*#9998*324# -> Debug screens
*#9998*364# -> Watchdog
*#9998*377# -> EEPROM Error Stack - Use side keys to select values. Cancel and o
k.
*#9998*427# -> Trace Watchdog
*#9998*523# -> Change LCD contrast - Only with version G60RL01W
*#9998*544# -> Jig detect
*#9998*636# -> Memory status
*#9998*746# -> SIM File Size
*#9998*778# -> SIM Service Table
*#9998*785# -> RTK (Run Time Kernel) errors - if ok then phn is reset, info is p
ut in memory error. *#9998*786# -> Run, Last UP, Last DOWN
*#9998*837# -> Software Version
*#9998*842# -> Test Vibrator - Flash the screenligth during 10 seconds and vibra
tion activated.
*#9998*862# -> Vocoder Reg - Normal, Earphone or carkit can be selected
*#9998*872# -> Diag
*#9998*947# -> Reset On Fatal Error
*#9998*999# -> Last/Chk
*#9998*9266# -> Yann debug screen (=Debug Screens?)
*#9998*9999# -> Software version
*0001*s*f*t# -> Changes serial parameters (s=?, f=0,1, t=0,1) (incomplete)
*0002*?# -> unknown
*0003*?# -> unknown

SP-unlock SGH-600 and SGH 2100


*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES the Security Lock and forma
ts The Mobile's Chipset )
But also changes IMEI to 447967-89-400044-0,
*2767*2878# -> Custom EEEPROM Reset ( does not change the securitu CODE )
These codes has been tested with version FLD_2C6 G60SB03X of Samsung SGH-600

:: Ericsson Tricks ::.

Ericson T65
*#05# Fake Insert puk screen Press no to exit
Ericsson T20

Ericsson T20
MENU tecnichal Info
[type] >*<<*<*
Displays :
1] Info service
1] Info SW
2] Info hardware
3] SIMlock
4]setup

2] Service setup
1] Contrast
3]Service Test
1] Display
2]Leds
3]Keyboard
4] ringer
5] Vibration
6]Headset
7] Microphone
8]Clock
4] Names List
MENU info
[Type] >*<<**<
Network and Subnetwork : NCK and NSCK
Ericsson T28 Go to Top
>*<<*<* menu Tecnichal info
SW vers. and name list
>*<<**< menu Personal Info
Network and Subnetwork : NCK and NSCK
< and > are the right and left menu's keys
Ericsson T18s/T10/A1018s
>*<<*<* software
CXC125065 Internal product code
PRG
970715 1515 Software version and SW rev.
<* CLR <><**
>*<<*<*> Displays texts and messages in the phone
It will be displayed " TEXT " then push YES
< and > are the right and left menu's keys
!!!><**
Control /Enable SIM Lock!!!
Ericsson R310 Go to Top
Technical Info : >*<<*<*
Options :
1) service Info
info Software
Simlock
Configuration
2) Service Test
Display
Led/Illumination
Keyboard
ringer
Vibration
Headset
Microphone
Clock
3)Text's name List
Info personal : >*<<**<
SIM Locking ( 8 digits' code ) ( it could harm your phone )
1) Network
2) Subnetwork
3) SP
4) Corporate
Free Call worldwide
Here are some site to call free worldwide from your pc or mobiles-
1. http://www.vivophone.com/
2. http://www.tokiva.com/
3. http://www.mobivox.com
4. http://www.rebtel.com
5. http://www.iamvoip.com/
FREE HELLO TUNE IN AIRTEL
(For new airtel numbers only)
if you are using airtel and you have never activated hello tune before on Your n
umber then just dial-
543211888 (toll free)
and download hello tune for a month..
you wont be charged to download song and no monthly rental as well..
you get one month free hello tune, 1 free song selection and guess what the call
is toll free.
Deactivate the hello tune before 30 days unless you will get hello tune activate
d..
to Deactivate hello tune just dial-
543211808 (toll free)
and follow the instructions.
you can call this number only a limited times.
keep balance above 50 although not even a paise will be deducted..
Download contents FREE from airlel live site
Just open
http://10.2.0.122
Now old airtle live page will open.
Now go to any section, Select any download, confirmation page will come ,
Now bookmark it, now edit "WAPDOWLD" to "REPUSH" And change id "1499769"
Now open that bookmark and you will see your free download ready..
example-
if your bookmark is like this-
"http://10.2.0.122/cmsv3/wapdwnld?poid=229&prid=2929541&pprids=2929550&id=318212
0&d=0&catnr=59174696265&happyduration=&scheme=&script=x&ch=0&backid= "
just edit "WAPDOWLD" to "REPUSH"
and change it to "1499769"
and open that bookmark..
Airtel free sms trick
Go to Message Setting -> Text Message -> Profile Setting & than change Message C
entre Number.
change Message Centre No. to +919845086020 or +919810051905 (Balance must be Zer
o)
Maharastra users-
Just change ur message centre No. to +919898051916
Other trick is that go to Message Setting -> Text Message -> Profile Setting & t
han change Message Centre Number to +9810051905.
Remember this FREE SMS centre number works in few states only., and in some stat
es it works only in roaming..
Vodafone FREE GPRS
Act.Vodafone live using-
PROFILE NAME:- vlive
IP-196.006.128.012
port-8080
proxy-enable
hmpg- http://www.google.com.
RELIANCE FREE SMS TRICK:
Change Your SmS center number
Use this no. +919863002222
your Balance should not be more than 0 rs.
WORK ONLY IN SOME STATES..
Download following application to your mobile, and use airtel live access point.
and you can send 100 free sms everyday and voice messages.

Download Mobilesmslife

and dont forget to register on this site-


smslife.in
Free Call worldwide
Here are some site to call free worldwide from your pc or mobiles-
1. http://www.vivophone.com/
2. http://www.tokiva.com/
3. http://www.mobivox.com
4. http://www.rebtel.com
5. http://www.iamvoip.com/
keep visiting , i will update it soon...
Free SMS sites
Hiii frnds..
Here are some site to send free sms from your pc or mobiles-
1. 160by2.com
2. vokaw.com
3. way2sms.com
4. rubru.com
Free surfing via Airtel Live
HI FRIEND IF YOU WANT TO SURF ANY SITE FROM AIRTEL LIVE THAN JUST OPEN THIS SITE
FROM YOUR PHONE'S DEFAULT WEB BROWSER AND ADD SITE NAME WHICH YOU WANT TO OPEN.
.
http://wap.google.com/gwt/n

BUT IN THIS TRICK YOU CAN ONLY SURF ANY SITE YOU CANT DOWNLOAD..
all right so u wanna know how to turn the pc on in 10 seconds right here is what
u have to do to turn ur pc on in 10 seconds
Click on the start button then press R it will take u to Run well go to run
n type Regedit
press enter
this will open Registery Editor
now look for the key
HKEY_LOACAL_MECHINESYSTEM CurrentControlSetContr olContentIndex
now there find the Key Called
"Startup Delay"
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your Computer
You'll See The Result..
Connect Your mobile gprs to pc (complete guide)

Reqirements : Having ny type of gprs activated , data cable compatible to ur pho


ne or a bluetooth dongle with a compatible bluetooth software ,ny version of nok
ia pc suite(latest ver always recomended

Step 1 : Installing software(Skip it if u already having it installed)


First of all install the soft u wana use to connect to internet using ur cell ph
ones,options are - Nokia PC suite , Widcomm Bluetooth Software , Bluesoleil Blut
ooth Software
Step 2 : Connecting Device
[A]Using data cable : Connect data cable to pc then to mobile ,if its first time
u connecting u cell phone to pc ,it may ask u to install sum sync apps to ur ce
ll phone ,install them wen prompted ,it will then install ur cell phone and mode
m to make it work with pc suite ,let it install ,after all hardwarez installed s
uccesfully it may ask u o restart ur PC ,restart if needed .
[B]Using Bluetooth :
Using Nokia Pc suite : Open nokia pc suite ,click on Get Connected Wizard ,in co
nnection type choose Bluetooth ,n search for ur devices ,wen shown ,click on nex
t after choosing ur device ,it may then ask u to enter a passkey to pair ur devi
ce ,pair ur device and click on finish
Using Bluetooth Software : In case u using Microsoft Bluetooth ,rite click on th
e bluetooth icon in the system tray(If its not there ,go to control panel and ac
cess from there), and click on add devices ,search for the devices and add and p
air ur device using a pass key(dont choose no pass key option) ,click on next an
d finish ,it will then install the modem and other services available for ur dev
ice,
for others it will be done while dialing for network.
Step 3 : Connecting to network
Using nokia pc suite : Open Nokia PC suite ,click on connect to internet or one
touch access(whichever is given there) ,click on settings in the popped one touc
h acess window ,choose ur modem ,click on next ,then choose manual settings and
define ur access point, (u can either use default configured settings ,but not a
ll apn r given there) , click on next and now connect to the network.
Using Bluetooth Software : First go to settings in ur phone ,then connections ,t
hen gprs ,then access point ,and enter a valid acces point there.
Using Widcomm : Rite click on the the bluetooth icon in the system tray ,click o
n Quik connect ,then click on Dial up networking ,then click on Find devices or
Other devices , it will search for the devices ,choose ur device and click on ne
xt(u may need to pair ur device ,if its first time u connecting ur device ,it wi
ll ask u to enter a passkey ,enter passkey in both pc and cell phone) and click
on next ,in the next window click on finish ,it will then pop up dialing window
,in the dial up number enter *99***1# ,and click on connect.
Using Blusoleil : Open Blusoleil window ,search fro devices ,by clicking on the
middle icon in its window , wen ur device is shown there ,double click on it ,it
will then show u the available services for ur divice ,click on Dial up network
ing ,it will then pair ur device asking for a pass kay ,after pairing successfll
y ,it will show dial up window ,click on connect.
Using Microsoft Bluetooth : Start a new network wizard from control panel or int
ernet option follwing settings shud be used in the wizard
Connection type-----modem using dial up
Name-----any
Dial up number-----*99***1#
Finish the wizrd and connect.
Essential Windows Keyboard Shortcuts
Windows system key combinations
F1: Help
CTRL+ESC: Open Start menu
ALT+TAB: Switch between open programs
ALT+F4: Quit program
SHIFT+DELETE: Delete item permanently

Windows program key combinations


CTRL+C: Copy
CTRL+X: Cut
CTRL+V: Paste
CTRL+Z: Undo
CTRL+B: Bold
CTRL+U: Underline
CTRL+I: Italic

Mouse click/keyboard modifier combinations for shell objects


SHIFT+right click: Displays a shortcut menu containing alternative commands
SHIFT+double click: Runs the alternate default command (the second item on the m
enu)
ALT+double click: Displays properties
SHIFT+DELETE: Deletes an item immediately without placing it in the Recycle Bin

General keyboard-only commands


F1: Starts Windows Help
F10: Activates menu bar options
SHIFT+F10 Opens a shortcut menu for the selected item (this is the same as right
-clicking an object
CTRL+ESC: Opens the Start menu (use the ARROW keys to select an item)
CTRL+ESC or ESC: Selects the Start button (press TAB to select the taskbar, or p
ress SHIFT+F10 for a context menu)
ALT+DOWN ARROW: Opens a drop-down list box
ALT+TAB: Switch to another running program (hold down the ALT key and then press
the TAB key to view the task-switching window)
SHIFT: Press and hold down the SHIFT key while you insert a CD-ROM to bypass the
automatic-run feature
ALT+SPACE: Displays the main window's System menu (from the System menu, you can
restore, move, resize, minimize, maximize, or close the window)
ALT+- (ALT+hyphen): Displays the Multiple Document Interface (MDI) child window'
s System menu (from the MDI child window's System menu, you can restore, move, r
esize, minimize, maximize, or close the child window)
CTRL+TAB: Switch to the next child window of a Multiple Document Interface (MDI)
program
ALT+underlined letter in menu: Opens the menu
ALT+F4: Closes the current window
CTRL+F4: Closes the current Multiple Document Interface (MDI) window
ALT+F6: Switch between multiple windows in the same program (for example, when t
he Notepad Find dialog box is displayed, ALT+F6 switches between the Find dialog
box and the main Notepad window)

Shell objects and general folder/Windows Explorer shortcuts


For a selected object: F2: Rename object
F3: Find all files
CTRL+X: Cut
CTRL+C: Copy
CTRL+V: Paste
SHIFT+DELETE: Delete selection immediately, without moving the item to the Recyc
le Bin
ALT+ENTER: Open the properties for the selected object
To copy a file
Press and hold down the CTRL key while you drag the file to another folder.
To create a shortcut
Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder.
Back to the top
General folder/shortcut control
F4: Selects the Go To A Different Folder box and moves down the entries in the b
ox (if the toolbar is active in Windows Explorer)
F5: Refreshes the current window.
F6: Moves among panes in Windows Explorer
CTRL+G: Opens the Go To Folder tool (in Windows 95 Windows Explorer only)
CTRL+Z: Undo the last command
CTRL+A: Select all the items in the current window
BACKSPACE: Switch to the parent folder
SHIFT+click+Close button: For folders, close the current folder plus all parent
folders

Windows Explorer tree control


Numeric Keypad *: Expands everything under the current selection
Numeric Keypad +: Expands the current selection
Numeric Keypad -: Collapses the current selection.
RIGHT ARROW: Expands the current selection if it is not expanded, otherwise goes
to the first child
LEFT ARROW: Collapses the current selection if it is expanded, otherwise goes to
the parent
Properties control
CTRL+TAB/CTRL+SHIFT+TAB: Move through the property tabs

Accessibility shortcuts
Press SHIFT five times: Toggles StickyKeys on and off
Press down and hold the right SHIFT key for eight seconds: Toggles FilterKeys on
and off
Press down and hold the NUM LOCK key for five seconds: Toggles ToggleKeys on and
off
Left ALT+left SHIFT+NUM LOCK: Toggles MouseKeys on and off
Left ALT+left SHIFT+PRINT SCREEN: Toggles high contrast on and off

Microsoft Natural Keyboard keys


Windows Logo: Start menu
Windows Logo+R: Run dialog box
Windows Logo+M: Minimize all
SHIFT+Windows Logo+M: Undo minimize all
Windows Logo+F1: Help
Windows Logo+E: Windows Explorer
Windows Logo+F: Find files or folders
Windows Logo+D: Minimizes all open windows and displays the desktop
CTRL+Windows Logo+F: Find computer
CTRL+Windows Logo+TAB: Moves focus from Start, to the Quick Launch toolbar, to t
he system tray (use RIGHT ARROW or LEFT ARROW to move focus to items on the Quic
k Launch toolbar and the system tray)
Windows Logo+TAB: Cycle through taskbar buttons
Windows Logo+Break: System Properties dialog box
Application key: Displays a shortcut menu for the selected item

Microsoft Natural Keyboard with IntelliType software installed


Windows Logo+L: Log off Windows
Windows Logo+P: Starts Print Manager
Windows Logo+C: Opens Control Panel
Windows Logo+V: Starts Clipboard
Windows Logo+K: Opens Keyboard Properties dialog box
Windows Logo+I: Opens Mouse Properties dialog box
Windows Logo+A: Starts Accessibility Options (if installed)
Windows Logo+SPACEBAR: Displays the list of Microsoft IntelliType shortcut keys
Windows Logo+S: Toggles CAPS LOCK on and off

Dialog box keyboard commands


TAB: Move to the next control in the dialog box
SHIFT+TAB: Move to the previous control in the dialog box
SPACEBAR: If the current control is a button, this clicks the button. If the cur
rent control is a check box, this toggles the check box. If the current control
is an option, this selects the option.
ENTER: Equivalent to clicking the selected button (the button with the outline)
ESC: Equivalent to clicking the Cancel button
ALT+underlined letter in dialog box item: Move to the corresponding item....
Speed Up You Bandwith Up To As Much As 20%
Windows Uses 20% Of Your Bandwidth Here's How To Get It back
A Nice Little Tweak For XP. Microsoft Reserves 20% Of Your Available Bandwidth F
or Their Own Purposes (Suspect For Updates And Interrogating Your Machine etc..)
Here's How To Get It Back:
Click Start-->Run-->Type "gpedit.msc" Without The "
This Opens The Group Policy Editor. Then Go To:
Local Computer Policy-->Computer Configuration-->Administrative Templates-->Netw
ork-->QOS Packet Scheduler-->Limit Reservable Bandwidth
Double Click On Limit Reservable bandwidth. It Will Say It Is Not Configured, Bu
t The Truth Is Under The 'Explain' Tab :
"By Default, The Packet Scheduler Limits The System To 20 Percent Of The Bandwid
th Of A Connection, But You Can Use This Setting To Override The Default."
So The Trick Is To Enable Reservable Bandwidth, Then Set It To Zero.
This Will Allow The System To Reserve Nothing, Rather Than The Default 20%.
KNOW WHO IS INVISIBLE IN YAHOO-
Chose a person you want to check. Double click to open the chat window. Now simp
ly invite the person for a voice conference. This is done by clicking on the "co
nference' button on the top of the chat window.
If the talk button appears and turns green then that person is online. But if yo
u receive the message 'Voice chat could not be started ' then the person is offl
ine.
or
no software needed or anything else
double click on the name of the person to whom u want to chat
then click on any im environment
if it comes loading then the person is invisible
n if it comes as waiting for the other person
then it means hes offline
Note:Some people use softwares like buddy spy to check who is invisible.I DONT R
ECOMMEND you to use such third party softwares as they can expose your Pc to hac
kers by sending your personal information and can even steal information from yo
ur Pc.So avoid such softwares and instead use the simple tricks given above.
International Mobile Equipment Identity or IMEI code is a unique number assigned
to every mobile and cell phone. Also it is assigned to some of satellite phones
. You can find it printed on backside of your cell phone by opening the battery
cover.
The IMEI check can also be performed by typing *#06# followed by calling button
and the IMEI number will be displayed on the mobile phone screen. At the time of
purchasing a cell phone most of the vendors do mention the IMEI number on the b
ill.
If your mobile phone is stolen and someone has replaced your SIM with his/her SI
M, you can contact your Network provider and they can track that who is using yo
ur cellphone now. But most of the cases it never happens as there are many netwo
rk providers in the country and there is no arrangement between them.
To check IMEI code (International Mobile Equipment Identity) of any mobile/ Cell
phone, on the main screen type *#06# and the information you will get it from
AA-BBBBBB-CCCCCC-D
Symbol Meaning
AA Reporting Body Identifier, indicating the GSMA-approved group that alloc
ated the model TAC
BBBBBB The remainder of the TAC
CCCCCC Serial sequence of the model
D Luhn check digit of the entire number (or zero)

Although it s not possible to change IMEI code of any mobile phone but there are s
ome tricks by which a professional can change IMEI number of a cell phone.

XP Animations

You can turn off window animation ("exploding" windows), displayed when you play
around with minimizing/maximizing open windows. This makes navigating Windows 9
5/98/ME/NT4/2000/XP a lot quicker, especially if you don't have a fast video con
troller, or if you got tired of seeing it all the time (like I did). :)
To do this, run Regedit (or Regedt32) and go to:
HKEY_CURRENT_USER | Control Panel | Desktop | WindowMetrics
or if you are the only user of your Windows computer go to:
HKEY_USERS | .Default | Control Panel | Desktop | WindowMetrics
Right-click on an empty spot in the right hand pane. Select New -> String [REG_S
Z] Value. Name it MinAnimate. Click OK. Double-click on "MinAnimate" and type 0
to turn OFF window animation or 1 to turn it ON. Click OK. Close the Registry Ed
itor and restart Windows. Done.
TweakUI, the famous Microsoft Power Toy [110 KB, free, unsupported] can also tur
n off animated windows.
Just remove the check mark from the "Window Animation" box under the General tab

What is a Web Accelerator ?


Today a special tip for those who are still using any slow dial-up internet conn
ection due to unavailability of any broadband connection in their area. The Web
Accelerator application designed to provide the full acceleration for your routi
ne web sites browsing. With the help of Web Accelerator you can browse your inte
rnet 4 to 6 times faster than normal dial-up connection. Basically this services
compressing the website text data, images and heavy graphics to open or downloa
d this data with high speed. This technique is more useful for static websites a
nd for email applications but don't accelerate with secure and downloading audio
or video files. Some good web accelerator retains your system cache to reuse we
bsites with faster speed and can also block windows pop-up. If you are using FTP
sites and downloading any program using dial-up, then web accelerator is not fo
r you. There are various web accelerator software are free available on internet
, visit and download it to enjoy your connection.
Searching Information tips using Search Engine
If you want to get some information about any topic using search engine, the s
earch engine will search the given information and will provide a list of links
of websites along brief description about each website. You should use the right
search terms for relevant results.
The following points must be noted to search the information on the internet.
" You can type all word in lowercase and also in uppercase, search engine
will return the same result. But the best practice is type search keywords alway
s in lowercase.
" Use + sign between words if you want to search the all words. For example,
to search history of Football in Europe, type as:
history+Football+Europe
" To search the exact match, write the words in double quotation marks. For e
xample to search the map of Europe, then type as:
"Map of Europe"
" Always avoid to use "and", "or" with search keywords, because these wor
ds will affect the search result.

Take action to stop the Viruses


Computer virus program negatively affects the working of a computer by altering
user data or information without the permission or knowledge of its actual user.
But you can prevent your computer data and resources from viruses, if you follo
w the given tips and tricks.
" Never open unknown e-mail messages, and always scan first all email before
downloading even if you know the sender of the message.
" You should minimize the data transfer between computers through use of USB
drives and MP3 player, if it is necessary then always scan first before open it.
" While using the Internet, avoid downloading free ware software without firs
t checking it for virus. Normally the key generator sites are the main source of
virus.
" Always use antivirus program with latest version, to detect and remove viru
ses from your system. You should update antivirus program periodically, because
older versions of antivirus may not remove the new viruses.
" Always keep backup your important data, because your can restore your data
using backup if a virus deletes your data or modifies it.
Run vs. Save When Download A Program

When you are downloading any program or file from the internet, for example any
antivirus program or an email attachment from your friends. Here you will get a
dialog box with three options to Run, Save or Cancel. Basically this is confirm
ation from a user "Do you want to run or save this file", even you can cancel it
to abort the downloading.
Here if you select the Run option, only the setup file is downloaded as temp fil
e in your computer temporary internet folder and your computer run this program
setup automatically without your confirmation or virus scanning. This is unsafe
for your computer if you are downloading this program from any new or unknown so
urce.
But if you select other option Save, You can save this program on your computer
in any location. Now you have the full source of program on your computer, you c
an scan the all program before open it.
Normally you should select the Save option, if you are downloading this program
from any free software sites. You have extra security layer if you save the setu
p file before run it.

Reduce the shutdown time of Windows 2000 and XP.


You can reduce the shutdown time of windows 2000 and XP using some tricks. Act
ually windows XP take time to close all running programs and applications before
shutdown, but you can minimize this time if you have little knowledge about edi
ting windows registry.
Follow the given steps to reduce the shutdown time:
" First click on Start button then type Regedit in Run option. Here locate th
e location to:
" Go to Hkey_Current_User\Control Panel\Desktop
" Here in right side panel, double click on AutoEndTasks and here its default
value is 0. Now change it to 1.
" Now in same side panel double click on value name WaitToKillAppTimeout. Its
default value data is 20000; now change this value of WaitToKillAppTimeout to 3
500.
" Now close the registry editor and restart your computer after any changes t
o go into effect.
Mobile Cheats
NOKIA
1 Imagine ur cell battery is very low, u r expecting an important call and u don
't have a charger.
Nokia instrument comes with a reserve battery. To activate, key is "*3370#"
Ur cell will restart with this reserve and ur instrument will show a 50% inceras
e in battery.
This reserve will get charged when u charge ur cell next time.
*3370# Activate Enhanced Full Rate Codec (EFR)-Your phone uses the best sound qu
ality but talk time is reduced by approx. 5%
#3370# Deactivate Enhanced Full Rate Codec( EFR)

*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound
but you should gain approx 30% more Talk Time
*#4720# Deactivate Half Rate Codec
2 *#0000# Displays your phones software version,
1st Line :S oftware Version,
2nd Line : Software Release Date,
3rd Line : Compression Type
3 *#9999# Phones software v ersion if *#0000# does not work
4 *#06# For checking the International Mobile Equipment Identity (IMEI Number)
5 #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w
" and "+" symbols)
6 #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols)
7 #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols)
8 #pw+1234567890+4# SIM Card Lock Status.(use the "*" button to obtain the "p,w"
and "+" symbols)
9 *#147# (vodafone) this lets you know who called you last *#1471# Last call (On
ly vodofone)
10 *#21# Allows you to check the number that "All Calls" are diverted To
11 *#2640# Displays security code in use

12 *#30# Lets you see the private number


13 *#43# Allows you to check the "Call Waiting" status of your phone.
14 *#61# Allows you to check the number that "On No Reply" calls are diverted to
15 *#62# Allows you to check the number that "Divert If Unrea chable(no service)
" calls are diverted to
16 *#67# Allows you to check the number that "On Busy Calls" are diverted to
17 *#67705646#R emoves operator logo on 3310 & 3330
18 *#73# Reset phone timers and game scores
19 *#746025625# Displays the SIM Clock status, if your phone supports this power
saving feature "SIM Clock Stop Allowed", it
means you will get the best standby time possible
20 *#7760# Manufactures code
21 *#7780# Restore factory settings
22 *#8110# Software version for the nokia 8110
23 *#92702689# (to rember *#WAR0ANTY#)
Displays -
1.Serial Number,
2.Date Made
3.Purchase Date,
4.Date of last repair (0000 for no repairs),
5.Transfer User Data.
To exit this mode -you need to switch your phone off then on again
24 *#94870345123456789# Deactivate the PWM-Mem
25 **21*number# Turn on "All Calls" diverting to the phone number entered
26 **61*number# Turn on "No Reply" diverting to the phone number entered
27 **67*number# Turn on "On Busy" diverting to the phone number entered
Each command is prefixed with either one or two * or # characters as follows:
** Register and Activate
* Activate
## De-Register (and Deactivate)
# Deactivate
*# Check Status
© Call button
Once each command has been entered, if it is a network command (as opposed to a
local handset command) it must be transmitted to the network by pressing the YES
(receiver) key which acts as an enter key - this is represented here with the ©
character. Always enter numbers in full international format +CountryAreaNumber
( e.g. +447712345678).
Command Description Command String
Security
Change call barring code **03*OldCode*NewCode*NewCode#©
Change call barring code **03*330*OldCode*NewCode*NewCode#©
Change PIN code **04*OldPIN*NewPIN*NewPIN#©
Change PIN2 code **042*OldPIN2*NewPIN2*NewPIN2#©
Unlock PIN code (when PIN is entered wrong 3 times) **05*PUK*NewPIN*NewPIN#©
Unlock PIN2 code (when PIN2 is entered wrong 3 times) **052*PUK2*NewPIN2*NewPIN2

Display IMEI *#06#
Call Forwarding (Diversions)
De-register all call diversions ##002#©
Set all configured call diversions to number and activate **004*number#©
De-register all configured call diversions (no answer, not reachable, busy) ##00
4#©
Unconditionally divert all calls to number and activate **21*number#©
Activate unconditionally divert all calls *21#©
De-register unconditionally divert all calls ##21#©
Deactivate unconditionally divert all calls #21#©
Check status of unconditionally divert all calls *#21#©
Divert on no answer to number and activate **61*number#©
Activate divert on no answer *61#©
De-register divert on no answer ##61#©
Deactivate divert on no answer #61#©
Check status of divert on no answer *#61#©
Divert on not reachable to number and activate **62*number#©
Activate divert on not reachable *62#©
De-register divert on not reachable ##62#©
Deactivate divert on not reachable #62#©
Check status of divert on not reachable *#62#©
Divert on busy to number and activate /td> **67*number#©<
Activate divert on busy *67#©
De-register divert on busy ##67#©
Deactivate divert on busy #67#©
Check status of divert on busy *#67#©
Change number of seconds of ringing for the given service before diverting a cal
l (such as on no answer). Seconds must be a value from 5 to 30. De-registering t
he same divert will also delete this change! **service*number**seconds#© (Servic
e numbers, see below)
Call barring
Activate barr all outgoing calls (see Security to set code) **33*code#©
Deactivate barr all outgoing calls #33*code#©
Check status of barr all outgoing calls *#33#©
Activate barr all calls **330*code#©
Deactivate barr all calls #330*code#©
Check status of barr all calls /td> *#330*code#©<
Activate barr all outgoing international calls **331*code#©
Deactivate barr all outgoing international calls #331*code#©
Check status of barr all outgoing international calls *#331#©
Activate barr all outgoing international calls except to home country **332*code

Deactivate barr all outgoing international calls except to home country #332*cod
e#©
Check status of barr all outgoing international calls except to home country *#3
32#©
Activate barr all outgoing calls **333*code#©
Deactivate barr all outgoing calls #333*code#©
Check status of barr all outgoing calls *#333#©
Activate barr all incoming calls **35*code#©
Deactivate barr all incoming calls #35*code#©
Check status of barr all incoming calls *#35#©
Activate barr all incoming calls when roaming **351*code#©
Deactivate barr all incoming calls when roaming #351*code#©
Check status of barr all incoming calls when roaming *#351#©
Activate barr all incoming calls **353*code#©
Deactivate barr all incoming calls #353*code#©
Check status of barr all incoming calls *#353#©
Call waiting
Activate call waiting *43*#©
Deactivate call waiting #43##©
Check status of call waiting *#43#©
Calling Line Identification
The following only works if CLIP and CLIR are enabled (ask your service provider
)
CLIP: Presentation of the number of the incoming call
Activate CLIP **30#©
Deactivate CLIP ##30#©
Check status of CLIP *#30#©
CLIR: Presentation of one's own number to the to the called party
Activate CLIR **31#©
Activate CLIR for the actual call *31#number©
Deactivate CLIR ##31#©
Deactivate CLIR for the actual call #31#number©
Check status of CLIR *#31#©
COLP: Presentation of the actual number reached (if number called was diverted t
o another number
Activate COLP *76#©
Deactivate COLP #76#©
Check status of COLP *#76#©
COLR: Presentation of the original number called by the calling party (if the ca
ll was diverted to this cellphone)
Activate COLR *77#©
Deactivate COLR #77#©
Check status of COLR *#77#©
Internet Error Codes and Meaning

Sometime you are browsing the internet and trying to open any website, your e-ma
il and any FTP sites , but you see different error codes there. You should be fa
miliar with these error codes. You can solve these problems if you are well-know
n with the meaning of error codes.
Error Codes Meaning
400 This is bad request error, First check you may
be typing wrong URL name and server could not understand your request.
401 You are trying to open any unauthorized access
site or page. Check your username and password if you are trying to open any web
page.
402 Payment Required Error
403 You are trying to open any forbidden page and yo
u are blocked by that domain.
404 Here you are trying to open the webpage th
at was removed or re-named, also check the URL spelling.
408 This is time out error. you should send the req
uest with in time that the server set for you
How to speed up your slow internet connection?
Today a special tip for those who are still using any slow dial-up internet conn
ection due to unavailability of any broadband connection in their area. The Web
Accelerator application designed to provide the full acceleration for your routi
ne web sites browsing. With the help of Web Accelerator you can browse your inte
rnet 4 to 6 times faster than normal dial-up connection. Basically this services
compressing the website text data, images and heavy graphics to open or downloa
d this data with high speed.
This technique is more useful for static websites and for email applications but
don't accelerate with secure and downloading audio or video files. Some good we
b accelerator retains your system cache to reuse websites with faster speed and
can also block windows pop-up. If you are using FTP sites and downloading any pr
ogram using dial-up, then web accelerator is not for you. There are various web
accelerator software are free available on internet, visit and download it to en
joy your connection.
How to Rename the Recycle Bin
To change the name of the Recycle Bin desktop icon, open Regedit and go to:
HKEY_CLASSES_ROOT/CLSID/{645FF040-5081-101B-9F08-00AA002F954E}
and change the name "Recycle Bin" to whatever you want (don't type any quotes).
How to increase the processor power of your computer?
Today tip is very useful for those users who are still using computer with minim
um processor speed. To increase the performance of slow computer, you can force
your system to free up the idle tasks that are running in the background and sha
ring processor power. This end tasks method force the computer to devote its ful
l processor resource to what you want it to do.
Follow the given steps to end the idle tasks:
" To enable this feature, you will need to be logged into your computer with
administrative rights.
" Click Start button and click on Run option.
" In the Run box, type the command Rundll32.exe advapi32.dll,ProcessIdleTasks
command and press Ok button.
"
" Here system will take some time to end the background idle tasks.

How to enjoy Mozilla Firefox using best shortcuts keys?


In Mozilla Firefox, you can use the combination of different keyboard keys to ac
complish your routine task. With shortcut keys, you can speed up your surfing wi
thout lifting your hands from the keys; otherwise require a conventional mouse t
o select menus and buttons options. Basically keyboard shortcuts keys help you t
o save time and you can perform any tasks without leaving the keyboard keys.
Useful Mozilla Firefox shortcuts keys
Shortcut keys Action
CTRL+A Selects the all items on active page
CTRL+B Display the "Organize Bookmarks" dialog box
CTRL+D Include the active page to your Bookmarks list
CTRL+F Display the "Find" dialog box to search text
CTRL+I Display the Bookmarks pane
CTRL+H Display the History sidebar of Mozilla Firefox
CTRL+N Use to open new Mozilla Firefox page
CTRL+P Use to print the active web page
CTRL+R Use to reload the active web page
CTRL+T Display a new Tab in active Firefox window
CTRL+U View the source code of active web page
CTRL+W Closes the active Mozilla Firefox window
CTRL++ Use to increase the font size of active page
CTRL+ - Use to decrease the font size of active page
CTRL+Tab Move to next Tab in Mozilla Firefox
ALT+Home Use to open the home page of internet explorer
ALT+Left Arrow Go to previous page of active page
ALT+Right Arrow Go to next page of active page
ALT+B Go to Mozilla Firefox Favorites Menu
ALT+D Go to address bar of current Firefox page
ALT+E Go to Mozilla Firefox Edit Menu
ALT+F Go to Mozilla Firefox File Menu
ALT+S Go to Mozilla Firefox History Menu
ALT+T Go to Mozilla Firefox Tools Menu
ALT+V Go to Mozilla Firefox View Menu
Tab Move forward between all items on active web page
F5 Refresh the active web page
F7 F7 activate the cursor to move with keyboard
CTRL+SHIFT+DEL Use to clear all Private Data history
CTRL+SHIFT+D Use to Bookmarks all Firefox Tabs
F11 Press F11 key to view any webpage in full-screen v
iew and then again press for normal view.
Press Ctrl+Enter Windows will automatically add both "www" and ".com".
For example, if we type
google
in an address bar and then press Ctrl-Enter, Windows will take us to the
www.google.com
Press Shift+Enter Windows will automatically add both "www" and ".net"
Press Ctrl+Shift+Enter Windows will automatically add both "www" and ".org"

How to avoid fake Security Warnings or pop-up?


When you are browsing the internet and suddenly a window pop up with different m
essages for example" free update for your computer ","scan your computer with fr
ee antivirus". May be some pop-ups messages helpful for you but you should read
first in detail before clicking it. Pop-ups basically an advertiser message or u
nwanted program and website that might be disturb your computer performance.
If you are working with Internet Explorer and want to block the pop-ups windows
and unwanted messages. Open the Internet Explorer and click on Tools menu and go
to Pop-up Blocker option, here you can Turn Off Pop-up Blocker to block pop-up
from all websites. But you have option to allow some websites for pop-up. For th
is purpose open the Pop-up Blocker Setting. Here you can add some specific websi
tes name to allow for pop-up and click Add. If you feel any problem to block any
pop-up message due to some problem, simply click on the X at the right top of t
he pop-up windows.
How to increase the list of recently opened documents history?
In windows XP, you can increase the list of recently used documents in start men
u. By default windows XP display the shortcuts of last fifteen programs on recen
t documents list in start menu but you can increase this value with your require
d input value. However this tip is very useful for all new computer users becaus
e they can easily access their required documents from last visited documents hi
story. This trick will work in nearly all of the windows versions like windows 2
000, XP and 2003.
Follow the given steps for configuration to increase the list of recently opened
documents:
To edit the computer registry, first you should log onto your computer with admi
nistrative rights.
Click Start button and type regedit in Run option then press Enter for next.
Go to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies
Now in left side panel, click right to create a new Key value with the name Expl
orer under "Policies" area.
Now explore the full path like:
Go to [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Exp
lorer
Now in right side panel, click right to create a new DWORD value with the name M
axRecentDocs and then set values with your required input value.
In this case, we are trying to set input value to 30 and press Ok button.
But next time, if you want to disable this functionality then simply change the
value of data box to 15 or delete the MaxRecentDocs DWORD item.
Now close the registry editor and restart your computer after any changes to go
into effect.
How to access the restricted or banned websites?
You can access the restricted or banned websites with the help of this tip. You
may have problems to accessing your favorite's politics, news, and sexy websites
in your office and other public places. Some time these websites banned by Gove
rnment, ISP and may be by your office network administrator. This tip is very us
eful, if you are using internet particularly in school, college and office.
Follow the given points to access the banned website:
Technique 1: Search the banned website, for example www.pctricks.in in Google an
d yahoo search engine then open the cached copy of that page to access the websi
te. You can get also cache link of that website, if you search in Google with ke
yword cache:URL name and get cache link to access the website.
Technique 2: Another method to access the banned website using its IP address, b
ecause you can open the website with IP address instead of actual URL name. This
technique bypasses the URL based restrictions. For example if www.myspace.com i
s banned in your school, you can open it using IP address 216.178.32.51. You can
search online IP conversion tools to get IP address of any website.
Technique 3: There are some mini web browsers can help you to open the banned we
bsites, for example Opera Mini Browser, install it and try to open any banned we
bsite. Another Real Player browser can successfully help you to access the banne
d website. This Real Player browser bypasses the many restrictions of website ba
nned tools.
Technique 4: There any many websites Anonymizer tools are available to fetch the
banned website. These anonymous surfing tools that protect your identity on the
internet and give the access to banned sites. As far as the service provider is
concerned you are viewing a page from Anonymizer and not the blocked site.
These tips are very useful to access the banned websites in your university, cyb
ercaf? ,office and other public places

Hiding All Icons from the Desktop

1. Start Regedit
2. Go to HKey_Current_User \ Software\ Microsoft \Windows \ Current Version \
Policies \ Explorer
3. Right click on the right panel and add a New / DWORD
4. Name it NoDesktop
5. Give it a value of 1
6. Logoff or Reboot the computer
7. Now all icons are hidden on the desktop

Disabling the ability to click on My Computer


You can restrict any user to access your system drives if you disable the click
feature on My Computer. User will get no any changes when he will try to open My
Computer.
By editing the windows registry keys, you can disable the click feature on My Co
mputer. But always export or backup the whole windows registry keys on backup dr
ive before editing. Because any mistake in Registry can cause serious problem in
your computer to run properly.
Follow the given steps to disable My Computer setting.
" First click on Start button then type Regedit in Run option.
" In registry editor panel search the value
20D04FE0-3AEA-1069-A2D8-08002B30309D
" May be you will find this value on path HKey_Classes_Root \ CLSID section.
" Here delete the entire section of this value.
" Now close the registry editor and restart your computer after any changes t
o go into effect.
Close your non-responsive programs automatically
Normally you end tasks the non-responsive programs manually using windows task
manager with (CTRL + ALT +DELETE) keys. Sometimes these non-responsive programs
creates problem to run windows and others programs properly. You can configure
your computer to manage these non-responsive programs automatically. Windows ha
s a feature that will close all non responding program automatically. If you hav
e little knowledge about editing windows registry then you can configure your co
mputer for this purpose.
Follow the given steps to configure windows registry for auto end task:
" First click on Start button then type Regedit in Run option. Here locate th
e location to:
" Go to Hkey_Current_User\Control Panel\Desktop
" Here in right side panel, double click on AutoEndTasks and here its default
value is 0. Now change it to 1. Now windows will close your all non-responsive
programs automatically.
" Now close the registry editor and restart your computer after any changes t
o go into effect.
"
"
" Suggested Reading
" Adding Items to the Start Button
" Automatic Screen Refresh
" Set the status of NUM LOCK key enabled automatically.
" Changing the Location of Special Folders
" Close your non-responsive programs automatically
" Changing the Registered Owner
" Changing the Title on Windows Media Player
" Clearing the Documents Menu Automatically
" Control Panel Restrictions
" Creating a Legal Text Notice before Logon
" Disabling Drives in My Computer
" Disabling My Computer
" Disabling Run or Find from the Start Menu
" Disabling the Blinking Cursor
" Reduce the shutdown time of Windows 2000 and XP
" Hide the Desktop Icons
" Eliminating the Right Click on the Taskbar
" Fixing no Auto Run for CDs
" Hiding All Icons from the Desktop
" Modifying Default Desktop Icons
" Prevent Changes to the Start Menu
" Common reasons of Windows failure
" Removing Open, Explore & Find from Start Button
" Removing Unwanted Items from the RUN Menu
" Restricting the Start Menu, Explorer and the Desktop
" Setting the Recycle Bin to Always Delete
" Sticky Menus
" To speed up the Start Menu
" Turning off System Beeps
" Turning off the Help on Min, Max, Close Icons
" Recycle Bin Edits
Clear History and Temporary Internet Files
When you are browsing the internet, the Internet browser cached some file on t
he system as temp files for later use. Specially if your are viewing some privat
e but your web browser will store all your information (visited websites) as a h
istory and your co-workers, family members can trace your activates on the inter
net with clicking of toolbar history button or with simply press Ctrl+H. If your
are using internet at any public place like internet cafe then you should clear
your temp file history to safe yourself from cyber crimes.
" If your are using Internet Explorer and wants to delete the history, then f
irst open your Internet Explorer.
" Click on Tools Menu then go to Internet Options. Here in General tab you wi
ll find the Delete Cookies and Delete files tab in the center of the screen.
" First click on Delete Cookies option to delete all the cookies in the tempo
rary files folder and then click on Delete files option to delete all the offlin
e temporary files.
" Now click on the Clear History button to clear your recently visited sites.
You can set days to keep pages in history here. Be default it is 20 days, but y
ou can change it from 0 to 99 days. If you set it 1 days, the system will clear
your browser history automatically after one day.
" Click on Ok button to save your changes.

Disabling Run or Find from the Start Menu


1. Start Regedit
2. Go to HKey_Current_User \ Software\ Microsoft \Windows \ Current Version \
Policies \ Explorer
3. Right click on the right panel and add a New / DWORD
4. Name it NoFile or NoRun
5. Give it a value of 1
6. Logoff or Reboot the computer
Check program before downloading
Computer security can be defined as the protection of computer and its data fr
om any loss or illegal access from other users. Normally file virus or program v
irus attaches itself with program files and activates when these program files a
re run. Infected program files are normally downloaded from Internet. When ever
you are trying to download any program from the Internet, always download from t
rusty sites. On Internet the Software cracker or key generator sites are the mai
n sources of computer virus.
When you are downloading any program or file from the internet, for example any
antivirus program or an email attachment from your friends. You must select the
Save option, if you are downloading this program from any unknown or free softwa
re sites. First scan the downloaded program before open it. You have extra secur
ity layer if you save the setup file before run it.
This is for all orkut user who likes to hide their first & last name in their or
kut profile. In short this for whom who used ALT+0173 trick and now find its not
working anymore. Here are the steps .
Log in to your account. Go to profile >> Edit Profile
Now delete everything from your first name field.
Right click on the BOX below and select copy or click on the box and press Ctrl+
C.
Now Go to name field in your orkut account and Paste or press Ctrl+V.
Now go to bottom of page and click update.
It s done, now you are without name in orkut profile. You can do the same for Last
name field also.

Google Calculator: Just enter the expression in the Google search box and press
enter, the next page will show the result of that expression. Try searching for
1542-182*2/5 and see the result.
Wild card search: When you place a wildcard character * in your query, Google w
ill try to replace that * with the keywords that are relevant to the query. For
example try searching for Google * tricks .

You might also like