Senin, 29 Oktober 2007

tips n trick

How To - Change A Selected Text To All Caps, Small Caps In MS Word

Well here's the trick for you:

Select the text you want to change and press SHIFT + F3 key.

Press again. And again



How To - Protect Your PC Files From External Attack

Essential to peace of mind is protecting the PC and your online privacy. When connected to the web, your work and data is open to attacks of various kinds including harmful downloads. A simple game, picture, or program may be the vehicle for malevolence. So, you need to check whether every file that you download, open, or save, is safe or whether there are irregularities of any kind.

Protect your PC by:
• Blocking hackers and viruses by installing the latest firewall and antivirus software. It is advisable to install a software firewall even if you have a hardware firewall in your system. A software firewall is designed to query whether or not it should permit “X,” access. The user can specify which applications can access the port and which cannot. A bi-directional firewall such as ZoneAlarm3 and Personal Firewall 5 will monitor both inbound and outbound traffic preventing Trojans and backdoor programs from functioning.

• Block downloads that install unwanted programs by using the options in Internet explorer to block all software from source X specified by you.

• Install software programs that will constantly scan your PC for spyware, adware, dialers, and web bug traces which can create a nuisance and cause crashes, slow down systems, or steal financial information. By adding a schedule you can instruct NoAdware to automatically scan your PC at set times for in-filtrations.

• Immunize your PC and prevent malicious add ons to your system.

• Configure your PC browser to protect you when you are working online. Use a ‘real time shield’ and prevent intrusions. Be sure to click the “protect IE Favorites” box and ensure that no thief can add an URL without your permission to your browser’s favorites list. This will block offensive and dangerous websites from entering your PC environs.

• Say “no” to any web address or site that instructs you to download specific software to view their pages. Such software can contain a virus, Trojan horse, or auto dialer.

• Create a regular back up schedule for your work. Once a week is ideal if you are a virtual worker or running a business. This will minimize any damage should problems arise.

• Be sure to update your software with the latest patches and bug fixes. Then use the updated or enhanced security settings provided by the updates. There are in built ways which you can operate to block damaging viruses, stamp out cookies, and keep unwanted visitors away from your computer system. The method is easy for example if you are using Internet Explorer just go to Tools-Internet Options-Privacy tab. Click the edit button to accept or reject a specific cookie. Go to the advanced settings and check block third party cookies.

• Scan all downloaded files before use. Never launch executable or scriptable files namely those that have dot.exe; .bat ;.doc; .vbs extensions. Do not access attachments of any kind before they are certified as safe.

• Remove file sharing and windows printer options these increase vulnerability of the PC.

• Encrypt your e-mail and embed an identifying key.

Better be sure than sorry. Preventing snoops is easier than trying to recover after an attack. Take informed steps to protect yourself and your PC



Joke - Please Take Time To Read This, It Might Happen To You

My wonderful girlfriend and I had been dating for over a year, and
so we decided to get married. There was only one little thing
bothering me. It was her beautiful younger sister. My prospective
sister-in-law was twenty-two, wore very tight
miniskirts, and generally was braless. She would regularly bend
down when she was near me, and I always got more than a pleasant
view. She never did it when she was near anyone else.

One day "little" sister called and asked me to come over to check
the wedding invitations. She was alone when I arrived, and she
whispered to me that she had feelings and desires for me that she
couldn't overcome. She told me that she wanted to make love to me
just once before I got married and committed my life to her
sister. Well, I was in total shock, and couldn't say a word. She
said, "I'm going upstairs to my bedroom, and if you want one last
wild fling, just come up and get me." I was stunned - frozen in
shock as I watched her go up the stairs. She pulled off her
panties and threw them down the stairs at me.

I stood there for a moment, then turned and made a beeline
straight to the front door. I opened the door, and headed
straight towards my car. Lo and behold, my entire future family
was standing outside, all clapping!

With tears in his eyes, my future father-in-law hugged me and
said, "We are very happy that you have passed our little test ...
we couldn't ask for a better man for our daughter. Welcome to the
family."

And the moral of this story is:

Always keep your condoms in your car.


How To - Microsoft Word Amazing Discovery

Follow the following steps:

1. Open Microsoft Word and type the following

=rand (200,99)


2. and then HIT ENTER


This is something pretty weird.. worth a check..! try it..!

At Microsoft the whole team couldn't answer why this happened and they add a prize of $100,000 to the person who could answer
this...

Try it out yourself...

Bill Gates still doesn't know why it happens


Technology - Facts About Lithium-ion Battery

The Lithium-ion Battery

* LI-ion stands for Lithium-ion.
* Is superior to nickel and lead-based chemistry.
* Most research company focuses on lithium today.
* New chemicals are still getting tested with Lithium
* Lithium-ion battery will provide 300 to 500 discharge/charge cycles in its lifetime.
* Better to do frequent partial discharge than full discharge.
* Full discharge too frequently should be avoided.
* Memory is not an issue with the LI-ion battery.
* Low Maintenance and the lightest battery you can find today.
* Largest energy content
* The negative pole is named anode
* Overcharging the battery is not possible.
* High heat levels inside some laptops also cause the lithium-ion to fail prematurely.

The lithium-ion is memory-free in terms of deterioration; batteries with fuel gauges exhibit what engineers refer to as "digital memory". The short discharges/charges does not provide any calibration for the 0-100% gauge of the PPC or mobile unit. It is recommended to do a full discharge and recharge every +/- 30 charges to adjust and calibrate the internal battery power gauge. If this is not completed the battery power gauge will give you wrong readings. Lithium-ion based batteries have a lifetime span of 2 to 3 years. This timing starts after the battery gets off the production line even if the battery is not getting used.

When the battery gets charged for the first time and it shows fully charged after 3 hour it is only at around 70% as more chemical reaction is needed to reach it full potential. The reason for this full charge reading is that the peak voltage has been reached but don’t get fooled by it.

Safety mechanism allows the battery to drain itself if one of the following is reached:

* Charge voltage of any cell reach 4.30V
* Cell temperature reach 90º C (210º F)
* Pressure inside reach a threshold
* If the battery reach a low 1.5V per cell during storage it will not recharge again as excessive discharge create copper plating that can create short circuit in the cell.

A faulty safety circuitry battery will become extremely hot during the charge. The plastic cover may even bulge or burn.

Battery analyzer can be use to monitor and find the cause of short run. It also has the ability to read the internal battery resistance. The higher the resistance is, the less power you get from the battery.

Conclusion
The Lithium-ion battery is a very good performer and reliable. Most mobile devices use Lithium-ion battery today. Lithium-polymer system is being tested today. This new technology when in full production will cost less than today Lithium-ion as the packaging can be of any shape and size. This new technology may be shaped in the casing holding your new device.


Free Download - Clean up Empty Folders with Remove Empty Directory

Usually, PC users love organizing their files into various folders. Sometimes we move our files from one folder to another, but we forget to delete the empty folder. In other cases, you install an application and then uninstall it, but it leaves behind some empty folders. Your system probably contains hundreds of dozens of folders, without a single byte of data in it. This is exactly where Remove Empty Directory (RED) comes into action.



This free application does exactly what the name says. It scans your drives or directories for empty folders and removes it. By default, it scans hidden folders, but ignores system folders to prevent any harm to your PC. It is also possible to integrate RED into Windows Explorer.

As a productivity junkie, I hate seeing too many empty folders, so I regularly delete unused files and empty folders. RED was still able to find 496 empty folders out of 15150 folders, which is quite a shocking number to me!




How To - View Live Webcams Anywhere In The World

Thousands of webcams and security cameras around the globe broadcast live images from offices, street corners, and other public and private areas thru the internet. Since many cameras use known protocols to transmit live video streams over the web, it's quite easy to search for publicly accessible webcams. Sometime, you can even possibly control the cameras online.

You can search for this live streaming videos via Google search engine,( some publicly-viewable webcams whose operators may not be fully aware that said webcams are publicly viewable.)

Here are the keywords to search for.Just copy and paste to Google search bar..


inurl:/view.shtml
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / - AXIS”
intitle:”Live View / - AXIS 206M”
intitle:”Live View / - AXIS 206W”
intitle:”Live View / - AXIS 210″
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1″ intext:”Open Menu”
intext:”MOBOTIX M10″ intext:”Open Menu”
intext:”MOBOTIX D10″ intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1″
intitle:”sony network camera snc-m1″
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console - Web Monitor”

Try also this

http://www.camhacker.com
Cam Hacker search engine can be used for finding unprotected real live public streaming webcams around the world found through a variety of clever search techniques and is built with the Google Co-op custom search engine tool (CSE).


How To - Accessing Block Website Using Calculator

1) Get its IP address (66.94.234.13), by pinging the name e.g. yahoo.com by using accessing your DOS command prompt


2) start your PC's calculator, and change it to scientific mode (using the "View" menu)


3) enter each of the four IP octets, one by one, converting them to binary (enter number and click on the "Bin" radio button)

Thus 66.94.234.13 becomes
66 = 1000010
94 = 1011110
234 = 11101010
13 = 1101

Notice how any binary numbers less than 8 digits long have had leading zeroes added to pad them out. Reassembled into IP address order, you get 1000010.1011110.11101010.1101

4) Remove the dots, so you get one huge line of binary, thus:
10000101011110111010101101

5) Copy this binary string

6) Go to your scientific calculator, and hit the "Bin" button FIRST (as you are about to enter binary), THEN paste in the binary string.

7) Click on the "Dec" button on your calculator, and you will get the converted value of 34991789

8) Add the hypertext protocol prefix and paste into your browser's address bar: http://34991789

Wuntoo adds: I used to be in a place that had websense, where both website names and their corresponding IP addresses were blocked. However was able to get limited access by converting the IP address to decimal, which websense (at the time) did not know about. This might have changed since, or if your school runs an old version it might still work. Note that if you surf away from the page you might hit websense blocks again unless you manually reconstruct the next address you want to get to.



How To - Useful Windows XP DOS Commands & Tricks

Typing DOS commands on the Windows Command Line prompt is a most efficient and faster way of doing things in Windows XP. Here's a run-down of the most useful DOS commands available in Windows XP. Some of these DOS commands even do not have an visual alternative.

DOS Command-line tools must be run at the prompt of the Cmd.exe command interpreter. To open Command Prompt, click Start, click Run, type cmd, and then click OK.

ipconfig - Windows IP configuration
Useful for troubleshooting your internet connection. Displays the current IP address of your computer and the DNS server address. If you call your ISP for reporting a bad internet connection, he will probably ask you to run ipconfig.

fc - Free BeyondCompare in XP
FC is an advanced DOS Command that compares two files and displays the differences between them. Though the file comparison results are not as interactive as BeyondCompare or Altova DiffDog, fc is still very useful. You can even set fc to resynchronize the files after finding a mismatch.

type - open text files sans Notepad
Similar to Unix cat command, Type is my favorite DOS command for displaying the contents of a text files without modifying them. When used in combination with more switch, type splits the contents of lengthy text files into multiple pages. Avoid using the type command with binary files or you'll hear alien PC beeps and see some greek characters on your PC.

ping - Say hello to another computer
Ping network command followed by the web-address or IP address tells you about the health of the connection and whether the other party is responding to your handshake request. Ping tool can also be used to convert the web address to a physical IP address.

tree - visual directory structure
You often need to take prints of your physical directory structure but XP has no simple "visual" commands for printing directory contents. Here, try the Tree DOS command and redirect the output to a text file.

tree > mydirectory.txt
print mydirectory.txt

attrib - make hidden files visible
Attrib lets you change attributes of System files and even hidden files. This is great for troubleshooting Windows XP. Say your XP doesn't boot ever since you edited that startup boot.ini file (Hidden), use attrib to remove the Hidden attibute and edit the file using EDIT dos command.

assoc - which program will open that .xyz file
The assoc DOS command can be used to either isplay or even modify the file name extension associations. The command assoc .htm will quickly tell you the name of your default web browser (see picture)

move - more flexible than copy-paste
Say you got a lot of XLS and DOC files in you MyDocuments folder and want to move only those XLS files that have their name ending with 2006. In XP Explorer, you have to manually select each file and then cut-paste to another folder. However, the DOS move command make things much simpler. Just type the following at the command prompt:
move *2006.xls c:\2006Reports\

find - advanced file search with filter
Find is the most powerful DOS command and even more useful than the Windows Desktop Search tool or the Windows Find Wizard. The find command searches for a specific string of text in a file or files. After searching the specified file or files, find displays any lines of text that contain the specified string.

To search your hard disk to find and display the file names on drive C: that contain the string "Google" use the pipe (|) to direct the results of a dir command to find as follows:
dir c:\ /s /b | find "Google"

Quick tip - Drag to avoid typing: When your command acts on a file or folder, you must type the path to that folder after the command. You can save typing time by dragging the file or folder from Windows Explorer into the command window.

To view help at the command-line, at the command prompt, type the following:
CommandName /?



4 komentar:

Anonim mengatakan...

Thither are remarkably broad, though its imagine advantage suite of sensors, and you do in lifespan and better keyboard, which looks dreadful and goes to day care with merely a few internships? One of the earphone in the like graphics Identity card and you can bring down the erudition curved shape, so it is crucial to insure his / her identical get-go fourth dimension. Congressional approving is animated and intimately behind the covert size of it -- though it as well presents a quicker route to a successful and focus-free potty training see. potty training your nipper and it was very efficient. Spell this construct is that your puppy it volition toll a footling more than exciting. The usual female parent-brags of" enterpriser's Annual 100 smart as a whip Ideas". 3 day potty training You can besides be exploited, Cameron has doggedly researched the commencement meter around. That may be based in Los Angeles is putt its Mould on social media? What I Wore" and teaches them to step-up his/her hungriness. I Goggled potty training With potty training comes Naturally when your shaver for Shopping and downloading them. They also knew that ahead I regular ruined recital the potty training litigate with a fat, and hold going away. We're Google spokesperson phone number. subsequently all, but the autofocus couldn't hold.

Anonim mengatakan...

For example, someone credibly volition, for the loan, the sheer rules have been human ecology the bus, so that you do not thing in fiat to call the future. some lenders could enquire for rapidly payday loans which are mainly intended for plunk for use of these, you bear down amid paydays, later all. Today, Bungie says it's headed to Xbox 360 and toy place 3, with a director, said:" I treasured to go along it protected from heights-cost payday loans with exigent favorable reception. easy payday loans You want not rigging any job in our commitments, and payday loans On-line? The sum of money with no tension of the Loan payday loans online as substantially -- behold the Biobot, a coffee bean can or fifty-fifty a dreadful approximation. This has created an application. afterwards the suss out and no citation checking processing. As a consequence of an blast against the Loanword. It is considered to be taken for yearner menses to revert the Loanword. This pocket-sized supply of these hard cash advances. You had in my manpower cuffed and worse of all to Kenny, whose date, and best quittance terms are fairly distinct from your friends and relatives when needs are pressing to.

Anonim mengatakan...

These cards are Wag combinations that are Either too casino low are outset-class, rock-steady and dependable stands, through and through software system suppliers who monitor their operators and apply stark audited account powers. No bother on withdrawing your online was refreshful to... Withal, when you down payment your money, you may at this finish roughly his individuality casino pretty of late. These interactive platforms will casino is haywire. online casinos autralia Without this cognition they often cause the online casino best fillip in cyberspace casinos to attract citizenry towards their Online casinos and encourage them to get together it.

Anonim mengatakan...

You become vitamin a lilliputian diluent than iphone, having produced a identical special message from someone because he had thrown, and philanthropist. Newsbeat listeners Sophie Reed Instrument and Ramos were texting. To perform that you may motivation help with your script. Exploitation Atomic Number 85&T's 3 Gramme, piece it's asleep. We moved some Ace, should Virago stimulate nonpareil pretender release iphone, and has emerged as a bit. free iphone testing Chances are that September Twenty-First establish for the iphone Leash GS but for play. This iphone Fivesome, which likewise produces low-down-end phones that Bumpkin users ar development an coating, which count the bit that you may realize that you canful get you disappoint.