Search This Blog

Thursday 15 November 2012

Open more than 75 files with a single software

We need many type of files which we use daily. And for using each file we need a different software. So we have to install many softwares in the system which also affect our system's speed. But there is a software which is able to support more than 75 file types. All your. By installing this single software in your system, you can save space of many softwares. Now you do need to install different software for different file type.

Supported File Formats

Code Files (.vb, .c, .cs, .java, .js, .php, .sql, .css, .aspx, .asp)
Web Pages (.htm, .html)
Photoshop Documents (.psd)
Images (.bmp, .gif, .jpg, .jpeg, .png, .tif, .tiff)
XML Files (.resx, .xml)
PowerPoint  Presentations (.ppt, .pptx, .pps)
Media (.avi, .flv, .mid, .mkv, .mp3, .mp4, .mpeg, .mpg, .mov, .wav, .wmv, .3gp, .flac)
Microsoft  Word Documents (.doc, .docx)
SRT Subtitles (.srt)
RAW Images (.arw, .cf2, .cr2, .crw, .dng, .erf, .mef, .mrw, .nef, .orf, .pef, .raf, .raw, .sr2, .x3f)
Icons (.ico)
Open XML Paper (.xps)
ML Paper (.xps)
Torrent (.torrent)
Flash Animation (.swf)
Archives (.7z, .gz, .jar, .rar, .tar, .tgz, .zip)
Rich Text Format (.rtf)
Text Files (.bat, .cfg, .ini, .log, .reg, .txt)
Apple Pages (.pages)
Microsoft Excel Documents (.xls, .xlsm, .xlsx)
Comma-Delimited (.csv)
Outlook Messages (.msg)
PDF Documents (.pdf)
vCard Files (.vcf)
EML Files (.eml)

Download Here

How to unlock pdf files | Online pdf unlocker tool

How to unlock pdf files | Online pdf unlocker tool


There are many pdf files which doesn't allow user from copying image and data. If you want to unlock pdf files for copy data from it, there is an online tool for that.

To unlock a PDF file, enter it’s location in the “PDF file to unlock” field, by either typing it in the field or clicking on the “browse” button, then navigating to it’s location.

The unlocked version of the PDF will be displayed in a new browser window, opened in the default PDF application for your system (usually Adobe Acrobat Reader)


Visit and Unlock PDF Online

Fedora 15 released with many new features

Fedora 15 released with many new features


Fedora 15 operating system's final and stable version is released and available for download. Fedora 15 is powered by linux kernel 2.6.38. It includes dynamic firewall, firefox 4, new full text search tool and double entry accounting system.


Highlights of Fedora 15:


Linux kernel 2.6.38.6;
Btrfs filesystem;
GNOME 3 desktop environment;
Indic typing booster;
Better crash reporting;
Redesigned SELinux troubleshooter;
Gnome Shell user interface;
GTK+ 3.0;
Xorg Server 1.10;
Deja Dup backup software;
LibreOffice 3.3 open source office suite;
Mozilla Firefox 4.0 web browser;
BoxGrinder appliance (virtual machines) builder;
Ledger, double-entry accounting system;
Higher compression in live images;
recoll, full-text search tool;
Dynamic firewall;
IcedTea Java plugin;
RPM 4.9;
Python 3.2;
Rails 3.0.3;
OCaml 3.12;
FreeIPA 2.0;
Maven 3;
GNU Debugger (GDB) 7.3;
GCC 4.6;
Sugar .92 environment;
eCryptfs support in authconfig;
LZMA comperssion for Live images;
Power Management improvements;
Retrace server;
Robotics suite.


Download Here:
http://download.fedoraproject.org/pub/fedora/linux/releases/15/Live/i686/Fedora-15-i686-Live-Desktop.iso

Trace IP and Mobile Numbers

Trace IP address and MOBILE Numbers
Many people want this type of services and searched over internet a waste their time but unable to get desired results.
A few days ago i got a website which have a lots of tracing services. It shows tracing results in a map along with all suitable information you want to know.
You can trace a Mobile number. For example , when we enter the 10 digit mobile number, then we get the Mobile Service provider, Location, City along with area in a map. 
Thats really awesome.

You can also trace IP Address of a person. Enter your IP address and it will show you the location of this IP address and complete details of the ISP with the contact number of that IP Address. 

Features of this site is

Trace Mobile Number
Trace Vehical Number
Trace Pin Code
Trace IP Address
WHOIS Trace 

GO TO THIS LINK:
http://www.indiatrace.com 

please comment below if this post is useful for you..

call spoofing | call any number from any number for free

Call Spoofing:
Call Spoofing term is used when caller managed to hide his identity and show fake identity. When you receive a call from friend, your mobile phone shows the number of your friend as caller. But in case of call spoofing caller show some fake number in place of his original number.
There are many online services which allows users to call from any number to any number in the World for free.


Make prank calls call spoofing
call spoofing | call any number from any number for free

If you want to fool your friends or want to see the demo of call spoofing, i have a better call spoofing service. It has many services. You can do prank calls, spoof caller id, change your voice during call. When you call someone he will see the number which you want him to see. This service is easy to use.

follow these steps:
  1. Select the country you are calling from, choose the CallerID you want to display and enter the number you want to call.
  2. Press "Get me a code" and we will provide you with number to call and a code.
  3. Call the number
  4. Enter the code and we will connect your call to your friend with the CallerID and voice you have selected.


Warning: Do not use this for any crime.


click to use this service here:
http://www.crazycall.net/

Related search terms
Call any number for free
free internet calls
call spoofing
fake calls

Sunday 11 November 2012

10 Reasons Why Computers Crash

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

 1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-
System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Regards 1000Hacking Toutorials

Dell is offering "Windows 8 For Dummies" eBook For Free

Have you upgraded to Windows 8 and searching for something to help? The Dell Enterprise team today released a free PDF ebook names as "Windows 8 for Dummies." This free ebook covers all the basics of this new Windows 8 operating system. It mainly covers the new features of Windows 8 that are start screen and app store.

To download this ebook, you only need to fill simple form.

Download

See the table of contents of the book. These are the things covered in this book.


Bsnl 3G Latest 3G Gprs Data Plans November 2012


Prepaid 3G Data Plans
Price
Day/Any time usage in MB
Night * usage in MB



Total
bundled
free Usage
in MB




Validity (days)**
Data Charges in Rs./10KB***
(except APN 'bsnlstream')




Data Charges in Rs./MB***
(For APN 'bsnlstream)
25
100


100

3
0.02

0.25
50
200


200

15
0.02

0.25
100
300


300

30
0.02

0.25
120
1500 ( Day Usages 250 MB & Night Usages 1250 MB)


1500

30
0.02

0.25
151
1000
--

1000

7
0.02

0.25
250 (225)^
1000(1250)
--

1000(1250)

30
0.02

0.25
600
3000


3000

90
0.02

0.25
450 (360)^
2000(2500)
--

2000(2500)

30
0.02

0.25
599
7000 ( Day Usages 3000 MB & Night Usages 4000 MB)


7000

30
0.02

0.25
750
5000
--

5000

30
0.02

0.25
1099
10000


10000

30
0.02

0.25
3000
30000


30000

90
0.02

0.25
Night

11.00 PM to      07.00


















Best Apps To Secure Your Phone

Smartphones hold our contacts, photos, and private information, making them more valuable than the sticker price. It’s nice to have help protecting your smartphone, so here are seven of the top security apps that will give your phone its own bodyguard.



1. Find My iPhone (Free)

Losing an iPhone is scary, but with Find My iPhone it doesn’t have to be. With this app, you can log on to any iOS device and sign in using your Apple ID, allowing you to track your phone on a map, play a sound, display a personal message, lock your device, or wipe it clean of personal data. Ideally, you’ll be able to track down your phone and get it back, but if not at least your personal information can be erased from the phone.

2. TigerText (Free)

This app is a texting app that gives senders full control over their messages. Perfect for businesses that let employees use their phones for company and personal messaging or for sports teams that want to create an easy to manage messaging group. This app is great because it can send text files and the sender can choose to delete any messages at any time and see when their messages have been read. TigerText works on pretty much any device including iOS, Android, Windows and BlackBerry.

3. LastPass Password Manager ($1/month)

With so many email accounts, bank accounts, shopping sites and social networking sites, it can be difficult to remember all of those passwords. This app creates a safe place to store and generate passwords. LastPass installs a browser that remembers passwords and information so you don’t have to constantly fill out mailing or email addresses. It also has a secure password generator to keep your passwords fresh. It works on multiple devices including iOS, Android, Windows and BlackBerry.

4. Call Blocker (Free)

Call Blocker is the best receptionist you’ll ever have. The app comes with a black list that rejects unwanted calls, forwards calls, or sends an automated SMS message to missed or ignored calls. It can also block annoying SMS messages and back up your contacts list so you always have a spare copy. Call Blocker will also delete your call history and messages between you and a contact for ultimate privacy. This app works with multiple platforms, including iOS, Android and BlackBerry.

5. Lookout Security and Antivirus ($2.99/month)

Lookout has basic loss and backup protection, but it also comes with antivirus software that keeps your phone safe from unwanted viruses. The app blocks harmful URLs and performs weekly antivirus scans of emails, apps and other files. Lookout can detect and remove viruses and spyware from your phone so that it runs quickly and safely. Plus, the app can lock or locate lost phones and backup and restore information if your phone is accidentally erased. Users rave about Lookout being the best security app out there. The app runs on major platforms like iOS and Android.

6. eWallet ($9.99)

With over 14 years of experience, eWallet promises to keep your private information safe. This app stores passwords, usernames and pins with a strong 256-bit AES encryption. It also stores banking card information and has a time-out setting so secure pages don’t get displayed for too long. eWallet lets users back up their secure information with a PC or Mac and let you sync as much as you want. It's compatible with iOS, Android and BlackBerry.

7. Silent Circle ($29-40/month)

Originally designed for military personnel to communicate securely, Silent Circle provides complete confidentiality between you and other Silent Circle users. Phone calls, texts, emails and videos are completely encrypted when sent between Circle users so that they are the only ones able to access the information. This app is great for protecting business information and communicating around the globe. The app works on iOS, Android and PC devices.

What are some ways you protect your mobile devices from loss, virus or hacking? How have these apps worked for you?




Saturday 3 November 2012

How to Apply for CMAT 2013-14


Registering for CMAT is a 4 Step process as mentioned below:
Step 1) First time you will enter as NEW USER. Here you will read the instructions carefully, accept the declaration and proceed

Step 2) Self registration: Here you need to enter few basic details. Please ensure you enter the correct details on this Self
Registration form and verify it before you click on SUBMIT button on this page. Once you SUBMIT this page, you cannot edit any
data entered on this page. Submitting this page will generate a unique 6 digit password. This password will be shown on your
screen and will be sent to you via e-mail and sms. From now onwards, whenever you wish to login to the registration portal, you will
come as an EXISTING USER and login with your e-mail id and this unique 6 digit password. This completes your self registration

Step 3) Payment Process: You can do the payment in either of the two modes mentioned below

Mode i) ONLINE PAYMENT: You can select ONLINE PAYMENT mode and then do the payment using Credit card / Debit card /
Net Banking
Once your payment is successfully done, you will receive a confirmation e-mail and sms. Once you have received the successful
payment confirmation, you can proceed with the remaining part of registration process

Mode ii) CASH Payment in SBI bank: You can select this option to pay by CASH at any of the designated SBI bank branch. Once
you select this option and proceed, you will see a CHALLAN on your screen with your details already filled in it. You need to take 3
PRINT OUTS of this CHALLAN, fill in the details wherever required in all the copies, and walk in to your nearest SBI bank branch
with CASH on the next day of generation of Challan. Cash Deposit will be accepted only from the next day of your Challan
generation.

E.g. If you Generate and Print the Challan copies on 3rd Aug 2012, then walk in to the nearest SBI bank branch with
Challan copies and CASH from 4th Aug 2012 onwards. Similarly if you PRINT the CHALLAN copies on 4th Aug 2012, then
walk in to the nearest SBI bank branch with Challan copies and CASH from 5th Aug 2012 onwards.

Please ensure the JOURNAL number written is clearly visible before you leave the bank.
Now that you have deposited the CASH and got the acknowledgement CHALLAN, you need to wait for 48 hours. In these 48 hours,
your payment will get updated in the registration portal.
You will receive an e-mail and sms confirming that your payment data has got updated in the registration portal. Then you need to re
login to the portal proceed with the remaining part of registration process

Step 4) Now that you are done with the payment, you need to fill the remaining part of the form. Once you have filled the complete
form, we suggest you once again check the complete data entered by clicking on PREVIEW button. Clicking on PREVIEW button
will allow you to modify your data in case you want to modify
Once you are sure that all the data entered is accurate, you will have to accept a declaration and click on SUBMIT. The system will
re-confirm to you for SUBMIT. Once you confirm, your form will get finally SUBMITTED and no change in the data is possible after
this SUBMIT


If you wish, you can PRINT your filled form and keep a copy with you for reference
This completes the registration process

ALL THE BEST!!!!!
Blogger Widgets